Strix Systems OWS2430-90 802.11 a/g Wireless Mesh Type Networking Device User Manual accessone userguide

Strix Systems, Inc. 802.11 a/g Wireless Mesh Type Networking Device accessone userguide

Users Manual 1

Download: Strix Systems OWS2430-90 802.11 a/g Wireless Mesh Type Networking Device User Manual accessone userguide
Mirror Download [FCC.gov]Strix Systems OWS2430-90 802.11 a/g Wireless Mesh Type Networking Device User Manual accessone userguide
Document ID761039
Application IDsO8AEFOLAgbTM4jtGz069g==
Document DescriptionUsers Manual 1
Short Term ConfidentialNo
Permanent ConfidentialNo
SupercedeNo
Document TypeUser Manual
Display FormatAdobe Acrobat PDF - pdf
Filesize146.48kB (1831018 bits)
Date Submitted2007-02-21 00:00:00
Date Available2007-02-21 00:00:00
Creation Date2007-02-13 11:53:44
Producing SoftwareAcrobat Distiller 7.0.5 (Windows)
Document Lastmod2007-02-13 11:53:44
Document Titleaccessone_userguide.book
Document CreatorPScript5.dll Version 5.2
Document Author: Bill Wareing

USER’S GUIDE
ACCESS/ONE® NETWORK
Including Manager/One®
Indoor and Outdoor Wireless System
February 8th, 2007
210-0007-02 Rev. E
Copyright © 2003 – 2007 Strix Systems, Inc. All Rights Reserved.
Networks Without Wires®
Front Matter
Access/One® Network
Including Manager/One®
All rights reserved. This document may not be reproduced or
disclosed in whole or in part by any means without the written
consent of Strix Systems, Inc.
Part Number: 210-0007-02
Revision E
Copyright © 2003 – 2007 Strix Systems, Inc.
26610 Agoura Road
Calabasas, CA 91302
USA
www.strixsystems.com
Networks Without Wires®
Copyright Notice
Copyright © 2003 – 2007 Strix Systems, Inc. All rights reserved. This document may
not be reproduced or disclosed in whole or in part by any means without the written
consent of Strix Systems, Inc. Access/One Network is a registered trademark of Strix
Systems, Inc. All other trademarks and brand names are marks of their respective
holders.
FCC Notice
Strix wireless network devices comply with Part 15 of the FCC Rules. Operation is
subject to the following two conditions:
1. The device may not cause harmful interference.
2. The device must accept any interference received, including interference
that may cause undesired operation.
Strix wireless network devices have been tested and found to comply with the limits
for a Class B digital device, pursuant to Part 15 of the FCC Rules. These limits are
designed to provide reasonable protection against harmful interference in a
residential installation. Strix wireless network devices generate, use, and radiate
radio frequency energy and, if not installed and used in accordance with the
instructions, may cause harmful interference to radio communications. However,
there is no guarantee that interference will not occur in a particular installation. If
the wireless network device does cause harmful interference to radio or television
reception, which can be determined by turning the wireless network device off and
on, the user is encouraged to try to correct the interference by one or more of the
following measures:
◗ Reorient or relocate the receiving antenna.
◗ Increase the separation between the wireless network device and the affected
receiver.
◗ Connect the wireless network device into an outlet on a circuit different from
that to which the receiver is connected.
Consult the dealer or an experienced radio/TV technician for help.
Other Notices
Industry Canada Notice
This Class B digital apparatus complies with Canadian ICES-003.
Cet appareil numérique de la classe B est conforme à la norme NMB-003 du
Canada.
VCCI Notice
The Strix IWS and OWS products are Class B wireless network devices based on the
standard of the Voluntary Control Council for Interference from Information
Technology Equipment (VCCI). If the wireless network device is used near a radio or
television receiver in a domestic environment, it may cause radio interference.
Install and use the wireless network device according to the instruction manual.
European Community (EC) Directives and Conformity
Strix wireless network devices are in conformity with the Essential Requirements of
R&TTE Directive 1999/5/EC of the European Union.
Non-Modification Statement
Unauthorized changes or modifications to Strix devices are not permitted.
Modifications to Strix devices will void the warranty and may violate FCC
regulations.
RF Exposure Requirements
To ensure compliance with FCC RF exposure requirements, the antenna used for
Strix wireless network devices must be installed to provide a separation distance of a
minimum of 2 meters (6.56 feet) or more from all persons, and must not be colocated or operated in conjunction with any other antenna or radio transmitter.
Installers must follow these installation instructions.
Safety Warnings (OWS only)
The OWS (Outdoor Wireless System) product must be installed by a trained
professional installer only. Read all safety warning before commencing an OWS
installation.
General Safety Warning
ALWAYS BE AWARE OF ELECTRICAL POWER LINES!
You can be killed if any antennas come near electrical power
lines. Carefully read and follow all instructions in this manual.
By performing these installation instructions, you may be exposed
to hazardous environments and high voltage. Use caution when
installing the Strix OWS product.
Electrical Power Warning
The OWS product must be installed by a trained professional
installer only. Read the installation instructions before you
connect the wireless network device to its power source.
Lightning Activity Warning
Do not connect or disconnect cables during periods of lightning
activity.
For each antenna, a surge protective device meeting IEC 61000-45, Level 4 or IEEE C 62.41 A3/B3 requirements must be used to
prevent potential damage from very high surges (for example,
surges caused by lightning).
Explosive Device Proximity Warning
Do not operate your wireless network device near unshielded
blasting caps or in an explosive environment.
Antenna Placement Warning
Do not locate any antenna near overhead power lines or other
electric light or power circuits, or where the antenna can come
into contact with such circuits. When installing antennas, take
extreme care not to come into contact with such electrical
circuits, as they can cause serious injury or death.
For the correct installation and grounding of antennas, please
refer to national and local codes (for example, US:NFPA 70,
National Electrical Code, Article 810; in Canada: Canadian
Electrical Code, Section 54).
Ground Warning
You must ALWAYS install an external grounding wire on the OWS
product. The ground connection must be complete before
connecting power to the OWS enclosure—a simple continuity
check between the enclosure and the ground termination point
can confirm this. Grounding of the OWS must comply with
National Electrical Code (NEC) requirements, unless local codes
in your area take precedence over the NEC code.
Power Cord Assembly Caution
An assembled power cord is not supplied with the OWS. The
power cord must be assembled by a professional installer, and the
final assembly must comply with National Electrical Code (NEC)
requirements, unless local codes in your area take precedence
over the NEC code.
Battery Caution
The OWS product contains a non-rechargeable, non-userserviceable lithium ion battery. Exercise caution to avoid shorting
the terminals of this device.
Consult local laws and regulations for the proper disposal of
batteries in your area.
Access/One® Indoor and Outdoor Wireless System Limited
Warranty
Limited Warranty: Strix Systems, Inc. (“Strix”) warrants the Access/One Indoor
Wireless System (“IWS”) and Outdoor Wireless System (“OWS”): (i) the hardware
(“Hardware”) will be free of defects in materials and workmanship from the date of
shipment as set forth below and (ii) the embedded software (“Firmware”) to the
Hardware and any separately provided software product (“Software”) are provided
“AS-IS” and such items will substantially conform to their respective published
product documentation (collectively the “Product”) for the periods indicated below,
commencing (as applicable) on the date of shipment.
Covered Product
IWS products
Warranty Period
12 months
(Including but not limited to the BMEx,
WM11x, NWSV-x, Antennas, AMECs,
MTKIT, PSWW, SLCDT and SLCKIT)
OWS2400/OWS3600
12 months
OWS11xx (Radio Board)/OWS-NSxx
(Network Servers)
12 months
Repaired or Replacement Items
90 days, or the balance of the original
item warranty, whichever is the greater
This limited warranty extends only to the original user of the Product and such user's
sole and exclusive remedy and the entire liability of Strix, at its option, will be to
repair or replace the Hardware or component thereof and in the case of Firmware or
Software Strix will make available the then available updated version of the
Firmware or Software. Notwithstanding the foregoing, in no event does Strix warrant
that the Product will operate with any software or hardware other than that provided
by Strix or specified in the applicable Product documentation, that the Product is
error free or will operate without problems or interruptions, or that the, Product will
be free of vulnerability to intrusion or attack, or that the Product will satisfy any
party's own specific requirements.
