SMC Networks ElliteConnect 2.4GHz/5GHz Owner's Manual

Universal 2.4ghz/5ghz wireless dual-band outdoor access point/bridge
Table of Contents

Advertisement

Quick Links

EliteConnect™ Universal
2.4GHz/5GHz Wireless Dual-Band
Outdoor Access Point/Bridge
The easy way to make all your network connections
38 Tesla
Irvine, CA 92618
Phone: (949) 679-8000
May 2005
Revision Number: R01
F1.1.2.5

Advertisement

Table of Contents
loading

Summary of Contents for SMC Networks ElliteConnect 2.4GHz/5GHz

  • Page 1 EliteConnect™ Universal 2.4GHz/5GHz Wireless Dual-Band Outdoor Access Point/Bridge The easy way to make all your network connections 38 Tesla Irvine, CA 92618 Phone: (949) 679-8000 May 2005 Revision Number: R01 F1.1.2.5...
  • Page 2 SMC Networks, Inc. 38 Tesla Irvine, CA 92618 All rights reserved. Trademarks: SMC is a registered trademark; and EliteConnect is a trademark of SMC Networks, Inc. Other product and company names are trademarks or registered trademarks of their respective holders.
  • Page 3 IMITED ARRANTY Limited Warranty Statement: SMC Networks, Inc. (“SMC”) warrants its products to be free from defects in workmanship and materials, under normal use and service, for the applicable warranty term. All SMC products carry a standard 90-day limited warranty from the date of purchase from SMC or its Authorized Reseller.
  • Page 4 * SMC will provide warranty service for one year following discontinuance from the active SMC price list. Under the limited lifetime warranty, internal and external power supplies, fans, and cables are covered by a standard one-year warranty from date of purchase. SMC Networks, Inc. 38 Tesla Irvine, CA 92618...
  • Page 5: Federal Communication Commission Interference Statement

    Federal Communication Commission Interference Statement This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation.
  • Page 6: Ec Conformance Declaration

    5250-5350 MHz and 5650-5850 MHz bands. These radars could cause interference and/or damage to the access point. EC Conformance Declaration SMC contact for these products in Europe is: SMC Networks Europe, Edificio Conata II, Calle Fructuós Gelabert 6-8, 2 08970 - Sant Joan Despí, Barcelona, Spain.
  • Page 7 • This device employs a radar detection feature required for European Community operation in the 5 GHz band. This feature is automatically enabled when the country of operation is correctly configured for any European Community country. The presence of nearby radar operation may result in temporary interruption of operation of this device.
  • Page 8 OMPLIANCES Operation Using 5 GHz Channels in the European Community The user/installer must use the provided configuration utility to check the current channel of operation and make necessary configuration changes to ensure operation occurs in conformance with European National spectrum usage laws as described below and elsewhere in this document.
  • Page 9 Declaration of Conformity in Languages of the European Community English Hereby, SMC Networks, declares that this Radio LAN device is in compliance with the essential requirements and other relevant provisions of Directive 1999/5/EC. Finnish Valmistaja SMC Networks vakuuttaa täten että Radio LAN device tyyppinen laite on direktiivin 1999/5/EY oleellisten vaatimusten ja sitä...
  • Page 10: Safety Compliance

    è conforme ai requisiti essenziali ed alle altre disposizioni pertinenti stabilite dalla direttiva 1999/5/CE. Spanish Por medio de la presente SMC Networks declara que el Radio LAN device cumple con los requisitos esenciales y cualesquiera otras disposiciones aplicables o exigibles de la Directiva 1999/5/ Portuguese SMC Networks declara que este Radio LAN device está...
  • Page 11 Important! Before making connections, make sure you have the correct cord set. Check it (read the label on the cable) against the following: Power Cord Set U.S.A. and The cord set must be UL-approved and CSA certified. Canada The minimum specifications for the flexible cord are: - No.
  • Page 12 OMPLIANCES Veuillez lire à fond l'information de la sécurité suivante avant d'installer le wireless access point: AVERTISSEMENT: L’installation et la dépose de ce groupe doivent être confiés à un personnel qualifié. • Ne branchez pas votre appareil sur une prise secteur (alimentation électrique) lorsqu'il n'y a pas de connexion de mise à...
  • Page 13 Cordon électrique - Il doit être agréé dans le pays d’utilisation Suisse: La prise mâle d’alimentation doit respecter la norme SEV/ASE 1011. Europe La prise secteur doit être conforme aux normes CEE 7/7 (“SCHUKO”) LE cordon secteur doit porter la mention <HAR> ou <BASEC> et doit être de type HO3VVF3GO.75 (minimum).
  • Page 14 OMPLIANCES gegeben, wenn auch die an das Gerät angeschlossenen Geräte unter SELV-Bedingungen betrieben werden. • Stromkabel. Dies muss von dem Land, in dem es benutzt wird geprüft werden: U.S.A und Kanada Danemark Schweiz Europe Der Cord muß das UL gepruft und war das CSA beglaubigt.
  • Page 15: Table Of Contents

    Introduction ......1-1 Package Checklist ....... . . 1-2 Hardware Description .
  • Page 16 ABLE OF ONTENTS Connect External Antennas ......4-5 Connect Cables to the Unit ......4-7 Connect the Power Injector .
  • Page 17 Entering Commands ....... . 7-3 Keywords and Arguments ......7-3 Minimum Abbreviation .
  • Page 18 ABLE OF ONTENTS System Clock Commands ......7-28 sntp-server ip ........7-29 sntp-server enable .
  • Page 19 WDS Commands ....... . . 7-61 wds channel ........7-62 wds mac-address .
  • Page 20 ABLE OF ONTENTS dns server ........7-92 ip address .
  • Page 21 Troubleshooting ......A-1 Specifications ......B-1 General Specifications .
  • Page 22 ABLE OF ONTENTS...
  • Page 23: Introduction

    The SMC EliteConnect Universal 2.4GHz/5GHz Wireless Dual-Band Outdoor Access Point/Bridge system consists of two models that provide point-to-point or point-to-multipoint bridge links between remote Ethernet LANs, and wireless access point services for clients in the local LAN area: • SMC2888W-S – Includes an integrated high-gain antenna for the 802.11a radio and is designed to operate as a “Slave”...
  • Page 24: Package Checklist

    Introduction In addition, both wireless bridge models offer full network management capabilities through an easy-to-use web interface, a command-line interface, and support for Simple Network Management Protocol (SNMP) tools. Radio Characteristics – The IEEE 802.11a and 802.11g standards use a radio modulation technique known as Orthogonal Frequency Division Multiplexing (OFDM), and a shared collision domain (CSMA/CA).
  • Page 25 • Outdoor pole-mounting bracket kit • Outdoor wall-mounting bracket kit • This User Guide Inform your dealer if there are any incorrect, missing or damaged parts. If possible, retain the carton, including the original packing materials. Use them again to repack the product in case there is a need to return it.
  • Page 26: Hardware Description

    Introduction Hardware Description Bottom View RSSI Connector with Grounding Point Ethernet Port Screw Protective Cap Integrated Antenna Top View (SMC2888W-S) N-Type External N-Type External Antenna Connector Antenna Connector (2.4 GHz) (2.4 GHz) Top View (SMC2888W-M) N-Type External N-Type External Antenna Connector Antenna Connector (2.4 GHz) (5 GHz)
  • Page 27: Integrated High-Gain Antenna

    Integrated High-Gain Antenna The SMC2888W-S wireless bridge includes an integrated high-gain (17 dBi) flat-panel antenna for 5 GHz operation. External Antenna Options The SMC2888W-M Master bridge unit does not include an integrated antenna, but provides various external antenna options for both 5 GHz and 2.4 GHz operation. In a point-to-multipoint configuration, an external high-gain omnidirectional, sector, or high-gain panel antenna can be attached to communicate with bridges spread over a wide area.
  • Page 28: Power Injector Module

    Introduction Power Injector Module The wireless bridge receives power through its network cable connection using power-over-Ethernet technology. A power injector module is included in the wireless bridge package and provides two RJ-45 Ethernet ports, one for connecting to the wireless bridge (Output), and the other for connecting to a local LAN switch (Input).
  • Page 29: Receive Signal Strength Indicator (Rssi) Bnc Connector

    The power injector module automatically adjusts to any AC voltage between 100-240 volts at 50 or 60 Hz. No voltage range settings are required. Warning: The power injector module is designed for indoor use only. Never mount the power injector outside with the wireless bridge unit.
  • Page 30: System Configuration

    Introduction System Configuration At each location where a unit is installed, it must be connected to the local network using the power injector module. The following figure illustrates the system component connections. LAN Switch Ethernet Cable AC Power Indoor Outdoor Ethernet Cable Power Injector...
  • Page 31: Features And Benefits

    Features and Benefits • SMC2888W-S Slave units support a 5 GHz high-gain 17 dBi antenna • SMC2888W-M Master units support 5 GHz point-to-multipoint links using various external antenna options • Both SMC2888W-S and SMC2888W-M units also support access point services for the 5 GHz and 2.4 GHz radios using various external antenna options •...
  • Page 32: System Defaults

    Introduction System Defaults The following table lists some of the wireless bridge’s basic system defaults. To reset the bridge defaults, use the CLI command “reset configuration” from the Exec level prompt. Feature Identification Administration General TCP/IP VLANs Filter Control 1-10 Parameter System Name User Name...
  • Page 33 Feature Parameter SNMP Status Location Contact Community (Read Only) Community (Read/Write) Traps Trap Destination IP Address Trap Destination Community Name System Logging Syslog Logging Host Logging Console IP Address / Host Name Logging Level Logging Facility Type Spanning Tree Status Ethernet Speed and Duplex Interface...
  • Page 34 Introduction Feature Wireless Interface 802.11a Wireless Security 802.11a 1-12 Parameter Status SSID Turbo Mode Radio Channel Auto Channel Select Transmit Power Maximum Data Rate Beacon Interval Data Beacon Rate (DTIM Interval) RTS Threshold Authentication Type AES Encryption WEP Encryption WEP Key Length WEP Key Type WEP Transmit Key Number WEP Keys...
  • Page 35 Feature Parameter Wireless Status Interface SSID 802.11b/g Radio Channel Auto Channel Select Transmit Power Maximum Data Rate Beacon Interval Data Beacon Rate (DTIM Interval) RTS Threshold Wireless Authentication Type Security AES Encryption 802.11b/g WEP Encryption WEP Key Length WEP Key Type WEP Transmit Key Number WEP Keys System Defaults...
  • Page 36 Introduction 1-14...
  • Page 37: Network Configuration

    Network Configuration The Dual-band Outdoor Access Point / Bridge system provides access point or bridging services through either the 5 GHz or 2.4 GHz radio interfaces. The wireless bridge units can be used just as normal 802.11a/b/g access points connected to a local wired LAN, providing connectivity and roaming services for wireless clients in an outdoor area.
  • Page 38: Ad Hoc Wireless Lan (No Access Point Or Bridge)

    Network Configuration The 802.11b and 802.11g frequency band, which operates at 2.4 GHz, can easily encounter interference from other 2.4 GHz devices, such as other 802.11b or g wireless devices, cordless phones and microwave ovens. If you experience poor wireless LAN performance, try the following measures: •...
  • Page 39: Infrastructure Wireless Lan

    Infrastructure Wireless LAN The access point function of the wireless bridge provides access to a wired LAN for 802.11a/b/g wireless workstations. An integrated wired/wireless LAN is called an Infrastructure configuration. A Basic Service Set (BSS) consists of a group of wireless PC users and an access point that is directly connected to the wired LAN.
  • Page 40: Infrastructure Wireless Lan For Roaming Wireless Pcs

    Network Configuration Infrastructure Wireless LAN for Roaming Wireless PCs The Basic Service Set (BSS) defines the communications domain for each access point and its associated wireless clients. The BSS ID is a 48-bit binary number based on the access point’s wireless MAC address, and is set automatically and transparently as clients associate with the access point.
  • Page 41: Bridge Link Topologies

    Desktop PC Switch PC with Wireless PCI Adapter Bridge Link Topologies The IEEE 802.11 standard defines a WIreless Distribution System (WDS) for bridge connections between BSS areas (access points). The outdoor wireless bridge uses WDS to forward traffic on links between units. Up to 16 WDS links can be specified for a SMC2888W-M unit, which acts as the “Master”...
  • Page 42: Point-To-Point Configuration

    Network Configuration Note: The external antennas offer longer range options using the 5 GHz radio, which makes this interface more suitable for bridge links. When using WDS on a radio band, only wireless bridge units can associate to each other. Wireless clients can only associate with the wireless bridge using a radio band set to access point mode.
  • Page 43 Bridge Link Topologies Slave Slave Slave Master with Slave Omnidirectional Antenna Slave Slave Slave Master with Slave Sector Antenna Slave...
  • Page 44 Network Configuration...
  • Page 45: Bridge Link Planning

