Sercomm WAP121 Wireless-N Access Point with Power over Ethernet User Manual
Sercomm Corporation Wireless-N Access Point with Power over Ethernet
Sercomm >
Contents
- 1. User manual 1 of 4
- 2. User manual 2 of 4
- 3. User manual 3 of 4
- 4. User manual 4 of 4
User manual 1 of 4
5(9,(:'5$)79HUVLRQ{&,6&2&21),'(17,$// $'0,1,675$7,21 *8,'( &LVFR6PDOO%XVLQHVV :$3 Wireless-N Access Point with Power over Ethernet :$3Wireless-N Selectable -Band Access Point with Power over Ethernet REVIEW DRAFT Version 2âCISCO CONFIDENTIAL &KDSWHU*HWWLQJ6WDUWHG Starting the Web-based AP Configuration Utility &RQWHQWV Launching the Utility Logging In Logging Out Using the Access Point Setup Wizard Getting Started 10 Window Navigation 11 Application Header 11 Navigation Window 11 Management Buttons 12 &KDSWHU9LHZLQJ6WDWLVWLFV System Summary 14 Network Interfaces 15 Traffic Statistics 16 WorkGroup Bridge Transmit/Receive 17 Associated Clients 18 TSPEC Client Associations 19 Rogue AP Detection 21 TSPEC Status and Statistics 25 TSPEC AP Statistics 26 RADIO Statistics 27 Email Alert Status 28 Log 29 &KDSWHU/$16HWWLQJV Port Settings 30 LAN 31 Time Settings 33 Cisco Small Business WAP121 and WAP321 Wireless-N Access Point with PoE REVIEW DRAFT Version 2âCISCO CONFIDENTIAL &KDSWHU:LUHOHVV6HWWLQJV &RQWHQWV Radio 36 Networks 43 SSID Naming Conventions 43 VLAN IDs 44 Configuring VAPs 44 Configuring Security Settings 47 None (Plain-text) 47 Static WEP 47 Dynamic WEP 50 WPA Personal 51 WPA Enterprise 53 Scheduler 55 Adding Scheduler Profiles 56 Configuring Scheduler Rules 57 Scheduler Association 58 Bandwidth Utilization 58 MAC Filtering 59 Configuring a MAC Filter List Locally on the AP 59 Configuring MAC Authentication on the RADIUS Server 60 WDS Bridge 60 Work Group Bridge 62 QoS 65 WPS Setup 67 WPS Overview 68 Usage Scenarios 68 WPS Roles 69 Enabling and disabling WPS on a VAP 69 External and Internal Registration 70 Client Enrollment 70 Optional Use of Internal Registrar 71 Lockdown Capability 71 VAP Configuration Changes 72 External Registration 72 Cisco Small Business WAP121 and WAP321 Wireless-N Access Point with PoE REVIEW DRAFT Version 2âCISCO CONFIDENTIAL &RQWHQWV Exclusive Operation of WPS Transactions 72 Backward Compatibility with WPS Version 1.0 73 Configuring WPS Settings WPS Process 73 74 Enrolling a Client Using the PIN Method 74 Enrolling a Client Using the Push Button Method 75 Viewing Instance Summary Information 76 &KDSWHU6103Y SNMP Overview 77 General SNMP Settings 78 SNMP Views 80 SNMP Groups 81 SNMP Users 83 SNMP Targets 84 &KDSWHU$GPLQLVWUDWLRQ System Settings 86 User Accounts 87 Adding a User 87 Changing a User Password 88 Firmware Upgrade 89 TFTP Upgrade 89 HTTP Upgrade 90 Packet Capture 90 Packet Capture Configuration 91 Local Packet Capture 92 Remote Packet Capture 93 Packet Capture File Download 96 Log Settings 97 Configuring the Persistent Log 97 Remote Log Server 98 Cisco Small Business WAP121 and WAP321 Wireless-N Access Point with PoE REVIEW DRAFT Version 2âCISCO CONFIDENTIAL Email Alert &RQWHQWV 99 DiscoveryâBonjour 101 HTTP/HTTPS Service 102 Configuring HTTP and HTTPS Services 102 Managing SSL Certificates 103 Telnet/SSH Service 104 Management Access Control 104 Download/Backup Configuration File 105 Backing Up a Configuration File 106 Downloading a Configuration File 107 Configuration Files Properties 107 Copying and Saving the Configuration 108 Rebooting 109 &KDSWHU6\VWHP6HFXULW\ RADIUS Server 110 802.1X Supplicant 112 Password Complexity 113 WPA-PSK Complexity 114 &KDSWHU&DSWLYH3RUWDO Configuring Global Captive Portal Settings 117 Configuring Instances 118 Configuring VAPs 120 Uploading Binary Files 121 Customizing the Captive Portal Web Pages 122 Web Customization Preview 124 Local Groups 125 Local Users 125 Local User/Group Associations 127 Cisco Small Business WAP121 and WAP321 Wireless-N Access Point with PoE REVIEW DRAFT Version 2âCISCO CONFIDENTIAL &RQWHQWV Authenticated Clients 127 Failed Authentication Clients 128 &KDSWHU&OLHQW4XDOLW\RI6HUYLFH ACLs 130 IPv4 and IPv6 ACLs 130 MAC ACLs 131 Configuring ACLs 131 Class Map 137 Adding a Class Map 138 Defining a Class Map 138 Policy Map 142 Client QoS Association 144 Client QoS Status 145 Cisco Small Business WAP121 and WAP321 Wireless-N Access Point with PoE REVIEW DRAFT Version 2âCISCO CONFIDENTIAL *HWWLQJ6WDUWHG This chapter provides an introduction to the web-based access point (AP) configuration utility, and includes the following topics: ⢠6WDUWLQJWKH:HEEDVHG$3&RQILJXUDWLRQ8WLOLW\ ⢠8VLQJWKH$FFHVV3RLQW6HWXS:L]DUG ⢠*HWWLQJ6WDUWHG ⢠:LQGRZ1DYLJDWLRQ 6WDUWLQJWKH:HEEDVHG$3&RQILJXUDWLRQ8WLOLW\ This section describes how to navigate the AP configuration utility. Browsers have the following restrictions: ⢠If you are using Internet Explorer 6, you cannot directly use an IPv6 address to access the AP. You can, however, use the DNS (Domain Name System) server to create a domain name that contains the IPv6 address, and then use that domain name in the address bar in place of the IPv6 address. ⢠To use Internet Explorer 8, open a browser window and configure the following settings: Click 7RROV!,QWHUQHW2SWLRQV and then select the 6HFXULW\ tab. Select /RFDO,QWUDQHW and click 6LWHV. Click $GYDQFHG and then click $GG. Add the intranet address of the AP (http://) to the local intranet zone. The IP address can also be specified as the subnet IP address, so that all addresses in the subnet are added to the local intranet zone. ⢠If you have multiple IPv6 interfaces on your management station, use the IPv6 global address instead of IPv6 link local address to access the AP from your browser. Cisco Small Business WAP121 and WAP321 Wireless-N Access Point with PoE *HWWLQJ6WDUWHG Starting the Web-based AP Configuration Utility REVIEW DRAFT Version 2âCISCO CONFIDENTIAL /DXQFKLQJWKH8WLOLW\ To open the web-based AP configuration utility: 67(3 Open a Web browser. 67(3 Enter the IP address of the AP you are configuring in the address bar on the browser, and then press Enter. The Login page opens. /RJJLQJ,Q To log in to the web-based AP configuration utility: 67(3 Enter the user name and password. The factory default user name is FLVFR and the default password is FLVFR. 67(3 If this is the first time that you logged on with the default user name (FLVFR) and the default password (FLVFR) or your password has expired, the Change Admin Password page opens. Enter the new password and confirm it, click $SSO\, and then click &ORVH. The new password is saved. Then, enter the user name FLVFR and the new password on the Login page. 67(3 Click /RJLQ. When the login attempt is successful, the Access Point Startup Wizard page opens. If you entered an incorrect user name or password, an error message is displayed and the Login page remains displayed on the screen. See 8VLQJWKH$FFHVV3RLQW6HWXS:L]DUGSDJH for instructions on using the wizard. /RJJLQJ2XW By default, the application logs out after five minutes of inactivity. See +773 +77366HUYLFH for instructions on changing the default timeout period. To logout, click /RJRXW in the top right corner of any page. Cisco Small Business WAP121 and WAP321 Wireless-N Access Point with PoE *HWWLQJ6WDUWHG Using the Access Point Setup Wizard REVIEW DRAFT Version 2âCISCO CONFIDENTIAL 8VLQJWKH$FFHVV3RLQW6HWXS:L]DUG The first time you log into the AP (or after it has been reset to the factory default settings), the Access Point Startup Wizard displays to help you perform initial configuration. Follow these steps to complete the wizard: 127( If you click Cancel to bypass the Wizard, the Change Password page displays. You can then change the default password for logging in. For all other settings, the factory default configuration will apply. 67(3 Click 1H[W. The Wizard displays the first of several Configuration windows, the Access Point Setup WizardâIP Address window. 67(3 Configure the system to receive its IP information from a DHCP server, or specify this information manually. For a description of these fields, see /$1SDJH. 67(3 Click 1H[W. The Access Point Setup WizardâTime Settings window displays. 67(3 Select your time zone, and then configure the system time manually or set the AP to get its time from an NTP server. For a description of these options, see 7LPH 6HWWLQJVSDJH. 67(3 Click 1H[W. The Wizard displays the first of four security windows, the Access Point Setup WizardâDevice Password window. 67(3 Enter a 1HZ3DVVZRUG and enter it again in the &RQILUP3DVVZRUG text box. For more information about passwords, see 8VHU$FFRXQWVSDJH. 67(3 Click 1H[W. The Wizard displays the second of four security windows, the Access Point Setup WizardâNetwork Name window. 67(3 Enter a 1HWZRUN1DPH. This name serves as the SSID for the default wireless network. 67(3 Click 1H[W. The Wizard displays the third of four security windows, the Access Point Setup WizardâWireless Security window. 67(3 Choose a security type. For a description of these options, see 6\VWHP6HFXULW\ SDJH . 67(3 Click 1H[W. The Wizard displays the Access Point Setup WizardâSummary window. 67(3 Review the settings you configured. If they are correct, click 6XEPLW. Or, click %DFN to reconfigure one or more settings. If you click &DQFHO, all settings are returned to the previous values. Cisco Small Business WAP121 and WAP321 Wireless-N Access Point with PoE *HWWLQJ6WDUWHG Getting Started REVIEW DRAFT Version 2âCISCO CONFIDENTIAL If you click 1H[W, the Wizard displays the Access Point Setup WizardâFinish window. 67(3 Click )LQLVK. The Getting Started window displays. *HWWLQJ6WDUWHG To simplify device configuration through quick navigation, the Getting Started page provides links for performing common tasks. /LQNVRQWKH*HWWLQJ6WDUWHG3DJH &DWHJRU\ /LQN1DPH RQWKH3DJH /LQNHG3DJH Initial Setup Run Setup Wizard Access Point Startup Wizard Configure Radio Settings Radio Configure Wireless Network Settings Networks Configure LAN Settings LAN Run WPS WPS Setup Device Status System Summary System Summary Wireless Client Associations Network Interfaces Quick Access Change Account Password User Accounts Upgrade Device Firmware Upgrade Firmware Backup/Restore Configuration Download/Backup Configuration File Support Cisco AP support site Forums Cisco Support Community site Other Resources Cisco Small Business WAP121 and WAP321 Wireless-N Access Point with PoE 10 *HWWLQJ6WDUWHG Window Navigation REVIEW DRAFT Version 2âCISCO CONFIDENTIAL :LQGRZ1DYLJDWLRQ This section describes the features of the web-based AP configuration utility. $SSOLFDWLRQ+HDGHU $SSOLFDWLRQ+HDGHU The Application Header is displayed on every page. It provides the following buttons: %XWWRQV %XWWRQ1DPH 'HVFULSWLRQ (User) The name of the user logged on to the AP. The factory default user name is FLVFR. /RJ2XW Click to log out of the web-based AP configuration utility. $ERXW Click to display the AP type and version number. +HOS Click to display the online help. 1DYLJDWLRQ:LQGRZ 1DYLJDWLRQ:LQGRZ A navigation window is located on the left side of each page. Click a top-level category to display links to related pages. Links that are preceded by an arrow are subcategories that expand to display the related page links. Cisco Small Business WAP121 and WAP321 Wireless-N Access Point with PoE 11 *HWWLQJ6WDUWHG Window Navigation REVIEW DRAFT Version 2âCISCO CONFIDENTIAL 0DQDJHPHQW%XWWRQV 0DQDJHPHQW%XWWRQV The following table describes the commonly used buttons that appear on various pages in the system. 0DQDJHPHQW%XWWRQV %XWWRQ1DPH 'HVFULSWLRQ $GG Click to display the related Add page and add an entry to a table. Enter the information and click 6DYH to save it to the Running Configuration and to the Startup Configuration. &DQFHO Click to reset changes made on the page. &OHDU$OO Click to clear all entries in the log table. 'HOHWH Select the entry in the table or list to be deleted and click 'HOHWH. 'HWDLOV Click to display details associated with the entry selected on the main page. (GLW Select an entry and click (GLW to open it for editing. The Edit page opens, or the relevant fields become editable. 5HIUHVK Click o redisplay the current page with the latest data. 6DYH Click to save the settings to save any configuration changes to the Running Configuration in RAM and to the Startup Configuration in nonvolatile memory. 