The repair or replacement of the Product does not include any labor or other costs
related to the subsequent installation thereof. The obligations of Strix hereunder are
conditioned upon the return of the Hardware in accordance with the Strix thencurrent Return Material Authorization (RMA) procedures (please contact your
authorized Strix Systems reseller for return instructions). Repair or replacement of
the defective Product or parts thereof shall neither extend nor decrease the warranty
period.
Exceptions: The foregoing limited warranties of the Product do not apply if the
Product (i) has been altered or modified, except by Strix or its duly trained and
authorized service provider, (ii) has not been installed, operated, repaired, or
maintained in accordance with written instructions of Strix, (iii) has been subjected
to abnormal physical or electrical stress, misuse, negligence or accident, (iv) has
been operated outside of the environmental specifications for the Product or (v) is
related to configuration of customer's network beyond that necessary to the use or
installation of the Strix Products. The Strix limited Firmware or Software warranty
does not apply to Firmware or Software corrections or upgrades. Repair of Products
or the supply of updated Firmware or Software requested after the expiration of the
warranty period shall be at then current Strix repair or update charges.
DISCLAIMER; LIMITATION OF LIABILITY: EXCEPT FOR THE WARRANTIES
SPECIFICALLY DESCRIBED HEREIN, STRIX DISCLAIMS ANY AND ALL
WARRANTIES AND GUARANTEES, EXPRESS, IMPLIED OR OTHERWISE, ARISING,
WITH RESPECT TO THE PRODUCTS OR SERVICES DELIVERED HEREUNDER,
INCLUDING BUT NOT LIMITED TO THE WARRANTY OF MERCHANTABILITY,
THE WARRANTY OF FITNESS FOR A PARTICULAR PURPOSE, AND ANY
WARRANTY OF NON-INFRINGEMENT OF THE INTELLECTUAL PROPERTY
RIGHTS OF ANY THIRD PARTY. LIABILITY OF STRIX FOR LOSS UNDER THIS
CONTRACT IS LIMITED TO THE TOTAL AMOUNT PAID TO STRIX BY CUSTOMER
DURING THE PREVIOUS CALENDAR YEAR. STRIX WILL HAVE NO OBLIGATION
OR LIABILITY, WHETHER ARISING IN CONTRACT (INCLUDING WARRANTY),
TORT (INCLUDING ACTIVE, PASSIVE OR IMPUTED NEGLIGENCE, STRICT
LIABILITY OR PRODUCT LIABILITY) OR OTHERWISE FOR ANY SPECIAL,
INCIDENTAL, CONSEQUENTIAL OR INDIRECT DAMAGES INCLUDING BUT
NOT LIMITED TO LOSS OF USE, LOSS OF DATA, BUSINESS INTERRUPTION,
LOSS OF REVENUE, LOSS OF BUSINESS OR OTHER FINANCIAL LOSS ARISING
OUT OF OR IN CONNECTION WITH ANY OF THE PRODUCTS OR OTHER
GOODS OR SERVICES FURNISHED BY STRIX UNDER THIS AGREEMENT, EVEN IF
ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
Software License Agreement
PLEASE READ THIS SOFTWARE LICENSE CAREFULLY BEFORE DOWNLOADING,
INSTALLING OR USING THE STRIX SYSTEMS MANAGER/ONE® UTILITY
SOFTWARE.
BY DOWNLOADING OR INSTALLING THE SOFTWARE, OR USING THE
EQUIPMENT THAT CONTAINS THIS SOFTWARE, YOU ARE CONSENTING TO BE
BOUND BY THIS LICENSE. IF YOU DO NOT AGREE TO ALL OF THE TERMS OF
THIS LICENSE, THEN (A) DO NOT DOWNLOAD, INSTALL, OR USE THE
SOFTWARE, AND (B) YOU MAY RETURN THE SOFTWARE FOR A FULL REFUND,
OR, IF THE SOFTWARE IS SUPPLIED AS PART OF ANOTHER PRODUCT, YOU
MAY RETURN THE ENTIRE PRODUCT FOR A FULL REFUND. YOUR RIGHT TO
RETURN AND REFUND EXPIRES 30 DAYS AFTER PURCHASE FROM STRIX OR AN
AUTHORIZED STRIX RESELLER, AND APPLIES ONLY IF YOU ARE THE ORIGINAL
PURCHASER. “You” and “Customer” refer to the party lawfully in possession of the
Software and entitled to use in accordance with terms and conditions set forth
herein. “Strix” means Strix Systems, Inc.
The following terms govern your use of the Software except to the extent a particular
program (a) is the subject of a separate written agreement with Strix or (b) includes a
separate “click-on” license agreement as part of the installation and/or download
process. To the extent of a conflict between the provisions of the foregoing
documents, the order of precedence shall be (1) the written agreement, (2) the clickon agreement, and (3) this Software License.
GRANT OF LICENSE. Subject to the terms and conditions of this License
Agreement, Strix grants to you the limited, non-exclusive, non-transferable right to
use the Software in object code from only and solely for use on Strix products which
you have purchased. A license key may be required to enable the Software for use. A
license key may be obtained by contacting Strix or its authorized Reseller.
OWNERSHIP. The Software is owned by Strix and/or its licensors and is protected by
United States and foreign copyright laws and international treaty. You acquire only
the right to use the Software in accordance with the terms of this Agreement and do
not acquire any rights of ownership. You agree not to remove any product
identification, trademark, copyright or other proprietary notices, legends or
restrictions appearing in or upon any of the Software or any media containing the
Software.
UPGRADES AND ADDITIONAL COPIES. For purposes of this Agreement,
“Software” shall include (and the terms and conditions of this Agreement shall apply
to) any upgrades, updates, bug fixes or modified versions (collectively, “Upgrades”)
or backup copies of the Software licensed or provided to Customer by Strix or an
authorized distributor for which Customer has paid the applicable license fees.
NOTWITHSTANDING ANY OTHER PROVISION OF THIS AGREEMENT: (1)
CUSTOMER HAS NO LICENSE OR RIGHT TO USE ANY SUCH ADDITIONAL
COPIES OR UPGRADES UNLESS CUSTOMER, AT THE TIME OF ACQUIRING
SUCH COPY OR UPGRADE, ALREADY HOLDS A VALID LICENSE TO THE
ORIGINAL SOFTWARE AND HAS PAID THE APPLICABLE FEE FOR THE
UPGRADE; (2) USE OF UPGRADES IS LIMITED TO THE STRIX PRODUCT FOR
WHICH CUSTOMER IS THE ORIGINAL END USER PURCHASER OR WHO
OTHERWISE HOLDS A VALID LICENSE TO USE THE SOFTWARE WHICH IS
BEING UPGRADED; AND (3) USE OF ADDITIONAL COPIES IS LIMITED TO
BACKUP PURPOSES ONLY.
CONFIDENTIALITY. You agree that you will not duplicate, copy or otherwise
reproduce the Software or any portion thereof, nor distribute, disseminate or
otherwise disclose the Software in any form, in whole or in part, to any third party,
nor use any knowledge derived from the use of the Software for any commercial
purpose whatsoever, without the prior, express written consent of an officer of Strix.
Further, you acknowledge that the Software is the confidential, proprietary and trade
secret property of Strix and/or its licensors and agree to take all reasonable steps to
protect the confidentiality of the Software and to prevent its unauthorized use or
disclosure.
OTHER RESTRICTIONS. You may not rent, lease, transfer, modify, adapt, translate,
reverse engineer, decompile, disassemble, or create derivative works based on the
Software or any written materials distributed in connection with the Software,
without the prior written consent of Strix (except as permitted by applicable law, but
only to the extent that Strix is not permitted by such applicable law to exclude or
limit such rights). Information relating to such Software that is necessary to enable
the production of other software that is interoperable or compatible with the
Software may be available from Strix upon written request.
CUSTOMER RECORDS. Customer grants to Strix and its independent accountants
the right to examine Customer's books, records, and accounts during Customer's
normal business hours to verify compliance with this Agreement. In the event such
audit discloses non-compliance with this Agreement, Customer shall promptly pay
to Strix the appropriate licensee fees.
EXPORT. Software, including technical data, may be subject to U.S. export control
laws, including the U.S. Export Administration Act and its associated regulations,
and may be subject to export or import regulations in other countries. Customer
agrees to comply strictly with all such regulations and acknowledges that it has the
responsibility to obtain licenses to export, re-export, or import Software.
