Summary of Contents for SMC Networks ElliteConnect 2.4GHz/5GHz
Page 1
EliteConnect™ Universal 2.4GHz/5GHz Wireless Dual-Band Outdoor Access Point/Bridge The easy way to make all your network connections 38 Tesla Irvine, CA 92618 Phone: (949) 679-8000 May 2005 Revision Number: R01 F1.1.2.5...
Page 2
SMC Networks, Inc. 38 Tesla Irvine, CA 92618 All rights reserved. Trademarks: SMC is a registered trademark; and EliteConnect is a trademark of SMC Networks, Inc. Other product and company names are trademarks or registered trademarks of their respective holders.
Page 3
IMITED ARRANTY Limited Warranty Statement: SMC Networks, Inc. (“SMC”) warrants its products to be free from defects in workmanship and materials, under normal use and service, for the applicable warranty term. All SMC products carry a standard 90-day limited warranty from the date of purchase from SMC or its Authorized Reseller.
Page 4
* SMC will provide warranty service for one year following discontinuance from the active SMC price list. Under the limited lifetime warranty, internal and external power supplies, fans, and cables are covered by a standard one-year warranty from date of purchase. SMC Networks, Inc. 38 Tesla Irvine, CA 92618...
Federal Communication Commission Interference Statement This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation.
5250-5350 MHz and 5650-5850 MHz bands. These radars could cause interference and/or damage to the access point. EC Conformance Declaration SMC contact for these products in Europe is: SMC Networks Europe, Edificio Conata II, Calle Fructuós Gelabert 6-8, 2 08970 - Sant Joan Despí, Barcelona, Spain.
Page 7
• This device employs a radar detection feature required for European Community operation in the 5 GHz band. This feature is automatically enabled when the country of operation is correctly configured for any European Community country. The presence of nearby radar operation may result in temporary interruption of operation of this device.
Page 8
OMPLIANCES Operation Using 5 GHz Channels in the European Community The user/installer must use the provided configuration utility to check the current channel of operation and make necessary configuration changes to ensure operation occurs in conformance with European National spectrum usage laws as described below and elsewhere in this document.
Page 9
Declaration of Conformity in Languages of the European Community English Hereby, SMC Networks, declares that this Radio LAN device is in compliance with the essential requirements and other relevant provisions of Directive 1999/5/EC. Finnish Valmistaja SMC Networks vakuuttaa täten että Radio LAN device tyyppinen laite on direktiivin 1999/5/EY oleellisten vaatimusten ja sitä...
è conforme ai requisiti essenziali ed alle altre disposizioni pertinenti stabilite dalla direttiva 1999/5/CE. Spanish Por medio de la presente SMC Networks declara que el Radio LAN device cumple con los requisitos esenciales y cualesquiera otras disposiciones aplicables o exigibles de la Directiva 1999/5/ Portuguese SMC Networks declara que este Radio LAN device está...
Page 11
Important! Before making connections, make sure you have the correct cord set. Check it (read the label on the cable) against the following: Power Cord Set U.S.A. and The cord set must be UL-approved and CSA certified. Canada The minimum specifications for the flexible cord are: - No.
Page 12
OMPLIANCES Veuillez lire à fond l'information de la sécurité suivante avant d'installer le wireless access point: AVERTISSEMENT: L’installation et la dépose de ce groupe doivent être confiés à un personnel qualifié. • Ne branchez pas votre appareil sur une prise secteur (alimentation électrique) lorsqu'il n'y a pas de connexion de mise à...
Page 13
Cordon électrique - Il doit être agréé dans le pays d’utilisation Suisse: La prise mâle d’alimentation doit respecter la norme SEV/ASE 1011. Europe La prise secteur doit être conforme aux normes CEE 7/7 (“SCHUKO”) LE cordon secteur doit porter la mention <HAR> ou <BASEC> et doit être de type HO3VVF3GO.75 (minimum).
Page 14
OMPLIANCES gegeben, wenn auch die an das Gerät angeschlossenen Geräte unter SELV-Bedingungen betrieben werden. • Stromkabel. Dies muss von dem Land, in dem es benutzt wird geprüft werden: U.S.A und Kanada Danemark Schweiz Europe Der Cord muß das UL gepruft und war das CSA beglaubigt.
The SMC EliteConnect Universal 2.4GHz/5GHz Wireless Dual-Band Outdoor Access Point/Bridge system consists of two models that provide point-to-point or point-to-multipoint bridge links between remote Ethernet LANs, and wireless access point services for clients in the local LAN area: • SMC2888W-S – Includes an integrated high-gain antenna for the 802.11a radio and is designed to operate as a “Slave”...
Introduction In addition, both wireless bridge models offer full network management capabilities through an easy-to-use web interface, a command-line interface, and support for Simple Network Management Protocol (SNMP) tools. Radio Characteristics – The IEEE 802.11a and 802.11g standards use a radio modulation technique known as Orthogonal Frequency Division Multiplexing (OFDM), and a shared collision domain (CSMA/CA).
Page 25
• Outdoor pole-mounting bracket kit • Outdoor wall-mounting bracket kit • This User Guide Inform your dealer if there are any incorrect, missing or damaged parts. If possible, retain the carton, including the original packing materials. Use them again to repack the product in case there is a need to return it.
Integrated High-Gain Antenna The SMC2888W-S wireless bridge includes an integrated high-gain (17 dBi) flat-panel antenna for 5 GHz operation. External Antenna Options The SMC2888W-M Master bridge unit does not include an integrated antenna, but provides various external antenna options for both 5 GHz and 2.4 GHz operation. In a point-to-multipoint configuration, an external high-gain omnidirectional, sector, or high-gain panel antenna can be attached to communicate with bridges spread over a wide area.
Introduction Power Injector Module The wireless bridge receives power through its network cable connection using power-over-Ethernet technology. A power injector module is included in the wireless bridge package and provides two RJ-45 Ethernet ports, one for connecting to the wireless bridge (Output), and the other for connecting to a local LAN switch (Input).
The power injector module automatically adjusts to any AC voltage between 100-240 volts at 50 or 60 Hz. No voltage range settings are required. Warning: The power injector module is designed for indoor use only. Never mount the power injector outside with the wireless bridge unit.
Introduction System Configuration At each location where a unit is installed, it must be connected to the local network using the power injector module. The following figure illustrates the system component connections. LAN Switch Ethernet Cable AC Power Indoor Outdoor Ethernet Cable Power Injector...
Features and Benefits • SMC2888W-S Slave units support a 5 GHz high-gain 17 dBi antenna • SMC2888W-M Master units support 5 GHz point-to-multipoint links using various external antenna options • Both SMC2888W-S and SMC2888W-M units also support access point services for the 5 GHz and 2.4 GHz radios using various external antenna options •...
Introduction System Defaults The following table lists some of the wireless bridge’s basic system defaults. To reset the bridge defaults, use the CLI command “reset configuration” from the Exec level prompt. Feature Identification Administration General TCP/IP VLANs Filter Control 1-10 Parameter System Name User Name...
