VPN Systems VPN350 Wireless LAN Adapter (Unlicensed) User Manual ap350scgb
VPN Systems, Inc. Wireless LAN Adapter (Unlicensed) ap350scgb
Contents
- 1. Users Manual
- 2. Correspondence 24174 Question 1 Users Manual Section 1
- 3. Correspondence 24174 Question 1 Users Manual Section 2
Correspondence 24174 Question 1 Users Manual Section 2
Chapter 4 Security Setup Setting Up MAC-Based Authentication Step 4 If you plan to create a MAC address list that will be checked by the authentication server, select Yes for the option called Lookup MAC Address on Authentication Server if not in Existing Filter List. With this option enabled, the access point checks the authentication server’s MAC address list when a client device attempts to authenticate. Step 5 Click Apply to save the list of MAC addresses in the access point management system. Step 6 Click the Authentication Server link to go to the Authenticator Configuration page. Figure 4-11 shows the Authenticator Configuration page. Figure 4-11 Authenticator Configuration Page You can configure up to four servers for authentication services, so you can set up backup authenticators. If you set up more than one server for the same service, the server first in the list is the primary server for that service, and the others are used in list order when the previous server times out. Step 7 Enter the name or IP address of the authentication server in the Server Name/IP entry field. Cisco Aironet Access Point Software Configuration Guide OL-0657-07 4-31 Chapter 4 Security Setup Setting Up MAC-Based Authentication Step 8 Enter the port number the server uses for authentication. The default setting, 1812, is the port setting for Cisco’s RADIUS server, the Cisco Secure Access Control Server (ACS), and for many other RADIUS servers. Check your server’s product documentation to find the correct port setting. Step 9 Enter the shared secret used by the server in the Shared Secret entry field. The shared secret on the bridge must match the shared secret on the server. Step 10 Enter the number of seconds the access point should try contacting the primary authentication server in the Timeout entry field. If the primary authentication server does not respond within this time, the access point tries to contact the backup authentication server if one is specified. Step 11 Select MAC Address Authentication under the server. If you set up a backup authentication server, select MAC Address Authentication under the backup server, also. Step 12 Click OK. You return automatically to the Setup page. Step 13 Create a list of allowed MAC addresses for your authentication server. Enter the MAC addresses of all allowed clients as users in the server’s database. The “Enabling MAC-Based Authentication in Cisco Secure ACS” section on page 4-35 describes how to create a list of MAC addresses for your RADIUS server. Note Step 14 Be sure to include your own MAC address in the authentication server’s list. Click Advanced in the AP Radio row of the Network Ports section at the bottom of the Setup page. The AP Radio Advanced page appears. Figure 4-12 shows the AP Radio Advanced page. Cisco Aironet Access Point Software Configuration Guide 4-32 OL-0657-07 Chapter 4 Security Setup Setting Up MAC-Based Authentication Figure 4-12 AP Radio Advanced Page Step 15 Select Disallowed from the pull-down menu for Default Unicast Address Filter for each authentication type requiring MAC-based authentication. For example, if the access point is configured for both open and Network-EAP authentication, you could set Default Unicast Address Filter under Open to Disallowed but leave Default Unicast Address Filter under Network-EAP set to Allowed. This configuration forces client devices using open authentication to authenticate using MAC addresses but does not force LEAP-enabled client devices to authenticate using MAC addresses. To force all client devices to authenticate using MAC addresses, select Disallowed for all the enabled authentication types. Cisco Aironet Access Point Software Configuration Guide OL-0657-07 4-33 Chapter 4 Security Setup Setting Up MAC-Based Authentication When you set Default Unicast Address Filter to disallowed, the access point discards all unicast traffic except packets sent to the MAC addresses listed as allowed on the authentication server or on the access point’s Address Filters page. Note Step 16 Client devices associated to the access point are not immediately affected when you set Default Unicast Address Filter to disallowed. Click OK. You return automatically to the Setup page. Client devices that associate with the access point will not be allowed to authenticate unless their MAC addresses are included in the list of allowed addresses. Authenticating Client Devices Using MAC Addresses or EAP You can set up the access point to authenticate client devices using a combination of MAC-based and EAP authentication. When you enable this feature, client devices that associate to the access point using 802.11 open authentication first attempt MAC authentication. If MAC authentication succeeds, the client device joins the network; if the client is also using EAP authentication, it attempts to authenticate using EAP. If MAC authentication fails, the access point waits for the client device to attempt EAP authentication. Follow these steps to combine MAC-based and EAP authentication for client devices using 802.11 open authentication: Step 1 Follow the steps in the “Setting Up EAP Authentication” section on page 4-19 to set up EAP. You must select Require EAP under Open authentication on the AP Radio Data Encryption page to force client devices to perform EAP athentication if they fail MAC authentication. If you do not select Require EAP, client devices that fail MAC authentication might be able to join the network without performing EAP authentication. Step 2 Follow the steps in the “Setting Up MAC-Based Authentication” section on page 4-29 to set up MAC-based authentication. Step 3 Follow this link path to reach the Address Filters page: a. On the Summary Status page, click Setup. b. On the Setup page, click Address Filters under Associations. Cisco Aironet Access Point Software Configuration Guide 4-34 OL-0657-07 Chapter 4 Security Setup Setting Up MAC-Based Authentication Step 4 Select yes for the option called Is MAC Authentication alone sufficient for a client to be fully authenticated? Step 5 Click Apply. When you enable this feature, the access point follows these steps to authenticate all clients that associate using 802.11 open authentication: a. When a client device sends an authentication request to the access point, the access point sends a MAC authentication request in the RADIUS Access Request Packet to the RADIUS server using the client’s user ID and password as the MAC address of the client. b. If the authentication succeeds, the client joins the network. If the client is also using EAP authentication, it attempts to authenticate using EAP. c. If MAC authentication fails for the client, the access point allows the client to attempt to authenticate using EAP authentication. The client cannot join the network until EAP authentication succeeds. Enabling MAC-Based Authentication in Cisco Secure ACS Cisco Secure Access Control Server for Windows NT/2000 Servers (Cisco Secure ACS) can authenticate MAC addresses sent from the access point. The access point works with ACS to authenticate MAC addresses using Secure Password Authentication Protocol (Secure PAP). You enter a list of approved MAC addresses into the ACS as users, using the client devices’ MAC addresses as both the username and password. The authentication server’s list of allowed MAC addresses can reside on the authentication server or at any network location to which the server has access. Follow these steps to create a list of allowed MAC addresses in Cisco Secure ACS: Step 1 On the ACS main menu, click User Setup. Step 2 When the User text box appears, enter the MAC address you want to add to the list. Cisco Aironet Access Point Software Configuration Guide OL-0657-07 4-35 Chapter 4 Security Setup Setting Up MAC-Based Authentication Note The access point sends MAC address queries to the server using lower-case characters. If your server allows case-sensitive usernames and passwords, you must enter MAC addresses in the server’s database using lower-case characters. Step 3 When the User Setup screen appears, enter the MAC address in the Cisco Secure PAP Password and Confirm Password entry fields. Step 4 Enter the MAC address in the CHAP/MS-CHAP/ARAP Password and Confirm Password entry fields. Step 5 Select the Separate (CHAP/MS-CHAP/ARAP) checkbox. Step 6 Click Submit. Repeat these steps for each MAC address you want to add to the list of allowed MAC addresses. MAC addresses that you enter in the authentication server’s list appear in the access point’s address filter list when the client device is associated to the access point. MAC addresses in the server’s list disappear from the access point’s list when the client devices disassociate or when the access point is reset. Note Be sure to include your own MAC address in the authentication server’s list to avoid losing connectivity to the access point. Cisco Aironet Access Point Software Configuration Guide 4-36 OL-0657-07 Chapter 4 Security Setup Summary of Settings for Authentication Types Summary of Settings for Authentication Types Table 4-5 lists the access point settings required to enable each authentication type and combinations of authentication types. Table 4-5 Settings for Authentication Types Authentication Types Required Settings LEAP On the Authenticator Configuration page (shown in Figure 4-13): • Select an 802.1x protocol draft that matches the protocol draft used by client devices that associate with the access point. • Enter the name or IP address, type, port, shared secret, and timeout value for your RADIUS server. • Select the EAP checkbox under the server. On the AP Radio Data Encryption page (shown in Figure 4-6): LEAP and static WEP under 802.11 Open • Select the Network-EAP checkbox. • Enter a WEP key in key slot 1 and select 128-bit from the key size menu. • Enter all the settings for LEAP authentication. On the AP Radio Data Encryption page (shown in Figure 4-6): • Select the Open checkbox. Cisco Aironet Access Point Software Configuration Guide OL-0657-07 4-37 Chapter 4 Security Setup Summary of Settings for Authentication Types Table 4-5 Settings for Authentication Types (continued) Authentication Types Required Settings EAP-TLS and EAP-MD5 On the Authenticator Configuration page (shown in Figure 4-13): • Select an 802.1x protocol draft that matches the protocol draft used by client devices that associate with the access point. • Enter the name or IP address, type, port, shared secret, and timeout value for your RADIUS server. • Select the EAP checkbox under the server. On the AP Radio Data Encryption page (shown in Figure 4-6): EAP-TLS, EAP-MD5, and static WEP under 802.11 Open • Select the Open and Network-EAP checkboxes. • Select the Require EAP checkbox under Open. Note Selecting Require EAP blocks non-EAP client devices from using the access point. • Enter a WEP key in key slot 1 and select 128-bit from the key size pull-down menu. The access point does not support this combination of authentication types. When you select Require EAP on the Authenticator Configuration page to authenticate clients using EAP-TLS and EAP-MD5, non-EAP client devices are blocked from using the access point. However, the access point can serve client devices using 802.11 open authentication if the access point is set up for MAC-based authentication and EAP authentication. See the “Authenticating Client Devices Using MAC Addresses or EAP” section on page 4-34 for instructions on setting up this combination of authentications. Cisco Aironet Access Point Software Configuration Guide 4-38 OL-0657-07 Chapter 4 Security Setup Summary of Settings for Authentication Types Table 4-5 Settings for Authentication Types (continued) Authentication Types Required Settings MAC-based On the Address Filters page (shown in Figure 4-10): • Select yes for the “Look up MAC address on authentication server if not in existing filter list” setting. On the Authenticator Configuration page (shown in Figure 4-13): • Select an 802.1x protocol draft that matches the protocol draft used by client devices that associate with the access point. • Enter the name or IP address, type, port, shared secret, and timeout value for your RADIUS server. • Select the MAC Address Authentication checkbox under the server. Note You can use the same server for both EAP authentication and MAC-based authentication. On the AP Radio Advanced page (shown in Figure 4-12): MAC-based and EAP-TLS and EAP-MD5 • Select Disallowed from the pull-down menu for Default Unicast Address Filter for each authentication type requiring MAC-based authentication. • Enter the settings for the EAP authentication types you need to support; select Require EAP on the AP Radio Data Encryption page under Open. • Enter the settings for MAC-based authentication. On the Address Filters page (shown in Figure 4-10): MAC-based and LEAP • Select yes for the setting called “Is MAC Authentication alone sufficient for a client to be fully authenticated?” • Enter the settings for LEAP. • Enter the settings for MAC-based authentication. Cisco Aironet Access Point Software Configuration Guide OL-0657-07 4-39 Chapter 4 Security Setup Setting Up Backup Authentication Servers Setting Up Backup Authentication Servers You can configure up to four servers for authentication services on the Authenticator Configuration page, so you can set up backup authenticators. If you set up more than one server for the same service, the server first in the list is the primary server for that service, and the other servers are used in list order when the previous server times out. If a backup server responds after the primary server fails, the access point continues to use the backup server for new transactions. Follow these steps to set up a backup authentication server: Step 1 Complete the steps in the “Setting Up EAP Authentication” section on page 4-19 or the “Setting Up MAC-Based Authentication” section on page 4-29 to set up your primary authentication server. Step 2 On the Authenticator Configuration page, enter information about your backup server in one of the entry field groups under the completed entry fields for your primary server: Step 3 a. Enter the name or IP address of the backup server in the Server Name/IP entry field. b. Enter the port number the server uses for authentication. The default setting, 1812, is the port setting for Cisco’s RADIUS server, the Cisco Secure Access Control Server (ACS), and for many other RADIUS servers. Check your server’s product documentation to find the correct port setting. c. Enter the shared secret used by the server in the Shared Secret entry field. The shared secret on the bridge must match the shared secret on the server. d. Enter the number of seconds the access point should try contacting the backup server in the Timeout entry field. If this backup server does not respond within this time, the access point tries to contact the next backup server on the list. If you don’t have another backup server configured, the access point tries to contact the original primary authentication server. e. Select the same authentication methods as those selected on the primary server. Click OK. You return automatically to the Setup page. Figure 4-13 shows a primary authentication server and a backup server configured on the Authenticator Configuration page. Cisco Aironet Access Point Software Configuration Guide 4-40 OL-0657-07 Chapter 4 Security Setup Setting Up Administrator Authorization Figure 4-13 Authenticator Configuration Page with Primary and Backup Servers Setting Up Administrator Authorization Administrator authorization protects the access point management system from unauthorized access. Use the access point’s user management pages to define a list of users who are authorized to view and change the access point management system. Use the Security Setup page to reach the user management pages. Figure 4-14 shows the Security Setup page. Note Creating a list of users authorized to view and change the access point management system does not affect the ability of client devices to associate with the access point. Cisco Aironet Access Point Software Configuration Guide OL-0657-07 4-41 Chapter 4 Security Setup Setting Up Administrator Authorization Figure 4-14 Security Setup Page Follow this link path to reach the Security Setup page: 1. On the Summary Status page, click Setup. 2. On the Setup page, click Security. Creating a List of Authorized Management System Users Follow these steps to create a list of users authorized to view and change the access point management system: Step 1 Follow the link path to the Security Setup page. Step 2 On the Security Setup page, click User Information. Figure 4-15 shows the User Information page. Figure 4-15 User Information Page Cisco Aironet Access Point Software Configuration Guide 4-42 OL-0657-07 Chapter 4 Security Setup Setting Up Administrator Authorization Step 3 Click Add New User. The User Management window appears. Figure 4-16 shows the User Management window. Figure 4-16 User Management Window Step 4 Enter a username and password for the new user. Step 5 Select the capabilities you want to assign to the new user. Capabilities include: • Write—The user can change system settings. When you assign Write capability to a user, the user also automatically receives Admin capability. • SNMP—Designates the username as an SNMP community name. SNMP management stations can use this SNMP community name to perform SNMP operations. The User Manager does not have to be enabled for SNMP communities to operate correctly. Note • Selecting the SNMP checkbox does not grant SNMP write capability to the user; it only designates the username as an SNMP community name. SNMP operations performed under the username are restricted according to the username’s other assigned capabilities. Ident—The user can change the access point's identity settings (IP address and SSID). When you assign Ident capability to a user, the user also automatically receives Write and Admin capabilities. Cisco Aironet Access Point Software Configuration Guide OL-0657-07 4-43 Chapter 4 Security Setup Setting Up Administrator Authorization • Firmware—The user can update the access point's firmware. When you assign Firmware capability to a user, the user also automatically receives Write and Admin capabilities. • Admin—The user can view most system screens. To allow the user to view all system screens and make changes to the system, select Write capability. Step 6 Click Apply. The User Management window disappears, and the new user appears in the user list on the User Information page. Step 7 Click the browser’s Back button to return to the Security Setup page. On the Security Setup page, click User Manager. The User Manager Setup page appears. Figure 4-17 shows the User Manager Setup page. Figure 4-17 User Manager Setup Page Step 8 Select User Manager: Enabled to restrict use of the access point management system to users in the user list. Note You must define a full administrator user—a user with write, identity, and firmware capabilities—before you can enable the user manager. Use the other settings on the User Manager Setup page to add more restrictions for the management system: • Allow Read-Only Browsing without Login—Select yes to allow any user to view the access point’s basic screens. Select no to restrict access to all of the access point’s screens to only the users in the user list. Cisco Aironet Access Point Software Configuration Guide 4-44 OL-0657-07 Chapter 4 Security Setup Setting Up Administrator Authorization • Step 9 Protect Legal Credit Page—Select yes to restrict access to the Legal Credits page to users in the user list. Select no to allow any user to view the Legal Credits page. Click OK. You return automatically to the Security Setup page. Cisco Aironet Access Point Software Configuration Guide OL-0657-07 4-45 Chapter 4 Security Setup Setting Up Administrator Authorization Cisco Aironet Access Point Software Configuration Guide 4-46 OL-0657-07 C H A P T E R Network Management This section describes how to browse to other devices on your network, how to use Cisco Discovery Protocol with your wireless networking equipment, how to assign a specific network port to a MAC address, and how to enable wireless network accounting. This chapter contains the following sections: • Using the Association Table, page 5-2 • Using the Network Map Window, page 5-11 • Using Cisco Discovery Protocol, page 5-13 • Assigning Network Ports, page 5-14 • Enabling Wireless Network Accounting, page 5-16 Cisco Aironet Access Point Software Configuration Guide OL-0657-07 5-1 Chapter 5 Network Management Using the Association Table Using the Association Table The management system’s Association Table page lists all the devices, both wireless and wired to the root LAN, of which the access point is aware. Figure 5-1 shows an example of the Association Table page. Figure 5-1 Association Table Page Click the Association link at the top of any main management system page to go to the Association Table. Note You can also use the Association Table page in the command-line interface. Browsing to Network Devices To browse to a device’s browser-based interface, click the device’s IP address in the IP Addr. column. The home page of the device’s management system appears. Cisco Aironet access points, bridges, and workgroup bridges have browser-based interfaces, and many servers and printers have them, also. If the device does not have a browser-based interface, click the device’s MAC address in the MAC Addr. column. A Station page appears for the device, displaying the information the access point knows about the device, including the device’s identity and statistics on traffic to and from the device. Some devices, such as PC card client adapters, do not have browser-based interfaces. Cisco Aironet Access Point Software Configuration Guide 5-2 OL-0657-07 Chapter 5 Network Management Using the Association Table Setting the Display Options You use the display options to select the device types to be listed in the table. The