LIMITATION AND EXCLUSIONS. THE SOFTWARE PROVIDED HEREUNDER IS
PROVIDES ON AN “AS IS” AND “WITH ALL FAULTS” BASIS. STRIX AND ITS
SUPPLIERS OR LICENSORS EXPRESSLY DISCLAIM ALL WARRANTIES, WHETHER
EXPRESS, IMPLIED OR STATUTORY, INCLUDING WITHOUT LIMITATION ALL
IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR
PURPOSE AND NONINFRINGEMENT. WITHOUT IN ANY WAY LIMITING THE
GENERALITY OF THE FOREGOING, NEITHER STRIX NOR ITS SUPPLIERS OR
LICENSORS MAKE ANY WARRANTY OR REPRESENTATION THAT THE
SOFTWARE OR USER DOCUMENTATION IS ERROR FREE OR THAT THE
SOFTWARE WILL OPERATE WITHOUT INTERRUPTION OR SATISFY YOUR
NEEDS OR REQUIREMENTS.
GOVERNMENT RESTRICTED RIGHTS. If this Software and accompanying
documentation are being acquired by or on behalf of the U.S. Government or by a
U.S. Government prime contractor or subcontractor (at any tier), then the
Government's rights in the Software shall be only as set forth in this license; this is in
accordance with 48 C.F.R. 227.7201 through 227.7202-4 (for Department of
Defense (DoD) acquisitions) and with 48 C.F.R. 2.101 and 12.212 (for non-DoD
acquisitions).
TERMINATION. This License is effective until terminated. You may terminate it at
any time by destroying the Software together with all copies and documentation in
any form. Your rights under this License will terminate automatically without notice
from Strix if You fail to comply with any material term or condition of this License.
Upon termination, You must either return or destroy the written materials and all
copies of the Software.
GENERAL. Governing Law: This Agreement is governed by the laws of the State of
California, USA without regard to its choice of law provisions. Both parties expressly
agree that the provisions of the United Nations Convention on Contracts for the
International Sale of Goods and the Uniform Computer Information Transaction Act
shall not apply to this Agreement (including any attachments) or any part hereof.
Export: In the event that you export or re-export the Software, you shall have full
responsibility for obtaining all necessary approvals, licenses, permits and the like
which may be required by any regulatory or governmental body. You agree to abide
by the rules and regulations of the U.S. Department of Commerce, Office of Export
Administration and U.S. Anti-Boycott laws and regulations, as well as all applicable
U.S. federal, state and municipal statutes, rules and regulations and all import and
export regulations and of the Software's destination country, when exporting or reexporting the Software. Severability: If any provision of this Agreement shall be held
to be illegal or unenforceable for any reason, such provision shall, to the extent of
such illegality or unenforceability, be severed, but without affect to the remainder of
such or any other provision contained herein and shall remain in full force and
effect. Entire Agreement: This Agreement constitutes the entire agreement between
you and Strix concerning the subject hereof. Any terms and conditions appearing on
your purchase order or in any other writing received from you which are different
from or in addition to the terms and conditions contained herein are null and void
and of no force or effect. This Agreement may only be modified by a writing signed
by authorized representatives of both parties.
IN NO EVENT SHALL STRIX OR ITS SUPPLIERS OR LICENSORS BE LIABLE FOR
ANY INCIDENTAL, INDIRECT, CONSEQUENTIAL, SPECIAL OR EXEMPLARY
DAMAGES, INCLUDING WITHOUT LIMITATION ANY LOSS OF DATA OR LOSS
OF USE OR LOSS OF REVENUES OR PROFITS (WHETHER OR NOT SO ADVISED
OF THE POSSIBILITY THEREOF) ARISING OUT OF OR CONNECTED IN ANY
WAY WITH THIS AGREEMENT OR THE SOFTWARE, DOCUMENTATION,
SERVICES OR OTHER ITEMS PROVIDED HEREUNDER OR IN CONNECTION
HEREWITH, REGARDLESS OF THE TYPE OF CLAIM OR FORM OF ACTION AND
HOWSOEVER ARISING. IN NO EVENT SHALL THE MAXIMUM LIABILITY OF
STRIX OR ANY OF ITS SUPPLIERS OR LICENSORS EXCEED THE LICENSE FEES
ACTUALLY PAID BY YOU UNDER THIS AGREEMENT.
STRIXSYSTEMS® (including the design) and ACCESS/ONE® are registered
trademarks of Strix Systems, Inc.
Access / One® Network
Table of Contents
The bulleted items before the main listing appear in the front matter (prior to the
Table of Contents).
◗ Copyright Notice
◗ FCC Notice
◗ Other Notices
◗ Safety Warnings (OWS only)
◗ Access/One® Indoor and Outdoor Wireless System Limited Warranty
◗ Software License Agreement
List of Figures ................................................................................. ix
Introduction .................................................................................... 1
About this User’s Guide .................................................................................. 1
Organization ............................................................................................ 1
Notes, Cautions, and Warnings ................................................................ 3
Common Terms and Usage ...................................................................... 3
Important Note About Rebooting .............................................................. 4
The Network Used in this Guide .............................................................. 4
Product Images ......................................................................................... 4
Chapter 1: Welcome to Access/One Network ................................ 5
Indoor and Outdoor Solutions ......................................................................... 6
Why Choose Access/One Network? ................................................................ 8
Mesh Topology ......................................................................................... 9
An Intelligent Network .................................................................................. 11
Self-Discovery (or Physical Inventory) ..................................................... 12
Self-Tuning and Self-Healing .................................................................. 12
Background Scanning ............................................................................. 13
Table of Contents
Access / One® Network
Detecting Rogue Devices ....................................................................... 13
Network Servers ............................................................................................ 14
Master Network Server ........................................................................... 15
Communicating Across Remote Subnets ................................................. 16
Client Connect .............................................................................................. 16
Network Connect .......................................................................................... 17
Wireless Workgroups (IWS only) ................................................................... 17
Offering a Rich Technology Base .................................................................. 18
IWS and OWS Hardware ........................................................................ 18
Manager/One ......................................................................................... 18
System and Security ................................................................................ 19
Wireless ................................................................................................. 22
Hardware Specifications ............................................................................... 22
Chapter 2: Getting Started ........................................................... 23
Host Network Requirements ......................................................................... 23
DHCP Server .......................................................................................... 23
Non-DHCP Server Environment ............................................................. 25
FTP Server .............................................................................................. 25
Internet Browser ..................................................................................... 26
Screen Resolution ............................................................................ 26
About Manager/One ..................................................................................... 27
Installing the Manager/One Plug-In ........................................................ 27
Launching the Manager/One Utility Pane ............................................... 29
Your New Manager/One Utility Pane ............................................... 29
Accessing Manager/One for the First Time .............................................. 31
Starting a New Network ................................................................................ 32
Enabling Windows 2000 Servers for NTP Requests ....................................... 33
Chapter 3: Updating the Firmware ............................................... 35
Prerequisite Steps ................................................................................... 35
Updating Firmware Across the Network ................................................. 37
ii
Table of Contents
Access / One® Network
Updating Firmware on Individual Modules ............................................. 41
Chapter 4: The Manager/One Interface ....................................... 43
The Manager/One Plug-In ............................................................................. 43
The General Layout ....................................................................................... 44
A Choice of Layouts ............................................................................... 45
Switching Between Layouts .............................................................. 46
Features of the Logical Mesh Topology View ................................................ 47
The Segment View .................................................................................. 48
Switching from Segment View List to Segment View Icons ............... 49
Tools ...................................................................................................... 50
Logical View Legend .............................................................................. 52
Panning and Zooming ............................................................................ 53
Node Status Registers ............................................................................. 54
Management Tools and Features (Any Layout) .............................................. 55
The Details Pane .................................................................................... 56
Node Operational Status Indicators ........................................................ 57
The Toolbar ............................................................................................ 58
Tabbed Pages ................................................................................... 58
Commands ....................................................................................... 60
Legends ............................................................................................ 61
Refresh ............................................................................................. 62
Factory Default ................................................................................ 62
Exporting Your Inventory File to an Excel Spreadsheet ..................... 63
Inventory or Auto Discovered ....................................................................... 63
Intuitive Mouse Over .................................................................................... 64
Inputting Data ............................................................................................... 64
Chapter 5: Managing the Network ............................................... 65
The Manage Function ................................................................................... 65
View Action Status ................................................................................. 66
Action Status Results ........................................................................ 67
Table of Contents
iii
Access / One® Network
Commands ............................................................................................. 68
Load Firmware on Network .............................................................. 68
Reboot Network ............................................................................... 68
Update Node Names ....................................................................... 68
Update Network Membership .......................................................... 69
Transfer System Files ........................................................................ 69
Remote Network Server ................................................................... 70
The Configure Function ................................................................................. 71
System .................................................................................................... 71
User Login ....................................................................................... 72
Network Management ...................................................................... 73
TCP/IP Settings ................................................................................. 78
Network Topology ........................................................................... 79
Priority/One - Class of Service .......................................................... 81
Radius Accounting ........................................................................... 84
Syslog .............................................................................................. 85
Date and Time ................................................................................. 88
Operating Environment .................................................................... 91
Firmware Updates ............................................................................ 91
Wi-Fi ...................................................................................................... 92
General ............................................................................................ 92
Radio Parameters ............................................................................. 95
Client Connect ............................................................................... 101
Network Connect ........................................................................... 109
Rogue Scan .................................................................................... 114