Page 33
Feature Parameter SNMP Status Location Contact Community (Read Only) Community (Read/Write) Traps Trap Destination IP Address Trap Destination Community Name System Logging Syslog Logging Host Logging Console IP Address / Host Name Logging Level Logging Facility Type Spanning Tree Status Ethernet Speed and Duplex Interface...
Page 34
Introduction Feature Wireless Interface 802.11a Wireless Security 802.11a 1-12 Parameter Status SSID Turbo Mode Radio Channel Auto Channel Select Transmit Power Maximum Data Rate Beacon Interval Data Beacon Rate (DTIM Interval) RTS Threshold Authentication Type AES Encryption WEP Encryption WEP Key Length WEP Key Type WEP Transmit Key Number WEP Keys...
Page 35
Feature Parameter Wireless Status Interface SSID 802.11b/g Radio Channel Auto Channel Select Transmit Power Maximum Data Rate Beacon Interval Data Beacon Rate (DTIM Interval) RTS Threshold Wireless Authentication Type Security AES Encryption 802.11b/g WEP Encryption WEP Key Length WEP Key Type WEP Transmit Key Number WEP Keys System Defaults...
Network Configuration The Dual-band Outdoor Access Point / Bridge system provides access point or bridging services through either the 5 GHz or 2.4 GHz radio interfaces. The wireless bridge units can be used just as normal 802.11a/b/g access points connected to a local wired LAN, providing connectivity and roaming services for wireless clients in an outdoor area.
Network Configuration The 802.11b and 802.11g frequency band, which operates at 2.4 GHz, can easily encounter interference from other 2.4 GHz devices, such as other 802.11b or g wireless devices, cordless phones and microwave ovens. If you experience poor wireless LAN performance, try the following measures: •...
Infrastructure Wireless LAN The access point function of the wireless bridge provides access to a wired LAN for 802.11a/b/g wireless workstations. An integrated wired/wireless LAN is called an Infrastructure configuration. A Basic Service Set (BSS) consists of a group of wireless PC users and an access point that is directly connected to the wired LAN.
Network Configuration Infrastructure Wireless LAN for Roaming Wireless PCs The Basic Service Set (BSS) defines the communications domain for each access point and its associated wireless clients. The BSS ID is a 48-bit binary number based on the access point’s wireless MAC address, and is set automatically and transparently as clients associate with the access point.
Desktop PC Switch PC with Wireless PCI Adapter Bridge Link Topologies The IEEE 802.11 standard defines a WIreless Distribution System (WDS) for bridge connections between BSS areas (access points). The outdoor wireless bridge uses WDS to forward traffic on links between units. Up to 16 WDS links can be specified for a SMC2888W-M unit, which acts as the “Master”...
Network Configuration Note: The external antennas offer longer range options using the 5 GHz radio, which makes this interface more suitable for bridge links. When using WDS on a radio band, only wireless bridge units can associate to each other. Wireless clients can only associate with the wireless bridge using a radio band set to access point mode.
Page 43
Bridge Link Topologies Slave Slave Slave Master with Slave Omnidirectional Antenna Slave Slave Slave Master with Slave Sector Antenna Slave...
Bridge Link Planning The SMC Dual-band Outdoor Access Point / Bridge supports fixed point-to-point or point-to-multipoint wireless links. A single link between two points can be used to connect a remote site to larger core network. Multiple bridge links can provide a way to connect widespread Ethernet LANs.
Page 46
Bridge Link Planning This area is known as the first Fresnel Zone of the radio link. For a radio link not to be affected by obstacles along its path, no object, including the ground, must intrude within 60% of the first Fresnel Zone.
• Be sure there is enough clearance from buildings and that no building construction may eventually block the path. • Check the topology of the land between the antennas using topographical maps, aerial photos, or even satellite image data (software packages are available that may include this information for your area).
Page 48
Bridge Link Planning Total Link Distance 0.25 mile (402 m) 4.5 ft (1.4 m) 0.5 mile (805 m) 1 mile (1.6 km) 2 miles (3.2 km) 3 miles (4.8 km) 4 miles (6.4 km) 5 miles (8 km) 7 miles (11.3 km) 9 miles (14.5 km) 12 miles (19.3 km) 31 ft (9.5 m) 15 miles (24.1 km) 35 ft (10.7 m)
A wireless bridge link is deployed to connect building A to a building B, which is located three miles (4.8 km) away. Mid-way between the two buidings is a small tree-covered hill. From the above table it can be seen that for a three-mile link, the object clearance required at the mid-point is 5.3 m (17.4 ft).
Bridge Link Planning • The wireless bridge antennas at both ends of the link must be positioned with the same polarization direction, either horizontal or vertical Antenna Polarization — The wireless bridge’s integrated antenna sends a radio signal that is polarized in a particular direction.
Weather Conditions When planning wireless bridge links, you must take into account any extreme weather conditions that are known to affect your location. Consider these factors: • Temperature — The wireless bridge is tested for normal operation in temperatures from -33°C to 55°C. Operating in temperatures outside of this range may cause the unit to fail.
Bridge Link Planning Ethernet Cabling When a suitable antenna location has been determined, you must plan a cable route form the wireless bridge outdoors to the power injector module indoors. Consider these points: • The Ethernet cable length should never be longer than 100 m (328 ft) •...
Hardware Installation Before mounting antennas to set up your wireless bridge links, be sure you have selected appropriate locations for each antenna. Follow the guidance and information in Chapter 2, “Wireless Link Planning.” Also, before mounting units in their intended locations, you should first perform initial configuration and test the basic operation of the wireless bridge links in a controlled environment over a very short range.
Hardware Installation 5. Align antennas at both ends of the link. Testing Basic Link Operation Set up the units over a very short range (15 to 25 feet), either outdoors or indoors. Connect the units as indicated in this chapter and be sure to perform all the basic configuration tasks outlined above.
Page 55
Attach bracket to pole with mounting grooves facing up 3. Use the included nuts to tightly secure the wireless bridge to the bracket. Be sure to take account of the antenna polarization direction; both antennas in a link must be mounted with the same polarization.
Hardware Installation Mounting on Larger Diameter Poles In addition, there is a method for attaching the pole-mounting bracket to a pole that is 2 to 5 inches in diameter using an adjustable steel band clamp (not included in the kit). A steel band clamp up to 0.5 inch (1.27 cm) wide can be threaded through the main part of the bracket to secure it to a larger diameter pole without using the U-shaped part of the bracket.
2. Position the bracket in the intended location and mark the position of the three mounting screw holes. 3. Drill three holes in the wall that match the screws and wall plugs included in the bracket kit, then secure the bracket to the wall.
Page 58
Hardware Installation 2. Connect the antenna to the bridge’s N-type connector. 3. Apply weatherproofing tape to the antenna connectors to help prevent water entering the connectors. 2.4 GHz N-type Connector SMC2888W-M 5 GHz N-type Connector RF Coaxial Cable 5 GHz External High-gain Panel Antenna 2.4 GHz External...
Connect Cables to the Unit 1. Attach the Ethernet cable to the Ethernet port on the wireless bridge. Note: The Ethernet cable included with the package is 30 m (100 ft) long. To wire a longer cable (maximum 100 m, 325 ft), use the connector pinout information in Appendix B.