8SGDWH Click to save any configuration changes on part of a page to the Running Configuration in RAM and to the Startup Configuration in nonvolatile memory. Cisco Small Business WAP121 and WAP321 Wireless-N Access Point with PoE 12 REVIEW DRAFT Version 2âCISCO CONFIDENTIAL 9LHZLQJ6WDWLVWLFV This chapter describes how to display WAP121/WAP321 statistics. It contains the following topics. ⢠6\VWHP6XPPDU\ ⢠1HWZRUN,QWHUIDFHV ⢠7UDIILF6WDWLVWLFV ⢠:RUN*URXS%ULGJH7UDQVPLW5HFHLYH ⢠$VVRFLDWHG&OLHQWV ⢠763(&&OLHQW$VVRFLDWLRQV ⢠5RJXH$3'HWHFWLRQ ⢠763(&6WDWXVDQG6WDWLVWLFV ⢠763(&$36WDWLVWLFV ⢠5$',26WDWLVWLFV ⢠(PDLO$OHUW6WDWXV ⢠/RJ Cisco Small Business WAP121 and WAP321 Wireless-N Access Point with PoE 13 9LHZLQJ6WDWLVWLFV System Summary REVIEW DRAFT Version 2âCISCO CONFIDENTIAL 6\VWHP6XPPDU\ The System Summary page displays basic information such as the hardware model description, software version, and system up time. To view system information, click 6WDWXVDQG6WDWLVWLFV > 6\VWHP6XPPDU\ in the navigation window. Or, click 6\VWHP6XPPDU\ under 'HYLFH6WDWXVon the Getting Started page. The System Summary page displays the following information: ⢠3,'9,'âThe AP hardware model and version. ⢠6HULDO1XPEHUâSerial number of the WAP121/WAP321. ⢠%DVH0$&$GGUHVVâThe AP MAC address. ⢠)LUPZDUH9HUVLRQâFirmware version number of the active image. ⢠)LUPZDUH0'&KHFNVXPâThe checksum for the active image. ⢠+RVW1DPHâA name assigned to the device. ⢠6\VWHP8SWLPHâTime that has elapsed since the last reboot. ⢠6\VWHP7LPHâCurrent system time. The NET_STAT table displays basic information about protocols and services operating on the AP. ⢠6HUYLFHâThe name of the service, if available. ⢠3URWRFROâThe underlying transport protocol that the service uses (TCP or UDP). ⢠/RFDO,3$GGUHVVâThe IP address, if any, of a remote device that is connected to this service on the switch. A value of All indicates that any IP address on the device can use this service. ⢠/RFDO3RUWâThe logical port number for the service. ⢠5HPRWH,3$GGUHVVâThe IP address of a remote host, if any, that is using this service. A value of All indicates that the service is available to all remote hosts that access the system. ⢠5HPRWH3RUWâThe logical port number of any remote device communicating with this service. Cisco Small Business WAP121 and WAP321 Wireless-N Access Point with PoE 14 9LHZLQJ6WDWLVWLFV Network Interfaces REVIEW DRAFT Version 2âCISCO CONFIDENTIAL ⢠&RQQHFWLRQ6WDWHâThe state of the service. For UDP, only connections in the Active state display in the table. In the Active state, a connection is established between the switch and a client or server. The TCP states are: /LVWHQâThe service is listening for connection requests. $FWLYHâA connection session is established and packets are being transmitted and received. (VWDEOLVKHGâA connection session is established between the switch and a server or client, depending on each deviceâs role with respect to this protocol. 7LPH:DLWâThe closing sequence has been initiated and the AP is waiting for a system-defined timeout period (typically 60 seconds) before closing the connection. You can click 5HIUHVK to refresh the screen and display the most current information. 1HWZRUN,QWHUIDFHV Use the Network Interfaces page to display configuration and status information about the wired and wireless interfaces. To display this page, click 6WDWXVDQG 6WDWLVWLFV > 1HWZRUN,QWHUIDFHin the navigation window. The Network Interfaces page displays the following information: ⢠/$16WDWXVâThese settings apply to the internal interface. These include the MAC Address; VLAN ID; IPv4 Address, subnet mask, and default gateway; and the IPv6 address and default gateway. The two configured DNS server IP addresses are also listed. For the WAP321 whether Green Ethernet mode is enabled also displays. To change any of these settings, click the Edit link. After you click Edit, you are redirected to the LAN page. See /$1SDJH for descriptions of these fields. ⢠5DGLR6WDWXVâThese settings include the Wireless Radio mode (Enabled or Disabled), the MAC address associated with each radio interface, the 802.11 mode (a/b/g/n), and the channel used by the interface. To change the wireless settings, click the Edit link. After you click Edit, you are redirected to the Radio page. See 5DGLRSDJH for descriptions of these fields. Cisco Small Business WAP121 and WAP321 Wireless-N Access Point with PoE 15 9LHZLQJ6WDWLVWLFV Traffic Statistics REVIEW DRAFT Version 2âCISCO CONFIDENTIAL You can click 5HIUHVK to refresh the screen and display the most current information. 7UDIILF6WDWLVWLFV Use the Traffic Statistics page to view basic information about the AP and a realtime display of transmit and receive statistics for the Ethernet interface and the VAPs on both radio interfaces. All transmit and receive statistics reflect the totals since the AP was last started. If you reboot the AP, these figures indicate transmit and receive totals since the reboot. To display this page, click 6WDWXVDQG6WDWLVWLFV> 7UDIILF6WDWLVWLFV in the navigation window. The Traffic Statistics page displays summary data and statistics for traffic in each direction. The following summary traffic statics display: ⢠1HWZRUN,QWHUIDFHâName of the Ethernet or VAP interface. ⢠1DPH 66,' âWireless network name. Also known as the SSID, this alphanumeric key uniquely identifies a wireless local area network. The SSID is set on the VAP tab. ⢠6WDWXVâWhether the interface is up or down. ⢠0$&$GGUHVVâMAC address for the specified interface. The AP has a unique MAC address for each interface. ⢠9/$1,'âVirtual LAN (VLAN) ID. You can use VLANs to establish multiple internal and guest networks on the same AP. The VLAN ID is set on the VAP tab. The following statistics display separately for the transmit and receive traffic: ⢠7RWDO3DFNHWVâThe total packets sent (in Transmit table) or received (in Received table) by this AP. ⢠7RWDO%\WHVâThe total bytes sent (in Transmit table) or received (in Received table) by this AP. ⢠7RWDO'URSSHG3DFNHWVâThe total number of packets sent (in Transmit table) or received (in Received table) by this AP that were dropped. ⢠7RWDO'URSSHG%\WHVâThe total number of bytes sent (in Transmit table) or received (in Received table) by this AP that were dropped. Cisco Small Business WAP121 and WAP321 Wireless-N Access Point with PoE 16 9LHZLQJ6WDWLVWLFV WorkGroup Bridge Transmit/Receive REVIEW DRAFT Version 2âCISCO CONFIDENTIAL ⢠(UURUVâThe total number of errors related to sending and receiving data on this AP. You can click 5HIUHVK to refresh the screen and display the most current information. :RUN*URXS%ULGJH7UDQVPLW5HFHLYH The WorkGroup Bridge Transmit/Receive page displays packet and byte counts for traffic between stations on a workgroup bridge. For information on configuring workgroup bridges, see :RUN*URXS%ULGJHSDJH . To display this page, click 6WDWXVDQG6WDWLVWLFV> :RUN*URXS%ULGJH in the navigation window. The following information displays for each network interface that is configured as a workgroup bridge interface: ⢠1HWZRUN,QWHUIDFHâName of the Ethernet or VAP interface. ⢠6WDWXVDQG6WDWLVWLFVâWhether the interface is disconnected or is administratively configured as up or down. ⢠9/$1,'âVirtual LAN (VLAN) ID. You can use VLANs to establish multiple internal and guest networks on the same AP. The VLAN ID is set on the VAP tab. ⢠1DPH 66,' âWireless network name. Also known as the SSID, this alphanumeric key uniquely identifies a wireless local area network. The SSID is set on the VAP tab. The following additional information displays for the transmit and receive direction for each workgroup bridge interface: ⢠7RWDO3DFNHWVâThe total number of packets bridged between the wired clients in the workgroup bridge and the wireless network. ⢠7RWDO%\WHVâThe total number of bytes bridged between the wired clients in the workgroup bridge and the wireless network. You can click 5HIUHVK to refresh the screen and display the most current information. Cisco Small Business WAP121 and WAP321 Wireless-N Access Point with PoE 17 9LHZLQJ6WDWLVWLFV Associated Clients REVIEW DRAFT Version 2âCISCO CONFIDENTIAL $VVRFLDWHG&OLHQWV You can use the Associated Clients page to view the client stations associated with a particular access point. To display this page, click 6WDWXVDQG6WDWLVWLFV> $VVRFLDWHG&OLHQWV in the navigation window. The associated stations are displayed along with information about packet traffic transmitted and received for each station. ⢠7RWDO1XPEHURI$VVRFLDWHG&OLHQWVâThe total number of clients currently associated with the AP. ⢠1HWZRUN,QWHUIDFHâThe VAP the client is associated with. For example, an entry of wlan0vap2 means the client is associated with the radio interface (wlan0) and VAP 2. ⢠6WDWLRQâThe MAC address of the associated wireless client. ⢠6WDWXVâThe Authenticated and Associated Status shows the underlying IEEE 802.11 authentication and association status, which is present no matter which type of security the client uses to connect to the AP. This status does not show IEEE 802.1X authentication or association status. The following are some points to keep in mind with regard to this field: ⢠If the AP security mode is None or Static WEP, the authentication and association status of clients showing on the Client Associations tab will be in line with what is expected; that is, if a client shows as authenticated to the AP, it will be able to transmit and receive data. (This is because Static WEP uses only IEEE 802.11 authentication.) If the AP uses IEEE 802.1X or WPA security, however, it is possible for a client association to show on this tab as authenticated (via the IEEE 802.11 security) but actually not be authenticated to the AP via the second layer of security. )URP6WDWLRQ7R6WDWLRQâFor the From Station, the following counters indicate the packets or bytes received by the wireless client. For the To Station, these counters indicate the number of packets and bytes transmitted from the AP to the wireless client. 3DFNHWVâNumber of packets received (transmitted) from the wireless client. %\WHVâNumber of bytes received (transmitted) from the wireless client. Cisco Small Business WAP121 and WAP321 Wireless-N Access Point with PoE 18 9LHZLQJ6WDWLVWLFV TSPEC Client Associations REVIEW DRAFT Version 2âCISCO CONFIDENTIAL ⢠'URS3DFNHWVâNumber of packets dropped after being received (transmitted). 'URS%\WHVâNumber of bytes that dropped after being received (transmitted). 769LRODWH3DFNHWV )URP6WDWLRQ âNumber of packets sent from a client STA to the AP in excess of its active TS uplink bandwidth, or for an access category requiring admission control to which the client STA has not been admitted. 769LRODWH3DFNHWV 7R6WDWLRQ âNumber of packets sent from the AP to a client STA in excess of its active TS downlink bandwidth, or for an access category requiring admission control to which the client STA has not been admitted. 8S7LPHâThe amount of time the client has been associated with the AP. You can click 5HIUHVK to refresh the screen and display the most current information. 763(&&OLHQW$VVRFLDWLRQV The TSPEC Client Associations page provides information about the TSPEC client data transmitted and received by this access point. The tables on this page show voice and video packets transmitted and received by the association, along with status information. This page shows a real-time display of the transmit and receive statistics for the TSPEC clients. All transmit and receive statistics shown are totals since the client association started. A TSPEC is a traffic specification that is sent from a QoS-capable wireless client to an AP requesting a certain amount of network access for the traffic stream (TS) it represents. A traffic stream is a collection of data packets identified by the wireless client as belonging to a particular user priority. An example of a voice traffic stream is a Wi-Fi CERTIFIED telephone handset that marks its codecgenerated data packets as voice priority traffic. An example of a video traffic stream is a video player application on a wireless laptop that prioritizes a video conference feed from a corporate server. To view TSPEC client association statistics, click 6WDWXVDQG6WDWLVWLFV!763(& &OLHQW$VVRFLDWLRQV in the navigation window. Cisco Small Business WAP121 and WAP321 Wireless-N Access Point with PoE 19 9LHZLQJ6WDWLVWLFV TSPEC Client Associations REVIEW DRAFT Version 2âCISCO CONFIDENTIAL The following information is provided on the TSPEC Client Associations page. Status: ⢠1HWZRUN,QWHUIDFHâRadio interface used by the client. ⢠66,'âService set identifier associated with this TS client. ⢠6WDWLRQâClient station MAC address. ⢠76,GHQWLILHUâTSPEC Traffic Session Identifier (range 0-7). ⢠$FFHVV&DWHJRU\âTS Access Category (voice or video). ⢠'LUHFWLRQâTraffic direction for this TS. Direction can be one of the following: ⢠uplink downlink bidirectional 8VHU3ULRULW\âUser Priority (UP) for this TS. The UP is sent with each packet in the UP portion of the IP header. Typical values are as follows: 6 or 7 for voice 4 or 5 for video The value may differ depending on other priority traffic sessions. ⢠0HGLXP7LPHâTime (in 32 microsecond per second units) that the TS traffic occupies the transmission medium. ⢠([FHVV8VDJH(YHQWVâNumber of times the client has exceeded the medium time established for its TSPEC. Minor, infrequent violations are ignored. ⢠9$30$&$GGUHVVâVirtual Access Point MAC address. Statistics: ⢠1HWZRUNâRadio interface used by the client. ⢠6WDWLRQâClient station MAC address. ⢠76,GHQWLILHUâTSPEC Traffic Session Identifier (range 0-7). ⢠$FFHVV&DWHJRU\âTS Access Category (voice or video). Cisco Small Business WAP121 and WAP321 Wireless-N Access Point with PoE 20 9LHZLQJ6WDWLVWLFV Rogue AP Detection REVIEW DRAFT Version 2âCISCO CONFIDENTIAL ⢠⢠⢠'LUHFWLRQâThe traffic direction for this TS. Direction can be one of the following: uplink downlink bidirectional )URP6WDWLRQâShows the number of packets and bytes received from the wireless client and the number of packets and bytes that were dropped after being received. The following also display: 3DFNHWVâNumber of packets in excess of an admitted TSPEC. %\WHVâNumber of packets for which no TSPEC has been established when admission is required by the AP. 7R6WDWLRQâThe number of packets and bytes transmitted from the AP to the wireless client and the number of packets and bytes that were dropped upon transmission. The following also display: 3DFNHWVâNumber of packets in excess of an admitted TSPEC. %\WHVâNumber of packets for which no TSPEC has been established when admission is required by the AP. You can click 5HIUHVK to refresh the screen and display the most current information. 