    Bridge Link Planning The SMC Dual-band Outdoor Access Point / Bridge supports fixed point-to-point or point-to-multipoint wireless links. A single link between two points can be used to connect a remote site to larger core network. Multiple bridge links can provide a way to connect widespread Ethernet LANs.
  • Page 46 Bridge Link Planning This area is known as the first Fresnel Zone of the radio link. For a radio link not to be affected by obstacles along its path, no object, including the ground, must intrude within 60% of the first Fresnel Zone.
  • Page 47: Antenna Height

    • Be sure there is enough clearance from buildings and that no building construction may eventually block the path. • Check the topology of the land between the antennas using topographical maps, aerial photos, or even satellite image data (software packages are available that may include this information for your area).
  • Page 48 Bridge Link Planning Total Link Distance 0.25 mile (402 m) 4.5 ft (1.4 m) 0.5 mile (805 m) 1 mile (1.6 km) 2 miles (3.2 km) 3 miles (4.8 km) 4 miles (6.4 km) 5 miles (8 km) 7 miles (11.3 km) 9 miles (14.5 km) 12 miles (19.3 km) 31 ft (9.5 m) 15 miles (24.1 km) 35 ft (10.7 m)
  • Page 49: Antenna Position And Orientation

    A wireless bridge link is deployed to connect building A to a building B, which is located three miles (4.8 km) away. Mid-way between the two buidings is a small tree-covered hill. From the above table it can be seen that for a three-mile link, the object clearance required at the mid-point is 5.3 m (17.4 ft).
  • Page 50: Radio Interference

    Bridge Link Planning • The wireless bridge antennas at both ends of the link must be positioned with the same polarization direction, either horizontal or vertical Antenna Polarization — The wireless bridge’s integrated antenna sends a radio signal that is polarized in a particular direction.
  • Page 51: Weather Conditions

    Weather Conditions When planning wireless bridge links, you must take into account any extreme weather conditions that are known to affect your location. Consider these factors: • Temperature — The wireless bridge is tested for normal operation in temperatures from -33°C to 55°C. Operating in temperatures outside of this range may cause the unit to fail.
  • Page 52: Ethernet Cabling

    Bridge Link Planning Ethernet Cabling When a suitable antenna location has been determined, you must plan a cable route form the wireless bridge outdoors to the power injector module indoors. Consider these points: • The Ethernet cable length should never be longer than 100 m (328 ft) •...
  • Page 53: Hardware Installation

    Hardware Installation Before mounting antennas to set up your wireless bridge links, be sure you have selected appropriate locations for each antenna. Follow the guidance and information in Chapter 2, “Wireless Link Planning.” Also, before mounting units in their intended locations, you should first perform initial configuration and test the basic operation of the wireless bridge links in a controlled environment over a very short range.
  • Page 54: Testing Basic Link Operation

    Hardware Installation 5. Align antennas at both ends of the link. Testing Basic Link Operation Set up the units over a very short range (15 to 25 feet), either outdoors or indoors. Connect the units as indicated in this chapter and be sure to perform all the basic configuration tasks outlined above.
  • Page 55 Attach bracket to pole with mounting grooves facing up 3. Use the included nuts to tightly secure the wireless bridge to the bracket. Be sure to take account of the antenna polarization direction; both antennas in a link must be mounted with the same polarization.
  • Page 56: Using The Wall-Mounting Bracket

    Hardware Installation Mounting on Larger Diameter Poles In addition, there is a method for attaching the pole-mounting bracket to a pole that is 2 to 5 inches in diameter using an adjustable steel band clamp (not included in the kit). A steel band clamp up to 0.5 inch (1.27 cm) wide can be threaded through the main part of the bracket to secure it to a larger diameter pole without using the U-shaped part of the bracket.
  • Page 57: Connect External Antennas

    2. Position the bracket in the intended location and mark the position of the three mounting screw holes. 3. Drill three holes in the wall that match the screws and wall plugs included in the bracket kit, then secure the bracket to the wall.
  • Page 58 Hardware Installation 2. Connect the antenna to the bridge’s N-type connector. 3. Apply weatherproofing tape to the antenna connectors to help prevent water entering the connectors. 2.4 GHz N-type Connector SMC2888W-M 5 GHz N-type Connector RF Coaxial Cable 5 GHz External High-gain Panel Antenna 2.4 GHz External...
  • Page 59: Connect Cables To The Unit

    Connect Cables to the Unit 1. Attach the Ethernet cable to the Ethernet port on the wireless bridge. Note: The Ethernet cable included with the package is 30 m (100 ft) long. To wire a longer cable (maximum 100 m, 325 ft), use the connector pinout information in Appendix B.
  • Page 60 Hardware Installation Note: The wireless bridge’s Ethernet port does not support Power over Ethernet (PoE) based on the IEEE 802.3af standard. Do not try to power the unit by connecting it directly to a network switch that provides IEEE 802.3af PoE. Always connect the unit to the included power injector module.
  • Page 61: Align Antennas

    5. Check the LED on top of the power injector to be sure that power is being supplied to the wireless bridge through the Ethernet connection. Align Antennas After wireless bridge units have been mounted, connected, and their radios are operating, the antennas must be accurately aligned to ensure optimum performance on the bridge links.
  • Page 62 Hardware Installation strong central main lobe and smaller side lobes. The object of the alignment process is to set the antenna so that it is receiving the strongest signal from the central main lobe. Remote Antenna Horizontal Scan Main Lobe Maximum RSSI Voltage...
  • Page 63 2. Pan the antenna horizontally back and forth while checking the RSSI voltage. If using the pole-mounting bracket with the unit, you must rotate the mounting bracket around the pole. Other external antenna brackets may require a different horizontal adjustment. 3.
  • Page 64 Hardware Installation 4-12...
  • Page 65: Initial Configuration

    Initial Configuration The wireless bridge offers a variety of management options, including a web-based interface, a command line interface (CLI), or using SNMP management software. Most initial configuration steps can be made through the web browser interface using the Setup Wizard (page 5-4). However, for units that do not have a preset country code, you must first set the country code using the CLI.
  • Page 66: Initial Setup Through The Cli

    Initial Configuration Initial Setup through the CLI The wireless bridge provides access to the CLI through a Telnet connection. You can open a Telnet session by performing these steps: 1. From the host computer, enter the Telnet command and the IP address of the wireless bridge unit (default 192.168.2.2 if not set via DHCP).
  • Page 67 At the Exec prompt, type “country ?” to display the list of country codes. Check the code for your country, then enter the country command again followed by your country code (e.g., IE for Ireland). Dual Outdoor#country ie Dual Outdoor# Setting the IP Address –...
  • Page 68: Using The Web-Based Management Setup Wizard

    Initial Configuration After configuring the wireless bridge’s IP parameters, you can access the management interface from anywhere within the attached network. The command line interface can also be accessed using Telnet from any computer attached to the network. Using the Web-based Management Setup Wizard There are only a few basic steps you need to complete to set up the wireless bridge for your network.
  • Page 69 Using the Web-based Management Setup Wizard The home page displays the Main Menu. Launching the Setup Wizard – To perform initial configuration, click Setup Wizard on the home page, then click on the [Next] button to start the process. 1. Service Set ID – Enter the service set identifier in the SSID box which all wireless 802.11g clients must use to associate with the access point.
  • Page 70 Initial Configuration 2. Radio Channel – You must enable radio communications for the 802.11a and 802.11g radios and set the operating channel. • 802.11a...
  • Page 71 Using the Web-based Management Setup Wizard Turbo Mode – If you select Enable, the wireless bridge will operate in turbo mode with a data rate of up to 108 Mbps. Normal mode supports 13 channels, Turbo mode supports only 5 channels. (Default: Disable) 802.11a Radio Channel –...
  • Page 72 Initial Configuration Note: Available channel settings are limited by local regulations which determine which channels are available. 3. IP Configuration – Either enable or disable (Dynamic Host Configuration Protocol (DHCP) for automatic IP configuration. If you disable DHCP, then manually enter the IP address and subnet mask.
  • Page 73 Using the Web-based Management Setup Wizard 4. WDS – To set up a wireless bridge link, you must configure the WDS forwarding table by specifying the Ethernet MAC address of the bridge to which you want to forward traffic. For a Slave bridge unit, you need to specify the MAC address of the wireless bridge unit at the opposite end of the link.
  • Page 74 Initial Configuration 5. Security (802.11g) – Set the Authentication Type to “Open System” to allow open access without authentication, or “Shared Key” to require authentication based on a shared key. Enable Wired Equivalent Privacy (WEP) to encrypt data transmissions. To configure other security features use the Advanced Setup menu as described in Chapter 5.
  • Page 75 Using the Web-based Management Setup Wizard hexadecimal or ASCII string of the appropriate length. The key can be entered as alphanumeric characters or hexadecimal (0~9, A~F, e.g., D7 0A 9C 7F E5). (Default: 128 bit, hexadecimal key type) 64-Bit Manual Entry: The key can contain 10 hexadecimal digits, or 5 alphanumeric characters.
  • Page 76 Initial Configuration 5-12...
  • Page 77: System Configuration

    Chapter 6 System Configuration Before continuing with advanced configuration, first complete the initial configuration steps described in Chapter 5 to set up an IP address for the wireless bridge. The wireless bridge can be managed by any computer using a web browser (Internet Explorer 5.0 or above, or Netscape Navigator 6.2 or above).
  • Page 78 System Configuration When the home page displays, click on Advanced Setup. The following page will display. The information in this chapter is organized to reflect the structure of the web screens for easy reference. However, it is recommended that you configure a user name and password as the first step under advanced configuration to control management access to the wireless bridge (page 6-33).
  • Page 79: Advanced Configuration

    Advanced Configuration The Advanced Configuration pages include the following options. Menu System Identification TCP / IP Settings Configures the IP address, subnet mask, Radius PPPoE Settings Authentication Filter Control SNMP Administration System Log Bridge Advanced Configuration Description Configures basic administrative and client access Specifies the system name, location and contact information...
  • Page 80: System Identification

    System Configuration Menu RSSI Radio Interface A Radio Settings Security Radio Interface G Radio Settings Security System Identification The system information parameters for the wireless bridge can be left at their default settings. However, modifying these parameters can help you to more easily distinguish different devices in your network.
  • Page 81 System Name – An alias for the wireless bridge, enabling the device to be uniquely identified on the network. (Default: Dual Band Outdoor AP; Range: 1-22 characters) Outdoor Bridge Band – Selects the radio band used for bridge links. • A –...
  • Page 82 System Configuration CLI Commands for System Identification – Enter the global configuration mode and use the system name command to specify a new system name. Use the snmp-server location and snmp-server contact commands to indicate the physical location of the wireless bridge and define a system contact. Then return to the Exec mode, and use the show system command to display the changes to the system identification settings.
  • Page 83: Tcp / Ip Settings

    TCP / IP Settings Configuring the wireless bridge with an IP address expands your ability to manage the wireless bridge. A number of wireless bridge features depend on IP addressing to operate. Note: You can use the web browser interface to access IP addressing only if the wireless bridge already has an IP address that is reachable through your network.
  • Page 84 System Configuration DHCP Client (Enable) – Select this option to obtain the IP settings for the wireless bridge from a DHCP (Dynamic Host Configuration Protocol) server. The IP address, subnet mask, default gateway, and Domain Name Server (DNS) address are dynamically assigned to the wireless bridge by the network DHCP server.
  • Page 85 • Default Gateway: The default gateway is the IP address of the router for the wireless bridge, which is used if the requested destination address is not on the local subnet. • If you have management stations, DNS, or other network servers located on another subnet, type the IP address of the default gateway router in the text field provided.
  • Page 86: Radius