Page 60
Hardware Installation Note: The wireless bridge’s Ethernet port does not support Power over Ethernet (PoE) based on the IEEE 802.3af standard. Do not try to power the unit by connecting it directly to a network switch that provides IEEE 802.3af PoE. Always connect the unit to the included power injector module.
5. Check the LED on top of the power injector to be sure that power is being supplied to the wireless bridge through the Ethernet connection. Align Antennas After wireless bridge units have been mounted, connected, and their radios are operating, the antennas must be accurately aligned to ensure optimum performance on the bridge links.
Page 62
Hardware Installation strong central main lobe and smaller side lobes. The object of the alignment process is to set the antenna so that it is receiving the strongest signal from the central main lobe. Remote Antenna Horizontal Scan Main Lobe Maximum RSSI Voltage...
Page 63
2. Pan the antenna horizontally back and forth while checking the RSSI voltage. If using the pole-mounting bracket with the unit, you must rotate the mounting bracket around the pole. Other external antenna brackets may require a different horizontal adjustment. 3.
Initial Configuration The wireless bridge offers a variety of management options, including a web-based interface, a command line interface (CLI), or using SNMP management software. Most initial configuration steps can be made through the web browser interface using the Setup Wizard (page 5-4). However, for units that do not have a preset country code, you must first set the country code using the CLI.
Initial Configuration Initial Setup through the CLI The wireless bridge provides access to the CLI through a Telnet connection. You can open a Telnet session by performing these steps: 1. From the host computer, enter the Telnet command and the IP address of the wireless bridge unit (default 192.168.2.2 if not set via DHCP).
Page 67
At the Exec prompt, type “country ?” to display the list of country codes. Check the code for your country, then enter the country command again followed by your country code (e.g., IE for Ireland). Dual Outdoor#country ie Dual Outdoor# Setting the IP Address –...
Initial Configuration After configuring the wireless bridge’s IP parameters, you can access the management interface from anywhere within the attached network. The command line interface can also be accessed using Telnet from any computer attached to the network. Using the Web-based Management Setup Wizard There are only a few basic steps you need to complete to set up the wireless bridge for your network.
Page 69
Using the Web-based Management Setup Wizard The home page displays the Main Menu. Launching the Setup Wizard – To perform initial configuration, click Setup Wizard on the home page, then click on the [Next] button to start the process. 1. Service Set ID – Enter the service set identifier in the SSID box which all wireless 802.11g clients must use to associate with the access point.
Page 70
Initial Configuration 2. Radio Channel – You must enable radio communications for the 802.11a and 802.11g radios and set the operating channel. • 802.11a...
Page 71
Using the Web-based Management Setup Wizard Turbo Mode – If you select Enable, the wireless bridge will operate in turbo mode with a data rate of up to 108 Mbps. Normal mode supports 13 channels, Turbo mode supports only 5 channels. (Default: Disable) 802.11a Radio Channel –...
Page 72
Initial Configuration Note: Available channel settings are limited by local regulations which determine which channels are available. 3. IP Configuration – Either enable or disable (Dynamic Host Configuration Protocol (DHCP) for automatic IP configuration. If you disable DHCP, then manually enter the IP address and subnet mask.
Page 73
Using the Web-based Management Setup Wizard 4. WDS – To set up a wireless bridge link, you must configure the WDS forwarding table by specifying the Ethernet MAC address of the bridge to which you want to forward traffic. For a Slave bridge unit, you need to specify the MAC address of the wireless bridge unit at the opposite end of the link.
Page 74
Initial Configuration 5. Security (802.11g) – Set the Authentication Type to “Open System” to allow open access without authentication, or “Shared Key” to require authentication based on a shared key. Enable Wired Equivalent Privacy (WEP) to encrypt data transmissions. To configure other security features use the Advanced Setup menu as described in Chapter 5.
Page 75
Using the Web-based Management Setup Wizard hexadecimal or ASCII string of the appropriate length. The key can be entered as alphanumeric characters or hexadecimal (0~9, A~F, e.g., D7 0A 9C 7F E5). (Default: 128 bit, hexadecimal key type) 64-Bit Manual Entry: The key can contain 10 hexadecimal digits, or 5 alphanumeric characters.
Chapter 6 System Configuration Before continuing with advanced configuration, first complete the initial configuration steps described in Chapter 5 to set up an IP address for the wireless bridge. The wireless bridge can be managed by any computer using a web browser (Internet Explorer 5.0 or above, or Netscape Navigator 6.2 or above).
Page 78
System Configuration When the home page displays, click on Advanced Setup. The following page will display. The information in this chapter is organized to reflect the structure of the web screens for easy reference. However, it is recommended that you configure a user name and password as the first step under advanced configuration to control management access to the wireless bridge (page 6-33).
Advanced Configuration The Advanced Configuration pages include the following options. Menu System Identification TCP / IP Settings Configures the IP address, subnet mask, Radius PPPoE Settings Authentication Filter Control SNMP Administration System Log Bridge Advanced Configuration Description Configures basic administrative and client access Specifies the system name, location and contact information...
System Configuration Menu RSSI Radio Interface A Radio Settings Security Radio Interface G Radio Settings Security System Identification The system information parameters for the wireless bridge can be left at their default settings. However, modifying these parameters can help you to more easily distinguish different devices in your network.
Page 81
System Name – An alias for the wireless bridge, enabling the device to be uniquely identified on the network. (Default: Dual Band Outdoor AP; Range: 1-22 characters) Outdoor Bridge Band – Selects the radio band used for bridge links. • A –...
Page 82
System Configuration CLI Commands for System Identification – Enter the global configuration mode and use the system name command to specify a new system name. Use the snmp-server location and snmp-server contact commands to indicate the physical location of the wireless bridge and define a system contact. Then return to the Exec mode, and use the show system command to display the changes to the system identification settings.
TCP / IP Settings Configuring the wireless bridge with an IP address expands your ability to manage the wireless bridge. A number of wireless bridge features depend on IP addressing to operate. Note: You can use the web browser interface to access IP addressing only if the wireless bridge already has an IP address that is reachable through your network.
Page 84
System Configuration DHCP Client (Enable) – Select this option to obtain the IP settings for the wireless bridge from a DHCP (Dynamic Host Configuration Protocol) server. The IP address, subnet mask, default gateway, and Domain Name Server (DNS) address are dynamically assigned to the wireless bridge by the network DHCP server.
Page 85
• Default Gateway: The default gateway is the IP address of the router for the wireless bridge, which is used if the requested destination address is not on the local subnet. • If you have management stations, DNS, or other network servers located on another subnet, type the IP address of the default gateway router in the text field provided.
System Configuration AP(config)#interface ethernet Enter Ethernet configuration commands, one per line. AP(if-ethernet)#no ip dhcp AP(if-ethernet)#ip address 192.168.1.2 255.255.255.0 192.168.1.253 AP(if-ethernet)#dns primary-server 192.168.1.55 AP(if-ethernet)#dns secondary-server 10.1.0.55 AP(config)#end AP#show interface ethernet Ethernet Interface Information ======================================== IP Address Subnet Mask Default Gateway Primary DNS Secondary DNS Admin status Operational status...
