Ixia GC617644 802.11a/b/g Multi AP Emulator (Client Device) User Manual IxWLANUserGuide

Ixia 802.11a/b/g Multi AP Emulator (Client Device) IxWLANUserGuide

User Manual 1

IxWLAN™ User GuideRelease 6.20Part No. 913-0073-03 Rev AMay 2007
ii IxWLAN User Guide, Release 6.20Copyright © 2007 Ixia. All rights reserved.This publication may not be copied, in whole or in part, without Ixia’s consent.RESTRICTED RIGHTS LEGEND: Use, duplication, or disclosure by the U.S. Government is subject to the restrictions set forth in subparagraph (c)(1)(ii) of the Rights in Technical Data and Computer Software clause at DFARS 252.227-7013 and FAR 52.227-19.Ixia, the Ixia logo, and all Ixia brand names and product names in this document are either trademarks or registered trademarks of Ixia in the United States and/or other countries. All other trademarks belong to their respective owners.The information herein is furnished for informational use only, is subject to change by Ixia without notice, and should not be con-strued as a commitment by Ixia. Ixia assumes no responsibility or liability for any errors or inaccuracies contained in this publica-tion.  Part No. 913-0073-03 Rev AMay 14, 2007Corporate Headquarters Ixia Worldwide Headquarters26601 W. Agoura Rd.Calabasas, CA 91302USA+1 877 FOR IXIA (877 367 4942)+1 818 871 1800 (International) (FAX) +1 818 871 1805 sales@ixiacom.com Web site: www.ixiacom.com General: info@ixiacom.com Investor Relations: ir@ixiacom.com Training: training@ixiacom.com Support: support@ixiacom.com +1 877 367 4942EMEA Ixia Europe LimitedGlobeside Business ParkBuilding One, Unit AMarlow, SL7 1GJUnited Kingdom+44 1869 356370(FAX) +44 1869 356371ixiaeurope@ixiacom.com Support: eurosupport@ixiacom.com+44 1869 356370 (Option 5) Asia Pacific Asia Pacific Representative OfficeNew Shanghai International Tower, Suite 26E360 Pudong Nan RdShanghai 200120China +86 21 50543439ixiachina@ixiacom.comSupport: support@ixiacom.com+1 818 871 1800 (Option 1)Japan Ixia KKAioi Sampo Shinjuku Building, 16th Floor3-25-3 Yoyogi Shibuya-KuTokyo 151-0053Japan+81 3 5365 4690(FAX) +81 3 3299 6263ixiajapan@ixiacom.comSupport: support@ixiacom.com+1 818 871 1800 (Option 1)India Ixia IndiaNo. 508, 6th Main 6th CrossST Bed, Koramangala 4th BlockBangalore 560 034India+91 80 25633570(FAX) +91 80 25633487ixiaindia@ixiacom.comSupport: support-india@ixiacom.com+91 80 32918500
IxWLAN User Guide, Release 6.20 iiiTable of ContentsChapter 1 IntroductionIntroduction to IxWLAN . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-1Packaging Checklist . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-3Features  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-4WPA/RSN . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-6Files. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-8System Needs. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-10Hardware Characteristics . . . . . . . . . . . . . . . . . . . . . . . . . . 1-10General Usage Notes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-12Feature Key Dependent Parameters. . . . . . . . . . . . . . . . . . 1-13Chapter 2 InstallationAttaching the Antennas . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-1
Table of Contentsiv IxWLAN User Guide, Release 6.20Connecting Directly to a Command PC . . . . . . . . . . . . . . . .  2-2Connecting Through an Ethernet Hub or Switch . . . . . . . . .  2-3Connecting to the Serial Port. . . . . . . . . . . . . . . . . . . . . . . .  2-3Chapter 3 First SetupUsing the Ethernet Ports . . . . . . . . . . . . . . . . . . . . . . . . . . .  3-1Using the Serial Port . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  3-5Chapter 4 The Web-Based User InterfaceStartup and Login. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  4-1Choosing and Creating a Scenario . . . . . . . . . . . . . . . . . . .  4-3Using the Main Page . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  4-14vSTA Side Bar . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  4-25IxWLAN Side Bar. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  4-40Monitors Side Bar  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  4-55Event Log Side Bar . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  4-63Reports Side Bar . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  4-66Configuration Side Bar. . . . . . . . . . . . . . . . . . . . . . . . . . . .  4-71Menus and Tool Bars . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  4-78
IxWLAN User Guide, Release 6.20 vTable of ContentsChapter 5 The Command Line Interface (CLI)CLI Usage Notes. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-3User Login. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-3User Logoff . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-4CLI Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-4System Under Test Commands. . . . . . . . . . . . . . . . . . . . . . . 5-7Virtual Station Setup and Control Commands. . . . . . . . . . . 5-14Statistics File Commands . . . . . . . . . . . . . . . . . . . . . . . . . . 5-52Event Log Commands. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-54IxWLAN Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-59802.11b/g Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-87Administrative Mode Commands  . . . . . . . . . . . . . . . . . . . . 5-91Example Configurations  . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-98CLI Editor  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-115Chapter 6 The Programming Interface (Perl)Chapter 7 Statistics CountersIndividual Virtual Station Counters  . . . . . . . . . . . . . . . . . . . . 7-1Summary Statistics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-7
Table of Contentsvi IxWLAN User Guide, Release 6.20wport Statistics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  7-16Chapter 8 TroubleshootingLogin Name and/or Password Recovery . . . . . . . . . . . . . . .  8-1Using a Third-Party Load Generator . . . . . . . . . . . . . . . . . .  8-2Chassis Installation and LEDs . . . . . . . . . . . . . . . . . . . . . . .  8-2Web-Based User Interface Problems  . . . . . . . . . . . . . . . . .  8-3Missing Key File. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  8-7Recovering a Corrupted Firmware File . . . . . . . . . . . . . . . .  8-9Configuration Records . . . . . . . . . . . . . . . . . . . . . . . . . . . .  8-14Appendix A SpecificationsHardware . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  A-1Software. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  A-2Performance  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  A-4Appendix B Event LoggingOverview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  B-1Event Record Format. . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  B-2CLI Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  B-3The Web-Based User Interface . . . . . . . . . . . . . . . . . . . . . .  B-4
IxWLAN User Guide, Release 6.20 viiTable of ContentsAppendix C Software UpdatesUsing the Web-Based User Interface . . . . . . . . . . . . . . . . . .C-1Using the CLI. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .C-3Appendix D Cable Pin AssignmentsStandard Ethernet Cable. . . . . . . . . . . . . . . . . . . . . . . . . . . .D-1Ethernet Crossover Cable. . . . . . . . . . . . . . . . . . . . . . . . . . .D-2RJ-45 Connector . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .D-2Serial Cable. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .D-3Appendix E Error and Status MessagesIxWLAN or Virtual Station Control Messages . . . . . . . . . . . .E-1WLAN Driver Error Messages. . . . . . . . . . . . . . . . . . . . . . . .E-5MAC Layer Management Messages. . . . . . . . . . . . . . . . . . .E-6Standard 802.11 WLAN Reason Codes  . . . . . . . . . . . . . . . .E-7Standard 802.11 WLAN Status Codes  . . . . . . . . . . . . . . . . .E-8Appendix F Additional Copyright and Trademark NoticesAppendix G Regulatory InformationRadio Frequency Interference Needs . . . . . . . . . . . . . . . . .  G-1FCC Declarations of Conformity and Warning  . . . . . . . . . .  G-1
Table of Contentsviii IxWLAN User Guide, Release 6.20RF Exposure Needs. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . G-2EU Declarations of Conformity (Europe) . . . . . . . . . . . . . . . G-2GlossaryIndex
IxWLAN User Guide, Release 6.20 1-11Chapter 1: Introduction This chapter covers the following topics: •Introduction to IxWLAN on page 1-1.•Packaging Checklist on page 1-3.•Features on page 1-4.•WPA/RSN on page 1-6.•Files on page 1-8.•System Needs on page 1-10.•Hardware Characteristics on page 1-10.•General Usage Notes on page 1-12.•Feature Key Dependent Parameters on page 1-13.Introduction to IxWLANIxWLAN is a test and measurement device that emulates up to 128 wireless sta-tions in an IEEE 802.11 wireless LAN environment. It operates in accordance with the IEEE 802.11a, IEEE 802.11b, and IEEE 802.11g specifications. IxW-LAN is offered in the following configurations:•IxWLAN SED 11a/b/g – Supports IEEE 802.11a, 802.11b, and 802.11g, depending on regulatory certifications.•IxWLAN SED-MR+ 11a/b/g – Supports IEEE 802.11a, 802.11b, and 802.11g.Both configurations include the IEEE 802.11i and WiFi Protected Access (WPA) security features. IxWLAN can be used to reduce the number of PCs and station NIC cards that are needed to test and stage 802.11 products and wireless LANs in terms of packet
IntroductionIntroduction to IxWLAN1-2 IxWLAN User Guide, Release 6.201performance and number-of-stations capacity. It allows a user to fine-tune sys-tem parameters to maximize performance during testing. The differences between IxWLAN and other IP load generators can be summa-rized as follows:•IP-based Load Generators are per-station devices that do not reduce the num-ber of PCs and station NIC cards. You can configure only one IP per station and then send traffic. •IxWLAN allows all stations to be emulated on a single platform and radio chipset, thus reducing the cost and complexity of multiple PCs.IxWLAN creates Virtual Stations (vSTAs) and generates or passes traffic that loads and stress tests Wireless LAN and 802.11 products in terms of:•Frame performance•Number-of-stations capacity•Scalability•WLAN optimizationBecause a single physical 802.11a/b/g emulator emulates multiple vSTAs, it reduces the number of PC and station NIC cards that are needed to test and stage 802.11 products and wireless LANs. As of 6.20 version, IxWLAN is supported by two chassis, the IxWLAN SED and the IxWLAN SED-MR+. IxWLAN SED Figure 1-1 shows the IxWLAN SED chassis.Figure 1-1. IxWLAN SED ChassisExternal Traffic Generator portSerial portManagement portActivity LED Status LEDPower LED
IxWLAN User Guide, Release 6.20 1-3IntroductionPackaging ChecklistIxWLAN SED-MR+ Figure 1-2 shows the IxWLAN SED-MR+ chassis.Figure 1-2. IxWLAN SED-MR+ ChassisPackaging ChecklistYour shipping container must include the following items:•Chassis (IxWLAN SED or SED-MR+)•Power cord for the IxWLAN SED or SED-MR+ chassis•Crossover cable•Serial cable•Detachable multiband antennas (2 for the IxWLAN SED and 3 for the SED-MR+ chassis)•Data sheet•Specifications•Release Notes•Warranty card•End User License Agreement•Installation CD-ROM, which includes this User Guide and the IxWLAN SDK.If any of these items is not included in your shipping container, contact Ixia Cus-tomer Support.
IntroductionFeatures1-4 IxWLAN User Guide, Release 6.201Features•Supports IEEE 802.11a, 802.11b, 802.11g •Supports 802.11h Dynamic Frequency Selection (DFS) and Transmit Power Control (TPC)•The IxWLAN SED chassis emulates up to 64 concurrent virtual stations, while the IxWLAN SED-MR+ chassis supports up to 128 virtual stations.•Interaction with virtual stations in real time•Configuration and monitoring of virtual stations•Internally injects load into a System Under Test (SUT)•Externally forwards load from a third-party traffic generator to a System Under Test•For the external mode, frames can be captured based on the source 802.3 MAC address (Layer 2) or the source IP address (Layer 3). •Event Log and performance statistics data•vSTA support: 802.11 Authentication, Association, De-authentication, Disas-sociation, Reassociation.•The system supports Open-System, Shared-Key WEP, WPA, and 802.11i (RSN) security, including 802.11i Pre-Authentication.•The system supports 802.11i PMKSA caching and re-use.•The system supports fast RADIUS reconnection in vSTAs configured for WPA and RSN authentication types.•The system allows for each vSTA to be configured with a unique SSID, to transmit 802.11 Probe Request frames and to receive directed 802.11 Probe Response frames. This allows users to configure vSTAs to exercise an AP’s WLAN-to-VLAN code using a single IxWLAN chassis.•Virtual stations may independently roam between APs comprising an ESS wireless network.•ICMP Echo Request/Reply (Ping)•Security per vSTA (Table 1-1)Table 1-1. AuthenticationAuthentication Cipher Security Configuration Additional Security ConfigurationOpen-System WEP Up to 4 Shared Static Keys for authentication and dataShared-Key WEP Up to 4 Shared Static Keys for authentication and data
IxWLAN User Guide, Release 6.20 1-5IntroductionFeatures•Persistent connection to the System Under Test•DHCP Client: vSTAs can have IP addresses dynamically assigned from a DHCP server on the network rather than a fixed, configured IP address.•Command Line Interface and Web-Based User Interface•Telnet and Serial Port access to the CLI•Automatically configure and run multiple virtual stations using the CLI•The Web-Based User Interface supports the following:•Real-time graphs of test results for each virtual station, and for the system as a whole•Export of event log and statistics data•Scenario scheduling to bring vSTAs online in a time-appointed manner•User-defined virtual station groups based on end user needs•Multiple types of reports•The ability to save test scenario files in order to repeat a test•Configuration and monitoring of virtual stations include: copy, paste, print, add, and delete virtual stations•The ability to select a System Under Test•The ability to set up groups and select individual virtual stations to run through the 802.11 state machineWPA TKIP or AES-CCM EAP Algorithm: TLS, TTLS, or PEAPUser ID/Client Certificate File. For TTLS/PEAP, Inner Algorithm (MS-CHAPv2, EAP-MS-CHAPv2), Outer ID, and Password.WPA-PSK TKIP or AES-CCM Pre-Shared Key or PassphraseRSN TKIP or AES-CCM EAP Algorithm: TLS, TTLS, or PEAPUser ID/Client Certificate File. For TTLS/PEAP, Inner Algorithm (MS-CHAPv2, EAP-MS-CHAPv2), Outer ID, and Password.RSN-PSK TKIP or AES-CCM Pre-Shared Key or PassphraseTable 1-1. Authentication (Continued)Authentication Cipher Security Configuration Additional Security Configuration
IntroductionWPA/RSN1-6 IxWLAN User Guide, Release 6.201WPA/RSNThis section covers the following topics:•Introduction to WPA/RSN on page 1-6.•EAP Algorithms on page 1-7.•Certificate Files on page 1-7.•Key Hierarchy and Configuration on page 1-7.•Protocol Conformance Testing on page 1-8.Introduction to WPA/RSNIndividual virtual stations can be configured with WPA or RSN authentication. A vSTA can be configured to use either PSK or full 802.1X/EAP authentication. RSN does the strong security of IEEE 802.11i.The strength of WPA/RSN comes from an integrated sequence of operations that encompass 802.1X/EAP authentication and sophisticated key management and encryption techniques. The IxWLAN implementation of WPA/RSN provides the following major opera-tions:•Network security capability determination – This occurs at the 802.11 level and it is communicated through the WPA/RSN information elements in Bea-con, Probe Response, and (Re) Association Requests. The information in these elements includes the authentication method (802.1X or PSK) and the preferred cipher suite (WEP, TKIP, or AES-CCM).•Authentication – For full implementation of WPA/RSN, EAP over 802.1X is used for authentication. Mutual authentication is gained by choosing an EAP type supporting this feature. 802.1X port access control prevents full access to the network until authentication completes. In the case of WPA-PSK or RSN-PSK, mutual authentication between peers (that is, a virtual station and the System Under Test) is achieved through the 4-Way AKMP handshake during which possession and liveness of the correct PSK is confirmed.•Pre-Authentication – IxWLAN also supports pre-authentication, defined in the 802.11i specification as a means of speeding up the roaming process by authenticating with the server before the roam. The pre-authentication is independent of the roam and may be performed with multiple APs.•PMKSA Catching – IxWLAN supports PMKSA catching, defined in the 802.11i specification. PMKSA is the context resulting from a successful IEEE 802.1X authentication exchange between a given vSTA and the Authentication Server.•Key management – The WPA and RSN feature gives a robust key generation/management system that integrates the authentication and data privacy func-tions. The keys are generated after successful authentication and through a subsequent 4-way handshake between the station and System Under Test.
IxWLAN User Guide, Release 6.20 1-7IntroductionWPA/RSN802.1X EAPOL-Key packets are used by WPA and RSN to negotiate and derive pairwise keys used to protect unicast traffic. Group key handshake is used to deliver the group key to each virtual station for protecting multicast and broad-cast class 3 data frames.•Data Privacy (Encryption) – TKIP or AES-CCM (that is, CCMP) is used to replace WEP with more sophisticated cryptographic and security techniques.•Data integrity – TKIP adds a MIC at the end of each plain-text message (MSDU) to ensure that the messages are not being spoofed or replayed. With AES-CCM, the MIC is added to each transmitted MPDU.EAP Algorithms Virtual stations that are configured for WPA or RSN authentication can be con-figured to use the TLS, TTLS, or PEAP EAP algorithms. For TLS, a certificate file and user ID must be specified. The certificate file and user ID are optional for TTLS and PEAP. Additional parameters that may be configured for TTLS and PEAP include: inner algorithm, outer identify, and password. For TTLS and PEAP, authentication proceeds in two stages: Phase 1 (outer) and Phase 2 (inner). The outer identity is used in Phase 1 authentication. The password and inner algorithm are used in Phase 2 authentication. The inner algorithm is normally MS-CHAPv2 for TTLS and EAP-MS-CHAPv2 for PEAP. Certificate Files When using full WPA or RSN (802.1X), valid certificates must be imported into IxWLAN using either the CLI import command or the Available Certificates dialog in the web-based user interface. Key Hierarchy and ConfigurationWPA and RSN use a PMK that is used in derivation of transient keys for encryp-tion and HMAC functions. The IxWLAN WPA/RSN feature supports two core key hierarchies that are defined by the standard:•Pairwise key hierarchy – The pairwise keys used to protect unicast traffic. PTK derived from the PMK.•Group key hierarchy – To protect multicast traffic. GTK derived from the GMK.For full WPA or RSN mode, the PMK is negotiated between the vSTA and an authentication server in a sequence of EAPOL exchanges through the System Under Test. For WPA-PSK or RSN-PSK mode, the PSK (if defined) is used as the PMK. The PSK is manually configured in the vSTA and the System Under Test.IxWLAN 5.0 Limitation – The WPA Specification needs a PSK for each SSID. IxWLAN now supports a single (global) SSID.•IxWLAN supports a PSK per vSTA.•The PSK can be defined using hex notation (64 hex digits) or an ASCII pass-phrase. The ASCII passphrase is converted to a valid 256 bit key.NOTE: IxWLAN imports only certificate files that are in the PKCS#12 format and have been exported with their private key, without strong private key encryption.
IntroductionFiles1-8 IxWLAN User Guide, Release 6.201The 4-way handshake (obtain/install PTK) is processed as follows: •EAPOL-Key Message exchange (four messages)•Verify that a live peer holds the PMK.•Verify that the PMK is current.•Obtain a fresh PTK from the PMK.•Install the Pairwise encryption and integrity keys into IEEE 802.11.•Confirm the installation of the keys.The Group Key Handshake (obtain/install Group Transient Key) is processed using an EAPOL-Key Message exchange (two messages).Protocol Conformance TestingWhen configured with WPA/RSN, IxWLAN tests the following:•802.1X Authentication when configured for full WPA/RSN•802.11i Pre-authentication when configured for full RSN•PMKSA catching results from a successful IEEE 802.1X authentication exchange between a given vSTA and Authentication Server•802.1X Key Management: vSTA/System Under Test 4-way handshake (EAPOL-Key messages), Group Key Handshake (EAPOL-Key messages)•TKIP or AES-CCM (CCMP): Data encryption (unicast and multicast)•WPA or RSN Information Element Conformity: presence in beacons, probe responses; correct AKM suite selector encoding and correct cipher suite selector encodingFilesThe IxWLAN SED and the IxWLAN SED-MR+ chassis have a 256MB “disk-on-a-chip” flash. Excluding boot and firmware images, this allows for 225 MB of file system space to be used for event logging, certificate files, and scenario files.Table 1-2 lists the directories and files that are maintained in the IxWLAN flash file system.Table 1-2. Directories and Files Maintained in the Flash File SystemDirectory Files Description/ (root) IxWLAN Configuration (config), ixwlan.sys, keyfile•config file: The IxWLAN configuration file (config) stores information settings that can be defined using the CLI or the web-based user interface. A backup version (.bak) of this file is also maintained in the unlikely event that the original might become corrupted. IxWLAN loads from this file at power-up/initialization time. It contains basic configuration information.•ixwlan.sys: The ixwlan.sys file is the IxWLAN software image file.