default selections list only the access point and any devices with which it is associated. To change the selections, click a display option and then click Apply. To modify the table further, click additional display filters, which is a link to the Association Table Filters page. You use the Association Table Filters page to select the columns of information that appear in the Association Table and the order in which devices are listed. For more information on customizing the Association Table display, read the “Association Table Display Setup” section on page 3-62. Using Station Pages Click a device’s MAC address in the Association Table’s MAC Addr. column to display a Station page for the device. Station pages provide an overview of a network device’s status and data traffic history. The information on a Station page depends on the device type; a Station page for an access point, for example, contains different information than the Station page for a PC card client adapter. You can also use the Station page to perform pings and link tests for network devices. Figure 5-2 shows a sample Station page for a PC card client adapter. Cisco Aironet Access Point Software Configuration Guide OL-0657-07 5-3 Chapter 5 Network Management Using the Association Table Figure 5-2 Station Page 209.165.201.5 Cisco Aironet Access Point Software Configuration Guide 5-4 OL-0657-07 Chapter 5 Network Management Using the Association Table Information on Station Pages Station Identification and Status The yellow table at the top of the Station page lists the following information: • System Name—The name assigned to the device. • Device—The type and model number of the device. • MAC Address—A unique identifier assigned by the manufacturer. • IP Address—The device’s IP address. When you click the IP address link, the browser attempts to display the device’s home page. Cisco Aironet access points, bridges, and workgroup bridges have browser-based interfaces, and many servers and printers have them also. • State—Displays the operational state of the wireless station. Possible states include: – Assoc—The station is associated with an access point. Client stations associated with this access point will also show an Association Identifier (AID) value that is an index into a table of stations associated with this access point. Maximum AID count is 2007. – Unauth—The station is not authenticated with any access point. – Auth—The station is authenticated with an access point. – Local Auth—The station has authenticated at least once with this access point. • Class—This field displays the type of station. Station types include: – AP—An access point. – Client, PS Client—A client or power-save client station. – Bridge, Bridge R—A bridge or a root bridge. – Rptr—A repeater. – Mcast—A multicast address. – Infra—An infrastructure node, typically a workstation with a wired connection to the Ethernet network. Cisco Aironet Access Point Software Configuration Guide OL-0657-07 5-5 Chapter 5 Network Management Using the Association Table • Status—This field indicates the device’s operating status. Possible statuses include: – OK—The device is operating properly. – EAP Pending – EAP Autenticated – IP Forwarding Agent – BootP/DHCP Client—The device is using BOOTP or DHCP protocol – ARP Proxy Server – IP Virtual Router – WEP—WEP is enabled on the device. To Station Information Fields in the To Station column in the second table on the Station page contain the following information: • Alert—Click this box if you want detailed packet trace information captured for the Association Table page. This option is only available to users with Administrator capability. • Packets OK—Reports the number of good packets coming to the station. • Total Bytes OK—Reports the number of good bytes coming to the station. • Total Errors—Reports the total number of packet errors coming to the station. • Max. Retry Pkts.—Reports the number of times data packets have reached the maximum long or short retry number. Set the maximum RTS value on the AP Radio Hardware page; see the “Entering Radio Hardware Information” section on page 3-21 for instructions. • RTS (Short) Retries—Reports the number of times the RTS packet had to be retried. • Data (Long) Retries—Reports the number of times the data packet had to be retried. Cisco Aironet Access Point Software Configuration Guide 5-6 OL-0657-07 Chapter 5 Network Management Using the Association Table From Station Information Fields in the To Station column contain the following information: • Alert—Click this box if you want detailed packet trace information captured for the Association Table page. This option is only available to users with Administrator capability. • Packets OK—Reports the number of good packets sent from the station. • Total Bytes OK—Reports the number of good bytes sent from the station. • Total Errors—Reports the total number of packet errors sent from the station. • WEP Errors—Reports the number of encryption errors sent from the station. Rate, Signal, and Status Information The table under the To and From Station table lists rate, signal, and status information for the device. Data rate and signal quality information appears on Station pages for client devices. On Station pages for access points, this area shows network information such as system uptime. • Parent—Displays the system name of the device to which the client, bridge or repeater is associated. The entry [self] indicates that the device is associated with this access point. • Current Rate—Reports the current data transmission rate. If the station is having difficulty communicating with the access point, this might not be the highest operational rate. • Latest Retries—Tally of short and long data retries. • Next Hop—If repeater access points are used on the network, this field names the next access point in the repeater chain. • Operational Rates—The data transmission rates in common between the access point and the station. • Latest Signal Strength—Displays the current index of radio signal quality. The following four fields appear only on the Station page for an access point: • Stations Associated—Displays, by number and class, all stations associated with the access point. Cisco Aironet Access Point Software Configuration Guide OL-0657-07 5-7 Chapter 5 Network Management Using the Association Table • Uptime—Displays the cumulative time the device has been operating since the last reset. • Software Version—Displays the version level of Cisco software on the device. • Announcement Packets—Total number of Announcement packets since the device was last reset. Hops and Timing Information The table at the bottom of the Station page lists information on the chain of devices, if any, between the device and the wired LAN, on the monitoring timeout for the device, and on the time of the most recent system activity. • Hops to Infra.—The number of devices between this station and the network infrastructure. • Activity Timeout—Total time that can elapse after the access point’s last data receipt before the access point presumes the client device has been turned off. See the “Association Table Advanced Page” section on page 3-66 for information on setting timeouts for each device class. • Communication Over Interface—The network port over which the access point or bridge is communicating with the device. • Echo Packets—The link test sequence number; it lists the total number of link test packets sent to this station. • Latest Activity—Elapsed time in hours, minutes, and seconds since the station and the access point last communicated. All zeros means there is current communication. Performing Pings and Link Tests Use the ping and link test buttons to perform pings and link tests on the device. If the device is associated to the access point through which you reached the Station page, the link test button and packet fields appear. If the device is not associated with the access point, only the ping button and packet fields appear. Cisco Aironet Access Point Software Configuration Guide 5-8 OL-0657-07 Chapter 5 Network Management Using the Association Table Performing a Ping Follow these steps to ping the device described on the Station page: Step 1 To customize the size and number of packets sent during the ping, enter the number of packets and size of the packets in the Number of Pkts. and Pkt. Size fields. Step 2 Click Ping. The ping runs using the values in the Number of Pkts. and Pkt. Size fields, and a ping window appears listing the test results. To run the ping again, click Test Again. Figure 5-3 shows a ping window. Figure 5-3 Ping Window Performing a Link Test Follow these steps to perform a link test between the access point and the device described on the Station page: Step 1 To customize the size and number of packets sent during the link test, enter the number of packets and size of the packets in the Number of Pkts. and Pkt. Size fields. Step 2 Click Link Test. The link test runs using the values in the Number of Pkts. and Pkt. Size fields. Cisco Aironet Access Point Software Configuration Guide OL-0657-07 5-9 Chapter 5 Network Management Using the Association Table Note If you need to stop the link test before the test is complete, click Stop Test. A results window appears listing the test results. To run the test again, click Test Again. To run a continuous link test, click Continuous Test. Figure 5-4 shows a link test results window. Figure 5-4 Link Test Results Window Clearing and Updating Statistics Use the Clear Stats and Refresh buttons to clear and update the Station page statistics. • Clear Stats—Clears all packet, octet and error counts and resets the counters to 0. • Refresh—Updates the counts to their latest accumulated values, and saves the Alert selections. Cisco Aironet Access Point Software Configuration Guide 5-10 OL-0657-07 Chapter 5 Network Management Using the Network Map Window Deauthenticating and Disassociating Client Devices Use the Deauthenticate and Disassociate buttons to deauthenticate and disassociate the client device from the access point. These buttons appear only on Station pages for devices that are associated with the access point, and only users with administrator capability can operate them. • Deauthenticate—Forces a client to re-authenticate with the access point. • Disassociate—Allows a client to break its current association, re-evaluate the currently associated access point and determine which of the surrounding access points has the best signal quality to associate with. Using the Network Map Window To open the Network Map window, click Map at the top of any management system page. (See the “Navigating Using the Map Windows” section on page 2-4 for information about the Map page.) When the Map window appears, click Network Map. You use the Network Map window to open a new browser window displaying information for any device on your wireless network. Unlike the Association Table, the Network Map window does not list wired devices on your LAN. Figure 5-5 shows the Network Map window. Note Your Internet browser must have Java enabled to use the map windows. Cisco Aironet Access Point Software Configuration Guide OL-0657-07 5-11 Chapter 5 Network Management Using the Network Map Window Figure 5-5 Network Map Window Click the name of a wireless device to open a new browser window displaying a Station page displaying the access point’s local information for that device. Click Go beside the device name to open a new browser window displaying that device’s home page, if available. Some devices, such as PC card clients, do not have browser-based interfaces. Click show clients to display all the wireless client devices on your network. The client names appear under the access point or bridge with which they are associated. If clients are displayed, click hide clients to display only non-client devices. Cisco Aironet Access Point Software Configuration Guide 5-12 OL-0657-07 Chapter 5 Network Management Using Cisco Discovery Protocol Using Cisco Discovery Protocol Cisco Discovery Protocol (CDP) is a device-discovery protocol that runs on all Cisco network equipment. Each device sends identifying messages to a multicast address, and each device monitors the messages sent by other devices. Information in CDP packets is used in network management software such as CiscoWorks2000. Use the CDP Setup page to adjust the access point’s CDP settings. CDP is enabled by default. Figure 5-6 shows the CDP Setup page. Figure 5-6 CDP Setup Page Follow this link path to reach the CDP Setup page: 1. On the Summary Status page, click Setup. 2. On the Setup page, click Cisco Services. 3. On the Cisco Services Setup page, click Cisco Discovery Protocol (CDP). Cisco Aironet Access Point Software Configuration Guide OL-0657-07 5-13 Chapter 5 Network Management Assigning Network Ports Settings on the CDP Setup Page The CDP Setup page contains the following settings: • Enabled/Disabled—Select Disabled to disable CDP on the access point; select Enabled to enable CDP on the access point. CDP is enabled by default. • Packet hold time—The number of seconds other CDP-enabled devices should consider the access point’s CDP information valid. If other devices do not receive another CDP packet from the access point before this time elapses they should assume that the access point has gone offline. The default value is 180. The packet hold time should always be greater than the value in the “Packets sent every” field. • Packets sent every—The number of seconds between each CDP packet the access point sends. The default value is 60. This value should always be less than the packet hold time. • Individual Port Enable: Ethernet—When selected, the access point sends CDP packets through its Ethernet port and monitors the Ethernet for CDP packets from other devices. • Individual Port Enable: AP Radio—This checkbox appears when the access point radio is linked to another radio infrastructure device, such as an access point or a bridge. When selected, the access point sends CDP packets through the radio port and monitors the radio for CDP packets from other devices. MIB for CDP A MIB file is available for use with CDP. The filename is CISCO-CDP-MIB.my, and you can download the MIB at the following URL: http://www.cisco.com/public/mibs Assigning Network Ports Use the Port Assignments page to assign a specific network port to a repeater access point or to a non-root bridge. When you assign specific ports, your network topology remains constant even when devices reboot. Figure 5-7 shows the Port Assignments page. Cisco Aironet Access Point Software Configuration Guide 5-14 OL-0657-07 Chapter 5 Network Management Assigning Network Ports Figure 5-7 Port Assignments Page Follow this link path to reach the Port Assignments page: 1. On the Summary Status page, click Setup. 2. On the Setup page, click Port Assignments in the Association section near the top of the page. Cisco Aironet Access Point Software Configuration Guide OL-0657-07 5-15 Chapter 5 Network Management Enabling Wireless Network Accounting Settings on the Port Assignments Page • ifIndex—Lists the port’s designator in the Standard MIB-II (RFC1213-MIB.my) interface index. • dot1dBasePort—Lists the port’s designator in the Bridge MIB (RFC1493; BRIDGE-MIB.my) interface index. • AID—Lists the port’s 802.11 radio drivers association identifier. • Station—Enter the MAC address of the device to which you want to assign the port in the port’s Station entry field. When you click Apply or OK, the port is reserved for that MAC address. Enabling Wireless Network Accounting You can enable accounting on the access point to send network accounting information about wireless client devices to a RADIUS server on your network. Cisco Secure ACS writes accounting records to a log file or to a database daily. Consult the Cisco Secure ACS 2.6 for Windows 2000/NT Servers User Guide for instructions on viewing and downloading the log or database: http://www.cisco.com/univercd/cc/td/doc/product/access/acs_soft/csacs4nt/csnt2 6/index.htm If you have a UNIX server, use this URL to browse to the CiscoSecure ACS 2.3 for UNIX User Guide: http://www.cisco.com/univercd/cc/td/doc/product/access/acs_soft/cs_unx/csu23 ug/index.htm Note RADIUS accounting is available in firmware versions 11.10T and later, which are available on Cisco.com. You can download Cisco Aironet firmware releases at http://www.cisco.com/public/sw-center/sw-wireless.shtml. Use the Accounting Setup page to enable and set up accounting on the access point. Figure 5-8 shows the Accounting Setup page. Cisco Aironet Access Point Software Configuration Guide 5-16 OL-0657-07 Chapter 5 Network Management Enabling Wireless Network Accounting Figure 5-8 Accounting Setup Page Follow this link path to reach the Accounting Setup page: 1. On the Summary Status page, click Setup. 2. On the Setup page, click Accounting under Services. Settings on the Accounting Setup Page The Accounting Setup page contains these settings: • Enable accounting—Select Enabled to turn on accounting for your wireless network. • Enable delaying to report stop—Select this option to delay sending a stop report to the server when a client device disassociates from the access point. The delay reduces accounting activity for client devices that disassociate from the access point and then quickly reassociate. Cisco Aironet Access Point Software Configuration Guide OL-0657-07 5-17 Chapter 5 Network Management Enabling Wireless Network Accounting • Minimum delay time to report stop (sec.)—Enter the number of seconds the access point waits before sending a stop report to the server when a client device disassociates from the access point. The delay reduces accounting activity for client devices that disassociate from the access point and then quickly reassociate. • Server Name/IP—Enter the name or IP address of the server to which the access point sends accounting data. • Server Type—Select the server type from the pull-down menu. RADIUS is the only menu option; additional types will be added in future software releases. • Port—The communication port setting used by the access point and the server. The default setting, 1813, is the correct setting for Cisco Aironet access points and Cisco secure ACS. • Timeout (sec.)—Enter the number of seconds the access point should wait before giving up contacting the server. If the server does not respond within this time, the access point tries to contact the next accounting server in the list if one is specified. The access point uses backup servers in list order when the previous server times out. • Enable Update—Click the Enable Update checkbox to enable accounting update messages for wireless clients. With updates enabled, the access point sends an accounting start message when a wireless client associates to the access point, sends updates at regular intervals while the wireless client is associated to the access point, and sends an accounting stop message when the client disassociates from the access point. With updates disabled, the access point sends only accounting start and accounting stop messages to the server. • Update Delay—Enter the update interval in seconds. If you use 360, the default setting, the access point sends an accounting update message for each associated client device every 6 minutes. • Use accounting server for—Select the authentication types for which you want to collect accounting data. When you select EAP authentication, the access point sends accounting data to the server for client devices that authenticate using Cisco Aironet LEAP, EAP-TLS, or EAP-MD5. When you select non-EAP authentication, the access point sends data to the server for client devices using authentication types other than EAP, such as open, shared key, or MAC-based authentication. Cisco Aironet Access Point Software Configuration Guide 5-18 OL-0657-07 Chapter 5 Network Management Enabling Wireless Network Accounting Accounting Attributes Table 5-1 lists the accounting attributes the access point sends to the accounting server. Table 5-1 Accounting Attributes the Access Point Sends to the Accounting Server Attribute Definition Acct-Status-Type The client device’s current accounting status; possible statuses include ACCT_START, ACCT_STOP, and ACCT_UPDATE. The access point sends an ACCT_START frame to the accounting server when a client device successfully authenticates on a RADIUS server through the access point; the access point sends an ACCT_STOP frame to the server when a client device disassociates from the access point; and the access point sends an ACCT_UPDATE frame to the server periodically while the authenticated client device is associated to the access point. Acct-Session-ID A unique accounting identifier for each connection activity that is bounded by ACCT_START and ACCT_STOP. The access point sends this attribute to the server with all three status types. User-Name The username with which the client device’s authenticated to the network. The access point sends this attribute to the server with all three status types. NAS-Port The port number used for the client device’s connection. The access point sends this attribute to the server with all three status types. Acct-Authentic The method with which the client device is authenticated to the network. This value is always 1, which represents RADIUS authentication. The access point sends this attribute to the server with all three status types. Cisco Aironet Access Point Software Configuration Guide OL-0657-07 5-19 Chapter 5 Network Management Enabling Wireless Network Accounting Table 5-1 Accounting Attributes the Access Point Sends to the Accounting Server (continued) Attribute Definition NAS-Identifier The network access server (NAS) sending the accounting data; for wireless networks, the name of the access point sending the accounting information. The access point sends this attribute to the server with all three status types. Acct-Session-Time The elapsed time in seconds that the client device has been associated to the access point. The access point sends this attribute only with the ACCT_STOP and ACCT_UPDATE status types. Acct-Input-Octets The number of octets received on the wireless network through the access point since the client device associated to the access point. The access point sends this attribute only with the ACCT_STOP and ACCT_UPDATE status types. Acct-Output-Octets The number of octets sent on the wireless network through the access point since the client device associated to the access point. The access point sends this attribute only with the ACCT_STOP and ACCT_UPDATE status types. Acct-Input-Packets The number of packets received on the wireless network through the access point since the client device associated to the access point. The access point sends this attribute only with the ACCT_STOP and ACCT_UPDATE status types. Acct-Output-Packets The number of packets sent on the wireless network through the access point since the client device associated to the access point. The access point sends this attribute only with the ACCT_STOP and ACCT_UPDATE status types. Acct-Terminate-Cause How the client device’s session was terminated. This attribute lists the same cause for every disassociated client device: Loss of service. The access point sends this attribute only with the ACCT_STOP status type. Cisco Aironet Access Point Software Configuration Guide 5-20 OL-0657-07 Chapter 5 Network Management Enabling Wireless Network Accounting Table 5-1 Accounting Attributes the Access Point Sends to the Accounting Server (continued) Attribute Definition Acct-Delay-Time The delay between the time the event occurred and the time that the attribute was sent to the server. The access point sends this attribute to the server with all three status types. RADIUS_IPADR The IP address of the access point sending the accounting information. The access point sends this attribute to the server with all three status types. Cisco Aironet Access Point Software Configuration Guide OL-0657-07 5-21 Chapter 5 Network Management Enabling Wireless Network Accounting Cisco Aironet Access Point Software Configuration Guide 5-22 OL-0657-07 C H A P T E R Managing Firmware and Configurations This section describes how to update the firmware version on the access point, how to distribute firmware to other access points, how to distribute the access point’s configuration to other access points, and how to download, upload, and reset the access point configuration. You use the Cisco Services Setup page as a starting point for all these activities. This chapter contains the following sections: • Updating Firmware, page 6-2 • Distributing Firmware, page 6-8 • Distributing a Configuration, page 6-9 • Downloading, Uploading, and Resetting the Configuration, page 6-11 Cisco Aironet Access Point Software Configuration Guide OL-0657-07 6-1 Chapter 6 Managing Firmware and Configurations Updating Firmware Updating Firmware You use the Cisco Services Setup page to update the access point’s firmware. You can perform the update by browsing to a local drive or by using FTP to update the firmware from a file server. Figure 6-1 shows the Cisco Services Setup page. Figure 6-1 Cisco Services Setup Page Follow this link path in the browser interface to reach the Cisco Services Setup page: 1. On the Summary Status page, click Setup. 