Page 87
Primary Radius Server Setup – Configure the following settings to use RADIUS authentication on the access point. • IP Address: Specifies the IP address or host name of the RADIUS server. • Port: The UDP port number used by the RADIUS server for authentication messages.
Page 88
System Configuration • Key: A shared text string used to encrypt messages between the access point and the RADIUS server. Be sure that the same text string is specified on the RADIUS server. Do not use blank spaces in the string. (Maximum length: 255 characters) •...
to display the current settings for the primary and secondary RADIUS servers. AP(config)#radius-server address 192.168.1.25 AP(config)#radius-server port 181 AP(config)#radius-server key green AP(config)#radius-server timeout 10 AP(config)#radius-server retransmit 5 AP(config)#exit AP#show radius Radius Server Information ======================================== Port Retransmit Timeout ======================================== Radius Secondary Server Information ======================================== Port Retransmit...
Page 90
System Configuration PPP over Ethernet – Enable PPPoE on the RJ-45 Ethernet interface to pass management traffic between the unit and a remote PPPoE server. (Default: Disable) PPPoE Username – The user name assigned for the PPPoE tunnel. (Range: 1-63 alphanumeric characters) PPPoE Password –...
Page 91
IP Allocation Mode – This field specifies how IP adresses for the PPPoE tunnel are configured on the RJ-45 interface. The allocation mode depends on the type of service provided by the PPPoE server. If automatic mode is selected, DHCP is used to allocate the IP addresses for the PPPoE connection.
System Configuration AP(config)#interface ethernet Enter Ethernet configuration commands, one per line. AP(if-ethernet)#ip pppoe AP(if-ethernet)#pppoe username mike AP(if-ethernet)#pppoe password 12345 AP(if-ethernet)#pppoe service-name classA AP(if-ethernet)#pppoe ip allocation mode static AP(if-ethernet)#pppoe local ip 10.7.1.200 AP(if-ethernet)#pppoe remote ip 192.168.1.20 AP(if-ethernet)#pppoe ipcp dns AP(if-ethernet)#pppoe lcp echo-interval 30 AP(if-ethernet)#pppoe lcp echo-failure 5 AP(if-ethernet)#pppoe restart AP(if-ethernet)#end...
Page 93
Ethernet Supplicant Setup – Allows the access point to act as an 802.1X supplicant so it can be authenticated through its Ethernet port with a RADIUS server on the local network. When enabled, a unique MD5 user name and password needs to be configured. (Default: Disabled) •...
Page 94
System Configuration MAC Authentication – You can configure a list of the MAC addresses for wireless clients that are authorized to access the network. This provides a basic level of authentication for wireless clients attempting to gain access to the network. A database of authorized MAC addresses can be stored locally on the access point or remotely on a central RADIUS server.
Page 95
Note: Client station MAC authentication occurs prior to the IEEE 802.1X authentication procedure configured for the access point. However, a client’s MAC address provides relatively weak user authentication, since MAC addresses can be easily captured and used by another station to break into the network. Using 802.1X provides more robust user authentication using user names and passwords or digital certificates.
Page 96
System Configuration • Supported: The access point supports 802.1X authentication only for clients initiating the 802.1X authentication process (i.e., the access point does not initiate 802.1X authentication). For clients initiating 802.1X, only those successfully authenticated are allowed to access the network. For those clients not initiating 802.1X, access to the network is allowed after successful wireless association with the access point.
Page 97
Local MAC Authentication – Configures the local MAC authentication database. The MAC database provides a mechanism to take certain actions based on a wireless client’s MAC address. The MAC list can be configured to allow or deny network access to specific clients. •...
Page 98
System Configuration • Permission: Select Allow to permit access or Deny to block access. If Delete is selected, the specified MAC address entry is removed from the database. • Update: Enters the specified MAC address and permission setting into the local database. •...
Page 99
command. To display the current settings, use the show authentication command from the Exec mode. AP(config)#mac-authentication server local AP(config)#address filter default denied AP(config)#address filter entry 00-70-50-cc-99-1a denied AP(config)#address filter entry 00-70-50-cc-99-1b allowed AP(config)#address filter entry 00-70-50-cc-99-1c allowed AP(config)#address filter delete 00-70-50-cc-99-1c AP(config)#exit AP#show authentication Authentication Information...
Page 100
System Configuration CLI Commands for RADIUS MAC Authentication – Use the mac-authentication server command from the global configuration mode to enable remote MAC authentication. Set the timeout value for re-authentication using the mac-authentication session-timeout command. Be sure to also configure connection settings for the RADIUS server (not shown in the following example).
Page 101
CLI Commands for 802.1X Authentication – Use the 802.1X supported command from the global configuration mode to enable 802.1X authentication. Set the session and broadcast key refresh rate, and the re-authentication timeout. To display the current settings, use the show authentication command from the Exec mode.
System Configuration Filter Control The wireless bridge can employ VLAN tagging support and network traffic frame filtering to control access to network resources and increase security. Native VLAN ID – The VLAN ID assigned to wireless clients that are not assigned to a specific VLAN by RADIUS server configuration.
Page 103
traffic that has an unknown VLAN ID or no VLAN tag is dropped. When VLAN support is disabled, the wireless bridge does not tag traffic passing to the wired network and ignores the VLAN tags on any received frames. Note: Before enabling VLANs on the the connected LAN switch port to accept tagged VLAN packets with the wireless bridge...
Page 104
System Configuration Note: The specific configuration of RADIUS server software is beyond the scope of this guide. Refer to the documentation provided with the RADIUS server software. When VLAN filtering is enabled, the access point must also have 802.1X authentication enabled and a RADIUS server configured. Wireless clients must also support 802.1X client software to be assigned to a specific VLAN.
Page 105
• Enable: Wireless bridge filters Ethernet protocol types based on the configuration of protocol types in the filter table. If a protocol has its status set to “ON,” the protocol is filtered from the wireless bridge. CLI Commands for VLAN Support – From the global configuration mode use the native-vlanid command to set the default VLAN ID for the Ethernet interface, then enable VLANs using the vlan enable command.
System Configuration you want to filter. To display the current settings, use the show filters command from the Exec mode. AP(config)#filter ap-manage AP(config)#filter ethernet-type enable AP(config)#filter ethernet-type protocol ARP AP(config)#exit AP#show filters Protocol Filter Information ========================================================= AP Management Ethernet Type Filter :ENABLED Enabled Protocol Filters --------------------------------------------------------- Protocol: ARP...
Page 107
Advanced Configuration SNMP – Enables or disables SNMP management access and also enables the wireless bridge to send SNMP traps (notifications). SNMP management is disabled by default. Community Name (Read Only) – Defines the SNMP community access string that has read-only access. Authorized management stations are only able to retrieve MIB objects.
Page 108
System Configuration Trap Destination Community Name – The community string sent with the notification operation. (Maximum length: 23 characters; Default: public) CLI Commands for SNMP – Use the snmp-server enable server command from the global configuration mode to enable SNMP. To set read/write and read-only community names, use the snmp-server community command.
Advanced Configuration Administration Changing the Password Management access to the web and CLI interface on the wireless bridge is controlled through a single user name and password. You can also gain additional access security by using control filters (see “Filter Control” on page 6-26). To protect access to the management interface, you need to configure an Administrator’s user name and password as soon as possible.