IxWLAN User Guide, Release 6.20 1-9IntroductionFiles•keyfile: The keyfile is a reserved file that contains the IxWLAN authorization code. It is a hidden file and is shown only in the direc-tory list in the CLI administrative mode. Do not delete this file or try to access or modify it. The system needs it./Cache Encapsulated certificate file passwordsWhen a certificate file is imported into IxWLAN, a password is needed. This password is encrypted and stored in IxWLAN in the /Cache directory. Note that this directory is visible only in the CLI administrative mode./Certificates Available Certificate filesContains available certificate files that have been imported from the command PC. This directory is available only if the keyfile enables WPA/RSN./Logs Log Files When event logging to a file is enabled, the log files in this directory store records of all IxWLAN activities, with a timestamp indicating when the activity occurred./Scenarios Scenario files After IxWLAN is configured, you may create test scenarios that contain virtual station definitions that are organized into groups. This information is stored in scenario files. The scenario files are created and used by the web-based user interface. The CLI does not create or use scenario files. These files are created when you select Save Scenario to Flash in the web-based user interface./Statistics Virtual Station Statistics Files (for example, Vsta#Stats.dat, VstaMasterStats.dat, VstaAllSumm.dat) Statistics files contain statistics of a test (scenario) run. When a test is complete, a statistics file can be written in the flash file system for each virtual station involved in the test. The Reports section of the web-based user interface can be used to show the contents of these files.Table 1-2. Directories and Files Maintained in the Flash File System (Continued)Directory Files Description
IntroductionSystem Needs1-10 IxWLAN User Guide, Release 6.201System Needs•A PC with an available serial port or 10/100 Ethernet port that can be used to send commands to IxWLAN•If the web-based user interface is used, the command PC must be equipped with:•Microsoft Windows 2000/XP•Microsoft Internet Explorer Version 6.0 or higher•Recommended Memory: 256 MB•Recommended Virtual Memory: 300 MB•Recommended Processor Speed: PIII 700 MHz.•One of the following ActiveX objects: Msxml2.XMLHTTP or Microsoft.XMLHTTP. If either of these objects is not found, an alert mes-sage displays: “FATAL ERROR: Error creating ActiveX object XMLHTTP”.Hardware CharacteristicsThis subsection provides specific information about the ports, LEDs, connectors, and antennas of the two available chassis, IxWLAN SED, and IxWLAN SED-MR+.Ports and ConnectorsBoth chassis have an Ethernet connector, a serial connector, and a power connec-tor.•Ethernet Connectors:The IxWLAN SED and IxWLAN SED-MR+ chassis have two Ethernet ports, a 10/100 Gigbit port and a 10/100/1000 Gigbit port, as described in Table 1-3.The Mgmt. Port (Management Port) is used for managing IxWLAN via the GUI, Telnet, or SDK (running over Telnet) or for downloading the ixwlan.sys image. All IxWLAN IP address commands (get/set ipaddr, get/set ipmask, get/set gateway) apply only to the Management Port.The Ext. Traffic Generator port (External Traffic Generator port) is used exclu-sively for the attachment of traffic generators (IxChariot, IxLoad, and so on) and has no associated IP stack/address.Table 1-3. IxWLAN SED/SED-MR+ Ethernet PortsFront Panel Label System DeviceName:unit SpeedMgmt. Port fei:0 10/100Ext. Traffic Generator gei:0 10/100/1000
IxWLAN User Guide, Release 6.20 1-11IntroductionHardware Characteristics•Serial Connector – This connector is used to connect a command PC to IxW-LAN. The configuration of the serial port is: 115,200 b/s, 8 data bits, no par-ity, 1 stop bit, and no flow control.•Power Connector – The IxWLAN SED/SED-MR+ chassis uses a standard 3-prong, 110 VAC power cable.IxWLAN SED/SED-MR+ can attach directly to 10BASE-T/100BASE-TX (twisted-pair) Ethernet LAN hubs or segments or a PC. All this must conform to the IEEE 802.3 specification.LEDs On each of the two chassis, the LEDs are laid out differently, also working differ-ently depending on the chassis.IxWLAN SEDThe IxWLAN SED chassis has two LEDs associated with the WLAN or Radio, a separate power LED, and two LEDs for each Ethernet port (that is, four in all).One WLAN LED indicates WLAN traffic (send/receive), while the others indi-cate network status — solid on — radio is on, slow blink — IxWLAN is scan-ning, fast blink (per received beacon) — IxWLAN is joined with an AP.Each Ethernet port has two LEDs: a yellow LED to indicate Link State/Link Activity, and a green LED to indicate speed, as described in Table 1-4.Table 1-4. IxWLAN SED LEDsFront Panel Label Yellow LED Green LED DescriptionMgmt Port Steady ONLink establishedFlashing Active Data TransferSteady OFF10BaseTSteady ON100BaseTExternal Traffic GeneratorSteady ONLink establishedFlashing Active Data TransferSteady OFF1000BaseTSteady ON10/100BaseT
IntroductionGeneral Usage Notes1-12 IxWLAN User Guide, Release 6.201IXWLAN SED-MR+The IxWLAN SED-MR+ chassis has two LEDs associated with each WLAN port (wport) or Radio (that is, six LEDs in all). During power-up, the left LED blinks briefly, while the right LED goes off solid. After booting, the left LED turns on solid, while the right LED turns off solid. In the idle state (in which no wports are joined and there is no activity), the left LED turns solid on, while the right one goes off solid. In the joined state (in which the wport has joined with an AP), both LEDs blink briefly, yet faster than while power-up. To show network activity (from a joined state), both LEDs blink proportional with the tx/rx bit rates.Radio CharacteristicsIxWLAN conforms to the IEEE 802.11a, 802.11b and 802.11g specifications. In the 802.11a mode, it operates in the 5GHz UNII band. Data is transmitted over a half-duplex radio channel, operating at up to 54 Mb/s using OFDM. In the 802.11b mode, IxWLAN operates in the 2.4 GHz band and sends data at up to 11 Mb/s. In the 802.11g mode, IxWLAN operates in the 2.4 GHz band, using OFDM at rates of up to 54 Mb/s.Antennas The IxWLAN SED chassis provides two antennas, one each for the 802.11 b/g mode and 802.11a mode. On the IxWLAN SED-MR+ chassis, there is a single antenna for each of the 3 independent wports, each handling 802.11b/g, as well as 802.11a mode.The antennas can be swiveled 180 degrees and angled up or down to optimize signal gain. Please note that the antennas are shipped separately and need to be attached to the chassis. For more details about the installation, please refer to Chapter 2, Installation.General Usage Notes1. Intermixing of CLI, Web-Based User Interface, and SDK operations is not supported. 2. You can access IxWLAN using the serial port or an Ethernet connection. For a serial port connection, the serial port must be configured as follows: 115200 baud, 8 data bits, no parity, 1 stop bit, no flow control. For an Ethernet con-nection, the IxWLAN default IP address is 192.168.0.50. To establish first communications between the command PC and IxWLAN using an Ethernet connection, you must set your PC's IP address and network mask to match this default address (for example, IP address: 192.168.0.2, Netmask: 255.255.255.0). After you establish communications using the default IP address, you can change the IxWLAN and your command PC address to match the addressing scheme used in your network.3. IxWLAN can operate in the 802.11a, 802.11b, or 802.11g wireless mode. The IxWLAN wireless mode affects the devices that you can select as a System Under Test. For example, an IxWLAN that is operating in the 802.11a wire-
IxWLAN User Guide, Release 6.20 1-13IntroductionFeature Key Dependent Parametersless mode does not discover an 802.11b or 802.11g device. Make sure that the wireless mode that you select for IxWLAN is compatible with the device that you want to test. See IxWLAN->Configure IxWLAN on page 4-44 and Virtual Station Setup and Control Commands on page 5-14. 4. The IxWLAN Wireless LAN MAC address defaults to a specific address (typically in the 00:0b:16:xx:xx:xx range). It is a globally unique MAC address that is programmed in to the IxWLAN SED/SED-MR+ chassis. The WLAN base MAC address for each wport (typically in the 00:0b:6b:xx:xx:xx range) and mask (ff:ff:ff:ff:00:00) define the range of MAC addresses that can be assigned to virtual stations configured for that wport. When you spec-ify a starting MAC address for virtual stations, make sure that the address is in the range defined by the WLAN base MAC address and mask for the spec-ified port. See vSTA->Add New vSTA to Group on page 4-39 and IxWLAN->Configure IxWLAN on page 4-44, auth on page 5-17, set wlanmac on page 5-86, get wlanmask on page 5-75 and set wlanmask on page 5-86.5. The default WLAN base MAC address for a given wport can be overridden to prevent conflict with other wireless devices. If you use multiple IxWLANs at your facility, each should have a WLAN MAC with a unique prefix. For example, on the first IxWLAN, use WLAN MAC Address 04:0d:e0:62:23:57 and on the second IxWLAN, use WLAN MAC Address 06:0f:14:62:32:a0.6. Starting with version 6.10 SP2, the requirement that the IP Mask of the IxW-LAN and virtual stations must match the IP subnet addressing scheme for internal mode testing ( used for the external mode) has been removed. The IP address and subnet mask are now per-virtual station attributes and have no interaction with the IP protocol stack used for IxWLAN management.Feature Key Dependent ParametersYour license key is a code sequence that represents your license to use your IxW-LAN. The license key indicates a set of features that are authorized for a specific IxWLAN. Some IxWLAN features are separately licensed. Depending on the license you purchased from Ixia, some IxWLAN features may not be available. Some portions of the user interface may be disabled or enabled, and the appear-ance of dialogs may vary according to your license. Table 1-5 identifies these feature key dependent parameters.Table 1-5. Feature Key Dependent ParametersWeb-Based User Interface Fields CLI Commands Feature Key Dependent Parameters Needed Feature KeyIxWLAN->Configure IxWLAN->Radio tab: Wireless Modeset wireless mode 802.11a 11AIxWLAN->Configure IxWLAN->Radio tab: Wireless Modeset wireless mode 802.11b 11B
IntroductionFeature Key Dependent Parameters1-14 IxWLAN User Guide, Release 6.201IxWLAN->Configure IxWLAN->Radio tab: Wireless Modeset wireless mode 802.11g 11GIxWLAN->Configure IxWLAN->Other tab: MICset mic Enable, Disable, Spot WPA/RSNvSTA->New Group-> Security: Authenticationautoconf, set group, or set vsta authenticationRSN, RSN-PSK, WPA, WPA-PSKWPA/RSNvSTA->New Group-> Security: Cipherautoconf, set group, or set vsta cipherTKIP, AES-CCM WPA/RSNvSTA->New Group-> Security->PSK Tab: Pre-Shared Keyautoconf, set group, or set vsta pskPre-Shared Key WPA/RSNvSTA->New Group-> Security->PSK Tab: Passphraseautoconf, set group, or set vsta passphrasePassphrase WPA/RSNvSTA->New Group-> Security->EAP Tab: EAP Algorithmautoconf, set group, or set vsta eapalgorithmTLS, TTLS, or PEAP WPA/RSNvSTA->New Group-> Security->EAP Tab: User IDautoconf, set group, or set vsta useridUser ID WPA/RSNvSTA->New Group-> Security->EAP Tab: Client Certfileautoconf, set group, or set vsta certfileCertificate File WPA/RSNvSTA->New Group-> Security->EAP Tab: Inner Algorithmautoconf, set group, or set vsta inneralgorithmMS-CHAPv2, EAP-MS-CHAPv2WPA/RSNvSTA->New Group-> Security->EAP Tab: Outer IDautoconf, set group, or set vsta outeridentityOuter Identity WPA/RSNvSTA->New Group-> Security->EAP Tab: Passwordautoconf, set group, or set vsta passwordPassword WPA/RSNConfiguration->Security: AuthenticationNo equivalent RSN, RSN-PSK, WPA, WPA-PSKWPA/RSNConfiguration->Security: Cipher No equivalent TKIP, AES-CCM WPA/RSNConfiguration->Security->PSK Tab: Pre-Shared KeyNo equivalent Pre-Shared Key WPA/RSNConfiguration->Security->PSK Tab: PassphraseNo equivalent Passphrase WPA/RSNConfiguration->Security->EAP Tab: EAP AlgorithmNo equivalent TLS, TTLS, or PEAP WPA/RSNConfiguration->Security->EAP Tab: User IDNo equivalent User ID WPA/RSNConfiguration->Security->EAP Tab: Client CertfileNo equivalent Certificate File WPA/RSNTable 1-5. Feature Key Dependent Parameters (Continued)Web-Based User Interface Fields CLI Commands Feature Key Dependent Parameters Needed Feature Key
IxWLAN User Guide, Release 6.20 1-15IntroductionFeature Key Dependent ParametersConfiguration->Security->EAP Tab: Inner AlgorithmNo equivalent MS-CHAPv2, EAP-MS-CHAPv2WPA/RSNConfiguration->Security->EAP Tab: Outer IDNo equivalent Outer Identity WPA/RSNConfiguration->Security->EAP Tab: PasswordNo equivalent Password WPA/RSNEvent Log->Configure Log->Modules Logset evlog modules WPA/RSN WPA/RSNNo equivalent get cryptocap show crypto hardware capabilitiesWPA/RSNNo equivalent cryptotest test crypto hardware capabilitiesWPA/RSNScenario menu->Roam button->Roamroam, auth, sendprobe  ID WPA/RSNGroup menu->Roam button->Roamroam, auth, sendprobe  ID WPA/RSNvSTA menu->Roam button->Roamroam, auth, sendprobe  ID RSNvSTA menu->Pre-authenticate... button->802.11i Pre-Authenticationpreauth BSSID RSNScenario menu->Pre-authenticate... button->802.11i Pre-Authenticationpreauth BSSID RSNGroup menu->Pre-authenticate... button->802.11i Pre-Authenticationpreauth BSSID WPA/RSNNew IxWLAN Group>Runtime tab->Roam Type autoconf [roamtype] Disassociation/ ReassociationWPA/RSNEdit IxWLAN Group>Runtime tab->Roam Type autoconf [roamtype] Disassociation/ ReassociationWPA/RSNAdd vSTA to Group>Runtime tab->Roam Type autoconf [roamtype] Disassociation/ ReassociationWPA/RSNConfig IxWLAN>IxWLAN->Radio ->Scan at Boot Modeget bootscan, setbootscan Enabled/ Disabled/All Modes802.11 a/ b/ gConfig IxWLAN>IxWLAN->Radio ->Background Joinget bkjoin, set bkjoin Enabled/ Disabled 802.11 a/ b/ gTable 1-5. Feature Key Dependent Parameters (Continued)Web-Based User Interface Fields CLI Commands Feature Key Dependent Parameters Needed Feature Key
IntroductionFeature Key Dependent Parameters1-16 IxWLAN User Guide, Release 6.201Table 1-6 describes the IxWLAN License Options.You can purchase an upgraded license from Ixia to add new features. You can enter your new license key in the Update IxWLAN dialog or use the set features CLI command.Config >Security->Fast RADIUSautoconf, get group, get vsta, set group, set vstafastreconnect WPA/RSNConfig >Security->PMKSAautoconf, get group, get vsta, set group, set vstapmkcache WPA/RSNTable 1-5. Feature Key Dependent Parameters (Continued)Web-Based User Interface Fields CLI Commands Feature Key Dependent Parameters Needed Feature KeyTable 1-6. IxWLAN License OptionsLicense Option Included Features/Keys11BG-WPA/RSN 11B, 11G, WPA/RSN11ABG-WPA/RSN 11A, 11B, 11G, WPA/RSN
IxWLAN User Guide, Release 6.20 2-12Chapter 2: Installation This chapter covers the following topics:•Attaching the Antennas on page 2-1.•Connecting Directly to a Command PC on page 2-2.•Connecting Through an Ethernet Hub or Switch on page 2-3.•Connecting to the Serial Port on page 2-3.Attaching the AntennasTo be able to use the IxWLAN SED/IxWLAN SED-MR+ chassis, the antennas must be attached.IxWLAN SED ChassisTwist the multiband antennas into the two antennas ports labeled 802.11bg and 802.11a. Either antenna can be connected to either port. Hand-tighten only.IxWLAN SED-MR+ ChassisTwist the multiband antennas into the three antennas ports labeled wport1, wport2, and wport3. Either antenna can be connected to either port. Hand-tighten only.
InstallationConnecting Directly to a Command PC2-2 IxWLAN User Guide, Release 6.202Connecting Directly to a Command PCTo connect the IxWLAN SED/IXWLAN SED-MR+ chassis to a command PC:1. Connect one end of the supplied Ethernet crossover cable to the Ethernet port on the command PC.2. Connect the other end of the crossover cable to the Mgmt. Port on the chassis, as shown in Figure 2-1.Figure 2-1. Connecting the IxWLAN SED/SED-MR+ Chassis to a Command PC
IxWLAN User Guide, Release 6.20 2-3InstallationConnecting Through an Ethernet Hub or SwitchConnecting Through an Ethernet Hub or SwitchTo connect the IxWLAN SED/IXWLAN SED-MR+ chassis through an Ethernet hub or switch:1. Connect one end of a standard Ethernet cable (not included) to the Ethernet port on the command PC. Connect the other end of the cable to the Ethernet Connector on the Ethernet hub or switch.2. Connect one end of a standard Ethernet cable to a port on the hub or switch. Connect the other end of the cable to the Mgmt. Port on the chassis, as shown in Figure 2-2.Figure 2-2. Connecting the IxWLAN SED/SED-MR+ Chassis Through an Ethernet Hub or SwitchThe IxWLAN SED/SED-MR+ chassis has a separate data port —Ext. Traffic Generator—which is used exclusively for the attachment of traffic generators and has no associated IP stack/address.Connecting to the Serial PortA standard straight serial cable is provided with the IxWLAN SED/IXWLAN SED-MR+ chassis.To connect to the Serial Port (Figure 2-3):•Connect the female connector end of the cable to a serial port on the com-mand PC. Figure 2-3. Connecting the IxWLAN SED/SED-MR+ Chassis to the Serial Port
InstallationConnecting to the Serial Port2-4 IxWLAN User Guide, Release 6.202
IxWLAN User Guide, Release 6.20 3-13Chapter 3: First Setup This chapter covers the following topics: •Using the Ethernet Ports on page 3-1.•Using the Serial Port on page 3-5.Using the Ethernet PortsThis section covers the following topics: •Command PC Attached to Port on IxWLAN SED on page 3-1.•Web-Based User Interface on page 3-3.•Command Line Interface on page 3-4.Command PC Attached to Port on IxWLAN SEDTo configure the Command PC and then access the web-based user interface or CLI, when the Command PC is attached to the Mgmt Port on the IxWLAN SED:1. Click Control Panel from the Start menu on the PC.2. Double-click Network Connections.3. Right-click Local Area Connection for the Ethernet controller that is con-nected to the IxWLAN SED chassis. Select Properties from the right-click menu and the Local Area Connection Properties dialog opens, as shown in Figure 3-1 on page 3-2.
First SetupUsing the Ethernet Ports3-2 IxWLAN User Guide, Release 6.203Figure 3-1. Local Area Connection Properties4. Click Internet Protocol (TCP/IP). 5. Click the Properties button and the Internet Protocol (TCP/IP) Properties dialog opens, as shown in Figure 3-2.Figure 3-2. TCP / IP Properties Dialog6. Click the Use the following IP address radio button and type the IP address for the Ethernet connection. Use an IP Address that resides on the same IP subnet as IxWLAN. For example, use 192.168.0.2 if you are using IxW-LAN's default IP address 192.168.0.50.7. Click OK to close the Internet Protocol (TCP/IP) Properties dialog.8. Click Close to close the Local Area Connection Properties dialog.You can access IxWLAN using one of the following methods.
IxWLAN User Guide, Release 6.20 3-3First SetupUsing the Ethernet PortsWeb-Based User Interface The command PC must be equipped with:•Microsoft Windows 2000/XP•Microsoft Internet Explorer version 6.0 or higher•Recommended Memory: 256 MB•Recommended Virtual Memory: 300 MB•Recommended Processor Speed: PIII 700 MHz•One of the following ActiveX objects: Msxml2.XMLHTTP or Microsoft.XMLHTTP. If either of these objects is not found, an alert message displays: “FATAL ERROR: Error creating ActiveX object XMLHTTP”.To access the web-based user interface:1. Start Internet Explorer on the command PC.2. Select Internet Options from the Tools menu. Click the Settings button and make sure that the Every Visit to Page radio button is clicked in the Settings dialog. This step is needed only the first time you use the web-based user interface. 3. Add the IxWLAN IP Address to your list of Trusted Sites and set the security level to Low for trusted sites.•Select the Security tab in the Internet Options dialog.•Select the Trusted sites icon (Figure 3-3).•Set the Security level for this zone to Low. If the security level for the zone is not Low, set the default level to Low.Figure 3-3. Internet Options•Click the Sites… button.•In the Trusted sites dialog, type the IxWLAN IP address in the Add this Web site to the zone field and click the Add button.
First SetupUsing the Ethernet Ports3-4 IxWLAN User Guide, Release 6.203•Click OK in the Trusted sites dialog.•Click OK in the Internet Options dialog.Use the IxWLAN default IP address 192.168.0.50 for the first setup, as shown in Figure 3-4.Figure 3-4. First Setup ExampleFor further information about how to use the web-based user interface, please refer to Chapter 4, The Web-Based User Interface.Command Line Interface You can use a PC that is connected via Telnet to access the CLI. To establish a Telnet connection, use the IxWLAN default IP address 192.168.0.50 for the first setup. C:\>telnet 192.168.0.50For more information about how to use the CLI, please refer to Chapter 5, The Command Line Interface (CLI). NOTE: Make sure that the Require server verification (https:) checkbox for all sites in this zone is not clicked.NOTE: If pop-up blocker software is installed on your system, the splash page opens an error message. Please refer to Chapter 8, Troubleshooting for further information.
IxWLAN User Guide, Release 6.20 3-5First SetupUsing the Serial PortUsing the Serial PortIf the command PC is connected to the IxWLAN chassis via the serial port, the web-based user interface is not available.To configure the Command PC and then access the CLI:1. On the Command PC, start a terminal-emulation program such as HyperTer-minal.2. In the Connection Description dialog, type a name for the connection in the Name field (for example, IxWLAN).3. Choose an icon for the connection, then click OK and the Connect To dialog opens, as shown in Figure 3-5.Figure 3-5. Connect To Dialog4. From the Connect Using list box, select the COM port that is connected to IxWLAN; then click OK and the COM Properties dialog opens, as shown in Figure 3-6.Figure 3-6. COM Properties Dialog
First SetupUsing the Serial Port3-6 IxWLAN User Guide, Release 6.2035. Set the COM port settings as shown in Figure 3-6 on page 3-5:•Bits per second: 115200 for IxWLAN SED•Data bits: 8•Parity: None•Stop bits: 1•Flow control: None6. Click OK to close the COM properties dialog.The POST messages appear on the HyperTerminal screen a few seconds after IxWLAN is connected to the power source.Attached TCP/IP interface to fei0Attaching network interface lo0...done.Loading... 11443040Starting at 0x308000...Reading Configuration File "/ata0a/config".Configuration file checksum: 23596 is goodfei0 loadedBase address = f0200000, irq 37Attach AR5212 0x13 0x1dbb5728wlan0 revisions: mac 5.6 phy 4.1 analog 1.7 eeprom 3.4ar0 loadedAttaching interface lo0...done                VxWorksCopyright 1984-2002 Wind River Systems, Inc.            CPU: Ampro RB 800   Runtime Name: VxWorksRuntime Version: 5.5.1    BSP version: 1.0/3        Created: Apr 7 2006, 11:51:55            WDB: Ready.IxWLAN Init:Mgmt LAN MAC 00:08:9B:80:2A:1AIxWLAN Init:Data LAN MAC 00:08:9B:80:2B:1Bcn505: b0 d3 f0, B0 b8810001 B2 b8810101Starting WLAN ...Starting quick passive scan ...Passive scanning 5 GHz 54Mbps (802.11a) channels for 7 seconds...Ixia IxWLAN ReadyTo open the IxWLAN logon prompt, press the ENTER key:IxWLAN login:
IxWLAN User Guide, Release 6.20 3-7First SetupUsing the Serial PortWhen the IxWLAN logon prompt opens, use the information in Chapter 5, The Command Line Interface (CLI) to log on and access the CLI.
First SetupUsing the Serial Port3-8 IxWLAN User Guide, Release 6.203
IxWLAN User Guide, Release 6.20 4-14Chapter 4: The Web-Based User Interface This chapter covers the following topics:•Startup and Login on page 4-1.•Choosing and Creating a Scenario on page 4-3.•Using the Main Page on page 4-14.•vSTA Side Bar on page 4-25.•IxWLAN Side Bar on page 4-40.•Monitors Side Bar on page 4-55.•Event Log Side Bar on page 4-63.•Reports Side Bar on page 4-66.•Configuration Side Bar on page 4-71.•Menus and Tool Bars on page 4-78.Startup and LoginSome of the dialogs shown in this chapter are feature key dependent. For more information, please refer to Feature Key Dependent Parameters on page 1-13.To start the IxWLAN software and log on:1. Start Internet Explorer.2. Type the IP address of the IxWLAN chassis in the URL address field of the browser (for example, http://10.205.15.50).3. Type your user name and password, as shown in Figure 4-1.NOTE: If WPA/RSN features are enabled, IxWLAN checks for encryption hardware on startup. If no encryption hardware is found, a dialog with the following message opens: “WPA Features have been disabled! IxWLAN is licensed for WPA, but no encryption hardware was found.” Please contact the Ixia Customer Support when this dialog opens.
The Web-Based User InterfaceStartup and Login4-2 IxWLAN User Guide, Release 6.204Figure 4-1. Startup and Login4. Click OK to access the IxWLAN web server.5. After successful logon, a splash page opens for a few seconds.NOTES: •The default user name is Admin. •The default password is IxWLAN. The user name and password are case-sensitive. NOTE: If pop-up blocker software is installed on your system, this splash page opens an error message. For details, see Chapter 8, Troubleshooting.
IxWLAN User Guide, Release 6.20 4-3The Web-Based User InterfaceChoosing and Creating a ScenarioChoosing and Creating a ScenarioThis section covers the following topics: •Choosing How to Begin on page 4-3.•Creating an Internal Mode/Ping Test on page 4-6.•Creating an External Mode Test on page 4-7.•Running a Test on page 4-9.Choosing How to BeginWhen IxWLAN already contains virtual station definitions, the dialog shown in Figure 4-2 opens.Figure 4-2. Choosing How to Begin•Click Yes to build a scenario in the user interface that is based on the virtual stations that are already defined in IxWLAN.•Click No to delete the virtual station definitions and create a new, empty sce-nario.•Click Cancel to retain the virtual stations in IxWLAN but not create a new, empty scenario. When the main page opens, you can view the Scenario Summary Report, Group Summary Report, and Event Log for these existing virtual stations.Figure 4-3 on page 4-4 opens when there are no virtual station definitions in IxWLAN and the welcome screen has not been disabled in the UI Configuration (For more information, please refer to Configuration->Preferences on page 4-77).