The Inventory Function ............................................................................... 116
Print Friendly Format ............................................................................ 117
Export to CSV ....................................................................................... 118
Importing the CSV File to an Excel Spreadsheet .............................. 118
The Monitor Function ................................................................................. 119
Tools .................................................................................................... 119
AP Monitor .................................................................................... 119
iv
Table of Contents
Access / One® Network
Network Connect Monitor ............................................................. 121
Wireless Client Query .................................................................... 122
Rogue Monitor ............................................................................... 123
The Apply Configuration Function .............................................................. 124
Important Notes About Apply Configuration ......................................... 124
Enabling Communication Between Remote Subnets .................................... 125
Example ............................................................................................... 125
Procedure ............................................................................................. 126
Removing the NS to NS Feature ............................................................ 126
Managing Remote Subnets from Manager/One ..................................... 126
Chapter 6: Managing Subnets and Nodes ................................... 127
Interface Features in the Subnet View .......................................................... 128
The Manage Function ................................................................................. 128
Commands (at the Subnet Level) ........................................................... 129
Load Firmware... ............................................................................ 129
Reboot... ........................................................................................ 129
Commands (at the Node Level) ............................................................. 130
Update Node Names ..................................................................... 130
Update Network Membership ........................................................ 131
Chapter 7: Managing Modules .................................................... 133
Manger/One at the Module Level ................................................................ 133
The Manage Function ................................................................................. 134
Actions ................................................................................................. 135
Factory Defaults ............................................................................. 135
Load Firmware/Configuration ......................................................... 136
Page Device ................................................................................... 137
Reboot ........................................................................................... 137
The Configure Function ............................................................................... 138
System .................................................................................................. 138
User Login ..................................................................................... 139
Table of Contents
Access / One® Network
Network Management .................................................................... 141
TCP/IP Settings ............................................................................... 143
Priority/One - Class of Service ........................................................ 144
Radius Accounting ......................................................................... 144
Syslog ............................................................................................ 144
Date and Time ............................................................................... 145
Operating Environment .................................................................. 145
Firmware Updates .......................................................................... 145
Wi-Fi .................................................................................................... 146
Radio Parameters ........................................................................... 147
Client Connect ............................................................................... 155
Network Connect ........................................................................... 156
Rogue Scan .................................................................................... 157
The Monitor Function ................................................................................. 158
Reports ................................................................................................. 159
Radio Statistics ............................................................................... 160
Wireless Neighbors ........................................................................ 161
Wireless Client Monitor ................................................................. 162
SSIDs / VLANs List ......................................................................... 163
Device Information ........................................................................ 164
The Rogue Devices Function ....................................................................... 165
Commands ........................................................................................... 165
Scan ............................................................................................... 165
Appendix A: Power Settings for Antennas .................................. 167
Channels for IEEE 802.11b/g ....................................................................... 167
Channels for IEEE 802.11a .......................................................................... 169
Channels for Public Safety (4.9 GHz) .......................................................... 170
Appendix B: Technical Support .................................................. 171
Warranty ..................................................................................................... 171
Priority Assignment ..................................................................................... 171
vi
Table of Contents
Access / One® Network
Partner Training .......................................................................................... 172
Partner Tools ............................................................................................... 172
Integration ................................................................................................... 172
Goal ............................................................................................................ 172
Syslog Messages .......................................................................................... 173
Format .................................................................................................. 173
Subsystems ........................................................................................... 173
Severity Levels ...................................................................................... 174
Message Listing .................................................................................... 174
Security Subsystem ......................................................................... 174
Wireless Subsystem ........................................................................ 175
Management Subsystem ................................................................. 179
Supported MIBs ........................................................................................... 181
Strix Private MIBs ................................................................................. 181
Standard MIBs ...................................................................................... 182
Contact Information .................................................................................... 182
Glossary of Terms ........................................................................ 183
Index ........................................................................................... 199
Table of Contents
vii
Access / One® Network
viii
Table of Contents
Access / One® Network
List of Figures
Figure 1.
Strix Mesh Architecture (OWS Metro Scenario) ................................... 5
Figure 2.
Indoor Wireless System (IWS).............................................................. 6
Figure 3.
Outdoor Wireless System (OWS)......................................................... 7
Figure 4.
Strix Mesh Architecture (OWS Transportation Scenario).................... 10
Figure 5.
Manager/One Interface (Network Level)............................................ 11
Figure 6.
Self-Tuning and Self-Healing............................................................. 12
Figure 7.
Windows Task Manager.................................................................... 26
Figure 8.
Manager/One Interface (Subnet Level)............................................... 27
Figure 9.
Access/One Network Setup Wizard .................................................. 28
Figure 10.
Manager/One Icon ............................................................................ 28
Figure 11.
Manager/One Utility Pane................................................................. 29
Figure 12.
Expanded Utility Pane Tree ............................................................... 30
Figure 13.
Manager/One Session Login Prompt.................................................. 31
Figure 14.
Defining Your Network Name........................................................... 31
Figure 15.
Network (Cloud) View ...................................................................... 32
Figure 16.
Run Dialog (Editing the Registry) ....................................................... 33
Figure 17.
Registry Editor ................................................................................... 33
Figure 18.
Partner Login..................................................................................... 36
Figure 19.
Firmware Updates Command (Network Level) .................................. 37
Figure 20.
Warning and Confirmation Request .................................................. 38
Figure 21.
Command Progress (Firmware).......................................................... 38
Figure 22.
View Action Status Window.............................................................. 39
Figure 23.
Inventory Window ............................................................................ 40
Figure 24.
Firmware Updates Command (Module Level) ................................... 41
Figure 25.
Action Configuration Window .......................................................... 42
Figure 26.
Firmware Update Completed Successfully ........................................ 42
Figure 27.
Manager/One Icon ............................................................................ 43
Figure 28.
The Manager/One Interface (Default Flat View)................................. 44
Figure 29.
The Manager/One Interface (Logical View) ....................................... 45
Figure 30.
Switching Between Layouts............................................................... 46
List of Figures
ix
Access / One® Network
Figure 31.
Logical Mesh Topology View ............................................................ 47
Figure 32.
Segment View (List Format) ............................................................... 48
Figure 33.
Segment View (Icon Format) ............................................................. 49
Figure 34.
Accessing the Tools Pane .................................................................. 50
Figure 35.
Show Names..................................................................................... 51
Figure 36.
Show Link Strengths .......................................................................... 51
Figure 37.
Logical View Legend......................................................................... 52
Figure 38.
Panning and Zooming....................................................................... 53
Figure 39.
Node Status Registers ........................................................................ 54
Figure 40.
Management Tools and Features ....................................................... 55
Figure 41.
Details Pane...................................................................................... 56
Figure 42.
Operational Status of Nodes.............................................................. 57
Figure 43.
Function Tabs ................................................................................... 58
Figure 44.
Commands........................................................................................ 60
Figure 45.
Legends............................................................................................. 61
Figure 46.
Refresh Button................................................................................... 62
Figure 47.
Factory Default Button ...................................................................... 62
Figure 48.
Inventory or Auto Discovered ........................................................... 63
Figure 49.
Intuitive Mouse-Over ........................................................................ 64
Figure 50.
Network (Cloud) View ...................................................................... 65
Figure 51.
View Action Status Window.............................................................. 66
Figure 52.
Transferring System Files ................................................................... 69
Figure 53.
Including Remote Servers.................................................................. 70
Figure 54.
Excluding Remote Servers ................................................................. 70
Figure 55.
Managing User Logins....................................................................... 72
Figure 56.
General Management Interface Security............................................ 73
Figure 57.
Configuring Access/One Network for SNMP ..................................... 75
Figure 58.
Managing Traps ................................................................................ 76
Figure 59.
