Ixia EE11ABG5 1xWLAN SED User Manual IxWLANUserGuide

Ixia 1xWLAN SED IxWLANUserGuide

User Manual Part Two

IxWLAN User Guide, Release 6.20 5-23The Command Line Interface (CLI)Virtual Station Setup and Control Commands  Cipher .................... WEP(RC4)  Data Encryption ........... Off  Shared-key Index .......... 0  Fragmentation Threshold ... 2346  RTS Threshold ............. 2346  Mode ...................... internal     Layer .................. 3  Load Application .......... ping  Target IP Address ......... 10.1.83.1  Ping Transmit Count ....... 100  Ping Data Size ............ 1024autorun Automatically runs one or more configured virtual stations that are in the ready state. It is intended for use in conjunction with the autoconf command. Any other use may produce unexpected results.The command issues the run com-mand for the specified number of virtual stations. autorun [nVstas][nVstas]: Optional number of virtual stations (1…128). If this parameter is omit-ted, the total number of auto-configured (autoconf) virtual stations is used. clear group Clears the certfile, SSID, or statistics for the specified vSTA or all vSTAs within the specified group.clear group <grpID> <object>Valid objects are: <certfile>: Clears vSTA group certfile names. <SSID>: Clears vSTA group SSIDs. <stats>: Clears vSTA group statistics.clear vsta Clears all statistics for one or more virtual stations.clear vsta <vStaId>:all:master:<object><vStaId>: Virtual Station ID (1…128), all, or master. If <vStaId> is set to all (that is, clear vsta all stats), this command clears all statistics for all virtual sta-tions. If <vStaId> is set to master (that is, clear vsta master stats), this command clears all statistics for IxWLAN.NOTE: By default, all virtual stations that are created in the CLI are assigned to group 1. This can be changed using the set vsta <vStaId> group <grpId> command.
The Command Line Interface (CLI)Virtual Station Setup and Control Commands5-24 IxWLAN User Guide, Release 6.205Example:[wport1]IxWLAN -> clear vsta 1 stats[wport1]IxWLAN ->Valid objects are: <certfile>: Clears vSTA certfile names. <SSID>: Clears vSTA SSIDs. <stats>: Clears vSTA statistics.conf Configures a virtual station. It specifies a virtual station's IP address, WLAN MAC address, and load application mode. It also specifies the load application protocol, target host, and application specific parameters. After a virtual station is configured, it must be initialized using the init command. The virtual station’s wport attribute defaults to the current wport.conf <vStaId> <ip|dhcp_value> <mac> <mode> <lp> <targetIP> <count> <size><vStaId>: Virtual Station ID (1…128)<ip|dhcp_value>: Specifies the virtual station’s WLAN IP address (nnn.nnn.nnn.nnn) or a <dhcp_value>. <dhcp_value> can be on, off, or auto. on = manual (needs the acquireip command to start), off = DHCP is not active. vSTA(s) must have a static IP address, auto = initiate lease negotiation if associa-tion succeeds.<mac>: Virtual station’s WLAN MAC address (xx:xx:xx:xx:xx:xx). The starting MAC address must be within the range of MAC addresses defined by the WLAN Base MAC Address and WLAN MAC Mask configured for the specified wport (see set wlanmac on page 5-85 and set wlanmask on page 5-85). <mode>: external or internal. If external mode is used, the remaining parameters (<lp> <target> <count> <size>) are optional. <lp>: Specifies the Load Application Protocol (ping).<targetIP>: Target IP address (nnn.nnn.nnn.nnn)<count>: Number of ICMP Echo Requests to transmit: 0…2,147,483,647.<size>: Number of data bytes to be included in ICMP Echo Requests: 64…1024.The conf command does not include the full set of attributes that can be assigned to a virtual station. When these attributes are not otherwise specified, IxWLAN uses the default values for these attributes, as listed in Table 5-1 on page 5-25.
IxWLAN User Guide, Release 6.20 5-25The Command Line Interface (CLI)Virtual Station Setup and Control CommandsTable 5-1. AttributesAttribute Default Valueauthentication open-systemcertfile (not set)cipher wepcsmode persistentdhcplease 3600dhcpretry 4dhcpinterval 8dhcpoffers 1dhcpserver 0.0.0.0eapalgorithm tlsencryption offfastradius disabledfragmentthreshold 2346gateway 0.0.0.0group 1inneralgorithm ms-chapv2ipmask 255.255.255.0keyindex 0 (not defined)kmtime-out 0 (that is, no time-out)layer 3outeridentity (not set)passphrase (not set)password (not set)pmkcache enabledpsk (not set)retry 2roamtype reassociationrtsthreshold 2346timeout 300SSID (not set)
The Command Line Interface (CLI)Virtual Station Setup and Control Commands5-26 IxWLAN User Guide, Release 6.205The set vsta command allows you to change any of these default values.Example:[wport1]IxWLAN -> conf 3 10.1.40.20 00:0b:cd:59:00:01 internal ping 10.1.40.16 64000 1024[wport1]IxWLAN -> OK[wport1]IxWLAN -> conf 1 10.1.35.150 02:CF:1F:00:00:01 int ping 10.1.35.38 10 1024[wport1]IxWLAN -> OK[wport1]IxWLAN -> conf 1 on 02:CF:1F:00:00:01 int ping 10.1.35.38 10 1024[wport1]IxWLAN -> OK[wport1]IxWLAN -> conf 1 auto 02:CF:1F:00:00:01 int ping 10.1.35.38 10 1024[wport1]IxWLAN -> OKdeauth Starts the de-authentication sequence for one or more virtual stations. This sequence also drops any WPA/RSN security associations. The virtual station(s) must be configured, initialized, and authenticated before this command can be used. The following command starts the de-authentication sequence for one or all virtual stations. deauth vsta <vStaId><vStaId>: Virtual Station ID (1…128) or all. If <vStaId> is set to all (that is, deauth vsta all), the de-authentication sequence is initiated for all virtual stations.The following command starts the de-authentication sequence for all virtual sta-tions in a specified group.deauth group <grpId><grpId>: Group ID (1…128)Example:[wport1]IxWLAN -> deauth vsta 1[wport1]IxWLAN -> OK[wport1]IxWLAN -> vSTA ID:1 NOTIFY Operation DEAUTH succeeded - TUE JUL 15 03:09:56 2003[wport1]IxWLAN ->userid (not set)wport 1Attribute Default ValueNOTE: By default, all virtual stations that are created in the CLI are assigned to group 1. This can be changed using the set vsta <vStaId> group <grpId> command.
IxWLAN User Guide, Release 6.20 5-27The Command Line Interface (CLI)Virtual Station Setup and Control Commandsdel group Clears all configuration parameters for a specified group and removes the group from the system. del group <grpId><grpId>: Group Number (1…128)Example:[wport1]IxWLAN -> del group 25 vSTAs deleted[wport1]IxWLAN -> OK[wport1]IxWLAN ->vSTA ID:6 NOTIFY DELETED - reason: delete command - WED JUL 16 07:35:27 2003[wport1]IxWLAN -> OK[wport1]IxWLAN ->vSTA ID:7 NOTIFY DELETED - reason: delete command - WED JUL 16 07:35:27 2003[wport1]IxWLAN -> OK[wport1]IxWLAN ->vSTA ID:8 NOTIFY DELETED - reason: delete command - WED JUL 16 07:35:27 2003[wport1]IxWLAN -> OK[wport1]IxWLAN ->vSTA ID:9 NOTIFY DELETED - reason: delete command - WED JUL 16 07:35:28 2003[wport1]IxWLAN -> OK[wport1]IxWLAN ->vSTA ID:10 NOTIFY DELETED - reason: delete command - WED JUL 16 07:35:28 2003[wport1]IxWLAN ->del vSTA Clears all configuration attributes for one or more virtual stations and removes the virtual station(s) from the system.del vsta <vStaId><vStaId>: Virtual Station ID (1…128) or all. If <vStaId> is set to all (that is, del vsta all), all virtual stations are deleted.Example:[wport1]IxWLAN -> del vsta 1[wport1]IxWLAN -> OK[wport1]IxWLAN ->vSTA ID:1 NOTIFY DELETED - reason: delete command - WED JUL 16 07:44:09 2003[wport1]IxWLAN ->disassoc Starts the 802.11 disassociation sequence for one or more virtual stations. This sequence also drops any WPA/RSN security associations. The virtual station(s) must be configured, initialized, authenticated, and associated before this com-mand can be used. The following command starts the disassociation sequence for one or all virtual stations. disassoc vsta <vStaId>
The Command Line Interface (CLI)Virtual Station Setup and Control Commands5-28 IxWLAN User Guide, Release 6.205<vStaId>: Virtual Station ID (1…128) or all. If <vStaId> is set to all (that is, dis-assoc vsta all), the disassociation sequence starts for all virtual stations.The following command initiates the disassociation sequence for all virtual sta-tions in a specified group.disassoc group <grpId><grpId>: Group ID (1…128)Example:[wport1]IxWLAN -> disassoc vsta 1[wport1]IxWLAN -> OK[wport1]IxWLAN ->vSTA ID:1 NOTIFY Operation DISASSOC succeeded - TUE JUL 15 03:09:50 2003[wport1]IxWLAN ->get group Retrieves and shows a configuration parameter or statistics for all virtual stations in a group. get group <grpId> <attribute><grpId>: Group Number (1…128). If <attribute> is summary, you may specify all as the group number (that is, get group all summary) to show summary statis-tics for all groups.<attribute>: The attribute of the information to get/display. It can be one of the following (See set group on page 5-42 for a more detailed description of the information that may be shown by each of these attributes):•authentication: Shows the group’s authentication mode (open-system, shared-key, wpa-psk, wpa, rsn, or rsn-psk). •certfile: If authentication is rsn or wpa, shows the group’s certificate file name.•cipher: Shows the group’s cipher mode (wep, tkip, or aes-ccm). •conf: Displays the group’s configuration and adds the wports assigned to it.•count: If mode is internal, shows the configured ping count (0…2,147,483,647).•csmode: Shows the group’s connection mode (persistent or non-persistent) •dhcpinfo: If dhcpmode is on or auto, shows DHCP information.•dhcpmode: Shows the DHCP Mode setting (on, off, or auto).•dhcplease: Displays the dhcpLease attribute of the specified vSTA, all vSTAs, or all vSTAs within the specified group.•dhcpretry: Displays the dhcpRetry attribute of the specified vSTA, all vSTAs, or all vSTAs within the specified group.
IxWLAN User Guide, Release 6.20 5-29The Command Line Interface (CLI)Virtual Station Setup and Control Commands•dhcpinterval: Displays the dhcpInterval attribute of the specified vSTA, all vSTAs, or all vSTAs within the specified group.•dhcpoffers: Displays the dhcpOffer attribute of the specified vSTA, all vSTAs, or all vSTAs within the specified group.•dhcpserver: Displays the dhcpServer attribute of the specified vSTA, all vSTAs, or all vSTAs within the specified group.•eapalgorithm: If authentication mode is rsn or wpa, shows the group's authentication protocol: TLS, PEAP, or TTLS.•encryption: Shows the group’s encryption mode: on or off.•fastradius: Shows the group’s fast RADIUS reconnection mode: enabled or disabled.•fragmentthreshold: Shows the fragmentation threshold setting (256…2346).•gateway: Displays the gateway attribute of the specified vSTA or all vSTAs within the specified group.•inneralgorithm: If eapalgorithm is peap or ttls, shows the group's Phase 2 authentication algorithm: ms-chapv2 or eap-ms-chapv2.•ipmask: Displays the ipmask attribute of the specified vSTA or all vSTAs within the specified group.•keyindex: Shows the group’s shared-key index (1, 2, 3, or 4).•kmTimeout: AKMP Timeout shows the wait state timer for virtual stations in this group. •layer: If mode is external, shows the method (layer 2 or 3) that is used to cap-ture external data frames.•lp: Shows the group’s load protocol: ping.•mode: Shows the group’s test mode (external or internal)•outeridentity: If eapalgorithm is peap or ttls, shows the group's separate user ID that is used in Phase 1 authentication. It can be a string of up to 64 charac-ters.•passphrase: If authentication is rsn-psk or wpa-psk, shows the group's pass-phrase (up to 63 ASCII characters). •password: If eapalgorithm is peap or ttls, shows the group's password that is used in Phase 2 authentication. It can be a string of up to 64 characters.•pmkcache: Shows the group’s PMKSA cache mode: enabled or disabled.•psk: If authentication is rsn-psk or wpa-psk, shows the group's Pre-Shared Key (64 ASCII-hex characters). •retry: Shows the configured Authentication/Association retry limit (1…2,147,483,647 or zero (=no retries)).•roamtype: Shows the group’s Roam type: reassociation or disassociation.•rtsthreshold: Shows the group’s RTS threshold setting (1…2346).•size: If mode is internal, shows the configured ping packet size (64…1024).
The Command Line Interface (CLI)Virtual Station Setup and Control Commands5-30 IxWLAN User Guide, Release 6.205•ssid: Shows the group’s SSIDs.•state: Shows the current state of each virtual station in the group.•stats: Shows statistics counters for all virtual stations in a group.•summary: Shows cumulative summary statistics for all virtual stations in one or all groups.•target: If mode is internal, shows the configured target IP address.•timeout: Shows the configured Authentication/Association timeout in milli-seconds (1…2,147,483,647 or zero (0=immediate timeout)).•userid: For groups configured for WPA or RSN authentication and a certifi-cate file, shows the group’s user ID string that is needed for the certificate file.•wport: Displays the wport assigned the identified group.Example:[wport1]IxWLAN -> get group 1 csmodevSTA 1 connection mode: persistentvSTA 2 connection mode: persistentvSTA 3 connection mode: persistentvSTA 4 connection mode: persistentvSTA 5 connection mode: persistent5 vSTAs found[wport1]IxWLAN ->get vsta Retrieves and displays a configuration attribute or statistics for one or all virtual stations. get vsta <vStaId> <attribute><vStaId>: Virtual Station ID (1…128). Use all to show <attribute> for all virtual stations. If <attribute> is set to stats to show statistics, the <vStaId> can be set to master to show statistics for IxWLAN (that is, get vsta master stats). If <attribute> is summary, <vStaId> must be set to all.<attribute>: The attribute of the information to get. Omit this attribute (for example, get vsta 1) to show a virtual station's complete configuration or use one of the following attributes to show a specific configuration attribute. See set vsta on page 5-46 for a more detailed description of the information that can be shown by each of these attributes. •authentication: Shows the virtual station’s authentication mode: open-sys-tem, shared-key, rsn, rsn-psk, wpa, or wpa-psk. •certfile: If authentication is wpa or rsn, shows the virtual station’s certificate file name.•cipher: Shows the virtual station’s cipher mode: wep, tkip, or aes-ccm. •conf: Shows the virtual station's complete configuration data.
IxWLAN User Guide, Release 6.20 5-31The Command Line Interface (CLI)Virtual Station Setup and Control Commands•count: If mode is internal, shows the configured ping count (0…2,147,483,647).•csmode: Displays the virtual station’s connection mode: persistent or non-persistent.•dhcpinfo: If dhcpmode is on or auto, shows DHCP information.•dhcpmode: Displays the DHCP Mode setting: on, off, or auto.•dhcplease: Displays the dhcpLease attribute of the specified vSTA.•dhcpretry: Displays the dhcpRetry attribute of the specified vSTA.•dhcpinterval: Displays the dhcpInterval attribute of the specified vSTA.•dhcpoffers: Displays the dhcpOffer attribute of the specified vSTA.•dhcpserver: Displays the dhcpServer attribute of the specified vSTA.•eapalgorithm: If authentication mode is rsn or wpa, shows the authentication protocol: tls, peap, or ttls.•encryption: Shows the virtual station’s encryption mode: on or off.•fastradius: Shows the virtual station’s fast RADIUS reconnection mode: enabled or disabled.•fragmentthreshold: Shows the fragmentation threshold setting (256…2346).•gateway: Displays the gateway attribute of the specified vSTA.•inneralgorithm: If eapalgorithm is range or ttls, shows the inner algorithm (ms-chapv2 or eap-ms-chapv2) to be used in Phase 2 authentication.•ipmask: Displays the ipmask attribute of the specified vSTA.•keyindex: If encryption is on, shows the virtual station’s shared-key index (1, 2, 3, or 4).•kmTimeout: AKMP Timeout shows the virtual station’s wait state timer.•layer: Shows the method (layer 2 or 3) used to capture external data frames.•lp: If mode is internal, shows the virtual station’s Load Protocol (ping).•mode: Shows the virtual station’s test mode: external or internal.•outeridentity: If eapalgorithm is peap or ttls, shows the user ID that is used in Phase 1 authentication algorithm. It can be a string of up to 64 characters.•passphrase: If authentication is rsn-psk or wpa-psk, shows the passphrase (up to 63 ASCII characters) assigned to one or more virtual stations. •password: If eapalgorithm is peap or ttls, shows the user password that is used in Phase 2 authentication. It can be a string of up to 64 characters.•pmkcache: Shows the virtual station’s PMKSA cache mode: enabled or dis-abled.•psk: If authentication is rsn-psk or wpa-psk, shows the Pre-Shared Key (64 ASCII-hex characters) assigned to one or more virtual stations. •retry: Shows the Authentication/Association retry limit (1…2,147,483,647 or zero (0=no retries)).
The Command Line Interface (CLI)Virtual Station Setup and Control Commands5-32 IxWLAN User Guide, Release 6.205•roamtype: Shows the virtual station’s Roam type: reassociation or disassoci-ation.•rtsthreshold: Shows the RTS threshold setting (1…2346).•size: If mode is internal, shows the configured ping packet size (64…1024).•ssid: Shows the vSTA’s SSID.•state: Shows the virtual station’s current state.•stats: Depending on the value of <id>, shows statistics counters for one vir-tual station, all virtual stations, or IxWLAN.•summary: Shows cumulative summary statistics for all virtual stations•target: If mode is internal, shows the configured ping target IP address (that is, 10.1.35.100).•timeout: Shows the Authentication/Association timeout in milliseconds (1…2,147,483,647 or zero (0=immediate timeout)).•userid: For virtual stations configured for WPA or RSN authentication and a certificate file (certfile), shows the user ID string that is needed for the certif-icate file.•wport: Displays the wport assigned the identified vSTA(s).Example for get vsta <vStaId> dhcpinfo:[wport1]IxWLAN -> get vsta 1 dhcpinfo** vSTA 1 DHCP Lease Information **State ............ BOUNDLast XID ......... 0x0000167eTry limit ........ 4Current try ...... 0Offer limit ...... 1Current offer .... 1Try interval ..... 8 (Secs)Current timer .... 0 (Secs)Pkts xmtd ok ..... 2  DISCOVERs ...... 1  REQUESTs ....... 1  RENEWALs  ...... 0  REBINDs ........ 0  RELEASEs ....... 0  DECLINEs ....... 0Pkts xmtd err .... 0Pkts rcvd ok ..... 3  OFFERs ......... 2  ACKs ........... 1  NAKs ........... 0Pkts rcvd err .... 0  state err ...... 0  xid err ........ 1Requested lease .. 3600Lease duration ... 3600Expiration ticks . 3577Renewal ticks .... 1777Rebind ticks ..... 3127
IxWLAN User Guide, Release 6.20 5-33The Command Line Interface (CLI)Virtual Station Setup and Control CommandsLeased Address ... 10.1.35.56DHCP Server ...... 10.2.10.10Relay ............ 10.1.35.1Server/relay MAC . 00:00:00:00:00:00Subnet Mask ...... 255.255.255.0Gateway .......... 10.1.35.1DNS Server ....... 0.0.0.0[wport1]IxWLAN ->Example for get vsta <vStaId> conf:[wport1]IxWLAN -> get vsta 1 confvSTA Configuration:  ID ........................ 1  Group ID .................. 1 wport...................... 1  IP Address ................ 10.1.83.2     DHCP ................... Off  MAC Address ............... 00:0b:16:01:00:01  Connection Mode ........... persistent  Auth/Assoc Retry .......... 2  Authentication Timeout .... 300 mSec  Association Timeout ....... 300 mSec  Authentication ............ RSN  Pre-Shared Key ............ Not set  Passphrase ................ Not set  EAP Algorithm.............. TTLS  Inner Auth Algorithm....... ms-chapv2  Certfile .................. jqp.pfx  Userid .................... jqp Wport ..................... 3  Password................... one1two2three3  Outer ID................... OuterIDString  AKMP Timeout .............. 0 Seconds  Cipher .................... AES-CCM  Data Encryption ........... On  Shared-key Index .......... 0  Fragmentation Threshold ... 2346  RTS Threshold ............. 2346  Mode ...................... External     Layer .................. 2  Load Application .......... ping  Target IP Address ......... 10.1.83.253  Ping Transmit Count ....... 1000  Ping Data Size ............ 1024[wport1]IxWLAN ->Example for get vsta <vStaId> count:[wport1]IxWLAN -> get vsta 1 countvSTA 1 Ping count: 1000[wport1]IxWLAN ->Example for get vsta <vStaId> state:[wport1]IxWLAN -> get vsta 1 state
The Command Line Interface (CLI)Virtual Station Setup and Control Commands5-34 IxWLAN User Guide, Release 6.205vSTA: 1  State: Running  Mode: internal   vStaPingRcv:Active   vStaPingXmt:Active[wport1]IxWLAN ->Example for get vsta <vStaId> stats:[wport1]IxWLAN -> get vsta 1 statsvSTA 1: MAC 00:0b:cd:59:00:01, IP 10.1.35.150, State: RunningAuthentications:           1,   Deauthentications:       0Associations:              1,   Disassociations:         0Rcv Sig Strength:         72,   Ack Sig Strength:       83Rcv Rate: 24,   Tx SF Rate: 54,   Tx LF Rate: 54Frame counts: MSDUs       Data    Mcast     Mgmt     CtrlRcv             240        238        0        2        0Tx               95         97        0        2        0vSTA 1 Ping statistics:  Transmit count:            1000  Transmit data size:        1024  Packets transmitted:         96   Round-trip (uSec):  Bytes transmitted:        99072     Min:         50000  Transmit ENOBUFS:             0     Max:        100000  Packets received:            96     Avg:         74725  Bytes received:           99072     Stddev:      25137 vSTA 1 WPA/RSN statistics:  Total EAPOL Frames Tx: 0, WPA/RSN Auth Failure Ct: 0  Total EAPOL Frames Rx: 0, WPA/RSN Authentication Ct: 0  EAPOL Key Frames Rx: 0, EAPOL Key Frames Tx: 0  EAPOL Request Frames Rx: 0, Invalid EAPOL Frames Rx: 0  EAPOL Rsp Id Frames Tx: 0, EAPOL Rsp Frames Tx: 0  EAPOL Req Id Frames Rx: 0, EAPOL Len Err Frames Rx: 0  4Way Handshake Msg1 Rx: 0, 4Way Handshake Msg2 Tx: 0  4Way Handshake Msg3 Rx: 0, 4Way Handshake Msg4 Tx: 0  Group Key Msg1 Rx: 0, Group Key Msg2 Tx: 0  TKIP Local MIC Failures: 0, TKIP Rply Ctr Failures: 0  TKIP ICV Errors: 0, CCMP Rply Ctr Failures: 0  CCMP Decrypt Errors: 0, MIC Failure Reports Tx: 0  Last EAPOL Frame Ver: 0, EAPOL Start Frames Tx: 0 Rcv Errors:                1,   Tx Errors:               0Rcv PHY Errors:            1,   Excess Retries:          0Rcv CRC Errors:            0,   Total Retries:           0Rcv Duplicates:            0,   Tx Filtered:             0Rcv Discarded:             0,   Tx Discarded:            0Ack Rcv Fails:             0,   RTS Fails:               0Encryption:              Off,   FCS Fails:               0Rcv Decrypt Errs:          0,   WEP Excluded:            0[wport1]IxWLAN ->Example for get vsta all summary:[wport1]IxWLAN -> get vsta all summarySummary statistics for 5 vSTAs:
IxWLAN User Guide, Release 6.20 5-35The Command Line Interface (CLI)Virtual Station Setup and Control CommandsAuthentications:      6   Deauthentications:      3Associations:         6   Disassociations:        0Pre-Authentication: 2 attempts, 1 successful, 1 failedPMKSA cache: 2 entries BSSID PMKIDentry 0 00:12:d9:c4:1d:d0 0x62151d5ca3b2c4ea8545842f9a7adb6bentry 1 00:15:70:00:77:50 0x7dad3ec63036b7af087bd9c595035e50Signal Quality:    Min       Max       Avg  Rcv Strength       0        61        36  Ack Strength       0        60        35  Rcv Rate          54        54        54  Tx SF Rate        54        54        54  Tx LF Rate        54        54        54Rcv Frames:        Min       Max       Avg       Total  MSDUs              0        10         6          30  Data               0         0         0           0  Multicast          0         0         0           0  Management         0         6         4          18  Control            0         4         2          12  Error              0         0         0           0Tx Frames:         Min       Max       Avg       Total  MSDUs              0         4         2          12  Data               0         0         0           0  Multicast          0         0         0           0  Management         0         4         2          12  Control            0         0         0           0  Error              0         0         0           0  Tx Retries         0         0         0           0Rcv Errors:                0,   Tx Errors:               0Rcv PHY Errors:            0,   Excess Retries:          0Rcv CRC Errors:            0,   Total Retries:           0Rcv Duplicates:            3,   Tx Filtered:             0Rcv Discarded:             0,   Tx Discarded:            0Ack Rcv Fails:             0,   RTS Fails:               0Rcv Decrypt Errs:          0,   WEP Excluded:            0                                FCS Fails:          WPA statistics:          Min       Max       Avg       Total  Auth Okay                0         0         0           0  Auth Fail                0         0         0           0  EAPOL Rx                 0         0         0           0  EAPOL Tx                 0         0         0           0  EAPOL Key Rx             0         0         0           0  EAPOL Key Tx             0         0         0           0  EAPOL Req Rx             0         0         0           0  EAPOL Rsp Tx             0         0         0           0  EAPOL Req Id Rx          0         0         0           0  EAPOL Rsp Id Tx          0         0         0           0  EAPOL Start Tx           0         0         0           0  EAPOL Inv Rx             0         0         0           0  EAPOL Len Err Rx         0         0         0           0  4Way Msg1 Rx             0         0         0           0  4Way Msg2 Tx             0         0         0           0  4Way Msg3 Rx             0         0         0           0  4Way Msg4 Tx             0         0         0           0  Grp Key Msg1 Rx          0         0         0           0  Grp Key Msg2 Tx          0         0         0           0  TKIP Lcl Mic Fail        0         0         0           0
The Command Line Interface (CLI)Virtual Station Setup and Control Commands5-36 IxWLAN User Guide, Release 6.205  TKIP Rply Fail           0         0         0           0  TKIP ICV Err             0         0         0           0  CCMP Dcrpt Err           0         0         0           0  CCMP Rply Fail           0         0         0           0  MIC Fail Rpt Tx          0         0         0           0[wport1]IxWLAN ->      Example for get vsta all wport:[wport2]IxWLAN -> get vsta all wportvSTA 1 Wport: 2vSTA 2 Wport: 2vSTA 3 Wport: 1halt Starts an immediate halt of the load application currently being run by one or more virtual stations. The virtual station(s) must be configured, initialized, authenticated, associated, and running a load application. As long as the specified virtual station remains in the associated state, the load application may be re-started by issuing a run command. The following command executes a halt for one or all virtual stations. halt vsta <vStaId>:all<vStaId>: Virtual Station ID (1…128) or all. If <vStaId> is set to all (that is, halt vsta all), the halt command is sent to all virtual stations.The following command executes the halt for all virtual stations in a group.halt group <grpId><grpId>: Group ID (1…128)Example:[wport1]IxWLAN -> halt vsta 1[wport1]IxWLAN ->vSTA ID:1 halted OK[wport1]IxWLAN ->init Initialize one or more virtual stations. A virtual station must be configured before it can be initialized. See conf on page 5-24. The following command initializes one or all virtual stations. init vsta <vStaId>: all<vStaId>: Virtual Station ID (1…128) or all. If <vStaId> is set to all (that is, init vsta all), all virtual stations are initialized.The following command initializes all virtual stations in a specified group.
IxWLAN User Guide, Release 6.20 5-37The Command Line Interface (CLI)Virtual Station Setup and Control Commandsinit group <grpId><grpId>: Group ID (1…128)Example:[wport1]IxWLAN -> init vsta 1[wport1]IxWLAN -> OK[wport1]IxWLAN ->preauth Starts the 802.11i pre-authentication with the indicated BSSID. The vSTA’s authentication mode must be RSN and the vSTA must be in the Ready or Run-ning state with its current BSS. IxWLAN stores the PMKSA resulting from a successful Preauthentication completion in the corresponding vSTA PMKSA cache.The following command starts the 802.11i pre-authentication for one or for all virtual stations.preauth vsta <vStaId> <bssid><vStaId>: Virtual Station ID (1…128) or all. If <vStaId> is set to all (that is, init vsta all), all virtual stations are initialized.Example:[wport1]IxWLAN -> preauth vsta 1 00:0B:CD:59:23:44[wport1]IxWLAN -> OKvSTA ID:1 NOTIFY Preauth with remote AP succeeded - THU FEB 23 18:15:50 2006 The following command starts the 802.11i pre-authentication for all virtual stations within a specified group.preauth group <grpId> <bssid><grpId>: Group ID (1…128).releaseip Releases the specified virtual station’s DHCP IP address lease. Following suc-cessful completion of this command, the specified virtual station(s) transit(s) to the lowest state needed to initiate DHCP lease negotiations. The vSTA’s current IP address is set to zero. If the vSTA is operating in internal mode, it is removed from the ARP table.The following command releases the DHCP IP address lease for one or all virtual stations. releaseip vsta <vStaId><vStaId>: Virtual Station ID (1…128) or all. If <vStaId> is set to all (that is, releaseip vsta all), the DHCP IP address lease is released for all virtual stations.
The Command Line Interface (CLI)Virtual Station Setup and Control Commands5-38 IxWLAN User Guide, Release 6.205The following command releases the DHCP IP address lease for all virtual sta-tions in a specified group.releaseip group <grpId><grpId>: Group ID (1…128)Example:[wport1]IxWLAN -> releaseip vsta 1[wport1]IxWLAN -> 10.1.35.10 (10.1.35.10) deletedOKreset group Resets all virtual stations in a group to the Initialized state and clears all group statistics counters. reset group <grpId><grpId>: Group Number (1…128)Example:[wport1]IxWLAN -> reset group 15 vSTAs reset[wport1]IxWLAN -> reset vsta Resets virtual stations to the Initialized state and clears the virtual station's statis-tics counters. reset vsta <vStaId><vStaId>: Virtual Station ID (1…128) or all. If <vStaId> is set to all (that is, reset vsta all), this command resets all virtual stations.Example:[wport1]IxWLAN -> reset vsta 1[wport1]IxWLAN -> roam Starts a Roam of the specified vSTAs to the target AP indicated by its BSSID. The following command roams the identified vSTA(s) to the BSS. The Roam sequence includes a Probe Request for each vSTA unless the noprobe option is present. The Roam sequence includes the 802.11 authentication for each vSTA unless the noauth option is present.roam vsta|group <id>|all <newBssid> [noprobe] [noauth]<id>: the virtual station or group identifier
IxWLAN User Guide, Release 6.20 5-39The Command Line Interface (CLI)Virtual Station Setup and Control Commands<newBssid>: the BSSID to which the vSTA(s) are to roamExample for roam vsta all <newBssId> [noprobe] [noauth]:roam vsta all 00:06:2e:35:6b:1d noprobeExample for roam vsta <vStaId> <newBssid> [noprobe] [noauth]: roam vsta 6 00:06:2e:35:6b:1d noprobeExample for roam group <groupId> <newBssid> [noprobe] [noauth]: roam group 2 00:06:2e:35:6b:1d noproberun Starts running the load application for one or more virtual stations. The virtual station(s) must be configured, initialized, authenticated, and associated before issuing this command. After a run command has completed, it may be reissued/restarted as long as the virtual station remains in the associated state. The follow-ing command starts running the load application for one or all virtual stations.run vsta <vStaId><vStaId>: Virtual Station ID (1…128) or all. If <vStaId> is set to all (that is, run vsta all), the run command is sent to all virtual stations.The following command starts running the load application for all virtual stations in a specified group.run group <grpId><grpId> = Group ID (1…128) Example:[wport1]IxWLAN ->run vsta 1[wport1]IxWLAN ->vSTA ID:1 running OK[wport1]IxWLAN ->vSTA ID:1 NOTIFY Operation RUN completed.[wport1]IxWLAN ->save group(stats/summary) save group statsSaves statistics information in a file for all virtual stations in a specified group. Each virtual station in the group is saved to its own file. The file is stored in the /Statistics subdirectory and named Vsta#Stats.dat (where # is the virtual station ID).