The Web-Based User InterfaceChoosing and Creating a Scenario4-4 IxWLAN User Guide, Release 6.204.Figure 4-3. Screen Opening When There Are No Virtual Stations Definitions•Click New Scenario to continue to the main page and create a new scenario.•Click Open Scenario to choose from a list of scenario files that have already been created. When you open an existing scenario, IxWLAN information is already stored with the scenario file.•Click Cancel to exit the dialog. You can create a new scenario or open an existing scenario in the main page. •Unselect the Show On Startup checkbox if you do not want to show this screen each time you access the IxWLAN web server. You can restore this screen in the UI Configuration dialog (For more information, please refer to Configuration->Preferences on page 4-77).When you click Open Scenario, the Open Scenario dialog opens, as shown in Figure 4-4.Figure 4-4. Open Scenario DialogThe list box shows a list of scenario files in IxWLAN. Click the BrowsePC… button to show scenario files stored on the command PC. Click a file name in the list of scenario files. •Click the Open button to open the selected scenario file and continue.
IxWLAN User Guide, Release 6.20 4-5The Web-Based User InterfaceChoosing and Creating a Scenario•Click the Delete button to delete the selected file.•Click the Cancel button to close this dialog without opening a scenario file. You can create a new scenario or open an existing scenario in the main page.Main PageFigure 4-5 shows the format of the main page that opens after you select any of the options in the start-up dialogs. This page looks differently, depending on whether you are running the web-based user interface on a SED or on a SED-MR+ chassis. Figure 4-5 shows the appearance of the IxWLAN SED-MR+ main page. For further details on the differences in the appearance of the main page on the two chassis, see Using the Main Page on page 4-14.Figure 4-5. Main PageThe content of this page differs depending on whether you create a new scenario, open an existing scenario, or cancel/close any of the start-up dialogs. Figure 4-5 presents an existing scenario, with two groups defined.If you have successfully opened a scenario file or chosen to use one that is already defined in IxWLAN, you can continue with the testing functions that are available in the menus and tool bars. For more information, please refer to Running a Test on page 4-9.NOTE: If no scenario has been created, the page is blank (No Scenario Defined).
The Web-Based User InterfaceChoosing and Creating a Scenario4-6 IxWLAN User Guide, Release 6.204If you click the Cancel button or the Create New Scenario button, you must cre-ate a new scenario that contains one or more group(s) of one or more virtual sta-tion(s).Creating an Internal Mode/Ping Test For a simple internal mode/ping test:1. Click New Group from the vSTA side bar to open the New IxWLAN Group dialog, as shown in Figure 4-6..Figure 4-6. New IxWLAN Group Dialog2. If you want IxWLAN to dynamically acquire IP addresses, select DHCP from the Address Generation drop-down list box. Otherwise, type an IP address in the Starting IP Address field to define the starting IP address to be used by virtual stations that are created in this scenario. Virtual stations are created with unique IP addresses, sequentially or randomly, based on this starting IP address. If you set the SSID, you can create a group with a SSID.
IxWLAN User Guide, Release 6.20 4-7The Web-Based User InterfaceChoosing and Creating a Scenario3. Select the Traffic tab, as shown in Figure 4-7. Figure 4-7. Traffic Tab4. Make sure that the Target IP Address field is set to the address of a target server to be pinged. The default IP address (0.0.0.0) shown in this example screen must be replaced by a valid IP address (for example, 10.205.15.95). Click the Create button to create a group with five virtual stations. For more information on defining and editing groups and virtual stations in a scenario, please refer to vSTA->New Group on page 4-26.5. Please refer to Running a Test on page 4-9 for procedures needed to run this test.Creating an External Mode TestFor an external mode test, a third-party load generator outside IxWLAN must be set up to provide the traffic to be forwarded to the System Under Test. 1. Use the documentation provided by the manufacturer to set up the load gener-ator.
The Web-Based User InterfaceChoosing and Creating a Scenario4-8 IxWLAN User Guide, Release 6.2042. Select New Group from the vSTA side bar to open the New IxWLAN Group dialog, as shown in Figure 4-8.Figure 4-8. Select New Group from vSTA Side Bar3. For layer 3, the source IP on your load generator must match the starting IP address assigned to the first vSTA on IxWLAN. For layer 2, the source MAC on your load generator must match the starting MAC address assigned to the first vSTA on IxWLAN.
IxWLAN User Guide, Release 6.20 4-9The Web-Based User InterfaceChoosing and Creating a Scenario4. Select the Traffic tab, as shown in Figure 4-9. Figure 4-9. Traffic Tab5. Select External in the Traffic Source field. Click the Layer 2 radio button to capture frames based on an 802.3 MAC source address. Click the Layer 3 radio button to capture frames based on an IP source address. A target IP address is not needed for an external mode test.6. Click the Create button to create the scenario for an external mode test.Running a TestIf you have not joined with a System Under Test, the dialog shown in Figure 4-10 on page 4-10 opens. Allows you to run the scenario/test for all groups and all virtual stations in a scenario.Allows you to run a test for selected virtual stations or groups.
The Web-Based User InterfaceChoosing and Creating a Scenario4-10 IxWLAN User Guide, Release 6.204Figure 4-10. Running a Test without Joining a SUTClick Yes to open the Select System Under Test dialog and join with the System Under Test. You can use any of the following methods to open the System Under Test dialog, shown in Figure 4-11 on page 4-11:1. Click Yes in the You are not joined with the SUT dialog shown in Figure 4-10.2. Click the  SUT icon in the System Under Test status tool bar at the top of the main window.NOTE: It is always necessary to join with a System Under Test before running a test (internal or external). If there are no SSIDs listed in the main page, the Select System Under Test dialog does not show any systems to join. If this is the case, click the Rescan button in the main page to instruct IxWLAN to look for systems to test.
IxWLAN User Guide, Release 6.20 4-11The Web-Based User InterfaceChoosing and Creating a Scenario3. Click the Select SUT button in the IxWLAN side bar.Figure 4-11. Select SUT DialogIf you have created a new scenario and have not saved it using the Save Scenario option in the File menu, the dialog shown in Figure 4-12 opens, asking you to save the scenario.Figure 4-12. Save Scenario Dialog
The Web-Based User InterfaceChoosing and Creating a Scenario4-12 IxWLAN User Guide, Release 6.204Click Yes to open the Save Scenario dialog and save the scenario file, as shown in Figure 4-13.Figure 4-13. Save Scenario FileType a name in the File Name field.•Click the Save (IxWLAN) button to save the scenario in the IxWLAN flash file system.•Click the Save(PC) button to save the scenario on the command PC. A stan-dard save dialog opens, as shown in Figure 4-14. Figure 4-14. Save HTML Doc DialogNOTE: Do not use colon (:), asterisk (*), question mark (?), quotes (“ “), less-than/greater than signs (< >), vertical bar (|), or spaces in a file name.
IxWLAN User Guide, Release 6.20 4-13The Web-Based User InterfaceChoosing and Creating a ScenarioType a name in the File Name field. A disk drive specification (for example, C:/, D:/) is optional. Click the Save but-ton to save the scenario at the designated location on the command PC.The virtual stations start running a few seconds after the scenario is saved. As the test runs, you can see the “Run State” in the group grid go through the 802.11 states: configure, starts, authenticate, associate, and run. When an internal mode/ping test is complete, the Run State shows Done.NOTE: Do not use colon (:), asterisk (*), question mark (?), quotes (“ “), less-than/greater than signs (< >), vertical bar (|), or spaces in a file name.NOTE: Any interaction with a running test can affect the operation of the test, which may result in skewed statistics.
The Web-Based User InterfaceUsing the Main Page4-14 IxWLAN User Guide, Release 6.204Using the Main PageFigure 4-15 shows the general format of the main page, as it displays on an IxW-LAN SED-MR+ chassis. It illustrates a scenario with two virtual station groups defined and a group tab (Grp_2) selected.Figure 4-15. IxWLAN SED-MR+ Main PageNOTE: The appearance of the main IxWLAN window differs depending on the type of chassis used to run the web-based interface:•In the main window of the IxWLAN SED chassis, the BSSIDs for the other two wports, which are available in the IxWLAN SED-MR+ chassis main win-dow, are disabled, appearing dimmed, as well as the corresponding SUT-selection buttons.•The wport tabs for the other two wports do not appear in the main window of the IxWLAN SED chassis.
IxWLAN User Guide, Release 6.20 4-15The Web-Based User InterfaceUsing the Main PageFor the IxWLAN SED chassis, the main window has a similar appearance, except for the two other wports, which are dimmed. Figure 4-16 shows a scenario with one virtual station group defined and the Group Control tab selected.Figure 4-16. IxWLAN SED Main Page
The Web-Based User InterfaceUsing the Main Page4-16 IxWLAN User Guide, Release 6.204When the Group Control tab is selected, the main page opens the Load Profile and a list of devices that have been discovered (if any) in a scan, as shown in Figure 4-17.Figure 4-17. Load Profile and List of DevicesMenu tool bar: The top-left tool bar of the main page is a drop-down menu bar of all IxWLAN functions (Figure 4-18). Figure 4-18. Menu Tool BarStatus tool bar: The top-right tool bar shows the status of IxWLAN, the multira-dio mode (Static or Dynamic), and the current time on the command PC (Figure 4-19). Figure 4-19. Status Tool BarThe status (for example, Online) next to IxWLAN IP Address indicates the cur-rent status of IxWLAN with the web-based user interface. This status may inter-mittently show Busy or Offline. If the Busy or Offline status displays frequently or for extended periods of time, check the Polling Interval and Polling Timeout values in the Configure IxWLAN dialog. The Multi-Radio Mode indicator on the tool bar shows the currently set multi-radio mode (static or dynamic). The default setting for the multi-radio mode indicator is static. The multi-radio mode can be changed in the Configure IxWLAN dialog. Please refer to IxWLAN-
IxWLAN User Guide, Release 6.20 4-17The Web-Based User InterfaceUsing the Main Page>Configure IxWLAN on page 4-44 and to IxWLAN Busy or Not Responding on page 8-5. System Under Test status tool bar: It is located under the Menu and Status tool bars and shows the BSSID(s) and buttons to choose SUT(s) for specific wports. The status (for example, Not Found) next to the BSSID/MAC address indicates the current status of IxWLAN with a System Under Test (Figure 4-20).Figure 4-20. SUT Status Tool BarFile tool bar: This tool bar is used to create, open, save, and print scenarios (Figure 4-21). Figure 4-21. File Tool BarScenario tool bar: The buttons in this section of the tool bar can be used to run, pause, stop, restart, refresh, or quiesce the entire scenario of all virtual stations (Figure 4-22).Figure 4-22. Scenario Tool BarvSTA tool bar: The buttons in this tool bar are used to start, authenticate, associ-ate, acquire an IP, run, pause, release an IP, stop, disassociate, de-authenticate, restart, refresh, or quiesce selected virtual stations or groups of virtual stations (Figure 4-23).Figure 4-23. vSTA Tool BarReports tool bar: The buttons in this tool bar are used to view reports and the event log (Figure 4-24).Figure 4-24. Reports Tool Bar
The Web-Based User InterfaceUsing the Main Page4-18 IxWLAN User Guide, Release 6.204Test Clock: The clock icon and time (hh:mm:ss) immediately adjacent to the Reports tool bar shows the elapsed duration of a test that is in progress or the most recent test that completed (Figure 4-25).Figure 4-25. Test ClockSide Bar Buttons: The side bar buttons are used to select vSTA, IxWLAN, Monitor, Report, Event Log, and Configuration functions in the web-based user interface (Figure 4-26).Figure 4-26. Side Bar ButtonsNote the down-arrow buttons at the bottom of the IxWLAN and Reports side bars. These arrows indicate additional functions or information in the down side of the side bar displayed. When you click the down-arrow button, the additional information displays and an up-arrow button is shown at the top of the side bar.
IxWLAN User Guide, Release 6.20 4-19The Web-Based User InterfaceUsing the Main PageGroup Control Grid If the Group Control tab is selected, the table shows the status of each group and its associated virtual stations, as shown in Figure 4-27.Figure 4-27. Group StatusGroup: Shows the name of each group. The name is assigned in the New IxW-LAN Group dialog (For more information, please refer to vSTA->New Group on page 4-26).The remaining fields in the group line are counters that show the state of each group’s virtual stations during a test.Total: Shows the total number of virtual stations in each group.Down: Shows the total number of virtual stations in a group that have not been configured in IxWLAN and are in a down state.Conf (Configured): Shows the total number of virtual stations in each group that have been configured in IxWLAN.Init (Initialized): Shows the total number of virtual stations in each group that have been started in IxWLAN.Auth (Authenticated): Shows the total number of virtual stations in each group that have been 802.11 authenticated with the System Under Test.Assoc (Associated): Shows the total number of virtual stations in each group that have been 802.11 associated with the System Under Test.Ready: Shows the total number of virtual stations in each group that are ready to run.Running: Shows the total number of virtual stations in each group that are cur-rently performing an operation defined by the scenario. The operation that is being performed depends on whether the virtual stations are configured for inter-nal or external traffic generation.Paused: Shows the total number of virtual stations in each group that have paused in their execution.Terminated: Shows the total number of virtual stations in each group that have been ended. These virtual stations must be reset before they can be used again.Done: Shows the total number of virtual stations in each group that have com-pleted their run of an internal mode/ping test. This field is not to be incremented for virtual stations that are running an external mode test or an internal mode test with infinite iterations.
The Web-Based User InterfaceUsing the Main Page4-20 IxWLAN User Guide, Release 6.204wport Tabs: Each wport has its own tab. When a wport tab is selected, the table displays details on the vSTAs corresponding to the respective wport. The table columns are the same as for the Groups tabs, except for the wport column. Group Tabs: Each group defined in the scenario has its own tab. When an indi-vidual group tab is selected, the table displays details of each virtual station in the group, as shown in Figure 4-28.Figure 4-28. Group TabsGID: The global ID is a unique ID that is assigned by IxWLAN to each virtual station in a scenario group. It is an unique ID across all groups in IxWLAN. The GID is the vSTA ID.IP Address: Shows each virtual station's IP Address.WPort: Shows the wport on which the vSTA residesRun State: Shows the current state of each virtual station in the scenario group (that is, Initializing, Authenticating, Authenticated, Associating, and so on).Iteration: The two numbers in this column show the current iteration of the test that a virtual station is running or has completed and the number of iterations that are configured for the virtual station (for example, 5/10 = 5 iterations have been completed/10 iterations are to be run). These numbers can be a value in the range zero (0) to 9999 or Infinite.Status Messages: Shows the status and/or the error messages returned by IxW-LAN for each virtual station in the scenario group. For more information about the messages that can be shown in this column, please refer to Appendix E, Error and Status Messages.Pkts Rcvd: Shows the total number of packets received by each virtual station in this group.Pkts Xmtd: Shows the total number of packets transmitted by each virtual station in this group.Pkt Loss: Shows the percentage of packet loss for each virtual station in this group.vSTA Mode: Shows the traffic generation mode (Internal or External) of each vir-tual station in the scenario group.NOTE: While in the wport tab view, the Edit and Group menu items are dimmed.
IxWLAN User Guide, Release 6.20 4-21The Web-Based User InterfaceUsing the Main PageYou can select one or more line items/virtual stations in the table and choose a menu item or tool bar button to execute a command for an individual or multiple virtual stations. You can double-click a virtual station line item in the table to open the Edit Vir-tual Station dialog. For more information about this dialog, please refer to vSTA->Add New vSTA to Group on page 4-39.You can right-click the selected virtual stations to open the vSTA menu. For more information about the selections in this menu, please refer to vSTA Menu on page 4-89.Group Tab Columns: Within a group, you can double-click the table heading to configure the displayed columns, as shown in Figure 4-29.Figure 4-29. Group Tab ColumnsSelect one or more items in the All Columns list box and click the [>>] button to move them to the Selected Columns list box. Click the Modify button to add the columns to the group table. Click the Reset button to return the columns to their default setting.Load Profile The Load Profile section of the page can be used to automatically execute scenar-ios at scheduled intervals, as shown in Figure 4-30 on page 4-22.
The Web-Based User InterfaceUsing the Main Page4-22 IxWLAN User Guide, Release 6.204Figure 4-30. Load ProfileWhen automatic scheduling is defined, the grid in the down side of the Schedul-ing/Group table charts the status of each virtual station over the period of the test. For further information about using this feature please refer to Using Load Profiles on page 4-23.Systems to Test In the down side of the Load Profile, the main page shows a list of systems and their signal strength in relationship to IxWLAN, as shown in Figure 4-31.Figure 4-31. System to TestClick the Rescan button to instruct IxWLAN to rescan for all systems. The devices shown in this list box are shown in the Select System Under Test dialog, that allows you to choose a system to test.Load Profile/Monitor GraphsThe bottom half of the web page is reserved for charts that graphically show a load profile and monitor test results. If selected, the Load Profile tab allows you to view the loading profile based on an active Load Profile, as shown in Figure 4-32.Figure 4-32. Load Profile / Monitor GraphsFor more information about how to set up a Load Profile, please refer to Using Load Profiles on page 4-23.
IxWLAN User Guide, Release 6.20 4-23The Web-Based User InterfaceUsing the Main PageIf there are multiple monitors defined, use the horizontal tabs at the top of this section to select and view each monitor, as shown in Figure 4-33.Figure 4-33. Multiple MonitorsA maximum of four monitors can be defined in each scenario. The tool bar in the top right corner of the monitor area allows you to define a new monitor, delete a monitor, run a paused monitor, pause a running monitor, and clear a monitor’s view. For more information about this section of the page, please refer to Monitors Side Bar on page 4-55.Range Checking/Error MessagesIn the dialogs described later in this chapter, the web-based user interface verifies all entries that need values within a specified range. If a field contains a very large number, do not type commas (,) for values larger than 999 (for example, use 1000 rather than 1,000).If you use an invalid character in a field or specify a value that is not within the allowable range, a dialog opens, as shown in Figure 4-34.Figure 4-34. Range CheckingWhen an Invalid Data dialog opens, click OK and retype a value that is within the allowable range for the field.Using Load Profiles Load Profiles allows you to control the execution of virtual stations: Unsched-uled or Scheduled, as shown in Figure 4-35.
The Web-Based User InterfaceUsing the Main Page4-24 IxWLAN User Guide, Release 6.204Figure 4-35. Load Profile SettingsWhen using the Unscheduled mode, the virtual stations can be manually con-trolled.When using the Scheduled mode, the virtual stations can be run incrementally based on groups (all virtual stations within the group) or by individual virtual sta-tions.Run tests: Select Unscheduled or Scheduled. The default is Unscheduled. If Scheduled is selected (and set by clicking the Set button), the Load Profile is in effect for the scenario. If Unscheduled is selected, the Load Profile is not in effect. After: Defines a first delay before a run starts: from 0 to 3600 s (1 h). It is the number of seconds after a Run command has been issued (for example, the Run button is selected in the tool bar) that the Load Profile begins executing.run: Type the number of virtual stations to start each time interval of the load profile. The time interval is specified in the every field.per: Defines what scheduling is based on (All vSTA = all virtual stations, Groups = virtual stations within each group). If All vSTA is selected, the Load Profile runs the next run number of virtual stations at each scheduled iteration. If Group is selected, the Load Profile runs the next run number of virtual stations from each group at each scheduled iteration. The scheduled iteration is defined in the every field.every: Defines the number of seconds between each repetition of the Load Pro-file: from 1 to 3600 s (1 h). When this time expires, the next set of virtual stations (as defined in the run field) is executed.Select the Load Profile tab in the Load Profile/Monitors section of the page to show the Load Profile graph. The Load Profile graph opens the Load Profile setup: x-Axis = time, y-Axis = Groups or All vSTA depending on the selection in the per field. Figure 4-36 on page 4-25 shows a sample Load Profile setup and graph.NOTE: When requests are batched for transmission, they may not be sent at the scheduled interval defined by the Load Profile. See the Batch IxWLAN Requests field in the Configure IxWLAN dialog (see IxWLAN->Configure IxWLAN on page 4-44).
IxWLAN User Guide, Release 6.20 4-25The Web-Based User InterfacevSTA Side BarFigure 4-36. Load Profile Setup and GraphAfter a five-second delay, the web-based user interface instructs IxWLAN to run four virtual stations. Every five seconds thereafter, the web-based user interface instructs IxWLAN to run another four virtual stations until all virtual stations are executed. The graph depicts this scheduling scheme.vSTA Side BarIn the web-based user interface, you can create scenarios that consist of one or more groups of virtual stations. The group configuration defines a test sequence that IxWLAN activates to exercise the System Under Test. Virtual stations can be configured individually or by group. In internal mode, you can configure each virtual station and/or group to generate traffic to the system being tested. You can also configure virtual stations to operate in external mode where an external load generator generates the traffic. New Group: Defines a new group in a scenario.Edit Group: Modifies the definition of a group.Delete Group: Removes a group and all its virtual stations from a scenario.Add vSTA to Group: Defines a new virtual station in a scenario group.
The Web-Based User InterfacevSTA Side Bar4-26 IxWLAN User Guide, Release 6.204vSTA->New Group The New Group dialog allows you to define new groups of virtual stations in a scenario. It is a tabbed dialog with the following sections: vSTA, Traffic, Runt-ime, On Error, and Security. •The Create button allows you to create the group.•The Cancel button allows you to exit the dialog.vSTA->New Group->vSTA The vSTA section of the New IxWLAN Group dialog defines the range of IP and MAC addresses to be used by virtual stations, as shown in Figure 4-37 on page 4-26.The range of MAC addresses specified in this dialog must be within the range of MAC addresses defined by the WLAN Base MAC Address and WLAN MAC Mask in the IxWLAN configuration (see IxWLAN->Configure IxWLAN on page 4-44).Figure 4-37. vSTA SectionGroup Name: Use a group name that helps you identify the devices to be tested (for example, Warehouse, Stock_Room, Ctrl_Tower, Shop_Floor, and so on.). It can be up to 12 characters (a…z, 0…9, and underscore (_)).IxWLAN Address: Shows the IP address of IxWLAN that runs this scenario/test.