2. On the Setup page, click Cisco Services Setup. Updating with the Browser from a Local Drive When you update the firmware with your browser, you browse to your hard drive or to a mapped network drive for the new firmware. You can update the three firmware components—the management system firmware, the firmware web pages, and the radio firmware—individually or all at once. It is simplest to update all the components at once, but in some situations you might want to update them individually. Cisco Aironet Access Point Software Configuration Guide 6-2 OL-0657-07 Chapter 6 Managing Firmware and Configurations Updating Firmware Full Update of the Firmware Components To update all the firmware components at the same time, click Through Browser on the Fully Update Firmware line on the Cisco Services Setup page. The Update All Firmware Through Browser page appears. Figure 6-2 shows the Update All Firmware Through Browser page. Figure 6-2 Update All Firmware Through Browser Page Follow these steps to update all three firmware components through the browser: Step 1 If you know the exact path and filename of the new firmware image file, type it in the New File for All Firmware entry field. If you aren’t sure of the exact path to the new firmware image file, click Browse... next to the New File entry field. When the File Upload window appears, go to the directory that contains the firmware image file and select the file. Click Open. Step 2 When the filename for the new firmware appears in the New File entry field, click Browser Update Now to load and install the new firmware. When the update is complete, the access point automatically reboots. Cisco Aironet Access Point Software Configuration Guide OL-0657-07 6-3 Chapter 6 Managing Firmware and Configurations Updating Firmware Selective Update of the Firmware Components To update firmware components individually, click Through Browser on the Selectively Update Firmware line on the Cisco Services Setup page. The Update Firmware Through Browser page appears. Figure 6-3 shows the Update Firmware Through Browser page. Figure 6-3 Update Firmware Through Browser Page Follow these steps to update one of the three firmware components through the browser: Step 1 If you know the exact path and filename of the new firmware component, type it in the New File for [component] entry field. If you aren’t sure of the exact path to the new component, click Browse... next to the component’s New File entry field. When the File Upload window appears, go to the directory that contains the component and select the file. Click Open. Step 2 When the filename for the new component appears in the New File entry field, click Browser Update Now to load and install the new component. When the update is complete, the AP automatically reboots. Cisco Aironet Access Point Software Configuration Guide 6-4 OL-0657-07 Chapter 6 Managing Firmware and Configurations Updating Firmware Updating from a File Server When you update the firmware from a file server, you load new firmware through FTP or TFTP from a file server. You can update the three firmware components—the management system firmware, the firmware web pages, and the radio firmware—individually or all at once. It is simplest to update all the components at once, but in some situations you might want to update them individually. Full Update of the Firmware Components To update all the firmware components at the same time, click From File Server on the Fully Update Firmware line on the Cisco Services Setup page. The Update All Firmware From File Server page appears. Figure 6-4 shows the Update All Firmware From File Server page. Figure 6-4 Update All Firmware From File Server Page Follow these steps to update all three firmware components from a file server: Step 1 Click the File Server Setup link to enter the FTP settings. The FTP Setup page appears. Figure 6-5 shows the FTP Setup page. Cisco Aironet Access Point Software Configuration Guide OL-0657-07 6-5 Chapter 6 Managing Firmware and Configurations Updating Firmware Figure 6-5 Step 2 FTP Setup Page Enter the FTP settings on the FTP Setup page. a. Select FTP or TFTP from the File Transfer Protocol pull-down menu. FTP (File Transfer Protocol) is the standard protocol that supports transfers of data between local and remote computers. TFTP (Trivial File Transfer Protocol) is a relatively slow, low-security protocol that requires no user name or password. b. In the Default File Server entry field, enter the IP address of the server where the access point should look for FTP files. c. In the FTP Directory entry field, enter the directory on the server where FTP files are located. d. In the FTP User Name entry field, enter the user name assigned to the FTP server. If you selected TFTP, you can leave this field blank. e. In the FTP Password entry field, enter the password associated with the user name. If you selected TFTP, you can leave this field blank. f. Click OK. You return automatically to the Update All Firmware Through File Server page. Step 3 On the Update All Firmware Through File Server page, type the filename of the new firmware image file in the New File for All Firmware entry field. Step 4 Click Browser Update Now to load and install the new firmware. When the update is complete, the access point automatically reboots. Cisco Aironet Access Point Software Configuration Guide 6-6 OL-0657-07 Chapter 6 Managing Firmware and Configurations Updating Firmware Selective Update of the Firmware Components To update firmware components individually, click From File Server on the Selectively Update Firmware line on the Cisco Services Setup page. The Update Firmware From File Server page appears. Figure 6-6 shows the Update Firmware From File Server page. Figure 6-6 Update Firmware From File Server Page To update one of the three firmware components from the file server, follow the steps listed in the “Full Update of the Firmware Components” section on page 6-5, but in Step 3, type the filenames of the firmware components you want to update in the components’ entry fields. Click Browser Update Now to load and install the new firmware. When the update is complete, the access point automatically reboots. Cisco Aironet Access Point Software Configuration Guide OL-0657-07 6-7 Chapter 6 Managing Firmware and Configurations Distributing Firmware Distributing Firmware You use the Distribute Firmware page to distribute the access point’s firmware to other Cisco Aironet access points. Figure 6-7 shows the Distribute Firmware page. The access point sends its firmware to all the access points on your network that: • Are running access point firmware version 10.00 or newer • Can detect the IP multicast query issued by the distributing access point (network devices such as routers can block multicast messages) • Have their web servers enabled for external browsing (see the “Entering Web Server Settings and Setting Up Access Point Help” section on page 3-53) • Have the same HTTP port setting as the distributing access point (the HTTP port setting is on the Web Server Setup page) • Have a Default Gateway setting other than the default setting, which is 255.255.255.255 (the Default Gateway setting is on the Express Setup and Routing Setup pages) • If they have User Manager enabled, contain in their User Lists a user with the same user name, password, and capabilities as the user performing the distribution (the person logged in on the distributing access point) Figure 6-7 Distribute Firmware Page Follow this link path in the browser interface to reach the Distribute Firmware page: 1. On the Summary Status page, click Setup. Cisco Aironet Access Point Software Configuration Guide 6-8 OL-0657-07 Chapter 6 Managing Firmware and Configurations Distributing a Configuration 2. On the Setup page, click Cisco Services Setup. 3. On the Cisco Services page, click Distribute Firmware to other Cisco Devices. Follow these steps to distribute firmware to other access points: Step 1 Follow the link path to reach the Distribute Firmware page. Step 2 To distribute all three firmware components at once, verify that yes is selected for Distribute All Firmware. This is the default setup for the Distribute Firmware page. To distribute the firmware components individually, select no for Distribute All Firmware, and click the checkboxes for the components you want to distribute. Step 3 Click Start. The access point’s firmware is distributed to the access points on your network. To cancel the distribution, click Abort. When the distribution is complete, the access points that received the firmware automatically reboot. Distributing a Configuration You use the Distribute Configuration page to distribute the access point’s configuration to other Cisco Aironet access points. Figure 6-8 shows the Distribute Configuration page. The access point sends its entire system configuration except for its IP identity information and its User List. The configuration is sent and applied to all the access points on your network that: • Are running access point firmware version 10.05 or newer • Can detect the IP multicast query issued by the distributing access point (network devices such as routers can block multicast messages) • Have their web servers enabled for external browsing (see the “Entering Web Server Settings and Setting Up Access Point Help” section on page 3-53) • Have the same HTTP port setting as the distributing access point (the HTTP port setting is on the Web Server Setup page) Cisco Aironet Access Point Software Configuration Guide OL-0657-07 6-9 Chapter 6 Managing Firmware and Configurations Distributing a Configuration • Have a Default Gateway setting other than the default setting, which is 255.255.255.255 (the Default Gateway setting is on the Express Setup and Routing Setup pages) • If they have User Manager enabled, contain in their User Lists a user with the same user name, password, and capabilities as the user performing the distribution (the person logged in on the distributing access point) Figure 6-8 Distribute Configuration Page Follow this link path in the browser interface to reach the Distribute Configuration page: 1. On the Summary Status page, click Setup. 2. On the Setup page, click Cisco Services Setup. 3. On the Cisco Services page, click Distribute Configuration to other Cisco Devices. Follow these steps to distribute the access point’s configuration to other access points: Step 1 Follow the link path to reach the Distribute Configuration page. Step 2 Click Start. The access point’s configuration, except for its IP identity and its User List, is distributed to the access points on your network. To cancel the distribution, click Abort. Cisco Aironet Access Point Software Configuration Guide 6-10 OL-0657-07 Chapter 6 Managing Firmware and Configurations Downloading, Uploading, and Resetting the Configuration Downloading, Uploading, and Resetting the Configuration You use the System Configuration Setup page to download the current access point configuration to a local drive, upload a configuration from a local drive or file server, and reset the configuration to default settings. You can also use the System Configuration Setup page to restart the access point. Figure 6-9 shows the System Configuration Setup page. Figure 6-9 System Configuration Setup Page Follow this link path in the browser interface to reach the System Configuration Setup page: 1. On the Summary Status page, click Setup. 2. On the Setup page, click Cisco Services Setup. 3. On the Cisco Services page, click Manage System Configuration. Cisco Aironet Access Point Software Configuration Guide OL-0657-07 6-11 Chapter 6 Managing Firmware and Configurations Downloading, Uploading, and Resetting the Configuration Downloading the Current Configuration Follow these steps to download the access point’s current configuration to your hard drive or to a mapped network drive: Step 1 Follow the link path to the System Configuration Setup page. Step 2 If your web browser is Microsoft Windows Internet Explorer, use the download configuration links to save the configuration file: • Click Download System Configuration Except IP Identity to save an .ini file containing the current configuration except for the access point’s IP address. • To save the current non-default configuration including the access point’s IP address, click Download Non-Default System Configuration. • To save the current default and non-default configuration including the access point’s IP address, click Download All System Configuration. If your web browser is Netscape Communicator, use your right mouse button to click the download configuration links and select Save link as in the pop-up menu. If you click the links with your left mouse button, Netscape Communicator displays the text file but does not open the Save as window. Step 3 When the Save as window appears, select the drive and directory where you want to save the file, and provide a filename for the configuration file. Click Save. Uploading a Configuration You can upload a configuration file to the access point from your hard drive or a mapped network drive, or you can upload a configuration from a file server. Uploading from a Local Drive Follow these steps to upload a configuration file from your hard drive or a mapped network drive: Cisco Aironet Access Point Software Configuration Guide 6-12 OL-0657-07 Chapter 6 Managing Firmware and Configurations Downloading, Uploading, and Resetting the Configuration Step 1 Follow the link path in the browser interface to reach the System Configuration Setup page. Step 2 If you know the exact path and filename of the configuration file, type it in the Additional System Configuration File entry field. If you aren’t sure of the exact path to the configuration file, click Browse... next to the entry field. When the File Upload window appears, go to the directory that contains the configuration file and select the file. Click Open. Step 3 When the filename appears in the Additional System Configuration File entry field, click Browser Update Now. The configuration file is loaded and applied in the access point. Uploading from a File Server Follow these steps to upload a configuration file from a file server: Step 1 Before you load a configuration file from a server, you need to enter FTP settings for the server. If you have already entered the FTP settings, skip to Step 3. Follow this link path in the browser interface to reach the FTP Setup page: a. On the Summary Status page, click Setup b. On the Setup page, click FTP The FTP Setup page appears. Figure 6-10 shows the FTP Setup page. Cisco Aironet Access Point Software Configuration Guide OL-0657-07 6-13 Chapter 6 Managing Firmware and Configurations Downloading, Uploading, and Resetting the Configuration Figure 6-10 FTP Setup Page Step 2 Enter the FTP settings on the FTP Setup page. a. Select FTP or TFTP from the File Transfer Protocol pull-down menu. FTP (File Transfer Protocol) is the standard protocol that supports transfers of data between local and remote computers. TFTP (Trivial File Transfer Protocol) is a relatively slow, low-security protocol that requires no user name or password. b. In the Default File Server entry field, enter the IP address of the server where the access point should look for FTP files. c. In the FTP Directory entry field, enter the directory on the server where FTP files are located. d. In the FTP User Name entry field, enter the user name assigned to the FTP server. If you selected TFTP, you can leave this field blank. e. In the FTP Password entry field, enter the password associated with the user name. If you selected TFTP, you can leave this field blank. f. Click OK. You return automatically to the Setup page. Step 3 Follow the link path in the web browser to reach the System Configuration Setup page. Step 4 Click Read Config File From Server. The management system checks the server for several possible configuration filenames while attempting to load the configuration file. If the management system doesn’t find the first filename, it continues to the next until it finds the file and loads it. It checks the server for the following names in the following order: a. [system name].ini Cisco Aironet Access Point Software Configuration Guide 6-14 OL-0657-07 Chapter 6 Managing Firmware and Configurations Downloading, Uploading, and Resetting the Configuration b. [IP address].ini c. [boot file from DHCP/BOOTP server].ini d. [boot file from DHCP/BOOTP server].ini by TFTP Resetting the Configuration You can reset the access point configuration to the default settings without resetting the access point’s IP identity, or you can reset the configuration to the default settings including the IP identity. If you reset the access point’s IP identity, however, you might lose your browser connection to the access point. Two buttons on the System Configuration Setup page reset the configuration to defaults: • Reset System Factory Defaults Except IP Identity—this button returns all access point settings to their factory defaults except: – The access point’s IP address, subnet mask, default gateway, and boot protocol – The users in the User Manager list – The SNMP Administrator Community name • Reset All System Factory Defaults—this button returns all access point settings to their factory defaults except: – The users in the User Manager list – The SNMP Administrator Community name Note To completely reset all access point settings to defaults, follow the steps in the “Resetting to the Default Configuration” section on page 9-44. Follow these steps to reset the configuration to default settings: Step 1 Follow the link path to reach the System Configuration Setup page. Figure 6-9 shows the System Configuration Setup page. The link path is listed under Figure 5-9. Cisco Aironet Access Point Software Configuration Guide OL-0657-07 6-15 Chapter 6 Managing Firmware and Configurations Downloading, Uploading, and Resetting the Configuration Step 2 Click Reset System Factory Defaults Except IP Identity to reset the access point configuration to the default settings without resetting the access point’s IP identity. Click Reset All System Factory Defaults to reset the configuration to the default settings including the IP identity. Note If you reset the access point’s IP identity, you might lose your browser connection to the access point. Restarting the Access Point Use the System Configuration Setup page to restart the access point. • Click “Warm” Restart System Now to perform a warm restart of the access point. A warm restart reboots the access point. • Click “Cold” Restart System Now to perform a cold restart of the access point. A cold restart is the equivalent of removing and then reapplying power for the access point. Cisco Aironet Access Point Software Configuration Guide 6-16 OL-0657-07 C H A P T E R Management System Setup This chapter explains how to set up your access point to use SNMP, Telnet, or the console port to manage the access point. This chapter contains the following sections: • SNMP Setup, page 7-2 • Console and Telnet Setup, page 7-5 Cisco Aironet Access Point Software Configuration Guide OL-0657-07 7-1 Chapter 7 Management System Setup SNMP Setup SNMP Setup Use the SNMP Setup page to configure the access point to work with your network’s SNMP station. Figure 7-1 shows the SNMP Setup page. Figure 7-1 SNMP Setup Page Follow this link path to reach the SNMP Setup page: 1. On the Summary Status page, click Setup. 