The Command Line Interface (CLI)Virtual Station Setup and Control Commands5-40 IxWLAN User Guide, Release 6.205save group <grpId> stats<grpId>: Group ID (1…128) save group summarySaves cumulative summary statistics in a file for all virtual stations in one or all groups. Each group is saved to its own file. The file is stored in the /Statistics subdirectory and named Grp#Summ.dat (where # is the group ID). save group <grpId> summary<grpId>: Group ID (1…128) or all. If <grpId> is set to all (that is, save group all summary), summary statistics are saved for all virtual stations in all groups.save vsta(stats/summary) save vsta statsWrites all statistics for virtual stations to a file in the flash file system. The file is stored in the /Statistics subdirectory and named Vsta#Stats.dat (where # is the virtual station ID). save vsta <vStaId> stats<vStaId>: Virtual Station ID (1…128), all, or master. If <vStaId> is set to all (that is, save vsta all stats), statistics for all virtual stations are written to individ-ual files. If <vStaId> is set to master (that is, save vsta master stats), IxWLAN statistics information are written in the /Statistics/VstaMasterStats.dat file.Example:[wport1]IxWLAN -> save vsta 1 statsWrote vSTA 1 statistics to file[wport1]IxWLAN ->save vsta all summarySaves cumulative summary statistics for all virtual stations to the /Statistics/VstaAllSumm.dat file. save vsta all summaryExample:[wport1]IxWLAN -> save vsta all summaryWrote vSTA all summary to file[wport1]IxWLAN ->sendprobe Starts the probe operation for the specified vSTA or group. The only state restric-tions placed on a probe operation are:
IxWLAN User Guide, Release 6.20 5-41The Command Line Interface (CLI)Virtual Station Setup and Control Commands•The vSTA must be in Initialized state or higher•IxWLAN must be joined with an AP.sendprobe <vsta/group> <id>A given IxWLAN may have many SSIDs configured, a global SSID, and up to 128 per-vSTA SSIDs.The rules that determine which SSID is used when a specific vSTA probes, asso-ciates, and re-associates with an AP are:•If a vSTA’s SSID attribute is set, it is always used.•If a vSTA’s SSID attribute is not set and the AP beacons a hidden SSID, the SSID used is either the global IxWLAN SSID (if set) or the broadcast SSID.•If a vSTA’s SSID attribute is not set and the AP does not beacon a hidden SSID, the SSID contained within the AP’s beacon frame is used.•The global IxWLAN SSID is set by default to be string “IxWLAN Test Wire-less Network,” which is interpreted by the IxWLAN as not set.A probe request frame is constructed and transmitted for the specified vSTA or for each vSTA within the specified group. The SSID information element in the probe request is set by using the previously stated rules. The probe operation consists of probe transmission, waiting on a probe response, and retrying if no response is received within a timeout period.A NOTIFY message is generated upon completion of a probe operation. The sta-tus field indicates if a response was received or not.
The Command Line Interface (CLI)Virtual Station Setup and Control Commands5-42 IxWLAN User Guide, Release 6.205Example:sendprobe vsta 1vSTA ID:1 NOTIFY Operation PROBE succedded-sendprobe vsta 2vSTA ID:2 NOTIFY Operation PROBE failed-reason:No response from AP-set group Modifies configuration attributes for all virtual stations in a specified group. set group <grpId> <attribute> <value><grpId>: Group Number (1…128)<attribute>/<value>: The allowable <attribute>/<value> combinations are defined in Table 5-2.Table 5-2. Allowable Attributes<attribute> <value> Defaultauthentication open-system, shared-key, rsn, rsn-psk, wpa, or wpa-psk open-systemcertfile certificate file name string nonecipher wep, tkip, or aes-ccm wepcount 0…2,147,483,647 1000csmode persistent or non-persistent persistentdhcpmode on, off, or auto offdhcplease 300...-1 3600dhcpretry 0...5 4dhcpinterval 1...64 4dhcpoffers 1...3 1dhcpserver IP address of the server 0.0.0.0eapalgorithm tls, peap, or ttls tlsencryption on or off offfastradius enabled/disabled disabledfragmentthreshold 256…2346 2346gateway IP address of the gateway to be used by the vSTA(s) 0.0.0.0inneralgorithm ms-chapv2 or eap-ms-chapv2 ms-chapv2ipmask Subnet mask to be used by a vSTA 255.255.255.0keyindex 1, 2, 3, or 4 0 (not defined)kmTime-out 0…3600 s 0 (no timeout)
IxWLAN User Guide, Release 6.20 5-43The Command Line Interface (CLI)Virtual Station Setup and Control CommandsThe attributes are:•authentication: Sets the authentication mode (open-system, shared-key, rsn, rsn-psk, wpa, or wpa-psk) for all virtual stations in the specified group. •certfile: If authentication is rsn or wpa, this attribute defines a certificate file name for all virtual stations in the specified group.•cipher: Defines a cipher mode (wep, tkip, or aes-ccm) for all virtual stations in the specified group. If authentication is open-system or shared-key, wep is the only valid selection. •count: If mode is internal, this attribute sets the ping count (0…2,147,483,647).•csmode: When csmode is enabled (persistent), virtual stations in this group remain persistent (connected) if the System Under Test deauthenticates or disassociates. If IxWLAN loses connection to a System Under Test, persis-tence allows it to recover and continue the test at the point where it was inter-rupted. For example, if a virtual station is in a run or associated state and an 802.11 management frame (deauth or disassoc) is sent by the System Under Test and received by IxWLAN, the virtual station tries to return to the state it was in before the management frame was received. If the virtual station was layer 2 or 3 3lp ping pingmode external or internal internalouteridentity up to 64 ASCII characters none (displayed as “Not Set”)passphrase up to 63 ASCII characters none (displayed as “Not Set”)password up to 64 ASCII characters none (displayed as “Not Set”)pmkcache on/off onpsk 64 ASCII-hex characters none (displayed as “Not Set”)retry 0…2,147,483,647 2roamtype disassociation/ reassociation reassociationrtsthreshold 1…2346 2346size 64…1024 1024ssid text string or hexadecimal string (not set)target An IP address in ASCII Dotted Decimal Notation: nnn.nnn.nnn.nnn (for example, 10.1.35.100).nonetimeout 0…2,147,483,647 300userid user ID string nonewport 1...3 1<attribute> <value> Default
The Command Line Interface (CLI)Virtual Station Setup and Control Commands5-44 IxWLAN User Guide, Release 6.205running a ping test, the ping test continues. If it was in an associated state, the virtual station reissues the associate request.•dhcpmode: The DHCP mode allows virtual stations to have IP addresses dynamically acquired from a DHCP server on the network rather than a fixed, configured IP address. If dhcpmode is off, DHCP mode is not active and vir-tual stations must have a static IP address. If dhcpmode is on, the acquireip command must be used to initiate lease negotiation. If dhcpmode is auto, IxWLAN automatically starts lease negotiation if association succeeds. The default value is off.•dhcplease: Sets the dhcpLease attribute of the specified vSTA, all vSTAs, or all vSTAs within the specified group to the given value, specifying the lease time a vSTA requests.•dhcpretry: Sets the dhcpRetry attribute of the specified vSTA, all vSTAs, or all vSTAs within the specified group to the given value, specifying the num-ber of times a vSTA retries a DHCP operation (discover, request) before tim-ing out.•dhcpinterval: Sets the dhcpInterval attribute of the specified vSTA, all vSTAs, or all vSTAs within the specified group to the given value, specifying the interval between retries.•dhcpoffers: Sets the dhcpOffer attribute of the specified vSTA, all vSTAs, or all vSTAs within the specified group to the given value, specifying the num-ber of offers to ignore before generating a request.•dhcpserver: Sets the dhcpServer attribute of the specified vSTA, all vSTAs, or all vSTAs within the specified group to the given value, specifying the DHCP server from which a vSTA is to accept offers.•eapalgorithm: If authentication is rsn or wpa, this parameter specifies the authentication protocol: tls, peap, or ttls.•encryption: Sets the encryption mode (on or off) for all virtual stations in the specified group.•fastradius: Sets the vSTA’s fast RADIUS reconnection mode: enabled or dis-abled.•fragmentthreshold: Defines the fragmentation threshold for the virtual sta-tion(s) configured by this command. The fragmentation threshold limits the number of bytes in any 802.11 frame transmitted by the vSTA. If <value> is set to 2346 (that is, the maximum 802.11 frame size), fragmentation is effec-tively disabled. The default value is 2346.•gateway: Sets the gateway attribute of the specified vSTA or all vSTAs within the specified group to the given value, specifying the IP address of the gate-way to be used by the vSTA(s).•inneralgorithm: If eapalgorithm is peap or ttls, this parameter specifies an inner authentication algorithm (ms-chapv2 or eap-ms-chapv2) to be used in Phase 2 authentication. ms-chapv2 is normally used for ttls. eap-ms-chapv2 is normally used for peap.•ipmask: Sets the ipmask attribute of the specified vSTA or all vSTAs within the specified group to the given value, specifying the subnet mask to be used by a vSTA.
IxWLAN User Guide, Release 6.20 5-45The Command Line Interface (CLI)Virtual Station Setup and Control Commands•keyindex: If authentication is shared-key, this attribute assigns a shared key index number (1…4) to all virtual stations in the specified group. The shared keys are defined by the set key command.•kmTimeout: AKMP Timeout sets a wait state timer for virtual stations in the specified group. In situations where the System Under Test does not start or respond during a 4-way handshake, the affected virtual station may stall in a wait state. This timer can be used to recover the virtual station into an opera-ble state. If the virtual station remains in a wait state until this timer expires, it is 802.11 de-authenticated and returned to the initialized state.•layer: If mode is external, this attribute specifies how the external data stream is captured. If layer is 2, frames is captured based on the source 802.3 MAC address. If layer is 3, frames is captured based on the source IP address. The default value is 3.•lp: If mode is internal, this attribute defines the Load Protocol (ping).•mode: Defines the test mode (internal or external) for all virtual stations in the specified group.•outeridentity: If eapalgorithm is peap or ttls, this parameter assigns a sepa-rate user ID for use in Phase 1 authentication. It can be up to 64 characters in the range A…Z, a…z, 0…9, or other legal characters: period (.), dash (-), at-sign (@).•passphrase: If authentication is rsn-psk or wpa-psk, this attribute defines a passphrase of up to 63 ASCII characters. If the passphrase contains spaces, the passphrase must be specified in double-quotes “like so”. To specify a passphrase that contains a double-quote, you must escape the double-quote “like \” so”. •password: If eapalgorithm is peap or ttls, this parameter assigns a user pass-word for use in Phase 2 authentication. It can be up to 64 characters.•pmkcache: When enabled (on), vSTA uses cached PMKSA info, if any, to skip up 802.1X authentication and proceed to 4-Way handshake immediately after the 802.11 association frame exchange. Upon (re)associating to a given APUT, if PMKSA caching is enabled and there is a matching PMKID in the vsta PMKSA cache, IxWLAN inserts the PMKID in the RSN Information Element included in (re)association request frame. Default is on.•psk: If authentication is rsn-psk or wpa-psk, this attribute defines a Pre-Shared Key (64 ASCII-hex characters) for all virtual stations in this group. •retry: Defines the group’s Authentication/Association retry limit (zero = no retries).•roamtype: Selects the Disassociation Roam or Reassociation Roam type.When set to disassociation, the default message sequence upon a roam event is achieved by disassociation from the old AP and subsequent authenti-cation and association with the new AP; when set to reassociation, the default roam sequence is Auth (new AP), Reassociate (new AP), with no dis-association from the old AP. The default is reassociation.•rtsthreshold: Defines the RTS threshold for the virtual station(s) configured by this command. Any frame to be transmitted by a vSTA that exceeds the vSTA’s RTS threshold needs a successful RTS/CTS frame exchange before
The Command Line Interface (CLI)Virtual Station Setup and Control Commands5-46 IxWLAN User Guide, Release 6.205the frame is transmitted. The minimum value (1) effectively needs RTS/CTS for all transmit frames. The maximum value (2346) is the maximum 802.11 frame size and effectively disables RTS. The default value is 2346.•size: If mode is internal, this attribute defines the Ping Packet Size (64…1024).•ssid: Defines the SSID to be used in probes and association.•target: If mode is internal, this attribute defines the target IP address.•timeout: Defines the Authentication/Association timeout in ms(0=immediate timeout).•userid: If authentication is rsn or wpa, this attribute defines a user ID string that is needed for a certificate file (certfile) for all virtual stations in the spec-ified group. It can be up to 64 characters in the range A…Z, a…z, 0…9, or other legal characters: period (.), dash (-), at-sign (@).•wport: Assigns the identified vSTA(s) to the specified wport. Values range between 1 and 3, depending on the number of wports present. The default value is 1.Example:[wport2]IxWLAN -> set group 1 size 645 vSTAs updatedOK[wport2]IxWLAN -> set group 2 wport 1OKset vsta Modifies virtual station attributes. set vsta <vStaId> <attribute> <value><vStaId>: Virtual Station ID (1…128). If <attribute> is anything other than ip or mac, the <vStaId> can be all to apply the configuration attribute to all virtual sta-tions.<attribute>/<value>: The allowable <attribute>/<value> combinations are defined in Table 5-3.Table 5-3. Allowable Attributes<attribute> <value> Defaultauthentication open-system, shared-key, rsn, rsn-psk, wpa, or wpa-psk open-systemcertfile certificate file name string nonecipher wep, tkip, or aes-ccm wepcount 0…2,147,483,647 1000csmode persistent or non-persistent persistent
IxWLAN User Guide, Release 6.20 5-47The Command Line Interface (CLI)Virtual Station Setup and Control Commandsdhcpmode on, off, or auto offdhcplease 300...-1 3600dhcpretry 0...5 4dhcpinterval 1...64 4dhcpoffers 1...3 1dhcpserver IP address of the server 0.0.0.0eapalgorithm tls, peap, or ttls tlsencryption on or off offfastradius enabled, disabled disabledfragmentthreshold 256…2346 2346gateway IP address of the gateway to be used by the vSTA, in ASCII Dotted Decimal Notation: nnn.nnn.nnn.nnn 0.0.0.0group 1…128 1inneralgorithm ms-chapv2 or eap-ms-chapv2 ms-chapv2ip  IP address in ASCII Dotted Decimal Notation: nnn.nnn.nnn.nnn (for example, 10.1.35.100)noneipmask Subnet mask to be used by a vSTA 255.255.255.0keyindex 1, 2, 3, or 4 0 (not defined)kmTimeout 0…3600 seconds 0 (no timeout)layer 2 or 3 3lp ping pingmac MAC address in ASCII Colon Separated Hexadecimal Notation: xx:xx:xx:xx:xx:xx (for example, 02:cf:1f:00:00:01)nonemode external or internal internalouteridentity up to 64 ASCII characters none (displayed as “Not Set”)passphrase up to 63 ASCII characters none (displayed as “Not Set”)password up to 64 ASCII characters none (displayed as “Not Set”)pmkcache enabled, disabled enabledpsk 64 ASCII-hex characters none (displayed as “Not Set”)retry 0…2,147,483,647 2roamtype reassociation, disassociation reassociationrtsthreshold 1…2346 2346size 64…1024 1024<attribute> <value> Default
The Command Line Interface (CLI)Virtual Station Setup and Control Commands5-48 IxWLAN User Guide, Release 6.205The attributes are:•authentication: Sets the authentication mode for virtual station(s) configured by this command. It can be one of the following: open-system, shared-key, rsn, rsn-psk, wpa, or wpa-psk. •certfile: If authentication is wpa or rsn, this attribute defines a certificate file name for virtual station(s) configured by this command.•cipher: Sets the cipher mode (wep, tkip, or aes-ccm) for virtual station(s) configured by this command. If authentication is open-system or shared-key, wep is the only valid selection. •count: If mode is internal, this attribute sets the ping count (0…2,147,483,647)•csmode: When csmode is enabled (persistent), virtual stations remain persis-tent (connected) if the System Under Test deauthenticates or disassociates. If IxWLAN loses connection to a System Under Test, persistence allows it to recover and continue the test at the point where it was interrupted. For exam-ple, if a virtual station is in a run or associated state and an 802.11 manage-ment frame (deauth or disassoc) is sent by the System Under Test and received by IxWLAN, the virtual station tries to return to the state it was in before the management frame was received. If the virtual station was running a ping test, the ping test continues. If it was in an associated state, the virtual station reissues the associate request.•dhcpmode: The DHCP mode allows virtual stations to have IP addresses dynamically acquired from a DHCP server on the network rather than a fixed, configured IP address. If dhcpmode is off, DHCP mode is not active and vir-tual stations must have a static IP address. If dhcpmode is on, the acquireip command must be used to initiate lease negotiation. If dhcpmode is auto, IxWLAN automatically starts lease negotiation if association succeeds. The default value is off.•dhcplease: Sets the dhcpLease attribute of the specified vSTA to the given value, specifying the lease time a vSTA requests.•dhcpretry: Sets the dhcpRetry attribute of the specified vSTA to the given value, specifying the number of times a vSTA retries a DHCP operation (dis-cover, request) before timing out.•dhcpinterval: Sets the dhcpInterval attribute of the specified vSTA to the given value, specifying the interval between retries.ssid text string or hexadecimal string (not set)target an IP address in ASCII Dotted Decimal Notation: nnn.nnn.nnn.nnn (for example, 10.1.35.100).nonetimeout 0…2,147,483,647 300userid user ID string nonewport 1...3 1<attribute> <value> Default
IxWLAN User Guide, Release 6.20 5-49The Command Line Interface (CLI)Virtual Station Setup and Control Commands•dhcpoffers: Sets the dhcpOffer attribute of the specified vSTA to the given value, specifying the number of offers to ignore before generating a request.•dhcpserver: Sets the dhcpServer attribute of the specified vSTA to the given value, specifying the DHCP server from which a vSTA is to accept offers.•eapalgorithm: If authentication is rsn or wpa, this parameter specifies the authentication protocol: tls, peap, or ttls.•encryption: Sets the encryption mode (on or off) for virtual station(s) config-ured by this command.•fastradius: Sets the vSTA’s fast RADIUS reconnection mode: enabled or dis-abled.•fragmentthreshold: Defines the fragmentation threshold for the virtual sta-tion(s) configured by this command. The fragmentation threshold limits the number of bytes in any 802.11 frame transmitted by the vSTA. If <value> is set to 2346 (that is, the maximum 802.11 frame size), fragmentation is effec-tively disabled. The default value is 2346.•group: The value of this attribute assigns one or more virtual stations to a group (1…128).•gateway: Sets the gateway attribute of the specified vSTA to the given value, specifying the IP address of the gateway to be used by the vSTA.•inneralgorithm: If eapalgorithm is peap or ttls, this parameter specifies an inner authentication algorithm (ms-chapv2 or eap-ms-chapv2) to be used in Phase 2 authentication. ms-chapv2 is normally used for ttls. eap-ms-chapv2 is normally used for peap.•ip: Assigns an IP address to an individual virtual station.•ipmask: Sets the ipmask attribute of the specified vSTA to the given value, specifying the subnet mask to be used by a vSTA.•keyindex: If authentication is shared-key, this attribute assigns a shared key index number (1…4) to virtual station(s) configured by this command. The shared keys are defined by the set key command.•kmTimeout: AKMP Timeout Sets a wait state timer for virtual station(s) con-figured by this command. In situations where the System Under Test does not initiate or respond during a 4-way handshake, the affected virtual station may stall in a wait state. This timer can be used to recover the virtual station into an operable state. If the virtual station remains in a wait state until this timer expires, it is 802.11 de-authenticated and returned to the initialized state.•layer: If mode is external, this attribute specifies how the external data stream is captured. If layer is 2, frames are captured based on the source 802.3 MAC address. If layer is 3, are be captured based on the source IP address. The default value is 3.•lp: If mode is internal, this attribute defines the Load Protocol (ping).•mac: Assigns an MAC address to an individual virtual station.•mode: Defines the test mode (internal or external) for virtual station(s) con-figured by this command.
The Command Line Interface (CLI)Virtual Station Setup and Control Commands5-50 IxWLAN User Guide, Release 6.205•outeridentity: If eapalgorithm is peap or ttls, this parameter assigns a sepa-rate user ID for use in Phase 1 authentication. It can be up to 64 characters in the range A…Z, a…z, 0…9, or other legal characters: period (.), dash (-), at-sign (@).•passphrase: If authentication is rsn-psk or wpa-psk, this attribute defines a passphrase of up to 63 ASCII characters. If the passphrase contains spaces, the passphrase must be specified in double-quotes “like so”. To specify a passphrase that contains a double-quote, you must escape the double-quote “like \” so”. •password: If eapalgorithm is peap or ttls, this parameter assigns a user pass-word for use Phase 2 authentication. It can be up to 64 characters.•pmkcache: When enabled (on), vSTA uses cached PMKSA info, if any, to skip up 802.1X authentication and proceed to 4-Way handshake immediately after the 802.11 association frame exchange. Upon (re)associating to a given APUT, if PMKSA caching is enabled and there is a matching PMKID in the vSTA PMKSA cache, IxWLAN inserts the PMKID in the RSN Information Element included in (re)association request frame. Default is on.•psk: If authentication is rsn-psk or wpa-psk, this attribute defines a Pre-Shared Key (64 ASCII-hex characters) for all virtual station(s) configured by this command. •retry: Defines the Authentication/Association retry limit (zero = no retries).•roamtype: Selects the Disassociation Roam or Reassociation Roam type.When set to disassociation, the default message sequence upon a roam event is achieved by disassociation from the old AP and subsequent authenti-cation and association with the new AP; when set to reassociation, the default roam sequence is Auth (new AP), Reassociate (new AP), with no dis-association from the old AP. The default is reassociation.•rtsthreshold: Defines the RTS threshold for the virtual station(s) configured by this command. Any frame to be transmitted by a vSTA that exceeds the vSTA’s RTS threshold needs a successful RTS/CTS frame exchange before the frame is transmitted. The minimum value (1) effectively needs RTS/CTS for all transmit frames. The maximum value (2346) is the maximum 802.11 frame size and effectively disables RTS. The default value is 2346.•size: If mode is internal, this attribute defines the Ping Packet Size (64…1024).•ssid: Defines the SSID to be used in probes and association.•target: If mode is internal, this attribute defines the target IP address.•timeout: Defines the Authentication/Association timeout in ms (0=immediate timeout).•userid: For RSN or WPA authentication and a certificate file (certfile), this attribute defines a user ID string that is needed for the certificate file. It can be up to 64 characters in the range A…Z, a…z, 0…9, or other legal characters: period (.), dash (-), at-sign (@).•wport: Assigns the identified vSTA(s) to the specified wport. Values range between 1 and 3, depending on the number of wports present. The default value is 1.
IxWLAN User Guide, Release 6.20 5-51The Command Line Interface (CLI)Statistics File CommandsExample:[wport1]IxWLAN -> set vsta 1 count 100[wport1]IxWLAN -> OK[wport1]IxWLAN -> set vsta 1 csmode persistent[wport1]IxWLAN -> OK[wport1]IxWLAN -> set vsta 1 csmode non-persistent[wport1]IxWLAN -> OK[wport1]IxWLAN -> set vsta 1 dhcpmode auto[wport1]IxWLAN -> OK[wport1]IxWLAN -> set vsta 1 fragmentthreshold 1000[wport1]IxWLAN -> OK[wport1]IxWLAN -> set vsta 1 rtsthreshold 1000[wport1]IxWLAN -> OKStatistics File CommandsThe following commands allow you to show and delete statistics files:del statfile -- Delete a vSTA statistics filedel summfile -- Delete a vSTA statistics summary fileget statfile -- Display vSTA statistics from fileget summfile -- Display vSTA statistics summary from fileSee Chapter 7, Statistics Counters for a description of the fields that may be dis-played by any of the commands in this group that show statistics counters. Also see the group and vsta commands under Virtual Station Setup and Control Commands on page 5-14 for commands that display, clear, and save statistics counters for a group or one or more virtual stations.This section covers the following topics: •Delete Statistics File on page 5-51.•Get/Display Statistics File on page 5-52.Delete Statistics File del statfile groupDeletes the statistic file for all virtual stations in a specified group.del statfile group <grpId><grpId>: Group ID (1…128)del statfile vstaDeletes the statistic file for one or more virtual stations.del statfile vsta <vStaId>
The Command Line Interface (CLI)Statistics File Commands5-52 IxWLAN User Guide, Release 6.205<vStaId>: Virtual Station ID (1…128), all, or master. If <vStaId> is set to all (that is, del statfile vsta all), this command deletes the statistics file for all virtual stations. If <vStaId> is set to master (that is, del statfile vsta master), this com-mand deletes the statistics file for IxWLAN.Example:[wport1]IxWLAN -> del statfile vsta 1Deleted vSta 1 statistics file[wport1]IxWLAN ->del summfile groupDeletes the group summary statistics file for one or all groups. del summfile group <grpId><grpId>: Group ID (1…128) or all. If <grpId> is set to all (that is., get group all summfile), group summary statistics are deleted for all groups.del summfile vsta allDeletes the overall summary statistics file for all virtual stations. del summfile vsta allGet/Display Statistics File get statfile groupRetrieves and shows a statistics file for all virtual stations in a specified group.get statfile group <grpId><grpId>: Group ID (1…128)get statfile vstaRetrieves and shows a statistics file for one or more virtual stations. get statfile vsta <vStaId><vStaId>: Virtual Station ID (1…128), all, or master. If <vStaId> is set to all (that is, get statfile vsta all), this command shows the statistics file for all virtual stations. If <vStaId> is set to master (that is, get statfile vsta master), this com-mand shows the statistics file for IxWLAN.
IxWLAN User Guide, Release 6.20 5-53The Command Line Interface (CLI)Event Log Commandsget summfile groupShows cumulative statistics from a summary statistics file for all virtual stations in one or all groups. get summfile group <grpId><grpId>: Group ID (1…128) or all. If <grpId> is set to all (that is, get summfile group all), group summary statistics are shown for all groups.get summfile vsta allShows cumulative statistics from a summary statistics file for all virtual stations.get summfile vsta allEvent Log CommandsThese commands can be used to clear the event log, show the event log, set event log controls, and save the event log in a file.clear evlog -- Clear event log file or bufferget evlog   -- Display event log datasave evlog  -- Save the event log buffer to fileset evlog   -- Set event log controlsAlso see Appendix B, Event Logging, for more information about how IxWLAN creates and maintains the event log.This section covers the following topics: •Clear Event Log on page 5-53.•Get/Display Event Log on page 5-54.•Save Event Log (save evlog) on page 5-56.•Set Event Log Controls on page 5-56.Clear Event Log clear evlog bufferClears IxWLAN's event log buffer.clear evlog bufferExample:[wport1]IxWLAN -> clear evlog buffer
The Command Line Interface (CLI)Event Log Commands5-54 IxWLAN User Guide, Release 6.205clear evlog fileClears a log file.clear evlog file <fileAorB><fileAorB>: A or BExample:[wport1]IxWLAN -> clear evlog file A[wport1]IxWLAN ->Get/Display Event Log get evlog bufferShows event log data from the event log buffer.get evlog buffer <n><n>: the number of records to show. The CLI shows the last <n> number of records in the buffer. Omit this parameter to view all records in the buffer.Example:[wport1]IxWLAN -> get evlog buffer1/17/2003,10:25:14,5527.040462,0, Joined, BSSID 00:04:e2:38:52:18, chan 52801/17/2003,10:27:19,5651.922666,1, vSta conf ID 1, IP 10.1.35.231, mac 02:22:33:44:55:61, mode external1/17/2003,10:27:19,5652.172465,2, vSta conf ID 2, IP 10.1.35.232, mac 02:22:33:44:55:62, mode external1/17/2003,10:27:20,5652.672575,3, vSta init ID 11/17/2003,10:27:20,5652.922582,4, vSta init ID 21/17/2003,10:27:21,5653.839116,5, vSta auth ID 11/17/2003,10:27:22,5654.339023,6, vSta auth ID 21/17/2003,10:27:23,5655.339004,7, vSta assoc ID 11/17/2003,10:27:23,5655.839090,8, vSta assoc ID 2[wport1]IxWLAN ->
IxWLAN User Guide, Release 6.20 5-55The Command Line Interface (CLI)Event Log Commandsset evlog fileShows event log data from an event log file.get evlog file <fileAorB> [<startRec#> [<count>]]get evlog file <fileAorB> ?<fileAorB>: A or B<startRec#>: The first record to be shown. Omit this parameter to start with the first record in the file.<count>: The number of records to be shown. Omit this parameter to show all remaining records in the file. This parameter can only be used if <startRec#> is specified.Use? to show the number of records in the file.Example:[wport1]IxWLAN -> get evlog file A ?Log file A has 15 records[wport1]IxWLAN -> get evlog file A1/1/1970,0:00:37,30.963149,0, CLI: set date 5/5/2003 15:215/5/2003,15:21:03,34.229892,1, CLI: (null)5/5/2003,15:21:21,52.663185,2, CLI: autoconf 5 ip 10.1.35.150 mac 00:0b:cd:59:00:011 mode external5/5/2003,15:21:23,54.646520,3, CLI: join5/5/2003,15:21:23,61.952464,4, Joined, BSSID 00:04:e2:3a:3c:32, chan 51805/5/2003,15:21:45,83.939091,5, CLI: autoconf 2 ip 10.1.35.150 mac 00:0b:cd:59:00:02 mode external5/5/2003,15:21:45,83.939443,6, vSTA 1: configured, IP 10.1.35.150, mac 00:0b:cd:59:00:03, mode external5/5/2003,15:21:45,84.189298,7, vSTA 2: configured, IP 10.1.35.151, mac 04:cf:1f:00:00:02, mode external5/5/2003,15:21:46,84.439303,8, vSTA 1: initialized5/5/2003,15:21:46,84.689242,9, vSTA 2: initialized5/5/2003,15:21:46,85.022468,10, vSTA 1: authenticated5/5/2003,15:21:47,85.272568,11, vSTA 2: authenticated5/5/2003,15:21:47,85.522474,12, vSTA 1: associated5/5/2003,15:21:47,85.772538,13, vSTA 2: associated5/5/2003,15:21:53,91.422499,22, CLI: save evlog[wport1]IxWLAN ->get evlog settingsShows the current event log control settings.get evlog settingsExample:[wport2]IxWLAN -> get ev set Event logging is enabled
The Command Line Interface (CLI)Event Log Commands5-56 IxWLAN User Guide, Release 6.205   Event log verbosity  : critical events only           WLANTX module: disabled           WLANRX module: disabled           IxWLAN module: enabled             VSTA module: enabled               UI module: enabled          WPA/RSN module: enabled             DHCP module: disabled   Event data to console: disabled  Event data to file   : disabled[wport2]IxWLAN ->If Event data to console shows enabled, this command also shows whether log-ging to console is enabled to this or another CLI console.Example:Event data to console: enabled to this CLI consoleorEvent data to console: enabled to another CLI consoleSave Event Log (save evlog)Flushes all records from the log buffer to the current log file, even if log to file is not enabled. save evlogSet Event Log Controls set evlogEnables/disables event logging.set evlog <mode><mode>: enable/disableExample:[wport1]IxWLAN -> set evlog enable[wport1]IxWLAN ->set evlog consoleEnables/disables event logging to the console. NOTE: When logging to file is enabled (that is, set evlog file enable), event records are automatically written to the log file as they occur. The save evlog command is intended for use when log to file is not enabled, but there are significant events in the event log buffer that you want to save to file.