    System Configuration AP(config)#interface ethernet Enter Ethernet configuration commands, one per line. AP(if-ethernet)#no ip dhcp AP(if-ethernet)#ip address 192.168.1.2 255.255.255.0 192.168.1.253 AP(if-ethernet)#dns primary-server 192.168.1.55 AP(if-ethernet)#dns secondary-server 10.1.0.55 AP(config)#end AP#show interface ethernet Ethernet Interface Information ======================================== IP Address Subnet Mask Default Gateway Primary DNS Secondary DNS Admin status Operational status...
  • Page 87 Primary Radius Server Setup – Configure the following settings to use RADIUS authentication on the access point. • IP Address: Specifies the IP address or host name of the RADIUS server. • Port: The UDP port number used by the RADIUS server for authentication messages.
  • Page 88 System Configuration • Key: A shared text string used to encrypt messages between the access point and the RADIUS server. Be sure that the same text string is specified on the RADIUS server. Do not use blank spaces in the string. (Maximum length: 255 characters) •...
  • Page 89: Pppoe Settings

    to display the current settings for the primary and secondary RADIUS servers. AP(config)#radius-server address 192.168.1.25 AP(config)#radius-server port 181 AP(config)#radius-server key green AP(config)#radius-server timeout 10 AP(config)#radius-server retransmit 5 AP(config)#exit AP#show radius Radius Server Information ======================================== Port Retransmit Timeout ======================================== Radius Secondary Server Information ======================================== Port Retransmit...
  • Page 90 System Configuration PPP over Ethernet – Enable PPPoE on the RJ-45 Ethernet interface to pass management traffic between the unit and a remote PPPoE server. (Default: Disable) PPPoE Username – The user name assigned for the PPPoE tunnel. (Range: 1-63 alphanumeric characters) PPPoE Password –...
  • Page 91 IP Allocation Mode – This field specifies how IP adresses for the PPPoE tunnel are configured on the RJ-45 interface. The allocation mode depends on the type of service provided by the PPPoE server. If automatic mode is selected, DHCP is used to allocate the IP addresses for the PPPoE connection.
  • Page 92: Authentication

    System Configuration AP(config)#interface ethernet Enter Ethernet configuration commands, one per line. AP(if-ethernet)#ip pppoe AP(if-ethernet)#pppoe username mike AP(if-ethernet)#pppoe password 12345 AP(if-ethernet)#pppoe service-name classA AP(if-ethernet)#pppoe ip allocation mode static AP(if-ethernet)#pppoe local ip 10.7.1.200 AP(if-ethernet)#pppoe remote ip 192.168.1.20 AP(if-ethernet)#pppoe ipcp dns AP(if-ethernet)#pppoe lcp echo-interval 30 AP(if-ethernet)#pppoe lcp echo-failure 5 AP(if-ethernet)#pppoe restart AP(if-ethernet)#end...
  • Page 93 Ethernet Supplicant Setup – Allows the access point to act as an 802.1X supplicant so it can be authenticated through its Ethernet port with a RADIUS server on the local network. When enabled, a unique MD5 user name and password needs to be configured. (Default: Disabled) •...
  • Page 94 System Configuration MAC Authentication – You can configure a list of the MAC addresses for wireless clients that are authorized to access the network. This provides a basic level of authentication for wireless clients attempting to gain access to the network. A database of authorized MAC addresses can be stored locally on the access point or remotely on a central RADIUS server.
  • Page 95 Note: Client station MAC authentication occurs prior to the IEEE 802.1X authentication procedure configured for the access point. However, a client’s MAC address provides relatively weak user authentication, since MAC addresses can be easily captured and used by another station to break into the network. Using 802.1X provides more robust user authentication using user names and passwords or digital certificates.
  • Page 96 System Configuration • Supported: The access point supports 802.1X authentication only for clients initiating the 802.1X authentication process (i.e., the access point does not initiate 802.1X authentication). For clients initiating 802.1X, only those successfully authenticated are allowed to access the network. For those clients not initiating 802.1X, access to the network is allowed after successful wireless association with the access point.
  • Page 97 Local MAC Authentication – Configures the local MAC authentication database. The MAC database provides a mechanism to take certain actions based on a wireless client’s MAC address. The MAC list can be configured to allow or deny network access to specific clients. •...
  • Page 98 System Configuration • Permission: Select Allow to permit access or Deny to block access. If Delete is selected, the specified MAC address entry is removed from the database. • Update: Enters the specified MAC address and permission setting into the local database. •...
  • Page 99 command. To display the current settings, use the show authentication command from the Exec mode. AP(config)#mac-authentication server local AP(config)#address filter default denied AP(config)#address filter entry 00-70-50-cc-99-1a denied AP(config)#address filter entry 00-70-50-cc-99-1b allowed AP(config)#address filter entry 00-70-50-cc-99-1c allowed AP(config)#address filter delete 00-70-50-cc-99-1c AP(config)#exit AP#show authentication Authentication Information...
  • Page 100 System Configuration CLI Commands for RADIUS MAC Authentication – Use the mac-authentication server command from the global configuration mode to enable remote MAC authentication. Set the timeout value for re-authentication using the mac-authentication session-timeout command. Be sure to also configure connection settings for the RADIUS server (not shown in the following example).
  • Page 101 CLI Commands for 802.1X Authentication – Use the 802.1X supported command from the global configuration mode to enable 802.1X authentication. Set the session and broadcast key refresh rate, and the re-authentication timeout. To display the current settings, use the show authentication command from the Exec mode.
  • Page 102: Filter Control

    System Configuration Filter Control The wireless bridge can employ VLAN tagging support and network traffic frame filtering to control access to network resources and increase security. Native VLAN ID – The VLAN ID assigned to wireless clients that are not assigned to a specific VLAN by RADIUS server configuration.
  • Page 103 traffic that has an unknown VLAN ID or no VLAN tag is dropped. When VLAN support is disabled, the wireless bridge does not tag traffic passing to the wired network and ignores the VLAN tags on any received frames. Note: Before enabling VLANs on the the connected LAN switch port to accept tagged VLAN packets with the wireless bridge...
  • Page 104 System Configuration Note: The specific configuration of RADIUS server software is beyond the scope of this guide. Refer to the documentation provided with the RADIUS server software. When VLAN filtering is enabled, the access point must also have 802.1X authentication enabled and a RADIUS server configured. Wireless clients must also support 802.1X client software to be assigned to a specific VLAN.
  • Page 105 • Enable: Wireless bridge filters Ethernet protocol types based on the configuration of protocol types in the filter table. If a protocol has its status set to “ON,” the protocol is filtered from the wireless bridge. CLI Commands for VLAN Support – From the global configuration mode use the native-vlanid command to set the default VLAN ID for the Ethernet interface, then enable VLANs using the vlan enable command.
  • Page 106: Snmp

    System Configuration you want to filter. To display the current settings, use the show filters command from the Exec mode. AP(config)#filter ap-manage AP(config)#filter ethernet-type enable AP(config)#filter ethernet-type protocol ARP AP(config)#exit AP#show filters Protocol Filter Information ========================================================= AP Management Ethernet Type Filter :ENABLED Enabled Protocol Filters --------------------------------------------------------- Protocol: ARP...
  • Page 107 Advanced Configuration SNMP – Enables or disables SNMP management access and also enables the wireless bridge to send SNMP traps (notifications). SNMP management is disabled by default. Community Name (Read Only) – Defines the SNMP community access string that has read-only access. Authorized management stations are only able to retrieve MIB objects.
  • Page 108 System Configuration Trap Destination Community Name – The community string sent with the notification operation. (Maximum length: 23 characters; Default: public) CLI Commands for SNMP – Use the snmp-server enable server command from the global configuration mode to enable SNMP. To set read/write and read-only community names, use the snmp-server community command.
  • Page 109: Administration

    Advanced Configuration Administration Changing the Password Management access to the web and CLI interface on the wireless bridge is controlled through a single user name and password. You can also gain additional access security by using control filters (see “Filter Control” on page 6-26). To protect access to the management interface, you need to configure an Administrator’s user name and password as soon as possible.
  • Page 110 System Configuration CLI Commands for the User Name and Password – Use the username and password commands from the CLI configuration mode. AP(config)#username bob AP(config)#password spiderman Upgrading Firmware You can upgrade new wireless bridge software from a local file on the management workstation, or from an FTP or TFTP server.
  • Page 111 Before upgrading new software, verify that the wireless bridge is connected to the network and has been configured with a compatible IP address and subnet mask. If you need to download from an FTP or TFTP server, take the following additional steps: •...
  • Page 112 System Configuration Firmware Upgrade Local – Downloads an operation code image file from the web management station to the wireless bridge using HTTP. Use the Browse button to locate the image file locally on the management station and click Start Upgrade to proceed. •...
  • Page 113 Note: If you have upgraded system software, then you must reboot the wireless bridge to implement the new operation code. CLI Commands for Downloading Software from a TFTP Server – Use the copy tftp file command from the Exec mode and then specify the file type, name, and IP address of the TFTP server.
  • Page 114: System Log

    System Configuration System Log The wireless bridge can be configured to send event and error messages to a System Log Server. The system clock can also be synchronized with a time server, so that all the messages sent to the Syslog server are stamped with the correct time and date. Enabling System Logging The wireless bridge supports a logging process that can control error messages saved to memory or sent to a Syslog server.
  • Page 115 Logging Console – Enables the logging of error messages to the console. Logging Level – Sets the minimum severity level for event logging. The system allows you to limit the messages that are logged by specifying a minimum severity level. The following table lists the error message levels from the most severe (Emergency) to least severe (Debug).
  • Page 116: Configuring Sntp

    System Configuration CLI Commands for System Logging – To enable logging on the wireless bridge, use the logging on command from the global configuration mode. The logging level command sets the minimum level of message to log. Use the logging console command to enable logging to the console.
  • Page 117 The wireless bridge acts as an SNTP client, periodically sending time synchronization requests to specific time servers. You can configure up to two time server IP addresses. The wireless bridge will attempt to poll each server in the configured sequence. SNTP Server –...
  • Page 118 System Configuration CLI Commands for SNTP – To enable SNTP support on the wireless bridge, from the global configuration mode specify SNTP server IP addresses using the sntp-server ip command, then use the sntp-server enable command to enable the service. Use the sntp-server timezone command to set the location time zone and the sntp-server daylight-saving command to set up a daylight saving.
  • Page 119: Wireless Distribution System (Wds)

    Advanced Configuration Wireless Distribution System (WDS) The IEEE 802.11 standard defines a WIreless Distribution System (WDS) for connections between wireless bridges. The access point uses WDS to forward traffic on bridge links between units. When using WDS, only wireless bridge units can associate to each other using the bridge band.
  • Page 120 System Configuration Mode – The wireless bridge is set to operate as a Slave or Master unit: • Master Mode: In a point-to-multipoint network configuration, only one wireless bridge unit must be a Master unit (all others must be Slave units). A Master wireless bridge provides support for up to 16 MAC addresses in the WDS forwarding table.
  • Page 121: Bridge

    MAC Address – The physical layer address of the wireless bridge unit at the other end of the wireless link. (12 hexadecimal digits in the form “xx:xx:xx:xx:xx:xx”) Port Status – Enables or disables the wireless bridge link. Note: The Ethernet MAC address for each bridge unit is printed on the label on the back of the unit.
  • Page 122 System Configuration Bridge Aging Time – Changes the aging time for entries in the dynamic address table: • Ethernet: The time after which a learned Ethernet port entry is discarded. (Range: 60-1800 seconds; Default: 100 seconds) • Wireless 802.11a (g): The time after which a learned wireless entry is discarded.
  • Page 123: Spanning Tree Protocol (Stp)

    CLI Commands for Bridging – The following example shows how to set the MAC address aging time for the wireless bridge. AP(config)#bridge timeout 0 300 AP(config)#bridge timeout 2 1000 AP(config)#exit AP#show bridge ================================================= Media Type | Age Time(sec)| ================================================= EtherNet WLAN_A ================================================== Bridge Id...
  • Page 124 System Configuration device (except for the root device) which incurs the lowest path cost when forwarding a packet from that device to the root device. Then it selects a designated bridging device from each LAN which incurs the lowest path cost when forwarding a packet from that LAN to the root device.
  • Page 125 Enable – Enables/disables STP on the wireless bridge. (Default: Enabled) Forward Delay – The maximum time (in seconds) this device waits before changing states (i.e., discarding to learning to forwarding). This delay is required because every device must receive information about topology changes before it starts to forward frames.
  • Page 126 System Configuration Hello Time – Interval (in seconds) at which the root device transmits a configuration message. (Range: 1-10 seconds) • Default: 2 • Minimum: 1 • Maximum: The lower of 10 or [(Max. Message Age / 2) -1] Maximum Age – The maximum time (in seconds) a device can wait without receiving a configuration message before attempting to reconfigure.
  • Page 127 assigned to ports with slower media. (Path cost takes precedence over port priority.) • Range: 1-65535 • Default: Ethernet interface: 19; Wireless interface: 40 Priority – Defines the priority used for this port in the Spanning Tree Protocol. If the path cost for all ports on a switch are the same, the port with the highest priority (i.e., lowest value) will be configured as an active link in the spanning tree.
  • Page 128 System Configuration Port Fast (Fast Forwarding) – You can enable this option if an interface is attached to a LAN segment that is at the end of a bridged LAN or to an end node. Since end nodes cannot cause forwarding loops, they can pass directly through to the spanning tree forwarding state.
  • Page 129 CLI Commands for STP – The following example configures spanning tree paramters for the bridge and wireless port 5. AP(config)#bridge stp-bridge priority 40000 AP(config)#bridge stp-bridge hello-time 5 AP(config)#bridge stp-bridge max-age 38 AP(config)#bridge stp-bridge forward-time 20 AP(config)#no bridge stp-port spanning-disabled 5 AP(config)#bridge stp-port priority 5 0 AP(config)#bridge stp-port path-cost 5 50 AP(config)#no bridge stp-port portfast 5...
  • Page 130: Rssi