2. On the Setup page, click SNMP in the Services section of the page. Settings on the SNMP Setup Page The SNMP Setup page contains the following settings: • Simple Network Management Protocol (SNMP)—Select Enabled to use SNMP with the access point. • System Description—The system's device type and current version of firmware. Cisco Aironet Access Point Software Configuration Guide 7-2 OL-0657-07 Chapter 7 Management System Setup SNMP Setup • System Name—The name of the access point. The name in this field is reported to your SNMP's management station as the name of the device when you use SNMP to communicate with the access point. • System Location—Use this field to describe the physical location of the access point, such as the building or room in which it is installed. • System Contact—Use this field to name the system administrator responsible for the access point. • SNMP Trap Destination—The IP address of the SNMP management station. If your network uses DNS, enter a host name that resolves into an IP address. • SNMP Trap Community—The SNMP community name required by the trap destination before it records traps sent by the access point. The Browse Management Information Base (MIB) link at the bottom of the SNMP Setup page leads to the Database Query page. Using the Database Query Page Use the Database Query page to to find and change the value of many access point managed objects. Figure 7-2 shows the Database Query page. Figure 7-2 Database Query Page Follow this link path to reach the Database Query page: 1. On the Summary Status page, click Setup. 2. On the Setup page, click SNMP in the Services section of the page. 3. On the SNMP Setup page, click Browse Management Information Base (MIB). Cisco Aironet Access Point Software Configuration Guide OL-0657-07 7-3 Chapter 7 Management System Setup SNMP Setup Settings on the Database Query Page The Database Query page contains the following entry fields and buttons: • OID—Type the object identifier (OID) in the OID field. You can use the integer or ASCII version of the OID. If you use the integer version of the OID, you must type the entire OID string (1.3.7.2.13.78.5.6, for example). If you use the ASCII name, you can often use the object's name as specified in the appropriate MIB (enableSNMP, for example). • Value—When you click Get, the object's value appears in the Value field. If you want to assign a value to an object, you type an SNMP value in this field and click Set. • Get—Click Get to find an object's value. • Set—Click Set to assign a value to an object. • Reset—Click Reset to return the page to default settings. Changing Settings with the Database Query Page Follow these steps to change an access point setting from the Database Query page: Step 1 Type the object identifier (OID) in the OID field. You can use the integer or ASCII version of the OID. If you use the integer version of the OID, you must type the entire OID string (1.3.7.2.13.78.5.6, for example). If you use the ASCII name, you can often use the object's name as specified in the appropriate MIB (enableSNMP, for example). MIBs supported by the access point are listed in the “Supported MIBs” section on page 2-11. Step 2 Click Get. The current value for the setting appears in the Value field. Step 3 Modify the value in the Value field. Step 4 Click Set. The new value is set on the access point. Note If the object is read-only, the value is not changed when you click Set. Cisco Aironet Access Point Software Configuration Guide 7-4 OL-0657-07 Chapter 7 Management System Setup Console and Telnet Setup Console and Telnet Setup Use the Console/Telnet Setup page to configure the access point to work with a terminal emulator or through Telnet. Figure 7-3 shows the Console/Telnet Setup page. Figure 7-3 Console/Telnet Setup Page Follow this link path to reach the Console/Telnet Setup page: 1. On the Summary Status page, click Setup. 2. On the Setup page, click Console/Telnet in the Services section of the page. Settings on the Console/Telnet Page The Console/Telnet Setup page contains the following settings: • Baud Rate—The rate of data transmission expressed in bits per second. Select a baud rate from 110 to 115,200, depending on the capability of the computer you use to open the access point management system. • Parity—An error-detecting process based on the addition of a parity bit to make the total number of bits Odd or Even. The default setting, None, uses no parity bit. Cisco Aironet Access Point Software Configuration Guide OL-0657-07 7-5 Chapter 7 Management System Setup Console and Telnet Setup • Data Bits—The default setting is 8. • Stop Bits—The default setting is 1. • Flow Control—Defines the way that information is sent between pieces of equipment to prevent loss of data when too much information arrives at the same time on one device. The default setting is SW Xon/Xoff. • Terminal Type—The preferred setting is ANSI, which offers graphic features such as reverse video buttons and underlined links. Not all terminal emulators support ANSI, so the default setting is Teletype. • Columns—Defines the width of the terminal emulator display within the range of 64 characters to 132 characters. Adjust the value to get the optimum display for your terminal emulator. • Lines—Defines the height of the terminal emulator display within the range of 16 characters to 50 characters. Adjust the value to get the optimum display for your terminal emulator. • Enable Telnet—The default setting is Yes. Select No to prevent Telnet access to the management system. Cisco Aironet Access Point Software Configuration Guide 7-6 OL-0657-07 C H A P T E R Special Configurations This chapter describes how to set up the access point in network roles other than as a root unit on a wired LAN. You can set up an access point as a repeater to extend the range of a wireless network, and you can use Hot Standby mode to use an access point as a backup unit in areas where you need extra reliability. Both configurations require two access points that support and rely upon each other. This chapter contains the following sections: • Setting Up a Repeater Access Point, page 8-1 • Using Hot Standby Mode, page 8-6 Setting Up a Repeater Access Point A repeater access point is not connected to the wired LAN; it is placed within radio range of an access point connected to the wired LAN to extend the range of your infrastructure or to overcome an obstacle that blocks radio communication. The repeater forwards traffic between wireless users and the wired LAN by sending packets to either another repeater or to an access point connected to the wired LAN. The data is sent through the route that provides the greatest performance for the client. When you configure an access point as a repeater, the access point’s Ethernet port does not forward traffic. Figure 8-1 shows an access point acting as a repeater. Note Non-Cisco client devices might have difficulty communicating with repeater access points. Cisco Aironet Access Point Software Configuration Guide OL-0657-07 8-1 Chapter 8 Special Configurations Setting Up a Repeater Access Point Figure 8-1 Access Point as Repeater Access Point (Root Unit) Wired LAN 45836 Access Point (Repeater) You can set up a chain of several repeater access points, but throughput for client devices at the end of the repeater chain will be quite low. Because each repeater must receive and then re-transmit each packet on the same channel, throughput is cut in half for each repeater you add to the chain. Omni-directional antennas, like the ones that ship with your access point, are best suited for repeater access points. Cisco Aironet Access Point Software Configuration Guide 8-2 OL-0657-07 Chapter 8 Special Configurations Setting Up a Repeater Access Point If you use EAP authentication on your wireless network, you can set up the repeater access point to authenticate using LEAP. See the “Setting up a Repeater Access Point as a LEAP Client” section on page 4-27 for instructions on enabling LEAP on a repeater. Follow these steps to set up a repeater access point: Step 1 Use the Quick Start Guide: Cisco Aironet Access Points and the information in this manual to set up an access point as a root unit on the wired LAN. Step 2 Write down the root-unit access point’s MAC address. The MAC address appears on the label on the bottom of the access point. Step 3 The repeater access point will need to duplicate some of the root access point’s settings. If the root access point has been completely configured, browse to the root access point and write down the following settings so you can refer to them when you set up the repeater access point: • SSID (found on the Express Setup page) • Default IP Subnet Mask (also on the Express Setup page) Note • You can also rely on the DHCP server to assign a default IP subnet mask. Default Gateway (also on the Express Setup page) Note You can also rely on the DHCP server to assign a default gateway. • Data rates (found on the AP Radio Hardware page) • WEP settings (found on the AP Radio Data Encryption page) • Authentication Types (found on the AP Radio Data Encryption page) If the root access point settings have not been changed from the factory defaults, you don’t need to write them down. If you reconfigure the root access point, however, you must enter the same settings on the repeater access point. Step 4 Place the repeater access point within radio range of the root access point. Step 5 For a 340 series access point, plug one end of the power cord into the access point’s power connector. Plug the other end into an electrical outlet. Cisco Aironet Access Point Software Configuration Guide OL-0657-07 8-3 Chapter 8 Special Configurations Setting Up a Repeater Access Point Step 6 Note Step 7 Note For a 350 series access point, plug an Ethernet cable into the access point’s Ethernet port. Plug the other end of the Ethernet cable into the side of the power injector labelled To AP. The repeater access point will not be connected to the wired LAN, so do not run Ethernet cable from the power injector to a switch. Plug the power injector’s power cable into an electrical outlet. Step 8, Step 9, and Step 10 describe opening the access point management system using a terminal emulator, but you can use a crossover cable instead. Use a crossover cable to connect the access point’s Ethernet port to the Ethernet connection on a computer and browse to the access point’s IP address. If you use a crossover cable to open the management system, skip to Step 11. Step 8 Attach a nine-pin, male-to-female, straight-through serial cable to the access point’s serial port. Plug the other end of the serial cable into the COM 1 or COM 2 port on a computer. Step 9 Use a terminal emulator to open the access point’s management system. Assign these port settings to the terminal emulator: 9600 baud, 8 data bits, No parity, 1 stop bit, and Xon/Xoff flow control. Step 10 When the terminal emulator connects with the access point, press = to display the access point’s Summary Status page. If the repeater access point has never been configured before, the Express Setup page will appear instead of the Summary Status page. Step 11 On the Express Setup page, enter the same SSID that is set on the root access point. Note Step 12 and Step 13 describe assigning a static IP address, subnet mask, and gateway to the repeater. However, you can rely on your DHCP server to assign these settings if you do not need them to remain fixed. If the repeater will use the DHCP server, skip to Step 14. Step 12 On the Express Setup page, enter a fixed IP address for the repeater access point in the Default IP address field. Cisco Aironet Access Point Software Configuration Guide 8-4 OL-0657-07 Chapter 8 Special Configurations Setting Up a Repeater Access Point Step 13 Also on the Express Setup page, enter the same settings in the Default IP Subnet Mask and Default Gateway fields that are on the root access point. Step 14 On the Boot Server Setup page, select none for the Configuration Server Protocol. This setting will maintain a fixed IP address for the repeater access point. If the root access point configuration has not been changed from the factory defaults, skip to Step 18. Step 15 On the AP Radio Hardware page, enter the same settings for Data Rates that are on the root access point. Step 16 On the AP Radio Data Encryption page, enter the same WEP key settings that are on the root access point. Step 17 Also on the AP Radio Data Encryption page, select the same Authentication Types that are on the root access point. Step 18 On the AP Radio Advanced page, enter the root access point’s MAC address in the Specified access point 1 entry field. Step 19 On the Express Setup page, select Repeater Access Point as the Role in Radio Network. The access point reboots when you apply this setting. Step 20 The status LED on the root access point should be steady green, indicating that at least one client device is associated with it. The status LED on the repeater access point is steady green when it is associated with the root access point and has client devices associated with it. The repeater’s status LED is steady for 7/8 of a second and off for 1/8 of a second when it is associated with the root access point but has no client devices associated with it. The repeater access point should also appear as associated with the root access point in the root access point’s Association Table. Cisco Aironet Access Point Software Configuration Guide OL-0657-07 8-5 Chapter 8 Special Configurations Using Hot Standby Mode Using Hot Standby Mode Hot Standby mode designates an access point as a backup for another access point. The standby access point is placed near the access point it monitors, configured exactly the same as the monitored access point. The standby access point associates with the monitored access point as a client and queries the monitored access point regularly through both the Ethernet and the radio. If the monitored access point fails to respond, the standby access point comes online and takes the monitored access point’s place in the network. Except for the IP address, the standby access point’s settings should be identical to the settings on the monitored access point. You use the Hot Standby page to set up the standby access point. Figure 8-2 shows the Hot Standby page. Figure 8-2 Hot Standby Page Follow this link path to reach the Hot Standby page: Note • On the Summary Status page, click Setup. • On the Setup page, click Cisco Services under Services. • On the Cisco Services Setup page, click Hot Standby Management. Wireless client devices associated to the standby access point lose their connections during the hot standby setup process. Cisco Aironet Access Point Software Configuration Guide 8-6 OL-0657-07 Chapter 8 Special Configurations Using Hot Standby Mode Follow these steps to enable Hot Standby mode: Step 1 Step 2 On the standby access point, duplicate the settings that are entered on the monitored access point. Critical settings include: • SSID (found on the Express Setup page) • Default IP Subnet Mask (also on the Express Setup page) • Default Gateway (also on the Express Setup page) • Data rates (found on the AP Radio Hardware page) • WEP settings (found on the AP Radio Data Encryption page) • Authentication Types (found on the AP Radio Data Encryption page) On the standby access point, browse to the AP Radio Identification page: a. On the Summary Status page, click Setup. b. On the Setup page, click Identification in the AP Radio row under Network Ports. Step 3 Select no for the Adopt Primary Port Identity option and click Apply. The access point reboots. Step 4 After the access point reboots, browse to the Hot Standby page. Step 5 Enter the monitored access point’s SSID in the Service Set ID entry field. Step 6 Enter the monitored access point’s MAC address in the MAC Address For the Monitored AP entry field. Step 7 Enter the number of seconds between each query the standby access point sends to the monitored access point. Step 8 Enter the number of seconds the standby access point should wait for a response from the monitored access point before it assumes that the monitored access point has malfunctioned. Step 9 Click Start Hot Standby Mode. The standby access point becomes a client device associated to the monitored access point. Step 10 Click the browser’s refresh button to verify that the Current State line on the Hot Standby Setup page states that Hot Standby is initialized. Cisco Aironet Access Point Software Configuration Guide OL-0657-07 8-7 Chapter 8 Special Configurations Using Hot Standby Mode Note If the monitored access point malfunctions and the standby access point takes its place, repeat the hot standby setup on the standby access point when you repair or replace the monitored access point. The standby access point does not revert to standby mode automatically. Cisco Aironet Access Point Software Configuration Guide 8-8 OL-0657-07 C H A P T E R Diagnostics and Troubleshooting This chapter describes the diagnostic pages in the management system and provides troubleshooting procedures for basic problems with the access point. For the most up-to-date, detailed troubleshooting information, refer to the Cisco TAC website at http://www.cisco.com/tac. Select Wireless LAN under Top Issues. Sections in this chapter include: • Using Diagnostic Pages, page 9-2 • Using Command-Line Diagnostics, page 9-20 • Tracing Packets, page 9-33 • Checking the Top Panel Indicators, page 9-38 • Checking Basic Settings, page 9-41 • Resetting to the Default Configuration, page 9-44 Cisco Aironet Access Point Software Configuration Guide OL-0657-07 9-1 Chapter 9 Diagnostics and Troubleshooting Using Diagnostic Pages Using Diagnostic Pages The management system contains three diagnostic pages that provide detailed statistics and event records for the access point: • The Radio Diagnostics Page provides the antenna alignment test and carrier test utilities. • The Network Ports Page lists statistics on data transmitted and received by the access point. • The Event Log Page lists network events. Each page is described in the sections below. Radio Diagnostics Page Use the Radio Diagnostics page to test antenna alignment between two wireless networking devices and to examine the radio spectrum in which the access point operates. The antenna alignment test helps you find the best alignment for a repeater access point’s directional antenna, and the carrier test helps you determine which radio frequencies contain the most radio activity and noise that could interfere with radio signals to and from the access point. Figure 9-1 shows the Radio Diagnostics page. Figure 9-1 Radio Diagnostics Page Follow this link path to reach the Radio Diagnostics page: 1. On the Summary Status page, click Diagnostics in the Network Ports row. 2. On the Cisco Network Diagnostics page, click Radio Diagnostics Tests. Cisco Aironet Access Point Software Configuration Guide 9-2 OL-0657-07 Chapter 9 Diagnostics and Troubleshooting Using Diagnostic Pages Antenna Alignment Test The antenna alignment test measures signal strength and quality between a repeater access point and other wireless networking devices. For best results during the antenna alignment test, turn off all wireless networking devices within range of the access point except the device with which you are trying to align the access point’s antenna. Watch the constantly updated display in the Alignment Test window as you adjust the antenna. You can run the antenna alignment test only on access points configured with the following Role in Radio Network settings: • Repeater Access Point • Site Survey Client To run the antenna alignment test on a root access point, change the Role in Radio Network setting on the Express Setup page. Choose the number of seconds you want the alignment test to run from the Antenna Alignment Test Timeout pull-down menu. Choose a test duration of 15, 30, 45, or 60 seconds. The Antenna Alignment Test window appears when you click Start Antenna Alignment Test, and the access point begins to send broadcast probe packets. Wireless networking devices with the same SSID as the access point send probe responses to the access point, and the access point measures the quality of the signal between the devices. Figure 9-2 shows an example Antenna Alignment Test window. Cisco Aironet Access Point Software Configuration Guide OL-0657-07 9-3 Chapter 9 Diagnostics and Troubleshooting Using Diagnostic Pages Figure 9-2 Antenna Alignment Test Window In this example, only one wireless networking device is in range of the access point, making it easy to see the relevant data. If results for several devices were displayed, it would be difficult to focus on the device with which you were trying to align the access point’s antenna. Each data sample is listed in the data columns. The columns provide the following information: • ID—The sequence number of the data sample. The most recent sample appears at the top of the column. • Name—The system name of each device in the alignment test. • Address—The MAC address of each device in the alignment test. • Signal Strength—The signal strength between the access point and the other device. The left side of the Strength column displays the percentage of signal strength between the access point and the other device, and the right side of the column displays signal strength in dBm. Cisco Aironet Access Point Software Configuration Guide 9-4 OL-0657-07 Chapter 9 Diagnostics and Troubleshooting Using Diagnostic Pages • Signal Quality—The quality of the signal link between the access point and the other device. Carrier Test The carrier test measures the amount of radio activity on each frequency available to the access point. Use the carrier test to determine the best frequency for the access point to use. When you conduct a carrier test, make sure all wireless networking devices within range of the access point are operating to make the test results reflect a realistic radio environment. When you click Start Carrier Test, the radio scans the access point’s available frequencies and displays the radio activity in the Carrier Test window. Note The access point drops all associations with wireless networking devices during the carrier test. Figure 9-3 shows an example Carrier Test window. Figure 9-3 Carrier Test Window Cisco Aironet Access Point Software Configuration Guide OL-0657-07 9-5 Chapter 9 Diagnostics and Troubleshooting Using Diagnostic Pages The bar graph on the left side of the window displays the percentage used for each frequency; the highest current percentage used is labeled on the top left of the graph. In this example, the highest percentage used for any frequency is 92. The access point’s available frequencies are listed vertically across the bottom of the graph, from 2412 to 2462 GHz. The access point’s channel 1 is 2412 GHz, channel 2 is 2417 GHz, and so on up to channel 11, which is 2462 GHz. The bar graph on the right side of the window displays the amount of noise on each frequency. Noise is a measurement of the signal the radio receives when it is not receiving packets. Even in an environment in which the radio receives a great deal of noise, it might also receive a strong data signal. Click Stop Test in the window or on the Radio Diagnostics page to stop the test. Network Ports Page The Network Ports page contains a table listing information for the access point’s Ethernet and radio ports. Figure 9-4 shows a Network Ports page example. Cisco Aironet Access Point Software Configuration Guide 9-6 OL-0657-07 Chapter 9 Diagnostics and Troubleshooting Using Diagnostic Pages Figure 9-4 Network Ports Page Click the Network link at the top of any main management system page to reach the Network Ports page, or click Network Ports on the Summary Status home page. The Network Diagnostics link at the top of the Network Ports page leads to the Cisco Network Diagnostics page, where you can select diagnostic tests. The Network Ports table is divided into three sections: identifying information and status, data received, and data transmitted. Each row in the table is described below. Cisco Aironet Access Point Software Configuration Guide OL-0657-07 9-7 Chapter 9 Diagnostics and Troubleshooting Using Diagnostic Pages Identifying Information and Status • Name—Displays the name of the network interface port. An asterisk (*) next to the name identifies the port as the primary port for the access point. The port names are links to a detailed page for each port. See the “Ethernet Port Page” section on page 9-10 for information on the Ethernet Port page and the “AP Radio Page” section on page 9-13 for information on the AP Radio Port page. • Status—Displays one of three possible operating states for the port: – Up—The port is operating properly. – Down—The port is not operating. – Error—The port is operating but is in an error condition. • Max. Mb/s—The maximum rate of data transmission in megabits per second. • IP Addr.