IxWLAN User Guide, Release 6.20 4-27The Web-Based User InterfacevSTA Side BarNumber of Virtual Stations: Type the number of virtual stations to create in this scenario group. The maximum number of vSTAs for the IxWLAN SED chassis is 64, and 128 for the IxWLAN SED-MR+ chassis. The default value is 5. If you specify zero virtual stations in this dialog, you must use the Add vSTA to Group dialog to add one or more virtual stations to this group. The Add vSTA to Group dialog uses the default parameters that you set in this group definition.wport: Select the number of the wport (1, 2, or 3). Subsequently, the group is cre-ated on the chosen wport.Starting IP Address: If Sequential or Random is selected in the Address Gener-ation field, type the starting IP address to use for virtual station IP address gener-ation of newly-created virtual stations in this group. Successive virtual station IP addresses are sequentially or randomly generated from this base address.Netmask: Shows the network mask to be used by virtual stations in this group. It cannot be set here. It is global for all virtual stations and an IxWLAN configura-tion parameter.Ending IP Address: If Random is selected in the Address Generation field, type the ending IP address to be used by virtual stations in this group when generating random addresses within a range.Address Generation: Select Sequential, Random, or DHCP from the drop-down list box. The Sequential or Random selections instruct IxWLAN to sequentially or randomly assign IP addresses to newly-created virtual stations. The DHCP mode allows virtual stations to have IP addresses dynamically acquired from a DHCP server on the WLAN network rather than a fixed, configured IP address. If DHCP is selected, IxWLAN initiates lease negotiation if association succeeds for each individual virtual station. Starting MAC Address: Type the starting MAC address to be used for virtual sta-tion MAC address generation of newly-created virtual stations in this group. Suc-cessive virtual station MAC addresses are sequentially or randomly generated from this base address. The starting MAC address must be within the range of MAC addresses defined by the WLAN Base MAC Address and WLAN MAC Mask in IxWLAN configuration (see IxWLAN->Configure IxWLAN on page 4-44).WLAN MAC Mask: The WLAN MAC Mask is a display-only field. It is defined in IxWLAN configuration (see IxWLAN->Configure IxWLAN on page 4-44). It limits the range of MAC addresses that can be detected on the wireless LAN and received by IxWLAN. For example, if the WLAN MAC is set to 00:0b:cd:59:23:44 and the mask is set to ff:ff:ff:ff:00:00, the only MAC addresses that can be detected on the wireless LAN and received by IxWLAN are 00:0b:cd:59:00:00 - 00:0b:cd:59:ff:ff. All other MAC addresses are filtered out. NOTE: If you intend to configure all virtual stations for WPA or RSN authentication, the maximum number of virtual stations is 59.
The Web-Based User InterfacevSTA Side Bar4-28 IxWLAN User Guide, Release 6.204Ending MAC Address: Type the ending MAC address to be used by virtual sta-tions in this group.SSID: Set the SSID to a string. The user can create a vSTA with a SSID. This is an optional field.vSTA->New Group->TrafficThe Traffic section of the New IxWLAN Group dialog defines the type of traffic (Internal/Ping or External/Load Generator) to be used by the virtual station(s), as shown in Figure 4-38.Figure 4-38. vSTA TrafficTraffic Source: Select Internal or External from the list box. In Internal mode, traffic is generated internally by each vSTA using ICMP Echo (Ping) Request/Reply packets. In External mode, packets coming into IxWLAN over 802.3 are mapped to virtual stations by source IP or MAC address and forwarded via 802.11. Packets coming back via 802.11 are remapped to the originating MAC address. Layer 2/Layer 3: If External is selected in the Traffic Source field, select one of these radio buttons to identify the external frames to be captured. If Layer 2 is selected, frames are captured based on the source 802.3 MAC address. If Layer 3 is selected, frames are captured based on the source IP address. For vSTAs con-figured at layer 3, IP and ARP packets generated from this host that contain the
IxWLAN User Guide, Release 6.20 4-29The Web-Based User InterfacevSTA Side Barvirtual station's IP address as a source are translated at the MAC layer to appear as if sourced from the virtual station's MAC address. Target IP Address: Type the target IP address where ICMP Echo (Ping) Requests should be sent. The default IP address (0.0.0.0) shown in this example dialog must be replaced by a valid IP address (for example, 192.168.0.19). Packet Length: Specify the size of the ping data buffer (64…1024). The default is 1024.Count: Specify the total number of pings to be sent: 0…10000 (0=forever).vSTA->New Group->RuntimeThe Runtime section of the New IxWLAN Group dialog allows you to run a vir-tual station’s test multiple times. This is applicable only to internal traffic genera-tion. After each iteration of a test, the state of the virtual station can be set to a base state. A user-defined delay between successive iterations is defined in mil-liseconds (ms). Optionally, any results collected for the virtual station can be cleared at the start of each iteration. Figure 4-39 shows the Runtime section of the New IxWLAN Group dialog.Figure 4-39. vSTA Runtime
The Web-Based User InterfacevSTA Side Bar4-30 IxWLAN User Guide, Release 6.204Number of Iterations: Type the number of times (1…10000) to repeat the virtual station’s task (Ping) or click the Infinite checkbox to continuously iterate indefi-nitely.Iteration Delay: Type the delay (in ms) to be introduced between iterations of the test. It can be set to a value in the 0 to 300000 ms (5 min) range.Before Running Next Iteration->Reset vSTA State to: Select a state from the list box. Each virtual station in this group resets to the selected state (started, authen-ticated, or associated) at the end of each iteration.Before Running Next Iteration->Clear vSTA Results: Select this checkbox to clear test results before successive iterations of the test.RTS Threshold: Type a value in the 1 to 2346 range to define the RTS threshold for the virtual station(s) in this group. Any frame to be transmitted by a virtual station that exceeds the RTS threshold needs a successful RTS/CTS frame exchange before the frame is transmitted. The minimum value (1) effectively needs RTS/CTS for all transmit frames. The maximum value (2346) is the maxi-mum 802.11 frame size and effectively disables RTS.Fragmentation Threshold: Type a value in the 256 to 2346 range to define the fragmentation threshold for the virtual station(s) in this group. The fragmentation threshold limits the number of bytes in any 802.11 frame transmitted by the vir-tual station(s). If this field is set to 2346 (that is, the maximum 802.11 frame size), fragmentation is effectively disabled.Probe before Authentication: An option to select whether to issue a Probe Request in the course of association lifecycle, before the 802.11 authentication.Roam Type: Select Reassociation or Disassociation. Indicates the type of frame exchange to be used for virtual station(s) in this group during a Roam operation: Reassociation (a Reassociation Request is sent to the target AP) or Disassociation (a Disassociation frame is first sent to the origin AP and an Association Request frame is sent to the target AP).vSTA->New Group->On ErrorThe On Error section of the New IxWLAN Group dialog defines whether virtual stations should reconnect to the System Under Test during a test if the system de-authenticates or disassociates a virtual station, as shown in Figure 4-40 on page 4-31.
IxWLAN User Guide, Release 6.20 4-31The Web-Based User InterfacevSTA Side BarFigure 4-40. vSTA ErrorNumber of Retries: Specifies the number of times IxWLAN should issue authen-tication and association requests before failing the operation. It can be a value in the 0 to 10 range. Persist: Click the checkbox to enable or disable persistence. When enabled, vir-tual stations in this group remain persistent (connected) if the System Under Test deauthenticates or disassociates. If IxWLAN loses connection to a System Under Test, persistence allows it to recover and continue the test at the point where it was interrupted. For example, if a virtual station is in a run or associated state and an 802.11 management frame (deauth or disassoc) is sent by the System Under Test and received by IxWLAN, the virtual station tries to return to the state it was in, before the management frame was received. If the virtual station was running a ping test, the ping test continues. If it was in an associated state, the virtual sta-tion reissues the associate request. Auth/Assoc Timeout: Specifies the timeout value (in ms) for authentication and association requests. It can be set to a value in the 250 to 60000 ms (1 min) range.AKMP Timeout: Sets a wait state timer (0…3600 s) for the virtual stations in the group. In situations where the System Under Test does not start or respond dur-ing a 4-way handshake, the affected virtual station may stall in a wait state. The timer can be used to recover the virtual station into an operable state. If the vir-tual station remains in a wait state until this timer expires, it is 802.11 de-authen-ticated and returned to the beginning state. The default value (zero) disables the timer (that is, wait forever).
The Web-Based User InterfacevSTA Side Bar4-32 IxWLAN User Guide, Release 6.204vSTA->New Group->SecurityThis section of the New Group dialog defines whether the virtual station uses security, the type of authentication to be used for authenticating with the System Under Test, and the associated cipher to use. Encryption: Select On or Off from the drop-down list box to enable/disable encryption. Authentication: Select an authentication type: Open System, Shared Key, RSN, RSN-PSK, WPA, or WPA-PSK. If you select RSN or WPA, define user creden-tial parameters in the EAP tab. If you select RSN-PSK or WPA-PSK, define a pre-shared key or passphrase in the PSK tab. Cipher: For Open System or Shared Key Authentication, WEP is the only valid selection. For RSN, RSN-PSK, WPA, and WPA-PSK Authentication, select TKIP or AES-CCM (that is, CCMP cipher mode).Fast Radius: The default value of this attribute is Disabled. When a vSTA is configured for fast RADIUS reconnection and the vSTA has cached the TLS ses-sion information, it tries fast resumption in subsequent 802.1X authentication exchanges by using the session_id and master_key from that cached TLS session.PMKSA Cache: Enables the use of the cached PMKSA information when (re)associating. The default value is Enabled. Each entry in the PMKSA cache contains the BSSID of the corresponding AP, a PMKID, and the Pairwise Master Key (PMK). A PMKSA can be obtained by 802.1X authentication or by pre-authentication.vSTA->New Group->Security WEP TabFor Open System or Shared Key Authentication and WEP Cipher mode, this sec-tion of the New Group dialog allows you to define up to four shared keys, as shown in Figure 4-41 on page 4-33.
IxWLAN User Guide, Release 6.20 4-33The Web-Based User InterfacevSTA Side BarFigure 4-41. Security KeysKey 1…4: This section of the dialog shows the shared keys that were defined in the Security Configuration dialog. For further information, please refer to Configuration->Security on page 4-71. Select the shared key to be used. These keys are used for encryption by virtual stations in this group with the System Under Test. Edit Keys: The Edit Keys button allows you to change the keys in this dialog.
The Web-Based User InterfacevSTA Side Bar4-34 IxWLAN User Guide, Release 6.204vSTA->New Group->Security PSK TabIf you have selected WPA-PSK or RSN-PSK in the Authentication field, this section of the dialog defines a Pre-Shared Key or passphrase, as shown in Figure 4-42.Figure 4-42. Security PSK TabPre-Shared Key (64 hex digits): Defines a Pre-Shared Key (64 ASCII-hex char-acters) for all virtual stations in this group.Passphrase (up to 63 characters): Defines a passphrase of up to 63 ASCII charac-ters.NOTE: When using a Pre-Shared Key, it is not necessary to specify the passphrase. NOTE: When a passphrase is defined, it is not necessary to specify the Pre-Shared Key. The passphrase is used to generate the Pre-Shared Key.
IxWLAN User Guide, Release 6.20 4-35The Web-Based User InterfacevSTA Side BarvSTA->New Group->Security EAP TabIf you have selected RSN or WPA in the Authentication field, this dialog allows you to define user credential parameters, as shown in Figure 4-43.Figure 4-43. Security EAP TabEAP Algorithm: Select TLS, TTLS, or PEAP from the drop-down list box. If you select PEAP or TTLS, define Inner Algorithm, Outer ID, and Password in the PEAP/TTLS section.User ID: Defines the user ID for virtual stations in this group. It can be up to 64 characters in the range A…Z, a…z, 0…9, or other legal characters: period (.), dash (-), at-sign (@).Client Certfile: Defines the certificate file for virtual stations in this group. Select…: Click the Select... button to open the Available Certificates dialog and select a certificate file. See Available Certificates on page 4-36.PEAP/TTLS Parameters: When PEAP or TTLS is selected in the EAP Algo-rithm list box, use this section of the dialog to define PEAP/TTLS parameters.Inner Algorithm: Select the inner algorithm to use in Phase 2 authentication. MS-CHAPv2 is normally used for TTLS. EAP-MS-CHAPv2 is normally used for PEAP.
The Web-Based User InterfacevSTA Side Bar4-36 IxWLAN User Guide, Release 6.204Outer ID: Type an outer identity to use in Phase 1 authentication. It can be up to 64 characters in the range A…Z, a…z, 0…9, or other legal characters: period (.), dash (-), at-sign (@).Password: Type a password to use in Phase 2 authentication. It can be up to 64 characters.Available CertificatesThe Select button in the New Group/Security EAP tab opens the Available Cer-tificates dialog, as shown in Figure 4-44.Figure 4-44. Available Certificate DialogThe Space available indicates the total available space in the IxWLAN flash file system. This number changes when certificate files are added or deleted.•The OK button (or double-clicking a file name in the list) allows you to set the Client Certfile field to the currently highlighted certificate file name.•The Delete button allows you to delete the currently highlighted certificate file. A confirmation dialog asks you to confirm this selection. An error dialog opens if the certificate file is in use by any vSTA, otherwise the certificate file is deleted.•The Cancel button allows you to exit the dialog.•The Import… button allows you to open the Import Certfile dialog. Certfile: Type the complete path and name of a certificate file or click the Browse… button to open the File Browse dialog as shown in Figure 4-45 on page 4-37 and then select from the files stored on the command PC. NOTE: Inner Algorithm, Outer ID, and Password are only used for TTLS and PEAP. They are ignored for TLS.
IxWLAN User Guide, Release 6.20 4-37The Web-Based User InterfacevSTA Side BarFigure 4-45. Import Certfile DialogCertpass: After a file name is typed or selected, enter the password needed for the certificate file.•The OK button allows you to transfer the specified file to IxWLAN with the same file name and extension. The newly-added certificate file is then listed as one of the available certificates.•The Cancel button allows you to close this dialog without selecting a certifi-cate file.NOTE: Certificate files must be in PKCS#12 format, which is usually indicated by a .p12 or a .pfx file extension.NOTE: You can view each vSTA’s User ID and Certificate file by editing the vSTA or by including the WPA User ID and WPA Certfile attributes in the table view. See Group Tab Columns under Group Control Grid in Using the Main Page on page 4-14.
The Web-Based User InterfacevSTA Side Bar4-38 IxWLAN User Guide, Release 6.204vSTA->Edit Group The Edit IxWLAN Group dialog opens, as shown in Figure 4-46, when the Edit Group button is selected in the vSTA side bar.Figure 4-46. Edit IxWLAN Group DialogFigure 4-46 is the same as the vSTA->New Group dialog, except for the vSTA tab, which is different. Thus, in the vSTA tab, after the virtual stations have been created, the wport, Netmask, and Gateway group attributes cannot be changed. In addition, the Number of virtual stations field is not present in the Edit IxWLAN Group dialog. To add a virtual station to the group, refer to vSTA->Add New vSTA to Group on page 4-39. For more information about the description of the fields in this dialog, please refer to vSTA->New Group on page 4-26. •The Modify button allows you to modify all virtual stations with the new set-tings.•The Cancel button allows you to close this dialog without modifying any vir-tual stations.NOTE: The group’s wport attribute can be edited only if the system is in the dynamic mode. In the static mode, the wport selection is disabled, appearing dimmed.
IxWLAN User Guide, Release 6.20 4-39The Web-Based User InterfacevSTA Side BarvSTA->Delete GroupWhen the Delete Group button is clicked from the vSTA side bar, a confirma-tion dialog prompts you to confirm this selection, as shown in Figure 4-47.Figure 4-47. Confirmation Dialog•Click Yes to remove the group and all virtual stations that it contains from the system. •Click No to close this dialog without removing the group.vSTA->Add New vSTA to GroupFigure 4-48 opens when the Add New vSTA to Group button is selected in the vSTA side bar.Figure 4-48. Add New vSTA to GroupThis dialog is used to add new virtual stations to an existing group. All fields in this dialog default to the values that were first entered when the group was cre-ated. Any changes to this dialog also update these group default values. See vSTA->New Group on page 4-26 for a description of the fields in this dialog.
The Web-Based User InterfaceIxWLAN Side Bar4-40 IxWLAN User Guide, Release 6.204•The Add button allows you to add the virtual station.•The Cancel button allows you to close this dialog.IxWLAN Side BarThe buttons in this side bar are used to configure and manage IxWLAN and to select and join with a System Under Test.Select SUT: Opens the Select System Under Test dialog.Join SUT(s): Joins with the System Under Test.Configure IxWLAN: Configures IxWLAN.Reconnect IxWLAN: Reconnects to IxWLAN. This is used after a reboot of IxWLAN.Reset IxWLAN: Resets all statistics counters to zero and all virtual stations to a configured state.Reboot IxWLAN: Reboots IxWLAN.Update IxWLAN: Updates IxWLAN with a new firmware image file or feature key.
IxWLAN User Guide, Release 6.20 4-41The Web-Based User InterfaceIxWLAN Side BarIxWLAN->Select SUTYou can access the Select System Under Test dialog (Figure 4-49) in two ways:1. Click one of the wport-specific  Select SUT buttons in the System Under Test status tool bar at the top of the main window. In this case, when the Select System Under Test dialog opens, only the wport checkbox correspond-ing to the checked button is selected.2. Click the Select SUT(s) button in the IxWLAN side bar. In this case, when the Select System Under Test dialog opens, none of the three wport check-boxes are selected.Figure 4-49. Select System Under Test•Select one of the wport BSSID checkboxes (for example, wport1).•Click a BSSID in the list box.•Click the Select button next to the wport1 BSSID box. The selection is copied into the wport1 BSSID box.•Click the Set button corresponding to the wport1 BSSID box.•Select the wport1 checkbox.•Click the Join button to join wport1 with the selected System Under Test.NOTE: Clicking Join implicitly performs a Set action first (if not done explicitly by clicking the Set button).
The Web-Based User InterfaceIxWLAN Side Bar4-42 IxWLAN User Guide, Release 6.204•Click the Rescan button to update the list of BSSIDs. The merged list of new wport1 BSSIDs and old BSSIDs for wport2 and wport3 displays.•The Select button adjacent to a wport adds the respective BSSID in the list box to the edit box left of it.•The Set button sets the wport adjacent to it to the BSSID left of it.•Click the Exit button to close this dialog without making any further changes.To change the wireless mode, select 11a, 11b, 11g, or All Modes (that is, all valid wireless modes) from the drop-down list adjacent to the Rescan button. This field is used to select a wireless mode for optional successive scanning. It defaults to the current wireless mode configured for the unit.If a scenario with virtual stations already exists and you have previously joined with a system under test, the dialog shown in Figure 4-50 opens when you select a different BSSID in the Select System Under Test dialog.Figure 4-50. Selecting Different BSSID in the Select SUT Dialog•Click Yes to continue and join with a different System Under Test. •Click No to return to the Select System Under Test dialog.IxWLAN->Join SUT(s)When the Join SUT button is selected in the IxWLAN side bar, a confirmation dialog opens. NOTE: If no wport checkbox is selected, the Rescan and Join buttons are dimmed, as shown in Figure 4-49 on page 4-41.NOTE: The Exit button does not undo any set, join, and rescan operations that have already taken place.NOTE: The wireless mode for the unit is set in the IxWLAN Radio tab of the Configure IxWLAN dialog.NOTE: For the IxWLAN SED chassis, the Select System Under Test dialog looks the same, except for wports 2 and 3, which are dimmed.
IxWLAN User Guide, Release 6.20 4-43The Web-Based User InterfaceIxWLAN Side BarIf the web-based user interface is running on an IxWLAN SED chassis, clicking this icon results in an attempt to join wport1, provided it is not already joined. When on an IxWLAN SED-MR+ chassis, clicking this button results in an attempt to join a combination of wport1, wport2, and wport3 (whichever is not already joined). The joins are attempted on all (not joined) wports, regardless of whether their corresponding checkbox in the Select System Under Test dialog is selected or not. For example, if wport1 is not joined, the Join SUT dialog shown in Figure 4-51 opens.Figure 4-51. Join SUT wport1 Confirmation DialogFigure 4-52 and Figure 4-53 open if wport2 and wport3 respectively are not joined.Figure 4-52. Join SUT wport2 Confirmation DialogFigure 4-53. Join SUT wport3 Confirmation Dialog•Click Yes to join with the System Under Test.•Click No to cancel this operation.
The Web-Based User InterfaceIxWLAN Side Bar4-44 IxWLAN User Guide, Release 6.204For each wport that is already joined with a SUT, either Figure 4-54, Figure 4-55, or Figure 4-56 opens.Figure 4-54. Join SUT wport1 Re-initiation Confirmation DialogFigure 4-55. Join SUT wport2 Re-initiation Confirmation DialogFigure 4-56. Join SUT wport3 Re-initiation Confirmation DialogIxWLAN->Configure IxWLANThe Configure IxWLAN dialog is a tabbed dialog that defines the interaction with the web-based user interface and IxWLAN operational parameters. The fol-lowing fields appear in all sections of the Configure IxWLAN dialog:IxWLAN Id: It is set by the system and cannot be changed. IxWLAN Address: Shows IxWLAN's IP address.•Click OK to save the configuration.•Click Cancel to close the dialog.
IxWLAN User Guide, Release 6.20 4-45The Web-Based User InterfaceIxWLAN Side BarIxWLAN->Configure IxWLAN->UIThe Configure IxWLAN button in the IxWLAN side bar opens the Configure IxWLAN dialog, as shown in Figure 4-57.Figure 4-57. Configure IxWLAN DialogReceive ParametersIxWLAN Polling Interval: Defines the interval (in ms) during which the Com-mand PC polls IxWLAN for command and control messages from the virtual sta-tions. It can be set to a value in the 250…60000 ms (1 min) range. If this time expires without an expected response from IxWLAN, the web-based user inter-face displays Busy next to IxWLAN icon in the tool bar. The Busy message indi-cates that IxWLAN is not responding to the user interface. Under normal conditions, the Busy message may appear periodically for short periods of time. If the Busy message appears frequently, you may want to increase the value assigned to the IxWLAN Polling Interval. Also see IxWLAN Busy or Not Responding on page 8-5.Max Messages Per Poll: Specify the maximum number of messages to receive in each poll: 1…128.IxWLAN Polling Timeout: Defines the time (in ms) that the Command PC waits for a response from IxWLAN. It can be set to a value in the 500…120000 ms (2 min) range. The recommended value is twice the IxWLAN Polling Inter-val value. If this time expires without an expected response from IxWLAN, the web-based user interface opens a dialog indicating that IxWLAN is not respond-ing. When you dismiss the dialog, the status of the IxWLAN/System Under Test connection in the tool bar shows Offline. If this dialog and Offline status appears
The Web-Based User InterfaceIxWLAN Side Bar4-46 IxWLAN User Guide, Release 6.204frequently, a larger value should be assigned to the IxWLAN Polling Timeout. Also see IxWLAN Busy or Not Responding on page 8-5. Transmit ParametersBatch IxWLAN Requests: The checkbox enables/disables batching of request messages to be sent to IxWLAN. When virtual stations are running in an iterative fashion or you issue commands to many virtual stations, this produces a large number of requests to the web server on IxWLAN. Request batching maintains a number of these requests over a period of time (defined by the Batch Request Interval) and then issues one large request with all pending instructions.Batch Request Interval: If Batch IxWLAN Requests is checked/enabled, spec-ify the interval at which the web-based user interface l collects (batches) requests and sends them to IxWLAN. It can be set to a value in the 250…60000 ms (1 min) range.Max Requests Per Batch: Specifies the maximum number of requests that should be batched before they are sent to the virtual stations. When this number of requests have been batched, they are sent to IxWLAN even if the Batch Request Interval has not expired.IxWLAN->Configure IxWLAN->IxWLAN/BasicThis section of the Configure IxWLAN dialog defines the basic configuration of IxWLAN, as shown in Figure 4-58 on page 4-47.NOTE: Also see the Monitor Update Interval and Monitor Update Timeout in Monitors->Config Monitors on page 4-62 for the interval and update timeout val-ues that are used by the command PC to collect statistics.NOTE: If you are currently running or intend to run a Load Profile, batching IxWLAN requests may affect the timing of the Load Profile if the Batch Request Interval is greater than the timing specified in the Load Profile.