Page 110
System Configuration CLI Commands for the User Name and Password – Use the username and password commands from the CLI configuration mode. AP(config)#username bob AP(config)#password spiderman Upgrading Firmware You can upgrade new wireless bridge software from a local file on the management workstation, or from an FTP or TFTP server.
Page 111
Before upgrading new software, verify that the wireless bridge is connected to the network and has been configured with a compatible IP address and subnet mask. If you need to download from an FTP or TFTP server, take the following additional steps: •...
Page 112
System Configuration Firmware Upgrade Local – Downloads an operation code image file from the web management station to the wireless bridge using HTTP. Use the Browse button to locate the image file locally on the management station and click Start Upgrade to proceed. •...
Page 113
Note: If you have upgraded system software, then you must reboot the wireless bridge to implement the new operation code. CLI Commands for Downloading Software from a TFTP Server – Use the copy tftp file command from the Exec mode and then specify the file type, name, and IP address of the TFTP server.
System Configuration System Log The wireless bridge can be configured to send event and error messages to a System Log Server. The system clock can also be synchronized with a time server, so that all the messages sent to the Syslog server are stamped with the correct time and date. Enabling System Logging The wireless bridge supports a logging process that can control error messages saved to memory or sent to a Syslog server.
Page 115
Logging Console – Enables the logging of error messages to the console. Logging Level – Sets the minimum severity level for event logging. The system allows you to limit the messages that are logged by specifying a minimum severity level. The following table lists the error message levels from the most severe (Emergency) to least severe (Debug).
System Configuration CLI Commands for System Logging – To enable logging on the wireless bridge, use the logging on command from the global configuration mode. The logging level command sets the minimum level of message to log. Use the logging console command to enable logging to the console.
Page 117
The wireless bridge acts as an SNTP client, periodically sending time synchronization requests to specific time servers. You can configure up to two time server IP addresses. The wireless bridge will attempt to poll each server in the configured sequence. SNTP Server –...
Page 118
System Configuration CLI Commands for SNTP – To enable SNTP support on the wireless bridge, from the global configuration mode specify SNTP server IP addresses using the sntp-server ip command, then use the sntp-server enable command to enable the service. Use the sntp-server timezone command to set the location time zone and the sntp-server daylight-saving command to set up a daylight saving.
Advanced Configuration Wireless Distribution System (WDS) The IEEE 802.11 standard defines a WIreless Distribution System (WDS) for connections between wireless bridges. The access point uses WDS to forward traffic on bridge links between units. When using WDS, only wireless bridge units can associate to each other using the bridge band.
Page 120
System Configuration Mode – The wireless bridge is set to operate as a Slave or Master unit: • Master Mode: In a point-to-multipoint network configuration, only one wireless bridge unit must be a Master unit (all others must be Slave units). A Master wireless bridge provides support for up to 16 MAC addresses in the WDS forwarding table.
MAC Address – The physical layer address of the wireless bridge unit at the other end of the wireless link. (12 hexadecimal digits in the form “xx:xx:xx:xx:xx:xx”) Port Status – Enables or disables the wireless bridge link. Note: The Ethernet MAC address for each bridge unit is printed on the label on the back of the unit.
Page 122
System Configuration Bridge Aging Time – Changes the aging time for entries in the dynamic address table: • Ethernet: The time after which a learned Ethernet port entry is discarded. (Range: 60-1800 seconds; Default: 100 seconds) • Wireless 802.11a (g): The time after which a learned wireless entry is discarded.
CLI Commands for Bridging – The following example shows how to set the MAC address aging time for the wireless bridge. AP(config)#bridge timeout 0 300 AP(config)#bridge timeout 2 1000 AP(config)#exit AP#show bridge ================================================= Media Type | Age Time(sec)| ================================================= EtherNet WLAN_A ================================================== Bridge Id...
Page 124
System Configuration device (except for the root device) which incurs the lowest path cost when forwarding a packet from that device to the root device. Then it selects a designated bridging device from each LAN which incurs the lowest path cost when forwarding a packet from that LAN to the root device.
Page 125
Enable – Enables/disables STP on the wireless bridge. (Default: Enabled) Forward Delay – The maximum time (in seconds) this device waits before changing states (i.e., discarding to learning to forwarding). This delay is required because every device must receive information about topology changes before it starts to forward frames.
Page 126
System Configuration Hello Time – Interval (in seconds) at which the root device transmits a configuration message. (Range: 1-10 seconds) • Default: 2 • Minimum: 1 • Maximum: The lower of 10 or [(Max. Message Age / 2) -1] Maximum Age – The maximum time (in seconds) a device can wait without receiving a configuration message before attempting to reconfigure.
Page 127
assigned to ports with slower media. (Path cost takes precedence over port priority.) • Range: 1-65535 • Default: Ethernet interface: 19; Wireless interface: 40 Priority – Defines the priority used for this port in the Spanning Tree Protocol. If the path cost for all ports on a switch are the same, the port with the highest priority (i.e., lowest value) will be configured as an active link in the spanning tree.
Page 128
System Configuration Port Fast (Fast Forwarding) – You can enable this option if an interface is attached to a LAN segment that is at the end of a bridged LAN or to an end node. Since end nodes cannot cause forwarding loops, they can pass directly through to the spanning tree forwarding state.
Page 129
CLI Commands for STP – The following example configures spanning tree paramters for the bridge and wireless port 5. AP(config)#bridge stp-bridge priority 40000 AP(config)#bridge stp-bridge hello-time 5 AP(config)#bridge stp-bridge max-age 38 AP(config)#bridge stp-bridge forward-time 20 AP(config)#no bridge stp-port spanning-disabled 5 AP(config)#bridge stp-port priority 5 0 AP(config)#bridge stp-port path-cost 5 50 AP(config)#no bridge stp-port portfast 5...
System Configuration RSSI The RSSI value displayed on the RSSI page represents a signal to noise ratio. A value of 30 would indicate that the power of the received signal is 30 dBm above the signal noise threshold. This value can be used to align antennas (see page 4-9) and monitor the quality of the received signal for bridge links.
Page 131
RSSI – The RSSI value for a selected port can be displayed and a representative voltage output can be enabled. • Output Activate: Enables or disables the RSSI voltage output on the external RSSI connector. (Default: Enabled) • Port Number: Selects a specific WDS port for which to set the maximum RSSI output voltage level.
System Configuration Radio Interface The IEEE 802.11a and 802.11g interfaces include configuration options for radio signal characteristics and wireless security features. The configuration options are nearly identical, but depend on which interface is operating as the bridge band. Both interfaces and operating modes are covered in this section of the manual.
Radio Interface Radio Settings A (802.11a) The IEEE 802.11a interface operates within the 5 GHz band, at up to 54 Mbps in normal mode or up to 108 Mbps in Turbo mode. Enable – Enables radio communications on the wireless interface.
Page 134
System Configuration mode. SSID Broadcast – When enabled, the access point radio does not include its SSID in beacon messages. Nor does it respond to probe requests from clients that do not include a fixed SSID. (Default: Disable) Turbo Mode – The normal 802.11a wireless operation mode provides connections up to 54 Mbps.