IxWLAN User Guide, Release 6.20 5-57The Command Line Interface (CLI)Event Log Commandsset evlog console <mode><mode>: enable/disableWhen set evlog console enable is entered at a CLI console (that is, connected to the serial port or via a telnet session), event data is posted to that console only. No more than one console receives event data at a given time. When set evlog console disable is entered at a CLI console, event logging is disabled to all con-soles.Example:[wport1]IxWLAN -> set evlog console enableEvent data to this CLI console is enabled[wport1]IxWLAN ->set evlog fileEnables/disables event logging to event log files. set evlog file <mode><mode>: enable/disableExample:[wport1]IxWLAN -> set evlog file enable[wport1]IxWLAN ->set evlog levelSets the level at which events are logged. The verbosity level sets an importance threshold for events: at lower verbosity, only more important events are logged; at higher verbosity, less important events may also be logged.set evlog level <level><level>: 0 or critical = Log critical events only, 1 or low = Set log level to low verbosity, 2 or medium = Set log level to medium verbosity, 3 or high = Set log level to high verbosity. Example:[wport1]IxWLAN -> set evlog level 1[wport1]IxWLAN ->set evlog moduleEnables/disables event logging for specific modules.set evlog module <module_name> <mode>
The Command Line Interface (CLI)IxWLAN Commands5-58 IxWLAN User Guide, Release 6.205<module_name>: WLANTX = 802.11 WLAN frame transmissions, WLANRX = 802.11 WLAN frame receptions, IxWLAN = IxWLAN control, vSTA = Vir-tual station control, UI = User interface actions, WPA = WPA/RSN Events. <mode>: enable/disableExample:[wport1]IxWLAN -> set evlog module IxWLAN enable[wport1]IxWLAN ->IxWLAN CommandsThe commands in this group allow to show and modify the IxWLAN configura-tion. clear sntpserver          -- Clear SNTP/NTP server IP addressclear systemname          -- Clear the IxWLAN system namecryptotest                -- Crypto hardware self-testdel key                   -- Delete Encryption keyexec                      -- Execute a command fileftp                       -- Software update via FTPget association           -- Display Association Tableget bkjoin                -- Display Background Joinget bootscan              -- Display Boot Scan Modeget channel               -- Display Radio Channelget config                -- Display current IxWLAN configurationget countrycode           -- Display Country Codeget cryptocap             -- Display crypto hardware capabilitiesget features              -- Display authorized featuresget frequency             -- Display Radio Frequency (MHz)get gateway               -- Display Gateway IP Addressget hardware              -- Display Hardware Revisionsget ipaddr                -- Display IP Addressget ipmask                -- Display IP Subnet Maskget key                   -- Display Encryption Keyget keyentrymethod        -- Display Encryption Key Entry Methodget login                 -- Display Login User Nameget mic                   -- Display Software MIC Controlget multiradiomode        -- Display multi-radio modeget pmmode                -- Display Power Management Modeget power                 -- Display Transmit Power Settingget psinterval            -- Display Power Save Listen Intervalget rate                  -- Display Data Rateget sntpserver            -- Display SNTP/NTP Server IP Addressget station               -- Display Station Statusget status                -- Display IxWLAN statusget systemname            -- Display the IxWLAN system nameget telnet                -- Display Telnet Modeget tzone                 -- Display Time Zone Settingget uptime                -- Display UpTimeget vsta                  -- Display vSTA informationget wirelessmode          -- Display Wireless LAN Modeget wlanmac               -- Display Wireless LAN MAC Address
IxWLAN User Guide, Release 6.20 5-59The Command Line Interface (CLI)IxWLAN Commandsget wlanmask              -- Display Wireless LAN Address Maskget wport                 -- Display wport informationhelp                      -- Display CLI Command Listhistory                   -- Display the command line historyimport                    -- Import PKCS#12 certfile via FTPping                      -- Pingquit                      -- Logoffreboot                    -- Reboot the IxWLANreset wlanmac             -- Reset the WLAN MAC address to default valueset bkjoin                -- Set Background Joinset bootscan              -- Set Bootscan modeset countrycode           -- Set Country Codeset date                  -- Set the system dateset factorydefault        -- Restore to Default Factory Settingsset features              -- Upgrade current feature setset gateway               -- Set Gateway IP Addressset ipaddr                -- Set IP Addressset ipmask                -- Set IP Subnet Maskset key                   -- Set Encryption Keyset keyentrymethod        -- Select Encryption Key Entry Methodset login                 -- Modify Login User Nameset mic                   -- Set Software MIC Controlset multiradiomode        -- Set multi-radio modeset password              -- Modify Passwordset pmmode                -- Set Power Management Modeset power                 -- Set Transmit Powerset psinterval            -- Set Power Save Listen Intervalset rate                  -- Set Data Rateset sntpserver            -- Set SNTP/NTP Server IP Addressset systemname            -- Set the IxWLAN system nameset telnet                -- Set Telnet Modeset time                  -- Set the system timeset tzone                 -- Set Time Zone Settingset wirelessmode          -- Set Wireless LAN Modeset wlanmac               -- Set WLAN MAC Addressset wlanmask              -- Set WLAN Address Maskset wport                 -- Set wport for configurationtimeofday                 -- Display Current Time of Dayversion                   -- Software versionversion                             --  Software versionWarning: When IxWLAN configuration settings are changed using many of these commands, the device writes all settings to a new configuration file in Flash. This process is delayed to allow multiple parameters to be changed. The new file is written within one minute from the time the first parameter is changed. The CLI shows the following warning and confirmation:**** DO NOT REMOVE POWER FROM THE IxWLAN HARDWARE!** Wait for the IxWLAN to update the configuration file in ** Flash or use the "reboot" command for immediate ** update & reboot.** Automatic update will be done within one minute.**...Configuration file update completed.
The Command Line Interface (CLI)IxWLAN Commands5-60 IxWLAN User Guide, Release 6.205This section describes the following commands:•clear sntpserver on page 5-62.•clear systemname on page 5-62.•cryptotest on page 5-62.•del key on page 5-63.•exec on page 5-63.•ftp on page 5-64.•get association on page 5-65.•get bkjoin on page 5-65.•get bootscan on page 5-65.•get channel on page 5-66.•get config on page 5-66.•get countrycode on page 5-68.•get cryptocap on page 5-68.•get features on page 5-69.•get frequency on page 5-69.•get gateway on page 5-69.•get hardware on page 5-69.•get ipaddr on page 5-70.•get ipmask on page 5-70.•get key on page 5-70.•get keyentrymethod on page 5-70.•get login on page 5-70.•get mic on page 5-71.•get multiradiomode on page 5-71.•get pmmode on page 5-71.•get power on page 5-71.•get psinterval on page 5-71.•get rate on page 5-72.•get sntpserver on page 5-72.•get station on page 5-72.•get status on page 5-72.•get systemname on page 5-73.•get telnet on page 5-73.•get tzone on page 5-73.
IxWLAN User Guide, Release 6.20 5-61The Command Line Interface (CLI)IxWLAN Commands•get uptime on page 5-73.•get wirelessmode on page 5-73.•get wlanmac on page 5-73.•get wlanmask on page 5-74.•get wport on page 5-74.•help on page 5-75.•history on page 5-75.•import on page 5-75.•ping on page 5-76.•quit on page 5-77.•reboot on page 5-77.•reset wlanmac on page 5-77.•set bkjoin on page 5-77.•set bootscan on page 5-77.•set countrycode on page 5-78.•set date on page 5-78.•set factorydefault on page 5-79.•set features on page 5-79.•set gateway on page 5-79.•set ipaddr on page 5-80.•set ipmask on page 5-80.•set key on page 5-80.•set keyentrymethod on page 5-80.•set login on page 5-80.•set mic on page 5-81.•set multiradiomode on page 5-81.•set password on page 5-81.•set pmmode on page 5-81.•set power on page 5-82.•set psinterval on page 5-83.•set rate on page 5-83.•set sntpserver on page 5-84.•set systemname on page 5-84.•set telnet on page 5-84.•set time on page 5-84.
The Command Line Interface (CLI)IxWLAN Commands5-62 IxWLAN User Guide, Release 6.205•set tzone on page 5-85.•set wirelessmode on page 5-85.•set wlanmac on page 5-85.•set wlanmask on page 5-85.•set wport on page 5-85.•timeofday on page 5-86.•version on page 5-86.clear sntpserver Clears the IP Address of the SNTP server.clear sntpserverclear systemname Clears the IxWLAN system name.clear systemnamecryptotest Starts a self-test of the crypto hardware. It indicates past cumulative results for each test type and results for the current run. cryptotestExample:[wport1]IxWLAN -> cryptotestRunning crypto hardware self-test......Crypto hardware self-test PASSED!  Details:       Test Name   History   Current Test       ---------   -------   ------------         Raw RC4 :      OK   Passed      40-bit WEP :      OK   Passed            TKIP :      OK   Passed         Raw AES :      OK   Passed         AES-CCM :      OK   Passed            3DES :      OK   Passed             MD5 :      OK   Passed        HMAC_MD5 :      OK   Passed           SHA-1 :      OK   Passed      HMAC_SHA-1 :      OK   Passed          ModExp :      OK   Passed             RSA :      OK   Passed             RNG :      OK   PassedIf any faults were detected in the current self-test, this command shows the fail-ure condition.Example:...Crypto hardware self-test FAILED!  Details:       Test Name   History   Current Test
IxWLAN User Guide, Release 6.20 5-63The Command Line Interface (CLI)IxWLAN Commands       ---------   -------   ------------         Raw RC4 :      OK   Passed      40-bit WEP * Faulted   FAILED: status 5 (0x00000005): EXCRYPT_STAT_INSUFF_RESOURCE: insufficient resources            TKIP :      OK   Passed         Raw AES :      OK   Passed         AES-CCM :      OK   Passed            3DES :      OK   Passed             MD5 :      OK   Passed        HMAC_MD5 :      OK   Passed           SHA-1 :      OK   Passed      HMAC_SHA-1 :      OK   Passed          ModExp :      OK   Passed             RSA :      OK   Passed             RNG :      OK   PassedDriver-specific error code 0 (0x00000000): OKIf any faults were detected in a previous self-test but the current tests are success-ful, the History column shows the failure condition.Example:...Crypto hardware self-test PASSED!  Details:       Test Name   History   Current Test       ---------   -------   ------------         Raw RC4 :      OK   Passed      40-bit WEP : Faulted   Passed            TKIP :      OK   Passed         Raw AES :      OK   Passed         AES-CCM :      OK   Passed            3DES :      OK   Passed             MD5 :      OK   Passed        HMAC_MD5 :      OK   Passed           SHA-1 :      OK   Passed      HMAC_SHA-1 :      OK   Passed          ModExp :      OK   Passed             RSA :      OK   Passed             RNG :      OK   PassedIf no crypto hardware was detected at startup, the following information displays:[wport1]IxWLAN -> cryptotestRunning crypto hardware self-test......Self-test not supported at this timedel key Deletes the encryption key.del key <key_number>exec Executes a command file. The command file must contain a series of CLI com-mands. When this command is executed, the commands in the file are treated/executed as entered using the CLI. exec <file_name>
The Command Line Interface (CLI)IxWLAN Commands5-64 IxWLAN User Guide, Release 6.205<file_name>: The name of the command file to be executedExample: The try.txt file in this example contains the version and get associa-tion CLI commands. [wport1]IxWLAN -> exec try.txtrun -> versionIxia IxWLAN Rev 5.00run -> get association STA       MAC Address             State   0    00:04:E2:38:56:78       up  SUT   00:04:E2:38:A8:D2       up[wport1]IxWLAN ->ftp Transfers a file between the IxWLAN flash file system and the command PC. It is most often used to download new software from the command PC to the IxW-LAN SED/SED-MR+ chassis. It can also be used to download command files (executed by the exec command) from the command PC to the IxWLAN SED/SED-MR+ chassis.ftp <host_name><host_name>: The IP address of the target host.The CLI opens for the following entries:Username: The user name needed to access the remote file.Password: The password needed to access the remote file.Remote File: The file name on the remote host. The full pathname should be included (that is, c:\ixia\ixwlan.sys).Local File: The name of the file to be used in IxWLAN.download or upload: download (to transfer a file from the remote host to the IxWLAN chassis) or upload (to transfer a file from the IxWLAN chassis to the remote host). This entry is case-sensitive.Example:[wport1]IxWLAN -> ftp 192.168.0.2Username:Password:Remote File: c:\ixwlan.sysLocal File: ixwlanNEW.sysNOTE: Use the ftp command to download the command file from the command PC to the IxWLAN flash file system.NOTE: An FTP server must be running on <host_name>.
IxWLAN User Guide, Release 6.20 5-65The Command Line Interface (CLI)IxWLAN Commandsdownload or upload: downloadGetting @192.168.0.2:c:\ixwlan.sys -> ixwlanNEW.sys#####################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################done1007441 bytes[wport1]IxWLAN ->get association  Shows a list of known stations and their association status. This list includes the master station, the System Under Test, and all virtual stations.get associationExample:[wport1]IxWLAN -> get associationAID     vSTA    DEV     MAC Address             State SUT            wlan0   00:04:E2:37:E6:A1       Up   1       1    wlan0   00:0B:16:57:00:01       Associated   2       2    wlan0   00:0B:16:57:00:02       Associatedget bkjoin Shows the Background Join mode. get bkjoinExample:[wport1]IxWLAN ->get bkjoinBackground Join is enabled[wport1]IxWLAN ->get bootscan Shows the Scan at Boot mode. [wport1]IxWLAN -> get bootscanExample:[wport1]IxWLAN -> get bootscanScan at Boot mode: enabled
The Command Line Interface (CLI)IxWLAN Commands5-66 IxWLAN User Guide, Release 6.205get channel  Shows the radio channel/frequency used by IxWLAN. The channel is set auto-matically when it joins with the System Under Test. get channelExample:[wport1]IxWLAN -> get channelRadio Frequency: 5260 MHz (IEEE 52)[wport1]IxWLAN ->get config  Shows the IxWLAN configuration. get configExample: [wport2]IxWLAN -> get config  ========== System Attributes ==========  IxWLAN Cfg Rev: 4  System Name:  Login Username: Admin  IP Address: 10.10.10.15  IP Mask: 255.255.255.0  Host IP Address: 10.10.10.25  Gateway IP Address: 0.0.0.0  SNTP/NTP Server IP Address:  Time Zone:  Telnet Access: Enabled  ========== Global Radio Attributes ==========  Multi-radio Mode: dynamic  Country Code: NA  Scan at Boot: enabled  Background Join: disabled  ========== Per-Radio Attributes ==========    ******************************          wport1  ******************************  SSID: IxWLAN Test Wireless Network  BSSID of System Under Test: 00:0b:6b:30:05:9f  WLAN MAC Address: 00:0b:6b:4e:ef:7f (default)  WLAN MAC Address Mask: ff:ff:ff:ff:00:00  Wireless Mode: 802.11a  Data Rate: best  DTIM: 1  HW Transmit Retry Limit: 4  Configured Transmit Power: full  Current Runtime Transmit Output Power 18.0 dBm  Default transmit key: 1  Shared Key  1, size  40, 1234567890  Key Entry Method: hexadecimal    ******************************          wport2
IxWLAN User Guide, Release 6.20 5-67The Command Line Interface (CLI)IxWLAN Commands  ******************************  SSID: IxWLAN Test Wireless Network  BSSID of System Under Test: 00:0b:6b:30:05:9f  WLAN MAC Address: 00:0b:6b:4f:ef:7f (set by user)  WLAN MAC Address Mask: ff:ff:ff:ff:00:00  Wireless Mode: 802.11a  Data Rate: best  DTIM: 1  HW Transmit Retry Limit: 4  Configured Transmit Power: full  Current Runtime Transmit Output Power 18.0 dBm  Default transmit key: 1  Shared Key  1, size  40, 1234567890  Key Entry Method: hexadecimal    ******************************          wport3  ******************************  SSID: IxWLAN Test Wireless Network  BSSID of System Under Test: 00:0b:6b:30:05:9f  WLAN MAC Address: 00:0b:6b:50:ef:7f (set by user)  WLAN MAC Address Mask: ff:ff:ff:ff:00:00  Wireless Mode: 802.11a  Data Rate: best  DTIM: 1  HW Transmit Retry Limit: 4  Configured Transmit Power: full  Current Runtime Transmit Output Power 18.0 dBm  Default transmit key: 1  Shared Key  1, size  40, 1234567890  Key Entry Method: hexadecimal[wport2]IxWLAN ->
The Command Line Interface (CLI)IxWLAN Commands5-68 IxWLAN User Guide, Release 6.205get countrycode  Shows the country code that is currently configured in IxWLAN.get countrycodeExample:[wport1]IxWLAN -> get country codeCountry Code: US [wport1]IxWLAN ->get cryptocap Identifies the crypto hardware installed on the IxWLAN SED/SED-MR+ chassis, the capabilities supported by that hardware, and includes an indication of the cumulative fault status. get cryptocapExample:[wport1]IxWLAN -> get cryptocapCrypto hardware: cn505Hardware capabilities:   Raw RC4 (ARC4) encryption   40(64)-bit WEP encryption   104(128)-bit WEP encryption   TKIP encryption   Raw AES encryption   AES-CCM (CCMP) encryption   3DES encryption   MD5 hash   HMAC_MD5 authentication   SHA-1 hash   HMAC_SHA-1 authentication   Modular exponentiation   RSA public key encryption   Random number generatorCrypto hardware status: OK[wport1]IxWLAN ->If any faults were detected in a self-test, the following message displays:Crypto hardware status: Faulted, run "cryptotest" command for detailsIf no crypto hardware was detected at startup, the following information displays:[wport1]IxWLAN -> get cryptocapCrypto hardware: NoneHardware capabilities: None[wport1]IxWLAN ->If crypto hardware was detected at startup, but the license key does not include WPA/RSN, the following information displays:[wport1]IxWLAN -> get cryptocapCrypto hardware: Detected but not licensedHardware capabilities: None
IxWLAN User Guide, Release 6.20 5-69The Command Line Interface (CLI)IxWLAN Commandsget features Shows features that have been enabled by your authorization code/feature key: get featuresExample:[wport1]IxWLAN -> get featuresFeatures: 802.11A, 802.11B, 802.11G, WPA/RSN[wport1]IxWLAN ->See 802.11b/g Commands on page 5-86 for more commands that are available if your feature set includes 802.11B or 802.11G. If the feature key includes WPA/RSN, but no crypto hardware was detected at startup, this command displays the following message:[wport1]IxWLAN -> get featuresFeatures: 802.11A, 802.11B, 802.11G* *  WARNING: licensed for WPA but no encryption hardwareget frequency Shows IxWLAN's radio frequency setting.get frequencyExample:[wport1]IxWLAN -> get frequencyRadio Frequency: 5260 MHz (IEEE 52)[wport1]IxWLAN ->get gateway Shows IxWLAN's default gateway IP address defined in the configuration file (set by set gateway).get gatewayExample:[wport1]IxWLAN -> get gatewayGateway's IP Address:10.1.35.1 (config file value)[wport1]IxWLAN ->get hardware Shows hardware revisions.[wport1]IxWLAN -> get hardwareExample:[wport1]IxWLAN -> get hardwarewlan1 revisions: mac 5.6 phy 4.1 analog 1.7  PCI Vendor ID: 0x168c, Device ID: 0x13  Sub Vendor ID: 0x168c, Sub Device ID: 0x2026
The Command Line Interface (CLI)IxWLAN Commands5-70 IxWLAN User Guide, Release 6.205get ipaddr Shows IxWLAN's IP address. get ipaddrExample:[wport1]IxWLAN -> get ipaddr IP Address: 192.168.0.50 [wport1]IxWLAN ->get ipmask Shows IxWLAN's IP subnet mask defined in the configuration file (set by set ipmask).get ipmaskExample:[wport1]IxWLAN -> get ipmaskIP Subnet Mask: 255.255.0.0 (config file value)[wport1]IxWLAN ->get key Shows an encryption key.get key <key_number><key_number>: Key Number (1…4)Example:[wport1]IxWLAN -> get key 1Shared Key  1, size  40, 1234567890[wport1]IxWLAN ->get keyentrymethod Shows the current WEP Encryption Key Entry Method: get keyentrymethodExample:[wport1]IxWLAN -> get keyentrymethodKey Entry Method: Hexadecimal[wport1]IxWLAN ->get login Shows the logon user name. -> get login Login Username:
IxWLAN User Guide, Release 6.20 5-71The Command Line Interface (CLI)IxWLAN CommandsExample:[wport1]IxWLAN -> get login Login Username: My_User_Name[wport1]IxWLAN ->get mic Shows the MIC check setting that is currently configured on the IxWLAN chas-sis.get micExample:[wport1]IxWLAN -> get micMIC check enabledget multiradiomode Displays the multi-radio mode.get multiradiomodeExample:[wport1]IxWLAN -> get multiradiomodeMulti-radio mode: Dynamicget pmmode Shows the IxWLAN power management mode. get pmmodeExample:[wport1]IxWLAN -> get pmmodePower Management mode ........ Power SavePower Save listen interval ... 1 beacon period[wport1]IxWLAN ->…get power Shows the IxWLAN transmit power setting. get power Example:[wport1]IxWLAN -> get powerTransmitPower: half (-3 dB)Current Transmit Output Power 18 dBm[wport1]IxWLAN ->get psinterval Shows the power save interval. get psinterval
The Command Line Interface (CLI)IxWLAN Commands5-72 IxWLAN User Guide, Release 6.205Example: [wport1]IxWLAN -> get psintervalPower Save listen interval ... 3 beacon periodsPower Management mode ........ Power Save[wport1]IxWLAN ->get rate Shows the IxWLAN data rate. get rate Example:[wport1]IxWLAN -> get rate Data Rate: best [wport1]IxWLAN ->get sntpserver Shows the IP Address of the SNTP server.get sntpserverget station Shows the status of an 802.11 STA from the IxWLAN station’s information base. This command is intended for diagnostic purposes. get station <id><id>: Station Indexget status Shows a high-level summary of IxWLAN's current status. It includes: the BSSID of the System Under Test, an indication of whether this system has been detected and if IxWLAN is joined with it, and a count of the current virtual stations.For the IxWLAN SED chassis, this command displays the MAC address of the additional Ethernet port and adds the Mgmt or Data prefix for each port.get statusExample:[wport2]IxWLAN -> get statusIxWLAN(tm) software version 6.20.0.127 EBNumber of wports present ....... 3Multi-radio mode ............... DynamicMgmt LAN MAC address ........... 00:08:9b:68:2c:81Data LAN MAC address ........... 00:08:9b:68:2c:82MIC check ...................... EnabledCrypto hardware ................ OK1 vSTA currently in the system:  1 vSTA in External mode:     1 in the Initialized state.Group 128 has 1 vSTA.
IxWLAN User Guide, Release 6.20 5-73The Command Line Interface (CLI)IxWLAN Commandsget systemname Shows the IxWLAN system name.get systemnameget telnet Shows the telnet mode and the current state of telnet connections. get telnetExample:[wport1]IxWLAN -> get telnetTelnet Access: Enabled1 of 4 connections active2 connection attempts2 good logins0 failed logins[wport1]IxWLAN ->get tzone Shows the current time zone setting.get tzoneExample:[wport1]IxWLAN -> get tzoneSNTP/NTP Time Zone: -8[wport1]IxWLAN ->get uptime Shows the elapsed time since IxWLAN has been up and running. get uptimeExample:[wport1]IxWLAN -> get uptime IxWLAN Uptime -- 5 days, 15:32:29 [wport1]IxWLAN ->get wirelessmode Shows the current Wireless LAN Mode (11a, 11b, or 11g). get wirelessmodeExample:[wport1]IxWLAN -> get wirelessmodeWireless LAN Mode: 11g[wport1]IxWLAN ->get wlanmac Shows the current Wireless LAN MAC Address. get wlanmac
The Command Line Interface (CLI)IxWLAN Commands5-74 IxWLAN User Guide, Release 6.205Example:[wport1]IxWLAN -> get wlanmacWLAN MAC Address: 00:0b:cd:59:23:44[wport1]IxWLAN ->get wlanmask Shows the Wireless LAN Address Mask.get wlanmaskExample:[wport1]IxWLAN -> get wlanmaskWLAN Address Mask: ff:ff:ff:ff:00:00[wport1]IxWLAN ->get wport Displays wport information. get wport <N> [stats]get wport <N> Displays a summary status report for wport <N>.get wport <N><N>: the wport number. The default value is 1. Must be in the 1...3 range, depending on the number of wports present.Example:[wport1]IxWLAN -> get wport 2WLAN mode ...................... 802.11bWLAN MAC address ............... 00:02:6f:05:16:34WLAN address mask .............. ff:ff:ff:ff:00:00BSSID of System Under Test ..... 00:04:e2:83:cb:3fIxWLAN-SUT connection status ... JoinedPower Management mode .......... Active (always awake)1 vSTA on wport 2:  1 vSTA in Internal mode:     1 in the Running state.Group 1 has 1 vSTA: ID 3get wport <N> stats Displays a statistics report for wport <N>.get wport <N> statsstats: statistics reports including per-wport counters and statistical informationExample:[wport1]IxWLAN -> get wport 2 stats
IxWLAN User Guide, Release 6.20 5-75The Command Line Interface (CLI)IxWLAN CommandsWport 2: MAC 00:02:6f:05:16:34Authentications:          10,   Deauthentications:       0Associations:             10,   Disassociations:         0Reassociations:            0Rcv Sig Strength:         49,   Ack Sig Strength:       58Rcv Rate: 6,   Tx SF Rate: 18,   Tx LF Rate: 18Frame counts: MSDUs       Data    Mcast     Mgmt     CtrlRcv            3429        700        0     3729        0Tx              595        525        0       70        0Rcv Errors:                0,   Tx Errors:               0Rcv PHY Errors:            0,   Excess Retries:          0Rcv CRC Errors:            0,   Total Retries:           0Rcv Duplicates:            0,   Tx Filtered:             0Rcv Discarded:             0,   Tx Discarded:            0Ack Rcv Fails:             0,   RTS Fails:               0Encryption:              n/a,   FCS Fails:               4Rcv Decrypt Errs:          0,   WEP Excluded:            0help Shows all commands available in the CLI command set.helphistory Shows the last 20 commands that were entered in the CLI. historyExample:[wport1]IxWLAN -> history  1  set date 2/4/03 11:09:30  2  join  3  autoconf 2 ip 10.1.35.231 mac 10:20:30:40:50:61 mode external  4  get vsta 1 conf[wport1]IxWLAN ->import Imports a PKCS#12 certificate file via FTP. The successful completion of this command stores the specified certificate file in the /Certificates directory in the IxWLAN flash file system. The specified password (Certfile password) is encrypted and stored in the /Cache directory (only visible in admin mode). import certfile [<remote filename>] [certpass <password>][ftphost <hostname>] [ftpuser <username>] [ftppass <userpass>]Prompts for parameters that are not specified in the command line. NOTE: This subcommand is similar to the get vsta master stats command, which displays aggregate statistics for the entire IxWLAN unit.
The Command Line Interface (CLI)IxWLAN Commands5-76 IxWLAN User Guide, Release 6.205Example:[wport1]IxWLAN -> import certfileRemote Certfile: c:\myCert.pfxCertfile password: ****FTP Hostname: 192.168.0.2FTP Username:FTP Password:Importing @192.168.0.2:c:\myCert.pfx -> /Certificates/myCert.pfx#####myCert.pfx imported successfullyremote certfile [<remote filename>]: The file name on the remote host. The full path name must be included (for example, c:\myCert.pfx).certfile password [certpass <password>]: The password associated with the cer-tificate file.ftp hostname [ftphost <hostname>]: The IP address of the FTP host where the certificate file resides.ftp username [ftpuser <username>]: The user name needed to access the certifi-cate file on the FTP host.ftp password [ftppass <userpass>]: The password needed to access the certifi-cate file on the FTP host.ping Allows you to ping other hosts on the subnet. If <count> is not supplied, three pings are sent. ping <host_name> <count><host_name>: Host name.<count>: Number of ping packets to send: 0…2,147,483,647.Example:[wport1]IxWLAN -> ping 10.10.10.233 3PING 10.10.10.233: 56 data bytes 64 bytes from here(10.10.10.233) : icmp-seq=O. time=O. ms 64 bytes from here(10.10.10.233) : icmp-seq=l. time=O. ms 64 bytes from here(10.10.10.233) : icmp-seq=2. time=O. ms ----10.10.10.233 PING Statistics ----3 packets transmitted, 3 packets received, 0% packet loss round-trip (ms) min/avg/max = 0/0/0 -> ping 10.10.10.233 1 10.10.10.233 is alive[wport1]IxWLAN ->NOTE: An FTP server must be running on FTP Hostname.
IxWLAN User Guide, Release 6.20 5-77The Command Line Interface (CLI)IxWLAN Commandsquit Exits the CLI. quitYou must reopen the telnet connection to log on after this command is used.reboot Reboots IxWLAN.rebootreset wlanmac Resets the Wireless LAN MAC Address to its default value:reset wlanmacExample:[wport1]IxWLAN -> reset wlanmac****  DO NOT REMOVE POWER FROM THE IxWLAN HARDWARE!**  Wait for the IxWLAN to update the configuration file in Flash**  or use the "reboot" command for immediate update & reboot.**  Automatic update will be done within one minute.**set bkjoin Selects the Background Join mode. This setting is saved in the configuration file and is stored upon the reboot of the system.The default setting for the Background Join mode is enabled.set bkjoin enabled/disabledExample:[wport1]IxWLAN ->set bkjoin enabledBackground Join is enabledset bootscan Selects the Scan at Boot mode. It can be set to:•enabled: scans the configured wireless mode (that is, 802.a/b/g).•allmode: scans all valid wireless modes at boot time.•disabled: no scan at boot time.This persistent setting is saved in the configuration file and restored upon the reboot of the system.
The Command Line Interface (CLI)IxWLAN Commands5-78 IxWLAN User Guide, Release 6.205The default setting for Scan in Boot mode is enabled.set bootscan enabled/allmode/disabledExample:[wport1]IxWLAN -> set bootscan allmodeScan at Boot mode: allmodeset countrycode Updates the IxWLAN configuration with the new country code and reboots the system.set countrycode <value><value>: An ISO standard country code (for example, DB - DEBUG, NA - NO_COUNTRY_SET, PR - PUERTO_RICO, US - UNITED_STATES, and so on)Example:[wport1]IxWLAN -> set countrycode <value>Setting the country code will reboot the system, continue? [y/n: y]? n[wport1]IxWLAN ->If there are any vSTAs in the authenticated or above state, the command informs the user that all vSTAs must be deauthenticated before invoking the command.Example:[wport1]IxWLAN -> set countrycode <value>Setting the country code will reboot the system, continue? [y/n: y]? yError: 1 vSTA active, all vSTAs must be at state configured or initialized.[wport1]IxWLAN ->set date Sets the current system date and (optionally) time in IxWLAN.set date <date> [<time>]<date>: Current date in the format: mm/dd/yyyy<time>: Current time in the format: hh:mm:ss. Use 24-hour clock numbers (that is, 13:30:00 = 1:30 p.m.). This parameter is optional. If not specified, the current system time is used. The system time starts at midnight when the unit is powered on or reset. If the time is given, the seconds component is optional. If not speci-fied, the seconds value is initialized to zero.