IxWLAN User Guide, Release 6.20 4-47The Web-Based User InterfaceIxWLAN Side BarFigure 4-58. Basic Configuration of IxWLANIP Address: Type IxWLAN's new IP address. Use an IP address that is compati-ble with the network addressing scheme at your facility. The default IP address is 192.168.0.50. If you change this field, you must select the Reboot option from the IxWLAN side bar, exit the web-based user interface, and reconnect to IxW-LAN using the new IP address.IP Netmask: Type IxWLAN's network mask. The network mask of IxWLAN must match the IP subnet addressing scheme for internal mode testing (it is not used for external mode). For example, if IxWLAN's IP address is 10.1.40.18 and the system being tested is 10.1.35.17, then the subnet mask is 16 bits or 255.255.0.0.Gateway Address: Type IxWLAN's default gateway IP address. Use an IP address that is compatible with the network addressing scheme at your facility. The default gateway address is 0.0.0.0.
The Web-Based User InterfaceIxWLAN Side Bar4-48 IxWLAN User Guide, Release 6.204IxWLAN->Configure IxWLAN->IxWLAN/RadioThis section of the IxWLAN->Configure IxWLAN dialog defines the wireless mode and data rate of IxWLAN, as shown in Figure 4-59.Figure 4-59. IxWLAN Radio Wireless Mode: Select a wireless mode (11a, 11b, or 11g) from the list box. The items that are available in this list box are different depending on the feature set that you ordered from Ixia. The wireless mode also affects the types of devices that IxWLAN can discover during a scan operation. See General Usage Notes on page 1-12.Data Rate: Select a data rate from the list box. The rates that are available in this list box are different depending on the Wireless Mode selection.MAC: The Wireless LAN MAC address defaults to a specific address (typically in the 00:0b:cd:xx:xx:xx range). It is a globally unique MAC address that is pro-grammed on the IxWLAN SED/SED-MR+ chassis. The address can be changed to any non-broadcast or non-multicast valid MAC address. If you use multiple IxWLANs at your facility, each must have a WLAN MAC whose prefix is unique. For example, on the first IxWLAN, use WLAN MAC Address 04:0d:e0:62:23:57 and on the second IxWLAN, use WLAN MAC Address 06:0f:14:62:32:a0.reset mac: Select this checkbox to reset the WLAN MAC Base Address to its factory default setting.MAC Mask: This address is used in conjunction with the WLAN Base MAC Address for configuration of virtual stations for a specific wport. If for example,
IxWLAN User Guide, Release 6.20 4-49The Web-Based User InterfaceIxWLAN Side Barthe WLAN MAC is set to 00:0b:cd:59:23:44 and the mask is set to ff:ff:ff:ff:00:00, the only MAC addresses that can be detected on WLAN and received by IxWLAN are 00:0b:cd:59:00:00 - 00:0b:cd:59:ff:ff. All other MAC addresses are filtered out. The mask limits the range of MAC addresses that are assigned to virtual stations on a wport. The mask that is specified here displays in the WLAN MAC Mask field when the vSTA tab is selected in the New IxWLAN Group dialog (See vSTA->New Group->vSTA on page 4-26).SSID: Defines a Service Set ID. The SSID is a text string of up to 32 characters. Control characters are not allowed. An SSID is used in Association Requests and in deriving the Pre-Shared Key from the Passphrase, when appropriate. Nor-mally, the SSID supplied in the Beacon from the SUT is used. When the SUT is configured with a hidden SSID (not published in its Beacon), IxWLAN's SSID attribute is used as a default.Multi-Radio Mode: Allows you to select the multi radio mode to be either dynamic or static. Scan at Boot Mode: There are three options for this attribute: Enabled, Disabled, and All Modes. If enabled, a scan of all channels of the IxWLAN Wireless Mode (which can be set by the Wireless Mode list box shown in Figure 4-59 on page 4-48) takes place at boot. If disabled, no scan takes place at boot. If set to All Modes, a scan of all channels in all valid wireless modes (that is, 802.11a/b/g) takes place at boot. The BSS list resulting from the all-mode scan shows BSSs detected across all scanned channels.Background Join: When Background Join is enabled, the unit allows manage-ment frames to be sent before formally joining with the SUT and it automatically conducts the Join in the background while this is happening. When disabled, the system must be explicitly joined with the SUT before any management frames (and thus data frames) can be sent. IxWLAN->Configure IxWLAN->IxWLAN/PowerThis section of the Configure IxWLAN dialog defines the power configuration of IxWLAN, as shown in Figure 4-60 on page 4-50.NOTE: The MAC and MAC Mask are per-wport attributes.
The Web-Based User InterfaceIxWLAN Side Bar4-50 IxWLAN User Guide, Release 6.204Figure 4-60. IxWLAN PowerTransmit Power: Select full, half, quarter, eighth, or min from the list box. The dBm/mW values in Table 4-1 are applicable only when the country code is US. In other countries, power settings are relative to the maximum transmit power available for the country. If you change the transmit power setting, you must select the Reboot option from the IxWLAN side bar in order for the new transmit power to be recognized and used in IxWLAN.Table 4-1. Transmit Power OptionsPower Management Mode: Select active (always awake) or power save (doze for the specified listen interval) from the list box. See the notes later in this sec-tion.Power Save Listen Interval: Specify the listen interval in terms of the number of beacons (1…100). The default value is 1. Selection Descriptionfull maximum (normal) transmit power (18 dBm/64 mW) half  fractional (1/2) transmit power (15 dBm/31.5 mW) quarter  fractional (1/4) transmit power (12 dBm/16 mW) eighth  fractional (1/8) transmit power (9 dBm/8 mW) minimum  minimum transmit power (3 dBm/2 mW)
IxWLAN User Guide, Release 6.20 4-51The Web-Based User InterfaceIxWLAN Side BarNOTES:When the Power Management mode is set to Active, IxWLAN remains in the awake state at all times. When the Power Management mode is set to Power save, IxWLAN enters a dozing state until awakened by the listen interval. When dozing:•IxWLAN does not accept WLAN frames transmitted to any vSTA. •IxWLAN awakens at each listen interval to receive the next beacon and poll for frames buffered for any vSTA in accordance with the 802.11 Power Man-agement needs. •IxWLAN awakens at DTIM intervals to receive DTIM beacons when buffered broadcast/multicast frames are indicated.While in either state, any WLAN frames to be transmitted from any vSTA may be immediately placed into the Transmit Queue for transmission by the WLAN interface. Any transmission from any vSTA indicates the IxWLAN current Power Management mode.The beacon interval is determined by the System Under Test, usually by some user-configurable parameter. IxWLAN receives beacons sent by the System Under Test. A typical beacon rate is one every 100 Time Units. An 802.11 Time Unit is defined as 1024 ms. So, the beacon rate would be one every 102.4 ms, or about 10 per second. As an example, if the Power Management Mode is set to Power Save and the Power Save Listen Interval is set to 3, IxWLAN wakes up about every 307.2 ms to poll for frames queued in the System Under Test.
The Web-Based User InterfaceIxWLAN Side Bar4-52 IxWLAN User Guide, Release 6.204IxWLAN->Configure IxWLAN->IxWLAN/OtherThis section of the Configure IxWLAN dialog enables/disables the MIC check on received TKIP-encrypted frames, as shown in Figure 4-61.Figure 4-61. IxWLAN OtherMIC Check: Select Enable, Disable, or Spot from this list box. The MIC is an integrity check that is run on all received TKIP data frames and is achieved via the CPU-intensive Michael algorithm. This parameter allows the MIC check to be temporarily disabled or reduced to spot checks (in that case, only every 16th TKIP frame is checked). This applies to receive frames only. The MIC is always calculated for transmit frames when using TKIP.IxWLAN->Reconnect IxWLANReconnect is needed after reboot or if you become disconnected from IxWLAN for any reason. The Reconnect IxWLAN button in the IxWLAN side bar opens a confirmation dialog, as shown in Figure 4-62. Figure 4-62. Reconnect Confirmation Dialog
IxWLAN User Guide, Release 6.20 4-53The Web-Based User InterfaceIxWLAN Side Bar•Click Ye s  to reconnect to IxWLAN.•Click No to cancel the reconnect selection.Following successful reconnect, the web-based user interface restores the sce-nario (if any) in IxWLAN.IxWLAN->Reset IxWLANThe Reset IxWLAN button in the IxWLAN side bar opens a confirmation dialog (Figure 4-63).Figure 4-63. Reset Confirmation•Click Yes to reset all virtual stations to a configured state and to reset all sta-tistics counters to zero.•Click No to cancel the reset selection.IxWLAN->Reboot IxWLANThe Reboot IxWLAN button in the IxWLAN side bar opens a confirmation dia-log (Figure 4-64).Figure 4-64. Reboot Confirmation•Click No to cancel the reboot operation.•Click Yes to reboot IxWLAN. When Yes is clicked, the message shown in Figure 4-65 displays.Figure 4-65. Rebooting DialogThis message box disappears when the reboot is complete.
The Web-Based User InterfaceIxWLAN Side Bar4-54 IxWLAN User Guide, Release 6.204IxWLAN->Update IxWLANThe Update IxWLAN button in the IxWLAN side bar or the Update IxW-LAN… selection in the About menu opens the Update IxWLAN dialog, as shown in Figure 4-66.Figure 4-66. Update IxWLANFirmware: To update IxWLAN firmware, check this box and type the location of the firmware image file on the command PC or select the Browse… button to select the location on the command PC. The Firmware field must be a valid file name with a SYS file type (case insensitive) and the file must exist on the com-mand PC.Feature Key: To update the IxWLAN feature key, check this box and type the feature key hex string. The Feature Key must be an ASCII hex string containing a valid feature key for this IxWLAN.Reboot IxWLAN: Check this box to reboot IxWLAN after the new firmware image or feature key is successfully loaded.Exit or Restart the browser interface: Check the box next to Exit to exit the web-based user interface after the new firmware image or feature key is success-fully loaded. Check the box next to Restart to restart the web-based user inter-face following successful IxWLAN update.•Click the Update button to start IxWLAN Update.•Click the Cancel button to exit the dialog.If the dialog is not filled in correctly (for example, invalid or missing firmware file, invalid feature key, and so on), the field is highlighted and an error message dialog identifies the error.
IxWLAN User Guide, Release 6.20 4-55The Web-Based User InterfaceMonitors Side BarIf the Reboot IxWLAN checkbox is not clicked, a warning dialog opens, as shown in Figure 4-67.Figure 4-67. Warning Dialog•Click OK to continue IxWLAN Update without rebooting.•Click Cancel to return to the Update IxWLAN dialog.If any errors occur during firmware update (for example, flash file system is full), the error is reported in an error message dialog. If an invalid or corrupted firm-ware image file is specified, the IxWLAN reboot fails. If this condition occurs, the CLI must be used to correct the problem. See Recovering a Corrupted Firmware File on page 8-9. Monitors Side BarThe Monitors side bar is used to define, delete, clear, export, and configure mon-itors. After a monitor is defined using New Monitor, the bottom section of the main page displays the statistics counters.New Monitor: Defines a new monitor. You can define up to four different monitors in each scenario.Delete Monitor: Deletes the currently displayed monitor.Clear Monitor: Clears the statistics counters in the currently displayed monitor.Export Monitor: Exports the statistics counters for one or more monitors.Config Monitors: Configures how monitors are maintained and updated with data from IxWLAN.
The Web-Based User InterfaceMonitors Side Bar4-56 IxWLAN User Guide, Release 6.204A monitor is one or more user-selected statistics counters that the web-based user interface collects from IxWLAN and displays in the user-selected format (that is, line graph, bar graph, or table). All collected data can be exported. Monitors are based on Line graphs, Bar graphs, and Tables. You can use them to monitor the summary statistics of IxWLAN or a summary Master vSTA that shows virtual station statistics across all virtual stations.Monitors->New MonitorThe New Monitor dialog is a tabbed dialog that can be used to define predefined, summary, and summary virtual station counters to be maintained during the exe-cution of a test.Monitors->New Monitor->PredefinedUse the Predefined section of the Define New Monitor dialog to select predefined statistics counters, as shown in Figure 4-68. Figure 4-68. Define Monitor DialogMonitor Name: Type a monitor name. It can be up to 12 characters (a…z, 0…9, and underscore (_)).IxWLAN Address: Shows IxWLAN's IP address.NOTES:•Each scenario can include up to four different monitors.•Monitor values are stored in memory on the command PC. If you run one or more monitors for an extended period of time, available memory may become depleted and this can affect the performance of the command PC.
IxWLAN User Guide, Release 6.20 4-57The Web-Based User InterfaceMonitors Side BarDisplay Style: Select a display style from the list box. It can be one of the follow-ing: Line Graph, Bar Graph, or Table.Monitors->Selected Monitors: Select one of the monitors to be maintained. Use the [>>] button (or double-click the line item) to transfer the predefined monitor to the Selected Monitors column. See Chapter 7, Statistics Counters for a description of each of these statistics counters.•Click the Create button to create and display the monitor.•Click the Cancel button to close this dialog.Monitors->New Monitor->SummaryUse the Summary section of the Define New Monitor dialog to select summary statistics counters, as shown in Figure 4-69.Figure 4-69. SummarySummary Counters->Selected Counters: Select one or more of the counters to be maintained in the test results file. Use the [>>] button to transfer the counters to the Selected Counters column. See Chapter 7, Statistics Counters for a descrip-tion of each of these statistics counters.•Click the Create button to create and display the monitor.•Click the Cancel button to close this dialog.
The Web-Based User InterfaceMonitors Side Bar4-58 IxWLAN User Guide, Release 6.204Monitors->New Monitor->vSTAUse the vSTA section of the Define New Monitor dialog to select the master (summary) virtual station statistics counters, as shown in Figure 4-70.Figure 4-70. vSTA SectionvSTA (s): Select a virtual station from the list box. The Master Station is a sum-mary that shows virtual station statistics across all virtual stations.vSTA Counters->Selected Counters: Select one or more of the counters to be maintained in the test results file. Use the [>>] button to transfer the counters to the Selected Counters column. See Chapter 7, Statistics Counters for a descrip-tion of each of these statistics counters.•Click the Create button to create and display the monitor.•Click the Cancel button to close this dialog.
IxWLAN User Guide, Release 6.20 4-59The Web-Based User InterfaceMonitors Side BarWhen you select one or more counters and choose the Create button, the bottom half of the screen shows the current results in the selected display style, as shown in Figure 4-71.Figure 4-71. More Counters SelectedAs you run scenario tests, the monitors update with current data from IxWLAN. For chart display styles, the legends on the right side of the monitor indicate the statistics counters selected in the New Monitor dialog. For table display styles, the table headings indicate the statistics counters selected in the New Monitor dialog. See Chapter 7, Statistics Counters for a description of each of these statis-tics counters. The tool bar buttons on the right side of the monitor display can be used for the following functions:For more information about these buttons, please refer to Monitor Tool Bar on page 4-81.New Monitor: Defines a new monitor. Delete: Allows you to delete a monitor. A dialog opens, asking you to confirm the selection.Run: Runs a monitor. When the Run Monitor button is selected, the currently displayed monitor starts gathering and displaying its target statistics.Pause: Pauses a monitor. When the Pause Monitor button is selected, the currently displayed monitor stops its target statistics. However, statistics are accumulated in the background and can be exported.Clear: Clears a monitor. A dialog opens, asking you to confirm the selection. This selection sets all counters in the current monitor to zero. Statistics gathered up to this point are not cleared and are still exportable.
The Web-Based User InterfaceMonitors Side Bar4-60 IxWLAN User Guide, Release 6.204Monitors->Delete MonitorThe Delete Monitor button in the Monitors side bar or the monitor tool bar opens a confirmation dialog, as shown in Figure 4-72.Figure 4-72. Delete Monitor Confirmation•Click Yes to delete the current monitor.•Click No to cancel the delete selection.Monitors->Clear MonitorThe Clear Monitor button in the Monitors side bar or the Monitor tool bar opens a confirmation dialog, as shown in Figure 4-73.Figure 4-73. Clear Monitor Confirmation•Click Yes to clear the monitor. All the counters in the monitor are set to zero. Statistics gathered up to this point are not cleared and can still be exported.•Click No to close this dialog without clearing the monitor.Monitors->Export MonitorThe function is used to export the collected statistics in a defined monitor. For export, the data obtained from the monitor is saved. NOTE: For all graphs, each tick saves the information of each field that is requested. This can grow large depending on how long the monitor has run. An artificial limit of one hour has been enforced to clear this saved data. At the end of each hour, this stored data array is cleared.
IxWLAN User Guide, Release 6.20 4-61The Web-Based User InterfaceMonitors Side BarThe Export Monitor button in the Monitors side bar opens the Export Monitor dialog, as shown in Figure 4-74.Figure 4-74. The Export Monitor DialogSelect one or more monitors in the list box.•Click the Export button to export the monitors in the Selected Monitors list box.•Click the Cancel button to close this dialog without exporting monitors.The Export button opens the Save HTML Document dialog, as shown in Figure 4-75.Figure 4-75. Save HTML DocumentIdentify the name of the file where you want to save the monitor information.•Click the Save button to save the information to the specified file.•Click the Cancel button to exit this dialog without exporting any data.
The Web-Based User InterfaceMonitors Side Bar4-62 IxWLAN User Guide, Release 6.204Monitors->Config MonitorsThe Config Monitors button in the Monitors side bar opens the Configure Mon-itors dialog, as shown in Figure 4-76.Figure 4-76. Configure Monitors DialogIxWLAN Address: Shows the IP address of IxWLAN. Monitor Update Interval: Defines the interval (in milliseconds) that the Com-mand PC polls IxWLAN for new statistics counters. It can be set to a value in the 250 to 60000 ms (1 min) range. Any value under 1000 ms is not advisable and may affect performance significantly. If you notice any issues with update per-formance, try increasing this value.Monitor Update Timeout: Defines the time (in milliseconds) that the Command PC waits for a response from IxWLAN. It can be set to a value in the 500 to 120000 ms (2 min) range. The recommended value is twice the Monitor Update Interval value. If this time expires without an expected response from IxWLAN, the web-based user interface tries to restart the monitor update timer.•Click OK to save the monitor configuration.•Click Cancel to close the dialog.NOTE: Also see the IxWLAN Polling Interval and IxWLAN Polling Timeout in IxWLAN->Configure IxWLAN on page 4-44 for the interval and update timeout values that are used by the command PC to send command and control information to IxWLAN.
IxWLAN User Guide, Release 6.20 4-63The Web-Based User InterfaceEvent Log Side BarEvent Log Side BarThe buttons in the Event Log side bar are used to display, clear, export, and con-figure the Event Log as follows:For more information about how IxWLAN creates and maintains the event log, please refer to Appendix B, Event Logging.Event Log->Event LogWhen the Event Log button is selected in the Event Log side bar, the web-based user interface begins retrieving event log records from IxWLAN. The following message opens in the Event Log window: “Retrieving up to the last 100 records…”. Figure 4-77 shows the format of event records retrieved from IxW-LAN.Figure 4-77. Event LogEvent Log: Shows the last 100 event log entries.Clear Log: Clears the current contents of the event log.Export Log: Exports the last 100 event log entries to a file.Configure Log: Configures event logging.
The Web-Based User InterfaceEvent Log Side Bar4-64 IxWLAN User Guide, Release 6.204•Click the Close button to close this dialog.•Click the Export button to export this event log information to a file.•Click the Refresh button to update the dialog with new events.Event Log->Clear LogThe Clear Log button in the Event Log side bar opens a confirmation dialog, as shown in Figure 4-78.Figure 4-78. Clear Log Confirmation•Click Yes to clear the event log.•Click No to exit this dialog without clearing the event log.Event Log->Export LogThe Export Log button in the Event Log side bar opens a Save HTML Docu-ment dialog, as shown in Figure 4-79.Figure 4-79. Export LogIdentify the name of the file where the log is to be written.•Click the Save button to save the event log in a file.•Click the Cancel button to exit this dialog.
IxWLAN User Guide, Release 6.20 4-65The Web-Based User InterfaceEvent Log Side BarEvent Log->Configure LogThe Configure Log button in the Event Log side bar opens the Event Log Con-figuration dialog, as shown in Figure 4-80.Figure 4-80. Configure LogIxWLAN Address: Defines the IP address of IxWLAN where the log file resides.Logging: Enables/disables event logging.Logging to Console: Enables/disables event logging to the CLI console. When Logging to Console is enabled (checked), event data is posted to the console con-nected to IxWLAN's serial port (if available). The web-based user interface can-not be used to enable logging to a telnet session.Logging to File: Enables/disables event logging to a file in the IxWLAN flash file system.Clear Event Log on Reset: The checkbox enables/disables clearing the event log when the scenario is reset.Log Verbosity: The verbosity level sets thresholds for which events are to be logged: at higher verbosity, more events are logged; at lower verbosity, fewer events are logged. Select Critical, Low, Medium, or High from the list box.Modules Logged: Select one or more modules (system processes) from which event messages of the selected level should be collected. •Click OK to close this dialog and save the event log configuration.•Select Cancel to close this dialog without saving event log configuration.
The Web-Based User InterfaceReports Side Bar4-66 IxWLAN User Guide, Release 6.204Reports Side BarThe options in the Reports side bar can be used to display statistics counters that are maintained by IxWLAN during the execution of a test.IxWLAN Configuration: Opens the IxWLAN configuration report.Scenario Summary: Shows summary statistics of IxWLAN and all virtual stations.Group Summary: Shows summary statistics of a scenario group.vSTA Master: Shows statistics collected for all virtual stations.wport: Shows statistics collected per wport.vSTA Detailed: Shows detailed statistics counters for each virtual station.Export Reports: Exports/views reports in a CSV file format
IxWLAN User Guide, Release 6.20 4-67The Web-Based User InterfaceReports Side BarReports->IxWLAN ConfigurationThe IxWLAN Configuration button in the Reports side bar displays the IxW-LAN Configuration Report, as shown in Figure 4-81.Figure 4-81. IxWLAN Configuration ReportThis report shows the status and configuration of IxWLAN. If WPA/RSN is enabled, the status section of the report includes an indication of the cumulative crypto hardware status (that is, Crypto hardware…OK). If any faults have been detected in a self-test, the status shown indicates this condition (for example, Crypto hardware…Faulted, run the cryptotest CLI command for details). Reports->Scenario SummaryThe Scenario Summary button in the Reports side bar opens the Summary Sta-tistics (Scenario) Report, as shown in Figure 4-82 on page 4-68.
The Web-Based User InterfaceReports Side Bar4-68 IxWLAN User Guide, Release 6.204Figure 4-82. Scenario Summary ReportSummary statistics give a summary report taken over a set of virtual stations. The virtual station set can be a defined group or all virtual stations currently in the system. By contrast, the individual virtual station statistics report gives a list of statistics and counters for all virtual stations. The summary report gives a sum-mary of the statistics and counters taken over the indicated set of virtual stations. The summary gives, for each counter, the minimum and maximum values for that counter found in the set of examined virtual stations, the average value, and where applicable, the (sum) total over the set of virtual stations. The Avg fields (that is, Receive Rate Avg, Transmit Rate (Short Frame) Avg, and Transmit Rate (Long Frame) Avg) in the Data Rate section of the summary statistics display is the average rate for the master vSTA since the time IxWLAN joined to a System Under Test. For more information about the statistics counters that can be shown in this report, please refer to Chapter 7, Statistics Counters.Reports->Group SummaryThe Group Summary button in the Reports side bar opens the Summary Statis-tics (Group #) Report, as shown in Figure 4-83 on page 4-69.
IxWLAN User Guide, Release 6.20 4-69The Web-Based User InterfaceReports Side BarFigure 4-83. Group Summary ReportFor more information about the statistics counters that can be displayed in this report, please refer to Chapter 7, Statistics Counters.Reports->vSTA MasterThe vSTA Master button in the Reports side bar opens the Summary Statistics (All vSTA) Report, as shown in Figure 4-84.Figure 4-84. vSTA Master ReportFor more information about the statistics counters that can be shown in this report, please refer to Chapter 7, Statistics Counters.