Assigning Trusted IP Addresses.......................................................... 77
Figure 60.
TCP/IP Settings .................................................................................. 78
Figure 61.
Network Topology ............................................................................ 79
Figure 62.
Priority/One ...................................................................................... 81
List of Figures
Access / One® Network
Figure 63.
Adding COS Filters............................................................................ 82
Figure 64.
Editing or Deleting COS Filters.......................................................... 83
Figure 65.
Setting Up RADIUS Accounting Servers ............................................ 84
Figure 66.
Configuring Access/One Network for Syslog ..................................... 86
Figure 67.
Establishing the Correct Date and Time for Your Environment........... 88
Figure 68.
Time Zones ....................................................................................... 88
Figure 69.
Configuring Daylight Saving Time..................................................... 89
Figure 70.
Setting Manual Time ......................................................................... 90
Figure 71.
Setting the Cooling Fan Speed........................................................... 91
Figure 72.
Setting Up General Radio Parameters................................................ 92
Figure 73.
802.11a Radio Parameters (5.745 GHz to 5.825 GHz)...................... 95
Figure 74.
802.11g Radio Parameters (2.400 GHz to 2.4835 GHz).................... 96
Figure 75.
Public Safety Radio Parameters (4.940 GHz to 4.990 GHz) .............. 97
Figure 76.
Client Connect (Virtual/Strix)........................................................... 101
Figure 77.
Adding an SSID............................................................................... 102
Figure 78.
Deleting an SSID............................................................................. 103
Figure 79.
Configuring RADIUS Servers ........................................................... 105
Figure 80.
WPA Pass Phrase ............................................................................ 105
Figure 81.
Assigning Client Connect Security Keys........................................... 105
Figure 82.
Encrypted Security Key.................................................................... 106
Figure 83.
Configuring an Access Control List.................................................. 106
Figure 84.
Adding a New Station ..................................................................... 107
Figure 85.
Network Connect............................................................................ 110
Figure 86.
Network Connect Security Key........................................................ 113
Figure 87.
Rogue AP Scanning......................................................................... 114
Figure 88.
Defining the Refresh Period for the Rogue List................................. 115
Figure 89.
Inventory List .................................................................................. 116
Figure 90.
Deleting a Node from the Inventory List.......................................... 117
Figure 91.
Printing the Inventory List................................................................ 117
Figure 92.
CSV File .......................................................................................... 118
Figure 93.
AP Monitor (Default View) .............................................................. 119
Figure 94.
An Overview of Monitor Tables (AP Monitor) ................................. 120
List of Figures
xi
Access / One® Network
Figure 95.
Network Connect Monitor .............................................................. 121
Figure 96.
RSSI Legend .................................................................................... 121
Figure 97.
Wireless Client Query Monitor........................................................ 122
Figure 98.
MAC Address Prompt...................................................................... 122
Figure 99.
Rogue Monitor ................................................................................ 123
Figure 100. Apply Configuration........................................................................ 124
Figure 101. Subnet (Subcloud) View .................................................................. 127
Figure 102. Command Progress Pane................................................................. 129
Figure 103. Node Name (Flat View)................................................................... 130
Figure 104. Network Membership ..................................................................... 131
Figure 105. Device Configuration Window........................................................ 135
Figure 106. Loading a New Firmware Image or Configuration File..................... 136
Figure 107. Paging a Device .............................................................................. 137
Figure 108. Rebooting a Module........................................................................ 137
Figure 109. Module Identity and User Management (Login) Parameters............. 139
Figure 110. Client Connect Privacy Tags............................................................ 141
Figure 111. Module Description and Name ....................................................... 142
Figure 112. TCP/IP Settings (Module Level)........................................................ 143
Figure 113. Setting Up the FTP Server (Module Level)........................................ 145
Figure 114. Single and Dual Band Wi-Fi Menu Structure ................................... 146
Figure 115. 802.11a Radio Parameters (5.745 GHz to 5.825 GHz).................... 147
Figure 116. 802.11g Radio Parameters (2.400 GHz to 2.4835 GHz).................. 148
Figure 117. Public Safety Radio Parameters (4.940 GHz to 4.990 GHz) ............ 149
Figure 118. Client Connect Configuration Window ........................................... 155
Figure 119. Network Connect Configuration Window ....................................... 156
Figure 120. Single and Dual Band Reports Menu Structure ................................ 159
Figure 121. Radio Statistics ................................................................................ 160
Figure 122. Wireless Neighbors ......................................................................... 161
Figure 123. Wireless Client Monitor .................................................................. 162
Figure 124. SSID / VLANs List............................................................................ 163
Figure 125. Device Information (802.11a Module) ............................................ 164
Figure 126. Device Information (Network Server) .............................................. 164
xii
List of Figures
Access / One® Network
Figure 127. Rogue Monitor Table ...................................................................... 165
Figure 128. BSSID Information for Rogue Device............................................... 166
Figure 129. Partner Login Page .......................................................................... 171
List of Figures
xiii
Access / One® Network
xiv
List of Figures
IN
Access / One® Network
Introduction
About this User’s Guide
This User’s Guide provides detailed information and procedures that will enable you
to install, configure, manage, and use our Access/One Network product and its
components successfully and efficiently. Use this guide to take full advantage of the
system’s functionality and features.
Organization
This User’s Guide is organized as follows:
Chapter 1: Welcome to Access/One Network
Provides an overview of Access/One Network, its deployment and application
options, and the benefits of our structured mesh topology. This chapter also
provides a summary of the product’s main features.
Chapter 2: Getting Started
Defines the prerequisites for deploying your Access/One Network, and provides
instructions for installing the Manager/One interface. This chapter also shows
you how to upgrade the Access/One Network firmware and how to enable
Windows 2000 servers for NTP requests.
Chapter 3: Updating the Firmware
Shows you the correct method to use when updating the Access/One Network
firmware, with some important notes and cautions that will ensure your network
and its components are upgraded to the latest version without problems.
Chapter 4: The Manager/One Interface
Describes the Manager/One graphical management interface, with some useful
examples to help with navigation.
Introduction
IN
Access / One® Network
Chapter 5: Managing the Network
Provides instructions for managing and configuring your Access/One Network
at the network level following a successful installation.
Chapter 6: Managing Subnets and Nodes
Provides instructions for managing a subnet within your Access/One Network.
Chapter 7: Managing Modules
Provides instructions for managing individual modules within your Access/One
Network (for example, wireless modules and network servers).
Appendix A: Power Settings for Antennas
Shows the maximum power settings based on the type of antenna being used
and the wireless band.
Appendix B: Technical Support
Offers partner information, includes the most Frequently Asked Questions, and
provides contact information for Strix Systems, Inc.
Glossary of Terms
Provides an explanation of terms directly related to Strix product technology,
organized alphabetically.
Index
The index is a valuable information search tool. Use the index to locate specific
topics and categories discussed in this User’s Guide.
Introduction
IN
Access / One® Network
Notes, Cautions, and Warnings
Although installing and managing your Access/One Network is relatively simple,
please exercise care and take the time to read all notes, cautions and warnings
where the following symbols and text styles appear.
This symbol and ITALICIZED text are used for general notes and
additional information that may be useful to you.
This symbol and italicized ORANGE text are used to indicate that care
needs to be taken when performing a task. Cautions provide critical
information. If in doubt, contact Technical Support for assistance.
This symbol and BOLD text are used to warn you about the risk of
serious damage to the system or the potential for personal injury if the
warning is ignored.
Common Terms and Usage
The following terms are frequently used throughout this User’s Guide and within the
Manager/One management interface:
Term
Cloud
Subcloud
Usage
Refers to the network as a whole.
This is a subnet residing within the network.
Node
A combination of Access/One Network modules
residing at the same physical location.
Network Server
Serves intelligence, management and security to
connected network nodes and modules.
Client Connect
Connects client devices to Access/One Network.
Network Connect
Introduction
Associates to a Client Connect to complete a
wireless node-to-node link.
IN
Access / One® Network
Important Note About Rebooting
Your Access/One Network can be configured and managed at the network, subnet
or individual module levels. As a consequence, the Manager/One management
interface has different reboot commands for each level. These are:
◗ Reboot Network
When logged in at the network level, this command is accessed from the
Manage tab under Commands.
◗ Reboot ... Subnet or Network
When logged in at the subnet level, this command (with options for subnet or
network) is accessed from the Manage tab under Commands.
◗ Reboot
When logged in to an individual module, this command is accessed from the
Manage tab under Actions.