IxWLAN User Guide, Release 6.20 5-79The Command Line Interface (CLI)IxWLAN CommandsExample:[wport1]IxWLAN -> set date 06/04/03 06:14:15System date & time: THU JUL 31 09:00:00 2003Use the "set date" or "set time" command to adjust[wport1]IxWLAN ->set factorydefault Resets the IxWLAN configuration to default factory settings and reboots the sys-tem.[wport1]set factorydefaultResetting to factory defaults will reboot the system, continue? [y/n:y]? n[wport1]IxWLAN ->If there are any vSTAs in the authenticated or above state, the command informs the user that all vSTAs must be deauthenticated before invoking the command.[wport1]set factorydefaultResetting to factory defaults will reboot the system, continue? [y/n:y]? yError: 1 vSTA active, all vSTAs must be at state configured or initialized.[wport1]IxWLAN ->set features This command can be used to modify your authorization code keyfile in the flash file system to enable new features (for example, 802.11b, 802.11g, WPA/RSN). [wport1]IxWLAN -> set features This command will modify your system!!Do you have your new Activation Codes ready (y/n)y *** This IxWLAN has not been Node Locked*** Please enter "admin" to continue[wport1]IxWLAN -> adminPassword: ***Ok Please Enter IxWLAN Authorization Codes for MAC: 00:0b:16:00:00:07Input? ba27108c5b7d16dda96094be96b3105f34643030303030300000   Thank you...Authorization Codes AcceptedCONGRATULATIONS! you have been authorized forFeatures: 802.11A, 802.11B and 802.11G[wport1]IxWLAN -> This command is used only when you upgrade the IxWLAN software with new features.set gateway Sets the IxWLAN default gateway IP address.
The Command Line Interface (CLI)IxWLAN Commands5-80 IxWLAN User Guide, Release 6.205set gateway <ip_address><ip_address>: A valid IP address in ASCII dotted-decimal notation (nn.nn.nn.nn). Use an IP address that is compatible with the network addressing scheme at your facility. The default gateway address is 0.0.0.0.set ipaddr Sets the IxWLAN IP address. set ipaddr <ip_address><ip_address>: A valid IP address in ASCII dotted-decimal notation (nn.nn.nn.nn). Use an IP address that is compatible with the network addressing scheme at your facility. The default IP address is 192.168.0.50.set ipmask Sets the IxWLAN IP subnet mask. set ipmask <ip_mask><ip_mask>: A valid IP address mask in ASCII dotted-decimal notation (nn.nn.nn.nn).set key Sets an encryption key or default shared key.set key["keynum"|unique][40|104|128]keystringset key [1-4] default Example:[wport1]IxWLAN -> set keyset key [1-4] default set key ["keynum"|unique] [40|104|128] value[wport1]IxWLAN ->[wport1]IxWLAN -> set key 1 40 1234567890Shared Key 1, size 40: 1234567890[wport1]IxWLAN ->[wport1]IxWLAN -> get key 1Shared Key  1, size  40, 1234567890[wport1]IxWLAN ->set keyentrymethod Sets the WEP Encryption Key Entry Method.set keyentrymethod <method><method>: hexadecimal = Key contains (0 - 9, A - F), asciitext = Key contains keyboard charactersset login Sets the logon user name. The logon user name is a text string and can be up to 32 characters. Control characters are not permitted. set login <User_Name_String>
IxWLAN User Guide, Release 6.20 5-81The Command Line Interface (CLI)IxWLAN CommandsExample:[wport1]IxWLAN -> set login Your_User_NameLogin Username: Your_User_Name[wport1]IxWLAN ->set mic Sets the MIC check configuration parameter for IxWLAN.set mic <mode><mode>: enable, disable, or spot. The default value is enabled.set multiradiomode Sets the multi-radio mode.set multiradiomode static|dynamicstatic: Sets the multi-radio mode to be static. In the static mode, each wport is totally independent of the others and must have non-matching MACs, and the system does not support vSTA migration among wports for roaming or other pur-poses. The assignment of vSTAs to wports can still be changed, but must ensure vSTA MAC consistency with its wport. The wport hardware for wports 1, 2, and 3 is each programmed by the system with its configured WLAN MAC address, if set, or else it defaults to factory settings. The system ensures that each has a suit-ably unique WLAN MAC address and overrides the factory default, if necessary.dynamic: The wports are used as a virtual extension of one another with consis-tent MACs to the extent of the WLAN address mask, and vSTAs may be moved among wports. The wport hardware for wports 2 and 3 is programmed by the sys-tem with a WLAN MAC address consistent with that of wport1.Default is static.Example:[wport1]IxWLAN -> set multiradiomode dynamicMulti-radio mode: Dynamicset password Sets the password needed to log on to the IxWLAN command line interface and web-based user interface. Type the new password twice to confirm the use of the new password. The password is a text string and can be up to 32 characters. Con-trol characters are not permitted. The password is case-sensitive.[wport1]IxWLAN -> set password Password: ******* Type password again to confirm: *******Password confirmed [wport1]IxWLAN ->set pmmode Sets the IxWLAN power management mode.
The Command Line Interface (CLI)IxWLAN Commands5-82 IxWLAN User Guide, Release 6.205set pmmode <mode><mode>: active (always awake) or psave (Power Save: doze for the specified lis-ten interval set by set psinterval). Default: active.When Power Management mode is set to active, IxWLAN remains in the awake state at all times. When the Power Management mode is set to psave, IxWLAN enters a dozing state until awakened by the listen interval set by set psinterval. When dozing:•IxWLAN does not accept WLAN frames transmitted to any vSTA. •IxWLAN awakens at each listen interval to receive the next beacon and poll for frames buffered for any vSTA in accordance with 802.11 Power Manage-ment needs. •IxWLAN awakens at DTIM intervals to receive DTIM beacons when buff-ered broadcast/multicast frames are indicated.While in either state, any WLAN frames to be transmitted from any vSTA may be immediately placed in the Transmit Queue for transmission by the WLAN interface. Any transmission from any vSTA indicates the IxWLAN SED/SED-MR+ chassis current Power Management mode.Example:[wport1]IxWLAN -> set pmmode psave[wport1]IxWLAN -> OKset power Sets the transmit power setting. A lower setting reduces the range of IxWLAN.set power <mode><mode>: One of the following:•full = maximum (normal) transmit power (18 dBm/64 mW)•half = fractional (1/2) transmit power (15 dBm/31.5 mW)•quarter = fractional (1/4) transmit power (12 dBm/16 mW)•eighth = fractional (1/8) transmit power (9 dBm/8 mW)•min = minimum transmit power (3 dBm/2 mW) The dBm/mW values are applicable only when countrycode=US. In other coun-tries, power settings are relative to the maximum transmit power available for the country.Example:[wport1]IxWLAN -> set power halfTransmit Power: half (-3 dB)****  DO NOT REMOVE POWER FROM THE IxWLAN HARDWARE!
IxWLAN User Guide, Release 6.20 5-83The Command Line Interface (CLI)IxWLAN Commands**  Wait for the IxWLAN to update the configuration file in Flash**  or use the "reboot" command for immediate update & reboot.**  Automatic update will be done within one minute.**[wport1]IxWLAN -> ...Configuration file update completed.get powerTransmitPower: half (-3 dB)Current Transmit Output Power 18 dBm[wport1]IxWLAN -> …set psinterval  When the IxWLAN power management mode is set to Power Save mode (that is, set pmmode psave), this command sets the listen interval. set psinterval <nBeacons><nBeacons>: Number of beacon intervals (1…100). The default value is 1.The beacon rate is determined by the System Under Test, normally by some user-configurable parameter. IxWLAN receives beacons that are sent by the System Under Test. A typical beacon rate is one every 100 Time Units. An 802.11 Time Unit is defined as 1024 microseconds ( ). As a result, the beacon rate would be one every 102.4 milliseconds (ms), or about 10 per second (s). As an example, if the pmmode command is set to psave and psinterval is set to 3, IxWLAN wakes up about every 307.2 ms to poll for frames queued in the System Under Test. Also see get pmmode on page 5-71 and set pmmode on page 5-81 for more infor-mation about how this interval is used.Example: [wport1]IxWLAN -> set psinterval 3[wport1]IxWLAN -> OKset rate Sets the IxWLAN data rate. Available selections differ, depending on the current wireless mode: 802.11a, 802.11b, or 802.11g. When you choose the best rate, IxWLAN tries to deliver unicast data packets at the highest possible data rate. If there are any obstacles or interference, IxWLAN automatically steps down to an optimum data rate that supports reliable data transmission. In addition, the opti-mum data rate is adjusted periodically based on past performance of the data transmissions at different neighboring data rates. set rate <rate><rate>: If the wireless mode is 802.11a, <rate> can be: 6, 9, 12, 18, 24, 36, 48, 54, or best (variable rate). If the wireless mode is 802.11b, <rate> can be: 1, 2, 5.5, 11, or best (variable rate). If the wireless mode is 802.11g, <rate> can be: 1, 2, 5.5, 11, 6, 9, 12, 18, 24, 36, 48, 54, or best (variable rate). All values are Mb/s.If a <rate> value is not given, the CLI shows a list of available rates for the cur-rent wireless mode. μs
The Command Line Interface (CLI)IxWLAN Commands5-84 IxWLAN User Guide, Release 6.205Example:[wport1]IxWLAN -> get wirelessmodeWireless LAN Mode: 11g[wport1]IxWLAN -> set raterate best               -- Select best data raterate 1                  -- Select 1 Mbpsrate 2                  -- Select 2 Mbpsrate 5.5                -- Select 5.5 Mbpsrate 11                 -- Select 11 Mbpsrate 6                  -- Select 6 Mbpsrate 9                  -- Select 9 Mbpsrate 12                 -- Select 12 Mbpsrate 18                 -- Select 18 Mbpsrate 24                 -- Select 24 Mbpsrate 36                 -- Select 36 Mbpsrate 48                 -- Select 48 Mbpsrate 54                 -- Select 54 MbpsNot enough parameters![wport1]IxWLAN ->set sntpserver Sets the SNTP server address. If an SNTP server address is configured, IxWLAN tries to retrieve the time from that server during initialization.set sntpserver <ip_address><ip_address>: The IP address of the SNTP server.set systemname Sets the IxWLAN system name. It can be up to 32 characters. Control characters are not allowed.set systemname <name><name>: Up to 32 printable charactersset telnet Enables/disables telnet mode.set telnet <mode><mode>: Enable = allow access to the IxWLAN CLI via telnet, disable = do not allow access via telnetset time This command sets the current system time.set time <time><time>: current time in the hh:mm:ss format. Use 24-hour clock numbers (that is, 13:30:00 = 1:30 p.m.). Seconds are optional. If omitted, the seconds are set to zero.
IxWLAN User Guide, Release 6.20 5-85The Command Line Interface (CLI)IxWLAN CommandsExample:[wport1]IxWLAN -> set time 07:01:15System date & time: THU JUL 31 09:00:00 2003Use the "set date" or "set time" command to adjust[wport1]IxWLAN ->set tzone Sets the local time zone. If no time zone is defined, GMT time is used. For exam-ple, use set tzone -8 to set the time zone for the west coast of North America.set tzone <zone><zone>: -12…14set wirelessmode Sets the IxWLAN Wireless LAN Mode:set wirelessmode <mode><mode>: 11a = 802.11a, 11b = 802.11b, or 11g = 802.11g. The default value is 11g.set wlanmac Sets the Wireless LAN MAC Address:set wlanmac <MAC_address><MAC_address>: any non-broadcast or non-multicast valid MAC address (for example, 00:0b:cd:59:23:44).set wlanmask Sets the Wireless LAN Address Mask:set wlanmask <MAC_mask><MAC_mask>: a valid address mask (for example, ff:ff:ff:ff:00:00)set wport Set wport for configuration.set wport <N><N>: the wport number. The default value is 1. Must be in the 1...3 range, depending on the number of wports present.Example:[wport2]IxWLAN -> set wport 1Current wport: 1[wport1]IxWLAN ->NOTE: The feature set you ordered from Ixia may limit the number of available wireless mode selections. The CLI shows an error message if the wireless mode selection is not in your feature set.
The Command Line Interface (CLI)802.11b/g Commands5-86 IxWLAN User Guide, Release 6.205timeofday Shows the current system time.timeofdayExample:[wport1]IxWLAN -> timeofdaySystem date & time: THU JUL 31 09:00:00 2003Use the "set date" or "set time" command to adjust[wport1]IxWLAN ->version Shows the software version. Use the get version command to show the version of the configuration file saved in Flash.versionExample:[wport1]IxWLAN -> versionIxia IxWLAN(tm) software version 6.00.m4Jan 16 2006, 19:02:38802.11b/g CommandsThe following commands are available only when the wireless mode is set to 802.11b or 802.11g.get basic11b      -- Display Basic 11b Ratesget ctsmode       -- Display CTS mode (11g)get ctsrate       -- Display CTS rate (11g)get ctstype       -- Display CTS type (11g)get shortpreamble -- Display Short Preamble (11b/11g) Usageget shortslottime -- Display Short Slot Time (11g) Usageset basic11b      -- Set Use of Basic 11b Ratesset ctsmode       -- Set CTS Mode (11g)set ctsrate       -- Set CTS Rate (11g)set ctstype       -- Set CTS Type (11g)set shortpreamble -- Set Short Preamble (11b/11g) Usageset shortslottime -- Set Short Slot Time (11g) UsageThese commands are specific to the current wireless mode. If you enter an 11g only command while in 802.11a or 802.11b wireless mode for example, the CLI shows the following message:This command is not applicable for this wireless mode[wport1]IxWLAN ->This section describes the following commands: •basic11b (get/set) on page 5-87.•ctsmode (get/set) on page 5-87.•ctsrate (get/set) on page 5-88.•ctstype (get/set) on page 5-88.•shortpreamble (get/set) on page 5-88.
IxWLAN User Guide, Release 6.20 5-87The Command Line Interface (CLI)802.11b/g Commands•shortslottime (get/set) on page 5-89.basic11b (get/set) get basic11b (11b only)Shows the current setting of the basic 802.11b mode (enabled or disabled):get basic 11bExample:[wport1]IxWLAN -> get basic11bUse only basic 11b Rates (1, 2): Disabled[wport1]IxWLAN -> set basic11b (11b only)Enables or disables the use of basic 802.11b rates only. When enabled, only basic 802.11b rates (1 and 2Mbps) are used. When disabled, all rates are used.set basic11b <mode><mode>: enable = use only basic 802.11b rates, disable = disable only basic 11b rates—use all rates.ctsmode (get/set) These commands are used to display and set the CTS protection mode. 802.11 is a listen and wait protocol (CSMA/CA or collision avoidance) that needs the air-waves to be clear before transmission. Because 802.11b and 802.11g use differ-ent modulation schemes (CCK for 11b and OFDM for 11g), the RTS/CTS mechanism can be used to allow 11b and 11g devices to communicate. When the CTS protection mode is enabled (mode = always or auto), IxWLAN uses RTS/CTS (as defined by ctstype) to communicate with an 11b device. get ctsmode (11g only)Shows the current CTS protection mode setting.get ctsmodeExample[wport1]IxWLAN -> get ctsmodeCTS Mode: AUTO[wport1]IxWLAN -> set ctsmode (11g only)Sets the CTS protection mode.set ctsmode <mode>
The Command Line Interface (CLI)802.11b/g Commands5-88 IxWLAN User Guide, Release 6.205<mode>: none = never use CTS protection, always = always use CTS Protection, or auto = use CTS protection when an 802.11b device is detected.ctsrate (get/set) get ctsrate (11g only)Shows the current CTS rate. get ctsrateExample:[wport1]IxWLAN -> get ctsrateCTS Rate: 11 Mbps[wport1]IxWLAN ->set ctsrate (11g only)When the CTS mode is enabled (always or auto), this command sets the rate at which RTS/CTS frames are transmitted:set ctsrate <rate><rate>: 1, 2, 5.5, or 11 Mbps.ctstype (get/set) get ctstype (11g only)Shows the current CTS type setting. get ctstypeExample:[wport1]IxWLAN -> get ctstypeCTS Type: CTS-ONLY[wport1]IxWLAN -> set ctstype (11g only)When the CTS mode is enabled (always or auto), this command sets the CTS type.set ctstype <type><type>: cts-only = before transmission, IxWLAN transmits a CTS frame or rts-cts = transmission follows an RTS/CTS frame exchange. shortpreamble (get/set)The preamble is a field in the 802.11 header. An 802.11b or 802.11g frame for-mat can use a Short or Long preamble (Short = 56 bits, Long = 128 bits).
IxWLAN User Guide, Release 6.20 5-89The Command Line Interface (CLI)802.11b/g Commandsget shortpreamble (11b/11g)Shows the current Short Preamble (11b/11g) Usage setting (enabled or dis-abled). get shortpreambleExample:[wport1]IxWLAN -> get shortpreambleShort Preamble (11b/11g) Usage: Enabled[wport1]IxWLAN ->set shortpreamble (11b/11g)Enables or disables Short Preamble (11b/11g) usage.set shortpreamble <mode><mode>: enable = Enable Short and Long Preamble, disable = Disable Short Preamble (use only long).shortslottime (get/set) get shortslottime (11g only)Shows the current Short Slot Time (11g) Usage setting (enabled or disabled): get shortslottimeExample:[wport1]IxWLAN -> get shortslottimeShort Slot Time: Enabled[wport1]IxWLAN ->set shortslottime (11g only)Enables/disables Short Slot Time (11g) usage. When enabled, IxWLAN adver-tises using 9 ms slot times. When disabled, IxWLAN advertises using 20 ms slot times.set shortslottime <mode><mode>: enable = Enable Short Slot Time (G mode), disable = Disable Short Slot Time (use only long).
The Command Line Interface (CLI)Administrative Mode Commands5-90 IxWLAN User Guide, Release 6.205Administrative Mode CommandsThe following commands are available only in the administrative mode in the Command Line Interface. They are not available in the user mode or in IxW-LAN's web-based user interface. [wport1]IxWLAN -> adminPassword: ****Ok[wport1]IxWLAN -> helpList of IxWLAN CLI commands:#                    -- Identifies a comment line in a command file?                    -- Display CLI Command Listadmin                -– Temporary factory adminboot flash           -- Boot from flashboot ethernet        -- Boot from network bootrom              -- Update boot ROM image clear admin          -- Quit admin modecp                   -- Copy file format               -- Format flash file systemget basic11g         -- Display Basic 11g Ratesget calibration      -- Display noise & offset calibration modeget hostipaddr       -- Display Host IP Addressget watchdog         -- Display Watchdog Mode.ls                   -- List the files in the flash file systemmv                   –- Move filerm                   -- Remove fileset calibration      -- Set noise and offset calibration modeset basic11g         -- Set Use of Basic 11g Ratesset hostipaddr       -- Set Host IP Addressset regulatorydomain –- Set Regulatory Domainset watchdog         -- Set Watchdog Modetrace  -- Enable/Disable IxWLAN debug trace functions.[wport1]IxWLAN ->If you try to enter any of the commands before activating the administrative mode, the CLI indicates that the command does not exist. Example:[wport1]IxWLAN -> get calibrationInvalid parameter: calibrationType "help" for a list of valid commands.[wport1]IxWLAN ->Warning: Do not use these commands unless instructed to do so by Ixia.
IxWLAN User Guide, Release 6.20 5-91The Command Line Interface (CLI)Administrative Mode CommandsYou must use the admin command to activate the administrative mode before using any of the following commands.This section describes the following commands: •admin (clear) on page 5-91.•basic (get/set) on page 5-91.•boot on page 5-92.•bootrom on page 5-93.•calibration (get/set) on page 5-93.•cp on page 5-94.•format on page 5-94.•hostipaddr (get/set) on page 5-94.•hwtxretries (get/set) on page 5-94.•ls on page 5-95.•mv on page 5-95.•regulatorydomain (set) on page 5-95.•rm on page 5-95.•trace on page 5-95.•watchdog (get/set) on page 5-96.admin (clear) Activates and deactivates the administrative mode. Type admin and the adminis-trative mode password (Ixia) to activate the administrative mode. The password is case-sensitive (use Ixia, not ixia). Enter clear admin and press ENTER to deactivate the administrative mode. [wport1]IxWLAN -> adminPassword: ***Ok[wport1]IxWLAN -> clear adminOk[wport1]IxWLAN ->basic (get/set) get basic11g (11g only)Shows the current setting of 802.11g wireless mode basic rates. get basic 11gNOTE: The admin command is not the same as the default Admin password. The default Admin password is case-sensitive. This admin command is not case-sensitive. The administrative mode password needed to successfully execute this command is case-sensitive.
The Command Line Interface (CLI)Administrative Mode Commands5-92 IxWLAN User Guide, Release 6.205Example:[wport1]IxWLAN -> get basic11gBasic Rate Set (11g): (1, 2, 5.5, 11)[wport1]IxWLAN -> set basic11g (11g only)This command sets the basic rates to be used in the 802.11g wireless mode.set basic11g <mode><mode>: 11 = Use Basic rates (1, 2), 11b = Use Basic rates (1, 2, 5.5, 11), 11g = Use Basic rates (1, 2, 5.5, 11, 6, 12, 24), ofdm = Use Basic rates (6, 12, 24).boot Reboots IxWLAN from flash or from the network.IxWLAN -> boot <source> <file> [hostname [hostIP [username [password]<source>: flash or ethernet<filename>: The name of an image file (.sys) to use to boot IxWLAN<hostname>: If <source> is ethernet, the name of the host computer where <filename> resides.<hostIP>: If <source> is ethernet, the IP address of the host computer where <filename> resides.<username>: If <source> is ethernet, the user name needed to access <host-name>.<password>: If <source> is ethernet, the password needed to access <host-name>.Example for booting from the network:[wport1]IxWLAN -> boot ethernet ixwlan.sys my_host 192.168.0.2 anonymous my_passwordboot device          : fei:unit number          : 0processor number     : 0host name            : hostfile name            : ixwlan.sysinet on ethernet (e) : 10.10.10.40:ffffff00host inet (h)        : 10.10.10.20user (u)             : anonymousftp password (pw)    : my_passwordflags (f)            : 0x0other (o)            : fei
IxWLAN User Guide, Release 6.20 5-93The Command Line Interface (CLI)Administrative Mode CommandsExample for booting from Flash:[wport1]IxWLAN -> boot flash ixwlan.sysboot device          : ata:unit number          : 0processor number     : 0host name            : hostfile name            : /ata0a/ixwlan.sysinet on ethernet (e) : 10.10.10.40:ffffff00host inet (h)        : 10.10.10.20user (u)             : anonymousftp password (pw)    : my_passwordflags (f)            : 0x0other (o)            : feibootrom Allows you to update the IxWLAN boot ROM image. bootromWhen you enter this command, you are prompted to confirm execution of this command. Updating boot firmware with a flat binary file bootrom*.sysThis is a risky operation!Are you sure (y/n)?calibration (get/set) To ensure performance of IxWLAN over temperature and environment changes, the software performs periodic calibration.get calibrationShows the current calibration period.get calibrationExample:[wport1]IxWLAN -> get calibrationCalibration time: 60 seconds[wport1]IxWLAN ->set calibrationSets the current calibration period. [wport1]IxWLAN -> set calibration <seconds><seconds> = 0…60 seconds (zero disables the periodic calibration).NOTE: The bootrom command is not available for the IxWLAN SED 6.10.
The Command Line Interface (CLI)Administrative Mode Commands5-94 IxWLAN User Guide, Release 6.205cp Copies a file in the IxWLAN SED/SED-MR+ chassis flash file system. IxWLAN -> cp <source_file> <destination_file>format Formats the IxWLAN SED/SED-MR+ chassis flash file system. [wport1]IxWLAN -> formathostipaddr (get/set) get hostipaddrThis command is used for debugging purposes only. It allows IxWLAN to find the host PC to load software via FTP from a file on the PC into RAM (instead of from flash into RAM, as is the normal operation). [wport1]IxWLAN -> get hostipaddrset hostipaddrSets the host IP address that can be used by the get hostipaddr command.[wport1]IxWLAN -> set hostipaddr <ip_address><ip_address>: A valid IP address in ASCII dotted-decimal notation (nn.nn.nn.nn).hwtxretries (get/set) get hwtxretriesThis command specifies the number of times the radio module should retransmit a frame that has not been acknowledged (at 802.11 protocol level) by an AP.[wport1]IxWLAN -> get hwtxretriesset hwtxretriesSets the number of times the radio module should retransmit a frame that has not been acknowledged (at 802.11 protocol level) by an AP.[wport1]IxWLAN -> set hwtxretries <n><n>: A number in the 1...15 range.Example: [wport1]IxWLAN -> get hwtxretriesHW Transmit Retry Limit: 4[wport1]IxWLAN ->[wport1]IxWLAN ->set hwtxretries 4HW Transmit Retry Limit: 4**** A change in this setting requires a reboot.
IxWLAN User Guide, Release 6.20 5-95The Command Line Interface (CLI)Administrative Mode Commands**[wport1]IxWLAN ->ls Lists the files in the IxWLAN SED/SED-MR+ chassis flash file system. [wport1]IxWLAN -> ls <directory_name>Example:[wport1]IxWLAN -> lsDirectory listing of ".":11/21/2002  8:33:02   <DIR>     Logs12/01/2002  9:03:32   <DIR>     Scenarios12/06/2002 11:03:06   <DIR>     Statistics 2/18/2003 17:12:24   1009597   ixwlan.sys 1/21/2003 14:06:00       598   config.bak 3/05/2003 12:27:24       598   config4 directories, 5 files1839104 bytes free[wport1]IxWLAN -> mv Renames a file in the IxWLAN SED/SED-MR+ chassis flash file system. [wport1]IxWLAN -> mv <old_file_name> <new_file_name>regulatorydomain (set)Enables different radio frequencies for different countries. [wport1]IxWLAN -> set regulatorydomain <domain><domain>: NONE, FCC, MKK, or ETSIrm Removes or deletes a file from the IxWLAN SED/SED-MR+ chassis flash file system. [wport1]IxWLAN -> rm <file_name>trace Enables or disables the IxWLAN debug trace functions. trace <mode><mode>: Can be one of the following:all = Enable all IxWLAN debug trace functions. See the NOTES later on.NOTE: If <file_name> is a non-existent file or a directory that contains files, this command does not give an error indication. A directory that contains files is not deleted. You must delete all of the files in the directory before you can delete the directory.
The Command Line Interface (CLI)Administrative Mode Commands5-96 IxWLAN User Guide, Release 6.205none = Disable all IxWLAN debug trace functionsctask = Toggle virtual station control debug trace functionmtask = Toggle virtual station master debug trace functionprdr = Toggle Ping Reader debug trace functionpwrt = Ping Writer debug trace functiondso = Toggle DS Out debug trace functiondsi = Toggle DS In debug trace functionarp = Toggle ARP debug trace functionshow = Display IxWLAN debug trace statuswatchdog (get/set) get watchdogShows the current watchdog setting. [wport1]IxWLAN -> get watchdogWatchdog: Enabledset watchdogEnables or disables the system watchdog. If enabled, the watchdog monitors the system for processes and services that are not responding. It also maintains the hardware watchdog timer.set watchdog <mode><mode>: enable or disableNOTES:•If you are running a load generator, do not enable trace all. This causes numerous printf statements to be generated in the background and IxWLAN may not function properly.•This command is also available in user mode, but it does not display among the other CLI commands in the help output.
IxWLAN User Guide, Release 6.20 5-97The Command Line Interface (CLI)Example ConfigurationsExample ConfigurationsThis section covers the following topics: •Example First Time Configuration on page 5-97.•Example Security Configurations on page 5-99.•Changing the IxWLAN IP Address on page 5-111.Example First Time ConfigurationIxWLAN is shipped with default configuration parameters. You can change con-figuration settings using the CLI or the web-based user interface. The CLI can be accessed using the serial port or a telnet connection. It is strongly recommended that you keep careful records of the current configu-ration of each IxWLAN in use at your facility. Use the get config CLI command to show a detailed configuration report.The default IP address of your IxWLAN is 192.168.0.50. For the first configura-tion of your IxWLAN SED/SED-MR+ chassis, use the provided crossover Ether-net cable to establish a direct connection between a PC and the chassis. The PC must also be configured with an IP address in the 192.168.0.xxx range. You can then use telnet on the PC to log on to IxWLAN and use the CLI to set the desired configuration parameters. You may want to change the settings listed in Table 5-4 on page 5-98 from their defaults.