The Web-Based User InterfaceReports Side Bar4-70 IxWLAN User Guide, Release 6.204Reports->vSTA DetailThe vSTA Detail button in the Reports side bar opens the vSTA Detail Report, as shown in Figure 4-85.Figure 4-85. vSTA Detail ReportFor more information about the statistics counters that can be shown in this report, please refer to Chapter 7, Statistics Counters.Reports->Export ReportsThe Export Reports button in the Reports side bar opens the Generate Report dialog, as shown in Figure 4-86.Figure 4-86. Export ReportsReport Details: Select one or more reports to export in the Report Details list box.Report Templates: Defines the directory/path where XML transform files are retrieved. These XSLT files are then used to create reports from the XML data returned by IxWLAN. By specifying another directory path, you can customize reports to suit your needs.
IxWLAN User Guide, Release 6.20 4-71The Web-Based User InterfaceConfiguration Side Bar•Click the Export button to export the report(s) to a comma-separated values (.CSV) file.•Click the View button to show the selected report(s).•Click the Cancel button to exit this dialog.Configuration Side BarThe buttons in the Configuration side bar are used to define default security, default ping settings, the appearance of the web-based user interface, and avail-able certificates.Configuration->SecurityThe Security Configuration dialog, shown in Figure 4-87 on page 4-72, sets the default security settings that can be used when a new group is created.Security: Defines default security settings that can be used when a group or virtual stations is configured.Ping Defaults: Defines a default ping target, ping packet length, and number of iteration values.Preferences: Configures the appearance of the web-based user interface.Available Certificates: Transfers certificate files from the command PC to IxWLAN, where they can be used by virtual stations.
The Web-Based User InterfaceConfiguration Side Bar4-72 IxWLAN User Guide, Release 6.204Figure 4-87. Configuration SecurityEncryption: Select On or Off from the drop-down list box to enable/disable encryption. Authentication: Select an authentication type: Open System, Shared Key, RSN, RSN-PSK, WPA, or WPA-PSK. If you select RSN or WPA, define user cre-dential parameters in the EAP tab. If you select RSN-PSK or WPA-PSK, define a pre-shared key or passphrase in the PSK tab. Cipher: For Open System or Shared Key Authentication, WEP is the only valid selection. For RSN, RSN-PSK, WPA, and WPA-PSK Authentication, select TKIP or AES-CCM (that is, CCMP cipher mode).Fast Radius: The default value of this attribute is Disabled. When a vSTA is con-figured for fast RADIUS reconnection and the vSTA has cached the TLS session information, it tries fast resumption in subsequent 802.1X authentication exchanges by using the session_id and master_key from the cached TLS session.PMKSA Cache: Enables the use of the cached PMKSA information when (re)associating. The default value is Enabled. Each entry in the PMKSA cache contains the BSSID of the corresponding AP, a PMKID, and the Pairwise Master Key (PMK). A PMKSA can be obtained by 802.1X authentication or by pre-authentication.
IxWLAN User Guide, Release 6.20 4-73The Web-Based User InterfaceConfiguration Side BarConfiguration->Security WEP TabThe WEP tab in this dialog is used to define up to four shared keys for WEP security. WEP encrypts data using an RC4 stream cipher seeded with a key of 40, 104, or 128 bits plus a 24-bit initialization vector, before transmission to the wireless network. If you change any of the fields, you must click Reboot from the IxWLAN side bar in order for the new encryption selections to be recognized and used by IxWLAN.wport: Choose the wport to which these selections are to apply.Key 1…4: Each shared key can be 40, 104, or 128 bits. If 40 is selected in the list box, you must type 10 hex digits. If 104 is selected in the list box, you must type 26 hex digits. If 128 is selected in the list box, you must type 32 hex digits. These keys are shown in the Security section of the New IxWLAN Group dialog, the Edit IxWLAN Group dialog, and the Add vSTA to Group dialog.default: Select one of these radio buttons to identify which key(s) should be used as default.•Click OK to save the security settings to IxWLAN.•Click Cancel to close this dialog without saving this security configuration.Configuration->Security PSK TabIf WPA-PSK or RSN-PSK is selected in the Authentication field, this section of the dialog defines a Pre-Shared Key or passphrase, as shown in Figure 4-88.Figure 4-88. Configuration Security PSK TabNOTE: To delete a key, remove the key from the field.
The Web-Based User InterfaceConfiguration Side Bar4-74 IxWLAN User Guide, Release 6.204Pre-Shared Key (64 hex digits): Defines a Pre-Shared Key (64 ASCII-hex char-acters) for all virtual stations in this group. If using a Pre-Shared Key, it is not necessary to specify the passphrase. Passphrase (up to 63 characters): Defines a passphrase of up to 63 ASCII charac-ters. If a passphrase is defined, it is not necessary to specify the Pre-Shared Key. The passphrase is used to generate the Pre-Shared Key. •Click OK to save this information to IxWLAN.•Click Cancel to close this dialog without saving this security configuration.Configuration->Security EAP TabIf WPA or RSN is selected in the Authentication field, the Security EAP tab allows you to define an EAP Algorithm, user ID and certificate file, and PEAP/TTLS parameters, as shown in Figure 4-89.Figure 4-89. Security EAP TabInner Algorithm: Select MS-CHAPv2 or EAP-MS-CHAPv2 from the list box. MS-CHAPv2 is normally used for TTLS, while EAP-MS-CHAPv2 is normally used for PEAP.User ID: Sets the user ID that is used as default for all virtual stations when a new group is created. It can be up to 64 characters in the range A…Z, a…z, 0…9, or other legal characters: period (.), dash (-), at-sign (@).Client Certfile: Sets the certificate file that is used as the default for all virtual stations when a new group is created. Select…: Click the Select… button to open the Available Certificates dialog and select the certificate file to use. See Available Certificates on page 4-36.
IxWLAN User Guide, Release 6.20 4-75The Web-Based User InterfaceConfiguration Side BarPEAP/TTLS Parameters: When PEAP or TTLS is selected in the EAP Algo-rithm list box, use this section of the dialog to define the PEAP/TTLS parame-ters. EAP Algorithm: Select the EAP algorithm to be used in Phase 2 authentication. MS-CHAPv2 is normally used for TTLS. EAP-MS-CHAPv2 is normally used for PEAP.Outer ID: Type an outer identity to be used in Phase 1 authentication. It can be up to 64 characters in the range A…Z, a…z, 0…9, or other legal characters: period (.), dash (-), at-sign (@).Password: Type a password to be used in Phase 2 authentication. It can be up to 64 characters.•Click OK to save this information to IxWLAN.•Click Cancel to close this dialog without saving this security configuration.Available CertificatesThe Select button in the Security Configuration/EAP tab opens the Available Certificates dialog, as shown in Figure 4-90.Figure 4-90. Available CertificatesThe Space available indicates the total space available in the IxWLAN flash file system. This number changes when certificate files are added or deleted.•Click the OK button (or double-click a file name in the list) to set the Client Certfile field to the currently highlighted certificate file name.•Click the Delete button to delete the currently highlighted certificate file. A confirmation dialog opens, asking you to confirm this selection. An error dia-NOTE: Inner Algorithm, Outer ID, and Password are used only for TTLS and PEAP. They are ignored for TLS.
The Web-Based User InterfaceConfiguration Side Bar4-76 IxWLAN User Guide, Release 6.204log opens if the certificate file is in use by any vSTA, or otherwise the certifi-cate file is deleted.•Click the Cancel button to exit the dialog.•Click the Import… button to open the Import Certfile dialog, as shown in Figure 4-91 on page 4-76. Figure 4-91. Import CertfileCertfile: Type the complete path and name of a certificate file or click the Browse… button to open the File Browse dialog and select from the files stored on the command PC. Certpass: After a file name is typed or selected, type the password that is needed for the certificate file.•Click OK to transfer the specified file to IxWLAN with the same file name and extension. The newly-added certificate file is then listed as one of the available certificates.•Click Cancel to close this dialog without selecting a certificate file.Configuration->Ping DefaultsThe Ping Defaults button in the Configuration side bar opens the Ping Defaults dialog, as shown in Figure 4-92.Figure 4-92. Ping Defaults DialogNOTE: Certificate files must be in PKCS#12 format, which is usually indicated by a .p12 or a .pfx file extension
IxWLAN User Guide, Release 6.20 4-77The Web-Based User InterfaceConfiguration Side BarAny changes made in this dialog affect all future group/virtual station creation defaults for this session.Target IP: Type the target IP address where ICMP Echo (Ping) Request/Response messages should be sent.Data Length: Specify the size (64…1024) of each message.Count: Specify the total number of pings to send: 0…10000 (0=None). •Click OK to save the default Ping configuration.•Click Cancel to close this dialog without saving this configuration.Configuration->PreferencesThe Preferences button in the Configuration side bar opens the UI Configuration dialog, as shown in Figure 4-93.Figure 4-93. UI Configuration DialogDisplay vSTA Transitional States: The checkbox enables/disables the update of the web-based user interface to show changes in virtual station transitional states such as authenticating, associating, de-authenticating, and disassociating. When deselecting this option, the web-based user interface performance improves. Update vSTA Stats Each Iteration: Click the checkbox to enable/disable the auto-matic update of virtual station statistics. Statistics are gathered by making extra calls to IxWLAN. Under high virtual station load, when deselecting this option, the web-based user interface performance improves.Group/vSTA Highlight Color: Click the Color button to open a color selector dialog and choose a color to highlight groups and virtual stations in the group grid. After a color has been chosen, the Reset button can be used to reset the color to its original state.Group/vSTA Selected Color: Click the Color button to display a color selector dialog and choose a color for selected groups and virtual stations in the group grid. After a color has been chosen, the Reset button can be used to reset the color to its original state.
The Web-Based User InterfaceMenus and Tool Bars4-78 IxWLAN User Guide, Release 6.204Show Welcome Screen on Startup: Click the checkbox to enable/disable the wel-come screen that is shown when you successfully log on to the web-based user interface.•Click OK to close this page and save the configuration.•Click Cancel to close this dialog without saving this configuration.Configuration->Available CertificatesThe Available Certificates button in the Configuration side bar opens the Avail-able Certificates dialog, as shown in Figure 4-94.Figure 4-94. Available CertificatesFor more information about Available Certificates, please refer to Available Certificates on page 4-75.Menus and Tool BarsThe menus and tool bars at the top of the web-based user interface can be used to run tests, manipulate virtual stations, monitor results, and configure IxWLAN and general scenario management.File Tool Bar The buttons in this tool bar are used to create, open, save, and print scenarios (Figure 4-95). Figure 4-95. File Tool BarNew Scenario: Creates a new scenario.Open Scenario: Opens an existing scenario.
IxWLAN User Guide, Release 6.20 4-79The Web-Based User InterfaceMenus and Tool BarsScenario Tool Bar The buttons in this section of the tool bar can be used to run, pause, stop, restart, or refresh the entire scenario of all virtual stations (Figure 4-96). Figure 4-96. Scenario Tool BarvSTA Tool Bar The buttons in this tool bar are used to run, pause, stop, restart, or refresh selected virtual stations or groups of virtual stations. The selected action is executed for the group(s) and/or virtual station(s) that are selected/highlighted in the group control grid (Figure 4-97).Figure 4-97. vSTA Tool BarSave Scenario: Saves the current scenario.Print: Prints the scenario configuration.Run Scenario: Runs the test for all groups and all virtual stations in a scenario.Pause Scenario: Pauses the test for all groups and all virtual stations in a scenario.Terminate Scenario: Stops the test for all groups and all virtual stations in a scenario.Reset Scenario: Resets the test for all groups and all virtual stations in a scenario.Refresh Scenario: Refreshes the test for all groups and all virtual stations in a scenario.Quiesce: This selection causes the scenario (that is, all virtual stations) to gracefully stop. The vSTA completes any currently active iteration, then stops. A quiesced vSTA must be reset before it can run again.Initialize: Starts the currently selected groups or virtual stations.Probe: Submits a probe request and waits for a probe response.
The Web-Based User InterfaceMenus and Tool Bars4-80 IxWLAN User Guide, Release 6.204Authenticate: Causes the currently selected virtual stations or all virtual stations in a group to initiate the 802.11 authentication sequence with the System Under Test. Associate: Causes the currently selected virtual stations or all virtual stations in a group to initiate the 802.11 association sequence with the System Under Test. The 802.11 association sequence automatically transits through any necessary 802.1X authentication and key management if the virtual station is configured for RSN, RSN-PSK, WPA, or WPA-PSK.Acquire IP: Causes the currently selected virtual stations to initiate a request for an IP address using DHCP. This option is available only for vSTAs created with the IP Generation Method of DHCP.Pre-authenticate selected vSTA: Starts RSN (802.11i) pre-authentication by a vSTA with a selectable remote AP. This is valid only for stations configured for full RSN authentication. The virtual station(s) must be in the Ready or Running state.Roam vSTAs: For the web-based user interface running on an IxWLAN SED chassis, it starts a Roam by all virtual stations to a selectable target AP. Each virtual station roams according to its configured roam type attribute. The Roam may include issuance of a Probe Request and optional 802.11 authentication.For the web-based user interface running on an IxWLAN SED-MR+ chassis, it starts a Roam by the selected virtual stations or groups to a selectable target AP.Run: Runs a test for selected groups or virtual stations. Pause: Pauses a test for selected groups or virtual stations.Stop: Ends a test for selected groups or virtual stations.Release IP: Causes the currently selected virtual stations to release their IP address using DHCP. This option is available only for vSTAs created with the IP Generation Method of DHCP.Disassociate: Causes the currently selected virtual stations or all virtual stations in a group to initiate the 802.11 disassociation sequence with the System Under Test. This sequence also drops any WPA/RSN security associations.De-authenticate: Causes the currently selected virtual stations or all virtual stations in a group to initiate the de-authentication sequence with the System Under Test. This sequence also drops any WPA/RSN security associations.Reset: Resets a test for selected groups or virtual stations.
IxWLAN User Guide, Release 6.20 4-81The Web-Based User InterfaceMenus and Tool BarsReports Tool Bar The buttons in this tool bar are used to view the reports and event log (Figure 4-98).Figure 4-98. Reports Tool BarMonitor Tool Bar This tool bar is located in the top-right corner of the screen monitoring section. The buttons in this tool bar can be used to control monitor(s) (Figure 4-99).Figure 4-99. Monitor Tool BarRefresh: Refreshes a test for selected groups or virtual stations.Quiesce: Causes the currently selected virtual stations to gracefully end. The vSTA completes any currently active iteration, then stops. A quiesced vSTA must be reset before it can run again.View Reports: Opens the Generate Report dialog, where you can select a report to display or export.View Event Log: Shows the last 100 entries in the event log.New Monitor: Allows you to define a new monitor. Delete: Deletes a monitor. A dialog opens, asking you to confirm the selection.Run: Runs a monitor. When the Run Monitor button is selected, the currently displayed monitor starts gathering and displaying its target statistics.Pause: Pauses a monitor. When the Pause Monitor button is selected, the currently displayed monitor stops its target statistics. However, statistics are accumulated in the background and can be exported.Clear: Clears a monitor. A dialog asks you to confirm the selection. TBDThis selection set all counters in the current monitor be exported.
The Web-Based User InterfaceMenus and Tool Bars4-82 IxWLAN User Guide, Release 6.204File Menu Figure 4-100 shows the File menu.Figure 4-100.File MenuNew Scenario…: Creates a new scenario in which groups and virtual stations can be defined. Open Scenario…: Opens the Open Scenario dialog, where you can choose from a list of existing scenario files on IxWLAN or browse your PC for scenario files.Save Scenario…: Opens the Save Scenario dialog.Save Scenario As…: Saves a scenario as a new instance.New Group…: Opens the New IxWLAN Group dialog.New vSTA…: Opens the Add vSTA to Group dialog.Print: Sends the current scenario configuration to your printer.Exit Program: Exits the web-based user interface. If a scenario is currently active/running, the dialog shown in Figure 4-101 opens.Figure 4-101.Exit Program
IxWLAN User Guide, Release 6.20 4-83The Web-Based User InterfaceMenus and Tool Bars•Click Yes to continue by exiting the web-based user interface. •Click No to return to the currently running test.If the current scenario has been modified during this web-based user interface session, the dialog shown in Figure 4-102 allows you to save these changes.Figure 4-102.Save Scenario Modified•Click Yes to open the Save Scenario dialog and save the scenario on your PC or in the flash on the IxWLAN SED/SED-MR+ chassis. •Click No if you do not want to save the modified scenario.If active virtual stations have been configured, the dialog shown in Figure 4-103 asks you to save the results to flash.Figure 4-103.Flash Save Dialog•Click Yes to save the results of any active scenario(s) in the IxWLAN flash file system. •Click No to discard current test results.The dialog shown in Figure 4-101 on page 4-82 asks you to confirm the exit from the web-based user interface:•Click Yes to exit. •Click No to return to the web-based user interface.
The Web-Based User InterfaceMenus and Tool Bars4-84 IxWLAN User Guide, Release 6.204Edit Menu Figure 4-104 shows the Edit menu.Figure 4-104.Edit MenuSelect All: If a group tab is selected, selects all virtual stations in a scenario group. If the Group Control tab opens, selects all groups. Unselect All: If a group tab is selected, unselects all virtual stations in a scenario group. If the Group Control tab opens, unselects all groups.Cut: Removes the definition of the currently selected virtual station and places it in the clipboard.Copy: Copies a virtual station definition to clipboard.Paste: Pastes the virtual station definition in the clipboard to the currently selected group.Delete: If a group tab is selected, deletes the currently selected virtual station. If the Group Control tab opens, deletes the currently selected group.Scenario Menu After you have defined a scenario, use the Scenario Menu to start and exercise the scenario.Figure 4-105 shows the Scenario menu.Figure 4-105.Scenario MenuInitialize: Starts all virtual stations defined in the scenario. Probe: A Probe Request is sent by all virtual stations in the currently selected group.
IxWLAN User Guide, Release 6.20 4-85The Web-Based User InterfaceMenus and Tool BarsAuthenticate: If clicked, all virtual stations defined in a scenario initiate the 802.11 authentication sequence to the System Under Test. Associate: If clicked, all virtual stations defined in a scenario initiate the 802.11 association sequence to the System Under Test. The 802.11 association sequence automatically transits through any necessary 802.1X authentication and key man-agement if the virtual station is configured for RSN, RSN-PSK, WPA, or WPA-PSK.Acquire IP: Causes all virtual stations in the scenario to initiate a request for an IP address using DHCP. This option is available only for vSTAs created with the IP Generation Method of DHCP.Pre-Authenticate: Starts RSN (802.11i) pre-authentication by a vSTA with a selectable remote AP. This is valid only for stations configured for full RSN authentication. The virtual station(s) must be in the Ready or Running state.When Pre-Authenticate is selected, a dialog opens, as shown in Figure 4-106.Figure 4-106.Pre-Authentication DialogClick the Select button to select a BSS from a list or to manually type a BSSID, as shown in Figure 4-107 on page 4-86.NOTE: Only one pre-authentication session per vSTA can be in progress at a time. If the user initiates a second pre-authentication while another one is in progress, an error message opens and logs in the event log
The Web-Based User InterfaceMenus and Tool Bars4-86 IxWLAN User Guide, Release 6.204Figure 4-107.Select Remote BSSRoam: Opens the Roam dialog, as shown in Figure 4-108. This command applies to all currently selected vSTAs in the Group or wport tabs.Figure 4-108.Roam DialogClick the Select button to select a BSS from a list or to manually type a BSSID, as shown in Figure 4-107.The two checkboxes select the Probe on Roam and Authenticate on Roam options.
IxWLAN User Guide, Release 6.20 4-87The Web-Based User InterfaceMenus and Tool Bars•Include Probe Request – Selects whether to issue a Probe Request during the Roam.When enabled, a Probe Request is issued (and a Probe Response expected) by each roaming virtual station during the Roam just before the 802.11 Authentication stage. When disabled, no Probe Request is sent.•Include 802.11 Authentication – Selects whether to perform basic 802.11 Authentication during the Roam. When enabled, each roaming vSTA issues an Authentication Request to the target AP during a Roam and it expects an Authentication Response. When disabled, the 802.11 Authentication is skipped during a Roam and the vSTA proceeds to the (Re)Association exchange.Run: Starts the execution of the test defined by this scenario. Pause: Pauses the test and temporarily halts all virtual stations defined in the sce-nario. Virtual stations may be restarted by selecting the Run option. This option is dimmed (cannot be selected) if the scenario is not running.Terminate: Stops a test and halts all virtual stations defined in the scenario. Vir-tual stations must be reset before they can be run again. This option is dimmed (cannot be selected) if the scenario is not running.Reset: Resets all virtual stations in the scenario to a started state. Statistics for the virtual stations are reset to zero. This option can be used to restart any virtual sta-tions that may have encountered problems during a test.Quiesce: This selection causes the scenario (that is, all virtual stations) to grace-fully stop. The vSTA completes any currently active iteration, then stops. A qui-esced vSTA must be reset before it can run again.Group Menu After you have defined a group in a scenario, use the options in the Group menu to edit and control any/all selected group(s).Figure 4-109 shows the Group menu.Figure 4-109.Group MenuEdit Group: This selection opens the Edit IxWLAN Group dialog.
The Web-Based User InterfaceMenus and Tool Bars4-88 IxWLAN User Guide, Release 6.204Initialize: Starts all virtual stations defined in the currently selected group. Probe: A Probe Request is sent by all virtual stations in the currently selected group. When invoked from the tool bar, probing does not change the Run State.Authenticate: If clicked, all virtual stations in the currently selected group ini-tiate the 802.11 authentication sequence to the System Under Test. Associate: If clicked, all virtual stations in the currently selected group initiate the 802.11 association sequence to the System Under Test. The 802.11 associa-tion sequence automatically transits through any necessary 802.1X authentica-tion and key management if the virtual station is configured for RSN, RSN-PSK, WPA, or WPA-PSK.Acquire IP: Causes all virtual stations in the group to initiate a request for an IP address using DHCP. This option is available only for vSTAs created with the IP Generation Method of DHCP.Pre-Authenticate: This command is similar to that described in the Scenario Menu section. For further information, please refer to Scenario Menu on page 4-84.Roam: This command is similar to that described in the Scenario Menu section. For more information, please refer to Scenario Menu on page 4-84.Run: Starts execution of all virtual stations defined in the currently selected group(s). Pause: Pauses execution of all virtual stations defined in the currently selected group(s). This option is dimmed (cannot be selected) if the group is not running a test.Terminate: Stops all virtual stations defined in the currently selected group(s). This option is dimmed (cannot be selected) if the group is not running a test.Reset: Resets all virtual stations defined in the currently selected group(s).Quiesce: Causes all virtual stations in the selected group to gracefully stop. The vSTA completes any currently active iteration, then stops. A quiesced vSTA must be reset before it can run again.
IxWLAN User Guide, Release 6.20 4-89The Web-Based User InterfaceMenus and Tool BarsvSTA Menu Figure 4-110 shows the vSTA menu.Figure 4-110.vSTA MenuEdit vSTA…: Opens the virtual station configuration dialog. Initialize: Starts the currently selected virtual station(s). Probe: A Probe Request is sent by all virtual stations in the currently selected group.Authenticate: If clicked, the currently selected virtual station(s) start(s) the 802.11 authentication sequence to the System Under Test. Associate: If clicked, the currently selected virtual station(s) start(s) the 802.11 association sequence to the System Under Test. The 802.11 association sequence automatically transits through any necessary 802.1X authentication and key man-agement if the virtual station is configured for RSN, RSN-PSK, WPA, or WPA-PSK.Acquire IP: Causes the currently selected virtual stations to initiate a request for an IP address using DHCP. This option is available only for vSTAs created with the IP Generation Method of DHCP.Pre-Authenticate: This command is similar to that described in the Scenario Menu section. For further information, please refer to Scenario Menu on page 4-84.Roam: This command is similar to that described in the Scenario Menu section. For further information, please refer to Scenario Menu on page 4-84.Run: Starts the execution of the currently selected virtual station(s). Pause: Pauses the execution of the currently selected virtual station(s). This option is dimmed (cannot be selected) if the virtual station is not running a test.Terminate: Stops the currently selected virtual station(s). This option is dimmed (cannot be selected) if the virtual station is not running a test.