Page 135
Radio Interface Auto Channel Select – Enables the wireless bridge to automatically select an unoccupied radio channel. (Default: Enabled) Transmit Power – Adjusts the power of the radio signals transmitted from the wireless bridge. The higher the transmission power, the farther the transmission range. Power selection is not just a trade off between coverage area and maximum supported clients.
Page 136
System Configuration Using higher DTIM values reduces the power used by stations in Power Save mode, but delays the transmission of broadcast/ multicast frames. (Range: 1-255 beacons; Default: 2 beacons) Fragment Length – Configures the minimum packet size that can be fragmented when passing through the wireless bridge.
Page 137
Radio Interface Maximum Associations – (Access point mode only) Sets the maximum number of clients that can be associated with the access point radio at the same time. (Range: 1-64 per radio: Default: 64) CLI Commands for the 802.11a Wireless Interface – From the global configuration mode, enter the interface wireless a command to access the 802.11a radio interface.
Page 138
System Configuration AP(config)#interface wireless a Enter Wireless configuration commands, one per line. AP(if-wireless a)#description RD-AP#3 AP(if-wireless a)#ssid r&d AP(if-wireless a)#no turbo AP(if-wireless a)#channel 44 AP(if-wireless a)#closed-system AP(if-wireless a)#transmit-power full AP(if-wireless a)#speed 9 AP(if-wireless a)#max-association 32 AP(if-wireless a)#beacon-interval 150 AP(if-wireless a)#dtim-period 5 AP(if-wireless a)#fragmentation-length 512 AP(if-wireless a)#rts-threshold 256 AP(if-wireless a)#exit...
Radio Interface Radio Settings G (802.11g) The IEEE 802.11g standard operates within the 2.4 GHz band at up to 54 Mbps. Also note that because the IEEE 802.11g standard is an extension of the IEEE 802.11b standard, it allows clients with 802.11b wireless network cards to associate to an 802.11g access point.
Page 140
System Configuration with each other. For example, in the United States you can deploy up to three access points in the same area (e.g., channels 1, 6, 11). Also note that the channel for wireless clients is automatically set to the same as that used by the access point to which it is linked.
Page 141
stop sending the SSID in beacon messages. Select a radio channel or set selection to Auto using the channel command. Set any other parameters as required. To view the current 802.11g radio settings, use the show interface wireless g command. AP(config)#interface wireless g Enter Wireless configuration commands, one per line.
System Configuration Security (Bridge Mode) Wired Equivalent Privacy (WEP) and Advanced Encryption Standard (AES) are implemented for security in bridge mode to prevent unauthorized access to network data. To secure bridge link data transmissions, enable WEP or AES encryption for the bridge radio and set at least one encryption key.
Page 143
Setting up IEEE 802.11 Wired Equivalent Privacy (WEP) shared keys prevents unauthorized access to the wireless bridge network. Be sure to define at least one static WEP key for data encryption. Also, be sure that the WEP keys are the same for all bridge units in the wireless network.
Page 144
System Configuration Advanced Encryption Standard (AES) AES has been designated by the National Institute of Standards and Technology as the successor to the Data Encryption Standard (DES) encryption algorithm, and will be used by the U.S. government for encrypting all sensitive, nonclassified information.
Page 145
Configuring AES encryption keys on the wireless bridge provides far more robust security than using WEP. Also, a unique AES key can be used for each bridge link in the wireless network, instead of all bridges sharing the same WEP keys. Data Encryption Setup –...
Page 146
System Configuration command. To view the current security settings, use the show interface wireless a command. AP(config)#interface wireless a Enter Wireless configuration commands, one per line. AP(if-wireless a)#encryption wep 128 AP(if-wireless a)#key wep 1 128 ascii abcdeabcdeabc AP(if-wireless a)#transmit-key 1 AP(if-wireless a)#exit AP#show interface wireless a Wireless Interface Information...
Page 147
CLI Commands for AES Security – From the 802.11a interface configuration mode, use the encryption command to enable AES encryption. To enter AES keys, use the key command. To view the current security settings, use the show interface wireless a command.
System Configuration Security (Access Point Mode) A radio band set to access point mode is configured by default as an “open system,” which broadcasts a beacon signal including the configured SSID. Wireless clients can read the SSID from the beacon, and automatically reset their SSID to allow immediate connection to the access point.
Page 149
wireless clients. A summary of wireless security considerations is listed in the following table. Security Client Support Mechanism Built-in support on all 802.11a and 802.11g devices WEP over Requires 802.1X client 802.1X support in system or by add-in software (support provided in Windows 2000 SP3 or later and Windows XP) Uses the MAC...
Page 150
System Configuration Note: Although a WEP static key is not needed for WEP over 802.1X, WPA over 802.1X, and WPA PSK modes, you must enable WEP encryption through the web or CLI in order to enable all types of encryption in the access point. Wired Equivalent Privacy (WEP) WEP provides a basic level of security, preventing unauthorized access to the network and encrypting data transmitted between...
Page 151
authentication and data encryption. Also, be sure that the WEP shared keys are the same for each client in the wireless network. Authentication Type Setup – Sets the access point to communicate as an open system that accepts network access attempts from any client, or with clients using pre-configured static shared keys.
Page 152
System Configuration Shared Key Setup – Select 64 Bit, 128 Bit, or 152 Bit key length. Note that the same size of encryption key must be supported on all wireless clients. 152 Bit key length is only supported on 802.11a radio. (Default: 128 Bit) Key Type –...
Page 153
four settings without having to update the client keys. Note: Key index and type must match that configured on the clients. The configuration settings for WEP are summarized below: WEP only Authentication Type: Shared Key WEP (encryption): Enable WPA clients only: Disable Multicast Cipher: WEP Shared Key: 64/128/152 Key Type -...
Page 154
System Configuration show interface wireless a or show interface wireless g command. AP(config)#interface wireless g Enter Wireless configuration commands, one per line. AP(if-wireless g)#authentication shared AP(if-wireless g)#encryption 128 AP(if-wireless g)#multicast-cipher wep AP(if-wireless g)#key 1 128 ascii abcdeabcdeabc AP(if-wireless g)#transmit-key 1 AP(if-wireless g)#end AP(config)#no 802.1X AP(config)#end...
Page 155
CLI Commands for WEP over 802.1X Security – From the 802.11a or 802.11g interface configuration mode, use the authentication command to select open system authentication. Use the multicast-cipher command to select WEP cipher type. Then set 802.1X to required with 802.1X command, and disable MAC authentication with the mac-authentication command.
Page 156
System Configuration Wi-Fi Protected Access (WPA) WPA employs a combination of several technologies to provide an enhanced security solution for 802.11 wireless networks. The access point supports the following WPA components and features: IEEE 802.1X and the Extensible Authentication Protocol (EAP): WPA employs 802.1X as its basic framework for user authentication and dynamic key management.
Page 157
when a RADIUS server has authenticated a user’s credentials will encryption keys be sent to the access point and client. Note: To implement WPA on wireless clients requires a WPA-enabled network card driver and 802.1X client software that supports the EAP authentication type that you want to use.