The Command Line Interface (CLI)Example Configurations5-98 IxWLAN User Guide, Release 6.205Table 5-4. First Time ConfigurationA suitable static IP address must be assigned to IxWLAN in accordance with the network policy at your facility. Each IxWLAN must have its own IP address. If you use multiple IxWLANs at your facility, each of them should have a WLAN MAC whose prefix is unique. For example, on the first IxWLAN, use WLAN MAC Address 04:0d:e0:62:23:57 and on the second IxWLAN, use WLAN MAC Address 06:0f:14:62:32:a0.Table 5-5 shows some additional, optional parameters you may want to set.Table 5-5. Optional ParametersParameter Default CLI Command ExampleIP address 192.168.0.50 set ipaddr set ipaddr 10.1.35.16Subnet mask 255.255.255.0 set ipmask set ipmask 255.255.255.0Gateway 0.0.0.0 set gateway set gateway 10.1.35.1Username Admin set login set login AdminPassword IxWLAN set password set password (then follow prompts)BSSID of the System Under Test00:00:00:00:00:00set bssid set bssid 00:04:e2:38:52:18WLAN Base MAC Addressset wlanmac set wlanmac 00:0b:cd:59:23:44WLAN MAC Mask ff:ff:ff:ff:00:00 set wlanmask set wlanmask ff:ff:ff:ff:00:00Parameter Default CLI Command ExampleSystem name (none) set systemname set systemname IxWLAN_1SNTP server (none) set sntpserver set sntpserver 128.138.140.44Time zone -8 (that is, PST) set tzone set tzone -6
IxWLAN User Guide, Release 6.20 5-99The Command Line Interface (CLI)Example ConfigurationsExample Security ConfigurationsThese example configurations show how to configure a virtual station to use one of the following authentication methods:•Shared-Key•WPA-PSK •WPA/EAP-TLS•RSN-PSK•RSN/EAP-TTLS•RSN/EAP-PEAPExample Shared-Key Authentication ConfigurationStep 1: Configure the virtual station.[wport1]IxWLAN -> conf 1 10.1.40.18 04:cf:1f:00:00:01 internal ping 10.1.40.16 10 1000000 1024[wport1]IxWLAN -> OK[wport1]IxWLAN -> Step 2: Turn on data encryption for the specified virtual station.[wport1]IxWLAN -> set vsta 1 encryption on[wport1]IxWLAN -> OK[wport1]IxWLAN -> Step 3: Set the shared key to 40 bit with the following key.[wport1]IxWLAN -> set key 1 40 1234567890Shared Key 1, size 40: 1234567890[wport1]IxWLAN -> Step 4: Set a virtual station to the shared-key index (1-4) to be used.[wport1]IxWLAN -> set vsta 1 keyindex 1[wport1]IxWLAN -> OK[wport1]IxWLAN -> Step 5: Use the following command to turn on authentication using shared keys.[wport1]IxWLAN -> set vsta 1 authentication shared-key[wport1]IxWLAN -> OK[wport1]IxWLAN ->
The Command Line Interface (CLI)Example Configurations5-100 IxWLAN User Guide, Release 6.205Step 6: (Optional) Display the virtual station's configuration to verify that all parameters are correctly set.[wport1]IxWLAN -> get vsta 1vSTA Configuration:  ID ........................ 1  Group ID .................. 1  IP Address ................ 10.1.40.18     DHCP ................... Off  MAC Address ............... 04:cf:1f:00:00:01  Connection Mode ........... persistent  Auth/Assoc Retry .......... 2  Authentication Timeout .... 300 mSec  Association Timeout ....... 300 mSec  Authentication ............ shared-key  Pre-Shared Key............. Not set  Passphrase................. Not set  EAP Algorithm.............. tls  Inner Auth Algorithm ...... MS-CHAPv2  Certfile................... Not set  User ID.................... Not set  Password .................. Not set  Outer ID .................. Not set  AKMP Timeout .............. 0 Seconds  Cipher .................... WEP(RC4)  Data Encryption ........... On  Shared-key Index .......... 1  Fragmentation Threshold ... 2346  RTS Threshold ............. 2346  Mode ...................... internal     Layer .................. 3  Load Application .......... ping  Target IP Address ......... 10.1.40.16  Ping Transmit Count ....... 1000  Ping Data Size ............ 1024[wport1]IxWLAN ->Example WPA-PSK Authentication ConfigurationIn this example configuration, the following parameters are used to configure a vSTA for WPA Pre-Shared Key authentication: •authentication: wpa-psk•cipher: tkip•encryption: on•psk (or passphrase): is set to the shared secretStep 1: Configure the virtual station.[wport1]IxWLAN -> conf 1 10.1.40.18 04:cf:1f:00:00:01 internal ping 10.1.40.16 10 1000000 1024[wport1]IxWLAN -> OK[wport1]IxWLAN ->
IxWLAN User Guide, Release 6.20 5-101The Command Line Interface (CLI)Example ConfigurationsStep 2: Turn on authentication using wpa-psk.[wport1]IxWLAN -> set vsta 1 authentication wpa-psk[wport1]IxWLAN -> OKStep 3: Set the cipher mode to tkip.[wport1]IxWLAN -> set vsta 1 cipher tkip[wport1]IxWLAN -> OKStep 4: Turn on data encryption for the specified virtual station.[wport1]IxWLAN -> set vsta 1 encryption on[wport1]IxWLAN -> OKStep 5: Set the shared secret passphrase.[wport1]IxWLAN -> set vsta 1 passphrase "hello, world"[wport1]IxWLAN -> OKStep 6: (Optional) Display the virtual station's configuration to verify that all parameters are correctly set.[wport1]IxWLAN -> get vsta 1vSTA Configuration:  ID ........................ 1  Group ID .................. 1  IP Address ................ 10.1.40.18     DHCP ................... Off  MAC Address ............... 04:cf:1f:00:00:01  Connection Mode ........... persistent  Auth/Assoc Retry .......... 2  Authentication Timeout .... 300 mSec  Association Timeout ....... 300 mSec  Authentication ............ wpa-psk  Pre-Shared Key ............ ec321676243351a9443b7712d9d8dc1b9dc51761cebdb0439c812d7759b643cb  Passphrase ................ "hello, world"  EAP Algorithm.............. tls  Inner Auth Algorithm ...... MS-CHAPv2  Certfile................... Not set  User ID.................... Not set  Password .................. Not set  Outer ID .................. Not set  AKMP Timeout .............. 0 Seconds  Cipher .................... TKIP  Data Encryption ........... On    Shared-key Index .......... 1  Fragmentation Threshold ... 2346
The Command Line Interface (CLI)Example Configurations5-102 IxWLAN User Guide, Release 6.205  RTS Threshold ............. 2346  Mode ...................... internal     Layer .................. 3  Load Application .......... ping  Target IP Address ......... 10.1.40.16  Ping Transmit Count ....... 1000  Ping Data Size ............ 1024[wport1]IxWLAN ->Example WPA/EAP-TLS Authentication ConfigurationIn this example configuration, the following parameters are used to configure a vSTA for WPA/EAP-TLS authentication: •authentication: wpa•cipher: tkip•encryption: on•eapalgorithm: tls•certfile: an imported certfile found in the IxWLAN Flash file system in the /Certificates directory.•userid: the userid associated with the certfileStep 1: Configure the virtual station.[wport1]IxWLAN -> conf 1 10.1.40.18 04:cf:1f:00:00:01 internal ping 10.1.40.16 10 1000000 1024[wport1]IxWLAN -> OK[wport1]IxWLAN ->Step 2: Turn on authentication using wpa.[wport1]IxWLAN -> set vsta 1 authentication wpa[wport1]IxWLAN -> OKStep 3: Set the cipher mode to tkip.[wport1]IxWLAN -> set vsta 1 cipher tkip[wport1]IxWLAN -> OKStep 4: Turn on data encryption for the specified virtual station.NOTE: The parameters needed to configure WPA-PSK can be set individually as shown in this example or all at once, using the autoconf command. If the vSTA authentication is wpa-psk, the vSTA tries WPA Pre-Shared Key authentication and succeeds or fails based on the values of the other attributes.
IxWLAN User Guide, Release 6.20 5-103The Command Line Interface (CLI)Example Configurations[wport1]IxWLAN -> set vsta 1 encryption on[wport1]IxWLAN -> OKStep 5: Select the EAP algorithm.[wport1]IxWLAN -> set vsta 1 eapalgorithm tls[wport1]IxWLAN -> OKStep 6: Set the certificate file.[wport1]IxWLAN -> set vsta 1 certfile MyCert.pfx[wport1]IxWLAN -> OKStep 7: Set the user ID.[wport1]IxWLAN -> set vsta 1 userid MyUser[wport1]IxWLAN -> OKStep 8: (Optional) Display the virtual station's configuration to verify that all parameters are correctly set.[wport1]IxWLAN -> get vsta 1vSTA Configuration:  ID ........................ 1  Group ID .................. 1  IP Address ................ 10.1.40.18     DHCP ................... Off  MAC Address ............... 04:cf:1f:00:00:01  Connection Mode ........... persistent  Auth/Assoc Retry .......... 2  Authentication Timeout .... 300 mSec  Association Timeout ....... 300 mSec  Authentication ............ wpa  Pre-Shared Key ............ Not set  Passphrase ................ Not set  EAP Algorithm.............. tls  Inner Auth Algorithm ...... MS-CHAPv2  Certfile .................. MyCert.pfx  User ID ................... MyUser  Password .................. Not set  Outer ID .................. Not set  AKMP Timeout .............. 0 Seconds  Cipher .................... TKIP  Data Encryption ........... On    Shared-key Index .......... 1  Fragmentation Threshold ... 2346  RTS Threshold ............. 2346  Mode ...................... internal     Layer .................. 3  Load Application .......... ping
The Command Line Interface (CLI)Example Configurations5-104 IxWLAN User Guide, Release 6.205  Target IP Address ......... 10.1.40.16  Ping Transmit Count ....... 1000  Ping Data Size ............ 1024[wport1]IxWLAN ->Example RSN-PSK Authentication ConfigurationIn this example configuration, the following parameters are used to configure a vSTA for RSN Pre-Shared Key authentication:•authentication: rsn-psk•cipher: aes-ccm•encryption: on•psk (or passphrase): is set to the shared secretStep 1: Configure the virtual station.[wport1]IxWLAN -> conf 1 10.1.40.18 04:cf:1f:00:00:01 internal ping 10.1.40.16 10 1000000 1024[wport1]IxWLAN -> OK[wport1]IxWLAN ->Step 2: Turn on authentication using rsn-psk.[wport1]IxWLAN -> set vsta 1 authentication rsn-psk[wport1]IxWLAN -> OKStep 3: Set the cipher mode to aes-ccm.[wport1]IxWLAN -> set vsta 1 cipher aes-ccm[wport1]IxWLAN -> OKStep 4: Turn on data encryption for the specified virtual station.[wport1]IxWLAN -> set vsta 1 encryption on[wport1]IxWLAN -> OKStep 5: Set the shared secret passphrase.[wport1]IxWLAN -> set vsta 1 passphrase "hello, world"[wport1]IxWLAN -> OKNOTE: The parameters needed to configure WPA can be set individually as shown in this example or all at once, using the autoconf command. If the vSTA authentication is wpa, the vSTA tries WPA authentication using EAP-TLS and succeeds or fails based on the values of the other attributes.
IxWLAN User Guide, Release 6.20 5-105The Command Line Interface (CLI)Example ConfigurationsStep 6: (Optional) Show the virtual station's configuration to verify that all parameters are correctly set.[wport1]IxWLAN -> get vsta 1vSTA Configuration:  ID ........................ 1  Group ID .................. 1  IP Address ................ 10.1.40.18     DHCP ................... Off  MAC Address ............... 04:cf:1f:00:00:01  Connection Mode ........... persistent  Auth/Assoc Retry .......... 2  Authentication Timeout .... 300 mSec  Association Timeout ....... 300 mSec  Authentication ............ rsn-psk  Pre-Shared Key ............ ec321676243351a9443b7712d9d8dc1b9dc51761cebdb0439c812d7759b643cb  Passphrase ................ "hello, world"  EAP Algorithm.............. tls  Inner Auth Algorithm ...... MS-CHAPv2  Certfile................... Not set  User ID.................... Not set  Password .................. Not set  Outer ID .................. Not set  AKMP Timeout .............. 0 Seconds  Cipher .................... aes-ccm  Data Encryption ........... On    Shared-key Index .......... 1  Fragmentation Threshold ... 2346  RTS Threshold ............. 2346  Mode ...................... internal     Layer .................. 3  Load Application .......... ping  Target IP Address ......... 10.1.40.16  Ping Transmit Count ....... 1000  Ping Data Size ............ 1024[wport1]IxWLAN ->NOTE: The parameters needed to configure RSN-PSK can be set individually as shown in this example or all at once, using the autoconf command. If the vSTA authentication is rsn-psk, the vSTA tries RSN Pre-Shared Key authentication and succeeds or fails based on the values of the other attributes.
The Command Line Interface (CLI)Example Configurations5-106 IxWLAN User Guide, Release 6.205Example RSN/EAP-TTLS Authentication ConfigurationIn this example configuration, the following parameters are used to configure a vSTA for RSN/EAP-TTLS authentication: •authentication: rsn•cipher: aes-ccm•encryption: on•eapalgorithm: ttls•certfile: an imported certfile found in the IxWLAN Flash file system in the /Certificates directory.•userid: the userid associated with the certfile•inneralgorithm: ms-chapv2 to use in Phase 2 authentication•outeridentity: the user identity to use in Phase 1 authentication•password: the password to use in Phase 2 authenticationStep 1: Configure the virtual station.[wport1]IxWLAN -> conf 1 10.1.40.18 04:cf:1f:00:00:01 internal ping 10.1.40.16 10 1000000 1024[wport1]IxWLAN -> OK[wport1]IxWLAN ->Step 2: Turn on authentication using rsn.[wport1]IxWLAN -> set vsta 1 authentication rsn[wport1]IxWLAN -> OKStep 3: Set the cipher mode to aes-ccm.[wport1]IxWLAN -> set vsta 1 cipher aes-ccm[wport1]IxWLAN -> OKStep 4: Turn on data encryption for the specified virtual station.[wport1]IxWLAN -> set vsta 1 encryption on[wport1]IxWLAN -> OKStep 5: Select the EAP algorithm.[wport1]IxWLAN -> set vsta 1 eapalgorithm ttls[wport1]IxWLAN -> OK
IxWLAN User Guide, Release 6.20 5-107The Command Line Interface (CLI)Example ConfigurationsStep 6: Select the inner algorithm.[wport1]IxWLAN -> set vsta 2 inneralgorithm ms_chapv2[wport1]IxWLAN -> OKStep 7: Set the outer identity.[wport1]IxWLAN -> set vsta 1 outeridentity MyOuterId[wport1]IxWLAN -> OKStep 8: Set the password.[wport1]IxWLAN -> set vsta 1 password MyPass[wport1]IxWLAN -> OKStep 9: Set the certificate file.[wport1]IxWLAN -> set vsta 1 certfile MyCert.pfx[wport1]IxWLAN -> OKStep 10: Set the user ID.[wport1]IxWLAN -> set vsta 1 userid MyUser[wport1]IxWLAN -> OKStep 11: (Optional) Show the virtual station's configuration to verify that all parameters are correctly set.[wport1]IxWLAN -> get vsta 1vSTA Configuration:  ID ........................ 1  Group ID .................. 1  IP Address ................ 10.1.40.18     DHCP ................... Off  MAC Address ............... 04:cf:1f:00:00:01  Connection Mode ........... persistent  Auth/Assoc Retry .......... 2  Authentication Timeout .... 300 mSec  Association Timeout ....... 300 mSec  Authentication ............ rsn  Pre-Shared Key ............ Not set  Passphrase ................ Not set  EAP Algorithm.............. ttls  Inner Auth Algorithm ...... MS-CHAPv2  Certfile .................. MyCert.pfx  User ID ................... MyUser  Password .................. MyPass  Outer ID .................. MyOuterId
The Command Line Interface (CLI)Example Configurations5-108 IxWLAN User Guide, Release 6.205  AKMP Timeout .............. 0 Seconds  Cipher .................... aes-ccm  Data Encryption ........... On    Shared-key Index .......... 1  Fragmentation Threshold ... 2346  RTS Threshold ............. 2346  Mode ...................... internal     Layer .................. 3  Load Application .......... ping  Target IP Address ......... 10.1.40.16  Ping Transmit Count ....... 1000  Ping Data Size ............ 1024[wport1]IxWLAN ->Example RSN/EAP-PEAP Authentication ConfigurationIn this example configuration, the following parameters are used to configure a vSTA for RSN/EAP-PEAP authentication: •authentication: rsn•cipher: aes-ccm•encryption: on•eapalgorithm: peap•certfile: an imported certfile found in the IxWLAN Flash file system in the /Certificates directory.•userid: the userid associated with the certfile, if used.•fastreconnect: enabled•inneralgorithm: eap-ms-chapv2 to be used in Phase 2 authentication•outeridentity: the user identity to be used in Phase 1 authentication•password: the password to be used in Phase 2 authenticationStep 1: Configure the virtual station.[wport1]IxWLAN -> conf 1 10.1.40.18 04:cf:1f:00:00:01 internal ping 10.1.40.16 10 1000000 1024[wport1]IxWLAN -> OK[wport1]IxWLAN ->NOTE: The parameters needed to configure RSN can be set individually as shown in this example or all at once, using the autoconf command. If the vSTA authentication is rsn, the vSTA tries RSN authentication using EAP-TTLS and succeeds or fails based on the values of the other attributes.
IxWLAN User Guide, Release 6.20 5-109The Command Line Interface (CLI)Example ConfigurationsStep 2: Turn on authentication using rsn.[wport1]IxWLAN -> set vsta 1 authentication rsn[wport1]IxWLAN -> OKStep 3: Set the cipher mode to aes-ccm.[wport1]IxWLAN -> set vsta 1 cipher aes-ccm[wport1]IxWLAN -> OKStep 4: Turn on data encryption for the specified virtual station.[wport1]IxWLAN -> set vsta 1 encryption on[wport1]IxWLAN -> OKStep 5: Select the EAP algorithm.[wport1]IxWLAN -> set vsta 1 eapalgorithm peap[wport1]IxWLAN -> OKStep 6: Select the inner algorithm.[wport1]IxWLAN -> set vsta 1 inneralgorithm eap-ms-chapv2[wport1]IxWLAN -> OKStep 7: Set the outer identity.[wport1]IxWLAN -> set vsta 1 outeridentity MyOuterId[wport1]IxWLAN -> OKStep 8: Set the password.[wport1]IxWLAN -> set vsta 1 password MyPass[wport1]IxWLAN -> OKStep 9: Set the certificate file.[wport1]IxWLAN -> set vsta 1 certfile MyCert.pfx[wport1]IxWLAN -> OK
The Command Line Interface (CLI)Example Configurations5-110 IxWLAN User Guide, Release 6.205Step 10: Set the user ID.[wport1]IxWLAN -> set vsta 1 userid MyUser[wport1]IxWLAN -> OKStep 11: Set the use of cached peap.[wport1]IxWLAN -> set vsta 1 fastreconnect enabled[wport1]IxWLAN -> OKStep 12: (Optional) Show the virtual station's configuration to verify that all parameters are correctly set.[wport1]IxWLAN -> get vsta 1vSTA Configuration:  ID ........................ 1  Group ID .................. 1  IP Address ................ 10.1.40.18     DHCP ................... Off  MAC Address ............... 04:cf:1f:00:00:01  Connection Mode ........... persistent  Auth/Assoc Retry .......... 2  Authentication Timeout .... 300 mSec  Association Timeout ....... 300 mSec  Authentication ............ rsn  Pre-Shared Key ............ Not set  Passphrase ................ Not set  EAP Algorithm.............. peap  Inner Auth Algorithm ...... EAP-MS-CHAPv2  Certfile .................. MyCert.pfx  Fastreconnect ............ Enabled  User ID ................... MyUser  Password .................. MyPass  Outer ID .................. MyOuterId  AKMP Timeout .............. 0 Seconds  Cipher .................... aes-ccm  Data Encryption ........... On    Shared-key Index .......... 1  Fragmentation Threshold ... 2346  RTS Threshold ............. 2346  Mode ...................... internal     Layer .................. 3  Load Application .......... ping  Target IP Address ......... 10.1.40.16  Ping Transmit Count ....... 1000  Ping Data Size ............ 1024[wport1]IxWLAN ->NOTE: The parameters needed to configure RSN can be set individually as shown in this example or all at once, using the autoconf command. If the vSTA authentication is rsn, the vSTA tries RSN authentication using EAP-PEAP and succeeds or fails based on the values of the other attributes.
IxWLAN User Guide, Release 6.20 5-111The Command Line Interface (CLI)Example ConfigurationsChanging the IxWLAN IP Address The following example describes how to change the IxWLAN IP address to match the IP subnet addressing scheme of the network where it is being installed. The example assumes the IP subnet of the network is 10.1.40.x.Step 1: Change the IP Address and subnet mask of the command PC as follows:•Select Control Panel from the Start menu on the PC.•Double-click the Network Connections icon.•Right-click the Local Area Connection icon for the Ethernet controller that is connected to IxWLAN. Select Properties from the right-click menu to show the Local Area Connection Properties dialog, as shown in Figure 5-1.Figure 5-1. Local Area Connection Properties•Select/highlight Internet Protocol (TCP/IP). •Click the Properties button to open the Internet Protocol (TCP/IP) Proper-ties dialog, as shown in Figure 5-2 on page 5-112.
The Command Line Interface (CLI)Example Configurations5-112 IxWLAN User Guide, Release 6.205Figure 5-2. TCP / IP Properties•Select the Use the following IP address radio button and enter the IP address for the Ethernet connection. Use an IP Address that resides on the same IP subnet as IxWLAN. For example, use 192.168.0.2 if you are using the IxWLAN default IP address 192.168.0.50.•Click OK to close the Internet Protocol (TCP/IP) Properties dialog.•Click Close to close the Local Area Connection Properties dialog.•Open a DOS window and verify if your PC's IP address has changed.C:\>ipconfigWindows IP ConfigurationEthernet adapter Local Area Connection:        Connection-specific DNS Suffix  . :        IP Address. . . . . . . . . . . . : 192.168.0.2        Subnet Mask . . . . . . . . . . . : 255.255.255.0        Default Gateway . . . . . . . . . :C:\>Step 2: Open a telnet connection to IxWLAN (192.168.0.50) and log on.C:\>telnet 192.168.0.50IxWLAN login: AdminPassword: ******The default logon name is Admin. The default password is IxWLAN. Fol-lowing successful logon, the CLI opens the logon banner:Ixia IxWLAN Rev 5.00System date & time: MON MAY 09 00:00:20 2005Use the "set date" or "set time" command to adjustIxia IxWLAN Rev 5.00WLAN mode .................... 802.11a
IxWLAN User Guide, Release 6.20 5-113The Command Line Interface (CLI)Example ConfigurationsWLAN MAC address ............. 00:02:8a:b6:1e:c9WLAN address mask ............ ff:ff:ff:ff:00:00LAN MAC address .............. 00:0b:16:00:00:57BSSID of System Under Test ... 00:04:e2:38:a7:9cIxWLAN-SUT connection status ..... SUT not detected in most recent scanPower Management mode ........ Active (always awake)MIC Check .................... EnabledCrypto Hardware............... OK0 vSTAs now in the system.[wport1]IxWLAN -> Step 3: Change the IxWLAN IP address.[wport1]IxWLAN -> set ipaddr 10.1.40.17IP Address: 10.1.40.17[wport1]IxWLAN ->Step 4: Reboot.[wport1]IxWLAN -> rebootRebooting IxWLAN...Step 5: Repeat Step 1, but change the IP address of the command PC to your desired subnet (for example, 10.1.40.15).Step 6: Re-establish the telnet connection and log back on to IxWLAN.C:\>telnet 10.1.40.17IxWLAN login: AdminPassword: **Ixia IxWLAN Rev 5.00System date & time: MON MAY 09 00:00:20 2005Use the "set date" or "set time" command to adjustIxia IxWLAN Rev 5.00WLAN mode .................... 802.11aWLAN MAC address ............. 00:02:8a:b6:1e:c9WLAN address mask ............ ff:ff:ff:ff:00:00LAN MAC address .............. 00:0b:16:00:00:57BSSID of System Under Test ... 00:04:e2:38:a7:9cIxWLAN-SUT connection status ..... SUT not detected in most recent scanPower Management mode ........ Active (always awake)MIC Check .................... EnabledCrypto Hardware............... OK0 vSTAs now in the system.[wport1]IxWLAN ->
The Command Line Interface (CLI)CLI Editor5-114 IxWLAN User Guide, Release 6.205CLI EditorAfter you have entered one or more CLI commands, press the ESC key to enter the edit mode. In the edit mode, you can use UNIX vi-style commands to quickly navigate, edit, and resubmit previous CLI commands. Use the history (hi) com-mand to show a history of the last up-to-20 commands.This section covers the following topics:•Movement and Search Commands on page 5-114.•Insert Commands on page 5-115.•Editing Commands on page 5-115.•Special Commands on page 5-116.Movement and Search CommandsIn the following commands, the default value for n is 1.nG: Go to command number n (for example, 2G = go to command number 2)/s: Search backward in history for string s (for example, /stats = search backward for stats)?s: Search forward in history for string s (for example, ?stats = search forward for stats)n: Repeat last search.N: Repeat last search in opposite direction.nk or n-: Get nth previous shell command in history.nj or n+: Get nth next shell command in history.nh or <Ctrl>H: Move cursor left n characters.nl or <Space>: Move right n characters.nw: Move n words forward.nW: Move n blank-separated words forward.ne: Move to end of the nth next word.nE: Move to end of the nth next blank-separated word.nb: Move back n words.nB: Move back n blank-separated words.fc: Find character c, searching forward.
IxWLAN User Guide, Release 6.20 5-115The Command Line Interface (CLI)CLI EditorFc: Find character c, searching backward.^: Move cursor to first non-blank character in line.$: Go to end of line.0 (zero): Go to beginning of line.Insert Commands In the following commands, input is expected until you press the ESC key.a: Append.A: Append at end of line.c SPACE: Change character.cl: Change character.cw: Change word.cc or S: Change entire line.c$ or C: Change everything from cursor to end of line.i: Insert.I: Insert at beginning of line.R: Type over characters.Editing Commands In the following commands, the default value for n is 1.nrc: Replace the following n characters with c.nx: Delete n characters starting at cursor.nX: Delete n characters to the left of the cursor.d SPACE: Delete character.dl: Delete character.dw: Delete word.dd: Delete entire line.d$ or D: Delete everything from cursor to end of line.p: Put last deletion after the cursor.P: Put last deletion before the cursor.
The Command Line Interface (CLI)CLI Editor5-116 IxWLAN User Guide, Release 6.205u: Undo last command.~: Toggle case, lower to upper or vice versa.Special Commands CTRL-U: Delete line and exit edit mode.CTRL-L: Redraw line.CTRL-D: Fill in symbol name.RETURN: Give line to shell and exit edit mode.
IxWLAN User Guide, Release 6.20 5-117The Command Line Interface (CLI)CLI Editor
The Command Line Interface (CLI)CLI Editor5-118 IxWLAN User Guide, Release 6.205
IxWLAN User Guide, Release 6.20 6-16Chapter 6: The Programming Interface (Perl) The IxWLAN SDK is a set of Perl modules that provide an application program-ming interface to the Ixia IxWLAN family of products. With this interface, users can create Perl scripts that configure IxWLAN Virtual Stations and perform other functions programmatically, as provided by the IxWLAN CLI and the IxWLAN Web-Based User Interface.Note that the Perl scripts execute on the command PC, not on IxWLAN.
The Programming Interface (Perl)6-2 IxWLAN User Guide, Release 6.206
IxWLAN User Guide, Release 6.20 7-17Chapter 7: Statistics Counters The statistics counters defined in this chapter can be:•Selected when creating a new monitor in the Monitoring/New Monitor dia-log. •Shown as legends or table headings in a monitor or reports page. •Displayed using CLI commands.This chapter covers the following topics: •Individual Virtual Station Counters on page 7-1.•Summary Statistics on page 7-7.•wport Statistics on page 7-16.Individual Virtual Station CountersIf statistics for individual virtual stations are selected, one or more of the follow-ing values may display:•Individual Virtual Station DHCP Statistics on page 7-2.•Individual Virtual Station 802.11 Management Counters on page 7-3.•Individual Virtual Station Signal Quality Indication on page 7-3.•Individual Virtual Station Frame Counters on page 7-3.•Individual Virtual Station Ping Statistics on page 7-4.•Individual Virtual Station WPA/RSN Statistics on page 7-4.•Individual Virtual Station Statistics on page 7-6.•Individual Virtual Station Roaming Statistics on page 7-6.