The Web-Based User InterfaceMenus and Tool Bars4-90 IxWLAN User Guide, Release 6.204Reset: Resets the currently selected virtual station(s).Quiesce: This selection causes the currently selected virtual stations to gracefully stop. The vSTA completes any currently active iteration, then stops. A quiesced vSTA must be reset before it can run again.Reports Menu Figure 4-111 shows the Reports menu.Figure 4-111. Reports MenuIxWLAN Configuration…: Shows the IxWLAN configuration report.Scenario Summary…: Shows the scenario summary statistics report. Group Summary…: Shows the group summary statistics report.vSTA Master…: Shows the virtual station master (that is, IxWLAN) statistics report.vSTA Detailed…: Shows the virtual station detailed statistics report.Export Report…: Opens the Generate Report dialog. View Logfile…: Shows the event log.Export Logfile: Opens the Export Logfile dialog.
IxWLAN User Guide, Release 6.20 4-91The Web-Based User InterfaceMenus and Tool BarsOptions Menu Figure 4-112 shows the Options menu.Figure 4-112.Options MenuConfigure IxWLAN…: Opens the Configure IxWLAN dialog. Configure Monitors…: Opens the Configure Monitoring dialog.Configure Ping…: Opens the Configure Ping dialog.Configure Security…: Opens the Security Configuration dialog.Configure Event Log…: Opens the Configure Event Log dialog.Configure UI…: Opens the UI (User Interface) Configuration dialog.Configure Table View…: Opens the Table Configuration dialog for group tab columns.Configure Available Certificates…: Opens the Available Certificates dialog.About Menu Figure 4-112 shows the About menu.Figure 4-113.About MenuAbout IxWLAN…: Shows the IxWLAN current version number.Update IxWLAN…: Opens the Update IxWLAN dialog.About Ixia…: Accesses the Ixia Web site.
The Web-Based User InterfaceMenus and Tool Bars4-92 IxWLAN User Guide, Release 6.204
IxWLAN User Guide, Release 6.20 5-15Chapter 5: The Command Line Interface (CLI) This chapter covers the following topics: •CLI Usage Notes on page 5-3.•User Login on page 5-3.•User Logoff on page 5-4.•CLI Commands on page 5-4.•System Under Test Commands on page 5-7.•Virtual Station Setup and Control Commands on page 5-14.•Statistics File Commands on page 5-51.•Event Log Commands on page 5-53.•IxWLAN Commands on page 5-58.•802.11b/g Commands on page 5-86.•Administrative Mode Commands on page 5-90.•Example Configurations on page 5-97.•CLI Editor on page 5-114.The CLI can be used to show and modify the configuration of IxWLAN from a PC that is connected via Telnet or the serial port. The CLI also includes com-mands to configure and run virtual stations, show statistics, and access the Sys-tem Under Test. IxWLAN maintains statistics and event log files that you can configure and display using CLI commands. Some of these commands apply to all wports, while other are wport-specific. The following commands are wport-specific:•bsslist (get) on page 5-9.•join on page 5-10.•hwtxretries (get/set) on page 5-94.•scan on page 5-11.•get association on page 5-65.
The Command Line Interface (CLI)5-2 IxWLAN User Guide, Release 6.205•get basic11g (11g only) on page 5-91.•set basic11g (11g only) on page 5-92.•get basic11b (11b only) on page 5-87.•set basic11b (11b only) on page 5-87.•get bssid on page 5-8.•set bssid on page 5-8.•clear bssid on page 5-8.•get channel on page 5-66.•get ctsmode (11g only) on page 5-87.•set ctsmode (11g only) on page 5-87.•get ctsrate (11g only) on page 5-88.•set ctsrate (11g only) on page 5-88.•get ctstype (11g only) on page 5-88.•set ctstype (11g only) on page 5-88.•get frequency on page 5-69.•get key on page 5-70.•set key on page 5-80.•get pmmode on page 5-71.•set pmmode on page 5-81.•get power on page 5-71.•set power on page 5-82.•get psinterval on page 5-71.•set psinterval on page 5-83.•get rate on page 5-72.•set rate on page 5-83.•get shortpreamble (11b/11g) on page 5-89.•set shortpreamble (11b/11g) on page 5-89.•get shortslottime (11g only) on page 5-89.•set shortslottime (11g only) on page 5-89.•get ssid on page 5-13.•set ssid on page 5-13.•get station on page 5-72.•get wirelessmode on page 5-73.•set wirelessmode on page 5-85.•get wlanmac on page 5-73.
IxWLAN User Guide, Release 6.20 5-3The Command Line Interface (CLI)CLI Usage Notes•set wlanmac on page 5-85.•reset wlanmac on page 5-77.CLI Usage Notes 1. CLI commands are not case sensitive (for example, set Date is the same as set date). 2. You do not need to type the entire command string to execute a command. Only the number of unique characters needed to identify the command are needed (for example, se da executes the set date command because there are no other CLI commands that begin with se and no other set objects that begin with da).3. Some parameters can be assigned very large values in the 0 to 2,147,483,647 range. Do not type commas (,) for values larger than 999 (for example, use 1000 rather than 1,000).4. It is very important to keep a printed record of configuration parameters. See Configuration Records on page 8-14.User LoginThe IxWLAN logon prompt displays after you successfully establish a connec-tion to IxWLAN. See Chapter 3, First Setup. After you have successfully estab-lished this connection, the CLI prompts you to type a logon name and password. IxWLAN login: AdminPassword: ******The default logon user name is Admin. The default password is IxWLAN. Both entries are case-sensitive (that is, the default user name is Admin, not admin). After you type a valid user name and password, the CLI displays a version ban-ner, the current system time and status, and a CLI prompt (IxWLAN ->).Ixia IxWLAN(tm) Rev 6.20.0.129 EBSystem date & time: FRI APR 20 10:03:31 2007Use the "set date" or "set time" command to adjustIxWLAN(tm) software version 6.20.0.129 EBNumber of wports present ....... 3Multi-radio mode ............... StaticMgmt LAN MAC address ........... 00:08:9b:68:2c:81Data LAN MAC address ........... 00:08:9b:68:2c:82MIC check ...................... EnabledCrypto hardware ................ OK0 vSTAs currently in the system.[wport1]IxWLAN -> The CLI is now ready to accept your commands.
The Command Line Interface (CLI)User Logoff5-4 IxWLAN User Guide, Release 6.205User LogoffUse the quit command to log off from the CLI. IxWLAN -> quit After logoff, you must re-establish the telnet connection to log on to the CLI. CLI CommandsThe help command shows a list of all CLI commands. Example:[wport1]IxWLAN -> helpList of IxWLAN CLI commands:acquireip                 -- Acquire an IP address for a vSTA assoc                     -- Associate a vSTA with the SUT auth                      -- Authenticate a vSTA with the SUT autoconf                  -- Autoconfig-init-auth-assoc N vSTAs autorun                   -- Run N configured/associated vSTAs clear bssid               -- Clear BSSID for System Under Test clear evlog               -- Clear event log file or buffer clear group               -- Clear vSTA group data clear sntpserver          -- Clear SNTP/NTP server IP address clear systemname          -- Clear the IxWLAN system name clear vsta                -- Clear vSTA data conf                      -- Configure a vSTA cryptotest                -- Crypto hardware self-test deauth                    -- Deauthenticate a vSTA del group                 -- Delete a vSTA group del key                   -- Delete Encryption key del statfile              -- Delete a vSTA statistics file del summfile              -- Delete a vSTA statistics summary file del vsta                  -- Delete a vSTA disassoc                  -- Disassociate a vSTA exec                      -- Execute a command file ftp                       -- Software update via FTP get association           -- Display Association Table get basic11b              -- Display Basic 11b Rates get bootscan              -- Display Boot Scan Mode get bkjoin                -- Display Background Join get bssid                 -- Display BSSID of System Under Test get bsslist               -- Display list of discovered BSSIDs get channel               -- Display Radio Channel get config                -- Display current IxWLAN configuration get countrycode           -- Display Country Code get cryptocap             -- Display crypto hardware capabilities get evlog                 -- Display event log data get features              -- Display authorized featuresNOTE: If the CLI shows the “This IxWLAN has not been Node Locked” message after you type the IxWLAN logon name and password, see Missing Key File on page 8-7.
IxWLAN User Guide, Release 6.20 5-5The Command Line Interface (CLI)CLI Commands get frequency             -- Display Radio Frequency (MHz) get gateway               -- Display Gateway IP Address get group                 -- Display information for a vSTA group get hardware              -- Display Hardware Revisions get ipaddr                -- Display IP Address get ipmask                -- Display IP Subnet Mask get key                   -- Display Encryption Key get keyentrymethod        -- Display Encryption Key Entry Method get login                 -- Display Login User Name get mic                   -- Display Software MIC Control get multiradiomode        -- Display multi-radio mode get pmmode                -- Display Power Management Mode get power                 -- Display Transmit Power Setting get psinterval            -- Display Power Save Listen Interval get rate                  -- Display Data Rate get sntpserver            -- Display SNTP/NTP Server IP Address get ssid                  -- Display Service Set ID get statfile              -- Display vSTA statistics from file get station               -- Display Station Status get status                -- Display IxWLAN status get summfile              -- Display vSTA statistics summary from file get systemname            -- Display the IxWLAN system name get telnet                -- Display Telnet Mode get tzone                 -- Display Time Zone Setting get uptime                -- Display UpTime get version               -- Display Firmware Version get vsta                  -- Display vSTA information get wirelessmode          -- Display Wireless LAN Mode get wlanmac               -- Display Wireless LAN MAC Address get wlanmask              -- Display Wireless LAN Address Mask get wport                 -- Display wport information halt                      -- Halt a running vSTA help                      -- Display CLI Command List history                   -- Display the command line history import                    -- Import PKCS#12 certfile via FTP init                      -- Initialize a configured vSTA join                      -- Join the IxWLAN with the System Under Test ping                      -- Ping preauth                   -- Pre-authenticate a vSTA with a remote AP quit                      -- Logoff reboot                    -- Reboot the IxWLAN releaseip                 -- Release a vSTA's IP address reset group               -- Reset a vSTA group to the initialized state reset vsta                -- Reset a vSTA to the initialized state reset wlanmac             -- Reset the WLAN MAC address to default value roam                      -- Roam a vSTA to target BSS run                       -- Run an associated vSTA save evlog                -- Save the event log buffer to file save group                -- Save vSTA group data save vsta                 -- Save vSTA data scan                      -- Acquire SUT (scan/join) sendprobe                 -- Send probe request from vSTA set bkjoin                -- Set Background Join set bootscan              -- Set Bootscan mode set bssid                 -- Set the BSSID for the System Under Test set countrycode           -- Set Country Code set date                  -- Set the system date
The Command Line Interface (CLI)CLI Commands5-6 IxWLAN User Guide, Release 6.205 set evlog                 -- Set event log controls set factorydefault        -- Restore to Default Factory Settings set features              -- Upgrade current feature set set gateway               -- Set Gateway IP Address set group                 -- Set vSTA group configuration parameters set ipaddr                -- Set IP Address set ipmask                -- Set IP Subnet Mask set key                   -- Set Encryption Key set keyentrymethod        -- Select Encryption Key Entry Method set login                 -- Modify Login User Name set mic                   -- Set Software MIC Control set multiradiomode        -- Set multi-radio mode set password              -- Modify Password set pmmode                -- Set Power Management Mode set power                 -- Set Transmit Power set psinterval            -- Set Power Save Listen Interval set rate                  -- Set Data Rate set sntpserver            -- Set SNTP/NTP Server IP Address set ssid                  -- Set Service Set ID set systemname            -- Set the IxWLAN system name set telnet                -- Set Telnet Mode set time                  -- Set the system time set tzone                 -- Set Time Zone Setting set vsta                  -- Set vSTA configuration parameters set wirelessmode          -- Set Wireless LAN Mode set wlanmac               -- Set WLAN MAC Address set wlanmask              -- Set WLAN Address Mask set wport                 -- Set wport for configuration timeofday                 -- Display Current Time of Day version                   -- Software version[wport1]IxWLAN ->This list does not include the commands that are available in the administrative mode. See Administrative Mode Commands on page 5-90 for a list including more commands that are available in the administrative mode. Also, the list of commands is slightly different depending on the wireless mode. If the wireless mode is 802.11a, for example, the list does not include commands that are spe-cific to 802.11g. NOTE: The trace command is available both in the user and admin mode. In the user mode, it is not listed among the other commands in the help output. For details about this command, see Administrative Mode Commands on page 5-90 or trace on page 5-95.
IxWLAN User Guide, Release 6.20 5-7The Command Line Interface (CLI)System Under Test CommandsSystem Under Test CommandsThese commands are used to scan for and join with a device that can be tested by IxWLAN. These commands must be used to select and join with a System Under Test before you can use the following Virtual Station Set-Up and Control Com-mands.clear bssid                        -- Clear BSSID for System Under Testget bssid                          -- Display BSSID of System Under Testget bsslist                        -- Display list of discovered BSSIDsget ssid                           -- Display Service Set IDget wirelessmode                   -- Display Wireless LAN Modejoin                               -- Join the IxWLAN with the System Under Testscan                               -- Acquire SUT (scan/join)set bssid                          -- Set the BSSID for the System Under Testset ssid                           -- Set Service Set IDset wirelessmode                   -- Set Wireless LAN ModeThese commands also allow you to change the System Under Test while virtual stations are defined and active. Use the following command sequence:1. Use the reset command to return all virtual stations to an initialized state:reset vsta all2. If the new System Under Test is not in IxWLAN's BSS list, a scan is needed:scan3. Use the set bssid command to set IxWLAN to another System Under Test:set bssid <mac_address_of_new_SUT>4. Use the join command to join with the System Under Test:join5. If virtual stations are configured for WPA or RSN authentication and the new System Under Test has a different passphrase, change the passphrase for all virtual stations to match the new System Under Test: set vsta all passphrase <SUTs_passphrase>6. Issue the authenticate command for all virtual stations:auth vsta all7. Issue the associate command for all virtual stations:assoc vsta all8. Run the test for all virtual stations:run vsta allThis section covers the following commands: •bssid (get/set/clear) on page 5-8•bsslist (get) on page 5-9
The Command Line Interface (CLI)System Under Test Commands5-8 IxWLAN User Guide, Release 6.205•join on page 5-10•scan on page 5-11•ssid (get/set) on page 5-13bssid (get/set/clear) get bssidShows the current BSSID/MAC address of the system being tested. get bssidExample:[wport1]IxWLAN -> get bssidBSSID of System Under Test: 00:04:e2:34:e0:a8[wport1]IxWLAN ->set bssidSpecifies the BSSID/MAC address of the system to be tested. This is the System Under Test that IxWLAN scans for and joins with. The default value is all zeros. set bssid <mac_address><mac_address>: MAC address of the System Under Test.Example:[wport1]IxWLAN -> set bssid 00:04:e2:34:e0:a8BSSID of System Under Test: 00:04:e2:34:e0:a8IxWLAN ->IxWLAN -> get bssidBSSID of System Under Test: 00:04:e2:34:e0:a8[wport1]IxWLAN ->clear bssidClears the current BSSID. clear bssidExample:[wport1]IxWLAN -> clear bssidBSSID 00:04:e2:34:e0:a8 cleared   use the set bssid CLI command to set the BSSID of the System Under Test[wport1]IxWLAN ->NOTE: IxWLAN must be configured with a non-zero BSSID to perform a Join operation and to create and run virtual stations.
IxWLAN User Guide, Release 6.20 5-9The Command Line Interface (CLI)System Under Test Commandsbsslist (get) Shows the Basic Service Sets discovered in the most recent scan. See scan on page 5-11.get bsslist [detail]Use the [detail] option to view detailed information regarding each BSS’s rate capabilities and needs, country code and channel capabilities, and security infor-mation.Example for get bsslist:[wport1]IxWLAN -> get bsslistUse "get bsslist detail" for additional infoType  Chan  Sec  RSSI  BSSID              SSID----  ----  ---  ----  -----              ----AP      44         38  00:05:4e:41:3c:19  QA_A_APAP      60  WEP    61  00:04:e2:37:e6:a1  CK S-1AP      64  TKIP   53  00:0b:6b:30:05:6c  cb/wpaAP     149  TKIP   39  00:12:d9:c4:0a:90  s TKIPAP SUT 157  AES    51  00:0b:6b:30:05:65  CK D-1AP     165         52  00:0b:6b:30:05:86  cb/ap1AP: 6, Ad-Hoc: 0, Total BSSs: 6[wport1]IxWLAN ->Type: The Type column indicates the type of BSS detected: AP=Infrastructure BSS, <Type> SUT=System Under Test, Ad-Hoc=Ad-Hoc BSS.Chan: BSS channel number. The BSS list is sorted in channel number order.Sec: Brief description of the security level of the BSS. If multiple security fea-tures are active, this column shows the highest level of security. Use the [detail] option to show all security options in effect.RSSI: The RSSI column shows the relative received signal strength indicator for the BSS. A higher RSSI value indicates that a stronger signal is received.BSSID: The BSSID column shows the BSS identifier.SSID: The SSID column shows the service set identifier for the BSS discovered via a probe request.Example for get bsslist detail:[wport1]IxWLAN -> get bsslist detailBSS Type  Channel       RSSI  BSSID              SSID--------  -------       ----  -----              ----AP BSS    5.220 ( 44)    38   00:05:4e:41:3c:19  QA_A_AP  Rates:    *6, 9, *12, 18, *24, 36, 48, 54AP BSS    5.300 ( 60)    61   00:04:e2:37:e6:a1  CK S-1  Rates:    *6, 9, *12, 18, *24, 36, 48, 54  Security: WEPAP BSS    5.320 ( 64)    53   00:0b:6b:30:05:6c  cb/wpa  Rates:    *6, 9, *12, 18, *24, 36, 48, 54  Security: WPA/EAP/TKIP
The Command Line Interface (CLI)System Under Test Commands5-10 IxWLAN User Guide, Release 6.205  Country:  US [ 52 (5260)  4 23] [ 36 (5180)  4 17] [149 (5745)  5 30]AP BSS    5.745 (149)    39   00:12:d9:c4:0a:90  s TKIP  Rates:    *6, *9, *12, *18, *24, *36, *48, *54  Security: WPA/PSK/TKIPAP BSS    5.785 (157)    51   00:0b:6b:30:05:65  CK D-1  * *  This is the System Under Test  * *  Rates:    *6, 9, *12, 18, *24, 36, 48, 54  Security: RSN/PSK/AES/TKIP  Country:  US [ 52 (5260)  4 23] [ 36 (5180)  4 17] [149 (5745)  5 30]AP BSS    5.825 (165)    52   00:0b:6b:30:05:86  cb/ap1  Rates:    *6, 9, *12, 18, *24, 36, 48, 54  Country:  US [ 52 (5260)  4 23] [ 36 (5180)  4 17] [149 (5745)  5 30]AP: 6, Ad-Hoc: 0, Total BSSs: 6The get bsslist detail command shows detailed information regarding the rate capabilities and needs, country code and channel capabilities, and security infor-mation of each BSS. This information is presented as it is read from the BSS’s Beacon or Probe Response, when present. Not all APs broadcast this detail infor-mation. It is shown only when available.The first line of each BSS detail line item shows the basic BSS information: type, channel, RSSI, BSSID, and SSID. The * * This is the System Under Test * * message displays after the basic BSS information line if the System Under Test is specified and detected.Rates: This line indicates the set of transmit rates supported in the BSS. Entries marked by an asterisk (for example, *6, *24) indicate a member of the BSS’s basic rate set.Security: This line indicates all security information that can be determined pas-sively through inspection of information found in the Beacon or Probe Response. WEP indicates basic WEP encryption. WPA or RSN indicate higher security in the form of advanced authentication and encryption algorithms. PSK indicates Pre-Shared Key authentication. EAP indicates the use of a more robust EAP-based authentication algorithm. TKIP and AES indicate the cipher algorithm in use. A WPA or RSN BSS may support more than one authentication or cipher suite.Country: This line indicates information found in the Country information ele-ment, when present. This includes the country code and the channel list. The channel list is formatted in the form: [first channel, number of channels, maxi-mum transmit power]. Example: [ 52 (5260) 4 23]. In this example, first chan-nel=52, number of channels =4, maximum transmit power=23.join Joins with the System Under Test. It must be present in the current Basic Service Set list. See bsslist (get) on page 5-9.joinExample:[wport1]IxWLAN -> join The join should take about 1 sec [wport1]IxWLAN -> IxWLAN: wport1 Join: Checking BSS ... OK
IxWLAN User Guide, Release 6.20 5-11The Command Line Interface (CLI)System Under Test Commands IxWLAN: wport1 Join: Checking channel ... OK IxWLAN: wport1 Join: Initiating JOIN ... Infrastructure   5.260    29   00:0b:6b:30:05:9f  ixia/dmm/atheros IxWLAN: wport1 Join: channel 52 (5260 MHz), ixia/dmm/atheros OK  wport1 NOTIFY Operation JOIN succeeded - FRI MAR 30 14:05:57 2007 [wport1]IxWLAN ->Example:[wport1]IxWLAN -> join The join should take about 1 sec [wport1]IxWLAN -> IxWLAN: wport1 Join: Checking BSS ... OK IxWLAN: wport1 Join: Checking channel ... OK IxWLAN: wport1 Join: Initiating JOIN ... Infrastructure 5.240 58 00:0b:6b:30:05:86 AccessPoint_1 IxWLAN Join: channel 157 (5785 MHz), CK D-1 OK [wport1]IxWLAN -> vSTA 1 PSK: f769e4fdc6b97b780c7f3799c6d58ce7250ca3779930cb4d2545dacbc45092d1 [wport1]IxWLAN -> wport1 NOTIFY Operation JOIN succeeded - MON MAY 09 10:42:30 2005 [wport1]IxWLAN ->scan Scans for Basic Service Set IDs and optionally joins with the System Under Test. The IxWLAN wireless mode affects the type of devices that can be detected in a scan. To change the IxWLAN wireless mode, see Virtual Station Setup and Control Commands on page 5-14. [wport1]IxWLAN -> scanActive (probe request) or passive (listen for beacons) [a/p: p]?Type a and press ENTER to select an active scan. Just press ENTER to select the default passive mode. If the passive mode is selected, the CLI prompts for the following scanning options:Channel (0 = all, m=all modes) [0]?Channel timeout in msec [300]?If typing m for the channel, all valid channels in all valid modes are scanned.The default entry of 0 selects all valid channels in the current wireless mode.NOTE: If any virtual stations are configured for WPA-PSK or RSN-PSK authentication using a passphrase and IxWLAN is already joined at the time a join command selects a different SSID, the Pre-Shared Keys is regenerated for every vSTA that has a passphrase set. NOTE: If a test is in process (see get wirelessmode on page 5-73), a scan operation is disruptive to the normal testing operations of IxWLAN.