Page 158
System Configuration uses TKIP unicast data encryption keys for WPA clients and WEP unicast keys for WEP clients. The global encryption key for multicast and broadcast traffic must be the same for all clients, therefore it restricts encryption to a WEP key. When access is opened to both WPA and WEP clients, no authentication is provided for the WEP clients through shared keys.
Page 159
The WPA configuration parameters are described below: Authentication Type Setup – When using WPA, set the access point to communicate as an open system to disable WEP keys. Note: Although WEP keys are not needed for WPA, you must enable WEP encryption through the web or CLI in order to enable all types of encryption in the access point.
Page 160
System Configuration • TKIP: TKIP provides data encryption enhancements including per-packet key hashing (that is, changing the encryption key on each packet), a message integrity check, an extended initialization vector with sequencing rules, and a re-keying mechanism. • AES: AES has been designated by the National Institute of Standards and Technology as the successor to the Data Encryption Standard (DES) encryption algorithm, and will be used by the U.S.
Page 161
The configuration settings for WPA are summarized below: WPA pre-shared key only Authentication Type: Open System WEP (encryption): Enable WPA clients only: Enable WPA Mode: Pre-shared-key Multicast Cipher: WEP/TKIP/AES WPA PSK Type - Hex: 64 characters ASCII: 8-63 characters Shared Key: 64/128/152 802.1X = Disabled MAC Authentication: Disabled/ Local...
Page 162
System Configuration authentication. To view the current 802.11g security settings, use the show interface wireless a or show interface wireless g command (not shown in example). AP(config)#interface wireless g Enter Wireless configuration commands, one per line. AP(if-wireless g)#authentication open AP(if-wireless g)#encryption 128 AP(if-wireless g)#wpa-clients required AP(if-wireless g)#wpa-mode pre-shared-key AP(if-wireless g)#wpa-psk-type alphanumeric...
Status Information The Status page includes information on the following items: Menu AP Status Station Status Event Logs AP Status The AP Status window displays basic system configuration settings, as well as the settings for the wireless interfaces. AP System Configuration – The AP System Configuration table displays the basic system configuration settings: Description Displays configuration settings for the basic...
Page 164
System Configuration • System Up Time: Length of time the management agent has been up. • MAC Address: The physical layer address for this device. • System Name: Name assigned to this system. • System Contact: Administrator responsible for the system. •...
Page 165
• Radio Authentication Type: Shows the bridge is set as an open system. • 802.1X: Shows if IEEE 802.1X access control for wireless clients is enabled. CLI Commands for Displaying System Settings – To view the current wireless bridge system settings, use the show system command from the Exec mode.
System Configuration Station Status The Station Status window shows wireless clients currently associated with the access point. The Station Status page displays basic connection information for all associated stations. Note that this page is automatically refreshed every five seconds. • Station Address: The MAC address of the remote wireless bridge.
Page 167
• Associated: Shows if the station has been successfully associated with the access point. • Forwarding Allowed: Shows if the station has passed authentication and is now allowed to forward traffic. • Key Type: Displays one of the following: • Disabled: The client is not using Wired Equivalent Privacy (WEP) encryption keys.
System Configuration Event Logs The Event Logs window shows the log messages generated by the wireless bridge and stored in memory. The Event Logs table displays the following information: • Log Time: The time the log message was generated. • Event Level: The logging level associated with this message.
Command Line Interface Using the Command Line Interface Accessing the CLI When accessing the management interface for the wireless bridge via a Telnet connection, the wireless bridge can be managed by entering command keywords and parameters at the prompt. Using the wireless bridge’s command-line interface (CLI) is very similar to entering commands on a UNIX system.
Page 172
Command Line Interface gateway if you are managing the wireless bridge from a different IP subnet. For example: AP#configure AP(config)#interface ethernet AP(if-ethernet)#ip address 10.1.0.1 255.255.255.0 10.1.0.254 AP(if-ethernet)# After you configure the wireless bridge with an IP address, you can open a Telnet session by performing these steps. 1.
Entering Commands This section describes how to enter CLI commands. Keywords and Arguments A CLI command is a series of keywords and arguments. Keywords identify a command, and arguments specify configuration parameters. For example, in the command “show interface ethernet,” show and interface are keywords, and ethernet is an argument that specifies the interface type.
Command Line Interface Getting Help on Commands You can display a brief description of the help system by entering the help command. You can also display command syntax by following a command with the “?” character to list keywords or parameters.
The command “show interface ?” will display the following information: AP#show interface ? ethernet wireless <cr> AP#show interface Partial Keyword Lookup If you terminate a partial keyword with a question mark, alternatives that match the initial letters are provided. (Remember not to leave a space between the command and question mark.) For example “s?”...
Command Line Interface Understanding Command Modes The command set is divided into Exec and Configuration classes. Exec commands generally display information on system status or clear statistical counters. Configuration commands, on the other hand, modify interface parameters or enable certain functions.
Configuration Commands Configuration commands are used to modify wireless bridge settings. These commands modify the running configuration and are saved in memory. The configuration commands are organized into three different modes: • Global Configuration - These commands modify the system level configuration, and include commands such as username and password.
Command Line Interface Command Line Processing Commands are not case sensitive. You can abbreviate commands and parameters as long as they contain enough letters to differentiate them from any other currently available commands or parameters. You can use the Tab key to complete partial commands, or enter a partial command followed by the “?”...
Command Groups The system commands can be broken down into the functional groups shown below. Command Group General System Management System Logging Configures system logging parameters System Clock SNMP Flash/File RADIUS Authentication Bridge Filtering PPPoE Ethernet Interface Wireless Interface Description Basic commands for entering configuration mode, restarting the system, or quitting the Controls user name, password, browser...
Command Line Interface Command Group IAPP VLANs The access mode shown in the following tables is indicated by these abbreviations: GC (Global Configuration), IC-E (Ethernet Interface Configuration), and IC-W (Wireless Interface Configuration). General Commands Command configure exit ping reset show history Shows the command history buffer show line configure This command activates Global Configuration mode.
Command Mode Exec Example AP#configure AP(config)# Related Commands end (page 7-11) This command returns to the previous configuration mode. Default Setting None Command Mode Global Configuration, Interface Configuration Example This example shows how to return to the Configuration mode from the Interface Configuration mode: AP(if-ethernet)#end AP(config)# exit...
Command Line Interface Example This example shows how to return to the Exec mode from the Interface Configuration mode, and then quit the CLI session: AP(if-ethernet)#exit AP#exit CLI session with the wireless bridge is now closed Username: ping This command sends ICMP echo request packets to another node on the network.
– Network or host unreachable - The gateway found no corresponding entry in the route table. • Press <Esc> to stop pinging. Example AP#ping 10.1.0.19 192.168.1.19 is alive reset This command restarts the system or restores the factory default settings. Syntax reset <board | configuration>...
Command Line Interface show history This command shows the contents of the command history buffer. Default Setting None Command Mode Exec Command Usage • The history buffer size is fixed at 10 commands. • Use the up or down arrow keys to scroll through the commands in the history buffer.
Example The console port settings are fixed at the values shown below. AP#show line Console Line Information ====================================================== databits parity speed stop bits ====================================================== System Management Commands These commands are used to configure the user name, password, browser management options, and a variety of other system information.