5RJXH$3'HWHFWLRQ A Rogue AP is an access point that has been installed on a secure network without explicit authorization from a system administrator. Rogue access points pose a security threat because anyone with access to the premises can ignorantly or maliciously install an inexpensive wireless AP that can potentially allow unauthorized parties to access the network. The Rogue AP Detection page provides real-time statistics for all APs detected by the AP in the vicinity of the network. If the AP listed as a rogue is legitimate, you can add it to the Known AP List. 127( The Detected Rogue AP List and Trusted AP List provide information you can use to take further action. The AP does not have any control over the APs on the lists and cannot apply any security policies to APs detected through the RF scan. Cisco Small Business WAP121 and WAP321 Wireless-N Access Point with PoE 21 9LHZLQJ6WDWLVWLFV Rogue AP Detection REVIEW DRAFT Version 2âCISCO CONFIDENTIAL To view information about other access points on the wireless network, click 6WDWXVDQG6WDWLVWLFV!5RJXH$3'HWHFWLRQin the navigation window. When AP detection is enabled, the radio will periodically switch from its operating channel to scan other channels within the same band. You can click 5HIUHVK to refresh the screen and display the most current information. Neighbor AP detection can be enabled and disabled. To enable the radio to collect information about neighbor APs, click (QDEOH. next to $3'HWHFWLRQIRU5DGLR. The following information about detected and trusted rogue access points displays. ⢠$FWLRQâIf the AP is in the Detected Rogue AP List, you can click *UDQW to move the AP from the to the Trusted AP List. If the AP is in the Trusted AP list, you can click 'HOHWH to move the AP to the Detected Rogue AP List. 127( The Detected Rogue AP List and Trusted AP List provide information. The WAP121/WAP321 does not have any control over the APs on the list and cannot apply any security policies to APs detected through the RF scan. ⢠0$&$GGUHVVâThe MAC address of the neighboring AP. ⢠%HDFRQ,QWHUYDOâThe Beacon interval used by this AP. Beacon frames are transmitted by an AP at regular intervals to announce the existence of the wireless network. The default behavior is to send a beacon frame once every 100 milliseconds (or 10 per second). 127( The Beacon Interval is set on the Wireless > Radio page. ⢠⢠7\SHâThe type of device: AP indicates the neighboring device is an AP that supports the IEEE 802.11 Wireless Networking Framework in Infrastructure Mode. Ad hoc indicates a neighboring station running in Ad hoc Mode. Stations set to ad hoc mode communicate with each other directly, without the use of a traditional AP. Ad-hoc mode is an IEEE 802.11 Wireless Networking Framework also referred to as peer-to-peer mode or an Independent Basic Service Set (IBSS). 66,'âThe Service Set Identifier (SSID) for the AP. Cisco Small Business WAP121 and WAP321 Wireless-N Access Point with PoE 22 9LHZLQJ6WDWLVWLFV Rogue AP Detection REVIEW DRAFT Version 2âCISCO CONFIDENTIAL The SSID is an alphanumeric string of up to 32 characters that uniquely identifies a wireless local area network. It is also referred to as the Network Name. 127( You can set the SSID on the Wireless > Wireless Network Setup (VAPs) page. ⢠3ULYDF\âIndicates whether there is any security on the neighboring device: Off indicates that the Security mode on the neighboring device is set to None (no security). On indicates that the neighboring device has some security in place. 127( You can use the Wireless > Networks page to configure security on the AP. ⢠:3$âWhether WPA security is on or off for this AP. ⢠%DQGâThe IEEE 802.11 mode being used on this AP. (For example, IEEE 802.11a, IEEE 802.11b, IEEE 802.11g.) The number shown indicates the mode according to the following map: ⢠2.4 indicates IEEE 802.11b, 802.11g, or 802.11n mode (or a combination of the modes). 5 indicates IEEE 802.11a or 802.11n mode (or both modes). &KDQQHOâThe channel on which the AP is currently broadcasting. The channel defines the portion of the radio spectrum that the radio uses for transmitting and receiving. 127( You can use the Wireless > Wireless Radio Settings page to set the channel. ⢠5DWHâThe rate in megabits per second at which this AP is currently transmitting. The current rate will always be one of the rates shown in Supported Rates. ⢠6LJQDOâThe strength of the radio signal emitting from this AP. If you hover the mouse pointer over the bars, a number representing the strength in decibels (dB) displays. ⢠%HDFRQVâThe total number of beacons received from this AP since it was first discovered. Cisco Small Business WAP121 and WAP321 Wireless-N Access Point with PoE 23 9LHZLQJ6WDWLVWLFV Rogue AP Detection REVIEW DRAFT Version 2âCISCO CONFIDENTIAL ⢠/DVW%HDFRQâThe date and time of the last beacon received from this AP. ⢠5DWHVâSupported and basic (advertised) rate sets for the neighboring AP. Rates are shown in megabits per second (Mbps). All Supported Rates are listed, with Basic Rates shown in bold. Rate sets are configured on the Wireless > Radio page. To save the Trusted AP List to a file, click 6DYH. The list contains the MAC addresses of all APs that have been added to the Known AP List. By default, the filename is Rogue2.cfg. You can use a text editor or Web browser to open the file and view its contents. Use the Import AP List from a file feature to import a list of known APs from a saved list. The list might be acquired from another AP or created from a text file. If the MAC address of an AP appears in the Trusted AP List, it will not be detected as a rogue. To import an AP list from a file, use the following steps: 67(3 Choose whether to replace the existing Trusted AP List or add the entries in the imported file to the Trusted AP List. a. Select 5HSODFH to import the list and replace the contents of the Known AP List. b. Select 0HUJH to import the list and add the APs in the imported file to the APs currently displayed in the Known AP List. 67(3 Click %URZVH and choose the file to import. The file you import must be a plain-text file with a .txt or .cfg extension. Entries in the file are MAC addresses in hexadecimal format with each octet separated by colons, for example 00:11:22:33:44:55. Separate entries with a single space. For the AP to accept the file, it must contain only MAC addresses. 67(3 Click ,PSRUW. When the import is complete, the screen refreshes and the MAC addresses of the APs in the imported file appear in the Known AP List. Cisco Small Business WAP121 and WAP321 Wireless-N Access Point with PoE 24 9LHZLQJ6WDWLVWLFV TSPEC Status and Statistics REVIEW DRAFT Version 2âCISCO CONFIDENTIAL 763(&6WDWXVDQG6WDWLVWLFV The TSPEC Status and Statistics page provides the following: ⢠Summary information about TSPEC sessions by radio. ⢠Summary information about TSPEC sessions by VAP. ⢠Real-time transmit and receive statistics for the radio interface and the network interface(s). All of the transmit and receive statistics shown are totals since the AP was last started. If you reboot the AP, these figures indicate transmit and receive totals since the reboot. To view TSPEC status and statistics, click 6WDWXVDQG6WDWLVWLFV!763(&6WDWXV DQG6WDWLVWLFV in the navigation window. The TSPEC Status and Statistics page provides the following status information for the WLAN (Radio) and VAP interfaces: ⢠1HWZRUN,QWHUIDFHâName of the Radio or VAP interface. ⢠$FFHVV&DWHJRU\âCurrent Access Category associated with this Traffic Stream (voice or video). ⢠6WDWXVâWhether the TSPEC session is enabled (up) or not (down) for the corresponding Access Category. 127( This is a configuration status (does not necessarily represent the current session activity). ⢠$FWLYH7UDIILF6WUHDPâNumber of currently active TSPEC Traffic Streams for this radio and Access Category. ⢠7UDIILF6WUHDP&OLHQWVâNumber of Traffic Stream clients associated with this radio and Access Category. ⢠0HGLXP7LPH$GPLWWHGâTime (in 32 microsecond per second units) allocated for this Access Category over the transmission medium to carry data. This value should be less than or equal to the maximum bandwidth allowed over the medium for this TS. ⢠0HGLXP7LPH8QDOORFDWHGâTime (in 32 microsecond per second units) of unused bandwidth for this Access Category. The following statistics display separately for the transmit and receive paths on the wireless radio interface: Cisco Small Business WAP121 and WAP321 Wireless-N Access Point with PoE 25 9LHZLQJ6WDWLVWLFV TSPEC AP Statistics REVIEW DRAFT Version 2âCISCO CONFIDENTIAL ⢠$FFHVV&DWHJRU\âThe Access Category associated with this Traffic Stream (voice or video). ⢠7RWDO3DFNHWVâTotal number of TS packets sent (in Transmit table) or received (in Received table) by this Radio for the specified Access Category. ⢠7RWDO%\WHVâTotal number of bytes received in the specified access category. The following statistics display separately for the transmit and receive paths on the network interfaces (VAPs): ⢠7RWDO9RLFH3DFNHWVâTotal number of TS voice packets sent (in Transmit table) or received (in Received table) by this AP for this VAP. ⢠7RWDO9RLFH%\WHVâTotal TS voice bytes sent (in Transmit table) or received (in Received table) by this AP for this VAP. ⢠7RWDO9LGHR3DFNHWVâTotal number of TS video packets sent (in Transmit table) or received (in Received table) by this AP for this VAP. ⢠7RWDO9LGHR%\WHVâTotal TS video bytes sent (in Transmit table) or received (in Received table) by this AP for this VAP. You can click 5HIUHVK to refresh the screen and display the most current information. 763(&$36WDWLVWLFV The TSPEC AP Statistics page provides information on the voice and video Traffic Streams accepted and rejected by the AP. To view this page, click 6WDWXVDQG 6WDWLVWLFV!763(&$36WDWLVWLFV in the navigation window. The TSPEC AP Statistics page displays the following information: ⢠763(&6WDWLVWLFV6XPPDU\IRU9RLFH$&0âThe total number of accepted and the total number of rejected voice traffic streams. ⢠763(&6WDWLVWLFV6XPPDU\IRU9LGHR$&0âThe total number of accepted and the total number of rejected video traffic streams. You can click 5HIUHVK to refresh the screen and display the most current information. Cisco Small Business WAP121 and WAP321 Wireless-N Access Point with PoE 26 9LHZLQJ6WDWLVWLFV RADIO Statistics REVIEW DRAFT Version 2âCISCO CONFIDENTIAL 5$',26WDWLVWLFV You can use the Radio Statistics page to display packet-level and byte-level statistics for each wireless radio interface. To view this page, click 6WDWXVDQG 6WDWLVWLFV!5DGLR6WDWLVWLFV in the navigation window. The following information displays: ⢠3DFNHWV5HFHLYHGâTotal packets received by the AP. ⢠%\WHV5HFHLYHGâTotal bytes received by the AP. ⢠3DFNHWV7UDQVPLWWHGâTotal packets transmitted by the AP. ⢠%\WHV7UDQVPLWWHGâTotal bytes transmitted by the AP. ⢠3DFNHWV5HFHLYH'URSSHGâNumber of packets received by the AP that were dropped. ⢠%\WHV5HFHLYH'URSSHGâNumber of bytes received by the AP that were dropped. ⢠3DFNHWV7UDQVPLW'URSSHGâNumber of packets transmitted by the AP that were dropped. ⢠%\WHV7UDQVPLW'URSSHGâNumber of bytes transmitted by the AP that were dropped. ⢠)UDJPHQWV5HFHLYHGâNumber of fragmented frames received by the AP. ⢠)UDJPHQWV7UDQVPLWWHGâNumber of fragmented frames sent by the AP. ⢠0XOWLFDVW)UDPHV5HFHLYHGâCount of MSDU frames received with the multicast bit set in the destination MAC address. ⢠0XOWLFDVW)UDPHV7UDQVPLWWHGâCount of successfully transmitted MSDU frames where the multicast bit is set in the destination MAC address. ⢠'XSOLFDWH)UDPH&RXQWâNumber of times a frame is received and the Sequence Control field indicates is a duplicate. ⢠)DLOHG7UDQVPLW&RXQWâNumber of times an MSDU is not transmitted successfully due to transmit attempts exceeding either the short retry limit or the long retry limit. ⢠7UDQVPLW5HWU\&RXQWâNumber of times an MSDU is successfully transmitted after one or more retries. Cisco Small Business WAP121 and WAP321 Wireless-N Access Point with PoE 27 9LHZLQJ6WDWLVWLFV Email Alert Status REVIEW DRAFT Version 2âCISCO CONFIDENTIAL ⢠0XOWLSOH5HWU\&RXQWâNumber of times an MSDU is successfully transmitted after more than one retry. ⢠5766XFFHVV&RXQWâCount of CTS frames received in response to an RTS frame. ⢠576)DLOXUH&RXQWâCount of CTS frames not received in response to an RTS frame. ⢠$&.)DLOXUH&RXQWâCount of ACK frames not received when expected. ⢠)&6(UURU&RXQWâCount of FCS errors detected in a received MPDU frame. ⢠)UDPHV7UDQVPLWWHG&RXQWâCount of each successfully transmitted MSDU. ⢠:(38QGHFU\SWDEOH&RXQWâCount of encrypted frames received and the key configuration of the transmitter indicates that the frame should not have been encrypted or that frame was discarded due to the receiving station not implementing the privacy option. You can click 5HIUHVK to refresh the screen and display the most current information. (PDLO$OHUW6WDWXV The Email Alert Status page provides information about the email alerts sent based on the syslog messages generated in the AP. To view this page, click 6WDWXV DQG6WDWLVWLFV!