—The IP address for the port. When the access point is set up in standby mode the Ethernet and radio ports use different IP addresses. Use the AP Radio Identification page to assign an IP address to the radio port that is different from the Ethernet IP address. See the “Settings on the AP Radio Identification Page” section on page 3-19 for details on the AP Radio Identification page. • MAC (Media Access Control) Addr.—The Media Access Control (MAC) address is a unique identifier assigned to the network interface by the manufacturer. • Radio SSID—A unique identifier that client devices use to associate with the access point. The SSID helps client devices distinguish between multiple wireless networks in the same vicinity. • Unicast pkts.—The number of packets received in point-to-point communication. • Multicast pkts.—The number of packets received that were sent as a transmission to a set of nodes. • Total bytes—The total number of bytes received. • Errors—The number of packets determined to be in error. Data Received Cisco Aironet Access Point Software Configuration Guide 9-8 OL-0657-07 Chapter 9 Diagnostics and Troubleshooting Using Diagnostic Pages • Discards—The number of packets discarded by the access point due to errors or network congestion. • Forwardable pkts.—The number of packets received by the port that was acceptable or passable through the filters. • Filtered pkts.—The number of packets that were stopped or screened by the filters set up on the port. • Unicast pkts.—The number of packets transmitted in point-to-point communication. • Multicast pkts.—The number of packets transmitted that were sent as a transmission to a set of nodes. • Total bytes—Total number of bytes transmitted from the port. • Errors—The number of packets determined to be in error. • Discards—The number of packets discarded by the access point due to errors or network congestion. • Forwarded pkts.—The number of packets transmitted by the port that was acceptable or passable through the filters. Data Transmitted Cisco Aironet Access Point Software Configuration Guide OL-0657-07 9-9 Chapter 9 Diagnostics and Troubleshooting Using Diagnostic Pages Ethernet Port Page When you click Ethernet in the Network Ports table, the browser displays the Ethernet Port page. This page lists detailed statistics on the access point’s Ethernet port. Figure 9-5 shows an Ethernet Port page example. Figure 9-5 Ethernet Port Page 172.16.24.0 Like the Network Ports page, the Ethernet Port page lists statistics in a table divided into sections. Each row in the table is explained in the following sections. Cisco Aironet Access Point Software Configuration Guide 9-10 OL-0657-07 Chapter 9 Diagnostics and Troubleshooting Using Diagnostic Pages Configuration Information • The top row of the Configuration section of the table contains a Set Properties link that leads to the Ethernet Hardware page. • Status of “fec0”— “Fast Ethernet Controller” is part of Motorola's naming convention for the Ethernet device used by the access point. This field displays one of the three possible operating states for the port. The added term “primary” identifies the port as the primary port for the access point. Operating states include: – Up—The port is operating properly. – Down—The port is not operating. – Error—The port is in an error condition. • Maximum Rate (Mb/s)—Maximum rate of data transmission in megabits per second. • IP Address—The IP address of the port. • MAC Address—The unique identifier assigned to the access point by the manufacturer. • Duplex—The port’s duplex setting, either half or full. • Unicast Packets—The number of packets received in point-to-point communication. • Multicast Packets—The number of packets received that were sent as a transmission to a set of nodes. • Total Bytes—Total number of bytes received. • Total Errors—Total number of packets determined to be in error. • Discarded Packets—Packets discarded due to errors or network congestion. • Forwardable Packets—Packets received by the port that were acceptable or passable through the filters. • Filtered Packets—Packets that were stopped or screened by the filters set up on the port. • Packet CRC Errors—Cyclic redundancy check (CRC) errors that were detected in a received packet. Receive Statistics Cisco Aironet Access Point Software Configuration Guide OL-0657-07 9-11 Chapter 9 Diagnostics and Troubleshooting Using Diagnostic Pages • Carrier Sense Lost—The number of disconnects from the Ethernet network. Carrier sense lost events are usually caused by disconnected wiring. • Late Collisions—Packet errors that probably were caused by over-long wiring problems. Late collisions could also indicate a failing NIC card. • Overrun Packets—Ethernet packets that were discarded because the access point had a temporary overload of packets to handle. • Packets Too Long—Ethernet packets that were larger than the maximum packet size of 1518 bytes. • Packets Too Short—Ethernet packets that were shorter than the minimum packet size of 64 bytes. • Packets Truncated—Corrupt or incomplete packets. • Unicast Packets—The number of packets transmitted in point-to-point communication. • Multicast Packets—The number of packets transmitted that were sent as a transmission to a set of nodes. • Total Bytes—Total number of bytes transmitted from the port. • Total Errors—The number of packets determined to be in error. • Discarded Packets—The number of packets discarded by the access point due to errors or network congestion. • Forwarded Packets—The number of packets transmitted by the port that were acceptable or passable through the filters. • Max Retry Packets—Packets which failed after being retried several times. • Total Collisions—The number of packet collisions that occurred through this port. • Late Collisions—Packet errors that were likely caused by overlong wiring problems. Could also indicate a failing NIC card. • Underrun Packets—Packets failed to be sent because the access point was unable to keep up with the Ethernet controller. Transmit Statistics Cisco Aironet Access Point Software Configuration Guide 9-12 OL-0657-07 Chapter 9 Diagnostics and Troubleshooting Using Diagnostic Pages AP Radio Page When you click AP Radio in the Network Ports table, the browser displays the AP Radio Port page. This page lists detailed statistics on the access point’s radio. Figure 9-6 shows an AP Radio Port page example. Figure 9-6 AP Radio Port Page Like the Network Ports and Ethernet Port pages, the AP Radio Port page lists statistics in a table divided into sections. Each row in the table is explained below. Cisco Aironet Access Point Software Configuration Guide OL-0657-07 9-13 Chapter 9 Diagnostics and Troubleshooting Using Diagnostic Pages Configuration Information • The top row of the Configuration section of the table contains a Set Properties link that leads to the AP Radio Hardware page. See the “Entering Radio Hardware Information” section on page 3-21 for details on the AP Radio Hardware page. • Status of “awc0”—awc0 (Aironet Wireless Communications) is part of Cisco Aironet's naming convention for this radio. This field displays one of three possible operating states: – Up—The port is operating properly. – Down—The port is not operating. – Error—The port is in an error condition. • Maximum Rate (Mbps)—Maximum rate of data transmission in megabits per second. Data rates set to basic are followed by B. • IP Addr.—The IP address of the radio port. • MAC (Media Access Control) Addr.—A unique identifier assigned to the network interface by the manufacturer. • SSID—The unique identifier that client devices use to associate with the access point radio. The SSID helps client devices distinguish between multiple wireless networks in the same vicinity. • Operational Rates—The data transmission rates supported and enabled by the access point for communication with client devices. • Transmit Power (mW)—The power level of radio transmission. You can reduce the transmit power to conserve power or reduce interference. Click Set Properties to display the AP Radio Hardware page, where you can change this setting. • Unicast Packets—The number of packets received in point-to-point communication. • Multicast Packets—The number of packets received that were sent as a transmission to a set of nodes. • Total Bytes—The total number of bytes received. • Total Errors—The total number of packets determined to be in error. Receive Statistics Cisco Aironet Access Point Software Configuration Guide 9-14 OL-0657-07 Chapter 9 Diagnostics and Troubleshooting Using Diagnostic Pages • Discarded Packets—Packets discarded due to errors or network congestion. • Forwardable Packets—Packets received by the port that were acceptable or passable through the filters. • Filtered Packets—Packets that were stopped or screened by the filters set up on the port. • Packet CRC Errors—Cyclic redundancy check (CRC) errors that were detected in a received packet. • Packet WEP Errors—Encryption errors received through this port. • Overrun Packets—Packets that were discarded because the access point had a temporary overload of packets to handle. • Duplicate Packets—Packets that were received twice because an acknowledgment was lost and the sender retransmitted the packet. • Lifetime Exceeded—Fragmented packets that were dropped because it took too long to get the next fragment. • Unicast Packets—The number of packets transmitted in point-to-point communication. • Multicast Packets—The number of packets transmitted that were sent as a transmission to a set of nodes. • Total Bytes—The number of bytes transmitted from the port. • Total Errors—The number of packets determined to be in error. • Discarded Packets—The number of packets discarded by the access point due to errors or network congestion. • Forwarded Packets—The number of packets transmitted by the port that were acceptable or passable through the filters. • Max Retry Packets—The number of times request to send (RTS) reached the maximum retry number. Click Set Properties to display the AP Radio Hardware page, where you can set the maximum RTS value. • Total Retries—The total number of retries that occurred through the radio port. • Canceled Assoc. Lost—Packets dropped because a client device lost association with the access point. Transmit Statistics Cisco Aironet Access Point Software Configuration Guide OL-0657-07 9-15 Chapter 9 Diagnostics and Troubleshooting Using Diagnostic Pages • Canceled AID—Packets dropped by a repeater because it roamed to a different parent during a retransmission attempt. • Lifetime Exceeded—Fragmented packets that were dropped because it took too long to deliver a fragment. Display Options Figure 9-6 shows the basic AP Radio Port page. Three display options provide more details on the port configuration and operating statistics. The basic page provides all the information needed to monitor and administer the port in normal operation. You might need the other display options in comprehensive site surveys or advanced system troubleshooting. To select a display option, click an option checkbox and click Apply. The display options include: • Detailed Config.—Details on the radio port configuration, including request to send (RTS) and data retry settings, firmware and bootblock version levels, and regulatory domain code. • Detailed Stats.—Twenty additional statistical fields covering packet fragments, collisions, and other errors. • Individual Rates—Data transmission statistics for each data rate (1, 2, 5, and 11 Mbps). Cisco Aironet Access Point Software Configuration Guide 9-16 OL-0657-07 Chapter 9 Diagnostics and Troubleshooting Using Diagnostic Pages Event Log Page The Event Log page lists access point events and provides links to the Event Display Setup and Event Log Summary pages. You can also open Station pages for devices listed in the event log. Figure 9-7 shows an Event Log page example. Figure 9-7 Event Log Page 209.165.201.7 209.165.201.7 Click the Logs link at the top of any main management system page to reach the Event Log page. Display Settings Use the entry fields and the buttons at the top of the page to control the event list. Fields and buttons include: • Index—Specifies the first event to display in the event list. The most recent event is 0; earlier events are numbered sequentially. To apply your entry, click Apply New. • Number of Events—Specifies the number of events displayed on the page. To apply your entry, click Apply New. • Next—Displays earlier events in the log. • Prev—Displays more recent events in the log. • Apply New—Changes the display by applying the settings in the Index and Number of Events fields. • Purge Log—Permanently deletes all events from the log. Cisco Aironet Access Point Software Configuration Guide OL-0657-07 9-17 Chapter 9 Diagnostics and Troubleshooting Using Diagnostic Pages • Additional Display Filters—A link to the Event Display Setup page, where you can change time and severity level settings. Log Headings The event log is divided into three columns: • Time—The time the event occurred. The log records time as cumulative days, hours, and minutes since the access point was turned on, or as wall-clock time if a time server is specified or if the time has been manually set on the access point. • Severity—Events are classified as one of four severity levels depending on the event’s impact on network operations. Severity levels include: – Info (green)—Indicates routine information; no error. – Warning (blue)—Indicates a potential error condition. – Alert (magenta)—Indicates that an event occurred which was pre-selected as something to be recorded in the log. A typical example of an alert would be a packet error condition. The Station page provides check boxes that activate reporting of packet errors to and from the station as alerts in the event log. – FATAL (red)—An event which prevents operation of the port or device. For operation to resume, the port or device usually must be reset. Click the Severity heading to go to the Event Log Summary page, which lists total events for each severity level. • Description—This column describes the nature or source of the event. If a network device is involved in the event, the device’s MAC or IP address appears and provides a direct link to the device’s Station page. Saving the Log To save the event log, click Download Event Log. In Microsoft Explorer, the log is saved as a text file. In Netscape Communicator, the log file is displayed on the screen, and you select Save As from Communicator’s File pull-down menu to save the log. Cisco Aironet Access Point Software Configuration Guide 9-18 OL-0657-07 Chapter 9 Diagnostics and Troubleshooting Using Diagnostic Pages Event Log Summary Page The Event Log Summary page lists the total number of events that occurred at each severity level. Figure 9-8 shows an Event Log Summary page example. Figure 9-8 Event Log Summary Page Click the Severity heading on the Event Log page to reach the Event Log Summary page. Cisco Aironet Access Point Software Configuration Guide OL-0657-07 9-19 Chapter 9 Diagnostics and Troubleshooting Using Command-Line Diagnostics Using Command-Line Diagnostics You can view diagnostic information about your access point with diagnostic commands. Enter the commands in the command-line interface (CLI) to display the information. You can open the CLI with Telnet or with a terminal emulator through the access point’s serial port. Table 9-1 lists the access point’s diagnostic commands. Click a command in the left column to go to a description of that command’s results. Table 9-1 CLI Diagnostic Commands Command Information Displayed :eap_diag1_on authentication progress for client devices authenticating through the access point :eap_diag2_on packet contents of each authentication step for client devices authenticating through the access point :vxdiag_arpshow the ARP table :vxdiag_checkstack task stack on the access point :vxdiag_hostshow remote host list with IP addresses and aliases :vxdiag_i task list on the access point :vxdiag_ipstatshow IP statistics :vxdiag_memshow free and allocated memory on the access point :vxdiag_muxshow networking protocols installed on the access point :vxdiag_routeshow current routing information :vxdiag_tcpstatshow TCP statistics :vxdiag_udpstatshow UDP statistics Cisco Aironet Access Point Software Configuration Guide 9-20 OL-0657-07 Chapter 9 Diagnostics and Troubleshooting Using Command-Line Diagnostics Note The :eap_diag1_on and :eap_diag1_on EAP diagnostic commands are available in firmware versions 11.08 and later. The :vxdiag_arpshow, hostshow, ipstatshow, muxshow, routeshow, tcpstatshow, and udpstatshow commands are available in firmware version 11.11T. You can download the latest access point firmware version on Cisco.com at http://www.cisco.com/public/sw-center/sw-wireless.shtml. Entering Diagnostic Commands Follow these steps to enter diagnostic commands in the CLI: Note Step 1 These steps describe opening the CLI with Telnet. If the access point is configured to block Telnet access, follow the instructions in the “Preparing to Use a Terminal Emulator” section on page 2-6 to open the CLI by using a terminal emulator through a serial cable connected to the access point’s serial port. On your computer’s Start menu, select Programs > Accessories > Telnet. If Telnet is not listed in your Accessories menu, select Start > Run, enter Telnet in the entry field, and press Enter. Step 2 When the Telnet window appears, click Connect, and select Remote System. Note In Windows 2000, the Telnet window does not contain pull-down menus. To start the Telnet session in Windows 2000, enter open followed by the access point’s IP address. Step 3 In the Host Name field, enter the access point’s IP address and click Connect. Step 4 Press = to display the access point’s home page. Step 5 Enter the command (for example, :vxdiag_memshow) and press Enter. The command’s diagnostic information appears. Cisco Aironet Access Point Software Configuration Guide OL-0657-07 9-21 Chapter 9 Diagnostics and Troubleshooting Using Command-Line Diagnostics Diagnostic Command Results This section describes the information displayed on the CLI for the diagnostic commands listed in Table 9-1. :eap_diag1_on Use the :eap_diag1_on command to display authentication progress for client devices authenticating through the access point. The steps in a successful authentication for a client device named Yakima might look like the following example: EAP: Sending Identity Request EAP: Received packet from Yakima EAP: Received Identity Response EAP: Forwarding packet to RADIUS server RADIUS: Received packet for client Yakima RADIUS: Received Challenge Request RADIUS: Sending EAPOL packet to client EAP: Received packet from Yakima EAP: Forwarding packet to RADIUS server RADIUS: Received packet for client Yakima RADIUS: Received session timeout request of 60 seconds RADIUS: Sending EAPOL packet to client RADIUS: ACCEPT for Yakima RADIUS: Found Cisco key RADIUS: Sending EAPOL multicast key RADIUS: Sending EAPOL session key parameters EAP: Key set for client Yakima The EAP and RADIUS prefixes show which system process is handling the communication. Follow the steps in the “Entering Diagnostic Commands” section on page 9-21 to open the CLI and enter the :eap_diag1_on command. Cisco Aironet Access Point Software Configuration Guide 9-22 OL-0657-07 Chapter 9 Diagnostics and Troubleshooting Using Command-Line Diagnostics :eap_diag2_on Use the :eap_diag2_on command to display the packet contents of each authentication step for client devices authenticating through the access point. The packet contents for one authentication step might look like this example: EAP: Sending Identity Request 00c15730: 01 00 00 28 01 21 00 28 01 00 6e 65 74 77 6f 72 *...