Before rebooting, always ensure that you are logged in at the correct management
level within Manager/One.
The Network Used in this Guide
For simplicity, the sample Access/One Network used in this User’s Guide is small,
consisting of just 3 IWS nodes and 2 OWS nodes. The designated master network
server is an IWS module attached to a router via a standard CAT5 Ethernet cable. All
other nodes are connected to the network wirelessly.
Product Images
Some of the images used in this document have been modified for clarity.
Introduction
Access / One® Network
Welcome to Access/One Network
Unlike traditional access points that offer limited coverage within predefined local
hot spots, or inadequate single radio/single RF mesh solutions that won’t scale,
Access/One Network enables you to create small or large wireless networks for
indoor and/or outdoor deployments—drawing on the parallels of the successful
wired Enterprise network and providing all of the management and security that
network managers demand.
Access/One Network provides multiple RF technologies built into a secure, fully
scalable and self-tuning system, with the flexibility to easily add new and emerging
wireless technologies, applications and services. And with the Strix structured mesh
architecture, Access/One Network defines the standard for intelligent self-governing
wireless systems that offer unparalleled user mobility in a reliable and secure
managed network.
Government Offices
Campus
MDU
Mobile
Business Park
Recreation Area
Legacy
ega
eg
ga
Figure 1. Strix Mesh Architecture (OWS Metro Scenario)
Welcome to Access/One Network
Access / One® Network
Indoor and Outdoor Solutions
Access/One Network has been designed for both indoor and outdoor wireless
applications. Strix offers hardware solutions for both indoor and outdoor
applications.
◗ Indoor Wireless System (IWS)
Access/One Network IWS is designed for indoor deployments, with nodes
being deployed using conventional Ethernet, or wirelessly via the Strix
structured mesh architecture. State-of-the-art management and security
features built into the IWS allow IT managers to deploy networks that can be
secured using the latest authentication and encryption schemes, and
managed entirely from a single point.
Figure 2. Indoor Wireless System (IWS)
The IWS is modular and flexible, with each network node capable of
supporting up to three wireless modules of any type and mix. This flexibility
provides the configuration options needed to meet the most demanding user
connectivity requirements. Support for future wireless technologies, such as
802.16, Ultrawideband (802.15.3a), or 802.20, is as simple as adding the
appropriate module to the network nodes wherever they are needed. With
the IWS, 802.11a and 802.11g Client Connect modules can be configured to
achieve speeds up to 108 Mbps, significantly improving the performance of
your wireless network.
Welcome to Access/One Network
Access / One® Network
◗ Outdoor Wireless System (OWS)
Access/One Network OWS is designed for outdoor deployments where
network performance, reliability and scalability are a must. A single OWS
node supports up to 6 radios, each of which can be dedicated to a unique
function, such as mesh backbone ingress, egress, or client connectivity. High
throughput and low latency across the Strix mesh backbone allows for the
deployment of hundreds of nodes while utilizing only limited wired drops or
termination points, making the OWS a highly scalable wireless networking
solution for outdoor deployments.
Figure 3. Outdoor Wireless System (OWS)
The OWS architecture makes 802.11 a full duplex technology, moving traffic
more efficiently through the network and utilizing different RF frequencies
and channels for network connectivity and client access. In addition,
channels are selected dynamically, making the network more tolerant of
interference than standard mesh networks. Working closely together, these
features deliver higher throughput and lower latency across multiple hops,
supporting real time voice, video, and data applications.
The OWS product is available in multiple configurations (2400 and 3600
series) that are fully upgradeable, driven by a 110/220 VAC auto-sensing
power supply, with a DC power option and an optional heater for extreme
environments.
Welcome to Access/One Network
Access / One® Network
Why Choose Access/One Network?
Access/One Network employs several categories of wireless modules which are
individually assembled to form scalable network nodes. The specific role of each
node within your network is determined by the mix of modules within the node
itself. This approach ensures that our customers are given the flexibility to design
wireless networks that are tailored to meet their specific needs, eliminating
redundancy and the unnecessary expenditure that comes with it. And by reducing
the need for expensive Ethernet cabling, effectively removing the restrictions of
additional wired components within your network, Access/One Network offers a
truly unique and versatile wireless solution.
Our network nodes can be installed using wireless 802.11a/g uplinks to corporate,
regional or metro-wide networks instead of the typical wired 10/100 Ethernet
method, an option that is highly convenient in established Enterprise environments
where it is impractical and expensive to install new Ethernet cabling (especially in
old buildings where cable routing can mean substantial modifications to existing
structures). This capability is not only cost-effective, but also allows you to install
nodes without the need for a lengthy and often complex site planning process.
With Access/One Network, IT administrators need only answer four simple
questions when planning their network deployment criteria:
◗ What types of wireless client connections do I need?
◗ Do I want to use a wired or wireless network connection?
◗ How many potential users do I have?
◗ What throughput do I want to offer my users?
With the freedom and flexibility that Access/One Network provides, implementation
becomes a rapid and painless experience, ensuring that your network is up and
running on time and at minimal cost (compared with a wired solution, or a wireless
solution that does not offer scalability and/or the power and intelligence of a
structured mesh). But deploying Access/One Network is just the beginning of the
story—once your network is established, you very quickly discover that Access/One
Network has so much more to offer than mere convenience.
Welcome to Access/One Network
Access / One® Network
Mesh Topology
“mesh: The space or interstice between the threads of a net.”
New English Dictionary, March 1932
In the current WLAN market, the trend is to strip the intelligence from the access
point and put the workload on the switch. Although this approach may reduce the
initial cost of the AP, it introduces serious problems, like single-point-of-failure,
bottlenecks, and an obvious lack of scalability and flexibility. For example,
whenever you add just a few APs and exceed the port limitation of the existing
WLAN switch, the only solution is to add a new switch. This is not only expensive,
but does nothing to solve the root cause of the problem.
Strix Systems believes that the power of computing and networks can only be fully
harnessed when the intelligence of the system is distributed between its component
parts and used locally. But to function effectively and reliably, this type of
“distributed intelligence” must be governed by a centrally managed source.
Access/One Network’s structured mesh topology enables nodes within the network
to communicate with each other and perform intelligent tasks and analysis, ensuring
that the network’s performance is always at its peak. But if problems do arise, the
system has the remarkable ability to tune and heal itself instead of failing. Quite
simply, there is no single point of failure or any loss in the network’s performance
and its ability to deliver the services its customers demand.
Each network node is fully aware of its neighbor and, in the event of an adjacent
node’s failure or overload, will redirect the affected user traffic. Although the
intelligence of the network is distributed, network security parameters, monitoring
rules, and system upgrades can be conveniently controlled from one central
location via our Manager/One graphical management interface.
Mesh is inherently reliable and can be extended easily to include thousands of
nodes. As a result, Access/One Network can be installed in hours instead of days or
weeks, meaning a successful wireless mesh network deployment doesn't require
elaborate planning and site mapping to achieve its goal. When installed, the
network is self-governing—simply moving a network node, or dropping another
node into place, can fix a weak signal or dead zone.
Welcome to Access/One Network
Access / One® Network
Any wireless network can now benefit from a Strix structured mesh solution that
satisfies the multiple conflicting demands of redundancy, distributed
communications, flexibility and scalability, security and management, cost, and
overall reliability.
Sold globally by a dedicated network of qualified and approved distributors and
integrators, Access/One Networks have been deployed in hundreds of indoor and
outdoor locations worldwide. These deployments cover the broadest range of
markets, such as Metro, Public Safety, Government, Energy, Transportation,
Hospitality, Education, Enterprise, Residential and Carrier Accesss.
Departure Point
Passengers in Motion
Destination
Figure 4. Strix Mesh Architecture (OWS Transportation Scenario)
To find out why Strix Systems is the leader in wireless mesh deployments, and to
learn more about our family of INDOOR products and OUTDOOR products that
have been installed around the world, visit us at http:// www.strixsystems.com.
10
Welcome to Access/One Network
Access / One® Network
An Intelligent Network
Every node in your Access/One Network has the ability to self-discover its neighbors
and form a highly versatile mesh network, regardless of whether its connection to
the LAN is wired or wireless. As nodes communicate with each other, the entire
system becomes one intelligent network where traffic is routed on optimal paths as
the system automatically self-tunes and self-heals in real time.
In addition, because each network node is constantly monitoring the system’s health
and inventory, Access/One Network has the ability to immediately detect the
presence of any rogue wireless devices on multiple frequencies operating within its
range.