Statistics CountersIndividual Virtual Station Counters7-2 IxWLAN User Guide, Release 6.207Individual Virtual Station DHCP StatisticsExample:[wport2]IxWLAN -> get vsta 1 dhcpinfo** vSTA 1 DHCP Lease Information **State ............ NULLLast XID ......... 0x00000000Try limit ........ 0Current try ...... 0Offer limit ...... 0Current offer .... 0Try interval ..... 0 (Secs)Current timer .... 0 (Secs)Pkts xmtd ok ..... 0  DISCOVERs ...... 0  REQUESTs ....... 0  RENEWALs  ...... 0  REBINDs ........ 0  RELEASEs ....... 0  DECLINEs ....... 0Pkts xmtd err .... 0Pkts rcvd ok ..... 0  OFFERs ......... 0  ACKs ........... 0  NAKs ........... 0Pkts rcvd err .... 0  state err ...... 0  xid err ........ 0Requested lease .. 0Lease duration ... 0Expiration ticks . 0Renewal ticks .... 0Rebind ticks ..... 0Leased Address ... 0.0.0.0DHCP Server ...... 0.0.0.0Relay ............ 0.0.0.0Server/relay MAC . 00:00:00:00:00:00[wport2]IxWLAN ->
IxWLAN User Guide, Release 6.20 7-3Statistics CountersIndividual Virtual Station CountersIndividual Virtual Station 802.11 Management CountersAssociations: Number of times that the virtual station has Associated with the System Under TestReassociations: Number of times that the virtual station has Re-associated with the System Under TestAuthentications: Number of times that the virtual station has Authenticated with the System Under TestDeauthentications: Number of times that the virtual station has De-authenticated from the System Under TestDisassociations: Number of times that the virtual station has Disassociated from the System Under TestRoams: Number of successful RoamsIndividual Virtual Station Signal Quality IndicationAck Signal Strength: RSSI in the most recently received ACK frameRcv Rate: Data rate for the most recently received frameRcv Signal Strength: Signal strength indication for the most recently received frameTx LF Rate: Data rate for the most recently transmitted long frameTx SF Rate: Data rate for the most recently transmitted short frameIndividual Virtual Station Frame CountersRcv Ctrl: Control frames received by the virtual stationRcv Data: Data frames received by the virtual stationRcv Mcast: Multicast frames received by the virtual stationRcv Mgmt: Management frames received by the virtual stationRcv MSDUs: Total frames received by the virtual station, all frame typesTx Ctrl: Control frames transmitted by the virtual stationTx Data: Data frames transmitted by the virtual stationTx Mcast: Multicast frames transmitted by the virtual stationTx Mgmt: Management frames transmitted by the virtual stationTx MSDUs: Total frames transmitted by the virtual station, all frame types
Statistics CountersIndividual Virtual Station Counters7-4 IxWLAN User Guide, Release 6.207Individual Virtual Station Ping StatisticsThese counters display only if the virtual station was configured for the internal mode:Bytes Received: Number of data bytes that were received in ICMP Echo Response packetsBytes Transmitted: Number of data bytes that were transmitted in ICMP Echo packetsPackets Received: Number of ICMP Echo Response packets that were receivedPackets Transmitted: Number of ICMP Echo packets that were transmittedRound-trip Avg: Average time difference between transmitted ICMP Echo and received ICMP Echo Response, in microseconds (µs)Round-trip Max: Time difference between transmitted ICMP Echo and received ICMP Echo Response, maximum observedRound-trip Min: Time difference between transmitted ICMP Echo and received ICMP Echo Response, minimum observedRound-trip Stddev: Standard deviation in time difference between transmitted ICMP Echo and received ICMP Echo ResponseTransmit Count: Number of Pings that the virtual station is configured to sendTransmit Data Size: Size of the data payload in the ICMP Echo messageTransmit ENOBUFS: Number of times that a buffer was not available for trans-missionIndividual Virtual Station WPA/RSN Statistics4Way Handshake Msg1 Rx: Number of 4-Way handshake message 1s received by this virtual station4Way Handshake Msg2 Tx: Number of 4-Way handshake message 2s sent by this virtual station4Way Handshake Msg3 Rx: Number of 4-Way handshake message 3s received by this virtual station4Way Handshake Msg4 Tx: Number of 4-Way handshake message 4s transmitted by this virtual stationCCMP Decrypt Errors: Number of received MPDUs discarded by the CCMP decryption algorithmCCMP Replays: Number of received CCMP MPDUs discarded by the replay mechanism
IxWLAN User Guide, Release 6.20 7-5Statistics CountersIndividual Virtual Station CountersEAPOL Key Frames Rx: Number of EAPOL key frames received by this virtual stationEAPOL Key Frames Tx: Number of EAPOL key frames transmitted by this vir-tual stationEapol Length Error Frames Rx: Number of EAPOL frames that were received by this virtual station in which the Packet Body Length field of the EAPOL header is invalidEAPOL Request Frames Rx: Number of EAP (Extensible Authentication Proto-col) Request frames (other than Rq/Id frames) that were received by this virtual stationEapol Request Id Frames Rx: Number of EAP Req/Id frames that were received by this virtual stationEapol Response Frames Tx: Number of valid EAP Response frames (other than Resp/Id frames) that were transmitted by this virtual stationEapol Response Id Frames Tx: Number of EAP Resp/Id frames that were trans-mitted by this virtual stationEapol Start Frames Tx: Number of EAPOL Start frames that were transmitted by this virtual stationGroup Key Msg1 Rx: Number of Group Key handshake message 1s received by this virtual stationGroup Key Msg2 Tx: Number of Group Key handshake message 2 sent by this virtual stationInvalid EAPOL Frames Rx: Number of EAPOL frames that were received by this virtual station in which the frame type is not recognizedLast EAPOL Frame Ver: The protocol version number carried in the most recently received EAPOL framesMIC Fails Sent: Number of EAPOL frames sent to the AP as a MIC failure report eventTkip ICV Errors: Number of TKIP ICV errors encountered when decrypting packetsTKIP Local MIC Failures: Number of Michael MIC failures encountered when checking the integrity of packets received from the vSTA at this entityTKIP Rply Ctr Failures: Number of TKIP replay errors detectedTotal EAPOL Frames Rx: Number of EAPOL frames of any type that were received by this virtual station
Statistics CountersIndividual Virtual Station Counters7-6 IxWLAN User Guide, Release 6.207Total EAPOL Frames Tx: Number of EAPOL frames of any type that were trans-mitted by this virtual stationWPA Auth Failure Ct: Total number of failed WPA AuthenticationsWPA Authentication Ct: Total number of successful WPA AuthenticationsIndividual Virtual Station StatisticsAck Rcv Fails: ACK receipt failuresAuthentication Type: Virtual station authentication typeEncryption: Virtual station encryption mode (on/off)Excess Retries: Transmit retry tries exceededFCS_Fails: Frame checksum errors in received framesRcv CRC Errors: CRC errors in received framesRcv Decrypt Errs: Received frame decryption CRC errorsRcv Discarded: Received frames discardedRcv Duplicates: Duplicate frames receivedRcv Errors: Total receive errorsRcv PHY Errors: Receive errors at the PHY levelRTS Fails: RTS-CTS failuresTotal Retries: Total transmission retriesTx Discarded: Transmit frames discardedTx Errors: Total transmit errorsTx Filtered: Transmit frames filteredWEP_Excluded: Received frames that were rejected because of incorrect encryp-tionIndividual Virtual Station Roaming StatisticsRoam start-to-stop time: Measures the time during which the station was unable to pass data frames due to roaming.Data-frame-to-data-frame: Measures the time between successive data frames transmitted or received before and after a Roam.Transmit frames dropped: Count of transmit frames discarded during a Roam
IxWLAN User Guide, Release 6.20 7-7Statistics CountersSummary StatisticsSummary StatisticsSummary statistics provide a summary report taken over a set of virtual stations. The virtual stations set can be a defined group or all virtual stations currently in the system. By contrast, the individual virtual station statistics report offers a list of statistics and counters for an individual virtual station. The summary report provides a summary of the statistics and counters taken over the indicated set of virtual stations. For each counter, the summary contains: the minimum and max-imum values for that counter found in the set of virtual stations examined, the average value, and, where applicable, the total (sum) over the set of virtual sta-tions. One or more of the following values may display:•Summary Signal Counters on page 7-7.•Summary Transmit Statistics on page 7-8.•Summary Receive Statistics on page 7-9.•Summary Error Statistics on page 7-10.•WPA/RSN Summary Statistics on page 7-10.•Summary Roaming Statistics on page 7-15.Summary Signal CountersAckSigAvg: Average RSSI in received ACK framesAckSigMax: Maximum RSSI in received ACK framesAckSigMin: Minimum RSSI in received ACK framesRxRateAvg: Average data rate for received framesRxRateMax: Maximum data rate for received framesRxRateMin: Minimum data rate for received framesRxSigAvg: Average signal strength indication for received framesRxSigMax: Maximum signal strength indication for received framesRxSigMin: Minimum signal strength indication for received framesTxRateLfAvg: Average data rate for transmitted long framesTxRateLfMax: Maximum data rate for transmitted long framesTxRateLfMin: Minimum data rate for transmitted long framesTxRateSfAvg: Average data rate for transmitted short framesTxRateSfMax: Maximum data rate for transmitted short framesTxRateSfMin: Minimum data rate for transmitted short frames
Statistics CountersSummary Statistics7-8 IxWLAN User Guide, Release 6.207Summary Transmit StatisticsTxCtrlAvg: Average Control Frames transmitted per virtual stationTxCtrlFrames: Total Control Frames transmitted by all virtual stationsTxCtrlMax: Maximum Control Frames transmitted per virtual stationTxCtrlMin: Minimum Control Frames transmitted per virtual stationTxDataAvg: Average data frames transmitted per virtual stationTxDataFrames: Total data frames transmitted by all virtual stationsTxDataMax: Maximum data frames transmitted per virtual stationTxDataMin: Minimum data frames transmitted per virtual stationTxErrAvg: Average transmission errors per virtual stationTxErrMax: Maximum transmission errors per virtual stationTxErrMin: Minimum transmission errors per virtual stationTxErrors: Total transmission errors by all virtual stationsTxMcastAvg: Average Multicast frames transmitted per virtual stationTxMcastFrames: Total Multicast Frames transmitted by all virtual stationsTxMcastMax: Maximum Multicast frames transmitted per virtual stationTxMcastMin: Minimum Multicast frames transmitted per virtual stationTxMgmtAvg: Average Management Frames transmitted per virtual stationTxMgmtFrames: Total Management Frames transmitted by all virtual stationsTxMgmtMax: Maximum Management Frames transmitted per virtual stationTxMgmtMin: Minimum Management Frames transmitted per virtual stationTxMsduAvg: Average frames transmitted per virtual station, all frame typesTxMsduMax: Maximum frames transmitted per virtual station, all frame typesTxMsduMin: Minimum frames transmitted per virtual station, all frame typesTxMSDUs: Total frames transmitted by all virtual stations, all frame typesTxRetryAvg: Average transmission retries per virtual stationTxRetryMax: Maximum transmission retries per virtual station
IxWLAN User Guide, Release 6.20 7-9Statistics CountersSummary StatisticsTxRetryMin: Minimum transmission retries per virtual stationTxTotalRetries: Total transmission retries by all virtual stationsSummary Receive StatisticsRxCtrlAvg: Average Control Frames received per virtual stationRxCtrlFrames: Total Control Frames received by all virtual stationsRxCtrlMax: Maximum Control Frames received per virtual stationRxCtrlMin: Minimum Control Frames received per virtual stationRxDataAvg: Average data frames received per virtual stationRxDataFrames: Total data frames received by all virtual stationsRxDataMax: Maximum data frames received per virtual stationRxDataMin: Minimum data frames received per virtual stationRxErrAvg: Average receive errors per virtual stationRxErrMax: Maximum receive errors per virtual stationRxErrMin: Minimum receive errors per virtual stationRxErrors: Total receive errors by all virtual stationsRxMcastAvg: Average Multicast frames received per virtual stationRxMcastFrames: Total Multicast Frames received by all virtual stationsRxMcastMax: Maximum Multicast frames received per virtual stationRxMcastMin: Minimum Multicast frames received per virtual stationRxMgmtAvg: Average Management Frames received per virtual stationRxMgmtFrames: Total Management Frames received by all virtual stationsRxMgmtMax: Maximum Management Frames received per virtual stationRxMgmtMin: Minimum Management Frames received per virtual stationRxMsduAvg: Average frames received per virtual station, all frame typesRxMsduMax: Maximum frames received per virtual station, all frame typesRxMsduMin: Minimum frames received per virtual station, all frame typesRxMSDUs: Total frames received by all virtual stations, all frame types
Statistics CountersSummary Statistics7-10 IxWLAN User Guide, Release 6.207Summary Error StatisticsAck_Rcv_Fails: ACK receipt failuresFCS_Fails: Frame checksum errors in received framesRcv_CRC_Errors: CRC errors in received framesRcv_Decrypt_Errors: Received frame decryption CRC errorsRcv_Discarded: Total received frames discardedRcv_Duplicates: Duplicate frames receivedRcv_PHY_Errors: Receive errors at the PHY levelTx_Discarded: Total transmit frames discardedTx_Excess_Retries: Transmit retry tries exceededWEP_Excluded: Received frames rejected because of incorrect encryptionWPA/RSN Summary StatisticsWpaAuthFail: Total failed 802.1x Authentications per virtual stationWpaAuthFailAvg: Average failed 802.1x Authentications per virtual stationWpaAuthFailMax: Maximum failed 802.1x Authentications per virtual stationWpaAuthFailMin: Minimum failed 802.1x Authentications per virtual stationWpaAuthOkay: Total successful 802.1x Authentications per virtual stationWpaAuthOkayAvg: Average successful 802.1x Authentications per virtual stationWpaAuthOkayMax: Maximum successful 802.1x Authentications per virtual sta-tionWpaAuthOkayMin: Minimum successful 802.1x Authentications per virtual sta-tionWpaCcmpDecErr: Total received MPDUs discarded by the CCMP decryption algorithm per virtual stationWpaCcmpDecErrAvg: Average received MPDUs discarded by the CCMP decryption algorithm per virtual stationWpaCcmpDecErrMax: Maximum received MPDUs discarded by the CCMP decryption algorithm per virtual stationWpaCcmpDecErrMin: Minimum received MPDUs discarded by the CCMP decryption algorithm per virtual station
IxWLAN User Guide, Release 6.20 7-11Statistics CountersSummary StatisticsWpaCcmpRplFail: Total received CCMP MPDUs discarded by the replay mech-anism per virtual stationWpaCcmpRplFailAvg: Average received CCMP MPDUs discarded by the replay mechanism per virtual stationWpaCcmpRplFailMax: Maximum received CCMP MPDUs discarded by the replay mechanism per virtual stationWpaCcmpRplFailMin: Minimum received CCMP MPDUs discarded by the replay mechanism per virtual stationWpaRxEapol: Total EAPOL frames received (any type) per virtual stationWpaRxEapolAvg: Average EAPOL frames received (any type) per virtual stationWpaRxEapolInv: Total Invalid EAPOL frames received (unrecognized types) per virtual stationWpaRxEapolInvAvg: Average Invalid EAPOL frames received (unrecognized types) per virtual stationWpaRxEapolInvMax: Maximum Invalid EAPOL frames received (unrecognized types) per virtual stationWpaRxEapolInvMin: Minimum Invalid EAPOL frames received (unrecognized types) per virtual stationWpaRxEapolKey: Total EAPOL Key frames received per virtual stationWpaRxEapolKeyAvg: Average EAPOL Key frames received per virtual stationWpaRxEapolKeyMax: Maximum EAPOL Key frames received per virtual stationWpaRxEapolKeyMin: Minimum EAPOL Key frames received per virtual stationWpaRxEapolLenErr: Total EAPOL frames received with an invalid packet body length per virtual stationWpaRxEapolLenErrAvg: Average EAPOL frames received with an invalid packet body length per virtual stationWpaRxEapolLenErrMax: Maximum EAPOL frames received with an invalid packet body length per virtual stationWpaRxEapolLenErrMin: Minimum EAPOL frames received with an invalid packet body length per virtual stationWpaRxEapolMax: Maximum EAPOL frames received (any type) per virtual sta-tion
Statistics CountersSummary Statistics7-12 IxWLAN User Guide, Release 6.207WpaRxEapolMin: Minimum EAPOL frames received (any type) per virtual sta-tionWpaRxEapolReq: Total EAPOL Request frames received (other than Rq/Id) per virtual stationWpaRxEapolReqAvg: Average EAPOL Request frames received (other than Rq/Id) per virtual stationWpaRxEapolReqId: Total EAP Req/Id frames received per virtual stationWpaRxEapolReqIdAvg: Average EAP Req/Id frames received per virtual stationWpaRxEapolReqIdMax: Maximum EAP Req/Id frames received per virtual sta-tionWpaRxEapolReqIdMin: Minimum EAP Req/Id frames received per virtual sta-tionWpaRxEapolReqMax: Maximum EAPOL Request frames received (other than Rq/Id) per virtual stationWpaRxEapolReqMin: Minimum EAPOL Request frames received (other than Rq/Id) per virtual stationWpaRxGrpMsg1: Total Group Key Handshake Msg1 frames received per virtual stationWpaRxGrpMsg1Avg: Average Group Key Handshake Msg1 frames received per virtual stationWpaRxGrpMsg1Max: Maximum Group Key Handshake Msg1 frames received per virtual stationWpaRxGrpMsg1Min: Minimum Group Key Handshake Msg1 frames received per virtual stationWpaRxMsg1: Total 4Way Handshake Msg1 frames received per virtual stationWpaRxMsg1Avg: Average 4Way Handshake Msg1 frames received per virtual stationWpaRxMsg1Max: Maximum 4Way Handshake Msg1 frames received per virtual stationWpaRxMsg1Min: Minimum 4Way Handshake Msg1 frames received per virtual stationWpaRxMsg3: Total 4Way Handshake Msg3 frames received per virtual stationWpaRxMsg3Avg: Average 4Way Handshake Msg3 frames received per virtual station
IxWLAN User Guide, Release 6.20 7-13Statistics CountersSummary StatisticsWpaRxMsg3Max: Maximum 4Way Handshake Msg3 frames received per virtual stationWpaRxMsg3Min: Minimum 4Way Handshake Msg3 frames received per virtual stationWpaTkipIcvErr: Total TKIP ICV errors detected when decrypting packets per virtual stationWpaTkipIcvErrAvg: Average TKIP ICV errors detected when decrypting packets per virtual stationWpaTkipIcvErrMax: Maximum TKIP ICV errors detected when decrypting packets per virtual stationWpaTkipIcvErrMin: Minimum TKIP ICV errors detected when decrypting pack-ets per virtual stationWpaTkipMicFail: Total MIC failures encountered when checking the integrity of packets received per virtual stationWpaTkipMicFailAvg: Average MIC failures encountered when checking the integrity of packets received per virtual stationWpaTkipMicFailMax: Maximum MIC failures encountered when checking the integrity of packets received per virtual stationWpaTkipMicFailMin: Minimum MIC failures encountered when checking the integrity of packets received per virtual stationWpaTkipRplFail: Total TKIP replay errors detected per virtual stationWpaTkipRplFailAvg: Average TKIP replay errors detected per virtual stationWpaTkipRplFailMax: Maximum TKIP replay errors detected per virtual stationWpaTkipRplFailMin: Minimum TKIP replay errors detected per virtual stationWpaTxEapol: Total EAPOL frames transmitted (any type) per virtual stationWpaTxEapolAvg: Average EAPOL frames transmitted (any type) per virtual sta-tionWpaTxEapolKey: Total EAPOL Key frames transmitted per virtual stationWpaTxEapolKeyAvg: Average EAPOL Key frames transmitted per virtual sta-tionWpaTxEapolKeyMax: Maximum EAPOL Key frames transmitted per virtual sta-tion
Statistics CountersSummary Statistics7-14 IxWLAN User Guide, Release 6.207WpaTxEapolKeyMin: Minimum EAPOL Key frames transmitted per virtual sta-tionWpaTxEapolMax: Maximum EAPOL frames transmitted (any type) per virtual stationWpaTxEapolMin: Minimum EAPOL frames transmitted (any type) per virtual stationWpaTxEapolRsp: Total EAP response frames (other than Resp/Id) transmitted per virtual stationWpaTxEapolRspAvg: Average EAP response frames (other than Resp/Id) trans-mitted per virtual stationWpaTxEapolRspId: Total EAP Resp/Id frames transmitted per virtual stationWpaTxEapolRspIdAvg: Average EAP Resp/Id frames transmitted per virtual sta-tionWpaTxEapolRspIdMax: Maximum EAP Resp/Id frames transmitted per virtual stationWpaTxEapolRspIdMin: Minimum EAP Resp/Id frames transmitted per virtual stationWpaTxEapolRspMax: Maximum EAP response frames (other than Resp/Id) transmitted per virtual stationWpaTxEapolRspMin: Minimum EAP response frames (other than Resp/Id) trans-mitted per virtual station. WpaTxEapolSt: Total EAPOL start frames transmitted per virtual stationWpaTxEapolStAvg: Average EAPOL start frames transmitted per virtual stationWpaTxEapolStMax: Maximum EAPOL start frames transmitted per virtual sta-tionWpaTxEapolStMin: Minimum EAPOL start frames transmitted per virtual stationWpaTxGrpMsg2: Total Group Key Handshake Msg2 frames transmitted per vir-tual stationWpaTxGrpMsg2Avg: Average Group Key Handshake Msg2 frames transmitted per virtual stationWpaTxGrpMsg2Max: Maximum Group Key Handshake Msg2 frames transmit-ted per virtual stationWpaTxGrpMsg2Min: Minimum Group Key Handshake Msg2 frames transmitted per virtual station
IxWLAN User Guide, Release 6.20 7-15Statistics CountersSummary StatisticsWpaTxMicFail: Total EAPOL MIC failure report events transmitted per virtual stationWpaTxMicFailAvg: Average EAPOL MIC failure report events transmitted per virtual stationWpaTxMicFailMax: Maximum EAPOL MIC failure report events transmitted per virtual stationWpaTxMicFailMin: Minimum EAPOL MIC failure report events transmitted per virtual stationWpaTxMsg2: Total 4Way Handshake Msg2 frames transmitted per virtual stationWpaTxMsg2Avg: Average 4Way Handshake Msg2 frames transmitted per virtual stationWpaTxMsg2Max: Maximum 4Way Handshake Msg2 frames transmitted per vir-tual stationWpaTxMsg2Min: Minimum 4Way Handshake Msg2 frames transmitted per vir-tual stationWpaTxMsg4: Total 4Way Handshake Msg4 frames transmitted per virtual stationWpaTxMsg4Avg: Average 4Way Handshake Msg4 frames transmitted per virtual stationWpaTxMsg4Max: Maximum 4Way Handshake Msg4 frames transmitted per vir-tual stationWpaTxMsg4Min: Minimum 4Way Handshake Msg4 frames transmitted per vir-tual stationSummary Roaming StatisticsRoam start-to-stop time: Measures the time during which a station was unable to pass data frames due to roaming.Data-frame-to-data-frame time: Measures the time between successive data frames transmitted or received before and after a Roam.Transmit frames dropped: Count of transmit frames discarded during a Roam
Statistics Counterswport Statistics7-16 IxWLAN User Guide, Release 6.207wport StatisticsIf statistics for a particular wport are selected, one or more of the following val-ues may display:DFS Statistics These statistics display solely if there has been at least one DFS Channel Switch event for a given wport.Ch Sw Tx Discarded: Transmit frames discarded during the last DFS channel switch execution.Ch Sw Tx Discarded Tot: Total transmit frames discarded during all DFS channel switch executions since last power on.DFS CS Success Count: Total number of successful DFS channel switchesDFS CS Failure Count: Total number of failed DFS channel switchesDFS Last Channel Sw: Status of last DFS channel switch—failed or succeededChan move time: Time it took to execute the last DFS channel switch, in millisec-ondsChan tx closing time: Time to stops transmission on an original channel after receiving DFS channel switch event, in millisecondsExample:[wport1]IxWLAN -> get wport 1 statswport1: MAC 00:02:6f:20:f8:d1Authentications: 0, Deauthentications: 0Associations: 0, Disassociations: 0Reassociations: 0Rcv Sig Strength: 35, Ack Sig Strength: 0Rcv Rate: 6, Tx SF Rate: 6, Tx LF Rate: 6Frame counts: MSDUs Data Mcast Mgmt CtrlRcv 8080 0 0 8080 0Tx 0 0 0 0 0Rcv Errors: 0, Tx Errors: 0Rcv PHY Errors: 0, Excess Retries: 0Rcv CRC Errors: 0, Total Retries: 0Rcv Duplicates: 0, Tx Filtered: 0Rcv Discarded: 2, Tx Discarded: 0Ack Rcv Fails: 0, RTS Fails: 0Encryption: n/a, FCS Fails: 0Rcv Decrypt Errs: 0, WEP Excluded: 0Ch Sw Tx Discarded: 0, Ch Sw Tx Discarded Tot: 0DFS CS Success Count: 2DFS CS Failure Count: 0DFS Last Channel Sw: SuccededChan move time: 2.509 msecChan tx closing time: 0.049 msec
IxWLAN User Guide, Release 6.20 7-17Statistics Counterswport Statisticswport Counters The wport counters provide an aggregation of all vSTAs on a specific wport. For further information, please refer to Individual Virtual Station Counters on page 7-1 and Summary Statistics on page 7-7.
Statistics Counterswport Statistics7-18 IxWLAN User Guide, Release 6.207
IxWLAN User Guide, Release 6.20 8-18Chapter 8: Troubleshooting This chapter covers the following topics: \•Login Name and/or Password Recovery on page 8-1.•Using a Third-Party Load Generator on page 8-2.•Chassis Installation and LEDs on page 8-2.•Web-Based User Interface Problems on page 8-3.•Missing Key File on page 8-7.•Recovering a Corrupted Firmware File on page 8-9.•Configuration Records on page 8-14.Login Name and/or Password RecoveryIf the configuration records for your IxWLAN are lost and you do not remember the user name or password, it may not be possible to log on to the device. If this should happen, a special logon sequence prompts IxWLAN to reset the logon name and password to their factory defaults.•Open a serial or telnet connection to the device.•At the logon prompt, type RESET in response to the IxWLAN logon prompt and FACTORY in response to the Password prompt. Both are case-sensitive.IxWLAN login: RESETPassword: *******In response to this sequence, IxWLAN resets both the logon user name and the logon password to factory defaults (User Name: Admin, Password: IxWLAN). A new configuration file with the reset logon and password is written to the Flash file system, and IxWLAN requires a new logon operation. No other configuration parameters are affected by this operation.
TroubleshootingUsing a Third-Party Load Generator8-2 IxWLAN User Guide, Release 6.208You may now log on using the factory default logon name (Admin) and pass-word (IxWLAN). Following successful logon, you may use the set login or set password CLI commands to set these parameters as desired. Be sure to record the new settings for future reference. See Configuration Records on page 8-14.Using a Third-Party Load GeneratorSymptom: Telnet or the Web Client becomes unresponsive during a test or can-not connect at the conclusion of a test. Possible problems: •If your Load Generator exceeds the maximum 802.3 rate specified in IxW-LAN Specifications during a test: •Telnet and/or the Web Client may not be able to establish a new connec-tion. •If connected, Telnet and/or the Web Client may lose connectivity to IxW-LAN. •If Telnet or the Web Client become unresponsive during a test or cannot con-nect at the conclusion of a test, make sure your Load Generator is not responding to ARP requests that are targeted to the IxWLAN address. If this occurs, the ARP request transmitted from the PC Client (running Telnet) or the Web Client in a bid to obtain the MAC address of an IP address, responds with the Load Generator's MAC address instead of IxWLAN's MAC address. All data sourced from the PC client would incorrectly be destined to the Load Generator instead of IxWLAN.Chassis Installation and LEDsWhen you attach the Ethernet cable between the command PC and the IxWLAN SED/SED-MR+ chassis, the Ethernet link LED should flash momentarily and then light ON (solid). This should occur if you are attaching directly to the IxW-LAN SED/SED-MR+ chassis using a crossover cable or through a hub or switch using a straight cable. If the LED remains OFF, check the cable connections. If the LED remains OFF, one or more of the following problems may exist:•Incorrect or defective cable•Defective hub or switch•the wrong port on a hub or switch is used (that is, uplink port instead of 10/100 port)
IxWLAN User Guide, Release 6.20 8-3TroubleshootingWeb-Based User Interface ProblemsWeb-Based User Interface ProblemsThe following section describes how to correct some of the more common prob-lems that may occur in the Web-Based User Interface:•Security Settings on page 8-3.•Login Error on page 8-4.•Splash Page Error on page 8-5.•IxWLAN Busy or Not Responding on page 8-5.•Loading Files from the Command PC on page 8-7.Security Settings Add the IxWLAN IP Address to your list of Trusted Sites and set the security level to Low for trusted sites, as shown in Figure 8-1.Figure 8-1. Security Settings•Select Internet Options from the Tools menu in Internet Explorer.•Click the Security tab in the Internet Options dialog.•Click the Trusted sites icon.•Set the Security level for this zone to Low. If the security level for the zone is not Low, set the default level to Low.•Click the Sites… button.
TroubleshootingWeb-Based User Interface Problems8-4 IxWLAN User Guide, Release 6.208•In the Trusted sites dialog, enter the IxWLAN IP address in the Add this Web site to the zone field and click the Add button. Make sure that the Require server verification (https:) for all sites in this zone field is not checked.•Click OK in the Trusted sites dialog.•Click OK in the Internet Options dialog.Startup ErrorThe web-based user interface needs Internet Explorer 6.0 or higher. In addition, the Check for newer versions of stored pages on every visit to the page option must be selected under Temporary Internet files settings. If this option is not selected, the dialog shown in Figure 8-2 opens.Figure 8-2. Startup ErrorIf this dialog displays:•Select Internet Options from the Tools menu in Internet Explorer.•Select the General tab in the Internet Options dialog.•Click the Settings… button in the Temporary Internet Files section of the dia-log.•In the Settings dialog, make sure that the Every visit to page radio button is clicked under Check for newer versions of stored pages. Click OK to close the Settings dialog and return to the Internet Options dialog.•Click the Continue button in the Error—Web Page Dialog.Login Error If you are running a personal firewall product (for example, ZoneAlarm, McA-fee's software firewall, and so on) on the command PC, the error dialog shown in Figure 8-3 is opened by your browser immediately following successful logon to IxWLAN.Figure 8-3. Logon Error
IxWLAN User Guide, Release 6.20 8-5TroubleshootingWeb-Based User Interface ProblemsIf this error dialog opens, simply click No to continue. This error has no impact on the operation of the web-based user interface or IxWLAN.Splash Page Error The web-based user interface needs pop-ups. If pop-up blocker software is enabled on the command PC, the main page does not display and a message on the splash screen indicates that a pop-up blocker is running, as shown in Figure 8-4. Remember that add-on tool bars, such as Yahoo! or Google tool bars, might block pop-ups by default, so these should be disabled as well. Figure 8-4. Pop-Up BlockedSelect the Privacy tab in the Internet Options dialog and unclick the Block pop-ups checkbox and/or disable any pop-up blocking software that may be running on the command PC.IxWLAN Busy or Not RespondingThe status bar in the top-right corner of the web-based user interface main page shows the status of IxWLAN with the System Under Test, as shown in Figure 8-5. Figure 8-5. Status Bar
TroubleshootingWeb-Based User Interface Problems8-6 IxWLAN User Guide, Release 6.208The status (for example, Online) next to the IxWLAN IP address indicates the current status of IxWLAN with the web-based user interface. This status may intermittently show Busy. If the Busy condition lasts longer than the Polling Timeout specified in the Configure IxWLAN dialog, the status changes to Not Responding and the dialog shown in Figure 8-6 opens. Figure 8-6. Not Responding DialogWhen this dialog opens, the user interface disables all actions until IxWLAN starts responding again. When you click OK to dismiss this dialog, the IxWLAN/System connection status in the status bar shows Offline.•If Busy displays frequently in the status bar, increase the value of the Polling Interval in the Configure IxWLAN dialog (see IxWLAN->Configure IxWLAN on page 4-44).•If the IxWLAN Not Responding dialog displays frequently, increase the value of the IxWLAN Polling Timeout in the Configure IxWLAN dialog (see IxWLAN->Configure IxWLAN on page 4-44). •If the IxWLAN Not Responding dialog continues to display, check the cable connections between the command PC and IxWLAN.•You may also establish a telnet connection to access and log on to the CLI to verify that IxWLAN is responding or not.When the Not Responding status is cleared and the web-based user interface receives a response from IxWLAN, the dialog shown in Figure 8-7 opens.Figure 8-7. IxWLAN Detected
IxWLAN User Guide, Release 6.20 8-7TroubleshootingMissing Key FileLoading Files from the Command PCIf you try to load a scenario file from the command PC using the web-based user interface, the browser may open the warning dialog shown in Figure 8-8.Figure 8-8. Loading Files from the Command PCIf Figure 8-8 opens:•Click Internet Options from the Tools menu in Internet Explorer.•Click the Security tab in the Internet Options dialog.•Click the Trusted sites icon.•Set the Security level for this zone to Low.•Click the Sites… button. In the Trusted sites dialog, enter the IxWLAN IP address in the Add this Web site to the zone field and click the Add button. Make sure that the Require server verification (https:) for all sites in this zone field is not checked.•Click OK in the Trusted sites dialog.•Click OK in the Internet Options dialog.Missing Key FileIxWLAN is offered in the following configurations:•IxWLAN 11a: Supports IEEE 802.11a only.•IxWLAN 11b: Supports IEEE 802.11b only.•IxWLAN 11b/g: Supports IEEE 802.11b and 802.11g.•IxWLAN 11a/b/g: Supports IEEE 802.11a, 802.11b, and 802.11g.•Each of these configurations can be enhanced with a feature key that enables IEEE 802.11i-compliant security features including RSN and WPA operation.Each configuration is shipped with a unique feature key that is stored in the IxW-LAN flash file system. If the keyfile does not exist or is corrupted, or you have requested a feature upgrade, the CLI asks you to enter your authorization code to create the keyfile. There are only two conditions when the authorization code must be entered: •Feature Upgradesand •Corrupted or non-existent keyfile
TroubleshootingMissing Key File8-8 IxWLAN User Guide, Release 6.208If the keyfile is corrupted or does not exist, or you have requested a feature upgrade, you are asked to enter your unique key or authorization code when you establish a telnet or serial connection and log on to the CLI. Example: C:\>telnet 192.168.0.50IxWLAN login: AdminPassword: **Ixia IxWLAN Rev 5.00System date & time: MON MAY 09 00:00:20 2005Use the "set date" or "set time" command to adjustIxia IxWLAN Rev 5.00WLAN mode .................... 802.11aWLAN MAC address ............. 00:02:8a:b6:1e:c9WLAN address mask ............ ff:ff:ff:ff:00:00LAN MAC address .............. 00:0b:16:00:00:57BSSID of System Under Test ... 00:04:e2:38:a7:9cIxWLAN-SUT connection status ..... SUT not detected in most recent scanPower Management mode ........ Active (always awake)MIC Check .................... EnabledCrypto Hardware............... OK0 vSTAs now in the system.IxWLAN -> *** This IxWLAN has not been Node Locked*** Please enter "admin" to continueEnter the admin command and enter Ixia at the password prompt:IxWLAN -> adminPassword: ***OkWhen the administrative mode is activated using this command, the CLI prompts for the authorization code:Please Enter IxWLAN Authorization Codes for MAC: 00:0b:16:00:00:07IxWLAN ->Enter your authorization code at the IxWLAN –> prompt. This authorization code is provided on a separate sheet in your shipping container with IxWLAN. If you have lost your authorization code, please contact Ixia Technical Support (www.ixiacom.com). After you enter the correct authorization code, the CLI shows the following message.Thank you...Authorization Codes AcceptedNOTE: The web-based user interface does not give any indication of a missing keyfile. When the keyfile is missing, the IxWLAN web server does not respond to the browser.
IxWLAN User Guide, Release 6.20 8-9TroubleshootingRecovering a Corrupted Firmware FileWhen this message displays, the keyfile is created in flash and this procedure is no longer needed.Recovering a Corrupted Firmware FileIf you cannot re-establish a telnet connection to the CLI or access the web-based user interface after a new firmware file is loaded, use the supplied serial cable to establish a serial connection between the IxWLAN chassis and the command PC. If the IxWLAN CLI shows the boot prompt ([Boot]:) when connected via the serial connection, this indicates that the firmware file is invalid or corrupted. You may recover the system by completing the following procedure.Needs  •A PC to function as an FTP server.•The IxWLAN firmware file ixwlan.sys•The serial cable that was shipped with IxWLAN•A terminal emulation program (for example, HyperTerminal)•Ethernet cable to connect the IxWLAN chassis with the FTP server over the networkSummary 1. Make the firmware file available on a local FTP server.2. Connect the serial cable and start a terminal emulation session.3. Apply power to the unit and press ESCAPE to show the boot prompt.4. Change the boot parameters to boot over the network.5. Perform file management as necessary.6. Restore the firmware in Flash.7. Reconfigure the boot parameters to boot from Flash.Detailed Steps Step 1: Make the firmware file available on a local FTP server. •The latest IxWLAN firmware file can be downloaded from the Ixia Web site at http://www.ixiacom.com.•You must have an FTP server available, from which IxWLAN can load the firmware file from the network. The ixwlan.sys firmware file must reside on the FTP server and the server must be configured as necessary with a user ID that can reach the folder containing the firmware file.•Use the supplied Ethernet cable to connect the IxWLAN chassis to the net-work where the FTP server resides (that is, typically, the command PC).NOTE: If you have installed IxWLAN version 4.1 or later on a unit that was manufactured before the release of v4.1, your unit may fail in the bootloader due to an older bootrom version. Please refer to the note at the end of this procedure.