(.!.(..networ* 00c15740: 6b 69 64 3d 45 41 50 33 2c 6e 61 73 69 64 3d 45 *kid=EAP3,nasid=E* 00c15750: 41 50 33 2c 70 6f 72 74 69 64 3d 30 *AP3,portid=0....* The first group of characters in the packet contents (00c15730, for example) is the hexadecimal address of the memory buffer that contains the packet. The middle group of characters (01 00 00 28 01 21 00 28 01 00 6e 65 74 77 6f 72, for example) is the packet contents in hexadecimal format. The last group of characters (*...(.!.(..networ*, for example) is an ASCII representation of the packet contents. For information on interpreting the content of packets sent between the access point and the RADIUS server, refer to the Internet Society’s RFC 2865. This document is available at http://www.armware.dk/RFC/rfc/rfc2865.html as well as on many other websites. The IEEE’s 802.1x authentication standard helps define the content of packets sent between client devices and the access point and is available to IEEE members at http://www.ieee.org. Follow the steps in the “Entering Diagnostic Commands” section on page 9-21 to open the CLI and enter the :eap_diag2_on command. :vxdiag_arpshow Use the :vxdiag_arpshow command to display the access point’s ARP table. The ARP table might look like the following example: LINK LEVEL ARP TABLE destination gateway flags Refcnt Use Interface ---------------------------------------------------------------10.84.139.129 00:05:31:d3:c0:9 405 emac0 ---------------------------------------------------------------- These are descriptions for each column in the ARP table: • Destination—IP address of the host entry • Gateway—MAC address of the destination Cisco Aironet Access Point Software Configuration Guide OL-0657-07 9-23 Chapter 9 Diagnostics and Troubleshooting Using Command-Line Diagnostics • Flags—see Table 9-2 for a list of flags Table 9-2 Flag Definitions Flag Value Definition 0x1 Route is usable. 0x2 Destination is a gateway. 0x4 Host of specific routing entry. 0x8 Host or net is unreachable. 0x10 Created dynamically (by redirect). 0x20 Modified dynamically (by redirect). 0x40 Message confirmed. 0x80 Subnet mask is present. 0x100 Generate new routes on use. 0x200 External daemon resolves name. 0x400 Generated by ARP. 0x800 Manually added (static). 0x1000 Just discard packets (during updates). 0x2000 Modified by management protocol. 0x4000 Protocol-specific routing flag. 0x8000 Protocol-specific routing flag. • Refcnt—the number of hosts referencing this address • Use—number of packets forwarded • Interface—one of four possible interfaces: – emac0 for Ethernet – awc0 for internal radio – awc1 for external radio – lo0 for internal loopback Cisco Aironet Access Point Software Configuration Guide 9-24 OL-0657-07 Chapter 9 Diagnostics and Troubleshooting Using Command-Line Diagnostics Follow the steps in the “Entering Diagnostic Commands” section on page 9-21 to open the CLI and enter the :vxdiag_arpshow command. :vxdiag_checkstack Use the :vxdiag_checkstack command to display a summary of the stack activity for each access point task. A portion of the task stack might look like this example: NAME -----------tExcTask tSysIntegrit tLogEventMgr tShell tTelnetd tTelnetOutTa tTelnetInTas ENTRY -----------0x00001a1fd0 0x000001b188 0x00000fb0ac 0x0000041da8 0x000002e220 0x000002e7fc 0x000002e858 TID -------fd4e80 a3b1c0 fd22d8 a2eb78 a32d90 993da0 98fb88 SIZE CUR HIGH MARGIN ----- ----- ----- -----7984 224 960 7024 16368 720 1176 15192 16368 2136 3616 12752 19320 640 2712 16608 16368 376 1472 14896 16368 720 1800 14568 16368 1416 2376 13992 These are the descriptions of the information in each column: • Name—name of the task • Entry—entry point; the top-level function of the task • TID—task identifier; the task control block • Size—stack size in bytes • CUR—current number of bytes of stack in use • High—highest number of bytes of stack which have been in use • Margin—the difference between the stack size and the highest number of bytes which have been in use Follow the steps in the “Entering Diagnostic Commands” section on page 9-21 to open the CLI and enter the :vxdiag_checkstack command. Cisco Aironet Access Point Software Configuration Guide OL-0657-07 9-25 Chapter 9 Diagnostics and Troubleshooting Using Command-Line Diagnostics :vxdiag_hostshow Use the :vxdiag_hostshow command to display remote hosts and their IP addresses and aliases. The remote host information might look like this example: Clock: 96470 sec hostname -------localhost 10.84.139.161 10.84.139.136 10.84.139.138 10.84.139.167 10.84.139.160 10.84.139.137 AP_North.cisco.com 10.84.139.164 10.84.139.169 10.84.139.141 ttl --0 7273 7273 7273 7273 7273 7273 93073 7273 7274 97062 inet address -----------127.0.0.1 10.84.139.161 10.84.139.136 10.84.139.138 10.84.139.167 10.84.139.160 10.84.139.137 10.84.139.135 10.84.139.164 10.84.139.169 10.84.139.141 aliases ------- These are descriptions for the information in each column: • Hostname—Domain name of the host, if available; otherwise, same as the Inet address • TTL—time-to-live • Inet address—IP address of the host • Aliases—List of additional names, other than the hostname, that refer to the Inet address Follow the steps in the “Entering Diagnostic Commands” section on page 9-21 to open the CLI and enter the :vxdiag_hostshow command. Cisco Aironet Access Point Software Configuration Guide 9-26 OL-0657-07 Chapter 9 Diagnostics and Troubleshooting Using Command-Line Diagnostics :vxdiag_i Use the :vxdiag_i command to display a list of current tasks on the access point. A portion of the access point’s task list display might look like this example: NAME ENTRY TID PRI STATUS PC SP ERRNO DELAY ---------- ------------ -------- --- ---------- -------- -------- ------- ----tExcTask 1a1fd0 fd4e80 0 PEND 1d9aac fd4da0 3006b tSysIntegri1b188 a3b1c0 0 SUSPEND 1c06ac a3aef0 tLogEventMgfb0ac fd22d8 1 PEND 1bcda8 fd1a80 tShell 41da8 a2eb78 1 PEND 1bcda8 a2e8f8 tTelnetd 2e220 a32d90 2 PEND 1bcda8 a32c18 tTelnetOutT2e7fc 993da0 2 PEND 1bcda8 993ad0 tTelnetInTa2e858 98fb88 2 PEND 1bcda8 98f600 3d0002 tBrowser 1351c8 a0d978 5 READY 1c2014 a0c4b8 3d0004 tIdleConsold274c 98b970 10 PEND 1bcda8 98b820 tThttpd b435c a5b3d8 45 PEND 1bcda8 a5b138 6b0003 tSNMPD 106fd8 b1eb80 46 PEND+T 1bcda8 b1d5b0 3d0004 1968 These are the descriptions of the information in each column: • Name—name of the task • Entry—entry point; the top-level function of the task • TID—task identifier; the task control block • PRI—task priority; a low number means a high priority • Status—status of the task; five statuses are possible: – Pend—The task is in an inactive waiting state. – Pend+T—The task is waiting, but it has a timeout value for the length of time it will wait for an external event to wake the task and start it. – Suspend—The task will not begin until some external event occurs. – Ready—The task is ready to run. – Delay—The task issued a delay command and will not run until the delay time elapses. • PC—program counter; a memory address of the task • SP—stack pointer; another memory address of the task • ERRNO—error number; the latest error reported by any function called by the task Cisco Aironet Access Point Software Configuration Guide OL-0657-07 9-27 Chapter 9 Diagnostics and Troubleshooting Using Command-Line Diagnostics • Delay—delay interval in system clock-ticks (1/52 second) that must elapse before the task runs Follow the steps in the “Entering Diagnostic Commands” section on page 9-21 to open the CLI and enter the :vxdiag_i command. :vxdiag_ipstatshow Use the :vxdiag_ipstatshow command to display IP statistics for the access point. The IP statistics might look like the following example: total 5760 badsum tooshort toosmall badhlen badlen infragments fragdropped fragtimeout forward cantforward redirectsent unknownprotocol nobuffers reassembled outfragments noroute These are descriptions of each IP statistic: • Total—the total number of packets received • Badsum—number of packets received with bad checksums • Tooshort—number of packets received that were shorter than the expected length • Toosmall—number of packets received that did not have enough data • Badhlen—number of packets received with IP header length less than the packet data size • Badlen—number of packets received with IP length less than the IP header length • Infragments—number of packets received that were fragmented Cisco Aironet Access Point Software Configuration Guide 9-28 OL-0657-07 Chapter 9 Diagnostics and Troubleshooting Using Command-Line Diagnostics • Fragdropped—number of fragmented packets received that were dropped • Fragtimeout—number of fragmented packets received that timed out • Forward—number of packets forwarded • Cantforward—number of packets received for an unreachable destination • Redirectsent—number of packets forwarded in the same subnet • Unknownprotocol—number of packets received with unknown protocol information • Nobuffers—number of packets dropped due to unavailable buffers • Reassembled—number of packets reassembled successfully • Outfragments—number of output fragments created • Noroute—number of packets discarded due to no route available Follow the steps in the “Entering Diagnostic Commands” section on page 9-21 to open the CLI and enter the :vxdiag_ipstatshow command. :vxdiag_memshow Use the :vxdiag_memshow command to display information on the access point’s free and allocated memory. The access point’s current memory information might look like the following example: status bytes blocks avg block max block ------ --------- -------- ---------- ---------current free 7386392 476 15517 7296288 alloc 6738808 10837 621 cumulative alloc 13483152 126889 106 These are descriptions for each information column: • Status—the memory statuses described in the table, including current free memory, current allocated memory, and cumulative allocated memory, which is the total bytes and blocks of memory ever allocated by the access point • bytes—the memory for each status described in bytes • blocks—the memory for each status described in contiguous blocks; indicates the level of fragmentation in the access point’s memory Cisco Aironet Access Point Software Configuration Guide OL-0657-07 9-29 Chapter 9 Diagnostics and Troubleshooting Using Command-Line Diagnostics • avg block—the average block size; simply put, the number in the bytes column divided by the number in the blocks column • max block—the maximum contiguous memory block available Follow the steps in the “Entering Diagnostic Commands” section on page 9-21 to open the CLI and enter the :vxdiag_memshow command. :vxdiag_muxshow Use the :vxdiag_muxshow command to display all the networking protocols installed on the access point. The list of installed protocols might look like the following example: Device: emac Unit: 0 Description: PPC405GP Ethernet Media Access Controller Enhanced Network Driver Protocol: AWC Packet Router Type: 257 Recv 0x5ad0c Shutdown 0x5fbd0 Protocol: Cisco Discovery Protocol (CDP) Type: 8192 Recv 0x4f2c0 Shutdown 0x0 Protocol: AWC DDP Protocol Type: 34605 Recv 0x6986c Shutdown 0x6a728 Protocol: IP 4.4 ARP Type: 2054 Recv 0x2732c Shutdown 0x275ec Protocol: IP 4.4 TCP/IP Type: 2048 Recv 0x2732c Shutdown 0x27524 Device: awc Unit: 0 Description: Aironet A504-Family Enhanced Network Driver Protocol: AWC DDP Protocol Type: 34605 Recv 0x6986c Shutdown 0x6a728 Protocol: 802.1X Protocol Type: 34958 Recv 0x9adc4 Shutdown 0x9e5a0 Protocol: AWC WNMP MAC-Level Control Type: 34689 Recv 0x118af4 Shutdown 0x118e9c Protocol: AWC 802.11 MAC-Level Control Type: 57841 Recv 0x6c258 Shutdown 0x6c5dc Protocol: AWC 802.11 MAC-Level Management Type: 57840 Recv 0x6abf0 Shutdown 0x6c580 Protocol: AWC Packet Router Type: 511 Recv 0x5ad0c Shutdown 0x5fbd0 Device: rptr Unit: 1 Description: Aironet 802.11 Bridge Driver Protocol: AWC Packet Router Type: 257 Recv 0x5ad0c Shutdown 0x5fbd0 Protocol: AWC DDP Protocol Type: 34605 Recv 0x6986c Shutdown 0x6a728 Device: rptr Unit: 2 Follow the steps in the “Entering Diagnostic Commands” section on page 9-21 to open the CLI and enter the :vxdiag_muxshow command. Cisco Aironet Access Point Software Configuration Guide 9-30 OL-0657-07 Chapter 9 Diagnostics and Troubleshooting Using Command-Line Diagnostics :vxdiag_routeshow Use the :vxdiag_routeshow command to display current routing information for the access point. The routing information might look like the following example: ROUTE NET TABLE destination gateway flags Refcnt Use Interface ---------------------------------------------------------------------0.0.0.0 10.84.139.129 1932 emac0 10.84.139.128 10.84.139.141 101 emac0 ---------------------------------------------------------------------ROUTE HOST TABLE destination gateway flags Refcnt Use Interface ---------------------------------------------------------------------127.0.0.1 127.0.0.1 696 lo0 ---------------------------------------------------------------------- These are descriptions for each column in the route net and route host tables: • Destination—IP address of host to which access point is to be routed • Gateway—IP address of host for forwarding packets not in the access point’s subnet • Flags—see Table 9-2 for a list of flags • Refcnt—the number of hosts referencing this address • Use—number of packets forwarded • Interface—one of four possible interfaces: – emac0 for Ethernet – awc0 for internal radio – awc1 for external radio – lo0 for internal loopback Follow the steps in the “Entering Diagnostic Commands” section on page 9-21 to open the CLI and enter the :vxdiag_routeshow command. Cisco Aironet Access Point Software Configuration Guide OL-0657-07 9-31 Chapter 9 Diagnostics and Troubleshooting Using Command-Line Diagnostics :vxdiag_tcpstatshow Use the :vxdiag_tcpstatshow command to display Transmission Control Protocol (TCP) statistics for the access point. The TCP statistics might look like this example: TCP: 3370 packets sent 1576 data packets (714752 bytes) 3 data packets (1613 bytes) retransmitted 1252 ack-only packets (1 delayed) 0 URG only packet 1 window probe packet 0 window update packet 538 control packets 3327 packets received 1564 acks (for 710621 bytes) 23 duplicate acks 0 ack for unsent data 824 packets (189251 bytes) received in-sequence 8 completely duplicate packets (2562 bytes) 0 packet with some dup. data (0 byte duped) 74 out-of-order packets (0 byte) 0 packet (0 byte) of data after window 0 window probe 85 window update packets 0 packet received after close 0 discarded for bad checksum 0 discarded for bad header offset field 0 discarded because packet too short 63 connection requests 415 connection accepts 477 connections established (including accepts) 477 connections closed (including 410 drops) 0 embryonic connection dropped 1378 segments updated rtt (of 1399 attempts) 2 retransmit timeouts 0 connection dropped by rexmit timeout 1 persist timeout 0 keepalive timeout 0 keepalive probe sent 0 connection dropped by keepalive 63 pcb cache lookups failed Follow the steps in the “Entering Diagnostic Commands” section on page 9-21 to open the CLI and enter the :vxdiag_tcpstatshow command. Cisco Aironet Access Point Software Configuration Guide 9-32 OL-0657-07 Chapter 9 Diagnostics and Troubleshooting Tracing Packets :vxdiag_udpstatshow Use the :vxdiag_udpstatshow command to display User Datagram Protocol (UDP) statistics for the access point. The UDP statistics might look like this example: UDP: 9244 total packets 9227 input packets 17 output packets 0 incomplete header 0 bad data length field 0 bad checksum 9211 broadcasts received with no ports 0 full socket 16 pcb cache lookups failed 0 pcb hash lookup failed Follow the steps in the “Entering Diagnostic Commands” section on page 9-21 to open the CLI and enter the :vxdiag_udpstatshow command. Tracing Packets Use the packet tracing feature to view packets sent and received by the access point and by other wireless devices on your network. You can view packets sent to and received from a single wireless device or several wireless devices, or you can view all the packets sent and received through the access point’s Ethernet and radio ports. The IEEE’s 802.1x authentication standard helps define the content of packets and is available to IEEE members at http://www.ieee.org. For information on filtering packets, see the “Filter Setup” section on page 3-8. Reserving Access Point Memory for a Packet Trace Log File You can save packet traces in a log file that you view or save, or you can view packets on the access point command-line interface without storing the traces in a log file. Use the instructions in this section to reserve access point memory for Cisco Aironet Access Point Software Configuration Guide OL-0657-07 9-33 Chapter 9 Diagnostics and Troubleshooting Tracing Packets a packet trace log file. Use the instructions in the “Tracing Packets for Specific Devices” section on page 9-34 and the “Tracing Packets for Ethernet and Radio Ports” section on page 9-35 to select devices and ports to be traced. Follow these steps to reserve access point memory for a packet trace log file: Step 1 Use the Event Handling Setup page to enter instructions for the size of the packets you want to monitor and the amount of memory the access point should set aside for packet data. Follow this link path to the Event Handling Setup page: a. On the Summary Status page, click Setup. b. On the Setup page, click Event Handling under Event Log. Step 2 Enter the number of bytes the access point should store for each packet in the Maximum number of bytes stored per Alert packet entry field. If you want to see the entire contents of each packet, enter 1600; if you want to see only the packet header, enter 64. Step 3 Enter the number of bytes of memory the access point should use for packet tracing in the Maximum memory reserved for Detailed Event Trace Buffer (bytes) entry field. If you want to create a detailed packet trace, for example, enter 1000000; if you need a simple, less-detailed packet trace, for example, enter 100000. Step 4 Click OK. The access point reboots. Now you need to enter settings for the wireless devices or network interfaces for which you want to trace packets. Follow the steps in the “Tracing Packets for Specific Devices” section on page 9-34 or the “Tracing Packets for Ethernet and Radio Ports” section on page 9-35 to select devices and ports to be monitored. Tracing Packets for Specific Devices Follow these steps to select specific devices for which you want to trace packets: Step 1 Browse to the access point’s Association Table. You can reach the Association Table by clicking Current Associations on the Summary Status page or by clicking the gray Associations button at the top of most management system pages. Cisco Aironet Access Point Software Configuration Guide 9-34 OL-0657-07 Chapter 9 Diagnostics and Troubleshooting Tracing Packets Step 2 Find the wireless device for which you want to trace packets and click the device’s MAC address. The device’s Station page appears. Step 3 On the device’s Station page, click the alert checkbox in the To Station header to trace packets sent to the device. Click the alert checkbox in the From Station header to trace packets the device sends. Note Step 4 Copying packets into access point memory slows the access point’s performance. When you finish tracing packets, deselect the alert checkboxes on the Station pages. If you want the access point to trace packets all the time, reduce the impact on performance by selecting Record for the External Information setting on the Event Handling Setup page and select Port Information on the Event Display Setup page for the “Severity Level at which to display events immediately on the console” setting. With this configuration, the access point records packets in a log file but does not spend time instantly displaying packets on the CLI. Click Refresh. Repeat these steps for each device for which you want to trace packets. The MAC addresses of devices you are tracing appear in red in the Association Table. If you are ready to view packet data, skip to the “Viewing Packet Trace Data” section on page 9-36. If you want to trace all the packets sent through the access point’s Ethernet and radio ports, follow the instructions in the “Tracing Packets for Ethernet and Radio Ports” section on page 9-35. Tracing Packets for Ethernet and Radio Ports Follow these steps to set up the access point’s Ethernet or radio ports for packet tracing: Step 1 To trace all the packets sent and received through the access point’s Ethernet or radio ports, browse to the Network Ports page. Browse to the Network Ports page by clicking Current Associations on the Summary Status page or by clicking the gray Network button at the top of most management system pages. Cisco Aironet Access Point Software Configuration Guide OL-0657-07 9-35 Chapter 9 Diagnostics and Troubleshooting Tracing Packets Step 2 To trace packets sent or received through the access point’s Ethernet port, click Ethernet in the yellow header row. To trace packets sent or received through the access point’s radio port, click AP Radio in the yellow header row. The Ethernet Port or AP Radio Port page appears. Step 3 Click the alert checkbox in the Receive header to trace packets received through the Ethernet or radio port. Click the alert checkbox in the Transmit header to trace packets sent through the Ethernet or Radio port. Note Copying packets into access point memory slows the access point’s performance. When you finish tracing packets, deselect the alert checkboxes on the Station pages. If you want the access point to trace packets all the time, reduce the impact on performance by selecting Record for the External Information setting on the Event Handling Setup page and select Port Information on the Event Display Setup page for the “Severity Level at which to display events immediately on the console” setting. With this configuration, the access point records packets in a log file but does not spend time insantly displaying packets on the CLI. Step 4 Click Refresh. The network interface you are tracing appears in red on the Summary Status, Setup, and Network Ports pages. Step 5 Follow the steps in the “Viewing Packet Trace Data” section on page 9-36 to view the traced packets in a log file or on the CLI. Viewing Packet Trace Data If you store traced packets in a log file, you can view or save the file. If you do not store traced packets, you can view the packets in real time on the access point CLI. Cisco Aironet Access Point Software Configuration Guide 9-36 OL-0657-07 Chapter 9 Diagnostics and Troubleshooting Tracing Packets Packets Stored in a Log File Follow these steps to view traced packets stored in a log file: Step 1 Browse to the Event Handling Setup page. Follow this link path to the Event Handling Setup page: a. On the Summary Status page, click Setup. b. On the Setup page, click Event Handling under Event Log. Step 2 Click Headers Only to view only the packet headers; click All Data to view all the collected packet information. Step 3 A File Download window appears asking if you want to save the [access point name]_trace.log file or open it. Choose to save or open the file and click OK. A portion of the Headers Only packet trace file might look like this example: ===Beginning of AP_North Detailed Trace Log=== 04:46:14 +17174.384615 Station Alert: 00:01:64:43:ef:41Aironet:40:6f:e6Aironet:40:6f:e6 0x0000 04:47:37 + 83.326923 Station Alert: 00:01:64:43:ef:41Aironet:40:6f:e6Aironet:36:14:5a 0x0000 04:49:06 + 88.307692 Station Alert: 00:01:64:43:ef:41Aironet:40:6f:e6broadcastARP 04:49:06 + 0.000000 Station Alert: 00:05:31:d3:c0:0900:01:64:43:ef:41ARP 04:49:06 + 0.000000 Station Alert: 00:01:64:43:ef:41Aironet:40:6f:e600:05:31:d3:c0:09IP IPv4 UDP ID=0x14f2 totalLen=96 10.84.139.164 -> ne-wins.cisco.com 04:49:06 + 0.230769 Station Alert: 00:05:31:d3:c0:0900:01:64:43:ef:41IP IPv4 UDP ID=0xb0b4 totalLen=90 ne-wins.cisco.com -> 10.84.139.164 04:49:06 + 0.019231 Station Alert: 00:01:64:43:ef:41Aironet:40:6f:e600:05:31:d3:c0:09IP IPv4 UDP ID=0x14f3 totalLen=96 10.84.139.164 -> ne-wins.cisco.com 04:49:06 + 0.192308 Station Alert: 00:05:31:d3:c0:0900:01:64:43:ef:41IP IPv4 UDP ID=0xb2b4 totalLen=90 ne-wins.cisco.com -> 10.84.139.164 ===End of AP_North Detailed Trace Log=== A portion of the All Data packet trace file might look like this example: ===Beginning of AP_North Detailed Trace Log=== 04:46:14 +17174.384615 Station Alert: 00:01:64:43:ef:41[Aironet]00:40:96:40:6f:e6[Aironet]00:40:96:40:6f:e6 0x0000 00 4a 40 81 00 40 96 40 6f e6 00 01 64 43 ef 41 01 7f 00 04 5f 00 00 40 96 40 6f e6 00 00 00 00 00 00 00 00 00 00 0a 54 8b a4 00 00 44 57 49 4c 4c 2d 49 42 4d 2d 57 32 4b 00 00 00 00 00 00 00 00 00 |.J@..