(PDLO$OHUW6WDWXVin the navigation window. This page displays the following fields: ⢠(PDLO$OHUW6WDWXVâThe Email Alert operational status The status is either Up or Down. The default is Down. ⢠1XPEHURI(PDLO6HQWâThe total number of email sent so far. The range is an unsigned integer of 32 bits. The default is 0. ⢠1XPEHURI(PDLO)DLOHGâThe total number of email failures so far. The range is an unsigned integer of 32 bits. The default is 0. ⢠7LPH/DVW(PDLO6HQWâThe day, date, and time time when the last email was sent. Cisco Small Business WAP121 and WAP321 Wireless-N Access Point with PoE 28 9LHZLQJ6WDWLVWLFV Log REVIEW DRAFT Version 2âCISCO CONFIDENTIAL /RJ The Log page displays a list of system events that generated a log entry, such as login attempts and configuration changes. The log is cleared upon a reboot and can be cleared by an administrator. Up to 512 events can be displayed. Older entries are removed from the list as needed to make room for new events. To view this page, click 6WDWXVDQG6WDWLVWLFV!/RJ6WDWXVin the navigation window. This page displays the following fields for each log entry: ⢠7LPH6WDPSâThe system time when the event occurred. ⢠6HYHULW\âWhether the event occurred due to an error (err) or is informational (info). ⢠6HUYLFHâThe software component associated with the event. ⢠'HVFULSWLRQâA description of the event. You can click 5HIUHVK to refresh the screen and display the most current information. You can click &OHDU$OOto clear all entries from the log. Cisco Small Business WAP121 and WAP321 Wireless-N Access Point with PoE 29 REVIEW DRAFT Version 2âCISCO CONFIDENTIAL /$16HWWLQJV This chapter describes how to configure the APâs port, network, and clock settings. It includes the following topics: ⢠3RUW6HWWLQJV ⢠/$1 ⢠7LPH6HWWLQJV 3RUW6HWWLQJV The Port Settings page enables you to view and configure settings for the port that physically connects the AP to a local area network. To view and configure LAN settings: 67(3 Click /$1 > 3RUW6HWWLQJV in the navigation area. The Operational Status area displays the type of port used for the LAN port and the Link characteristics, as configured in the Administrative Settings area. 67(3 Enable or disable $XWR1HJRWLDWLRQ. ⢠When enabled, the port will negotiate with its link partner to set the fastest link speed and duplex mode available. ⢠When disabled, you can manually configure the port speed and duplex mode. 67(3 If autonegotiation is disabled, select a 3RUW6SHHG (10Mb/s or 100Mb/s) and the duplex mode (Half- or Full-duplex). 67(3 Enable or disable *UHHQ(WKHUQHW0RGH. Cisco Small Business WAP121 and WAP321 Wireless-N Access Point with PoE 30 /$16HWWLQJV LAN REVIEW DRAFT Version 2âCISCO CONFIDENTIAL ⢠When enabled, the port will negotiate with its link partner to set the fastest link speed and duplex mode available. ⢠When disabled, you can manually configure the port speed and duplex mode. 67(3 Click 6DYH. The settings are saved to the Running Configuration and the Startup Configuration. /$1 You can use the LAN page to configure settings for the LAN interface, including static or dynamic IP address assignment and IPv6 functionality. To configure LAN settings: 67(3 Click /$1 > /$1in the navigation area. The page displays Global Settings, IPv4 Settings, and IPv6 Settings. The Global Settings area displays the MAC address of the LAN interface port. This field is read-only. 67(3 Configure the following Global Settings: ⢠0DQDJHPHQW9/$1,'{The VLAN associated with the IP address you use to access the AP. The default management VLAN ID is 1. This VLAN is also the default untagged VLAN. If you already have a management VLAN configured on your network with a different VLAN ID, you must change the VLAN ID of the management VLAN on the AP. The VLAN VLAN ID range is 1 to 4094. ⢠3RUW9/$1,'âThis VLAN ID is used as the default VLAN for any traffic received on the LAN port that arrives without a VLAN tag. The AP supports one untagged VLAN on the LAN interface. VLAN 1 is the both default untagged VLAN and the default management VLAN. If you want to segregate management traffic from the untagged VLAN traffic, set this value to a different value than the management VLAN ID. The valid VLAN ID range is 1 to 4094. Cisco Small Business WAP121 and WAP321 Wireless-N Access Point with PoE 31 /$16HWWLQJV LAN REVIEW DRAFT Version 2âCISCO CONFIDENTIAL ⢠$GPLW2QO\9/$17DJJHG)UDPHVâSelect to enable the forwarding of traffic that is received with no VLAN tag. Clear the checkbox if you want untagged traffic to be forwarded on the VLAN identified by the Port VLAN ID value. 67(3 Configure the following IPv4 settings: ⢠&RQQHFWLRQ7\SHâBy default, the DHCP client on the WAP121/WAP321 automatically broadcasts requests for network information. If you want to use a static IP address, you must disable the DHCP client and manually configure the IP address and other network information. Select one of the following values from the list: '+&3âThe AP will acquire its IP address from a DHCP server on the LAN. 6WDWLF,3âYou will manually assign an IP address to the AP. ⢠6WDWLF,3$GGUHVV6XEQHW0DVNDQG'HIDXOW*DWHZD\{If you elected to assign a static IP address, enter the IP information: ⢠'RPDLQ1DPH6HUYHUVâSelect an option from the list: '\QDPLFâThe AP will acquire DNS server addresses from a DHCP server on the LAN. 0DQXDOâYou will manually configure one or more DNS server addresses. Enter up to two IP addresses in the text boxes provided. 67(3 Configure the following IPv6 settings: ⢠,3Y&RQQHFWLRQ7\SHâHow the switch obtains an IPv6 address: '+&3YâThe IPv6 address will be assigned by a DHCPv6 server. 6WDWLF,3YâYou will manually configure the IPv6 address. ⢠,3Y$GPLQLVWUDWLRQ0RGHâEnables IPv6 management access. ⢠,3Y$XWR&RQILJXUDWLRQ$GPLQLVWUDWLRQ0RGHâSelect to enable IPv6 automatic address configuration on the AP. When enabled, the AP learns its IPv6 addresses and gateway by processing the Router Advertisements received on the LAN port. The AP can have multiple autoconfigured IPv6 addresses. ⢠6WDWLF,3Y$GGUHVVâThe static IPv6 address. The AP can have a static IPv6 address even if addresses have already been configured automatically. Cisco Small Business WAP121 and WAP321 Wireless-N Access Point with PoE 32 /$16HWWLQJV Time Settings REVIEW DRAFT Version 2âCISCO CONFIDENTIAL ⢠6WDWLF,3Y$GGUHVV3UHIL[/HQJWKâThe prefix length of the static address, which is an integer in the range of 0â128. ⢠,3Y$XWRFRQILJXUHG*OREDO$GGUHVVHVâIf the AP has been assigned one or more IPv6 addresses automatically, the addresses are listed. ⢠,3Y/LQN/RFDO$GGUHVVâThe IPv6 address used by the local physical link. The link local address is not configurable and is assigned by using the IPv6 Neighbor Discovery process. ⢠'HIDXOW,3Y*DWHZD\âThe statically configured default IPv6 gateway. 67(3 Click 6DYH. The settings are saved to the Running Configuration and the Startup Configuration. 127( Changing some settings might cause the AP to stop and restart system processes. If this happens, wireless clients will temporarily lose connectivity. We recommend that you change AP settings when WLAN traffic is low. 7LPH6HWWLQJV A system clock is used to provide a network-synchronized time-stamping service for switch software events such as message logs. You can configure the system clock manually or configure the switch as a Network Time Protocol (NTP) client that obtains the clock data from a server. Use the Time Settings page to set the system time manually or to configure the system to acquire its time settings from a preconfigured NTP server. By default, the AP is configured to obtain its time from a predefined list of NTP servers. To display this page, click /$1 > 7LPH6HWWLQJV in the navigation window. The current system time displays at the top of the page, along with the System Clock Source option. To use NTP to have the AP automatically acquire its time settings: 67(3 For the System Clock Source field, select 1HWZRUN7LPH3URWRFRO 173 . 67(3 Configure the following parameters: Cisco Small Business WAP121 and WAP321 Wireless-N Access Point with PoE 33 /$16HWWLQJV Time Settings REVIEW DRAFT Version 2âCISCO CONFIDENTIAL ⢠1736HUYHUâSpecify the IP address or domain name of an NTP server. A default NTP server is listed. ⢠7LPH=RQH{Select the time zone for your location. 67(3 Select $GMXVW7LPHIRU'D\OLJKW6DYLQJV if daylight savings time is applicable to your time zone. When selected, configure the following fields: ⢠'D\OLJKW6DYLQJV6WDUWâSelect which week, day, month, and time when daylight savings time starts. ⢠'D\OLJKW6DYLQJV(QGâSelect which week, day, month, and time when daylight savings time ends. ⢠'D\OLJKW6DYLQJV2IIVHW{Specify the number of minutes to move the clock forward when DST begins and backward when it ends. 67(3 Click 6DYH. The changes are saved to the Running Configuration and to the Startup Configuration. To manually configure the time settings: 67(3 For the System Clock Source field, select 0DQXDOO\. 67(3 Configure the following parameters: ⢠6\VWHP'DWHâSelect the current month, day, and year date from the dropdown lists. ⢠6\VWHP7LPHâSelect the current hour and minutes in 24-hour clock format, such as 22:00:00 for 10 p.m. ⢠7LPH=RQH{Select the time zone for your location. 67(3 Select $GMXVW7LPHIRU'D\OLJKW6DYLQJV to if daylight savings time is applicable to your time zone. When selected, configure the following fields: ⢠'D\OLJKW6DYLQJV6WDUWâSelect which week, day, month, and time when daylight savings time starts. ⢠'D\OLJKW6DYLQJV(QGâSelect which week, day, month, and time when daylight savings time ends. ⢠'D\OLJKW6DYLQJV2IIVHW PLQXWHV {Specify the number of minutes to move the clock forward when DST begins. Cisco Small Business WAP121 and WAP321 Wireless-N Access Point with PoE 34 /$16HWWLQJV Time Settings REVIEW DRAFT Version 2âCISCO CONFIDENTIAL 67(3 Click 6DYH. The changes are saved to the Running Configuration and to the Startup Configuration. Cisco Small Business WAP121 and WAP321 Wireless-N Access Point with PoE 35 REVIEW DRAFT Version 2âCISCO CONFIDENTIAL :LUHOHVV6HWWLQJV This chapter describes how to configure properties of the wireless radio operation. It includes the following topics: ⢠5DGLR ⢠1HWZRUNV ⢠6FKHGXOHU ⢠6FKHGXOHU$VVRFLDWLRQ ⢠%DQGZLGWK8WLOL]DWLRQ ⢠0$&)LOWHULQJ ⢠:'6%ULGJH ⢠:RUN*URXS%ULGJH ⢠4R6 ⢠:366HWXS ⢠:363URFHVV 5DGLR Radio settings directly control the behavior of the radio in the AP and its interaction with the physical medium; that is, how and what type of electromagnetic waves the AP emits. To configure radio settings: Cisco Small Business WAP121 and WAP321 Wireless-N Access Point with PoE 36 :LUHOHVV6HWWLQJV Radio REVIEW DRAFT Version 2âCISCO CONFIDENTIAL 67(3 Click :LUHOHVV > 5DGLR in the navigation window. 67(3 In the Global Settings area, configure the 763(&9LRODWLRQ,QWHUYDOâThe time interval in seconds for the AP to report (through the system log and SNMP traps) associated clients that do not adhere to mandatory admission control procedures. 67(3 In the Basic Settings area, configure the following settings: ⢠5DGLRâTurns on or off the radio interface. ⢠0$& $GGUHVVâThe Media Access Control (MAC) address for the interface. The MAC address is assigned by the manufacturer and cannot be changed. ⢠0RGHâThe IEEE 802.11 standard and frequency the radio uses. 127( The modes available depend on the country code setting. Select one of the following modes: ⢠802.11aâOnly 802.11a clients can connect to the AP. 802.11b/gâ802.11b and 802.11g clients can connect to the AP. 802.11a/nâ802.11a clients and 802.11n clients operating in the 5-GHz frequency can connect to the AP. 802.11b/g/n (default)â802.11b, 802.11g, and 802.11n clients operating in the 2.4-GHz frequency can connect to the AP. 5 GHz 802.11nâOnly 802.11n clients operating in the 2.4-GHz frequency can connect to the AP. 2.4 GHz 802.11nâOnly 802.11n clients operating in the 5-GHz frequency can connect to the AP. &KDQQHO%DQGZLGWK (802.11n modes only)âThe 802.11n specification allows a 40 MHz-wide channel in addition to the legacy 20 MHz channel available with other modes. The 40 MHz channel enables higher data rates but leaves fewer channels available for use by other 2.4 GHz and 5 GHz devices. Set the field to 20 MHz to restrict the use of the channel bandwidth to a 20 MHz channel. ⢠3ULPDU\&KDQQHO(802.11n modes with 40 MHz bandwidth only)âA 40 MHz channel can be considered to consist of two 20 MHz channels that are contiguous in the frequency domain. These two 20 MHz channels are often Cisco Small Business WAP121 and WAP321 Wireless-N Access Point with PoE 37 :LUHOHVV6HWWLQJV Radio REVIEW DRAFT Version 2âCISCO CONFIDENTIAL referred to as the Primary and Secondary channels. The Primary Channel is used for 802.11n clients that support only a 20 MHz channel bandwidth and for legacy clients. Select one of the following options: ⢠UpperâSet the Primary Channel as the upper 20 MHz channel in the 40 MHz band. LowerâSet the Primary Channel as the lower 20 MHz channel in the 40 MHz band. &KDQQHOâThe portion of the radio spectrum the radio uses for transmitting and receiving. The range of available channels is determined by the mode of the radio interface and the country code setting. If you select $XWR for the channel setting, the AP scans available channels and selects a channel where no traffic is detected. Each mode offers a number of channels, depending on how the spectrum is licensed by national and transnational authorities such as the Federal Communications Commission (FCC) or the International Telecommunication Union (ITU-R). 