    System Configuration RSSI The RSSI value displayed on the RSSI page represents a signal to noise ratio. A value of 30 would indicate that the power of the received signal is 30 dBm above the signal noise threshold. This value can be used to align antennas (see page 4-9) and monitor the quality of the received signal for bridge links.
  • Page 131 RSSI – The RSSI value for a selected port can be displayed and a representative voltage output can be enabled. • Output Activate: Enables or disables the RSSI voltage output on the external RSSI connector. (Default: Enabled) • Port Number: Selects a specific WDS port for which to set the maximum RSSI output voltage level.
  • Page 132: Radio Interface

    System Configuration Radio Interface The IEEE 802.11a and 802.11g interfaces include configuration options for radio signal characteristics and wireless security features. The configuration options are nearly identical, but depend on which interface is operating as the bridge band. Both interfaces and operating modes are covered in this section of the manual.
  • Page 133: Radio Settings A (802.11A)

    Radio Interface Radio Settings A (802.11a) The IEEE 802.11a interface operates within the 5 GHz band, at up to 54 Mbps in normal mode or up to 108 Mbps in Turbo mode. Enable – Enables radio communications on the wireless interface.
  • Page 134 System Configuration mode. SSID Broadcast – When enabled, the access point radio does not include its SSID in beacon messages. Nor does it respond to probe requests from clients that do not include a fixed SSID. (Default: Disable) Turbo Mode – The normal 802.11a wireless operation mode provides connections up to 54 Mbps.
  • Page 135 Radio Interface Auto Channel Select – Enables the wireless bridge to automatically select an unoccupied radio channel. (Default: Enabled) Transmit Power – Adjusts the power of the radio signals transmitted from the wireless bridge. The higher the transmission power, the farther the transmission range. Power selection is not just a trade off between coverage area and maximum supported clients.
  • Page 136 System Configuration Using higher DTIM values reduces the power used by stations in Power Save mode, but delays the transmission of broadcast/ multicast frames. (Range: 1-255 beacons; Default: 2 beacons) Fragment Length – Configures the minimum packet size that can be fragmented when passing through the wireless bridge.
  • Page 137 Radio Interface Maximum Associations – (Access point mode only) Sets the maximum number of clients that can be associated with the access point radio at the same time. (Range: 1-64 per radio: Default: 64) CLI Commands for the 802.11a Wireless Interface – From the global configuration mode, enter the interface wireless a command to access the 802.11a radio interface.
  • Page 138 System Configuration AP(config)#interface wireless a Enter Wireless configuration commands, one per line. AP(if-wireless a)#description RD-AP#3 AP(if-wireless a)#ssid r&d AP(if-wireless a)#no turbo AP(if-wireless a)#channel 44 AP(if-wireless a)#closed-system AP(if-wireless a)#transmit-power full AP(if-wireless a)#speed 9 AP(if-wireless a)#max-association 32 AP(if-wireless a)#beacon-interval 150 AP(if-wireless a)#dtim-period 5 AP(if-wireless a)#fragmentation-length 512 AP(if-wireless a)#rts-threshold 256 AP(if-wireless a)#exit...
  • Page 139: Radio Settings G (802.11G)

    Radio Interface Radio Settings G (802.11g) The IEEE 802.11g standard operates within the 2.4 GHz band at up to 54 Mbps. Also note that because the IEEE 802.11g standard is an extension of the IEEE 802.11b standard, it allows clients with 802.11b wireless network cards to associate to an 802.11g access point.
  • Page 140 System Configuration with each other. For example, in the United States you can deploy up to three access points in the same area (e.g., channels 1, 6, 11). Also note that the channel for wireless clients is automatically set to the same as that used by the access point to which it is linked.
  • Page 141 stop sending the SSID in beacon messages. Select a radio channel or set selection to Auto using the channel command. Set any other parameters as required. To view the current 802.11g radio settings, use the show interface wireless g command. AP(config)#interface wireless g Enter Wireless configuration commands, one per line.
  • Page 142: Security (Bridge Mode)

    System Configuration Security (Bridge Mode) Wired Equivalent Privacy (WEP) and Advanced Encryption Standard (AES) are implemented for security in bridge mode to prevent unauthorized access to network data. To secure bridge link data transmissions, enable WEP or AES encryption for the bridge radio and set at least one encryption key.
  • Page 143 Setting up IEEE 802.11 Wired Equivalent Privacy (WEP) shared keys prevents unauthorized access to the wireless bridge network. Be sure to define at least one static WEP key for data encryption. Also, be sure that the WEP keys are the same for all bridge units in the wireless network.
  • Page 144 System Configuration Advanced Encryption Standard (AES) AES has been designated by the National Institute of Standards and Technology as the successor to the Data Encryption Standard (DES) encryption algorithm, and will be used by the U.S. government for encrypting all sensitive, nonclassified information.
  • Page 145 Configuring AES encryption keys on the wireless bridge provides far more robust security than using WEP. Also, a unique AES key can be used for each bridge link in the wireless network, instead of all bridges sharing the same WEP keys. Data Encryption Setup –...
  • Page 146 System Configuration command. To view the current security settings, use the show interface wireless a command. AP(config)#interface wireless a Enter Wireless configuration commands, one per line. AP(if-wireless a)#encryption wep 128 AP(if-wireless a)#key wep 1 128 ascii abcdeabcdeabc AP(if-wireless a)#transmit-key 1 AP(if-wireless a)#exit AP#show interface wireless a Wireless Interface Information...
  • Page 147 CLI Commands for AES Security – From the 802.11a interface configuration mode, use the encryption command to enable AES encryption. To enter AES keys, use the key command. To view the current security settings, use the show interface wireless a command.
  • Page 148: Security (Access Point Mode)

    System Configuration Security (Access Point Mode) A radio band set to access point mode is configured by default as an “open system,” which broadcasts a beacon signal including the configured SSID. Wireless clients can read the SSID from the beacon, and automatically reset their SSID to allow immediate connection to the access point.
  • Page 149 wireless clients. A summary of wireless security considerations is listed in the following table. Security Client Support Mechanism Built-in support on all 802.11a and 802.11g devices WEP over Requires 802.1X client 802.1X support in system or by add-in software (support provided in Windows 2000 SP3 or later and Windows XP) Uses the MAC...
  • Page 150 System Configuration Note: Although a WEP static key is not needed for WEP over 802.1X, WPA over 802.1X, and WPA PSK modes, you must enable WEP encryption through the web or CLI in order to enable all types of encryption in the access point. Wired Equivalent Privacy (WEP) WEP provides a basic level of security, preventing unauthorized access to the network and encrypting data transmitted between...
  • Page 151 authentication and data encryption. Also, be sure that the WEP shared keys are the same for each client in the wireless network. Authentication Type Setup – Sets the access point to communicate as an open system that accepts network access attempts from any client, or with clients using pre-configured static shared keys.
  • Page 152 System Configuration Shared Key Setup – Select 64 Bit, 128 Bit, or 152 Bit key length. Note that the same size of encryption key must be supported on all wireless clients. 152 Bit key length is only supported on 802.11a radio. (Default: 128 Bit) Key Type –...
  • Page 153 four settings without having to update the client keys. Note: Key index and type must match that configured on the clients. The configuration settings for WEP are summarized below: WEP only Authentication Type: Shared Key WEP (encryption): Enable WPA clients only: Disable Multicast Cipher: WEP Shared Key: 64/128/152 Key Type -...
  • Page 154 System Configuration show interface wireless a or show interface wireless g command. AP(config)#interface wireless g Enter Wireless configuration commands, one per line. AP(if-wireless g)#authentication shared AP(if-wireless g)#encryption 128 AP(if-wireless g)#multicast-cipher wep AP(if-wireless g)#key 1 128 ascii abcdeabcdeabc AP(if-wireless g)#transmit-key 1 AP(if-wireless g)#end AP(config)#no 802.1X AP(config)#end...
  • Page 155 CLI Commands for WEP over 802.1X Security – From the 802.11a or 802.11g interface configuration mode, use the authentication command to select open system authentication. Use the multicast-cipher command to select WEP cipher type. Then set 802.1X to required with 802.1X command, and disable MAC authentication with the mac-authentication command.
  • Page 156 System Configuration Wi-Fi Protected Access (WPA) WPA employs a combination of several technologies to provide an enhanced security solution for 802.11 wireless networks. The access point supports the following WPA components and features: IEEE 802.1X and the Extensible Authentication Protocol (EAP): WPA employs 802.1X as its basic framework for user authentication and dynamic key management.
  • Page 157 when a RADIUS server has authenticated a user’s credentials will encryption keys be sent to the access point and client. Note: To implement WPA on wireless clients requires a WPA-enabled network card driver and 802.1X client software that supports the EAP authentication type that you want to use.
  • Page 158 System Configuration uses TKIP unicast data encryption keys for WPA clients and WEP unicast keys for WEP clients. The global encryption key for multicast and broadcast traffic must be the same for all clients, therefore it restricts encryption to a WEP key. When access is opened to both WPA and WEP clients, no authentication is provided for the WEP clients through shared keys.
  • Page 159 The WPA configuration parameters are described below: Authentication Type Setup – When using WPA, set the access point to communicate as an open system to disable WEP keys. Note: Although WEP keys are not needed for WPA, you must enable WEP encryption through the web or CLI in order to enable all types of encryption in the access point.
  • Page 160 System Configuration • TKIP: TKIP provides data encryption enhancements including per-packet key hashing (that is, changing the encryption key on each packet), a message integrity check, an extended initialization vector with sequencing rules, and a re-keying mechanism. • AES: AES has been designated by the National Institute of Standards and Technology as the successor to the Data Encryption Standard (DES) encryption algorithm, and will be used by the U.S.
  • Page 161 The configuration settings for WPA are summarized below: WPA pre-shared key only Authentication Type: Open System WEP (encryption): Enable WPA clients only: Enable WPA Mode: Pre-shared-key Multicast Cipher: WEP/TKIP/AES WPA PSK Type - Hex: 64 characters ASCII: 8-63 characters Shared Key: 64/128/152 802.1X = Disabled MAC Authentication: Disabled/ Local...
  • Page 162 System Configuration authentication. To view the current 802.11g security settings, use the show interface wireless a or show interface wireless g command (not shown in example). AP(config)#interface wireless g Enter Wireless configuration commands, one per line. AP(if-wireless g)#authentication open AP(if-wireless g)#encryption 128 AP(if-wireless g)#wpa-clients required AP(if-wireless g)#wpa-mode pre-shared-key AP(if-wireless g)#wpa-psk-type alphanumeric...
  • Page 163: Status Information

    Status Information The Status page includes information on the following items: Menu AP Status Station Status Event Logs AP Status The AP Status window displays basic system configuration settings, as well as the settings for the wireless interfaces. AP System Configuration – The AP System Configuration table displays the basic system configuration settings: Description Displays configuration settings for the basic...
  • Page 164 System Configuration • System Up Time: Length of time the management agent has been up. • MAC Address: The physical layer address for this device. • System Name: Name assigned to this system. • System Contact: Administrator responsible for the system. •...
  • Page 165 • Radio Authentication Type: Shows the bridge is set as an open system. • 802.1X: Shows if IEEE 802.1X access control for wireless clients is enabled. CLI Commands for Displaying System Settings – To view the current wireless bridge system settings, use the show system command from the Exec mode.
  • Page 166: Station Status

    System Configuration Station Status The Station Status window shows wireless clients currently associated with the access point. The Station Status page displays basic connection information for all associated stations. Note that this page is automatically refreshed every five seconds. • Station Address: The MAC address of the remote wireless bridge.
  • Page 167 • Associated: Shows if the station has been successfully associated with the access point. • Forwarding Allowed: Shows if the station has passed authentication and is now allowed to forward traffic. • Key Type: Displays one of the following: • Disabled: The client is not using Wired Equivalent Privacy (WEP) encryption keys.
  • Page 168: Event Logs