TroubleshootingRecovering a Corrupted Firmware File8-10 IxWLAN User Guide, Release 6.208Step 2: Connect the serial cable and start a terminal emulation session. •Use the serial cable that is supplied with the unit to connect the IxWLAN chassis to the command PC. •On the command PC, run a terminal emulation program such as HyperTermi-nal, or some other suitable application. The PC’s COM port must be config-ured at 115200 baud, 8 data bits, 1 stop bit, and no parity.Step 3: Apply power to the IxWLAN chassis and press ESCAPE on the command PC until the Boot ([Boot]:) prompt displays.Step 4: Change the boot parameters to boot over the network.•At the [Boot]: prompt, use the p command (use lowercase letters) to show the current boot parameters. Make a note of this information for future reference.Example:[Boot]: pboot device          : ata:unit number          : 0processor number     : 0file name            : /ata0a/ixwlan.sysinet on ethernet (e) : 192.168.0.50:ffffff00host inet (h)        : 192.168.1.254user (u)             : anonymousftp password (pw)    : ftpflags (f)            : 0x0other (o)            : fei[Boot]: •Use the c command (use lowercase letters) to change boot parameters. •The boot device field must be changed from the Flash file system (ata:0) to the network device (fei0). •The file name field must be changed to the location of the firmware file on your FTP server (for example, c:\temp\ixia\ixwlan.sys). •Press RETURN to move the cursor past any fields that you do not want to change. •The host inet field may need to be changed to the IP address of your FTP server. Fill in the user field with your FTP password, if necessary, per your server configuration. •You may also need to change the IxWLAN IP address and subnet mask (inet on ethernet) and/or the gateway IP address (gateway inet), as necessary, to allow IxWLAN to reach your FTP server over the network.NOTE: The pathname can be no longer than 80 characters and must not contain any spaces.
IxWLAN User Guide, Release 6.20 8-11TroubleshootingRecovering a Corrupted Firmware File•Press RETURN to end each changed field. Press CTRL-D when finished or press RETURN past any remaining fields. Example:[Boot]: c'.' = clear field;  '-' = go to previous field;  ^D = quitboot device          : ata:0 fei0processor number     : 0host name            :file name            : /ata0a/ixwlan.sys C:\Temp\Ixia\ixwlan.sysinet on ethernet (e) : 192.168.0.20:ffffff00inet on backplane (b):host inet (h)        : 192.168.0.101 192.168.0.123gateway inet (g)     :user (u)             : anonymous ^D[Boot]: •Use the p command (use lowercase letters) again to review the edited boot parameters. Example:[Boot]: pboot device          : feiunit number          : 0processor number     : 0file name            : C:\Temp\Ixia\ixwlan.sysinet on ethernet (e) : 192.168.0.20:ffffff00host inet (h)        : 192.168.0.123user (u)             : anonymousftp password (pw)    : my_passwordflags (f)            : 0x0other (o)            : fei[Boot]: •Use the @ command to boot IxWLAN using the current boot parameters. Example:[Boot]: @Attached TCP/IP interface to fei0.Attaching network interface lo0... done.Loading... 18936 + 1294544 + 105600Starting at 0x80480000...Step 5: Perform file management as necessary.•Use the terminal emulation program to log on to the IxWLAN CLI.
TroubleshootingRecovering a Corrupted Firmware File8-12 IxWLAN User Guide, Release 6.208Example:IxWLAN login: AdminPassword: **•Use the ls and ls {dirName} commands to examine the available space in the file system. •It may be necessary to delete unused files to create enough available space for the firmware file. You may want to use the ftp command to save an archive before deleting. Use the rm command to delete a file.Step 6: Restore the boot image in flash. Installing the firmware file into flash can be done from the CLI or the web-based user interface. •See Appendix C, Software Updates, for procedures needed to update system software from the CLI. Use the ls command to verify that the file was prop-erly installed (for example, check the size).•See IxWLAN->Configure IxWLAN on page 4-44 for procedures needed to update system software from the web-based user-interface.Step 7: Reconfigure the boot parameters to boot from Flash.•At the CLI, activate the administrative mode and use the boot command. Example: IxWLAN -> adminPassword: ***OkIxWLAN -> boot flash ixwlan.sys boot device          : ata:unit number          : 0processor number     : 0file name            : /ata0a/ixwlan.sysinet on ethernet (e) : 192.168.0.20:ffffff00host inet (h)        : 192.168.0.123user (u)             : anonymousftp password (pw)    : my_passwordflags (f)            : 0x0other (o)            : fei•This restores the boot parameters to load the system from the firmware file in flash.
IxWLAN User Guide, Release 6.20 8-13TroubleshootingRecovering a Corrupted Firmware FileStep 8: Done! Reboot and resume operations.NOTE: If you have installed firmware version 4.1 or later on an IxWLAN unit that was manufactured before the release of version 4.1, your unit may fail in the bootloader process due to an older boot ROM version. This can be recovered using a boot ROM update procedure that is provided in a separate document that is included with version 4.1+ downloads. If this is the case, you should go to the Ixia Web site (http://www.ixiacom.com), download IxWLAN firmware version earlier than v4.1, proceed as directed in Recovering a Corrupted Firmware File on page 8-9 to boot this version over the network, and perform the bootrom update procedure. You may then install IxWLAN firmware version 4.1 or later.
TroubleshootingConfiguration Records8-14 IxWLAN User Guide, Release 6.208Configuration RecordsPrint the page shown in Table 8-1 and use the form to keep a record of the IxW-LAN configuration parameters.Table 8-1. IxWLAN Configuration ParametersParameters Default CLI Commands Configured ValueIP address 192.168.0.50 set ipaddrSubnet mask 255.255.255.0 set ipmaskGateway 0.0.0.0 set gatewayUsername Admin set loginPassword IxWLAN set passwordWLAN MAC Address (wport1)00:0b:6b:4e:ef:7f set wlanmacWLAN MAC Address (wport2)00:0b:6b:4e:ef:7f set wlanmacWLAN MAC Address (wport3)00:0b:6b:4e:ef:7f set wlanmacWLAN MAC Mask (wport1)ff:ff:ff:ff:00:00 set wlanmaskWLAN MAC Mask (wport2)ff:ff:ff:ff:00:00 set wlanmaskWLAN MAC Mask (wport3)ff:ff:ff:ff:00:00 set wlanmask
IxWLAN User Guide, Release 6.20 8-15TroubleshootingConfiguration RecordsTable 8-1. IxWLAN Configuration Parameters (Continued)Parameters Default CLI Commands Configured Value
TroubleshootingConfiguration Records8-16 IxWLAN User Guide, Release 6.208
IxWLAN User Guide, Release 6.20 A-1AAppendix A: Specifications This appendix covers the following topics: •Hardware on page A-1.•Software on page A-2.HardwareStandards: IEEE 802.3, 802.3u, 802.11a, 802.11b, 802.11g, 802.11i, 802.1XPorts: •IxWLAN SED/SED-MR+ Ports:•(1) 10/100Base-T Ethernet management port, RJ-45 (UTP)•(1) 10/100/1000Base-T Ethernet data port, RJ-45 (UTP)•(1) RS-232 (DB9)•(1) 3-prong power cord receptacleFrequency Range: 802.11a: 5GHz UNII band, 802.11b/g: 2.4 GHz band.Modulation Technology: OFDM and CCK Data Rates:• 54, 48, 36, 24, 18, 9, 6 Mb/s OFDM• 11, 5.5 Mb/s CCK• 2 Mb/s QPSK• 1 Mb/s BPSKMedia Access Control: CSMA/CAWireless Frequency Range:•2.4 to 2.4825 GHz
SoftwareA-2 IxWLAN User Guide, Release 6.20A•4.900 to 5.825 GHzLEDs: •Ethernet Link/Activity•Wireless ActivityAntenna Type: Dual 1.5dBi stable diversity antenna (2.4G/5G). Power software configurable.Physical Dimensions:•IxWLAN SED: L = 8 inches, W = 13 inches, H = 2 inches•IxWLAN SED-MR+: L = 8 inches, W = 13 inches, H = 2 inchesTemperature:•Operating: 0°C to 55°C (32°F to 131°F)•Storing: -40°C to 70°C (-40°F to 158°F)Humidity: 5%-95% Typical, non-condensingSafety and Emissions: FCCChannels supported in GHz: The following are the standard channels set by default for USA usage: 802.11a: 36(5.180), 40(5.200), 44(5.220), 48(5.240), 52(5.260), 56(5.280), 60(5.300), 64 (5.320), 149 (5.745), 153 (5.765), 157 (5.785), 161 (5.805), 165 (5.825). 802.11b/g: 1 (2.412), 2 (2.417), 3 (2.422), 4 (2.427), 5 (2.432), 6 (2.437), 7 (2.442), 8 (2.447), 9 (2.452), 10 (2.457), 11 (2.462). Additional channels, as appropriate, are enabled and supported by set-ting the Country Code (see IxWLAN Commands on page 5-59).SoftwareIxWLAN Core: •IEEE 802.11a, 802.11b, 802.11g•Maximum number of vSTAs: •IxWLAN SED: 64 (59 if all are configured for WPA or RSN authentica-tion)•IxWLAN SED-MR+: 128 (128, if all are configured for WPA or RSN authentication and multiradiomode is static and 59 if multiradiomode is dynamic)Performance:•Average Latency per frame (us) at 54 Mbps: IxWLAN-to-System Under Test: minimum 263, maximum 609, average 279. System Under Test-to-IxWLAN: minimum 279, maximum 574, average 315.
IxWLAN User Guide, Release 6.20 A-3Software•Internal traffic ping rate: 4 pings/s/vSTA with packet size 0...1024 bytes. Maximum rate for IxWLAN SED: 4 x 64=256 packets/sMaximum rate for IxWLAN SED-MR+: 4x128 =512 packets/s.•Rate of vSTA authentication/association management frames: 1 authentica-tion or association each 50 ms.•Network Management: Web-Based browser with JavaScript and Command Line Interface (CLI)•To prevent multiple interfaces from generating extraneous ACK frames in the event that more than one interface is tuned to the same channel when in the dynamic mode, automatic ACK generation is turned off in higher-numbered interfaces. It is possible that this may cause an issue if the device is used in a test in which the antenna is removed and the device is cabled directly to the SUT. Note that conducted operation is not fully supported.Web-Based User Interface:•Maximum number of groups per Scenario: 10•Maximum monitors per Scenario: 4Security:•Cipher Encryption Mode: Shared WEP key, TKIP, or AES-CCM per vSTA•Authentication: Open-System, Shared-Key, RSN, RSN-PSK, WPA or WPA-PSK per vSTA•Up to 4 Shared WEP encryption keys: 40-, 104-, 128-bit for Open-System and Shared Key Authentication•Pre-Shared Key or Passphrase per vSTA for RSN-PSK and WPA-PSK Authentication•Certificate and user ID per vSTA for RSN and WPA Authentication•EAP Algorithm: TLS, TTLS, or PEAP per vSTA for RSN and WPA Authen-tication•Inner Algorithm: MS-CHAPv2 or EAP-MS-CHAPv2 per vSTA for TTLS and PEAP EAP Algorithms.•Outer ID and Password per vSTA for TTLS and PEAP EAP Algorithms.RTS/CTS: Support for RTS/CTS per vSTAFragmentation: Fragment Threshold support per vSTARates: 802.11a: 6, 9, 12, 18, 24, 26, 48, 54 Mbps. 802.11b: 1, 2, 5.5, 11 Mbps. 802.11g: 1, 2, 5.5, 11, 6, 9, 12, 18, 24, 36, 48, 54. Circular Event Log: up to 8000 records. The web-based user interface displays up to the last 100 records.Telnet Sessions: up to 4
PerformanceA-4 IxWLAN User Guide, Release 6.20AMaximum 802.3 packet size: 1518 bytes802.11 Emulation: Fully emulates 802.11 station states in terms of: authentica-tion, association, disassociation, de-authenticationOperational Mode: Constant Awake Mode (CAM) or Power Save ModeExternal mode: Layer 2 traffic or Layer 3 IP/ARP traffic, per vSTADHCP client: available per vSTAInternal Login: user name and passwordFlash size: 3.0 MBytes Total/1.2 MBytes Available for scenarios, event logs, and statistics storagePerformanceTable A-1 shows the calculated theoretical throughput of an 802.11a, b, or g sta-tion when associated with an 802.11-compliant access point. Due to the nature of testing in an 802.11 environment, the results that you experience may vary depending on the device being tested and other system components, as IxWLAN assesses the entire System Under Test. Throughput is shown for unidirectional traffic between a theoretical Station and AP (System Under Test) and is given in Mb/s and Packets-per-second. Calculations for 802.11g assume that the 802.11g AP is set to give compatibility with 802.11b stations, thus degrading overall the-oretical 802.11g throughput.Table A-1. Theoretical Throughput of an 802.11 System802.11a Theoretical unidirectional @54Mbps 802.11b Theoretical unidirectional @11Mbps 802.11g Theoretical Unidirectional @54 Mbps, in 802.11b-Compatibility Mode64 Bytes 2.65 Mbps/5181 pps 0.70 Mbps/1358 pps 0.84 Mbps/1644 pps128 Bytes 5.00 Mbps/4878 pps 1.31 Mbps/1278 pps 1.65 Mbps/1612 pps256 Bytes 9.27 Mbps/4524 pps 2.34 Mbps/1142 pps 3.22 Mbps/1572 pps512 Bytes 15.99 Mbps/3831 pps 3.85 Mbps/941 pps 6.06 Mbps/1479 pps1024 Bytes 24.31 Mbps/2967 pps 5.71 Mbps/697 pps 10.89 Mbps/1329 pps1280 Bytes 27.44 Mbps/2680 pps 6.32 Mbps/617 pps 12.99 Mbps/1269 pps1518 Bytes 29.68 Mbps/2444 pps 6.76 Mbps/557 pps 14.73 Mbps/1213 pps
IxWLAN User Guide, Release 6.20 A-5PerformanceNOTES: 1. Frames include the TCP/IP header, plus the data packet. 2. Data Packet is the payload within the frame. 3. pps = Packets-per-Second.4. Detailed performance results for IxWLAN in terms of throughput (Mb/s and Packets-per-Second) are available upon request from Ixia.
PerformanceA-6 IxWLAN User Guide, Release 6.20A
IxWLAN User Guide, Release 6.20 B-1BAppendix B: Event LoggingThis chapter covers the following topics: •Overview on page B-1.•Event Record Format on page B-2.•CLI Commands on page B-3.•The Web-Based User Interface on page B-4.OverviewDuring normal operation, IxWLAN processes and can log various types of events. When an event is logged, a record of the event is stored for future analy-sis. The event record includes a timestamp, an indicator of the type of event that occurred, and a limited amount of data to describe the event. Event logging is controlled on three levels: •master enable (controlled by set evlog enable/disable) on page B-1.•verbosity level (controlled by set evlog level <level>) on page B-1.•module enable (controlled by set evlog module <module name> enable/disable) on page B-2. master enable (controlled by set evlog enable/disable)The master enables controls whether event logging occurs at all. The master con-trol is independent of other filters. If set evlog disable is used, enabling event logging for a particular module has no effect.verbosity level (controlled by set evlog level <level>)The verbosity level sets an importance threshold for events: at lower verbosity, only more important events are logged; at higher verbosity, less important events may also be logged.
Event Record FormatB-2 IxWLAN User Guide, Release 6.20Bmodule enable (controlled by set evlog module <module name> enable/disable)Each event is processed by a given module or process within IxWLAN. The var-ious processes of the system can be individually enabled for event logging.The event logging function stores event records into a buffer area in memory. The log buffer is a circular buffer that can store 512 event records. The get evlog buffer command can be used to display the contents of the buffer at any time.Event data can also be written to a log file in Flash. When writing to a file is enabled by the set evlog file enable command, the log buffer is flushed to a file every 30 seconds or every time it wraps at the 512-record limit (whichever comes first). There are two log files, A and B. IxWLAN alternates between the two files so that at least one full file is available at any given time. Each log file can store up to 4,000 event records. You can show the records stored in either file using the get evlog file A and get evlog file B CLI commands.Event Record FormatEvent records are printed in the following format:[header]: [message] [optional parameters][header] is a standard header consisting of a timestamp, microsecond clock ref-erence, and sequence number (for example, 12/27/2002, 9:59:57, 2296.320226,11396). timestamp = time the event occurred, taken from the sys-tem clock (for example, 12/27/2002,9:59:57). microsecond clock reference = time in seconds (s), resolution to 1 microsecond ( ), not synchronized to times-tamp (for example, 2296.320226). sequence number = a sequential number assigned to each record (for example, 11396; next event would be 11397, 11398, and so on)[message] is a very brief text string (typically < 15-20 characters) indicating the type of event that occurred (for example, RX: ok indicates a valid 802.11 frame received without error).[optional parameters] describes the specific circumstances of this particular occurrence of the event. It can be up to four 32-bit parameters (for example, pDesc 0x9326c0 hwStatus 01cd803c:0be20203 numRxDesc 9643712).Example:12/27/2002,9:59:57,2296.320226,11396: RX: ok pDesc 0x9326c0 hwStatus 01cd803c:0be20203 numRxDesc 9643712μs
IxWLAN User Guide, Release 6.20 B-3CLI CommandsCLI CommandsThe following CLI commands control event logging:set evlog enable/disable: This is the master control to enable/disable event log-ging (that is, to the event log buffer in RAM). The default is enabled.set evlog level <level>: Sets the verbosity level (0/critical, 1/low, 2/medium, or 3/high) for event logging. The default is critical.set evlog module <module> enable/disable: Enables or disables logging of events from a specified module or process: IxWLAN control, virtual station con-trol, WLAN transmit/receive events, User Interface events, and WPA/RSN events. By default, the following processes are enabled for event logging: IxW-LAN control events, virtual station control events, and WPA/RSN events. The following processes are disabled for event logging: WLAN transmit and receive events and User Interface events. set evlog console enable/disable: Enables or disables logging directly to the console. The default is disabled. When the set evlog console enable command is entered at a CLI console (for example, connected to the serial port or via a telnet session), event data is posted to that console only. No more than one console receives event data at a given time. When the set evlog console disable com-mand is entered at any console, event logging is disabled to all consoles.set evlog file enable/disable: Enables or disables recording logged events to file. The default is disabled.get evlog settings: This command shows the current event log control settings.get evlog buffer [n]: Prints the last n events logged to the log buffer in memory. If [n] is omitted or zero, all events currently in the log buffer display.get evlog file A/B <startRec#> <count>: Shows event records in log file A or B. If no starting record number <startRec#> is given, records display starting with the first record in the file. If no count of records is given, all records display. You can also use “?” to display the number of records in the file.clear evlog file A/B: Clears all records from log file A or B.clear evlog buffer: Clears all event records from the log buffer.save evlog: Flushes all records from the log buffer to the log file, even if log to file is not enabled.NOTE: Event log control settings are not permanent. They are not saved with other configuration controls. They must be entered following startup as desired to change event log operation from the default settings.
The Web-Based User InterfaceB-4 IxWLAN User Guide, Release 6.20BThe Web-Based User InterfaceYou can configure and display the event log by selecting the Logging tab in the web-based user interface side bar. For details, see Event Log Side Bar on page 4-63.
IxWLAN User Guide, Release 6.20 C-1CAppendix C: Software Updates This appendix covers the following topics: •Using the Web-Based User Interface on page C-1.•Using the CLI on page C-3.Using the Web-Based User InterfaceIxWLAN software can be updated using the web-based user interface or the CLI.Click the Update button in the IxWLAN side bar or select Update IxWLAN... from the About menu to open the Update IxWLAN dialog, as shown in Figure C-1.Figure C-1. Update IxWLAN DialogFirmware: To update IxWLAN firmware, check this box and enter the location of the firmware image file on the command PC or click the Browse... button to select the location on the command PC. The Firmware field must be a valid file name with a file type of .SYS (case insensitive) and the file must exist on the command PC.
Using the Web-Based User InterfaceC-2 IxWLAN User Guide, Release 6.20CFeature Key: To update the IxWLAN feature key, check this box and enter the feature key hex string. The Feature Key must be a valid ASCII hex string of exactly 52 characters and a valid feature key.Reboot IxWLAN: Check this box to reboot IxWLAN after the new firmware image or feature key is successfully loaded.Exit or Restart the browser interface: Check the box next to Exit to exit the web-based user interface after the new firmware image or feature key is successfully loaded. Check the box next to Restart to restart the web-based user interface fol-lowing successful IxWLAN update.•Click the Update button to start the IxWLAN Update.•Click the Cancel button to exit this dialog.If this dialog is not completed correctly (for example, invalid or missing firm-ware file, invalid feature key, and so on), the field is highlighted and an error message dialog identifies the error. If the Reboot IxWLAN checkbox is not clicked, a warning dialog opens, as shown in Figure C-2:Figure C-2. Warning Dialog•Click OK to continue IxWLAN Update without Reboot.•Click Cancel to return to the Update IxWLAN dialog.If any errors occur during firmware update (for example, flash file system is full), the error is reported in an error message dialog. If an invalid or corrupted firm-ware image file is specified, the IxWLAN reboot fails. If this condition occurs, the CLI must be used to correct the problem. See Recovering a Corrupted Firmware File on page 8-9.
IxWLAN User Guide, Release 6.20 C-3Using the CLIUsing the CLIComplete the following steps to load a new software file on the IxWLAN chassis flash file system using the CLI.Step 1: If you are already logged on to the CLI, type reboot to return IxWLAN to a known state.rebootStep 2: Use Telnet to log back on to the CLI.C:\>telnet 192.168.0.50IxWLAN login: AdminPassword: ******Ixia IxWLAN Rev 5.00[wport1]IxWLAN -> This step uses the IxWLAN default IP address (192.168.0.50). If you have changed the IP address, use the address that you have previously configured in IxWLAN.Step 3: Use the ls command to verify that there is enough space in the flash file system for the new software. [wport1]IxWLAN -> lsStep 4: Compare the bytes free count to the size of the software file that you want to download. If there is not enough space, use the rm command to remove one or more files from flash. Do not remove: keyfile, eecfg, or ixwlan.sys.[wport1]IxWLAN -> rm <file_name>Step 5: You must have an FTP server running to complete this step. In the CLI, enter the ftp command and the command PC’s IP address.[wport1]IxWLAN -> ftp 192.168.0.2Step 6: Enter your FTP server user name and password. Press RETURN in response to either prompt, if there is no user name or password.Username: <your_user_name>Password: <your_password>Step 7: At the prompt for a remote file, provide the pathname to the latest ixwlan.sys file on your PC (for example, c:\ixwlan.sys). For the local file, use ixwlanNEW.sys. Enter download at the download or upload prompt.
Using the CLIC-4 IxWLAN User Guide, Release 6.20CRemote File: c:\ixwlan.sysLocal File: ixwlanNEW.sysdownload or upload: downGetting @192.168.0.2:c:\ixwlan.sys -> ixwlanNEW.sys###########################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################done1007441 bytes[wport1]IxWLAN ->Step 8: When the transfer completes, use the ls command to verify that the size of the file in Flash has the same number of bytes as the file on the FTP server/command PC.[wport1]IxWLAN -> lsStep 9: At the IxWLAN -> prompt, type the following command to move the file and use the correct boot name.[wport1]IxWLAN -> mv ixwlanNEW.sys ixwlan.sysStep 10: When the move is complete, use the ls command to verify that the file has been moved with the correct name.[wport1]IxWLAN -> lsStep 11: Use the reboot command to reboot IxWLAN and activate the new software.[wport1]IxWLAN -> rebootAfter reboot, you must re-establish the telnet session to log back on to the CLI. •If you are not able to re-establish the telnet session after a software update, see Recovering a Corrupted Firmware File on page 8-9.•If the CLI displays the “This IxWLAN has not been Node Locked” message after you enter the logon name and password, see Missing Key File on page 8-7.
IxWLAN User Guide, Release 6.20 C-5Using the CLIIf you are using the web-based user interface, you must clear the Internet Explorer cache after a software upgrade.•From Internet Explorer, select Tools->Internet Options.•From Internet Options, under Temporary Internet files, click the Delete Files…button.•From Delete Files, click Delete all offline content, then OK.
Using the CLIC-6 IxWLAN User Guide, Release 6.20C
IxWLAN User Guide, Release 6.20 D-1DAppendix D: Cable Pin Assignments This appendix covers the following topics: •Standard Ethernet Cable on page D-1.•Ethernet Crossover Cable on page D-2.•RJ-45 Connector on page D-2.•Serial Cable on page D-3.Standard Ethernet CableA straight cable can be used to connect the Command PC to a hub and the hub to the IxWLAN SED/SED-MR+ chassis. For a straight cable, the wires match one for one (Figure D-1). This cable is not provided with IxWLAN.Figure D-1. Connecting via Standard Ethernet Cable Pin 1: Rx+Pin 2: Rx-Pin 3: Tx+Pin 4: Not UsedPin 5: Not UsedPin 6: Tx-Pin 7: Not UsedPin 8: Not Used
Ethernet Crossover CableD-2 IxWLAN User Guide, Release 6.20DEthernet Crossover CableA crossover cable must be used to connect the Command PC directly to the IxW-LAN SED/SED-MR+ chassis (Figure D-2). This cable is provided with IxW-LAN.Figure D-2. Connecting via Ethernet Crossover CableRJ-45 ConnectorRefer to Figure D-3.Figure D-3. RJ-45 ConnectorPin 1: Rx+Pin 2: Rx-Pin 3: Tx+Pin 4: Not UsedPin 5: Not UsedPin 6: Tx-Pin 7: Not UsedPin 8: Not Used
IxWLAN User Guide, Release 6.20 D-3Serial CableSerial CableTable D-1 shows the connector pin assignments for the DB9 connector. The pro-vided serial cable is a straight cable with female and male connectors. In this table, DTE refers to the local or IxWLAN side of the connection, while DCE is the remote side. Table D-1. DB-9 Connector AssignmentsDB-9 Signal Direction Signal Name1 x Protective Ground3 DTE-to-DCE Transmitted Data2 DCE-to-DTE Received Data7 DTE-to-DCE Request To Send8 DCE-to-DTE Clear To Send6 DCE-to-DTE Data Set Ready5 x Signal Ground1 DCE-to-DTE Received Line Signal Detector (Carrier Detect)4 DTE-to-DCE Data Terminal Ready9 DCE-to-DTE Ring Indicator
Serial CableD-4 IxWLAN User Guide, Release 6.20D
IxWLAN User Guide, Release 6.20 E-1EAppendix E: Error and Status Messages The CLI may show the following error and status messages in response to incor-rect or unexpected user actions or WLAN activity.•IxWLAN or Virtual Station Control Messages on page E-1.•WLAN Driver Error Messages on page E-5.•MAC Layer Management Messages on page E-6.•Standard 802.11 WLAN Reason Codes on page E-7.•Standard 802.11 WLAN Status Codes on page E-8.IxWLAN or Virtual Station Control MessagesAuthentication suite invalid or not set: This message is related to missing or inconsistent Information Element fields/values (related to security). The security Information Elements are in Beacon frames (broadcast by a System Under Test), Probe Response frames (transmitted by a System Under Test), and Association Requests frames (transmitted by a vSTA). The WPA Information Element includes entries that are used to negotiate the authentication algorithm and data encryption algorithm. When enabled by a feature key, IxWLAN supports the Pre-Shared Key over 802.1X authentication algorithm. This message indicates that the vSTA has not been configured for WPA-PSK.Can’t add entry to ARP table: This message is generated when the system tries to add an IP/MAC address pair to the ARP table and the operation fails. This message indicates that the IP address is already in the ARP table, some other net-work node has claimed the same IP address, or system resources are low.Can’t allocate TLS session resource: The system is unable to allocate memory for a TLS (Transport Layer Security) session related resource. This message indi-cates a system level condition, as there should always be enough memory for the maximum number of WPA or RSN vSTAs.
IxWLAN or Virtual Station Control MessagesE-2 IxWLAN User Guide, Release 6.20ECan't resolve gateway's address: The target IP address (internal mode vSTA) is not on the same IP subnet/net as IxWLAN. IxWLAN must forward the Ping frames to a gateway (through which the target may be reached). To forward frames to the gateway, IxWLAN must resolve the gateway's MAC address. This is done by issuing ARP (Address Resolution Protocol) requests for the gateway's MAC address. The error message indicates that the gateway is either not up or not responding to ARP requests. The gateway must be on the same IP subnet/net as IxWLAN.Can't resolve target's address: The target host is not responding to IxWLAN ARP requests. In order for IxWLAN to forward Ping frames to the target IP address, IxWLAN must resolve the target's MAC address. This is done by issu-ing ARP (Address Resolution Protocol) requests for the target's MAC address. The error message indicates that the target is either not up or not responding to ARP requests. The target host must be on the same IP subnet/net as IxWLAN or on the same IP subnet/net as IxWLAN's gateway.Certfile not configured: The certfile attribute for the specified vSTA has not been set. This attribute is needed in order for IxWLAN to find and parse the user’s certificate.Certfile not found: The certificate file specified by the certfile attribute for the specified vSTA was not found on the IxWLAN flash file system. Certificate’s public key doesn’t match private key: An incorrect key pair is being used. Most likely the certificate was not generated correctly.Certificate’s user password not set: When the certificate represented by the certfile attribute was generated, the user password field was not specified.DHCP Discover/Request timed out: A DHCP server has not responded to IxW-LAN's (vSTA) DHCP discovery frame or to a DHCP request frame within ~32 seconds (4 retries, 8 second interval between tries). Neither the timeout value nor the interval value is user configurable.DHCP IP offered already in use: The address offered by the DHCP server is already assigned to a vSTA.DHCP Lease expired: The lease on an IP address has expired. IP addresses are “leased” for a period of time and may or may not be renewed.IxWLAN Lost SUT (no beacons): IxWLAN was joined with the System Under Test but has stopped receiving beacons from it.IxWLAN Not joined with System Under Test: A requested operation could not be performed because IxWLAN is not joined with a System Under Test.vSTA Timed out 4-way handshake: IxWLAN has timed out the AKMP 4-way handshake. This message indicates that either message 1 or message 3 has not been received for the specified vSTA. The vSTA's kmTimeout attribute speci-fies the timeout value in milliseconds (ms).