Statistical data is periodically sent to all network servers and can be viewed at the
network, subnet, node or individual module level from our Manager/One intuitive
management interface.
Figure 5. Manager/One Interface (Network Level)
Welcome to Access/One Network
11
Access / One® Network
Self-Discovery (or Physical Inventory)
All network nodes automatically identify themselves to the network, and as a
consequence each node discovers the identities and configurations of its neighbors,
as well as their current active state. In short, they know who they are, what they are,
and what they’re doing. Access/One Network’s self-tuning, self-healing and rogue
detection features depend heavily on this functionality. Alternatively, you can
configure and manage the network based on an inventory list of physical
components. The inventory list is generated by Manager/One automatically, but you
can add and/or delete items from the list, as needed.
Self-Tuning and Self-Healing
If the wireless environment changes for any reason, such as the addition of a new
network node, data paths are automatically re-evaluated to ensure that the network
is self-tuned for peak performance.
The same process occurs if there’s a loss of a data path, ensuring that the network
can heal (repair) itself and that nodes stay connected. With our mesh topology, there
is never a single point of failure that can affect the entire system. The following
graphic offers a simple illustration of how a node finds an alternative path to its
neighbor when one data path is temporarily lost.
Figure 6. Self-Tuning and Self-Healing
The self-tuning and self-healing processes are dynamic, meaning they occur in the
background in real time and without human intervention.
12
Welcome to Access/One Network
Access / One® Network
Background Scanning
When a Network Connect first connects to the network, it performs an initial scan of
available Wi-Fi channels and generates a list of potential alternative Client Connects
that are reachable. Following the initial scan, the Network Connect continually
scans in the background to maintain the inventory list and enable the system to
make the following intelligent decisions:
◗ When to drop the current path and select a better path, then connect to the
appropriate node (self-tuning).
◗ When to select the best path (or detect the loss of a path) and select the next
best path, then connect to the appropriate node (self-healing).
◗ Which APs are rogues.
Detecting Rogue Devices
A rogue device is any access point that the network doesn’t recognize. This can be a
third party AP that is not part of your Access/One Network or a valid network node
that has yet to be assigned.
Network Connects perform an active scan for rogue devices during every boot
sequence, and periodically thereafter. Alternatively, you can initiate a client scan
from Manager/One. When a rogue scan is started from Manager/One, all Client
Connects are placed in active scan mode, while Network Connects continue to
perform the background scan. Scans generally take between 10 and 20 seconds to
complete. Detected rogue devices are immediately reported to the network server
and the operator is alerted immediately. Rogue detection distinguishes between:
◗ Wired devices
◗ Wireless devices
◗ Wired and wireless devices (the most common culprit)
Rogue detection is achieved by triangulation, with Wi-Fi scanning performed by
selected Access/One Network elements. Rogue detection can affect the network
service because the system needs to scan all the available WiFi frequencies.
Welcome to Access/One Network
13
Access / One® Network
Network Servers
The network server is a critical component in your Access/One Network. It consists
of a hardware platform and base software. The network server can be installed into
any node within the network—wired nodes are preferred, and at least one network
server should be installed in a wired node.
The software running on the network server provides much of the intelligence within
the system and facilitates most of Access/One Network’s unique features and
functions. Overseeing the overall management and control of the system, the
network server provides distributed functionality that enables your Access/One
Network to function effectively as a secure wireless system that easily scales as your
Enterprise network grows.
Some of the key features provided by the network server include advanced security,
dynamic operation, network management, traffic prioritization and control, and
enhanced user mobility and tracking.
◗ Advanced Security
The network server enables your Access/One Network to provide a full array
of standards-based tools to secure the network. In addition to using the same
security servers and virtual private network (VPN) software that is used on
wired networks, Access/One Network offers enhanced system-level security
against attackers and rogue access points. All of the wireless mesh links, as
well as network management and control data, are encrypted using the
Advanced Encryption Standard (AES), making it nearly impossible for
attackers to intrude into the network. In addition, whenever a user is
authenticated, the network server ensures that user security is maintained
while they roam the network.
◗ Dynamic Operation
Each network node automatically associates itself with the best available
network server (least congested and closest). If the wireless environment
changes for any reason, associations are automatically re-evaluated to ensure
that the network remains at its peak performance.
14
Welcome to Access/One Network
Access / One® Network
◗ Network Management
The network server maintains internal tables for each network node that it
communicates with, as well as any other network servers within Access/One
Network. The network server works in conjunction with Manager/One to
build detailed system/node/module level mapping of the network, enabling
you to monitor and configure the network at any level.
◗ Traffic Prioritization and Control
User traffic on the network is managed locally at the network node. Network
traffic is managed at the system-level by the network server. Knowing the
users that are attached to each node allows the network server to determine
how user traffic should be prioritized and routed through the network. All
types of user data are managed in this way (including broadcast and multicast
traffic) which significantly reduces any overhead on the network.
◗ Enhanced User Mobility and Tracking
Network servers make roaming possible for users of devices, such as PDAs,
who previously had to re-login every time they entered a conventional access
point coverage area. But thanks to the availability of 24/7 connectivity
through Access/One Network, even the smallest, most mobile and most
battery-sensitive of the handheld devices can now serve as productive
business tools.
Master Network Server
Establishing a master/slave relationship between network servers facilitates efficient
Wide Area Network management by reducing the amount of traffic between two
subnets on the same network. It also provides a single network server responsible for
all Strix devices within its subnet, which Manager/One users are redirected to if they
try to log into a non-master network server.
The master network server transmits time/date packets periodically to all Strix
devices using the Strix Time Distribution protocol, enabling all Strix network nodes
and wireless modules to be synchronized.
Welcome to Access/One Network
15
Access / One® Network
Communicating Across Remote Subnets
Access/One Network can be configured to enable communication between network
servers on remote subnets (for example, remote subnets in New York and Los
Angeles can be managed from the same Manager/One session). When network
servers are configured to communicate with each other across remote subnets, you
should expect the following behaviors from the system.
◗ If you decide to remove the NS to NS communication feature and just one
network server does not register the updated configuration during the reboot,
the network servers will continue to exchange information.
See also, “Starting a New Network” on page 32.
◗ In Manager/One, using the intuitive mouse-over feature on Network
Connects does not reveal their corresponding Client Connects. You can
access this information by connecting to remote network servers directly from
the Web.
Client Connect
Client Connect is the system topology that enables your Access/One Network to
support and provide access to client devices using 4.9 GHz Public Safety, 802.11a
or 802.11g wireless technologies. With Client Connect you can customize each
network node to support the wireless technologies you need in the locations you
need them. Any mix of these technologies can be supported within a single node or
across the entire Access/One Network.
Whether users carry a notebook, PDA, barcode reader, or other WLAN device, they
are able to stay continually connected to the network as they roam. No special
software is needed on the device, and no special configuration is required to remain
connected.
Each network node is capable of supporting multiple Client Connect modules of any
type and technology mix. This versatility of design provides you with a wide variety
of configuration options to meet all your user connectivity needs. And support of
future wireless technologies is as simple as adding a new Client Connect module.
16
Welcome to Access/One Network
Access / One® Network
Network Connect
Network Connect is the system infrastructure used by your Access/One Network for
wired or wireless connection to an existing wired network (small or large). Each
node within the Access/One Network can utilize a wired Ethernet or wireless
module (802.11a or 802.11g) for node interconnectivity or connection to a wired
legacy network.
When nodes in your Access/One Network are configured for wireless Network
Connect, the system provides several distinct advantages over a typical wireless
network that uses wired connections. These advantages include:
◗ Secure networking
◗ Self tuning, rapid self-healing, and rogue device detection
◗ Scalability
◗ Simple installation
◗ Lowest cost of deployment
Unlike traditional wired Ethernet LAN/WAN connections used by access points and
WLAN switches, Access/One Network’s wireless Network Connect option provides
an advanced level of security between the network node and the LAN/WAN. By
default, the wireless Network Connect link utilizes AES encryption with a secret key
and cannot be compromised.
Wireless Workgroups (IWS only)
Wireless Workgroups enable wired Ethernet users to take full advantage of the
wireless capabilities of Access/One Network. By connecting stationary users to the
wired Ethernet ports within a network node, wired users can have access to all of the
benefits that Access/One Network offers. The advantages of this option include:
◗ Connecting stationary users throughout the network without incurring the
time and expense associated with providing individual wiring drops.