    System Configuration Event Logs The Event Logs window shows the log messages generated by the wireless bridge and stored in memory. The Event Logs table displays the following information: • Log Time: The time the log message was generated. • Event Level: The logging level associated with this message.
  • Page 169 Status Information 6-93...
  • Page 170 System Configuration 6-94...
  • Page 171: Command Line Interface

    Command Line Interface Using the Command Line Interface Accessing the CLI When accessing the management interface for the wireless bridge via a Telnet connection, the wireless bridge can be managed by entering command keywords and parameters at the prompt. Using the wireless bridge’s command-line interface (CLI) is very similar to entering commands on a UNIX system.
  • Page 172 Command Line Interface gateway if you are managing the wireless bridge from a different IP subnet. For example: AP#configure AP(config)#interface ethernet AP(if-ethernet)#ip address 10.1.0.1 255.255.255.0 10.1.0.254 AP(if-ethernet)# After you configure the wireless bridge with an IP address, you can open a Telnet session by performing these steps. 1.
  • Page 173: Entering Commands

    Entering Commands This section describes how to enter CLI commands. Keywords and Arguments A CLI command is a series of keywords and arguments. Keywords identify a command, and arguments specify configuration parameters. For example, in the command “show interface ethernet,” show and interface are keywords, and ethernet is an argument that specifies the interface type.
  • Page 174: Getting Help On Commands

    Command Line Interface Getting Help on Commands You can display a brief description of the help system by entering the help command. You can also display command syntax by following a command with the “?” character to list keywords or parameters.
  • Page 175: Partial Keyword Lookup

    The command “show interface ?” will display the following information: AP#show interface ? ethernet wireless <cr> AP#show interface Partial Keyword Lookup If you terminate a partial keyword with a question mark, alternatives that match the initial letters are provided. (Remember not to leave a space between the command and question mark.) For example “s?”...
  • Page 176: Understanding Command Modes

    Command Line Interface Understanding Command Modes The command set is divided into Exec and Configuration classes. Exec commands generally display information on system status or clear statistical counters. Configuration commands, on the other hand, modify interface parameters or enable certain functions.
  • Page 177: Configuration Commands

    Configuration Commands Configuration commands are used to modify wireless bridge settings. These commands modify the running configuration and are saved in memory. The configuration commands are organized into three different modes: • Global Configuration - These commands modify the system level configuration, and include commands such as username and password.
  • Page 178: Command Line Processing

    Command Line Interface Command Line Processing Commands are not case sensitive. You can abbreviate commands and parameters as long as they contain enough letters to differentiate them from any other currently available commands or parameters. You can use the Tab key to complete partial commands, or enter a partial command followed by the “?”...
  • Page 179: Command Groups

    Command Groups The system commands can be broken down into the functional groups shown below. Command Group General System Management System Logging Configures system logging parameters System Clock SNMP Flash/File RADIUS Authentication Bridge Filtering PPPoE Ethernet Interface Wireless Interface Description Basic commands for entering configuration mode, restarting the system, or quitting the Controls user name, password, browser...
  • Page 180: Configure

    Command Line Interface Command Group IAPP VLANs The access mode shown in the following tables is indicated by these abbreviations: GC (Global Configuration), IC-E (Ethernet Interface Configuration), and IC-W (Wireless Interface Configuration). General Commands Command configure exit ping reset show history Shows the command history buffer show line configure This command activates Global Configuration mode.
  • Page 181: End

    Command Mode Exec Example AP#configure AP(config)# Related Commands end (page 7-11) This command returns to the previous configuration mode. Default Setting None Command Mode Global Configuration, Interface Configuration Example This example shows how to return to the Configuration mode from the Interface Configuration mode: AP(if-ethernet)#end AP(config)# exit...
  • Page 182: Ping

    Command Line Interface Example This example shows how to return to the Exec mode from the Interface Configuration mode, and then quit the CLI session: AP(if-ethernet)#exit AP#exit CLI session with the wireless bridge is now closed Username: ping This command sends ICMP echo request packets to another node on the network.
  • Page 183: Reset

    – Network or host unreachable - The gateway found no corresponding entry in the route table. • Press <Esc> to stop pinging. Example AP#ping 10.1.0.19 192.168.1.19 is alive reset This command restarts the system or restores the factory default settings. Syntax reset <board | configuration>...
  • Page 184: Show History

    Command Line Interface show history This command shows the contents of the command history buffer. Default Setting None Command Mode Exec Command Usage • The history buffer size is fixed at 10 commands. • Use the up or down arrow keys to scroll through the commands in the history buffer.
  • Page 185: System Management Commands

    Example The console port settings are fixed at the values shown below. AP#show line Console Line Information ====================================================== databits parity speed stop bits ====================================================== System Management Commands These commands are used to configure the user name, password, browser management options, and a variety of other system information.
  • Page 186: Country

    Command Line Interface Command Web Server ip http port ip http server System Status show system show version country This command configures the wireless bridge’s country code, which identifies the country of operation and sets the authorized radio channels. Syntax country <country_code>...
  • Page 187: Default Setting

    Country Code Country Belize Hong Kong HK Bolivia Hungary Brazil Iceland Brunei India Darussalam Bulgaria Indonesia Canada Iran Chile Ireland China Israel Colombia Italy Costa Rica Japan Croatia Jordan Cyprus Kazakhstan KZ Czech North Republic Korea Denmark Korea Republic Default Setting US - for units sold in the United States 99 (no country set) - for units sold in other countries Command Mode...
  • Page 188: Prompt

    Command Line Interface Example AP#country us prompt This command customizes the CLI prompt. Use the no form to restore the default prompt. Syntax prompt string no prompt string - Any alphanumeric string to use for the CLI prompt. (Maximum length: 255 characters) Default Setting Dual Outdoor Command Mode...
  • Page 189: System Name

    system name This command specifies or modifies the system name for this device. Use the no form to restore the default system name. Syntax system name name no system name name - The name of this host. (Maximum length: 32 characters) Default Setting Outdoor Bridge Command Mode...
  • Page 190: Password

    Command Line Interface Example AP(config)#username bob AP(config)# password After initially logging onto the system, you should set the password. Remember to record it in a safe place. Use the no form to reset the default password. Syntax password password no password password - Password for management access.
  • Page 191: Ip Http Server

    Default Setting Command Mode Global Configuration Example AP(config)#ip http port 1143 AP(config)# Related Commands ip http server (page 7-21) ip http server This command allows this device to be monitored or configured from a browser. Use the no form to disable this function. Syntax ip http server no ip http server...
  • Page 192: Show System

    Command Line Interface show system This command displays basic system configuration settings. Default Setting None Command Mode Exec Example AP#show system System Information ========================================================= Serial Number System Up time seconds System Name System Location System Contact System Country Code : TW - TAIWAN MAC Address IP Address Subnet Mask...
  • Page 193: Show Version

    show version This command displays the software version for the system. Default Setting None Command Mode Exec Example AP#show version Version v1.1.2.1B05 System Logging Commands These commands are used to configure system logging on the wireless bridge. Command logging on logging host logging console logging level...
  • Page 194: Logging On

    Command Line Interface logging on This command controls logging of error messages; i.e., sending debug or error messages to memory. The no form disables the logging process. Syntax logging on no logging on Default Setting None Command Mode Global Configuration Command Usage The logging process controls error messages saved to memory.
  • Page 195: Logging Console

    Default Setting None Command Mode Global Configuration Example AP(config)#logging host 10.1.0.3 AP(config)# logging console This command initiates logging of error messages to the console. Use the no form to disable logging to the console. Syntax logging console no logging console Default Setting Disabled Command Mode...
  • Page 196: Logging Facility-Type

    Command Line Interface Default Setting Error Command Mode Global Configuration Command Usage Messages sent include the selected level down to the Emergency level. Level Argument Emergency Alert Critical Error Warning Notice Informational Debug Example AP(config)#logging level alert AP(config)# logging facility-type This command sets the facility type for remote logging of syslog messages.
  • Page 197: Show Logging

    Default Setting Command Mode Global Configuration Command Usage The command specifies the facility type tag sent in syslog messages. (See RFC 3164.) This type has no effect on the kind of messages reported by the wireless bridge. However, it may be used by the syslog server to sort messages or to store messages in the corresponding database.
  • Page 198: System Clock Commands

    Command Line Interface Example AP#show logging Logging Information ============================================ Syslog State Logging Host State Logging Console State Server Domain name/IP Logging Level Logging Facility Type ============================================= System Clock Commands These commands are used to configure SNTP and system clock settings on the wireless bridge. Command sntp-server ip sntp-server...
  • Page 199: Sntp-Server Ip

    sntp-server ip This command sets the IP address of the servers to which SNTP time requests are issued. Use the this command with no arguments to clear all time servers from the current list. Syntax sntp-server ip <1 | 2> <ip> •...
  • Page 200: Sntp-Server Enable

    Command Line Interface sntp-server enable This command enables SNTP client requests for time synchronization with NTP or SNTP time servers specified by the sntp-server ip command. Use the no form to disable SNTP client requests. Syntax sntp-server enable no sntp-server enable Default Setting Disabled Command Mode...
  • Page 201: Sntp-Server Date-Time

    sntp-server date-time This command sets the system clock. Default Setting 00:14:00, January 1, 1970 Command Mode Global Configuration Example This example sets the system clock to 17:37 June 19, 2003. AP#sntp-server date-time Enter Year<1970-2100>: 2003 Enter Month<1-12>: 6 Enter Day<1-31>: 19 Enter Hour<0-23>: 17 Enter Min<0-59>: 37 Related Commands...
  • Page 202: Sntp-Server Timezone

    Command Line Interface Command Usage The command sets the system clock back one hour during the specified period. Example This sets daylight savings time to be used from July 1st to September 1st. AP(config)#sntp-server daylight-saving Enter Daylight saving from which month<1-12>: 6 and which day<1-31>: 1 Enter Daylight saving end to which month<1-12>: 9 and which day<1-31>: 1...
  • Page 203: Show Sntp

    degrees longitude. To display a time corresponding to your local time, you must indicate the number of hours and minutes your time zone is east (before) or west (after) of UTC. Example AP(config)#sntp-server timezone +8 AP(config)# show sntp This command displays the current time and configuration settings for the SNTP client.
  • Page 204: Snmp Commands

    Command Line Interface SNMP Commands Controls access to this wireless bridge from management stations using the Simple Network Management Protocol (SNMP), as well as the hosts that will receive trap messages. Command snmp-server community snmp-server contact snmp-server enable server snmp-server host Specifies the recipient of an SNMP snmp-server location show snmp...
  • Page 205: Snmp-Server Contact

    Default Setting • public - Read-only access. Authorized management stations are only able to retrieve MIB objects. • private - Read/write access. Authorized management stations are able to both retrieve and modify MIB objects. Command Mode Global Configuration Command Usage If you enter a community string without the ro or rw option, the default is read only.
  • Page 206: Snmp-Server Enable Server

    Command Line Interface Example AP(config)#snmp-server contact Paul AP(config)# Related Commands snmp-server location (page 7-38) snmp-server enable server This command enables SNMP management access and also enables this device to send SNMP traps (i.e., notifications). Use the no form to disable SNMP service and trap messages. Syntax snmp-server enable server no snmp-server enable server...
  • Page 207: Snmp-Server Host

    snmp-server host This command specifies the recipient of an SNMP notification. Use the no form to remove the specified host. Syntax snmp-server host <host_ip_address | host_name> <community-string> no snmp-server host • host_ip_address - IP of the host (the targeted recipient). •...
  • Page 208: Snmp-Server Location

    Command Line Interface Example AP(config)#snmp-server host 10.1.19.23 batman AP(config)# Related Commands snmp-server enable server (page 7-36) snmp-server location This command sets the system location string. Use the no form to remove the location string. Syntax snmp-server location text no snmp-server location text - String that describes the system location.
  • Page 209: Show Snmp

    show snmp This command displays the SNMP configuration settings. Command Mode Exec Example AP#show snmp SNMP Information ============================================ Service State Community (ro) : ***** Community (rw) : ***** Location Contact Traps Host Name/IP Trap Community : ***** ============================================= Flash/File Commands These commands are used to manage the system code or configuration files.
  • Page 210: Bootfile

    Command Line Interface bootfile This command specifies the image used to start up the system. Syntax bootfile <filename> filename - Name of the image file. Default Setting None Command Mode Exec Command Usage • The file name should not contain slashes (\ or /), the leading letter of the file name should not be a period (.), and the maximum length for file names is 32 characters.
  • Page 211: Copy

    copy This command copies a boot file, code image, or configuration file between the wireless bridge’s flash memory and a FTP/TFTP server. When you save the configuration settings to a file on a FTP/TFTP server, that file can later be downloaded to the wireless bridge to restore system operation.
  • Page 212: Delete