67(3 In the Advanced Settings area, configure the following settings: ⢠6KRUW*XDUG,QWHUYDO6XSSRUWHGâThis field is available only if the selected radio mode includes 802.11n. The guard interval is the dead time, in nanoseconds, between OFDM symbols. The guard interval prevents Inter-Symbol and Inter-Carrier Interference (ISI, ICI). The 802.11n mode allows for a reduction in this guard interval from the a and g definition of 800 nanoseconds to 400 nanoseconds. Reducing the guard interval can yield a 10% improvement in data throughput. The client with which the AP is communicating must also support the short guard interval. Select one of the following options: 1HWZRUNV in the navigation window. 67(3 Select the (QDEOHG check box for the VAP you want to configure. Cisco Small Business WAP121 and WAP321 Wireless-N Access Point with PoE 44 :LUHOHVV6HWWLQJV Networks REVIEW DRAFT Version 2âCISCO CONFIDENTIAL âOrâ If VAP0 is the only VAP configured on the system, and you want to add a VAP, click $GG. Then, select the VAP and click (GLW. 127(VAP0 is not editable. 67(3 Configure the parameters: ⢠9/$1,'âThe VID of the VLAN to associate with the VAP. When a wireless client connects to the AP by using this VAP, the AP tags all traffic from the wireless client with the VLAN ID you enter in this field unless you enter the port VLAN ID or use a RADIUS server to assign a wireless client to a VLAN. The range for the VLAN ID is 1â4094. You configure the untagged and management VLAN IDs on the Ethernet Settings page. For more information, see /$1SDJH. ⢠66,'âA name for the wireless network. The SSID is an alphanumeric string of up to 32 characters. You can use the same SSID for multiple VAPs, or you can choose a unique SSID for each VAP. 127( If you are connected as a wireless client to the same AP that you are administering, resetting the SSID will cause you to lose connectivity to the AP. You will need to reconnect to the new SSID after you save this new setting. ⢠%URDGFDVW66,'âEnables and disables the broadcast of the SSID. Specify whether to allow the AP to broadcast the Service Set Identifier (SSID) in its beacon frames. The Broadcast SSID parameter is enabled by default. When the VAP does not broadcast its SSID, the network name is not displayed in the list of available networks on a client station. Instead, the client must have the exact network name configured in the supplicant before it is able to connect. Disabling the broadcast SSID is sufficient to prevent clients from accidentally connecting to your network, but it will not prevent even the simplest of attempts by a hacker to connect or monitor unencrypted traffic. Suppressing the SSID broadcast offers a very minimal level of protection on an otherwise exposed network (such as a guest network) where the priority is making it easy for clients to get a connection and where no sensitive information is available. ⢠6HFXULW\âThe type of authentication required for access to the VAP: None Cisco Small Business WAP121 and WAP321 Wireless-N Access Point with PoE 45 :LUHOHVV6HWWLQJV Networks REVIEW DRAFT Version 2âCISCO CONFIDENTIAL Static WEP Dynamic WEP WPA Personal WPA Enterprise If you select a security mode other than None, additional fields appear. These fields are explained in &RQILJXULQJ6HFXULW\6HWWLQJVSDJH . ⢠⢠⢠0$&)LOWHULQJâWhether the stations that can access this VAP are restricted to a configured global list of MAC addresses. You can select on of the following types of MAC filtering: 'LVDEOHG: Do not use MAC filtering. /RFDO: Use the MAC Authentication list that you configure on the MAC Filtering page. 5$',86: Use the MAC Authentication list on an external RADIUS server. &KDQQHO,VRODWLRQâEnables and disables station isolation. When disabled, wireless clients can communicate with one another normally by sending traffic through the AP. When enabled, the AP blocks communication between wireless clients on the same VAP. The AP still allows data traffic between its wireless clients and wired devices on the network, across a WDS link, and with other wireless clients associated with a different VAP, but not among wireless clients. +7735HGLUHFWâEnables or disables the redirecting of wireless clients to a custom Web page. When redirect mode is enabled, the user will be redirected to the URL you specify after the wireless client associates with an AP and the user opens a Web browser on the client to access the Internet. The custom Web page must be located on an external Web server and might contain information such as the company logo and network usage policy. 127( The wireless client is redirected to the external Web server only once while it is associated with the AP. ⢠5HGLUHFW85/âThe URL where the Web browser is to be redirected after the wireless client associates with the AP and sends HTTP traffic. Cisco Small Business WAP121 and WAP321 Wireless-N Access Point with PoE 46 :LUHOHVV6HWWLQJV Networks REVIEW DRAFT Version 2âCISCO CONFIDENTIAL 67(3 Click 6DYH. The changes are saved to the Running Configuration and to the Startup Configuration. 127( Changing some settings might cause the AP to stop and restart system processes. If this happens, wireless clients will temporarily lose connectivity. We recommend that you change AP settings when WLAN traffic is low. 127( To delete a VAP, select the VAP and click 'HOHWH. &RQILJXULQJ6HFXULW\6HWWLQJV The following sections describe the security settings that you configure, depending on your selection in the Security list on the Networks page. 1RQH 3ODLQWH[W If you select None as your security mode, no further options are configurable on the AP. This mode means that any data transferred to and from the AP is not encrypted.This security mode can be useful during initial network configuration or for problem solving, but it is not recommended for regular use on the Internal network because it is not secure. 6WDWLF:(3 Wired Equivalent Privacy (WEP) is a data encryption protocol for 802.11 wireless networks. All wireless stations and APs on the network are configured with a static 64-bit (40-bit secret key + 24-bit initialization vector (IV)) or 128-bit (104-bit secret key + 24-bit IV) Shared Key for data encryption. Static WEP is not the most secure mode available, but it offers more protection than setting the security mode to None (Plain-text) as it does prevent an outsider from easily sniffing out unencrypted wireless traffic. WEP encrypts data moving across the wireless network based on a static key. (The encryption algorithm is a stream cipher called RC4.) The following parameters display for Static WEP configuration: ⢠7UDQVIHU.H\,QGH[âA key index list. Key indexes 1 through 4 are available. The default is1. The Transfer Key Index indicates which WEP key the AP will use to encrypt the data it transmits. Cisco Small Business WAP121 and WAP321 Wireless-N Access Point with PoE 47 :LUHOHVV6HWWLQJV Networks REVIEW DRAFT Version 2âCISCO CONFIDENTIAL ⢠⢠⢠.H\/HQJWKâThe length of the key. Select one: 64 bits 128 bits .H\7\SHâThe key type. Select one: ASCII Hex :(3.H\VâYou can specify up to four WEP keys. In each text box, enter a string of characters for each key. The keys you enter depend on the key type selected: ASCIIâIncludes upper and lower case alphabetic letters, the numeric digits, and special symbols such as @ and #. HexâIncludes digits 0 to 9 and the letters A to F. Use the same number of characters for each key as specified in the Characters Required field. These are the RC4 WEP keys shared with the stations using the AP. Each client station must be configured to use one of these same WEP keys in the same slot as specified here on the AP. ⢠Characters Required: The number of characters you enter into the WEP Key fields is determined by the Key length and Key type you select. For example, if you use 128-bit ASCII keys, you must enter 26 characters in the WEP key. The number of characters required updates automatically based on how you set Key Length and Key Type. ⢠;$XWKHQWLFDWLRQâThe authentication algorithm defines the method used to determine whether a client station is allowed to associate with an AP when static WEP is the security mode. Specify the authentication algorithm you want to use by choosing one of the following options: 2SHQ6\VWHP authentication allows any client station to associate with the AP whether that client station has the correct WEP key or not. This algorithm is also used in plaintext, IEEE 802.1X, and WPA modes. When the authentication algorithm is set to Open System, any client can associate with the AP. Cisco Small Business WAP121 and WAP321 Wireless-N Access Point with PoE 48 :LUHOHVV6HWWLQJV Networks REVIEW DRAFT Version 2âCISCO CONFIDENTIAL 127( Just because a client station is allowed to associate does not ensure it can exchange traffic with an AP. A station must have the correct WEP key to be able to successfully access and decrypt data from an AP, and to transmit readable data to the AP. 6KDUHG.H\ authentication requires the client station to have the correct WEP key in order to associate with the AP. When the authentication algorithm is set to Shared Key, a station with an incorrect WEP key will not be able to associate with the AP. Both 2SHQ6\VWHP and 6KDUHG.H\. When you select both authentication algorithms, client stations configured to use WEP in shared key mode must have a valid WEP key in order to associate with the AP. Also, client stations configured to use WEP as an open system (shared key mode not enabled) will be able to associate with the AP even if they do not have the correct WEP key. Static WEP Rules If you use Static WEP, the following rules apply: ⢠All client stations must have the Wireless LAN (WLAN) security set to WEP, and all clients must have one of the WEP keys specified on the AP in order to de-code AP-to-station data transmissions. ⢠The AP must have all keys used by clients for station-to-AP transmit so that it can de-code the station transmissions. ⢠The same key must occupy the same slot on all nodes (AP and clients). For example if the AP defines abc123 key as WEP key 3, then the client stations must define that same string as WEP key 3. ⢠Client stations can use different keys to transmit data to the access point. (Or they can all use the same key, but this is less secure because it means one station can decrypt the data being sent by another.) ⢠On some wireless client software, you can configure multiple WEP keys and define a client station âtransfer key indexâ, and then set the stations to encrypt the data they transmit using different keys. This ensures that neighboring APs cannot decode each otherâs transmissions. ⢠You cannot mix 64-bit and 128-bit WEP keys between the access point and its client stations. Cisco Small Business WAP121 and WAP321 Wireless-N Access Point with PoE 49 :LUHOHVV6HWWLQJV Networks REVIEW DRAFT Version 2âCISCO CONFIDENTIAL '\QDPLF:(3 Dynamic WEP refers to the combination of 802.1x technology and the Extensible Authentication Protocol (EAP). With Dynamic WEP security, WEP keys are changed dynamically. EAP messages sent over an IEEE 802.11 wireless network using a protocol called EAP Encapsulation Over LANs (EAPOL). IEEE 802.1X provides dynamicallygenerated keys that are periodically refreshed. An RC4 stream cipher is used to encrypt the frame body and cyclic redundancy checking (CRC) of each 802.11 frame. This mode requires the use of an external RADIUS server to authenticate users. The AP requires a RADIUS server that supports EAP, such as the Microsoft Internet Authentication Server. To work with Windows clients, the authentication server must support Protected EAP (PEAP) and MSCHAP V2. You can use any of a variety of authentication methods that the IEEE 802.1X mode supports, including certificates, Kerberos, and public key authentication. You must configure the client stations to use the same authentication method the AP uses. The following parameters display for Dynamic WEP configuration: ⢠8VH*OREDO5$',866HUYHU6HWWLQJVâBy default, each VAP uses the global RADIUS settings that you define for the AP (see 5$',866HUYHU SDJH. However, you can configure each VAP to use a different set of RADIUS servers. To use the global RADIUS server settings, ensure the check box is selected. To use a separate RADIUS server for the VAP, clear the check box and enter the RADIUS server IP address and key in the following fields. ⢠6HUYHU,3$GGUHVV7\SHâThe IP version that the RADIUS server uses. You can toggle between the address types to configure IPv4 and IPv6 global RADIUS address settings, but the AP contacts only the RADIUS server or servers for the address type you select in this field. ⢠6HUYHU,3$GGUHVV or 6HUYHU,3Y$GGUHVVâThe address for the primary RADIUS server for this VAP. When the first wireless client tries to authenticate with the AP, the AP sends an authentication request to the primary server. If the primary server responds to the authentication request, the AP continues to use this RADIUS server as the primary server, and authentication requests are sent to the address you specify. Cisco Small Business WAP121 and WAP321 Wireless-N Access Point with PoE 50 :LUHOHVV6HWWLQJV Networks REVIEW DRAFT Version 2âCISCO CONFIDENTIAL ⢠6HUYHU,3$GGUHVV or 6HUYHU,3YzâUp to three IPv4 or IPv6 backup RADIUS server addresses. If authentication fails with the primary server, each configured backup server is tried in sequence. ⢠.H\âThe shared secret key that