IxWLAN User Guide, Release 6.20 E-3IxWLAN or Virtual Station Control MessagesvSTA Timed out TLS handshake: The TLS (Transport Layer Security) hand-shake has been timed out by IxWLAN for a given vSTA. This occurs when IxW-LAN is expecting a TLS response from the Authenticator that has not arrived within a specified time period.Internal system error: Requested operation resulted in an unspecified internal error.Invalid message identifier: Internal error—the vSTA control task received a Command message with an invalid message identifier.Invalid object identifier: The vSTA control task received a GET or SET Com-mand message with an invalid Object identifier.Invalid object value: The vSTA control task received a SET Command message with an invalid object value.Invalid operation: Internal error—the vSTA control task received a Command message with an invalid operation code.Invalid vSTA identifier: The vSTA control task received a Command message with an invalid vSTA identifier.Invalid vSTA state for operation: A requested operation could not be per-formed because the specified vSTA is not in the appropriate state.Multicast Cipher invalid or not set: This message is related to missing or inconsistent Information Element fields/values (related to security). The security Information Elements are in Beacon frames (broadcast by a System Under Test), Probe Response frames (transmitted by a System Under Test), and Association Requests frames (transmitted by a vSTA). The WPA Information Element includes entries that are used to negotiate the authentication algorithm and data encryption algorithm. IxWLAN supports: none, WEP, TKIP, or AES-CCM mul-ticast ciphers. This message indicates that the vSTA has not been configured with a valid cipher setting (not set or does not match what the System Under Test allows/wants).No AUTH/ASSOC response from AP: This message is generated if IxWLAN timeout logic has timed out the auth/assoc request (set vsta n timeout).Pre-Shared Key not set: Either the passPhrase or the PSK (Pre-Shared Key) attribute for the specified vSTA has not been set. Note that IxWLAN can use the passPhrase value to generate the Pre-Shared Key.Server denied access: IxWLAN received an EAP_FAILURE message for the specified vSTA. TLS Error, see event log: This message is generated when the TLS (Transport Layer Security) stack has reported errors for the previous operation. In some cases, more than a single error may have occurred. Each error is recorded in the event log and may be viewed using the get evlog buffer command or the get evlog file command (if logging to file has been enabled). These errors usually
IxWLAN or Virtual Station Control MessagesE-4 IxWLAN User Guide, Release 6.20Eindicate some problem with a certificate, namely, wrong format, invalid content, and so on. The following is an example of the event log output generated by using an invalid certificate:IxWLAN -> assoc vsta 1IxWLAN -> Error:TLS Error, see event logIxWLAN -> get evlog file a10/24/2004,2:19:54,245860.029095,42, vSTA 1: SSL error: pk12_read:Error reading PKCS#12 file10/24/2004,2:19:54,245860.029136,43, vSTA 1: SSL error 0x0d0680a8: lib asn1 encoding routines, func ASN1_CHECK_TLEN, reason wrong tag10/24/2004,2:19:54,245860.029176,44, vSTA 1: SSL error 0x0d07803a: lib asn1 encoding routines, func ASN1_ITEM_EX_D2I, reason nested asn1 error, Type=PKCS12Too many WPA vSTAs, maximum allowed is 59: This message is generated when the 60th WPA vSTA tries to associate. Although you may configure up to 64 WPA vSTAs, only 59 may be associated at one time.Unicast Cipher invalid or not set: This message is related to missing or incon-sistent Information Element fields/values (related to security). The security Infor-mation Elements are in Beacon frames (broadcast by a System Under Test), Probe Response frames (transmitted by a System Under Test), and Association Requests frames (transmitted by a vSTA). The WPA Information Element includes entries that are used to negotiate the authentication algorithm and data encryption algorithm. IxWLAN supports: none, WEP, TKIP, or AES-CCM uni-cast ciphers. This message indicates that the vSTA has not been configured with a valid cipher setting (not set or does not match what the System Under Test allows/wants).User ID not configured: The userid attribute for the specified vSTA has not been set. This attribute is needed for use in the EAP Identity Response.vSTA idle: A requested operation could not be performed because the specified vSTA is in the Idle state.vSTA is configured for DHCP: The virtual station is configured with DHCP mode set to on or auto.vSTA is not configured for DHCP: This message can be generated in response to an acquireip or releaseip command when the specified virtual station is not configured with DHCP mode set to on or auto.vSTA not configured: A requested operation could not be performed because the specified vSTA has not been configured.vSTA not idle: A requested operation could not be performed because the speci-fied vSTA is busy.vSTA not initialized: A requested operation could not be performed because the specified vSTA has not been initialized.
IxWLAN User Guide, Release 6.20 E-5WLAN Driver Error MessagesvStaControl() Err writing NOTIFY into UI's queue: The vSTA control task cannot post a message because the UI task queue is full. This may occur if a web user logs out while IxWLAN is running.vStaControl() Task for NOTIFY no longer exists: The vSTA control task can-not post a message because the UI task is no longer present. This may occur if a telnet user logs out while IxWLAN is running.wport <N> not supported: the <N> wport number is not supported for the initi-ated CLI session.WLAN Driver Error MessagesThese messages may be opened as the error text in a NOTIFY message or as a message on IxWLAN's console. These error messages apply only to internal mode vSTAs transmitting data frames.WLAN DRV:No WLAN device: The WLAN device is not present or not started or IxWLAN has lost contact with the AP.WLAN DRV:No ATL table entry: There is no entry in the Address Translation Logic table for the vSTA sending the frame.WLAN DRV:Invalid ATL entry state: The current state of the vSTA's Address Translation Logic table entry does not allow transmission of the frame.WLAN DRV:TXQ Limit exceeded: Too many frames are queued for transmis-sion.WLAN DRV:No descriptors available: There are no free WLAN descriptor blocks. This is a transient condition that could be caused by extreme network congestion.WLAN DRV:802.11 encapsulation error: An error occurred while encapsulat-ing the frame for transmission.WLAN DRV:802.11 transmit call failed: An error occurred while preparing the frame for transmission.WLAN DRV:Not associated: The vSTA is not 802.11 associated. The vSTA may have been deauthenticated by the AP during the process of sending the frame.WLAN DRV:Invalid vSTA identifier: The vSTA identifier associated with the frame is not valid or is no longer valid.
MAC Layer Management MessagesE-6 IxWLAN User Guide, Release 6.20EMAC Layer Management MessagesInvalid parameter: Internal error—an MLME function was invoked with an invalid parameter.MLME Already in BSS: Internal error—a requested MLME function was rejected because IxWLAN is already a member of a BSS.MLME Driver error: Internal error—an MLME function encountered an unspecified error in the device driver.MLME Op not supported: Internal error—an MLME function was invoked that is not supported in the current configuration.MLME Op refused: Internal error—a requested MLME function was rejected due to other current system activity.MLME No ACK from AP: An invoked MLME function (for example, Authen-tication or Association) did not complete within the programmed timing parame-ters.MLME Too many requests: Internal error—an MLME function was invoked repeatedly without adequate completion.
IxWLAN User Guide, Release 6.20 E-7Standard 802.11 WLAN Reason CodesStandard 802.11 WLAN Reason CodesTable E-1. 802.11 Reason Codes802.11 Reason CodeMessage Text: Description1 1: Unspecified: Unspecified reason2 2: Authentication expired: Previous authentication of a station is no longer valid.3 3: Leaving: Station deauthentication or disassociation because the station is leaving a BSS4 4: Inactivity: A station was disassociated due to inactivity5 5: Too many associations: System Under Test cannot handle all currently associated stations.6 6: Class 2 frame received vSTA not AUTH: A class 2 frame was received from a nonauthenticated station.7 7: Class 3 frame received vSTA not ASSOC: A class 3 frame was received from a non-associated station.8 8: Leaving9 9: Not authenticated: Station requesting association is not authenticated.10 10: Reserved11 11: Enhanced security needed by IE12 12: Enhanced security used inconsistently13 13: Invalid information element14 14: MIC Failure15 15: 4-way handshake timeout16 16: Group key update timeout17 17: 4-way handshake IE mismatch18 18: Multicast cipher invalid19 19: Unicast cipher invalid20 20: AKMP invalid21 21: Unsupported RSNE version22 22: Invalid RSNE capabilities
Standard 802.11 WLAN Status CodesE-8 IxWLAN User Guide, Release 6.20EStandard 802.11 WLAN Status Codes23 23: 802.1X Authentication failed24 24: Cipher suite rejected per security policyTable E-1. 802.11 Reason Codes (Continued)802.11 Reason CodeMessage Text: DescriptionTable E-2. 802.11 WLAN Status Codes802.11 Status Code Message Text1 1: Unspecified failure2 - 9 Reserved10 10: Can’t support all requested capabilities11 11: Reassociation denied – Can’t confirm association exists12 12: Association denied – Reason outside scope of standard13 13: Specified algorithm not supported14 14: Authentication frame with unexpected sequence15 15: Authentication rejected – challenge failure16 16: Authentication rejected – next frame timed out17 17: Association denied – too many stations18 18: Association denied – STA does not support all data rates19 19: Association denied – STA does not support short preamble20 20: Association denied – STA does not support PBCC21 21: Association denied – STA does not support channel agility22 22: Association denied - Spectrum Mgmt capability needed23 23: Association denied - Power Capability info unacceptable24 24: Association denied - Supported Channels info unacceptable25 25: Association denied – STA does not support short slot time
IxWLAN User Guide, Release 6.20 E-9Standard 802.11 WLAN Status Codes26 26: Association denied – STA does not support DSSS-OFDM27-39 Reserved40 40: Invalid information element41 41: Invalid group cipher42 42: Invalid pairwise cipher43 43: Invalid AKMP44 44: Unsupported RSN information element version45 45: Invalid RSN information element capabilities46 46: Cipher suite rejected per security policy47 47: Association denied - Listen Interval too largeTable E-2. 802.11 WLAN Status Codes (Continued)802.11 Status Code Message Text
Standard 802.11 WLAN Status CodesE-10 IxWLAN User Guide, Release 6.20E
IxWLAN User Guide, Release 6.20 F-1FAppendix F: Additional Copyright and Trademark Notices Some or all of the following notices may or may not apply depending on the fea-tures in IxWLAN.•The GoAhead WebServer: Copyright © 2003 GoAhead Software, Inc. All rights reserved.•OpenSSL: Copyright (c) 1998-2003 The OpenSSL Project. All rights reserved.Redistribution and use in source and binary forms, with or without modifica-tion, are permitted given that the following conditions are met:•Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer. •Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials given with the distribution.•All advertising materials mentioning features or use of this software must display the following acknowledgment: “This product includes software developed by the OpenSSL Project for use in the OpenSSL Toolkit. (http://www.openssl.org/)”•The names “OpenSSL Toolkit” and “OpenSSL Project” must not be used to endorse or promote products derived from this software without prior written permission. For written permission, please contact openssl-core@openssl.org.•Products derived from this software may not be called “OpenSSL” nor may “OpenSSL” appear in their names without prior written permission of the OpenSSL Project.•Redistributions of any form whatsoever must retain the following acknowledgment: “This product includes software developed by the OpenSSL Project for use in the OpenSSL Toolkit (http://www.openssl.org)”THIS SOFTWARE IS GIVEN BY THE OpenSSL PROJECT “AS IS” AND ANY EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANT-
F-2 IxWLAN User Guide, Release 6.20FABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DIS-CLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCI-DENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTI-TUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THE-ORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.This product includes cryptographic software written by Eric Young (eay@cryptsoft.com). This product includes software written by Tim Hudson (tjh@cryptsoft.com).Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) All rights reserved.This package is an SSL implementation written by Eric Young (eay@crypt-soft.com).The implementation was written so as to conform with Netscapes SSL. This library is free for commercial and non-commercial use as long as the follow-ing conditions are aheared to. The following conditions apply to all code found in this distribution, be it the RC4, RSA, lhash, DES, etc., code; not just the SSL code. The SSL documentation included with this distribution is cov-ered by the same copyright terms except that the holder is Tim Hudson (tjh@cryptsoft.com).Copyright remains Eric Young's, and as such any Copyright notices in the code are not to be removed. If this package is used in a product, Eric Young should be given attribution as the author of the parts of the library used. This can be in the form of a textual message at program startup or in documenta-tion (online or textual) given with the package.Redistribution and use in source and binary forms, with or without modifica-tion, are permitted given that the following conditions are met:•Redistributions of source code must retain the copyright notice, this list of conditions and the following disclaimer.•Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials given with the distribution.•All advertising materials mentioning features or use of this software must display the following acknowledgement: “This product includes crypto-graphic software written by Eric Young (eay@cryptsoft.com)”. The word 'cryptographic' can be left out if the routines from the library being used are not cryptographic related.•If you include any Windows specific code (or a derivative thereof) from the apps directory (application code) you must include an acknowledge-ment: “This product includes software written by Tim Hudson (tjh@crypt-soft.com)”.
IxWLAN User Guide, Release 6.20 F-3THIS SOFTWARE IS GIVEN BY ERIC YOUNG “AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIM-ITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CON-TRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.The license and distribution terms for any publicly available version or deriv-ative of this code cannot be changed. that is this code cannot simply be copied and put under another distribution license [including the GNU Public License.]•XSupplicant -- A client-side 802.1x implementation This code is released under both the GPL version 2 and BSD licenses. Either license may be used. The respective licenses are.Copyright (C) 2002 Bryan D. Payne & Nick L. Petroni Jr.Copyright (C) 2003, 2004 The Open1x TeamAll Rights Reserved--- GPL Version 2 License ---This program is free software; you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Soft-ware Foundation; either version 2 of the License, or (at your option) any later version.This program is distributed in the hope that it is useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Pub-lic License for more details.You should have received a copy of the GNU General Public License along with this program; if not, write to the Free Software Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA. --- BSD License ---Redistribution and use in source and binary forms, with or without modifica-tion, are permitted given that the following conditions are met:•Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer.•Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials given with the distribution.
F-4 IxWLAN User Guide, Release 6.20F•All advertising materials mentioning features or use of this software must display the following acknowledgement: This product includes software developed by the University of Maryland at College Park, the Open1x team, and its contributors.•Neither the name of the University or Open1x team, nor the names of its contributors may be used to endorse or promote products derived from this software without specific prior written permission.THIS SOFTWARE IS GIVEN BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS “AS IS” AND ANY EXPRESS OR IMPLIED WAR-RANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WAR-RANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CON-TRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.•Copyright (c) 2003-2004 Cavium Networks (support@cavium.com). All rights reserved.Redistribution and use in source and binary forms, with or without modifica-tion, are permitted given that the following conditions are met:•Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer.•Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials given with the distribution.•All advertising materials mentioning features or use of this software must display the following acknowledgement: This product includes software developed by Cavium Networks•Cavium Networks' name may not be used to endorse or promote products derived from this software without specific prior written permission.•User agrees to enable and use only the features and performance purchased on the target hardware.This Software, including technical data, may be subject to U.S. export control laws, including the U.S. Export Administration Act and its associated regula-tions, and may be subject to export or import regulations in other coun-tries.You warrant that You comply strictly in all respects with all such regulations and acknowledge that you have the responsibility to obtain licenses to export, re-export or import the Software.TO THE MAXIMUM EXTENT PERMITTED BY LAW, THE SOFTWARE IS GIVEN “AS IS” AND WITH ALL FAULTS AND CAVIUM MAKES NO
IxWLAN User Guide, Release 6.20 F-5PROMISES, REPRESENTATIONS OR WARRANTIES, EITHER EXPRESS,IMPLIED,STATUTORY, OR OTHERWISE, WITH RESPECT TO THE SOFTWARE, INCLUDING ITS CONDITION,ITS CONFORMITY TO ANY REPRESENTATION OR DESCRIPTION, OR THE EXISTENCE OF ANY LATENT OR PATENT DEFECTS, AND CAVIUM SPECIFICALLY DISCLAIMS ALL IMPLIED (IF ANY) WARRANTIES OF TITLE, MER-CHANTABILITY, NONINFRINGEMENT,FITNESS FOR A PARTICULAR PURPOSE,LACK OF VIRUSES, ACCURACY OR COMPLETENESS, QUIET ENJOYMENT, QUIET POSSESSION OR CORRESPONDENCE TO DESCRIPTION. THE ENTIRE RISK ARISING OUT OF USE OR PERFOR-MANCE OF THE SOFTWARE LIES WITH YOU.
F-6 IxWLAN User Guide, Release 6.20F
IxWLAN User Guide, Release 6.20 G-1GAppendix G: Regulatory Information This appendix covers the following topics: •Radio Frequency Interference Needs on page G-1.•FCC Declarations of Conformity and Warning on page G-1.•RF Exposure Needs on page G-2.•EU Declarations of Conformity (Europe) on page G-2.Radio Frequency Interference Needs802.11a devices transmit in the 5 GHz band. 802.11b and 802.11g devices trans-mit in the 2.4 GHz band. FCC regulations needs this product to be used indoors to reduce the potential for interference with (to or from) other devices that oper-ate in the same frequency range.FCC Declarations of Conformity and WarningThis equipment has been tested and found to comply with the limits for Class A digital device pursuant to Part 15 of the FCC Rules. These limits are designed to give reasonable protection against harmful interference when the equipment is operated in a commercial environment. This equipment generates, uses, and can radiate radio frequency energy and, if not installed and used in accordance with the instructions in this manual, may cause interference to radio communications. Operation of this equipment in a residential area is likely to cause interference in case the user is needed to correct the interference. The user is cautioned that changes and modifications made to the equipment without approval of Ixia could void the user's authority to operate this equipment.
RF Exposure NeedsG-2 IxWLAN User Guide, Release 6.20GRF Exposure Needs To ensure compliance with FCC RF exposure needs, the antenna used for this device must be installed to give a separation distance of at least 20 cm from all persons and must not be found or operating in conjunction with any other antenna or radio transmitter. Installers and end-users must follow the installation instructions given in this guide. EU Declarations of Conformity (Europe)Ixia declares that select members of the IxWLAN product family (specifically Ixia IxWLAN part number 920-8010) conform to the specifications listed below, following the provisions of the European R&TTE directive 1999/5/EC:•EN 301 489-1, 301 489-17 General EMC needs for Radio equipment•EN 609 50 Safety•EN 300-328-1, EN 300-328-2 Technical needs for Radio equipmentIxia déclare la IxWLAN est conforme aux conditions essentielles et aux dispositions relatives à la directive 1999/5/EC.France: 2.4 GHz Band: les canaux 10, 11, 12, 13 (2457, 2462, 2467, et 2472 MHz respectivement) sont complétement libres d'utilisation en France (en utilisation intérieur). Pour ce qui est des autres canaux, ils peuvent être soumis à autorisation selon le départment. L'utilisation en extérieur est soumis à autorisation préalable et très restreint. Vous pouvez contacter l'Autorité de Régulation des télécommunications (http://www.art-telecom.fr) pour de plus amples renseignements.CAUTION: This equipment is intended to be used in all EU and EFTA countries. Outdoor use may be restricted to certain frequencies and/or may need a license for operation. Contact local authority for procedure to follow.NOTE: Combinations of power levels and antennas resulting in a radiated power level of above 100 mW equivalent isotropic radiated power (EIRP) are considered as not compliant with the above mentioned directives and are not allowed for use within the European community and countries that have adopted the European R&TTE directive 1999/5/EC.
IxWLAN User Guide, Release 6.20 Glossary-1GlossaryAAAA Authentication, Authorization and AccountingAES Advanced Encryption StandardAKMP Authentication Key Management Protocol AP Access PointAPI Application Key Management ProtocolARP Address Resolution Protocol BBPSK Binary Phase Shift KeyingBSS Basic Service Set is population of 802.11 stations (STA) communicating with each other.BSSID The Basic Service Set Identifier is the unique identifier for a given BSS (AP). The used format is the IEEE 48 bit MAC address. In an BSS infrastructure, the BSSID is the AP’s MAC address. The BSSID is present as an address in 802.11 frames.CCCK Complementary Code Keying
GlossaryGlossary-2 IxWLAN User Guide, Release 6.20CCMP Counter Mode with Cipher Block Chaining Message Authentication ProtocolCHAP PPP Challenge Handshake Authentication ProtocolCLI Command Line InterfaceCSMA/CA Carrier Sense Multiple Access/Collision AvoidanceCSV Comma-Separated-ValuesDDA Destination AddressdBm/mW Power ratio in dB (decibel) of the measured power referenced to one milliwatt.DHCP Dynamic Host Control ProtocolDTIM Delivery Traffic Indication MapDS Distribution SystemEEAP Extensible Authentication ProtocolEAPOL Extensible Authentication Protocol Over LANESS An extended Service Set is a collection of APs and STAs where the APs communicate one with another via the Distribution Service.FFTP File Transfer ProtocolGGMK Group Master Key GTK Group Transient Key
IxWLAN User Guide, Release 6.20 Glossary-3GlossaryHHMAC keyed-Hash Message Authentication CodeIIAPP Inter-Access Point ProtocolIBSS An Infrastructure BSS is the same as a BSS with one STA implementing the Distribution Services function (aka AP). It is the acronym for an independent BSS.ICMP Internet Control Message Protocol IEEE Institute of Electrical and Electronics EngineersIP Internet ProtocolLLAN Local Area NetworkMMAC Medium Access Control or Message Authentication CodeMbps Megabits per secondMD5 Message-Digest algorithm 5MIC Message Integrity Check/CodeMLME MAC Layer Management EntityMPDU MAC Protocol Data UnitsMS-CHAPv2 Microsoft PPP CHAP Extensions, Version 2MSDU MAC Service Data Unit
GlossaryGlossary-4 IxWLAN User Guide, Release 6.20OOFDM Orthogonal Frequency Division MultiplexingPPEAP Protected Extensible Authentication ProtocolPHY Physical LayerPKCS Public-Key Cryptography StandardsPKI Public Key InfrastructurePMK Pairwise Master KeyPMKD Pairwise Master Key IdentifierPMKA Pairwise Master Key Security AssociationPOST Power On Self-TestPPP Point-to-Point ProtocolPSK Pre-Shared KeyPTK Pairwise Transient KeyQQPSK Quadrature Phase Shift KeyingRRF Radio FrequencyRSN Robust Security Network RSSI Received Signal Strength Indicator
IxWLAN User Guide, Release 6.20 Glossary-5GlossarySSDK Software Developer KitSHA Secure Hash AlgorithmSNTP Simple Network Time ProtocolSSID The Service Set Identity is one of the information defined by the 802.11 specifications. The SSID Information Element is present in all 802.11 association requests, re-association requests, probe requests, probe responses and beacons. The SSID is the Service Set Identity of the IEEE 802.11 WLAN and, as such, it is often the name of a network. The SSID Information Element is defined as a TLV (Tag-Length-Value) object.SUT System Under TestTTKIP Temporal Key Integrity Protocol TLS Transport Layer SecurityTTLS Tunneled Transport Layer SecurityUUNII Unlicensed National Information Infrastructure usec microsecondVvSTA Virtual StationWWEP Wired Equivalency PrivacyWISP Wireless Internet Service ProtocolWLAN Wireless Local Area Network
GlossaryGlossary-6 IxWLAN User Guide, Release 6.20WLANA Wireless LAN AssociationWPA WiFi Protected Access
IxWLAN User Guide, Release 6.20 Index-1IndexNumerics802.11Association 4-31, 4-80, 4-85, 4-88, 4-89, 5-16Authentication 4-31, 4-32, 4-80, 4-85, 4-88, 4-89, 5-17Deauthentication 4-80, 5-26Disassociation 4-80, 5-27Management Counters 7-1Aacquireip 5-16admin 5-92administrative mode (admin) CLI command 5-92Administrative mode commandshwtxretries 5-95assoc 5-16Association 4-31, 4-80, 4-85, 4-88, 4-89, 5-16, 5-66auth 5-17Authentication 4-31, 4-32, 4-80, 4-85, 4-88, 4-89, 5-17Authentication Mode 5-28, 5-29, 5-30, 5-100, 5-102, 5-103, 5-105, 5-107, 5-110autoconf 5-18autorun 5-23Available 4-36Bbasic 5-92Basic Service Set (BSS) ID 5-8Basic Service Set (BSS) List 5-9bootrom 5-94bssid 5-8bsslist 5-9Busy 4-45, 8-6CCalibration 5-94Chassis 8-2Choosing 4-3Cipher 5-25, 5-42, 5-46Cipher Mode 5-28Clear 5-54clear 5-23, 5-63CLI 5-3, 5-4Administrative Mode Commands 5-91Editor 5-115Event Log Commands 5-54Log Off/Quit 5-4Logon 8-8Statistics Commands 5-52System Under Test Commands 5-7Usage Notes 5-3Virtual Station Set-Up & Control Commands 5-14CLI Commandacquireip 5-16admin 5-92assoc 5-16association 5-66auth 5-17autoconf 5-18autorun 5-23basic11g 5-92boot 5-93bootrom 5-94bssid 5-8bsslist 5-9calibration 5-94channel 5-67conf 5-24
IndexIndex-2 IxWLAN User Guide, Release 6.20config 5-67countrycode 5-69cp 5-95cryptocap 5-69cryptotest 5-63ctsmode 5-88ctsrate 5-89ctstype 5-89date 5-79deauth 5-26disassoc 5-27evlog 5-54exec 5-64factorydefault 5-80features 5-70format 5-95frequency 5-70ftp 5-65halt 5-36help 5-76history 5-76hostipaddr 5-95hwtxretries 5-95import certfile 5-76init 5-36ipaddr 5-71join 5-10key 5-64keyentrymethod 5-71login 5-71ls 5-96mv 5-96password 5-82ping 5-77pmmode 5-72power 5-72psinterval 5-72quit 5-78rate 5-73reboot 5-78regulatorydomain 5-96releaseip 5-37rm 5-96run 5-39scan 5-11shortpreamble 5-90shortslottime 5-90sntpserver 5-63station 5-73systemname 5-63telnet 5-74time 5-85trace 5-96tzone 5-74uptime 5-74vsta 5-23watchdog 5-97wirelessmode 5-74Command Line Interface (CLI) 5-1conf 5-24Configuration 4-71, 8-14Preferences 4-77Country Code 5-69cryptotest 5-63ctsmode 5-88DData Rate 5-73Date/Time 5-79, 5-85Deauthentication 4-80, 5-26del 5-64Delete 5-52DHCP 4-27, 5-20, 5-24, 5-32, 5-44, 5-49Acquire IP Address 5-16Information 5-28, 5-31Release IP Address 5-37Disassociation 4-80, 5-27EEncryptionKeys 4-35, 5-19, 5-64Mode 4-32, 4-72, 5-19, 5-31Event Log 4-63, B-1Clear 4-64, 5-54, 5-55CLI Commands 5-54Configuration 4-65, 5-56Controls/Configuration 5-57Display 4-63, 5-55Export 4-64Modules 4-65, 5-58, B-2, B-3Record Format B-2Verbosity Level 4-65, 5-58, B-1, B-3exec 5-64External Mode 4-7, 4-28, 5-20, 5-24Layer 2/3 Frame Capture 4-28, 5-21, 5-45, 5-50FFactory Default Configuration 5-80File Transfer Protocol (FTP) 5-65FilesCommand 5-64Event Log 5-56, B-2Summary Statistics 5-54Fragmentation Threshold per vSTA 4-30, 5-21, 5-44, 5-50ftp 5-65
IxWLAN User Guide, Release 6.20 Index-3IndexGgeet multiradiomode 5-72Get 5-53, 5-55get 5-28, 5-30, 5-66, 5-67, 5-69, 5-70, 5-71, 5-72, 5-73, 5-74, 5-75get wport 5-75GID 4-20Group Control 4-19Hhalt 5-36Iimport 5-76Individual 7-1, 7-3, 7-4, 7-6init 5-36Insert 5-116Internal Mode 4-6, 4-28, 5-20, 5-24IntervalIxWLAN Polling 4-45Monitor Update 4-62IP Address 5-71Iteration 4-20, 4-29, 4-30, 4-77IxWLAN 8-5Busy 4-16, 4-45Changing IP Address 5-112CLI Commands 5-60Configuration 5-67Not Reponding 8-6Not Responding 4-45Polling Interval 8-6Polling Timeout 8-6Power Save Mode 4-50Reboot 4-53, 5-78Receive Parameters 4-45Reconnect 4-52Reset 4-53Transmit Parameters 4-46Transmit Power 4-50Virtual Station Status 5-73Wireless Mode 4-48Jjoin 5-10Kkmtimeout 5-21LLayer 2 Frame Capture 4-28, 5-21, 5-45, 5-50Layer 3 Frame Capture 4-28, 5-21, 5-45, 5-50Load Profiles 4-21, 4-24Loading 8-7LoggingCLI Commands 5-54Login 5-3, 8-1, 8-4MMenus 4-78Edit 4-84File 4-82Group 4-87Options 4-91Reports 4-90Scenario 4-84vSTA 4-89Missing 8-7Monitor Controls 4-59Monitors 4-55Clear 4-60Configure 4-62Delete 4-60Export 4-61Maximum Number 4-56Predefined 4-56Stored in RAM 4-56Summary 4-57Toolbar 4-81Update Interval 4-62Update Timeout 4-62Virtual Station 4-58Nnegotiation 5-16Not Responding 8-6PPassword 5-3, 5-82Recovery 8-1Persistence 4-31Polling Interval 4-16, 4-45Polling Timeout 4-16, 4-46Power Save Mode 4-50Power Supply Connector 1-11preauth 5-37Preferences 4-77RRadio Channel/Frequency 5-67Radio Frequency 5-70Reboot 4-53, 5-78Recovering 8-9
IndexIndex-4 IxWLAN User Guide, Release 6.20releaseip 5-37ReportsExport 4-70Group Summary 4-68Master Station 4-69Templates 4-70Virtual Station Detail 4-70reset 5-38rm 5-96roam 5-38RSN 1-6EAP Algorithm 4-35Events 4-65, 5-59Example Configuration 5-107, 5-109Passphrase 4-35, 5-11PEAP/TTLS Parameters 4-35RSN-PSKExample Configuration 5-105Virtual Station Configuration 4-34RTS Threshold per vSTA 4-30, 5-21, 5-46, 5-51run 5-39SSave 5-57save 5-39, 5-40scan 5-11ScenarioGroup 4-87Menu 4-84Open Existing 4-4Run 4-9Save 4-12, 4-13Security 8-3Security Configuration Example 5-100, 5-101, 5-103, 5-105, 5-107, 5-109sendprobe 5-40Serial Port 3-5Set 5-57set 5-42, 5-46, 5-80, 5-82, 5-86set wport 5-86shortpreamble 5-89SNTP Server 5-63Software Upgrades C-3Splash 8-5Startup 4-1, 8-4StatisticsClear 5-23CLI Commands 5-52File 5-53Group 5-23Saving 5-39Signal Counters 7-4Virtual Stations 5-23, 7-1Statistics Summary 7-7Status/Error Messages E-1Summary 7-7, 7-8, 7-9, 7-10, 7-15System 5-7System Name 5-63, 5-74System Requirements 1-10, 3-3System Under TestBSS List 5-8Changing 5-7CLI Commands 5-7Join 4-9, 4-43, 5-10Scan 4-22, 5-11TTest Clock 4-18Test Toolbar 4-17, 4-79The 5-1Time Zone 5-74Toolbars 4-78Traffic Types 4-28Transmit Power 4-50, 5-72UUser 5-3, 5-4User Interface Configuration 4-77User Name 5-3, 5-71Using 8-2VVirtual StationsAdd to Group 4-39Address Generation 4-27Auto Configure 5-18CLI Commands 5-14, 5-27Edit 4-21Encryption 5-19, 5-31Halt 4-80, 4-89, 5-36Initialize 4-79, 4-89, 5-36, 5-37IP Addresses 4-27, 5-19MAC Addresses 4-27, 5-19, 5-24Persistence 4-31Run 4-80, 4-89, 5-39Run Time Parameters 4-30Security 4-32Statistics 5-23Status 5-73Toolbar 4-17, 4-79Traffic Types 4-28, 5-20, 5-24
IxWLAN User Guide, Release 6.20 Index-5IndexTransitional States 4-77vSTA 4-25WWeb 8-3Web-Based User Interface 4-1Welcome Screen 4-78Wireless Mode 4-42WPA 1-6, 7-10AKMP Information 5-17EAP Algorithm 4-35Event 5-59Events 4-65Example Configuration 5-103Passphrase 4-35, 5-7, 5-11PEAP/TTLS Parameters 4-35Pre-Shared Key 4-34, 4-74WPA Certificate Files 1-7WPA-PSKExample Configuration 5-101Virtual Station Configuration 4-34
IndexIndex-6 IxWLAN User Guide, Release 6.20

Navigation menu