@.@o...dC.A..._..@.@o............T....JCOOL-IBM-W2K.........| 04:47:37 + 83.326923 Station Alert: 00:01:64:43:ef:41[Aironet]00:40:96:40:6f:e6[Aironet]00:40:96:36:14:5a 0x0000 Cisco Aironet Access Point Software Configuration Guide OL-0657-07 9-37 Chapter 9 Diagnostics and Troubleshooting Checking the Top Panel Indicators 00 4a 40 81 00 40 96 36 14 5a 00 01 64 43 ef 41 01 7f 00 04 5f 00 00 40 96 40 6f e6 00 00 00 00 00 00 00 00 00 00 0a 54 8b a4 00 00 44 57 49 4c 4c 2d 49 42 4d 2d 57 32 4b 00 00 00 00 00 00 00 00 00 |.J@..@.6.Z..dC.A..._..@.@o............T....JCOOL-IBM-W2K.........| ===End of AP_North Detailed Trace Log=== Packets Displayed on the CLI To view packets displayed on the access point CLI, follow the instructions in the “Using the Command-Line Interface” section on page 2-5 to open the CLI. The access point displays the packets at the bottom of the screen. Checking the Top Panel Indicators If your access point is not communicating, check the three indicators on the top panel. The indicators report the unit’s status. Figure 9-9 shows the indicators on an access point with a plastic case, and Figure 9-10 shows the indicators on an access point with a metal case. Table 9-3 lists the meanings of the indicator signals. Figure 9-9 Indicator Lights on Access Point with Plastic Case CISCO AIRONET 350 SERIES W I R E L E S S AC C E S S P O I N T Ethernet Status Radio 49075 Cisco Aironet Access Point Software Configuration Guide 9-38 OL-0657-07 Chapter 9 Diagnostics and Troubleshooting Checking the Top Panel Indicators Figure 9-10 Indicator Lights on Access Point with Metal Case CISCO AIRONET 350 SERIES WIRELESS ACCESS POINT ETHERNET ACTIVITY ASSOCIATION STATUS 60511 RADIO ACTIVITY Ethernet Status Radio • The Ethernet indicator signals traffic on the wired LAN, or Ethernet infrastructure. This indicator blinks green when a packet is received or transmitted over the Ethernet infrastructure. • The status indicator signals operational status. Blinking green indicates that the access point is operating normally but is not associated with any wireless devices. Steady green indicates that the access point is associated with a wireless client. For repeater access points, blinking 50% on, 50% off indicates the repeater is not associated with the root access point; blinking 7/8 on, 1/8 off indicates that the repeater is associated with the root access point but no client devices are associated with the repeater; steady green indicates that the repeater is associated with the root access point and client devices are associated with the repeater. • The radio indicator blinks green to indicate radio traffic activity. The light is normally off, but it blinks green whenever a packet is received or transmitted over the access point’s radio. Cisco Aironet Access Point Software Configuration Guide OL-0657-07 9-39 Chapter 9 Diagnostics and Troubleshooting Checking the Top Panel Indicators Table 9-3 Top Panel Indicator Signals Message type Ethernet Status Radio Meaning indicator indicator indicator Association status – Steady green – Blinking – green – Steady green Operational Error/warning – At least one wireless client device is associated with the unit. No client devices are associated; check the unit’s SSID and WEP settings. Blinking Transmitting/receiving green radio packets. Blinking Steady green green – – Blinking Maximum retries or amber buffer full occurred on the radio. Steady green Transmitting/receiving packets. Blinking Steady amber green – Transmit/receive errors. Blinking – red – Ethernet cable is disconnected (340 series only). – Blinking – amber General warning. Failure Steady red Steady red Steady red Firmware failure; disconnect power from the unit and reapply power. Firmware upgrade – Steady red – Unit is loading new firmware. Cisco Aironet Access Point Software Configuration Guide 9-40 OL-0657-07 Chapter 9 Diagnostics and Troubleshooting Checking Basic Settings Finding an Access Point by Blinking the Top Panel Indicators If you need to find the physical location of a particular access point, you can put the top panel indicators into blinking mode. Follow these instructions to blink the access point’s top panel indicators: Step 1 Browse to the access point’s Cisco Services Setup page: a. On the Summary Status page, click Setup. b. On the Setup page, click Cisco Services. Step 2 Select Enabled for the Locate unit by flashing LEDs option. Step 3 Click Apply. The access point’s top panel indicators blink amber in unison. Step 4 To make the indicators stop blinking and return to normal operation, select Disabled for the Locate unit by flashing LEDs option, and click Apply. Checking Basic Settings Mismatched basic settings are the most common causes of lost connectivity with wireless clients. If the access point does not communicate with client devices, check the following settings. SSID Wireless clients attempting to associate with the access point must use the same SSID as the access point. The default SSID is tsunami. WEP Keys The WEP key you use to transmit data must be set up exactly the same on your access point and any wireless devices with which it associates. For example, if you set WEP Key 3 on your wireless LAN adapter to 0987654321 and select it as the transmit key, you must also set WEP Key 3 on the access point to exactly the same value. The access point does not need to use Key 3 as its transmit key, however. Cisco Aironet Access Point Software Configuration Guide OL-0657-07 9-41 Chapter 9 Diagnostics and Troubleshooting Checking Basic Settings Note If you use Network-EAP as the authentication type, you must select key 1 as the access point’s transmit key. The access point uses the WEP key you enter in key slot 1 to encrypt multicast data signals it sends to EAP-enabled client devices. Because the access point transmits the WEP key used for multicast messages to the EAP-enabled client device during the EAP authentication process, that key does not have to appear in the EAP-enabled device’s WEP key list. The access point uses a dynamic WEP key to encrypt unicast messages to EAP-enabled clients. Refer to the “Setting Up WEP” section on page 4-9 for instructions on setting the access point’s WEP keys. EAP Authentication Requires Matching 802.1x Protocol Drafts Note This section applies to wireless networks set up to use LEAP. If you do not use LEAP on your wireless network, you can skip this section. Wireless client devices use Extensible Authentication Protocol (EAP) to log onto a network and generate a dynamic, client-specific WEP key for the current logon session. If your wireless network uses WEP without EAP, client devices use the static WEP keys entered in the Aironet Client Utilities. If you use Network-EAP authentication on your wireless network, your client devices and access points must use the same 802.1x protocol draft. For example, if the radio firmware on the client devices that will associate with an access point or bridge is 4.16, then the access point or bridge should be configured to use Draft 8 of the 802.1x protocol. Table 9-4 lists firmware versions for Cisco Aironet products and the draft with which they comply. Table 9-4 802.1x Protocol Drafts and Compliant Client Firmware Firmware Version Draft 7 Draft 8 Draft 10 PC/PCI cards 4.13 — — PC/PCI cards 4.16 — — PC/PCI cards 4.23 — — Cisco Aironet Access Point Software Configuration Guide 9-42 OL-0657-07 Chapter 9 Diagnostics and Troubleshooting Checking Basic Settings Table 9-4 802.1x Protocol Drafts and Compliant Client Firmware Firmware Version Draft 7 Draft 8 Draft 10 PC/PCI cards 4.25 and later — — WGB34x/352 8.58 — — WGB34x/352 8.61 or later — — — — — — AP34x/35x 11.05 and earlier AP34x/35x 11.06 and later BR352 11.06 and later 1. The default draft setting in access point and bridge firmware version 11.06 and later is Draft 10. Note Draft standard 8 is the default setting in firmware version 11.05 and earlier, and it might remain in effect when you upgrade the firmware to version 11.06 or later. Check the setting on the Authenticator Configuration page in the management system to make sure the best draft standard for your network is selected. Use the Authenticator Configuration page to select the draft of the 802.1x protocol the access point’s radio should use. Follow these steps to set the draft for your access point: Step 1 Step 2 Browse to the Authenticator Configuration page in the access point management system. a. On the Summary Status page, click Setup. b. On the Setup page, click Security. c. On the Security Setup page, click Authentication Server. Use the 802.1x Protocol Version (for EAP authentication) pull-down menu to select the draft of the 802.1x protocol the access point’s radio should use. Menu options include: • Draft 7—No radio firmware versions compliant with Draft 7 have LEAP capability, so you should not need to select this setting. Cisco Aironet Access Point Software Configuration Guide OL-0657-07 9-43 Chapter 9 Diagnostics and Troubleshooting Resetting to the Default Configuration Step 3 • Draft 8—Select this option if LEAP-enabled client devices that associate with this access point use radio firmware versions 4.13, 4.16, or 4.23. • Draft 10—This is the default setting in access point firmware versions 11.06 and later. Select this option if client devices that associate with this access point use Microsoft Windows XP EAP authentication or if LEAP-enabled client devices that associate with this bridge use radio firmware version 4.25 or later. Click Apply or OK to apply the setting. The access point reboots. Resetting to the Default Configuration If you forget the password that allows you to configure the access point, you might need to completely reset the configuration. Follow the steps below to delete the current configuration and return all access point settings to the factory defaults. Steps for Firmware Versions 11.07 or Later Follow the steps in this section if your access point is running firmware version 11.07 or later. Note The following steps reset all configuration settings to factory defaults, including passwords, WEP keys, the IP address, and the SSID. If you do not need to reset the entire configuration, use the Configuration Reset buttons on the System Configuration Setup page in the web-browser interface. Consult the “Resetting the Configuration” section on page 6-15 for more information on the reset buttons in the web-browser interface. Step 1 Use a straight-through cable with 9-pin male to 9-pin female connectors to connect the COM 1 or COM 2 port on your computer to the RS-232 port on the access point. Step 2 Open a terminal-emulation program on your computer. Cisco Aironet Access Point Software Configuration Guide 9-44 OL-0657-07 Chapter 9 Diagnostics and Troubleshooting Resetting to the Default Configuration Note These instructions describe HyperTeminal; other programs are similar. Step 3 In the Connection Description window, enter a name and select an icon for the connection and click OK. Step 4 In the Connect To window, select the port to which the cable is connected and click OK. Step 5 In the Port Settings window, enter the following settings: • 9600 baud, • 8 data bits, • No parity, • 1 stop bit, and • Xon/Xoff flow control Step 6 Click OK, and press Enter. Step 7 When the Summary Status screen appears, reboot the access point by unplugging the power connector and then plugging it back in. Step 8 When the access point reboots and the Summary Status screen reappears, type :resetall, and press Enter. Step 9 Type yes, and press Enter to confirm the command. Note Step 10 The resetall command is valid for only 2 minutes immediately after the access point reboots. If you do not enter and confirm the resetall command during that 2 minutes, reboot the access point again. After the access point reboots and the Express Setup screen appears, reconfigure the access point by using the terminal emulator or an Internet browser. Cisco Aironet Access Point Software Configuration Guide OL-0657-07 9-45 Chapter 9 Diagnostics and Troubleshooting Resetting to the Default Configuration Steps for Firmware Versions 11.06 or Earlier Follow the steps in this section if your access point is running firmware version 11.06 or earlier. Note The following steps reset all configuration settings to factory defaults, including passwords, WEP keys, the IP address, and the SSID. If you do not need to reset the entire configuration, use the Configuration Reset buttons on the System Configuration Setup page in the web-browser interface. Consult the “Resetting the Configuration” section on page 6-15 for more information on the reset buttons in the web-browser interface. Determining the Boot-Block Version The steps you follow to reconfigure the access point depend on the version of the access point’s boot block. Follow these steps to find out which boot block version is on your access point: Step 1 Open a Telnet session to the access point. Note You can also use these instructions while communicating with the access point through the console port or with an SNMP manager. Skip to Step 3 if you use an SNMP manager. Step 2 Type :cmd and press Enter to switch from text-browser mode to SNMP mode. Step 3 Type bootblockVersion and press Enter. Text appears with information about the system. If your access point’s boot block version is 1.01, the text might look like this: OID: iso.org.dod.internet.private.enterprises.aironet.awcVx.awcSystem. bootblockVersion Value [RO]: 1.01 Step 4 Type exit and press Enter to return to text-browser mode. Cisco Aironet Access Point Software Configuration Guide 9-46 OL-0657-07 Chapter 9 Diagnostics and Troubleshooting Resetting to the Default Configuration Step 5 If your boot block version is 1.01 or earlier, follow the instructions in the “Reconfiguration Steps for Boot Block Version 1.01 or Earlier” section on page 9-47. If your boot block version is 1.02 or later, follow the instructions in the “Reconfiguration Steps for Boot Block Version 1.02 or Later” section on page 9-49. Reconfiguration Steps for Boot Block Version 1.01 or Earlier Follow these steps to reconfigure your access point if the boot block version on your access point is version 1.01 or earlier and the firmware version on your access point is 11.06 or earlier. To find which boot block version is on your access point, follow the steps in the “Determining the Boot-Block Version” section on page 9-46. Caution Failure to follow these instructions correctly can result in a nonoperational access point that must be returned to the factory. If your access point stops working after you attempt this procedure, contact Cisco TAC for assistance. Step 1 Use a straight-through cable with 9-pin male to 9-pin female connectors to connect the COM 1 or COM 2 port on your computer to the RS-232 port on the access point. Step 2 Open a terminal-emulation program on your computer. Note These instructions describe HyperTeminal; other programs are similar. Step 3 In the Connection Description window, enter a name and select an icon for the connection and click OK. Step 4 In the Connect To window, select the port to which the cable is connected and click OK. Step 5 In the Port Settings window, make the following settings: 9600 baud, 8 data bits, No parity, 1 stop bit, and Xon/Xoff flow control. Step 6 Click OK and press Enter three times. Cisco Aironet Access Point Software Configuration Guide OL-0657-07 9-47 Chapter 9 Diagnostics and Troubleshooting Resetting to the Default Configuration Step 7 When the Summary Status screen appears, reboot the access point by unplugging the power connector and then plugging it back in, or by pressing Ctrl-X. Step 8 When the message “Typewithin 5 seconds for menu” appears, press Esc. Step 9 Write down the list of files for future reference. Caution Perform the next six steps carefully to avoid accidentally deleting the installation key files or the firmware files. You must carefully note the file selection letters, because they change during the following steps. If you forget to copy the access point’s installation key file to DRAM in Step 10, or if you do not copy it back to configuration memory in Step 13, your access point will stop functioning. Step 10 Copy the access point’s installation key file to the access point’s DRAM by pressing c to select Copy file, then 1 to select DRAM, then the selection letter for the file called AP Installation Key. Step 11 If the list of configuration files contains a file called VAR Installation Key, copy that file to DRAM along with the AP Installation Key. Copy the VAR installation key file to DRAM by pressing c to select Copy file, then 1 to select DRAM, then the selection letter for the file called VAR Installation Key. Caution Make sure you select the Configuration memory bank for formatting in Step 12. If you accidentally format a different memory bank your access point will stop functioning. Step 12 Reformat the access point’s configuration memory bank by pressing ! to select FORMAT memory bank, then 2 to select Config, then upper-case Y to confirm the FORMAT command. Step 13 Copy the installation key back to the configuration memory bank by pressing c to select Copy file, then 2 to select Config, then the selection letter for the AP Installation Key. Step 14 If you copied a VAR installation key to DRAM in Step 11, copy it back to the configuration memory bank by pressing c to select Copy file, then 2 to select Config, then the selection letter for the file VAR Installation Key. If the access point does not have a VAR installation key file, skip to Step 15. Cisco Aironet Access Point Software Configuration Guide 9-48 OL-0657-07 Chapter 9 Diagnostics and Troubleshooting Resetting to the Default Configuration Step 15 Run the access point firmware by pressing r to select Run, then the selection letter for the firmware file which is displayed. The message “Inflating [firmware file name]” appears while the access point starts the firmware. Step 16 When the Express Setup screen appears, begin reconfiguring the access point using the terminal emulator or an Internet browser. Reconfiguration Steps for Boot Block Version 1.02 or Later Follow these steps to reconfigure your access point if the boot block version on your access point is version 1.02 or later and the firmware version on your access point is 11.06 or earlier. To find which boot block version is on your access point, follow the steps in the “Determining the Boot-Block Version” section on page 9-46. Caution Failure to follow these instructions correctly can result in a nonoperational access point that must be returned to the factory. If your access point stops working after you attempt this procedure, contact Cisco TAC for assistance. Step 1 Use a straight-through cable with 9-pin male to 9-pin female connectors to connect the COM 1 or COM 2 port on your computer to the RS-232 port on the access point. Step 2 Open a terminal-emulation program on your computer. Note These instructions describe HyperTeminal; other programs are similar. Step 3 In the Connection Description window, enter a name and select an icon for the connection and click OK. Step 4 In the Connect To window, select the port to which the cable is connected and click OK. Step 5 In the Port Settings window, make the following settings: 9600 baud, 8 data bits, No parity, 1 stop bit, and Xon/Xoff flow control. Step 6 Click OK and press Enter. Cisco Aironet Access Point Software Configuration Guide OL-0657-07 9-49 Chapter 9 Diagnostics and Troubleshooting Resetting to the Default Configuration Step 7 When the Summary Status screen appears, reboot the access point by pressing Ctrl-X or by unplugging the power connector and then plugging it back in. Step 8 When the memory files are listed under the heading “Memory:File,” press Ctrl-W within 5 seconds to reach the boot block menu. Step 9 Write down the list of files for future reference. Caution Perform the next six steps carefully to avoid accidently deleting the installation key files or the firmware files. You must carefully note the file selection letters, because they change during the following steps. If you