the AP uses to authenticate to the primary RADIUS server. You can use up to 63 standard alphanumeric and special characters. The key is case sensitive and must match the key configured on the RADIUS server. The text you enter will be displayed as "*" characters. ⢠.H\zâThe RADIUS key associated with the configured backup RADIUS servers. The server at RADIUS IP Address-1 uses RADIUS Key-1, RADIUS IP Address-2 uses RADIUS Key-2, and so on. ⢠(QDEOH5$',86$FFRXQWLQJâEnables tracking and measuring the resources a particular user has consumed, such as system time, amount of data transmitted and received, and so on. If you enable RADIUS accounting, it is enabled for the primary RADIUS server and all backup servers. ⢠$FWLYH6HUYHUâEnables administratively selecting the active RADIUS server, rather than having the AP attempt to contact each configured server in sequence and choose the first server that is up. ⢠%URDGFDVW.H\5HIUHVK5DWHâThe interval at which the broadcast (group) key is refreshed for clients associated to this VAP. The default is 300. The valid range is 0â86400 seconds. A value of 0 indicates that the broadcast key is not refreshed. ⢠6HVVLRQ.H\5HIUHVK5DWHâThe interval at which the AP refreshes session (unicast) keys for each client associated to the VAP. The valid range is 0â86400 seconds. A value of 0 indicates that the broadcast key is not refreshed. :3$3HUVRQDO WPA Personal is a Wi-Fi Alliance IEEE 802.11i standard, which includes AES-CCMP and TKIP mechanisms. The Personal version of WPA employs a pre-shared key (PSK) instead of using IEEE 802.1X and EAP as is used in the Enterprise WPA security mode. The PSK is used for an initial check of credentials only. WPA Personal is also referred to as WPA-PSK. Cisco Small Business WAP121 and WAP321 Wireless-N Access Point with PoE 51 :LUHOHVV6HWWLQJV Networks REVIEW DRAFT Version 2âCISCO CONFIDENTIAL This security mode is backwards-compatible for wireless clients that support the original WPA. The following parameters display for WPA Personal configuration: ⢠:3$9HUVLRQVâThe types of client stations you want to support: :3$âThe network has client stations that support the original WPA and none that support the newer WPA2. :3$âAll client stations on the network support WPA2. This protocol version provides the best security per the IEEE 802.11i standard. If the network has a mix of clients, some of which support WPA2 and others which support only the original WPA, select both of the check boxes. This lets both WPA and WPA2 client stations associate and authenticate, but uses the more robust WPA2 for clients who support it. This WPA configuration allows more interoperability, at the expense of some security. ⢠&LSKHU6XLWHVâThe cipher suite you want to use: TKIP CCMP (AES) You can select either or both. Both TKIP and AES clients can associate with the AP. WPA clients must have one of the following to be able to associate with the AP: A valid TKIP key A valid AES-CCMP key Clients not configured to use a WPA Personal will not be able to associate with the AP. ⢠.H\âThe shared secret key for WPA Personal security. Enter a string of at least 8 characters to a maximum of 63 characters. Acceptable characters include upper and lower case alphabetic letters, the numeric digits, and special symbols such as @ and #. ⢠.H\6WUHQJWK0HWHUâThe AP checks the key against complexity criteria such as how many different types of characters (uppercase, lowercase, numbers, and special characters) are used and how long the string is. If the WPA-PSK complexity check feature is enabled, the key will not be accepted unless it meets the minimum criteria. See :3$36.&RPSOH[LW\ SDJH for information on configuring the complexity check. Cisco Small Business WAP121 and WAP321 Wireless-N Access Point with PoE 52 :LUHOHVV6HWWLQJV Networks REVIEW DRAFT Version 2âCISCO CONFIDENTIAL ⢠%URDGFDVW.H\5HIUHVK5DWHâThe interval at which the broadcast (group) key is refreshed for clients associated to this VAP (the default is 300). The valid range is 0â86400 seconds. A value of 0 indicates that the broadcast key is not refreshed. :3$(QWHUSULVH WPA Enterprise with RADIUS is an implementation of the Wi-Fi Alliance IEEE 802.11i standard, which includes CCMP (AES), and TKIP mechanisms. The Enterprise mode requires the use of a RADIUS server to authenticate users. This security mode is backwards-compatible with wireless clients that support the original WPA. The following parameters display for WPA Enterprise configuration: ⢠⢠:3$9HUVLRQVâThe types of client stations to be supported: :3$âIf all client stations on the network support the original WPA but none support the newer WPA2, then select WPA. :3$âIf all client stations on the network support WPA2, we suggest using WPA2 which provides the best security per the IEEE 802.11i standard. :3$DQG:3$âIf you have a mix of clients, some of which support WPA2 and others which support only the original WPA, select both WPA and WPA2. This lets both WPA and WPA2 client stations associate and authenticate, but uses the more robust WPA2 for clients who support it. This WPA configuration allows more interoperability, at the expense of some security. (QDEOHSUHDXWKHQWLFDWLRQâIf for WPA Versions you select only WPA2 or both WPA and WPA2, you can enable pre-authentication for WPA2 clients. Click (QDEOH pre-authentication if you want WPA2 wireless clients to send pre-authentication packet. The pre-authentication information will be relayed from the AP the client is currently using to the target AP. Enabling this feature can help speed up authentication for roaming clients who connect to multiple APs. This option does not apply if you selected WPA for WPA Versions because the original WPA does not support this feature. ⢠&LSKHU6XLWHVâThe cipher suite you want to use: TKIP Cisco Small Business WAP121 and WAP321 Wireless-N Access Point with PoE 53 :LUHOHVV6HWWLQJV Networks REVIEW DRAFT Version 2âCISCO CONFIDENTIAL CCMP (AES) TKIP and CCMP (AES) By default both TKIP and CCMP are selected. When both TKIP and CCMP are selected, client stations configured to use WPA with RADIUS must have one of the following: ⢠A valid TKIP RADIUS IP address and RADIUS Key A valid CCMP (AES) IP address and RADIUS Key 8VH*OREDO5$',866HUYHU6HWWLQJVâBy default, each VAP uses the global RADIUS settings that you define for the AP (see 5$',866HUYHU SDJH. However, you can configure each VAP to use a different set of RADIUS servers. To use the global RADIUS server settings, make sure the check box is selected. To use a separate RADIUS server for the VAP, clear the check box and enter the RADIUS server IP address and key in the following fields. ⢠6HUYHU,3$GGUHVV7\SHâThe IP version that the RADIUS server uses. You can toggle between the address types to configure IPv4 and IPv6 global RADIUS address settings, but the AP contacts only the RADIUS server or servers for the address type you select in this field. ⢠6HUYHU,3$GGUHVV or 6HUYHU,3Y$GGUHVV âThe address for the primary RADIUS server for this VAP. If the IPv4 RADIUS IP Address Type option is selected in the previous field, enter the IP address of the RADIUS server that all VAPs use by default, for example 192.168.10.23. If the IPv6 RADIUS IP Address Type option is selected, enter the IPv6 address of the primary global RADIUS server, for example 2001:0db8:1234::abcd. ⢠6HUYHU,3$GGUHVV or 6HUYHU,3Y$GGUHVVzâUp to three IPv4 and/or IPv6 addresses to use as the backup RADIUS servers for this VAP.The field label is RADIUS IP Address when the IPv4 RADIUS IP Address Type option is selected and RADIUS IPv6 Address when the IPv6 RADIUS IP Address Type option is selected. If authentication fails with the primary server, each configured backup server is tried in sequence. Cisco Small Business WAP121 and WAP321 Wireless-N Access Point with PoE 54 :LUHOHVV6HWWLQJV Scheduler REVIEW DRAFT Version 2âCISCO CONFIDENTIAL ⢠.H\âThe RADIUS key is the shared secret key for the global RADIUS server. You can use up to 63 standard alphanumeric and special characters. The key is case sensitive, and you must configure the same key on the AP and on your RADIUS server. The text you enter will be displayed as "*" characters to prevent others from seeing the RADIUS key as you type. ⢠.H\zâThe RADIUS key associated with the configured backup RADIUS servers. The server at RADIUS IP Address-1 uses RADIUS Key-1, RADIUS IP Address-2 uses RADIUS Key-2, and so on. ⢠(QDEOH5$',86$FFRXQWLQJâTracks and measures the resources a particular user has consumed such as system time, amount of data transmitted and received, and so on. If you enable RADIUS accounting, it is enabled for the primary RADIUS server and all backup servers. ⢠$FWLYH6HUYHUâEnables administratively selecting the active RADIUS server, rather than having the AP attempt to contact each configured server in sequence and choose the first server that is up. %URDGFDVW.H\5HIUHVK5DWHâThe interval at which the broadcast (group) key is refreshed for clients associated to this VAP. The default is 300. The valid range is 0â86400 seconds. A value of 0 indicates that the broadcast key is not refreshed. ⢠6HVVLRQ.H\5HIUHVK5DWHâThe interval at which the AP refreshes session (unicast) keys for each client associated to the VAP. The valid range is 0â86400 seconds. A value of 0 indicates that the session key is not refreshed. 6FKHGXOHU The Radio and VAP Scheduler allows you to configure a rule with a specific time interval for VAPs or radios to be operational, thereby automating the enabling or disabling of the VAPs and radio. One way you can use this feature is to schedule the radio to operate only during the office working hours in order to achieve security and reduce power consumption. You can also use the Scheduler to allow access to VAPs for wireless clients only during specific times of day. Cisco Small Business WAP121 and WAP321 Wireless-N Access Point with PoE 55 :LUHOHVV6HWWLQJV Scheduler REVIEW DRAFT Version 2âCISCO CONFIDENTIAL The AP supports up to 16 profiles. Only valid rules are added to the profile. Up to 16 rules are grouped together to form a scheduling profile. Periodic time entries belonging to the same profile cannot overlap. $GGLQJ6FKHGXOHU3URILOHV You can create up to 16 scheduler profile names. By default, no profiles are created. To view Scheduler status and add a Scheduler profile: 67(3 Click :LUHOHVV > 6FKHGXOHU in the navigation window. 67(3 Ensure that the $GPLQLVWUDWLYH0RGH is enabled. By default it is disabled. The Scheduler Operational Status area indicates the current operation status of the Scheduler: ⢠6WDWXVâThe operational status of the Scheduler. The range is Up or Down. The default is Down. ⢠5HDVRQâThe reason for the scheduler operational status. Possible values are: IsActiveâThe scheduler is administratively enabled. ConfigDownâOperational status is down because global configuration is disabled. TimeNotSetâTime is set on the AP neither manually nor through NTP. 67(3 To add a profile, enter a profile name in the 6FKHGXOHU3URILOH text box and click $GG. The profile name can be up to 32 alphanumeric characters. Cisco Small Business WAP121 and WAP321 Wireless-N Access Point with PoE 56 :LUHOHVV6HWWLQJV Scheduler REVIEW DRAFT Version 2âCISCO CONFIDENTIAL &RQILJXULQJ6FKHGXOHU5XOHV You can configure up to 16 rules for a profile. Each rule specifies the start time, end time and day (or days) of the week the radio or VAP can be operational. The rules are periodic in nature and are repeated every week. A valid rule must contain all of the parameters (days of the week, hour, and minute) for the start time and the end time. Rules cannot conflict; for example, you can configure one rule to start on each weekday and another to start on each weekend day, but you cannot configure one rule to begin daily and another rule to begin on weekends. To configure a rule for a profile: 67(3 Select the profile from the 6HOHFWD3URILOH1DPHlist. 67(3 Click $GG5XOH. The new rule displays in the rule table. 67(3 Select the checkbox next to the rule name and click (GLW. 67(3 From the 'D\RIWKH:HHNmenu, select the recurring schedule for the rule. You can configure the rule to occur daily, each weekday, each weekend day (Saturday and Sunday), or any single day of the week. 67(3 Set the start and end times: ⢠6WDUW7LPHâThe time when the radio or VAP will be operationally enabled. The time is in HH:MM 24-hour format. The range is <00-24>:<00-59>. The default is 00:00. ⢠(QG7LPHâThe time when the radio or VAP will be operationally disabled. The time is in HH:MM 24-hour format. The range is <00-24>:<00-59>. The default is 00:00. 67(3 Click 6DYH. The changes are saved to the Running Configuration and to the Startup Configuration. 127( A Scheduler profile must be associated with a radio interface or a VAP interface to be in effect. See the Scheduler Association page. 127( To delete a rule, select the profile from the 3URILOH1DPHcolumn and click 'HOHWH. Cisco Small Business WAP121 and WAP321 Wireless-N Access Point with PoE 57 :LUHOHVV6HWWLQJV Scheduler Association REVIEW DRAFT Version 2âCISCO CONFIDENTIAL 6FKHGXOHU$VVRFLDWLRQ The Scheduler profiles need to be associated with the WLAN interface or a VAP interface to be effective. By default, there are no Scheduler profiles created, hence no profile is associated to any radio or VAP. Only one Scheduler profile can be associated with the WLAN interface or each VAP. A single profile can be associated to multiple VAPs. If the Scheduler profile associated with a VAP or the WLAN interface is deleted, then the association is removed. To associate a Scheduler profile with the WLAN interface or a VAP: 67(3 Click :LUHOHVV > 6FKHGXOHU$VVRFLDWLRQ in the navigation window. 