The Command Line Interface (CLI)System Under Test Commands5-12 IxWLAN User Guide, Release 6.205If the active mode is selected, the CLI prompts for the following scanning options:Broadcast or directed probe request [b/d: d]?Channel (0 = all, m=all modes) [0]?Channel timeout in msec [300]?In response to the Channel prompt, you may type zero for all channels or any valid 802.11a or 802.11b/g channel number or frequency. The range of channels/frequencies depends on the wireless mode and the features that are enabled on IxWLAN. See the specifications in Appendix A, Specifications for a list of valid channel numbers and frequencies for 802.11a, 802.11b, and 802.11g.The CLI prompts to join with a system (if any) found in the scan. If IxWLAN is already joined with a System Under Test, the default response is y:Attempt a join with SUT 00:04:e2:38:56:78 [y/n: y]? If IxWLAN is not joined with a System Under Test, the default response is n:Attempt a join with SUT 00:04:e2:38:56:78 [y/n: n]? Type y or n and press ENTER or just press ENTER to select the default.Example:[wport1]IxWLAN -> scanActive (probe request) or passive (listen for beacons) [a/p:p]?Channel (0 = all) [0]?Channel timeout in msec [300]?Attempt a join with SUT 00:04:e2:38:a8:d2 [y/n: n]?The scan should take about 4 sec[wport1]IxWLAN -> OK[wport1]IxWLAN ->[wport1]IxWLAN ->Passive scanning 5 GHz 54Mbps (802.11a) channels for 4 seconds...Select BSS: Looking for .. 00:04:E2:38:A8:D2Select BSS: Found ........ 00:04:E2:38:A8:D2 => BSS'es from the selected wireless mode <=BSS Type  Channel       RSSI  BSSID              SSID--------  -------       ----  -----              ----SUT BSS   5.220 ( 44)    31   00:04:e2:38:a7:87  AccessPoint_1SUT BSS   5.260 ( 52)    55   00:04:e2:38:a8:d2  AccessPoint_2SUT BSS   5.280 ( 56)    46   00:04:e2:38:56:68  AccessPoint_3SUT BSS   5.300 ( 60)    44   00:04:e2:37:e6:a1  AccessPoint_4SUT: 4, Ad-Hoc: 0. Total BSS: 4 wport1 NOTIFY Operation SCAN succeeded - FRI MAR 30 14:14:52 2007wport1 NOTIFY Operation SCAN&JOIN succeeded - FRI MAR 30 14:14:52 2007[wport1]IxWLAN -> scanActive (probe request) or passive (listen for beacons) [a/p: p]? aBroadcast or directed probe request [b/d: d]?
IxWLAN User Guide, Release 6.20 5-13The Command Line Interface (CLI)System Under Test CommandsChannel (0 = all) [0]? 2412Channel timeout in msec [300]?Attempt a join with SUT 00:04:e2:38:a8:d2 [y/n: n]?The scan should take about 1 sec[wport1]IxWLAN -> OK[wport1]IxWLAN ->[wport1]IxWLAN -> InitSingleScan -- 2412, a00  cck 2.4Active scanning 2.4GHz 11Mbps (802.11b) channels for 1 seconds...wlanMlmeProbeRequest -- channel 2412Select BSS: Looking for .. 00:04:E2:38:A8:D2Select BSS: Found ........ 00:04:E2:38:A8:D2InitSingleScan -- 2412, a00  cck 2.4Active scanning 2.4GHz 11Mbps (802.11b) channels for 1 seconds...wlanMlmeProbeRequest -- channel 2412wport1 NOTIFY Operation SCAN succeeded - FRI MAR 30 14:14:52 2007wport1 NOTIFY Operation SCAN&JOIN succeeded - FRI MAR 30 14:14:52 2007[wport1]IxWLAN ->ssid (get/set) get ssidDisplays the IxWLAN global Service Set Identifier attribute.[wport1]IxWLAN -> get ssidSSID: IxWLAN Test Wireless Network[wport1]IxWLAN ->set ssidSets the given value to the IxWLAN global Service Set Identifier attribute.To reset the global SSID to the factory default string, enter the following com-mand: set ssid default.[wport1]IxWLAN -> set ssid default * * * *  DO NOT REMOVE POWER FROM THE IxWLAN UNIT! * *  Wait for the IxWLAN to update the configuration file in Flas * *  or use the "reboot" command for immediate update & reboot. * *  Automatic update will be done within one minute. * *[wport1]IxWLAN -> ...Configuration file update completed.get ssidSSID: IxWLAN Test Wireless Network
The Command Line Interface (CLI)Virtual Station Setup and Control Commands5-14 IxWLAN User Guide, Release 6.205Virtual Station Setup and Control CommandsThe following commands configure and activate virtual stations.acquireip                 -- Acquire an IP address for a vSTAassoc                     -- Associate a vSTA with the SUTauth                      -- Authenticate a vSTA with the SUTautoconf                  -- Autoconfig-init-auth-assoc N vSTAsautorun                   -- Run N configured/associated vSTAsclear group               -- Clear vSTA group dataclear vsta                -- Clear vSTA dataconf                      -- Configure a vSTAdeauth                    -- Deauthenticate a vSTAdel group                 -- Delete a vSTA groupdel vsta                  -- Delete a vSTAdisassoc                  -- Disassociate a vSTAget group                 -- Display information for a vSTA groupget vsta                  -- Display vSTA informationhalt                      -- Halt a running vSTApreauth                   -- Pre-authenticate a vSTA with a remote APreleaseip                 -- Release a vSTA's IP addressreset group               -- Reset a vSTA group to the initialized statereset vsta                -- Reset a vSTA to the initialized stateroam                      -- Roam a vSTA to target BSSrun                       -- Run an associated vSTAsave evlog                -- Save the event log buffer to filesave group                -- Save vSTA group datasave vsta                 -- Save vSTA datasendprobe                 -- Send probe request from vSTAset group                 -- Set vSTA group configuration parametersset vsta                  -- Set vSTA configuration parametersMost of the commands in this group need that you join with a System Under Test. If a join or scan has not been done, the CLI shows the following message:**You must do a "join" or a "scan" with the join option first.Use the described System Under Test commands to join with a System Under Test before using the commands in this group.NOTE: There is no need for an explicit Join when Background Join is enabled.
IxWLAN User Guide, Release 6.20 5-15The Command Line Interface (CLI)Virtual Station Setup and Control CommandsThis section covers the following commands: •acquireip on page 5-16.•assoc on page 5-16.•auth on page 5-17.•autoconf on page 5-18.•autorun on page 5-23.•clear group on page 5-23.•clear vsta on page 5-23.•conf on page 5-24.•deauth on page 5-26.•del group on page 5-27.•del vSTA on page 5-27.•disassoc on page 5-27.•get group on page 5-28.•get vsta on page 5-30.•halt on page 5-36.•init on page 5-36.•preauth on page 5-37.•releaseip on page 5-37.•reset group on page 5-38.•reset vsta on page 5-38.•roam on page 5-38.•run on page 5-39.•save group(stats/summary) on page 5-39.•save vsta(stats/summary) on page 5-40.•sendprobe on page 5-40.•set group on page 5-42.•set vsta on page 5-46.NOTE: Most of the commands in this group need that you specify a virtual station ID in the 1 to 64 range for the IxWLAN SED chassis, and in the 1 to 128 range for the IxWLAN SED-MR+. If you intend to configure all virtual stations for WPA or RSN authentication, the maximum number of virtual stations is:•59 for the IxWLAN SED chassis•59 per wport—in the Static multi-radio mode—for the IxWLAN SED-MR+ chassis•59—in the Dynamic multi-radio mode—for the IxWLAN SED-MR+ chassis
The Command Line Interface (CLI)Virtual Station Setup and Control Commands5-16 IxWLAN User Guide, Release 6.205acquireip Starts the DHCP negotiation process for the specified virtual station(s). The vir-tual station must be in the 802.11 Associated state or 802.1X authenticated if security is turned on and the vSTA’s DHCP mode (dhcpmode) must be set to on. See autoconf on page 5-18, conf on page 5-24 and set vsta on page 5-46 for infor-mation about setting the DHCP mode. The following command starts the DHCP negotiation process for one or all vir-tual stations. acquireip vsta <vStaId><vStaId>: Virtual Station ID (1…128) or all. If <vStaId> is set to all (that is, acquireip vsta all), the DHCP negotiation process is initiated for all virtual sta-tions.The following command starts the DHCP negotiation process for all virtual sta-tions in a specified group.acquireip group <grpId><grpId>: Group ID (1…128)Example:[wport1]IxWLAN -> acquireip vsta 1[wport1]IxWLAN -> OKvSTA ID:1 NOTIFY Operation ACQIP (10.1.35.10) succeeded - THU JAN 08 10:04:31 2004assoc Starts the 802.11 association sequence for one or more virtual stations. The 802.11 association sequence automatically transits through any necessary 802.1X authentication and key management if the virtual station is configured for RSN, RSN-PSK, WPA, or WPA-PSK. The virtual station(s) must be configured, ini-tialized, and authenticated before this command can be used. The following command starts the association sequence for one or all virtual sta-tions. assoc vsta <vStaId><vStaId>: Virtual Station ID (1…128) or all. If <vStaId> is set to all (that is, assoc vsta all), the association sequence is initiated for all virtual stations.The following command starts the association sequence for all virtual stations in a specified group.assoc group <grpId><grpId>: Group ID (1…128)
IxWLAN User Guide, Release 6.20 5-17The Command Line Interface (CLI)Virtual Station Setup and Control CommandsExample:[wport1]IxWLAN -> assoc vsta 1[wport1]IxWLAN -> OK[wport1]IxWLAN ->vSTA ID:1 NOTIFY Operation ASSOC succeeded - TUE JUL 15 03:08:38 2003[wport1]IxWLAN ->When a virtual station is configured for WPA-PSK authentication, this command shows additional AKMP information. Example for WPA-PSK:[wport1]IxWLAN -> assoc vsta 1[wport1]IxWLAN -> OK[wport1]IxWLAN ->vSTA ID:1 NOTIFY Operation ASSOC succeeded - WED MAY 26 10:38:57 2004[wport1]IxWLAN ->vSTA ID:1 NOTIFY Remote initiated AKMP - WED MAY 26 10:38:57 2004[wport1]IxWLAN ->vSTA ID:1 NOTIFY AKMP succeeded - WED MAY 26 10:38:57 2004[wport1]IxWLAN ->When a virtual station is configured for WPA or RSN authentication, this com-mand shows an additional NOTIFY message for the 802.1X authentication oper-ation.Example for WPA:[wport1]IxWLAN -> assoc vsta 1[wport1]IxWLAN -> OK[wport1]IxWLAN ->vSTA ID:1 NOTIFY Operation ASSOC succeeded - WED MAY 26 10:38:57 2004[wport1]IxWLAN ->vSTA ID:1 NOTIFY 1XAUTH succeeded - WED MAY 26 10:38:57 2004[wport1]IxWLAN ->vSTA ID:1 NOTIFY Remote initiated AKMP - WED MAY 26 10:38:57 2004[wport1]IxWLAN ->vSTA ID:1 NOTIFY AKMP succeeded - WED MAY 26 10:38:57 2004[wport1]IxWLAN ->auth Starts the 802.11 authentication sequence for one or more virtual stations. The virtual station(s) must be configured and initialized before this command can be used. The following command starts the authentication sequence for one or all virtual stations. auth vsta <vStaId><vStaId>: Virtual Station ID (1…128) or all. If <vStaId> is set to all (that is, auth vsta all), the authentication sequence is initiated for all virtual stations.
The Command Line Interface (CLI)Virtual Station Setup and Control Commands5-18 IxWLAN User Guide, Release 6.205The following command starts the authentication sequence for all virtual stations in a specified group.auth group <grpId><grpId>: Group ID (1…128)Example:[wport1]IxWLAN -> auth vsta 1[wport1]IxWLAN -> OK[wport1]IxWLAN ->vSTA ID:1 NOTIFY Operation AUTH succeeded - TUE JUL 15 03:08:15 2003 [wport1]IxWLAN ->autoconf This command allows you to configure, initialize, authenticate, and associate a number of virtual stations using a single command. It can be issued multiple times. The first time the command is issued, the base MAC and IP virtual station addresses must be specified. For subsequent commands, the IP and MAC address parameters are not needed. The specified number of virtual stations is configured using either default values or the values specified in the command line. Except for the number of virtual stations to be configured, values are specified using a “name/value” pair syntax and may be given in any order. autoconf <num> mac <mac_addr> [ip <ip_addr>] [group <grpId>] [wport <integer>] [gateway <ip_addr>] [ipmask <ip_mask>] [csmode persistent|non-persistent] [retry <integer>] [timeout <integer>] [fastradius enabled|disabled] [pmkcache enabled|disabled] [roamtype disassociation|reassociation] [encryption on|off] [keyindex <integer>] [fragmentthreshold <integer>] [rtsthreshold <integer>] [mode external] [layer 2 | 3] | [mode internal] target <ip_addr> [count <integer>] [size <integer>] [dhcpmode off | on | auto] [dhcplease <integer>] [dhcpretry <integer>] [dhcpinterval <integer>] [dhcpoffers <integer>] [dhcpserver <ip_addr>][SSID <string> | <quoted-string> | wildcard] [probe4auth] [authentication open-system|shared-key|rsn-psk|rsn|wpa-psk|wpa] [cipher wep|tkip|aes-ccm] [psk <key>] [passphrase <quoted-phrase>] [eapalgorithm tls|peap|ttls] [certfile <filename>] [userid <string>] [inneralgorithm <inner-auth-id>] [password <inner-auth-passwd>] [outeridentity <outer-auth-ID>] [kmtimeout <integer>]<num>: Specifies the number of virtual stations to be configured. For IxWLAN SED, the maximum number of vSTAs is 64, while IxWLAN SED-MR+ supports a maximum number of 128 vSTAs. If this is not the first autoconf command, new virtual stations are configured starting with the last virtual station and increment-ing for <num>. Default: None.mac <mac_address>: Specifies the base/starting value to be used for virtual sta-tion MAC addresses. This parameter is needed for the first autoconf command and should not be specified for subsequent commands. Default: Last MAC address + 1. The starting MAC address must be within the range of MAC
IxWLAN User Guide, Release 6.20 5-19The Command Line Interface (CLI)Virtual Station Setup and Control Commandsaddresses defined by the WLAN Base MAC Address and WLAN MAC Mask configured for the specified wport (see set wlanmac on page 5-85 and set wlanmask on page 5-85).ip <ip_address>: Specifies the base/starting value to be used for virtual station IP addresses. This parameter is needed for the first autoconf command and should not be specified for subsequent commands. Default: Last IP address + 1.[group <grpId>]: Specifies an optional group ID number (1…128). [wport <integer>]: Creates the virtual station(s) on the specified wport. If this parameter is not specified, the virtual station(s) is/are created on the current wport.[gateway <ip_addr>]: Specifies the IP address of the gateway to be used by the vSTA.[ipmask <ip_mask>]: Specifies the subnet mask to be used by a vSTA.[csmode persistent | non-persistent]: Specifies the connection mode (persistent or non-persistent). [retry <integer>]: Specifies the Authentication/Association retry limit (1…2,147,483,647 or zero (0=no retries)).[timeout <integer>]: Specifies the Authentication/Association timeout, in ms (1…2,147,483,647 or zero (0=immediate timeout)).[fastradius enabled | disabled]: Enables the fast RADIUS reconnection when (re)associating or pre-authenticating. The default is Disabled.[pmkcache enabled | disabled]: Enables the use of cached PMKSA information when (re)associating. The default value of this attribute is Enabled. Cached PMKSA information may be used by virtual stations configured for full RSN (802.11i) authentication.[roamtype disassociation | reassociation]: Selects the roam type. The default value for roamtype is reassociation.[authentication open-system|shared-key|wpa-psk|wpa|rsn|rsn-psk]: Defines the authentication mode: open-system, shared-key, wpa-psk, wpa, rsn, or rsn-psk. [encryption on|off]: Specifies the encryption mode (on or off). [keyindex <integer>]: If encryption is on and authentication is shared-key, this parameter specifies a shared key index number (1…4). These shared keys are defined by the set key command.[cipher wep | tkip | aes-ccm]: Enables WEP, TKIP, or AES-CCM (that is, CCMP) cipher mode. If authentication is open-system or shared-key, wep is the only valid selection.
The Command Line Interface (CLI)Virtual Station Setup and Control Commands5-20 IxWLAN User Guide, Release 6.205[mode internal | external]: If mode is internal, virtual station(s) generate data using Ping (ICMP Echo Request) packets. Each virtual station runs a ping trans-mitter process. The packets contain virtual station IP and MAC source address. If internal is specified, the target parameter must also be specified. If mode is external, data for virtual station(s) is generated by an external host connected to the same LAN as IxWLAN. For vSTAs configured at layer 3, IP and ARP pack-ets generated from this host that contain the virtual station's IP address as a source is translated at the MAC layer to appear as if sourced from the virtual sta-tion's MAC address. Default: internal. [target <ip_address>]: If mode is internal, this parameter specifies the target host's IP address. If mode is internal, this parameter is needed. Default: None.[count <integer>]: If mode is internal, this parameter specifies the number of ping packets to send: 0…2,147,483,647. Default: 1000. [size <integer>]: If mode is internal, this parameter specifies the size of the ping data buffer (64…1024). Default: 1024.[dhcpmode <off | on | auto>]: The DHCP mode allows virtual stations to have IP addresses dynamically acquired from a DHCP server on the network rather than a fixed, configured IP address. If dhcpmode is off, DHCP mode is not active and virtual stations must have a static IP address. If dhcpmode is on, the acquireip command must be used to initiate lease negotiation. If dhcpmode is auto, IxW-LAN automatically starts lease negotiation if the association succeeds. The default value is off. [dhcplease <integer>]: Specifies the lease time that a vSTA is to request.[dhcpretry <integer>]: Specifies the number of times that a vSTA retries a DHCP operation (discover, request) before timing out.[dhcpinterval <integer>]: Specifies the interval between retries.[dhcpoffers <integer>]: Specifies the number of offers to ignore before generat-ing a request.[dhcpserver <ip_addr>]: If set, specifies the DHCP server from which a vSTA is to accept offers (needed when testing with multiple servers).[SSID <string> | <quoted-string> | wildcard]: The SSID is used in (re)association and in computing the pre-shared key from a passphrase for WPA/RSN-PSK. The default value for a vSTA’s SSID is Not Set. If set to Wildcard, the SSID used in the probe and association/re-association requests is the wildcard SSID and the frame contains an SSID Information Element with a length of 0.[probeb4auth]: Directs the autoconfig command to issue the sendprobe com-mand before issuing the auth command.[layer <2 | 3>]: If mode is external, this parameter specifies how the external data stream is captured. If layer is 2, frames are captured based on the source
IxWLAN User Guide, Release 6.20 5-21The Command Line Interface (CLI)Virtual Station Setup and Control Commands802.3 MAC address. If layer is 3, frames are captured based on the source IP address. The default value is 3.[fragmentthreshold <nBytes>]: <nBytes> can be a value in the 256…2346 range and defines the fragmentation threshold for the virtual station(s) configured by this command. The fragmentation threshold limits the number of bytes in any 802.11 frame transmitted by the vSTA. If <nBytes> is set to 2346 (that is, the maximum 802.11 frame size), fragmentation is effectively disabled. The default value is 2346.[rtsthreshold <nBytes>]: <nBytes> can be a value in the 1…2346 range and defines the RTS threshold for the virtual station(s) configured by this command. Any frame to be transmitted by a vSTA that exceeds the vSTA’s RTS threshold needs a successful RTS/CTS frame exchange before the frame is transmitted. The minimum value (1) effectively needs RTS/CTS for all transmit frames. The maximum value (2346) is the maximum 802.11 frame size and effectively dis-ables RTS. The default value is 2346.[psk <key>]: If authentication is wpa-psk or rsn-psk, this parameter defines a Pre-Shared Key (64 ASCII-hex characters). [passphrase <quoted-passphrase>]: If authentication is wpa-psk or rsn-psk, this parameter defines a passphrase of up to 63 ASCII characters. If the passphrase contains spaces, the passphrase must be specified in double quotes “like so”. To specify a passphrase that contains a double quote, you must escape the double quote “like \” so”. [kmtimeout <integer>]: AKMP Timeout. This parameter sets a wait state timer (0…3600 seconds) for virtual stations. In cases when the System Under Test does not start or respond during a 4-way handshake, the affected virtual station may stall in a wait state. This timer can be used to recover the virtual station into an operable state. If the virtual station remains in a wait state until this timer expires, it is 802.11 de-authenticated and returned to the initialized state. The default value (zero) disables the timer (that is, wait forever). [userid <username>]: If authentication mode is wpa or rsn, this parameter spec-ifies the user ID to be used in the 802.1X exchange. It can be up to 64 characters in the range A…Z, a…z, 0…9, or other legal characters: period (.), dash (-), at-sign (@).[certfile <filename>]: If authentication mode is wpa or rsn, this parameter spec-ifies the filename of the certificate file to be used in the 802.1X exchange. The named certificate file must reside in the Certificates directory in the IxWLAN flash file system. [eapalgorithm tls|peap|ttls]: If authentication mode is rsn or wpa, this parameter specifies an authentication protocol: TLS, PEAP, or TTLS. [inneralgorithm ms-chapv2|eap-ms-chapv2]: If eapalgorithm is peap or ttls, this parameter specifies an inner algorithm for use in Phase 2 authentication. ms-chapv2 is normally used for ttls. eap-ms-chapv2 is normally used for peap.
The Command Line Interface (CLI)Virtual Station Setup and Control Commands5-22 IxWLAN User Guide, Release 6.205[outeridentity <string>]: If eapalgorithm is peap or ttls, this parameter assigns a separate user ID for use in Phase 1 authentication. It can be up to 64 characters in the range A…Z, a…z, 0…9, or other legal characters: period (.), dash (-), at-sign (@).[password <string>]: If eapalgorithm is peap or ttls, this parameter assigns a user password for use in Phase 2 authentication. Example:[wport1]IxWLAN -> set wport 2           Current wport: 2[wport2]IxWLAN ->[wport2]IxWLAN -> autoconf 1 mac 00:02:6f:58:01:01 ip 10.1.83.31 wport 3 target 10.1.83.1 count 100          vSTA ID:1 IP:10.1.83.31 MAC:00:02:6f:58:01:01 CONF OKvSTA ID:1 INIT OKvSTA ID:1 AUTH CMD OKvSTA ID:1 AUTH NOTIFY OKvSTA ID:1 ASSOC CMD OKvSTA ID:1 ASSOC NOTIFY OK[wport2]IxWLAN -> get vsta 1 conf vSTA Configuration:  ID ........................ 1  Group ID .................. 1  wport ..................... 3  IP Address ................ 10.1.83.31    DHCP Mode ............... Off      dhcpLease (Request) ... 3600      dhcpRetry (Limit) ..... 4      dhcpInterval (Retry) .. 4 (Secs)      dhcpOffers (Limit) .... 1      dhcpServer(Preferred) . 0.0.0.0  Subnet Mask ............... 0.0.0.0  Gateway Address ........... 0.0.0.0  MAC Address ............... 00:02:6f:58:01:01  SSID ...................... Not set  Connection Mode ........... persistent  Auth/Assoc Retry .......... 2  Authentication Timeout .... 300 mSec  Association Timeout ....... 300 mSec  Roam Type ................. Reassociation  Authentication ............ Open-System  Pre-Shared Key ............ Not set  Passphrase ................ Not set  EAP Algorithm ............. TLS  Inner Auth Algorithm ...... MS-CHAPv2  Certfile .................. Not set  User ID ................... Not set  Password .................. Not set  Outer ID .................. Not set  PMKSA Cache ............... Enabled  Fast Reconnect ............ Disabled  AKMP Timeout .............. 10 Seconds

Navigation menu