    Command Line Interface • The destination file name should not contain slashes (\ or /), the leading letter of the file name should not be a period (.), and the maximum length for file names on the FTP/TFTP server is 255 characters or 32 characters for files on the wireless bridge.
  • Page 213: Dir

    Default Setting None Command Mode Exec Beware of deleting application images from flash Caution: memory. At least one application image is required in order to boot the wireless bridge. If there are multiple image files in flash memory, and the one used to boot the wireless bridge is deleted, be sure you first use the bootfile command to update the application image file booted at startup before you reboot the wireless bridge.
  • Page 214 Command Line Interface Command Usage File information is shown below: Column Heading File Name Type File Size Example The following example shows how to display all file information: AP#dir apimg1 zz-img.bin dflt-img.bin ap3xart.sys syscfg_bak syscfg apcfg zz-imgf.bin apcfg.bak 2502656 bytes free 7-44 Description The name of the file.
  • Page 215: Radius Client

    RADIUS Client Remote Authentication Dial-in User Service (RADIUS) is a logon authentication protocol that uses software running on a central server to control access for RADIUS-aware devices to the network. An authentication server contains a database of credentials, such as users names and passwords, for each wireless client that requires access to the access point.
  • Page 216: Radius-Server Port

    Command Line Interface Command Mode Global Configuration Example AP(config)#radius-server address 192.168.1.25 AP(config)# radius-server port This command sets the RADIUS server network port. Syntax radius-server [secondary] port <port_number> • secondary - Secondary server. • port_number - RADIUS server UDP port used for authentication messages.
  • Page 217: Radius-Server Key

    radius-server key This command sets the RADIUS encryption key. Syntax radius-server [secondary] key <key_string> • secondary - Secondary server. • key_string - Encryption key used to authenticate logon access for client. Do not use blank spaces in the string. (Maximum length: 20 characters) Default Setting DEFAULT Command Mode...
  • Page 218: Radius-Server Timeout

    Command Line Interface Example AP(config)#radius-server retransmit 5 AP(config)# radius-server timeout This command sets the interval between transmitting authentication requests to the RADIUS server. Syntax radius-server [secondary] timeout number_of_seconds • secondary - Secondary server. • number_of_seconds - Number of seconds the access point waits for a reply before resending a request.
  • Page 219: Authentication

    Example AP#show radius Radius Server Information ======================================== Port Retransmit Timeout ======================================== Radius Secondary Server Information ======================================== Port Retransmit Timeout ======================================== Authentication The access point supports IEEE 802.1x access control for wireless clients. This control feature prevents unauthorized access to the network by requiring a 802.1x client application to submit user credentials for authentication.
  • Page 220 Command Line Interface Client MAC addresses can also be used for authentication on the access point. For local MAC authentication, first define the default filtering policy using the address filter default command. Then enter the MAC addresses to be filtered, indicating if they are allowed or denied.
  • Page 221 Command mac-authentication session-timeout show authentication Shows all 802.1x authentication 802.1x This command configures 802.1x as optionally supported or as required for wireless clients. Use the no form to disable 802.1x support. Syntax 802.1x <supported | required> no 802.1x • supported - Authenticates clients that initiate the 802.1x authentication process.
  • Page 222: 802.1X Broadcast-Key-Refresh-Rate

    Command Line Interface • When 802.1x is supported, the access point supports 802.1x authentication only for clients initiating the 802.1x authentication process (i.e., the access point does NOT initiate 802.1x authentication). For stations initiating 802.1x, only those stations successfully authenticated are allowed to access the network.
  • Page 223: 802.1X Session-Key-Refresh-Rate

    Command Usage • The access point uses EAPOL (Extensible Authentication Protocol Over LANs) packets to pass dynamic unicast session and broadcast keys to wireless clients. The 802.1x broadcast-key-refresh-rate command specifies the interval after which the broadcast keys are changed. The 802.1x session-key-refresh-rate command specifies the interval after which unicast session keys are changed.
  • Page 224: Session-Timeout

    Command Line Interface Example AP(config)#802.1x session-key-refresh-rate 5 AP(config)# 802.1x session-timeout This command sets the time period after which a connected client must be re-authenticated. Use the no form to disable 802.1x re-authentication. Syntax 802.1x session-timeout <seconds> no 802.1x session-timeout seconds - The number of seconds. (Range: 0-65535) Default 0 (Disabled) Command Mode...
  • Page 225: 802.1X Supplicant

    802.1x supplicant This command sets the user name and password used for authentication of the access point when operating as a 802.1x supplicant and enables supplicant authentication. Use the no form to disable the feature. Syntax 802.1x supplicant eth_password <password> 802.1x supplicant eth_user <username>...
  • Page 226: Address Filter Default

    Command Line Interface Command Mode Global Configuration Command Usage • Ethernet and WDS user names and passwords must be set before enabling the 802.1x supplicant feature for the specified port. • The access point currently only supports EAP-MD5 CHAP for 802.1x supplicant authentication. Example AP(config)#802.1x supplicant wds_user 1 David AP(config)#802.1x supplicant wds_password 1 ABC...
  • Page 227: Address Filter Entry

    Example AP(config)#address filter default denied AP(config)# Related Commands address filter entry (page 7-57) show authentication (page 7-60) address filter entry This command enters a MAC address in the filter table. Syntax address filter entry <mac-address> <allowed | denied> • mac-address - Physical address of client. (Enter six pairs of hexadecimal digits separated by hyphens;...
  • Page 228: Address Filter Delete

    Command Line Interface Example (config)#address filter entry 00-70-50-cc-99-1a allowed (config)# Related Commands address filter default (page 7-56) show authentication (page 7-60) address filter delete This command deletes a MAC address from the filter table. Syntax address filter delete <mac-address> mac-address - Physical address of client. (Enter six pairs of hexadecimal digits separated by hyphens.) Default None...
  • Page 229: Mac-Authentication Server

    mac-authentication server This command sets address filtering to be performed with local or remote options. Use the no form to disable MAC address authentication. Syntax mac-authentication server [local | remote] • local - Authenticate the MAC address of wireless clients with the local authentication database during 802.11 association.
  • Page 230: Mac-Authentication Session-Timeout

    Command Line Interface mac-authentication session-timeout This command sets the interval at which associated clients will be re-authenticated with the RADIUS server authentication database. Use the no form to disable reauthentication. Syntax mac-authentication session-timeout <seconds> seconds - Re-authentication interval. (Range: 0-65535) Default 0 (disabled) Command Mode...
  • Page 231: Wds Commands

    Example AP#show authentication Authentication Information ========================================================= MAC Authentication Server MAC Auth Session Timeout Value : 1 secs 802.1x Broadcast Key Refresh Rate Session Key Refresh Rate 802.1x Session Timeout Value Address Filtering System Default : DENY addresses not found in filter table. Filter Table MAC Address -----------------...
  • Page 232: Wds Channel

    Command Line Interface wds channel This command selects the radio band to be used for WDS forwarding (bridging). Syntax wds channel <a | g | none> • a - Bridging is supported on the 802.11a 5 GHz band. • g - Bridging is supported on the 802.11b/g 2.4 GHz band. •...
  • Page 233: Wds Enable

    Command Mode Global Configuration Command Usage • You can only configure one MAC address per wireless port • The Ethernet MAC address for each bridge unit is printed on the label on the back of the unit. • When trying to connect to other bridges, please input the Ethernet MAC address Example AP(config)#wds mac-address 1 00-12-34-56-78-9a...
  • Page 234: Show Wds

    Command Line Interface show wds This command displays the current entries in the WDS forwarding table. Syntax show wds Command Mode Exec Example AP#show wds Outdoor_Mode ================================================== Port ID ================================================== ================================================== AP(config)# 7-64 MASTER Status Mac-Address ENABLE 00-12-34-56-78-9A ENABLE 00-1A-2B-3C-4D-5E DISABLE 00-01-02-03-04-05 ENABLE...
  • Page 235: Bridge Commands

    Bridge Commands The commands described in this section are used to set the MAC address table aging time and spanning tree parameters for both the Ethernet and wireless interfaces. Command bridge timeout bridge stp-bridge spanning-tree bridge stp-bridge forward-time bridge stp-bridge hello-time bridge stp-bridge max-age...
  • Page 236: Bridge Timeout

    Command Line Interface bridge timeout This command sets the aging time for both the Ethernet port and the wireless interface. Syntax bridge timeout <interface-id> <seconds> • interface-id - An identifier that specifies the interface. (0 for Ethernet, 2 for 802.11a wireless) •...
  • Page 237: Bridge Stp-Bridge Forward-Time

    Default Setting Spanning tree is enabled. Command Mode Global Configuration Command Usage The Spanning Tree Protocol (STP) can be used to detect and disable network loops, and to provide backup links between switches, bridges or routers. This allows the wireless bridge to interact with other bridging devices (that is, an STP-compliant switch, bridge or router) in your network to ensure that only one route exists between any two stations on the network, and...
  • Page 238: Bridge Stp-Bridge Hello-Time

    Command Line Interface Default Setting 15 seconds Command Mode Global Configuration Command Usage This command sets the maximum time (in seconds) the root device will wait before changing states (i.e., discarding to learning to forwarding). This delay is required because every device must receive information about topology changes before it starts to forward frames.
  • Page 239: Bridge Stp-Bridge Max-Age

    Command Mode Global Configuration Command Usage This command sets the time interval (in seconds) at which the root device transmits a configuration message. Example AP(config)#bridge stp-bridge hello-time 5 AP(config)# bridge stp-bridge max-age Use this command to configure the spanning tree bridge maximum age globally for the wireless bridge.
  • Page 240: Bridge Stp-Bridge Priority

    Command Line Interface Command Usage This command sets the maximum time (in seconds) a device can wait without receiving a configuration message before attempting to reconfigure. All device ports (except for designated ports) should receive configuration messages at regular intervals. Any port that ages out STP information (provided in the last configuration message) becomes the designated port for the attached LAN.
  • Page 241: Bridge Stp-Port Path-Cost

    Command Usage Bridge priority is used in selecting the root device, root port, and designated port. The device with the highest priority becomes the STP root device. However, if all devices have the same priority, the device with the lowest MAC address will then become the root device.
  • Page 242: Bridge Stp-Port Priority

    Command Line Interface Command Usage • This command is used by the Spanning Tree Protocol to determine the best path between devices. Therefore, lower values should be assigned to ports attached to faster media, and higher values assigned to ports with slower media. •...
  • Page 243: Bridge Stp-Port Portfast

    • Where more than one port is assigned the highest priority, the port with lowest numeric identifier will be enabled. Example AP(config)#bridge stp-port priority 1 64 AP(config)# Related Commands bridge stp-port path-cost (page 7-71) bridge stp-port portfast Use this command to set an interface to fast forwarding. Use the no form to disable fast forwarding.
  • Page 244: Bridge Stp-Port Spanning-Disabled

    Command Line Interface • Since end-nodes cannot cause forwarding loops, they can be passed through the spanning tree state changes more quickly than allowed by standard convergence time. Fast forwarding can achieve quicker convergence for end-node devices, and also overcome other STP related timeout problems.
  • Page 245: Show Bridge

    show bridge This command displays aging time and spanning tree settings for the Ethernet and wireless interfaces. Syntax show bridge Command Mode Exec Example AP#show bridge ================================================= Media Type | Age Time(sec)| ================================================= EtherNet WLAN_A ================================================== Bridge Id Root Bridge Id Root Path Cost Root Port Id Bridge Status...
  • Page 246: Filtering Commands

    Command Line Interface Filtering Commands The commands described in this section are used to control access to the management interface from the wireless interface and filter traffic using specific Ethernet protocol types. Command filter local-bridge filter ap-manage filter ethernet-type enable filter ethernet-type protocol...
  • Page 247: Filter Ap-Manage

    Command Usage This command can disable wireless-to-wireless communications between clients via the access point. However, it does not affect communications between wireless clients and the wired network. Example AP(config)#filter local-bridge AP(config)# Related Commands filter ethernet-type enable (page 7-78) filter ap-manage This command prevents access to wireless bridge management from the wireless interface.
  • Page 248: Filter Ethernet-Type Enable