◗ Enables user workgroups in remote locations to connect to your Access/One
Network where wired connectivity may not be feasible.
Welcome to Access/One Network
17
Access / One® Network
Offering a Rich Technology Base
Access/One Network provides many technology features, most of which are
transparent to the user but nonetheless instrumental to the smooth and efficient
operation of the network. In addition to some of the key features and functionality
already mentioned, here are just a few more, organized alphabetically and by
functional area:
IWS and OWS Hardware
◗ Dual Band Radio Modules
The OWS supports dual band radio module configurations, where a single
module offers 4.9 GHz Public Safety/802.11a and 802.11g wireless
technologies. IWS modules operate as either 802.11a or 802.11g radios (not
both).
◗ Integrated Base Module and Lightning Protection (OWS only)
By integrating the Base Module and lightning protection circuitry, power
distribution within the OWS enclosure is more efficient and the expansion
capability of the module stack has been broadened.
◗ Minimal Mechanical Components
Both the IWS and OWS have been designed with minimal mechanical
components to reduce the risk of mechanical failure, while maintaining the
highest standards of construction and durability.
Manager/One
◗ Configurable Tools
Users can configure tools within Manager/One to help them personalize their
use of the interface and use it more efficiently and effectively.
◗ Intuitive Mouse-Over
An intuitive mouse-over feature assists you with navigation and provides
detailed information at your fingertips. For example, when you roll over an
icon, the color of the icon changes and a pop-up window appears that
contains important information about the device associated with the icon.
18
Welcome to Access/One Network
Access / One® Network
◗ Monitors
A comprehensive choice of monitors is included within the Manager/One
interface, including AP monitoring, Network Connect monitoring, wireless
client monitoring, and rogue device monitoring.
◗ Multi-View Management Interface
The Manager/One interface offers a standard graphical view of the network
and its components, or a logical mesh view that allows you to see a graphical
representation of the relationship between the wired and wireless segments of
the network.
◗ Segment View
This feature provides a window into each Ethernet connection segment
within the network, with a choice of views (list or icon). Simply choose the
view you prefer with a click of the mouse.
System and Security
◗ Easy Rollback to Factory Defaults
Allows network administrators to re-establish factory default configuration
settings via the simple click of a button.
◗ GPS Positioning
Allows you to enter a GPS location (in degrees) and vertical elevation for a
specific node. This information is displayed in Manager/One, the Command
Line Interface, and SNMP.
◗ Inventory Control
Once the mesh network is formed an inventory list is created on the network
server and distributed to all Strix devices participating in the network. The
inventory list is used for bi-directional authentication of network devices
whenever they communicate with each other. For obvious security reasons,
any devices that are not part of the inventory list cannot participate in
network topology building, exchanging configuration information, or
managing Strix devices.
Welcome to Access/One Network
19
Access / One® Network
◗ MIBs and Secure Remote Management
Access/One Network supports the 802.11 MIB (Management Information
Base), as well as various Strix proprietary MIBs. Any MIB I or MIB II compliant
SNMP management console (such as CiscoWorks or HP OpenView) can be
used to manage your network remotely and securely. Network management
sessions running through SSH (Secure SHell) or HTTPs (secure HTTP) ensures
that the session is fully encrypted and cannot be compromised by
unauthorized users.
◗ Multiple Ethernet Segments
Network servers operate across existing Ethernet switches, routers, hubs and
other wired Ethernet segments without the need for special equipment or
VLAN tagging.
◗ Network Server Security
Management traffic on the Ethernet between the network server and module
is automatically encrypted to prevent “listening” on the LAN/WAN. When set
to the automatic mode, the network server will communicate with wireless
modules over an unencrypted connection while maintaining a secure
connection throughout the rest of the wired network.
◗ Power-over-Ethernet (IWS only)
Each network node uses a Base Module that provides power via an external
AC adapter, and includes up to four 10/100 Fast Ethernet ports for wired
network connectivity. When present, one of the Ethernet ports supports
Power-over-Ethernet (PoE) technology. PoE eliminates the need for a power
cord by delivering the necessary power to a device via a standard CAT5
Ethernet cable.
◗ Priority/One
User-definable Class of Service (CoS) filters enforce end-to-end Quality of
Service characteristics throughout the Strix network, including VLAN
priorities, IP TOS and IP Protocol. CoS classifies packets by examining their
parameters or CoS markings, then placing packets in queues of different
priorities based on predefined criteria.
20
Welcome to Access/One Network
Access / One® Network
◗ RADIUS Accounting
Through a wireless interface, Access/One Network supports RFC 2866
standard RADIUS (Remote Authentication Dial-In User Service) accounting,
allowing customers with existing RAS Radius-parsing scripts/tools to leverage
their investment as well as customize their tools to extract all available
statistical information.
◗ Syslog Support
Access/One Network offers comprehensive Syslog (system logging)
functionality, including the ability to monitor Syslog events. Logged events
can be sent to multiple Syslog servers, though using more than one server can
impact the system’s performance.
◗ VirtualStrix
Access/One Network nodes support the 802.1Q VLAN tagging of wireless
frames based on SSID or station MAC address. This is achieved by assigning a
specific VLAN number and priority level to each frame generated by a
particular station. Nodes support up to 16 simultaneous SSIDs and users can
enable or suppress the broadcasting of SSID information. Security parameters
can be applied for each SSID tied to a VLAN definition, including Open,
802.1x (WEP) and WPA for authentication, and Clear, WEP, TKIP and AES for
encryption. During 802.1x authentication, VLAN information is retrieved
from the RADIUS server and applied on a per-station basis.
◗ Zero Configuration Networking
In the absence of a DHCP server, Strix modules will automatically select
unique IP addresses, enabling users to statically configure the modules and
manage the Strix network (IP gateway, DNS server or DHCP server IP
addresses must be properly configured).
Welcome to Access/One Network
21
Access / One® Network
Wireless
◗ Public Safety Support (4.9 GHz)
Access/One Network now allocates 50 MegaHertz (MHz) of spectrum in the
4940-4990 MHz (4.9 GHz) band in support of Public Safety applications.
◗ Active WLAN Associations
Each radio can support 128 WLAN associations, with the OWS dual radio
able to support 256 WLAN associations (128 x 4.9 GHz Public Safety or 128
x 802.11a, and 128 x 802.11g).
◗ Channel Coordination
To prevent conflicting channel assignments, each radio within an IWS or
OWS product coordinates channel selection with any neighboring radios
running the same technology (4.9 GHz Public Safety, 802.11a or 802.11g).
◗ Super G™
Access/One Network supports Super G technology offering data rates up to
108Mbps, compatible with the 802.11g (54 Mbps) wireless technology.
◗ Wi-Fi Channel List
Specific Wi-Fi channels (or a set of channels) can be defined that will be
scanned for AP and backhaul operation.
◗ Wi-Fi Client Query
This feature provides the option of querying the network in search of Wi-Fi
clients, based on a matching MAC address or any client showing an RSSI
value less than -85 dBm. Query results are displayed in a table that can be
sorted by the user.
Hardware Specifications
Data sheets contain the most up-to-date specifications for the Strix family of Indoor
Wireless System (IWS) and Outdoor Wireless System (OWS) products. These data
sheets can be downloaded from our Web site at: http://www.strixsystems.com.
22
Welcome to Access/One Network

Source Exif Data:
File Type                       : PDF
File Type Extension             : pdf
MIME Type                       : application/pdf
PDF Version                     : 1.4
Linearized                      : No
XMP Toolkit                     : 3.1-701
Producer                        : Acrobat Distiller 7.0.5 (Windows)
Create Date                     : 2007:02:13 11:53:44-08:00
Modify Date                     : 2007:02:13 11:53:44-08:00
Metadata Date                   : 2007:02:13 11:53:33-08:00
Creator Tool                    : PScript5.dll Version 5.2
Document ID                     : uuid:F6238DE29BBBDB1188B6BF68D2D80615
Instance ID                     : uuid:8f439534-b576-4d98-9e98-f8b17b3dc4f7
Derived From Document Name      : uuid:3b3638c3-110d-4ab7-adfa-3a99605cabfe
Derived From Document ID        : uuid:9d56702e-3ec3-409a-bdfe-ab13ae37719b
Format                          : application/postscript
Title                           : accessone_userguide.book
Creator                         : Bill Wareing
Page Count                      : 50
Author                          : Bill Wareing
EXIF Metadata provided by EXIF.tools
FCC ID Filing: RFM-OWS2430-90

Navigation menu