67(3 For the WLAN interface or a VAP, select the profile from the &UHDWHD3URILOH1DPH list. 67(3 Click 6DYH. The changes are saved to the Running Configuration and to the Startup Configuration. %DQGZLGWK8WLOL]DWLRQ Use the Bandwidth Utilization page to configure how much of the radio bandwidth can be utilized before the AP stops allowing new client associations. This feature is disabled by default. To enable bandwidth utilization: 67(3 Click :LUHOHVV > %DQGZLGWK8WLOL]DWLRQin the navigation window. 67(3 Click (QDEOH for the %DQGZLGWK8WLOL]DWLRQ setting. 67(3 In the 0D[LPXP8WLOL]DWLRQ7KUHVKROG box, enter the percentage of network bandwidth utilization allowed on the radio before the AP stops accepting new client associations. The default is 0, which means that all new associations will be allowed regardless of the utilization rate. 67(3 Click 6DYH. The changes are saved to the Running Configuration and to the Startup Configuration. Cisco Small Business WAP121 and WAP321 Wireless-N Access Point with PoE 58 :LUHOHVV6HWWLQJV MAC Filtering REVIEW DRAFT Version 2âCISCO CONFIDENTIAL 127( Changing some settings might cause the AP to stop and restart system processes. If this happens, wireless clients will temporarily lose connectivity. We recommend that you change AP settings when WLAN traffic is low. 0$&)LOWHULQJ Media Access Control (MAC) filtering can be used to exclude or allow only listed client stations to authenticate with the access point. MAC authentication is enabled and disabled per VAP on the Networks page. Depending on how the VAP is configured, the AP may refer to a MAC filter list stored on an external RADlUS server, or may refer a MAC filter list stored locally on the AP. &RQILJXULQJD0$&)LOWHU/LVW/RFDOO\RQWKH$3 The MAC Filtering page enables you to configure a local list. The AP supports one local MAC filter list only; that is, the same list applies to all VAPs that are enabled to use the local list. The filter can be configured to grant access only to the MAC addresses on the list, or to deny access only to addresses on the list. Up to 512 MAC addresses can be added to the filter list. To configure MAC filtering: 67(3 Click :LUHOHVV > 0$&)LOWHULQJ in the navigation window. 67(3 Select how the AP uses the filter list: ⢠Allow only stations in the list. Any station that is not in the Stations List is denied access to the network through the AP. ⢠Block all stations in list. Only the stations that appear in the list are denied access to the network through the AP. All other stations are permitted access. 127(: The filter setting also applies to the MAC filtering list stored on the RADIUS server, if one exists. 67(3 In the 0$&$GGUHVV field, enter the MAC address to allow or block and click $GG. Cisco Small Business WAP121 and WAP321 Wireless-N Access Point with PoE 59 :LUHOHVV6HWWLQJV WDS Bridge REVIEW DRAFT Version 2âCISCO CONFIDENTIAL The MAC Address appears in the 6WDWLRQV/LVW. 67(3 Continue entering MAC addresses until the list is complete, and then click 6DYH. The changes are saved to the Running Configuration and to the Startup Configuration. 127(: To remove a MAC Address from the Stations List, select it, then click 5HPRYH. 127(: Changing some settings might cause the AP to stop and restart system processes. If this happens, wireless clients will temporarily lose connectivity. We recommend that you change AP settings when WLAN traffic is low. &RQILJXULQJ0$&$XWKHQWLFDWLRQRQWKH5$',866HUYHU If one or more VAPs are configured to use a MAC filter stored on a RADIUS authentication server, you must configure the station list on the RADIUS server. The format for the list is described in the following table. 5$',866HUYHU $WWULEXWH 'HVFULSWLRQ 9DOXH User-Name (1) MAC address of the client station. Valid Ethernet MAC Address. User-Password (2) A fixed global password used to lookup a client MAC entry. NOPASSWORD :'6%ULGJH The Wireless Distribution System (WDS) allows you to connect multiple APs. With WDS, APs communicate with one another without wires in a standardized way. This capability is critical in providing a seamless experience for roaming clients and for managing multiple wireless networks. It can also simplify the network infrastructure by reducing the amount of cabling required. You can configure the AP in point-to-point or point-to-multipoint bridge mode based on the number of links to connect. Cisco Small Business WAP121 and WAP321 Wireless-N Access Point with PoE 60 :LUHOHVV6HWWLQJV WDS Bridge REVIEW DRAFT Version 2âCISCO CONFIDENTIAL In the point-to-point mode, the AP accepts client associations and communicates with wireless clients and other repeaters. The AP forwards all traffic meant for the other network over the tunnel that is established between the APs. The bridge does not add to the hop count. It functions as a simple OSI layer 2 network device. In the point-to-multipoint bridge mode, one AP acts as the common link between multiple APs. In this mode, the central AP accepts client associations and communicates with the clients and other repeaters. All other APs associate only with the central AP that forwards the packets to the appropriate wireless bridge for routing purposes. The AP can also act as a repeater. In this mode, the AP serves as a connection between two APs that might be too far apart to be within cell range. When acting as a repeater, the AP does not have a wired connection to the LAN and repeats signals by using the wireless connection. No special configuration is required for the AP to function as a repeater, and there are no repeater mode settings. Wireless clients can still connect to an AP that is operating as a repeater. Before you configure WDS on the AP, note the following guidelines: ⢠When using WDS, be sure to configure WDS settings on both APs participating in the WDS link. ⢠You can have only one WDS link between any pair of APs. That is, a remote MAC address may appear only once on the WDS page for a particular AP. ⢠Both APs participating in a WDS link must be on the same Radio channel and using the same IEEE 802.11 mode. (See 5DGLRSDJH for information on configuring the radio mode and channel.) ⢠When 802.11h is operational, setting up two WDS links can be difficult. See 8VLQJWKHK:LUHOHVV0RGHSDJH . ⢠If you use WPA encryption on the WDS link VAP0 must use WPA Personal or WPA Enterprise as the security mode. To configure a WDS bridge: 67(3 Click :LUHOHVV > :'6%ULGJH in the navigation window. 67(3 Select (QDEOH for 6SDQQLQJ7UHH0RGH. When enabled, STP helps prevent switching loops. STP is recommended if you configure WDS links. 67(3 Select (QDEOH for :'6,QWHUIDFH. 67(3 Configure the remaining parameters: Cisco Small Business WAP121 and WAP321 Wireless-N Access Point with PoE 61 :LUHOHVV6HWWLQJV Work Group Bridge REVIEW DRAFT Version 2âCISCO CONFIDENTIAL ⢠5HPRWH0$&$GGUHVVâSpecify the MAC address of the destination AP; that is, the AP on the other end of the WDS link to which data will be sent or handed-off and from which data will be received. ⢠(QFU\SWLRQâThe type of encryption to use on the WDS link. The options are none, WEP, and WPA Personal. If you are unconcerned about security issues on the WDS link, you may decide not to set any type of encryption. Alternatively, if you have security concerns you can choose between Static WEP and WPA Personal. In WPA Personal mode, the AP uses WPA2-PSK with CCMP (AES) encryption over the WDS link. 127(: In order to configure WPA Personal on any WDS link, VAP0 must be configured for WPA Personal or WPA-Enterprise. See &RQILJXULQJ6HFXULW\6HWWLQJVSDJH for more information about WEP and WPA Personal security settings. 67(3 Repeat these steps for up to three additional WDS interfaces. 67(3 Click 6DYH. The changes are saved to the Running Configuration and to the Startup Configuration. 127( Changing some settings might cause the AP to stop and restart system processes. If this happens, wireless clients will temporarily lose connectivity. We recommend that you change AP settings when WLAN traffic is low. :RUN*URXS%ULGJH The AP Work Group Bridge feature enables the AP to extend the accessibility of a remote network. In Work Group Bridge mode, the AP acts as a wireless station (STA) on the wireless LAN. It can bridge traffic between a remote wired network or associated wireless clients and a wireless LAN that is connected using the Work Group Bridge mode. The Work Group Bridge feature enables support for STA-mode and AP-mode operation simultaneously. The AP can operate in one BSS as an STA device while operating on another BSS as an AP device. When Work Group Bridge mode is enabled, then the AP supports only one BSS for wireless clients that associate with it, and another BSS to which the AP associates as a wireless client. Cisco Small Business WAP121 and WAP321 Wireless-N Access Point with PoE 62 :LUHOHVV6HWWLQJV Work Group Bridge REVIEW DRAFT Version 2âCISCO CONFIDENTIAL It is recommended that Work Group Bridge mode be used only when the WDS bridge feature cannot be operational with a peer AP. WDS is a better solution and is preferred over the Work Group Bridge solution. The Work Group Bridge feature should be used only when WDS links cannot be established due to hardware mismatches within an extended service set (ESS). When the Work Group Bridge feature is enabled, the VAP configurations are not applied; only the Work Group Bridge configuration is applied. 127( The WDS feature does not work when the Work Group Bridge mode is enabled on the AP. In Work Group Bridge mode, the BSS managed by the AP while operating in AP mode is referred to as the downstream BSS, and associated STAs as downstream STAs. The BSS managed by the other AP (i.e., the one to which the AP associates as an STA) is referred to as the upstream BSS, and the other AP is referred as the upstream AP. The devices connected to the wired interface of the AP, as well as the downstream stations associated to the APâs downstream BSS can access the network connected by the upstream BSS. To allow the bridging of packets, the VLAN configuration for the downstream BSS and wired interface should match that of the upstream BSS. Work Group Bridge mode can be used as range extender to enable the BSS to provide access to remote or hard-to-reach networks. A single-radio can be configured to forward packets from associated STAs to another AP in the same ESS, without using WDS. 127( Work Group Bridge mode currently supports only IPv4 traffic. 127( Work Group Bridge mode is not supported across a cluster. To configure Work Group Bridge mode: 67(3 Click :LUHOHVV > :RUN*URXS%ULGJHin the navigation window. 67(3 Select (QDEOH for the :RUN*URXS%ULGJH0RGH. 67(3 Configure the following parameters for the upstream interface and then the downstream interface: ⢠66,'âThe SSID if the BSS ⢠%URDGFDVW66,' (downstream only)âSelect 2Q if you want the downstream SSID to be broadcast. SSID Broadcast is off by default. 1RQH Cisco Small Business WAP121 and WAP321 Wireless-N Access Point with PoE 63 :LUHOHVV6HWWLQJV Work Group Bridge REVIEW DRAFT Version 2âCISCO CONFIDENTIAL 6WDWLF:(3 :3$3HUVRQDO See &RQILJXULQJ6HFXULW\6HWWLQJVSDJH for information about WEP and WPA Personal security settings. Configure the upstream BSS with the same SSID and security as advertised by upstream AP. The upstream BSS will be associated to the upstream AP with the configured credentials. The AP may obtains its IP address from a DHCP server on the upstream link. Alternatively, you can assign a static IP address. In the downstream direction, clients associate to the downstream BSS. ⢠6HFXULW\âThe type of security to use for authenticating as a client station on the upstream AP and for authenticating downstream client stations to the AP. ⢠0$&)LOWHULQJâSelect one of the following: 'LVDEOHGâThe set of clients in the APs BSS that can access the upstream network is not restricted to the clients specified in a MAC address list. /RFDOâThe set of clients in the APs BSS that can access the upstream network is restricted to the clients specified in a locally defined MAC address list. 5$',86âThe set of clients in the APs BSS that can access the upstream network is restricted to the clients specified in a MAC address list on a RADIUS server. If you select Local or RADIUS, see 0$&)LOWHULQJSDJH for instructions on creating the MAC filter list. ⢠9/$1,'âThe VLAN associated with the BSS. 67(3 Click 6DYH. The changes are saved to the Running Configuration and to the Startup Configuration. The associated downstream clients will now have connectivity to the upstream network. Cisco Small Business WAP121 and WAP321 Wireless-N Access Point with PoE 64 :LUHOHVV6HWWLQJV QoS REVIEW DRAFT Version 2âCISCO CONFIDENTIAL 4R6 The Quality of Service (QoS) settings provide you with the ability to configure transmission queues for optimized throughput and better performance when handling differentiated wireless traffic, such as voice-over-IP (VoIP), other types of audio, video, streaming media, and traditional IP data. To configure QoS on the AP, you set parameters on the transmission queues for different types of wireless traffic and specifying minimum and maximum wait times (through contention windows) for transmission. AP Enhanced Distributed Channel Access (EDCA) parameters affect traffic flowing from the AP to the client station. Station EDCA parameters affect traffic flowing from the client station to the AP. The default values for the AP and station EDCA. In normal use, these values should not need to be changed. Changing these values will affect the QoS provided. To configure AP and Station EDCA parameters: 67(3 Click :LUHOHVV > 4R6in the navigation window. 