    Command Line Interface filter ethernet-type enable This command checks the Ethernet type on all incoming and outgoing Ethernet packets against the protocol filtering table. Use the no form to disable this feature. Syntax filter ethernet-type enable no filter ethernet-type enable Default Disabled Command Mode...
  • Page 249: Filter Ethernet-Type Protocol

    filter ethernet-type protocol This command sets a filter for a specific Ethernet type. Use the no form to disable filtering for a specific Ethernet type. Syntax filter ethernet-type protocol <protocol> no filter ethernet-type protocol <protocol> protocol - An Ethernet protocol type. (Options: ARP, RARP, Berkeley-Trailer-Negotiation, LAN-Test, X25-Level-3, Banyan, CDP, DEC XNS, DEC-MOP-Dump-Load, DEC-MOP, DEC-LAT, Ethertalk, Appletalk-ARP, Novell-IPX(old),...
  • Page 250: Show Filters

    Command Line Interface show filters This command shows the filter options and protocol entries in the filter table. Command Mode Exec Example AP#show filters Protocol Filter Information ========================================================= AP Management Ethernet Type Filter :ENABLED Enabled Protocol Filters --------------------------------------------------------- Protocol: ARP ========================================================= PPPoE Commands The commands described in this section configure PPPoE...
  • Page 251: Ip Pppoe

    Command pppoe lcp echo-failure pppoe local ip pppoe remote ip pppoe username pppoe password pppoe service-name pppoe restart show pppoe ip pppoe This command enables Point-to-Point Protocol over Ethernet (PPPoE) on the Ethernet interface. Use the no form to disable PPPoE on the Ethernet interface.
  • Page 252: Pppoe Ip Allocation Mode

    Command Line Interface Command Usage The access point uses a PPPoE connection, or tunnel, only for management traffic between the access point and a remote PPPoE server (typically at an ISP). Examples of management traffic that may initiated by the access point and carried over a PPPoE tunnel are RADIUS, Syslog, or DHCP traffic.
  • Page 253: Pppoe Ipcp Dns

    Example AP#(if-ethernet)#pppoe ip allocation mode static Related Commands pppoe local ip (page 7-86) pppoe remote ip (page 7-86) pppoe ipcp dns This command requests allocation of IP addresses for Dynamic Naming System (DNS) servers from the device at the remote end of the PPPoE tunnel.
  • Page 254: Pppoe Lcp Echo-Interval

    Command Line Interface pppoe lcp echo-interval This command sets the Link Control Protocol (LCP) echo interval for the PPPoE tunnel. Syntax pppoe lcp echo-interval <interval> interval - The interval between sending echo requests. (Range: 1-60 seconds) Default Setting Command Mode Interface Configuration (Ethernet) Command Usage •...
  • Page 255: Pppoe Lcp Echo-Failure

    pppoe lcp echo-failure This command sets the Link Control Protocol (LCP) echo timeout for the PPPoE tunnel. Syntax pppoe lcp echo-failure <timeout> timeout - The number of timeouts allowed. (Range: 1-10) Default Setting Command Mode Interface Configuration (Ethernet) Command Usage •...
  • Page 256: Pppoe Local Ip

    Command Line Interface pppoe local ip This command sets the local IP address for the PPPoE tunnel. Syntax pppoe local ip <ip-address> ip-address - IP address of the local end of the PPPoE tunnel. Default Setting None Command Mode Interface Configuration (Ethernet) Command Usage If the pppoe ip allocation mode is set to static, the local IP address must be entered with this command, and the remote...
  • Page 257: Pppoe Username

    Default Setting None Command Mode Interface Configuration (Ethernet) Command Usage If the pppoe ip allocation mode is set to static, the remote IP address must be entered with this command, and the local IP address must be entered with the pppoe local ip command. Example AP#(if-ethernet)#pppoe remote ip 192.168.1.20 Related Commands...
  • Page 258: Pppoe Password

    Command Line Interface Command Usage You must enter a user name with this command, and a password with the pppoe password command. Example AP#(if-ethernet)#pppoe username mike Related Commands pppoe password (page 7-88) pppoe password This command sets the password for the PPPoE tunnel. Syntax pppoe password <string>...
  • Page 259: Pppoe Service-Name

    pppoe service-name This command sets the service name for the PPPoE tunnel. Syntax pppoe service-name <string> string - Service name assigned by the service provider. (Range: 1-63 alphanumeric characters) Default Setting None Command Mode Interface Configuration (Ethernet) Command Usage The service name is normally optional, but may be required by some service providers.
  • Page 260: Show Pppoe

    Command Line Interface Example AP#(if-ethernet)#pppoe restart show pppoe This command shows information about the PPPoE configuration. Command Mode Privileged Exec Example AP#show pppoe PPPoE Information ====================================================== State Username Service Name IP Allocation Mode DNS Negotiation Local IP Echo Interval Echo Failure ====================================================== 7-90 : Link up...
  • Page 261: Ethernet Interface Commands

    Ethernet Interface Commands The commands described in this section configure connection parameters for the Ethernet interface. Command interface ethernet dns primary-server secondary-server ip address ip dhcp shutdown show interface ethernet interface ethernet This command enters Ethernet interface configuration mode. Syntax interface ethernet Default Setting None...
  • Page 262: Dns Server

    Command Line Interface Example To specify the 10/100Base-TX network interface, enter the following command: AP(config)#interface ethernet AP(if-ethernet)# dns server This command specifies the address for the primary or secondary domain name server to be used for name-to-address resolution. Syntax dns primary-server <server-address> dns secondary-server <server-address>...
  • Page 263: Ip Address

    Related Commands show interface ethernet (page 7-96) ip address This command sets the IP address for the (10/100Base-TX) Ethernet interface. Use the no form to restore the default IP address. Syntax ip address <ip-address> <netmask> <gateway> no ip address • ip-address - IP address •...
  • Page 264: Ip Dhcp

    Command Line Interface • You must assign an IP address to this device to gain management access over the network or to connect the wireless bridge to existing IP subnets. You can manually configure a specific IP address using this command, or direct the device to obtain an address from a DHCP server using the ip dhcp command.
  • Page 265: Shutdown

    Command Usage • You must assign an IP address to this device to gain management access over the network or to connect the wireless bridge to existing IP subnets. You can manually configure a specific IP address using the ip address command, or direct the device to obtain an address from a DHCP server using this command.
  • Page 266: Show Interface Ethernet

    Command Line Interface Command Mode Interface Configuration (Ethernet) Command Usage This command allows you to disable the Ethernet port due to abnormal behavior (e.g., excessive collisions), and reenable it after the problem has been resolved. You may also want to disable the Ethernet port for security reasons.
  • Page 267: Wireless Interface Commands

    Example AP#show interface ethernet Ethernet Interface Information ======================================== IP Address Subnet Mask Default Gateway Primary DNS Secondary DNS Admin status Operational status ======================================== Wireless Interface Commands The commands described in this section configure connection parameters for the wireless interface. Command interface wireless Enters wireless interface description ssid...
  • Page 268 Command Line Interface Command dtim-period fragmentation- length rts-threshold transmit-power max-association authentication encryption transmit-key multicast-cipher wpa-clients wpa-mode wpa-preshared- wpa-psk-type shutdown 7-98 Function Configures the rate at which stations in sleep mode must wake up to receive broadcast/multicast transmissions Configures the minimum packet size that can be fragmented Sets the packet size threshold at which an RTS must be sent to the...
  • Page 269: Interface Wireless

    Command show interface wireless show station interface wireless This command enters wireless interface configuration mode. Syntax interface wireless a • a - 802.11a radio interface. • g - 802.11g radio interface Default Setting None Command Mode Global Configuration Example To specify the wireless interface, enter the following command: AP(config)#interface wireless a AP(if-wireless a)# description...
  • Page 270: Ssid

    Command Line Interface Default Setting None Command Mode Interface Configuration (Wireless) Example AP(config)#interface wireless a AP(if-wireless a)#description RD-AP#3 AP(if-wireless a)# ssid This command configures the service set identifier (SSID). Syntax ssid <string> string - The name of a basic service set supported by the access point.
  • Page 271: Closed-System

    closed-system This command closes access to clients without a pre-configured SSID. Use the no form to disable this feature. Syntax closed-system no closed-system Default Setting Disabled Command Mode Interface Configuration (Wireless) Command Usage When SSID Broadcast is disabled, the access point will not include its SSID in beacon messages.
  • Page 272: Channel

    Command Line Interface Command Mode Interface Configuration (Wireless) Command Usage The maximum transmission distance is affected by the data rate. The lower the data rate, the longer the transmission distance. Example AP(if-wireless a)#speed 6 AP(if-wireless a)# channel This command configures the radio channel through which the local wireless bridge communicates with remote bridges.
  • Page 273: Turbo

    Example AP(if-wireless a)#channel 36 AP(if-wireless a)# turbo This command sets the wireless bridge to an enhanced mode (not regulated in IEEE 802.11a) that provides a higher data rate of up to 108 Mbps. Default Setting Disabled Command Mode Interface Configuration (Wireless - 802.11a) Command Usage •...
  • Page 274: Beacon-Interval

    Command Line Interface beacon-interval This command configures the rate at which beacon signals are transmitted from the wireless bridge. Syntax beacon-interval <interval> interval - The rate for transmitting beacon signals. (Range: 20-1000 milliseconds) Default Setting Command Mode Interface Configuration (Wireless) Command Usage The beacon signals allow remote bridges to maintain contact with the local wireless bridge.
  • Page 275: Fragmentation-Length

    Default Setting Command Mode Interface Configuration (Wireless) Command Usage • The Delivery Traffic Indication Map (DTIM) packet interval value indicates how often the MAC layer forwards broadcast/multicast traffic. This parameter is necessary to wake up remote bridges that are using Power Save mode. •...
  • Page 276: Rts-Threshold

    Command Line Interface Default Setting 2346 Command Mode Interface Configuration (Wireless) Command Usage • If the packet size is smaller than the preset Fragment size, the packet will not be segmented. • Fragmentation of the PDUs (Package Data Unit) can increase the reliability of transmissions because it increases the probability of a successful transmission due to smaller frame size.
  • Page 277: Transmit-Power

    Default Setting 2347 Command Mode Interface Configuration (Wireless) Command Usage • If the threshold is set to 0, the wireless bridge always sends RTS signals. If set to 2347, the wireless bridge never sends RTS signals. If set to any other value, and the packet size equals or exceeds the RTS threshold, the RTS/CTS (Request to Send / Clear to Send) mechanism will be enabled.
  • Page 278: Max-Association

    Command Line Interface Default Setting full Command Mode Interface Configuration (Wireless) Command Usage • The “min” keyword indicates minimum power. • The longer the transmission distance, the higher the transmission power required. Power selection is not just a trade off between coverage area and maximum data rates. You also have to ensure that high strength signals do not interfere with the operation of other radio devices in your area.
  • Page 279: Authentication

    Example AP(if-wireless g)#max-association 32 AP(if-wireless g)# authentication This command defines the 802.11 authentication type allowed by the access point. Syntax authentication <open | shared> • open - Accepts the client without verifying its identity using a shared key. • shared - Authentication is based on a shared key that has been distributed to all stations.
  • Page 280: Encryption

    Command Line Interface encryption This command defines whether WEP or AES encryption is used to provide privacy for wireless communications. Use the no form to disable encryption. Syntax encryption {wep <key-length> | wdsaes <alphanumeric | hex>} no encryption • wep - The keyword that enables WEP encryption. –...
  • Page 281 • AES has been designated by the National Institute of Standards and Technology as the successor to the Data Encryption Standard (DES) encryption algorithm, and will be used by the U.S. government for encrypting all sensitive, nonclassified information. Because of its strength, and resistance to attack, AES is also being incorporated as part of the 802.11 standard.
  • Page 282: Key

    Command Line Interface This command sets the keys used for WEP and AES encryption. Use the no form to delete a configured key. Syntax key {wep <index size type wep-value> | wdsaes <port-id aes-value>} no key {wep <index> | wdsaes} •...
  • Page 283: Transmit-Key

    • To enable AES encryption, use the encryption command to specify the key type, and use the key command to configure a key for each wireless port. • If WEP is enabled, all units in the wireless bridge network must be configured with the same keys. •...
  • Page 284: Multicast-Cipher

    Command Line Interface Command Mode Interface Configuration (Wireless) Command Usage • If you use WEP key encryption, the wireless bridge uses the transmit key to encrypt multicast and broadcast data signals that it sends to other nodes. Other keys can be used for decryption of data from other nodes.
  • Page 285 Command Usage • WPA enables the access point to support different unicast encryption keys for each client. However, the global encryption key for multicast and broadcast traffic must be the same for all clients. This command sets the encryption type that is supported by all clients. •...
  • Page 286: Wpa-Clients

    Command Line Interface wpa-clients This command defines whether Wi-Fi Protected Access (WPA) is required or optionally supported for client stations. Syntax wpa-clients <required | supported> • required - Supports only clients using WPA. • supported - Support clients with or without WPA. Default Setting Supported Command Mode...
  • Page 287: Wpa-Mode