forget to copy the access point’s installation key file to DRAM in Step 10, or if you do not copy it back to configuration memory in Step 13, your access point will stop functioning. Step 10 Copy the access point’s AP Installation Key to the access point’s DRAM by pressing c to select Copy file, then 1 to select DRAM, then the selection letter for the file AP Installation Key. Step 11 If the list of configuration files contains a file called VAR Installation Key, you must copy that file to DRAM along with the AP Installation Key file. If the access point does not have a VAR installation key file, skip to Step 12. Caution If you forget to copy the access point’s VAR installation key file to DRAM in Step 11, or if you do not copy it back to configuration memory in Step 14, your access point will stop functioning. Copy the VAR Installation Key to DRAM by pressing c to select Copy file, then 1 to select DRAM, then the selection letter for the file VAR Installation Key. Step 12 Caution Reformat the access point’s configuration memory bank by pressing Ctrl-Z to reach the reformat menu. When the menu appears, press ! to select FORMAT memory bank, then 2 to select Config, then upper-case Y to confirm the FORMAT command. Make sure you select the Configuration memory bank for formatting. If you accidentally format a different memory bank your access point will stop functioning. Cisco Aironet Access Point Software Configuration Guide 9-50 OL-0657-07 Chapter 9 Diagnostics and Troubleshooting Resetting to the Default Configuration Step 13 Copy the installation key back to the configuration memory bank by pressing c to select Copy file, then 2 to select Config, then the selection letter for the file AP Installation Key. Step 14 If you copied a VAR installation key to DRAM in Step 11, copy it back to the configuration memory bank by pressing c to select Copy file, then 2 to select Config, then the selection letter for the file VAR Installation Key. If the access point does not have a VAR installation key file, skip to Step 15. Step 15 Run the access point firmware by pressing r to select Run, then the selection letter for the firmware file that is displayed. The message “Inflating [firmware file name]” appears while the access point starts the firmware. Step 16 When the Express Setup screen appears, begin reconfiguring the access point using the terminal emulator or an Internet browser. Cisco Aironet Access Point Software Configuration Guide OL-0657-07 9-51 Chapter 9 Diagnostics and Troubleshooting Resetting to the Default Configuration Cisco Aironet Access Point Software Configuration Guide 9-52 OL-0657-07 A P P E N D I X Menu Tree This section provides a menu tree for the Access Point management pages. The pages are organized the same way for all interfaces. Figures A-1 through A-4 show the organization for the management system’s home page and the main sub-pages. Figure A-1 Home Page Menu Tree Association Table Association Table Filters Station Setup (see Figure A-2) Network Ports Ethernet Port Ethernet Hardware AP radio Port AP Radio Hardware Event Log Event Display Setup Event Log Summary Map Network Map 50259 Summary Status Cisco Aironet Access Point Software Configuration Guide OL-0657-07 A-1 Appendix A Main Setup Page Menu Tree Summary Status Setup Express Setup Boot Server Setup Routing Setup SNMP Setup Association Table Filters Spanning Tree Port Assignments Address Filters Ethertype Filters IP Protocol Filters IP Port Filters Association Table Advanced Event Display Setup Event Handling Setup Event Notification Setup Console/Telnet Setup Time Server Setup Boot Server Setup FTP Setup Routing Setup Web Server Setup Name Server Setup SNMP Setup Database Query Cisco Services Setup (see Figure A-3) Security Setup (see Figure A-4) Network Diagnostics Ethernet Port Ethernet Identification Ethernet Hardware Ethernet Protocol Filters Ethertype Protocol Filters IP Protocol Filters IP Port Filters Ethernet Advanced Root Radio Port Root Radio Identification Root Radio Hardware Root Radio Protocol Filters Ethertype Protocol Filters IP Protocol Filters IP Port Filters Root Radio Advanced 54970 Figure A-2 Menu Tree Cisco Aironet Access Point Software Configuration Guide A-2 OL-0657-07 Menu Tree Cisco Services Setup Page Menu Tree Summary Status Setup Cisco Services Setup Manage Installation Keys System Configuration Setup Distribute Configuration Distribute Firmware Hot Standby Cisco Discovery Protocol Setup Update All Firmware Through Browser Update Firmware Through Browser Update All Firmware From File Server Update Firmware From File Server Figure A-4 50261 Figure A-3 Security Setup Page Menu Tree Summary Status Setup Security Setup Login User Manager Setup User Information Change Password Authentication Server AP Radio Data Encryption 50262 Appendix A Cisco Aironet Access Point Software Configuration Guide OL-0657-07 A-3 Appendix A Menu Tree Cisco Aironet Access Point Software Configuration Guide A-4 OL-0657-07 A P P E N D I X Protocol Filter Lists The tables in this appendix list the protocols available on the Protocol Filters pages described in the “Protocol Filtering” section on page 3-8. The tables include: • Table B-1, Protocols on the Ethertype Filters Page • Table B-2, Protocols on the IP Protocol Filters Page • Table B-3, Protocols on the IP Port Protocol Filters Page In each table, the Protocol column lists the protocol name, and the Additional Identifier column lists other names for the same protocol. You can type either name in the Special Cases field on the Filter Set page to select the protocol. Table B-3 also lists the protocols’ ISO numeric designators. You can use these designators to select a protocol also. Cisco Aironet Access Point Software Configuration Guide OL-0657-07 B-1 Appendix B Table B-1 Protocol Filter Lists Protocols on the Ethertype Filters Page Protocol Additional Identifier ISO Designator ARP — 0x0806 RARP — 0x8035 IP — 0x0800 Berkeley Trailer Negotiation — 0x1000 LAN Test — 0x0708 X.25 Level3 X.25 0x0805 Banyan — 0x0BAD CDP — 0x2000 DEC XNS XNS 0x6000 DEC MOP Dump/Load — 0x6001 DEC MOP MOP 0x6002 DEC LAT LAT 0x6004 Ethertalk — 0x809B Appletalk ARP Appletalk AARP 0x80F3 IPX 802.2 — 0x00E0 IPX 802.3 — 0x00FF Novell IPX (old) — 0x8137 Novell IPX (new) IPX 0x8138 EAPOL (old) — 0x8180 EAPOL (new) — 0x888E Telxon TXP TXP 0x8729 Aironet DDP DDP 0x872D Enet Config Test — 0x9000 NetBUI — 0xF0F0 Cisco Aironet Access Point Software Configuration Guide B-2 OL-0657-07 Appendix B Protocol Filter Lists Table B-2 Protocols on the IP Protocol Filters Page Protocol Additional Identifier ISO Designator dummy — Internet Control Message Protocol ICMP Internet Group Management Protocol IGMP Transmission Control Protocol TCP Exterior Gateway Protocol EGP PUP — 12 CHAOS — 16 User Datagram Protocol UDP 17 XNS-IDP IDP 22 ISO-TP4 TP4 29 ISO-CNLP CNLP 80 Banyan VINES VINES 83 Encapsulation Header encap_hdr 98 Spectralink Voice Protocol SVP Spectralink 119 raw — 255 Cisco Aironet Access Point Software Configuration Guide OL-0657-07 B-3 Appendix B Table B-3 Protocol Filter Lists Protocols on the IP Port Protocol Filters Page Protocol Additional Identifier ISO Designator TCP port service multiplexer tcpmux echo — discard (9) — systat (11) — 11 daytime (13) — 13 netstat (15) — 15 Quote of the Day qotd quote 17 Message Send Protocol msp 18 ttytst source chargen 19 FTP Data ftp-data 20 FTP Control (21) ftp 21 Secure Shell (22) ssh 22 Telnet — 23 Simple Mail Transport Protocol SMTP mail 25 time timserver 37 Resource Location Protocol RLP 39 IEN 116 Name Server name 42 whois nicname 43 43 Domain Name Server DNS domain 53 MTP — 57 BOOTP Server — 67 BOOTP Client — 68 TFTP — 69 Cisco Aironet Access Point Software Configuration Guide B-4 OL-0657-07 Appendix B Protocol Filter Lists Table B-3 Protocols on the IP Port Protocol Filters Page (continued) Protocol Additional Identifier ISO Designator gopher — 70 rje netrjs 77 finger — 79 Hypertext Transport Protocol HTTP www 80 ttylink link 87 Kerberos v5 Kerberos krb5 88 supdup — 95 hostname hostnames 101 TSAP iso-tsap 102 CSO Name Server cso-ns csnet-ns 105 Remote Telnet rtelnet 107 Postoffice v2 POP2 POP v2 109 Postoffice v3 POP3 POP v3 110 Sun RPC sunrpc 111 tap ident authentication auth 113 sftp — 115 uucp-path — 117 Network News Transfer Protocol Network News readnews nntp 119 USENET News Transfer Protocol Network News readnews nntp 119 Network Time Protocol ntp 123 Cisco Aironet Access Point Software Configuration Guide OL-0657-07 B-5 Appendix B Table B-3 Protocol Filter Lists Protocols on the IP Port Protocol Filters Page (continued) Protocol Additional Identifier ISO Designator NETBIOS Name Service netbios-ns 137 NETBIOS Datagram Service netbios-dgm 138 NETBIOS Session Service netbios-ssn 139 Interim Mail Access Protocol v2 Interim Mail Access Protocol 143 IMAP2 Simple Network Management Protocol SNMP 161 SNMP Traps snmp-trap 162 ISO CMIP Management Over IP CMIP Management 163 Over IP cmip-man CMOT ISO CMIP Agent Over IP cmip-agent 164 X Display Manager Control Protocol xdmcp 177 NeXTStep Window Server NeXTStep 178 Border Gateway Protocol BGP 179 Prospero — 191 Internet Relay Chap IRC 194 SNMP Unix Multiplexer smux 199 AppleTalk Routing at-rtmp 201 AppleTalk name binding at-nbp 202 AppleTalk echo at-echo 204 AppleTalk Zone Information at-zis 206 NISO Z39.50 database z3950 210 IPX — 213 Cisco Aironet Access Point Software Configuration Guide B-6 OL-0657-07 Appendix B Protocol Filter Lists Table B-3 Protocols on the IP Port Protocol Filters Page (continued) Protocol Additional Identifier ISO Designator Interactive Mail Access Protocol imap3 v3 220 Unix Listserv ulistserv 372 syslog — 514 Unix spooler spooler 515 talk — 517 ntalk — 518 route RIP 520 timeserver timed 525 newdate tempo 526 courier RPC 530 conference chat 531 netnews — 532 netwall wall 533 UUCP Daemon UUCP uucpd 540 Kerberos rlogin klogin 543 Kerberos rsh kshell 544 rfs_server remotefs 556 Kerberos kadmin kerberos-adm 749 network dictionary webster 765 SUP server supfilesrv 871 swat for SAMBA swat 901 SUP debugging supfiledbg 1127 ingreslock — 1524 Prospero non-priveleged prospero-np 1525 RADIUS — 1812 Cisco Aironet Access Point Software Configuration Guide OL-0657-07 B-7 Appendix B Table B-3 Protocol Filter Lists Protocols on the IP Port Protocol Filters Page (continued) Protocol Additional Identifier ISO Designator Concurrent Versions System CVS 2401 Cisco IAPP — 2887 Radio Free Ethernet RFE 5002 Cisco Aironet Access Point Software Configuration Guide B-8 OL-0657-07 A P P E N D I X Channels, Power Levels, and Antenna Gains This appendix lists the channels supported by the world's regulatory domains as well as the maximum power levels and antenna gains allowed per domain. This appendix covers these topics: • Channels, page C-2 • Maximum Power Levels and Antenna Gains, page C-3 Cisco Aironet Access Point Software Configuration Guide OL-0657-07 C-1 Appendix C Channels, Power Levels, and Antenna Gains Channels Channels The channel identifiers, channel center frequencies, and regulatory domains of each 22-MHz-wide channel are shown in Table C-1. Table C-1 Channels Regulatory Domains Channel Identifier Center Frequency North America and ANZ ETSI Israel China Japan 2412 MHz 2417 MHz 2422 MHz 2427 MHz 2432 MHz 2437 MHz 2442 MHz 2447 MHz 2452 MHz 10 2457 MHz 11 2462 MHz 12 2467 MHz 13 2472 MHz 14 2484 MHz Note Mexico is included in the North America regulatory domain; however, channels 1 through 8 are for indoor use only while channels 9 through 11 can be used indoors and outdoors. Users are responsible for ensuring that the channel set configuration is in compliance with the regulatory standards of Mexico. Cisco Aironet Access Point Software Configuration Guide C-2 OL-0657-07 Appendix C Channels, Power Levels, and Antenna Gains Maximum Power Levels and Antenna Gains Note France is included in the ETSI regulatory domain; however, channels 1 through 9 can be used in France at up to 10 mW EIRP, and channels 10 through 13 may be used at up to 100 mW EIRP. Users are responsible for ensuring that the channel set configuration is in compliance with the regulatory standards of France. Maximum Power Levels and Antenna Gains An improper combination of power level and antenna gain can result in equivalent isotropic radiated power (EIRP) above the amount allowed per regulatory domain. Table C-2 indicates the maximum power levels and antenna gains allowed for each regulatory domain. Table C-2 Maximum Power Levels Per Antenna Gain Regulatory Domain North America and ANZ (4 watts EIRP maximum) Antenna Gain (dBi) Maximum Power Level (mW) 100 2.2 100 5.2 100 100 8.5 100 12 100 13.5 100 21 20 Cisco Aironet Access Point Software Configuration Guide OL-0657-07 C-3 Appendix C Channels, Power Levels, and Antenna Gains Maximum Power Levels and Antenna Gains Table C-2 Maximum Power Levels Per Antenna Gain (continued) Regulatory Domain ETSI (100 mW EIRP maximum) Israel (100 mW EIRP maximum) China (10 mW EIRP maximum) Antenna Gain (dBi) Maximum Power Level (mW) 100 2.2 50 5.2 30 30 8.5 12 13.5 21 100 2.2 50 5.2 30 30 8.5 12 13.5 21 2.2 5.2 n/a n/a 8.5 n/a 12 n/a 13.5 n/a 21 n/a Cisco Aironet Access Point Software Configuration Guide C-4 OL-0657-07 Appendix C Channels, Power Levels, and Antenna Gains Maximum Power Levels and Antenna Gains Table C-2 Maximum Power Levels Per Antenna Gain (continued) Regulatory Domain Japan (10 mW/MHz EIRP maximum) Antenna Gain (dBi) Maximum Power Level (mW) 50 2.2 30 5.2 30 30 8.5 n/a 12 n/a 13.5 21 n/a Cisco Aironet Access Point Software Configuration Guide OL-0657-07 C-5 Appendix C Channels, Power Levels, and Antenna Gains Maximum Power Levels and Antenna Gains Cisco Aironet Access Point Software Configuration Guide C-6 OL-0657-07 I N D EX backup servers 4-40 EAP 4-5 Access Point Radio Port page 9-13 port setting 4-22 accounting on RADIUS server 5-16 shared secret 4-22 activity timeout 3-68, 5-8 authentication types administrator authorization 4-41 combining MAC-based and EAP 4-34 Aironet extensions 3-33 LEAP 4-24 antennas MAC-based 4-29 alignment test 9-3 Network-EAP 4-4 gains C-3 open 4-7 receive and transmit 3-29 shared key 4-8 Apply button 2-3 summary of settings 4-37 AP Radio Advanced page 3-31 AP Radio Hardware page 3-22 AP Radio Identification page 3-19 assigning network ports 5-14 backup authentication servers 4-40 associations allowed, maximum number of 3-33 basic settings configuration server protocol 3-3 associations allowed, more than 20 workgroup bridges 3-34 default gateway 3-4 Association table ensure compatibility with 3-7 Association Table Advanced page 3-66 IP address 3-4 Association Table page 5-2 IP subnet mask 3-4 Station page 5-3 optimize radio network for 3-7 authentication server Authentication Server Setup page 4-20 role in radio network 3-5 SNMP admin. community 3-7 Cisco Aironet Access Point Software Configuration Guide OL-0657-07 IN-1 Index SSID 3-4 setting session-based WEP key timeout 4-26 system name 3-3 CLI baud rate 2-7 auto-apply 2-9 beacons, period and rate 3-27 common functions 2-8 bit-flip attack 4-3 diagnostics 9-20 blinking top panel indicators 9-41 terminal emulator settings 2-6 boot block version 9-46 client devices BOOTP protocol 3-50 browsing to 5-2 BOOTP server timeout 3-51 deauthenticating 5-11 Boot Server Setup page 3-49 disassociating 5-11 broadcast SSID 3-24 EAP settings 4-24 broadcast WEP key rotation 4-17 in network map 2-5 browsing to network devices 5-2 Station page information 5-5 cold restart 6-16 combining EAP and MAC-based authentication 4-34 Cancel button 2-3 carrier test 9-5 CDP MIB 2-12 configuration distributing the configuration 6-9 downloading the configuration 6-12 resetting the configuration 6-15 channel identifiers, center frequencies C-2 overlap 3-27 restrict searched channels 3-28 search for less-congested channel 3-28 System Configuration Setup page 6-11 uploading the configuration 6-12 configuration server protocol 3-3 Console/Telnet Setup page 7-5 checkstack command 9-25 China regulatory domain C-2 Cisco Discovery Protocol MIB 2-12 Cisco Secure ACS enabling EAP 4-25 Database Query page, gets and sets 7-3 data rate, radio 3-25 DHCP Cisco Aironet Access Point Software Configuration Guide IN-2 OL-0657-07 Index class identifier 3-53 ensure compatibility with 3-7 lease duration 3-51 Ethernet configuration minimum lease duration 3-51 advanced settings 3-44 multiple-offer timeout 3-51 hardware settings 3-42 diagnostic pages identity settings 3-39 AP Radio Port page 9-13 speed 3-43 Ethernet Port page 9-10 Ethernet encapsulation type 3-35 Event Log page 9-17 Ethernet indicator 9-39 Network Ports page 9-6 Ethernet Port page 9-10 packet tracing 9-33 ETSI regulatory domain C-2 Radio Diagnostics page 9-2 Event Log page 9-17 distribute configuration 6-9 Event notification distribute firmware 6-8 Event Display Setup page 3-69 diversity, antenna 3-29 Event Handling Setup page 3-72 DNS server 3-56 Express Setup page 3-3 draft of 802.1x protocol 4-21 extended statistics 3-68 DTIM 3-27 filters EAP authentication combining with MAC-based authentication 4-34 overview 4-4 Require EAP setting 4-23 setting up in Cisco Secure ACS 4-25 setting up on the access point 4-20 setting WEP key timeout 4-26 EIRP, maximum C-3 to C-5 ISO numeric designators for protocols B-1 MAC address filtering 3-13 protocol filtering 3-8 protocol filter lists B-1 find an access point’s physical location 9-41 firmware distributing to other Access Points 6-8 menu tree A-1 updating to a new version 6-2 encryption. See WEP Cisco Aironet Access Point Software Configuration Guide OL-0657-07 IN-3 Index flow control 2-7 fragment threshold 3-26 France, regulatory domain C-3 Japan frequencies C-2 power levels and antenna gain C-5 FTP 3-58 regulatory domain C-2 gateway 3-4 key features 1-2 key hashing, WEP 4-16 Kilomicroseconds, in beacon period 3-27 help, setting up 3-53 hexadecimal digits 4-10 Home button 2-3 LEAP hops 5-8 enabling on a repeater access point 4-27 Hot Standby mode 8-6 with Network-EAP setting 4-19 HTTP Port 3-54 HyperTerminal 2-9 LED indicators Ethernet 9-39 locate unit by flashing LEDs 9-41 radio traffic 9-39 status 9-39 initialization vector 4-16 link test 5-8 IP subnet mask 3-4 load balancing 3-33 ISO designators for protocols B-1 locate unit by flashing LEDs 9-41 Israel regulatory domain C-2 logs 9-17 Cisco Aironet Access Point Software Configuration Guide IN-4 OL-0657-07 Index MAC address 3-3 Network Ports page 9-6 North America and ANZ regulatory domain C-2 MAC address filters 3-13 MAC-based authentication 4-29 combining with EAP 4-34 setting up in Cisco Secure ACS 4-35 map windows 2-4 OK button 2-3 optimize radio network for 3-7 maximum number of associations 3-33 memory, conserving 3-68 memory use diagnostics 9-29 menu tree A-1 packet tracing 9-33 Mexico, regulatory domain C-2 parity 2-7 MIB files password reset 9-44 access point MIB 2-12 pings 5-8 Cisco Discovery Protocol MIB 2-12 ports, assigning to MAC addresses 5-14 IEEE802dot11-MIB 2-12 power level standard MIB-II 2-11 maximum C-3 to C-5 MIC 4-14 power level setting 3-26 monitored access point 8-6 preamble 3-39 multicast packets 3-32 primary port 3-20 protocol filters enabling filters 3-12 forward or block 3-11 name server 3-56 list of available protocols B-1 NAS, adding and configuring 4-25 priorities 3-11 Network-EAP 4-4 time to live setting 3-10 network infrastructure, classify workgroup bridges as 3-34 PSPF 3-68 network map window 2-5 Cisco Aironet Access Point Software Configuration Guide OL-0657-07 IN-5 Index restarts, cold and warm 6-16 restore defaults 2-3 radio restrict searched channels 3-28 carrier test 9-5 roaming 1-3 radio cell role 3-33 role in radio network 3-5 radio configuration root unit 3-5 advanced settings 3-30 routing setup 3-60 hardware settings 3-21 RS-232 serial port 2-6 identity settings 3-18 RTS retries and threshold 3-27 primary port 3-20 radio indicator 9-39 radio modulation 3-38 radio power level 3-26 RADIUS server backup servers 4-40 search for less-congested channel restrict searched channels 3-28 security shared secret 4-22 Cisco Secure ACS 4-25 wireless network accounting 5-16 overview 4-2 receive antenna 3-29 Security Setup page 4-42 regulatory user manager 4-41 domains C-2 regulatory domains C-2 serial cable 2-6 server setup related publications, obtaining xvi boot server 3-49 repeater FTP 3-58 chain of access points 8-2 name server 3-56 setting up a repeater 8-1 routing 3-60 setting up as a LEAP Client 4-27 time server 3-47 specified access points 3-38 web server 3-53 Require EAP setting 4-23 session-based WEP key, timeout value 4-26 resetting to the default configuration 9-44 severity levels 3-67 Cisco Aironet Access Point Software Configuration Guide IN-6 OL-0657-07 Index shared key 4-7 TKIP 4-16 SNMP top panel indicators 9-38 Admin. community 3-7 tracing packets 9-33 Database Query page 7-3 transmit antenna 3-29 SNMP Setup page 7-2 transmit power 3-26 supported MIBs 2-11 using to set WEP 4-12 Speed setting 3-43 SSID 3-4, 3-21 unicast packets, filtering 3-37 standby mode 8-6 updating firmware 6-2 Station pages 5-3 user management statistics 5-10 capabilities 4-43 status indicator 9-39 creating list of authorized users 4-42 stop bits 2-7 user information 4-42 system name 3-3 vendor class identifier 3-53 Telnet interface enabling Telnet 7-6 setup page 7-5 temporal key integrity protocol 3-36 warm restart 6-16 terminal emulator 2-6 Web-based interface TFTP 3-59 common buttons 2-3 timeout per device class setting 3-68 compatible browsers 2-2 timeout value for session-based WEP keys 4-26 Web server 3-53 time server WEP GMT offset 3-48 broadcast key rotation 4-17 manually set date and time 3-48 full encryption 4-12 Cisco Aironet Access Point Software Configuration Guide OL-0657-07 IN-7 Index key example 4-11 key hashing 4-16 key size 4-10 optional 4-12 overview 4-3 session key timeout 4-26 setting with SNMP 4-12 transmit key 4-10 with EAP 4-4 Windows XP, using EAP with 4-21 workgroup bridges, allowing more than 20 to associate 3-34 World mode 3-24 Cisco Aironet Access Point Software Configuration Guide IN-8 OL-0657-07
Source Exif Data:
File Type : PDF File Type Extension : pdf MIME Type : application/pdf PDF Version : 1.3 Linearized : No Modify Date : 2002:11:05 13:28:09-05:00 Create Date : 2002:11:05 13:27:40-05:00 Title : ap350scg.fmb Creator : FrameMaker 5.5.6p145 Producer : Acrobat Distiller 4.0 for Windows Page Count : 146EXIF Metadata provided by EXIF.tools