67(3 Select an option from the ('&$7HPSODWH list: ⢠:)$'HIDXOWVâPopulates the AP and Station EDCA parameters with WiFi Alliance default values, which are best for general, mixed traffic. ⢠2SWLPL]HGIRU9RLFHâPopulates the AP and Station EDCA parameters with values that are best for voice traffic. ⢠&XVWRPâEnables you to choose custom EDCA parameters. The following four queues are defined for different types of data transmitted from AP-to-station. If you choose a Custom template, the parameters that define the queues are configurable; otherwise, they are set to predefined values appropriate to your selection. The four queues are: ⢠Data 0 (Voice)âHigh priority queue, minimum delay. Time-sensitive data such as VoIP and streaming media are automatically sent to this queue. ⢠Data 1 (Video)âHigh priority queue, minimum delay. Time-sensitive video data is automatically sent to this queue. ⢠Data 2 (Best Effort)âMedium priority queue, medium throughput and delay. Most traditional IP data is sent to this queue. Cisco Small Business WAP121 and WAP321 Wireless-N Access Point with PoE 65 :LUHOHVV6HWWLQJV QoS REVIEW DRAFT Version 2âCISCO CONFIDENTIAL ⢠Data 3 (Background)âLowest priority queue, high throughput. Bulk data that requires maximum throughput and is not time-sensitive is sent to this queue (FTP data, for example). To configure QoS on the AP: 67(3 Configure the following parameters: 127( that the AP EDCA and Station EDCA parameters are configurable only if you selected Custom in the previous step. ⢠$UELWUDWLRQ,QWHU)UDPH6SDFHâA wait time for data frames. The wait time is measured in slots. Valid values for AIFS are 1 through 255. ⢠0LQLPXP&RQWHQWLRQ:LQGRZâAn input to the algorithm that determines the initial random backoff wait time (window) for retry of a transmission. This value is the upper limit (in milliseconds) of a range from which the initial random backoff wait time is determined. The first random number generated will be a number between 0 and the number specified here. If the first random backoff wait time expires before the data frame is sent, a retry counter is incremented and the random backoff value (window) is doubled. Doubling will continue until the size of the random backoff value reaches the number defined in the Maximum Contention Window. Valid values for are 1, 3, 7, 15, 31, 63, 127, 255, 511, or 1024. This value must be lower than the value for the Maximum Contention Window. ⢠0D[LPXP&RQWHQWLRQ:LQGRZâThe upper limit (in milliseconds) for the doubling of the random backoff value. This doubling continues until either the data frame is sent or the Maximum Contention Window size is reached. Once the Maximum Contention Window size is reached, retries will continue until a maximum number of retries allowed is reached. Valid values are 1, 3, 7, 15, 31, 63, 127, 255, 511, or 1024. This value must be higher than the value for the Minimum Contention Window. ⢠0D[LPXP%XUVW (AP only)âAn AP EDCA parameter that applies only to traffic flowing from the AP to the client station. This value specifies (in milliseconds) the maximum burst length allowed for packet bursts on the wireless network. A packet burst is a collection of multiple frames transmitted without header information. The decreased overhead results in higher throughput and better performance. Cisco Small Business WAP121 and WAP321 Wireless-N Access Point with PoE 66 :LUHOHVV6HWWLQJV WPS Setup REVIEW DRAFT Version 2âCISCO CONFIDENTIAL Valid values are 0.0 through 999. ⢠:L)L0XOWL0HGLD :00 âSelect (QDEOHG to enable Wi-Fi MultiMedia (WMM) extensions. This is enabled by default. With WMM enabled, QoS prioritization and coordination of wireless medium access is on. With WMM enabled, QoS settings on the AP control downstream traffic flowing from the AP to client station (AP EDCA parameters) and the upstream traffic flowing from the station to the AP (station EDCA parameters). Disabling WMM deactivates QoS control of station EDCA parameters on upstream traffic flowing from the station to the AP. With WMM disabled, you can still set some parameters on the downstream traffic flowing from the AP to the client station (AP EDCA parameters). ⢠7;23/LPLW (Station only)âThe TXOP Limit is a station EDCA parameter and only applies to traffic flowing from the client station to the AP. The Transmission Opportunity (TXOP) is an interval of time, in milliseconds, when a WME client station has the right to initiate transmissions onto the wireless medium (WM) towards the Unified Access Point. The TXOP Limit maximum value is 65535. ⢠1R$FNQRZOHGJHPHQWâSelect (QDEOHG to specify that the AP should not acknowledge frames with QosNoAck as the service class value. ⢠8QVFKHGXOHG$XWRPDWLF3RZHU6DYH'HOLYHU\âSelect (QDEOHG to enable APSD, which is a power management method. APSD is recommended if VoIP phones access the network through the AP. 67(3 Click 6DYH. The changes are saved to the Running Configuration and to the Startup Configuration. 127( Changing some settings might cause the AP to stop and restart system processes. If this happens, wireless clients will temporarily lose connectivity. We recommend that you change AP settings when WLAN traffic is low. :366HWXS This section describes the Wi-Fi Protected Setup (WPS) protocol and its configuration on the switch. It contains the following subsections: ⢠:362YHUYLHZ ⢠&RQILJXULQJ:366HWWLQJV Cisco Small Business WAP121 and WAP321 Wireless-N Access Point with PoE 67 :LUHOHVV6HWWLQJV WPS Setup REVIEW DRAFT Version 2âCISCO CONFIDENTIAL :362YHUYLHZ WPS is a standard that enables simple establishment of wireless networks without compromising network security. It relieves both the wireless client users and the AP administrators from having to know network names, keys, and various other cryptographic configuration options. WPS facilitates network setup by allowing the administrator to use a push button or PIN mechanism to establish wireless networks, thereby avoiding the manual entry of network names (SSIDs) and wireless security parameters: ⢠3XVKEXWWRQ: The WPS button is either on the product or a clickable button on the user interface. ⢠3HUVRQDO,GHQWLILFDWLRQ1XPEHU 3,1 : The PIN either is located on a product label or can be viewed on product user interface. WPS maintains network security during these simple steps by requiring both the users of new client devices and WLAN administrators to either have physical access to their respective devices or secure remote access to these devices. 8VDJH6FHQDULRV Typical scenarios for using WPS include the following: ⢠A user wishes to enroll a client station on a WPS-enabled WLAN. (The enrolling client device may detect the network, and prompt the user to enroll, although this is not necessary.) The user triggers the enrollment by pushing a button on the device. The AP's administrator then pushes a button on the AP. During a brief exchange of WPS protocol messages, the AP supplies the new client with a new security configuration via the Extensible Authentication Protocol (EAP). The two devices disassociate, and then reassociate and authenticate with the new settings. ⢠A user wishes to enroll a client station on a WPS-enabled WLAN by supplying the AP administrator with the PIN of the client device. The administrator enters this PIN on the UI of the AP and triggers the device enrollment. The new enrollee and the AP exchange WPS messages, including a new security configuration, disassociate, reassociate, and authenticate. ⢠An AP administrator purchases a new AP that has been certified by the Wi-Fi Alliance to be compliant with WPS version 2.0, and wishes to add the AP to an existing (wired or wireless) network. The administrator turns on the AP, and then accesses a network host that supports the WPS registration protocol. The administrator enters the AP deviceâs pin on the UI of this Cisco Small Business WAP121 and WAP321 Wireless-N Access Point with PoE 68 :LUHOHVV6HWWLQJV WPS Setup REVIEW DRAFT Version 2âCISCO CONFIDENTIAL "external registrar," and triggers the WPS registration process at this UI. (On a wired LAN, the WPS protocol messages are transported via the Universal Plug and Play, or UPnP, protocol.) The host registers the AP as a new network device and configures the AP with new security settings. ⢠An AP administrator has just added a new AP to an existing (wireless or wired) network via WPS, and wishes to grant network access to a new client device. The device is enrolled through either the "PIN" or "push button control (PBC)" methods described above, but this time the device enrolls with the external registrar, with the AP acting solely as a proxy. ⢠A wireless device that does not support WPS must join the WPS-enabled WLAN. The administrator, who cannot use WPS in this case, instead manually configures the device with the SSID, public shared key, and cryptography modes of the WPS-enabled AP. The device joins the network. The PIN is either an eight-digit number that uses its last digit as a checksum value, or a four-digit number with no checksum. Each of these numbers may contain leading zeroes. :365ROHV The WPS standard assigns specific roles to the various components in its architecture: ⢠(QUROOHHâA device that can join the wireless network. ⢠$3âA device that provides wireless access to the network. ⢠5HJLVWUDUâAn entity that issues security credentials to enrollees and configures APs. The WAP121 can act as an AP and supports an internal registrar. It does not function as a enrollee. (QDEOLQJDQGGLVDEOLQJ:36RQD9$3 The administrator can enable or disable WPS on only one VAP. WPS is operational only if this VAP meets the following conditions: ⢠The AP is configured to broadcast the VAP SSID. ⢠MAC address filtering is disabled on the VAP. ⢠WEP encryption is disabled on the VAP. Cisco Small Business WAP121 and WAP321 Wireless-N Access Point with PoE 69 :LUHOHVV6HWWLQJV WPS Setup REVIEW DRAFT Version 2âCISCO CONFIDENTIAL ⢠The VAP is configured to use either WPA-Personal security or none. If WPA2-PSK encryption mode is enabled, then an valid pre-shared key (PSK) must be configured and CCMP (AES) encryption must be enabled. ⢠The VAP is operationally enabled. WPS is operationally disabled on the VAP if any of these conditions are not met. 127( Disabling WPS on a VAP does not cause disassociation of any clients previously authenticated via WPS on that VAP ([WHUQDODQG,QWHUQDO5HJLVWUDWLRQ It is not necessary for the WAP121 itself to handle the registration of clients on the network. The AP can either use its internal registrar, or act as a proxy for an external registrar. The external registrar may be accessed either via the wired or wireless LAN. An external registrar may also configure the SSID, encryption mode, and public shared key of a WPS-enabled BSS. This capability is very useful for "out-of-box" deployments; that is, when an administrator simply attaches a new AP to a LAN for the first time. If the AP is using an internal registrar, it enrolls new clients using the configuration of the VAP associated with the WPS service, whether this configuration was configured directly on the AP or acquired by an external registrar through WPS. &OLHQW(QUROOPHQW Push-button Control The AP enrolls 802.11 clients via WPS by one of two methods: the push-button control (PBC) method, or the personal identification number (PIN) method. Using the PBC method, when the user of a prospective client pushes a button on the enrolling device, the administrator of the AP with an enabled internal registrar pushes a similar (hardware or software) button. This sequence begins enrollment process, and the client device joins the network. Although the WAP121 does not support an actual hardware button, it allows the administrator to initiate the enrollment for a particular VAP using a âsoftware buttonâ in the web-based AP configuration utility. 127( There is no defined order in which the buttons on the client device and AP must be pressed. Either device can initiate the enrollment. However, if the software button on the AP is pressed, and no client attempts to enroll after 120 seconds, the AP terminates the pending WPS enrollment transaction. Cisco Small Business WAP121 and WAP321 Wireless-N Access Point with PoE 70
Source Exif Data:
File Type : PDF File Type Extension : pdf MIME Type : application/pdf PDF Version : 1.5 Linearized : Yes Encryption : Standard V2.3 (128-bit) User Access : Extract Page Count : 70 Has XFA : No XMP Toolkit : XMP toolkit 2.9.1-13, framework 1.6 About : uuid:7012d7fa-177e-4204-ab03-c099f4f7a5d6 Modify Date : 2011:11:29 15:36:39+08:00 Create Date : 2011:11:29 15:26:40+08:00 Metadata Date : 2011:11:29 15:36:39+08:00 Document ID : uuid:fb7deed6-a77d-4d44-8e11-9a4055a304a0 Format : application/pdf Title : untitled Producer : Acrobat Distiller 6.0 (Windows)EXIF Metadata provided by EXIF.tools