    Example AP(if-wireless g)#wpa-client required AP(if-wireless g)# Related Commands wpa-mode (page 7-117) wpa-mode This command specifies whether Wi-Fi Protected Access (WPA) is to use 802.1x dynamic keys or a pre-shared key. Syntax wpa-mode <dynamic | pre-shared-key> • dynamic - WPA with 802.1x dynamic keys. •...
  • Page 288: Wpa-Preshared-Key

    Command Line Interface Example AP(if-wireless g)#wpa-mode pre-shared-key AP(if-wireless g)# Related Commands wpa-clients (page 7-116) wpa-preshared-key (page 7-118) wpa-preshared-key This command defines a Wi-Fi Protected Access (WPA) preshared-key. Syntax wpa-preshared-key <type> <value> • type - Input format. (Options: ASCII, HEX) • value - The key string. For ASCII input, use 5/13 alphanumeric characters for 64/128 bit strings.
  • Page 289: Wpa-Psk-Type

    Example AP(if-wireless g)#wpa-preshared-key ASCII agoodsecret AP(if-wireless g)# Related Commands wpa-clients (page 7-116) wpa-mode (page 7-117) wpa-psk-type This command defines the Wi-Fi Protected Access (WPA) preshared-key type. Syntax wpa-psk-type <type> type - Input format. (Options: Alphanumeric, HEX) Default Setting Command Mode Interface Configuration (Wireless) Example AP(if-wireless a)#wpa-preshared-key ASCII agoodsecret...
  • Page 290: Shutdown

    Command Line Interface shutdown This command disables the wireless interface. Use the no form to restart the interface. Syntax shutdown no shutdown Default Setting Interface enabled Command Mode Interface Configuration (Wireless) Example AP(if-wireless a)#shutdown AP(if-wireless a)# show interface wireless This command displays the status for the wireless interface. Syntax show interface wireless <a | g>...
  • Page 291: Show Station

    Example AP#show interface wireless a Wireless Interface Information ========================================================= ----------------Identification----------------------------- Description Outdoor Bridge/AP Service Type SSID Turbo Mode Channel Status ----------------802.11 Parameters-------------------------- Transmit Power Max Station Data Rate Fragmentation Threshold RTS Threshold Beacon Interval DTIM Interval Maximum Association ----------------Security----------------------------------- Encryption AES Key type ========================================================= show station...
  • Page 292: Iapp Commands

    Command Line Interface Example AP#show station Station Table Information =========================================================== 802.11a Channel : 56 No 802.11a Channel Stations. 802.11g Channel : 11 802.11g Channel Station Table Station Address Authenticated Associated TRUE Counters:pkts Time:Associated 143854 =========================================================== IAPP Commands The command described in this section enables the protocol signaling required to ensure the successful handover of wireless clients roaming between different 802.11f-compliant access points.
  • Page 293: Vlan Commands

    Default Enabled Command Mode Global Configuration Command Usage The current 802.11 standard does not specify the signaling required between access points in order to support clients roaming from one access point to another. In particular, this can create a problem for clients roaming between access points from different vendors.
  • Page 294: Vlan

    Command Line Interface Note: Before enabling VLANs on the the connected LAN switch port to accept tagged VLAN packets with the to the wireless bridge feature. The VLAN commands supported by the wireless bridge are listed below. Command vlan native-vlanid vlan This command enables VLANs for all traffic.
  • Page 295: Native-Vlanid

    Example AP(config)#vlan enable Reboot system now? <y/n>: y Related Commands native-vlanid (page 7-125) native-vlanid This command configures the native VLAN ID for the wireless bridge. Syntax native-vlanid <vlan-id> vlan-id - Native VLAN ID. (Range: 1-64) Default Setting Command Mode Global Configuration Command Usage When VLANs are enabled, the wireless bridge tags traffic passing to the wired network with the configured native VLAN...
  • Page 296 Command Line Interface 7-126...
  • Page 297: Troubleshooting

    Troubleshooting Check the following items before you contact local Technical Support. 1. If wireless bridge units do not associate with each other, check the following: • Check the power injector LED for each bridge unit to be sure that power is being supplied •...
  • Page 298 Troubleshooting 3. If the wireless bridge cannot be configured using Telnet, a web browser, or SNMP software: • Be sure to have configured the wireless bridge with a valid IP address, subnet mask and default gateway. • Check that you have a valid network connection to the wireless bridge and that the Ethernet port or the wireless interface has not been disabled.
  • Page 299: Specifications

    General Specifications Maximum Channels (Outdoor) 802.11a: US & Canada: 9 (normal mode), 3 (turbo mode) Japan: 4 (normal mode), 1 (turbo mode) ETSI: 11 channels (normal mode), 4 (turbo mode) Taiwan: 4 (normal mode), 1 (turbo mode) 802.11g: FCC/IC: 1-11 ETSI: 1-13 France: 1-7 MKK: 1-14...
  • Page 300 Specifications Modulation Types 802.11a: BPSK, QPSK, 16-QAM, 64-QAM 802.11g: CCK, BPSK, QPSK, OFDM 802.11b: CCK, BPSK, QPSK Network Configuration Bridge Mode: Point-to-point and point-to-multipoint Access Point Mode: Infrastructure Operating Frequency 802.11a: 5.15 ~ 5.25 GHz (lower band) US/Canada 5.25 ~ 5.35 GHz (middle band) US/Canada 5.725 ~ 5.825 GHz (upper band) US/Canada 5.25 ~ 5.35 GHz (middle band) Taiwan 5.725 ~ 5.825 GHz (high band) Taiwan...
  • Page 301: General Specifications

    Network Management Web-browser, Telnet, SNMP Temperature Operating: -33 to 55 °C (-27.4 to 131 °F) Storage: -40 to 80 °C (-40 to 176 °F) Humidity 5% to 95% (non-condensing) EMC Compliance (Class B) FCC Class B (US) RTTED 1999/5/EC DGT (Taiwan) Radio Signal Certification FCC Part 15 15.407(b) (5 GHz) FCC Part 15.247 (2.4 GHz)
  • Page 302: Antenna Specifications

    Specifications Antenna Specifications 17 dBi Integrated Panel Frequency Range 5.150 - 5.850 GHz Gain 17 dBi VSWR 1.8 : 1 max Polarization Linear, vertical/horizontal HPBW Horizontal: 20° Vertical: 22° Front-to-Back Ratio >25 dB Power Handling 10 W (cw) Impedance 50 Ohms Connector SMA female...
  • Page 303 17 dBi Integrated Panel Antenna Link Budget (5.825 GHz, Cable Loss 1 dB, Fade Margin 5 dB) Modulation/Rates Normal Mode BPSK (6 Mbps) BPSK (9 Mbps) QPSK (12 Mbps) QPSK (18 Mbps) 16 QAM (24 Mbps) 16 QAM (36 Mbps) 64 QAM (48 Mbps) 64 QAM (54 Mbps) Turbo Mode...
  • Page 304 Specifications...
  • Page 305: Cables And Pinouts

    Cables and Pinouts Twisted-Pair Cable Assignments For 10/100BASE-TX connections, a twisted-pair cable must have two pairs of wires. Each wire pair is identified by two different colors. For example, one wire might be green and the other, green with white stripes. Also, an RJ-45 connector must be attached to both ends of the cable.
  • Page 306: 10/100Base-Tx Pin Assignments

    Cables and Pinouts 10/100BASE-TX Pin Assignments Use unshielded twisted-pair (UTP) or shielded twisted-pair (STP) cable for RJ-45 connections: 100-ohm Category 3 or better cable for 10 Mbps connections, or 100-ohm Category 5 or better cable for 100 Mbps connections. Also be sure that the length of any twisted-pair connection does not exceed 100 meters (328 feet).
  • Page 307: Straight-Through Wiring

    Straight-Through Wiring Because the 10/100 Mbps Input port on the power injector uses an MDI pin configuration, you must use “straight-through” cable for network connections to hubs or switches that only have MDI-X ports. However, if the device to which you are connecting supports automatic MDI/MDI-X operation, you can use either “straight-through”...
  • Page 308: 8-Pin Din Connector Pinout

    Cables and Pinouts End A 8-Pin DIN Connector Pinout The Ethernet cable from the power injector connects to an 8-pin DIN connector on the wireless bridge. This connector is described in the following figure and table. 8-Pin DIN Ethernet Port Pinout Signal Name Transmit Data plus (TD+) Transmit Data minus (TD-)
  • Page 309: 8-Pin Din To Rj-45 Cable Wiring

    8-Pin DIN Ethernet Port Pinout Signal Name +48 VDC power Receive Data minus (RD-) Return power Return power Note: The “+” and “-” signs represent the polarity of the wires that make up each wire pair. 8-Pin DIN to RJ-45 Cable Wiring To construct an extended Ethernet cable to connect from the power injector’s RJ-45 Output port to the wireless bridge’s 8-pin DIN connector, follow the wiring diagram below.
  • Page 310 Cables and Pinouts...
  • Page 311: Glossary

    10BASE-T IEEE 802.3 specification for 10 Mbps Ethernet over two pairs of Category 3 or better UTP cable. 100BASE-TX IEEE 802.3u specification for 100 Mbps Fast Ethernet over two pairs of Category 5 or better UTP cable. Access Point An internetworking device that seamlessly connects wired and wireless networks.
  • Page 312 Glossary Basic Service Set (BSS) A set of 802.11-compliant stations and an access point that operate as a fully-connected wireless network. Beacon A signal periodically transmitted from the access point that is used to identify the service set, and to maintain contact with wireless clients.
  • Page 313 File Transfer Protocol (FTP) A TCP/IP protocol used for file transfer. Hypertext Transfer Protocol (HTTP) HTTP is a standard used to transmit and receive all data over the World Wide Web. Internet Control Message Protocol (ICMP) A network layer protocol that reports errors in processing IP packets.
  • Page 314 Glossary Open System A security option which broadcasts a beacon signal including the access point’s configured SSID. Wireless clients can read the SSID from the beacon, and automatically reset their SSID to allow immediate connection to the nearest access point. Orthogonal Frequency Division Multiplexing (ODFM) OFDM/ allows multiple users to transmit in an allocated band by dividing the bandwidth into many narrow bandwidth carriers.
  • Page 315 Simple Network Time Protocol (SNTP) SNTP allows a device to set its internal clock based on periodic updates from a Network Time Protocol (NTP) server. Updates can be requested from a specific NTP server, or can be received via broadcasts sent by NTP servers. Trivial File Transfer Protocol (TFTP) A TCP/IP protocol commonly used for software downloads.
  • Page 316 Glossary Glossary-6...
  • Page 317: Index

    Advanced Encryption Standard See AES 6-82 configuring 6-68 AES, configuring 6-66, 7-110 authentication 6-16, 7-109 configuring 6-16, 7-109 MAC address 6-18, 7-56, 7-57 type 5-10, 6-72, 7-101 Basic Service Set See BSS beacon interval 6-59, 7-104 rate 6-59, 7-104 BOOTP 7-93, 7-94 BPDU 6-48 BSS 2-3 cable...
  • Page 318 Index filter 6-26, 7-56 address 6-16, 7-56 between wireless clients 6-28, 7-76 local bridge 6-28, 7-76 local or remote 6-16, 7-59 management access 6-28, 7-77 protocol types 6-28, 7-78 VLANs 6-26, 7-123 firmware displaying version 6-35, 7-23 upgrading 6-34, 6-36, 7-41 fragmentation 7-105 gateway address 5-3, 6-9, 7-2, 7-93 hardware version, displaying 7-23...
  • Page 319 password configuring 6-33, 7-20 management 6-33, 7-20 PoE 4-8 specifications B-2 port priority STA 7-72 Power over Ethernet See PoE power supply, specifications B-2 PSK 6-81, 7-117 radio channel 802.11a interface 6-58, 7-102 802.11g interface 6-63, 7-102 configuring 5-6 RADIUS 6-10, 6-80, 7-45 RADIUS, logon authentication 6-21, 7-45 Remote Authentication Dial-in User...
  • Page 320 Index Temporal Key Integrity Protocol See TKIP time zone 6-41, 7-32 TKIP 6-81, 7-114 transmit power, configuring 6-59, 7-107 trap destination 6-31, 7-37 trap manager 6-31, 7-37 troubleshooting A-1 upgrading software 6-34, 7-41 user name, manager 6-33, 7-19 user password 6-33, 7-19, 7-20 Index-4 VLAN configuration 6-26, 7-124...
  • Page 322 SMC2888W-S SMC2888W-M...

This manual is also suitable for:

2888w-m2888w-sElliteconnect smc2888w

Table of Contents