Command Line Interface Command Web Server ip http port ip http server System Status show system show version country This command configures the wireless bridge’s country code, which identifies the country of operation and sets the authorized radio channels. Syntax country <country_code>...
Country Code Country Belize Hong Kong HK Bolivia Hungary Brazil Iceland Brunei India Darussalam Bulgaria Indonesia Canada Iran Chile Ireland China Israel Colombia Italy Costa Rica Japan Croatia Jordan Cyprus Kazakhstan KZ Czech North Republic Korea Denmark Korea Republic Default Setting US - for units sold in the United States 99 (no country set) - for units sold in other countries Command Mode...
Command Line Interface Example AP#country us prompt This command customizes the CLI prompt. Use the no form to restore the default prompt. Syntax prompt string no prompt string - Any alphanumeric string to use for the CLI prompt. (Maximum length: 255 characters) Default Setting Dual Outdoor Command Mode...
system name This command specifies or modifies the system name for this device. Use the no form to restore the default system name. Syntax system name name no system name name - The name of this host. (Maximum length: 32 characters) Default Setting Outdoor Bridge Command Mode...
Command Line Interface Example AP(config)#username bob AP(config)# password After initially logging onto the system, you should set the password. Remember to record it in a safe place. Use the no form to reset the default password. Syntax password password no password password - Password for management access.
Default Setting Command Mode Global Configuration Example AP(config)#ip http port 1143 AP(config)# Related Commands ip http server (page 7-21) ip http server This command allows this device to be monitored or configured from a browser. Use the no form to disable this function. Syntax ip http server no ip http server...
Command Line Interface show system This command displays basic system configuration settings. Default Setting None Command Mode Exec Example AP#show system System Information ========================================================= Serial Number System Up time seconds System Name System Location System Contact System Country Code : TW - TAIWAN MAC Address IP Address Subnet Mask...
show version This command displays the software version for the system. Default Setting None Command Mode Exec Example AP#show version Version v1.1.2.1B05 System Logging Commands These commands are used to configure system logging on the wireless bridge. Command logging on logging host logging console logging level...
Command Line Interface logging on This command controls logging of error messages; i.e., sending debug or error messages to memory. The no form disables the logging process. Syntax logging on no logging on Default Setting None Command Mode Global Configuration Command Usage The logging process controls error messages saved to memory.
Default Setting None Command Mode Global Configuration Example AP(config)#logging host 10.1.0.3 AP(config)# logging console This command initiates logging of error messages to the console. Use the no form to disable logging to the console. Syntax logging console no logging console Default Setting Disabled Command Mode...
Command Line Interface Default Setting Error Command Mode Global Configuration Command Usage Messages sent include the selected level down to the Emergency level. Level Argument Emergency Alert Critical Error Warning Notice Informational Debug Example AP(config)#logging level alert AP(config)# logging facility-type This command sets the facility type for remote logging of syslog messages.
Default Setting Command Mode Global Configuration Command Usage The command specifies the facility type tag sent in syslog messages. (See RFC 3164.) This type has no effect on the kind of messages reported by the wireless bridge. However, it may be used by the syslog server to sort messages or to store messages in the corresponding database.
Command Line Interface Example AP#show logging Logging Information ============================================ Syslog State Logging Host State Logging Console State Server Domain name/IP Logging Level Logging Facility Type ============================================= System Clock Commands These commands are used to configure SNTP and system clock settings on the wireless bridge. Command sntp-server ip sntp-server...
sntp-server ip This command sets the IP address of the servers to which SNTP time requests are issued. Use the this command with no arguments to clear all time servers from the current list. Syntax sntp-server ip <1 | 2> <ip> •...
Command Line Interface sntp-server enable This command enables SNTP client requests for time synchronization with NTP or SNTP time servers specified by the sntp-server ip command. Use the no form to disable SNTP client requests. Syntax sntp-server enable no sntp-server enable Default Setting Disabled Command Mode...
sntp-server date-time This command sets the system clock. Default Setting 00:14:00, January 1, 1970 Command Mode Global Configuration Example This example sets the system clock to 17:37 June 19, 2003. AP#sntp-server date-time Enter Year<1970-2100>: 2003 Enter Month<1-12>: 6 Enter Day<1-31>: 19 Enter Hour<0-23>: 17 Enter Min<0-59>: 37 Related Commands...
Command Line Interface Command Usage The command sets the system clock back one hour during the specified period. Example This sets daylight savings time to be used from July 1st to September 1st. AP(config)#sntp-server daylight-saving Enter Daylight saving from which month<1-12>: 6 and which day<1-31>: 1 Enter Daylight saving end to which month<1-12>: 9 and which day<1-31>: 1...
degrees longitude. To display a time corresponding to your local time, you must indicate the number of hours and minutes your time zone is east (before) or west (after) of UTC. Example AP(config)#sntp-server timezone +8 AP(config)# show sntp This command displays the current time and configuration settings for the SNTP client.
Command Line Interface SNMP Commands Controls access to this wireless bridge from management stations using the Simple Network Management Protocol (SNMP), as well as the hosts that will receive trap messages. Command snmp-server community snmp-server contact snmp-server enable server snmp-server host Specifies the recipient of an SNMP snmp-server location show snmp...
Default Setting • public - Read-only access. Authorized management stations are only able to retrieve MIB objects. • private - Read/write access. Authorized management stations are able to both retrieve and modify MIB objects. Command Mode Global Configuration Command Usage If you enter a community string without the ro or rw option, the default is read only.
Command Line Interface Example AP(config)#snmp-server contact Paul AP(config)# Related Commands snmp-server location (page 7-38) snmp-server enable server This command enables SNMP management access and also enables this device to send SNMP traps (i.e., notifications). Use the no form to disable SNMP service and trap messages. Syntax snmp-server enable server no snmp-server enable server...
snmp-server host This command specifies the recipient of an SNMP notification. Use the no form to remove the specified host. Syntax snmp-server host <host_ip_address | host_name> <community-string> no snmp-server host • host_ip_address - IP of the host (the targeted recipient). •...
Command Line Interface Example AP(config)#snmp-server host 10.1.19.23 batman AP(config)# Related Commands snmp-server enable server (page 7-36) snmp-server location This command sets the system location string. Use the no form to remove the location string. Syntax snmp-server location text no snmp-server location text - String that describes the system location.
show snmp This command displays the SNMP configuration settings. Command Mode Exec Example AP#show snmp SNMP Information ============================================ Service State Community (ro) : ***** Community (rw) : ***** Location Contact Traps Host Name/IP Trap Community : ***** ============================================= Flash/File Commands These commands are used to manage the system code or configuration files.
Command Line Interface bootfile This command specifies the image used to start up the system. Syntax bootfile <filename> filename - Name of the image file. Default Setting None Command Mode Exec Command Usage • The file name should not contain slashes (\ or /), the leading letter of the file name should not be a period (.), and the maximum length for file names is 32 characters.
copy This command copies a boot file, code image, or configuration file between the wireless bridge’s flash memory and a FTP/TFTP server. When you save the configuration settings to a file on a FTP/TFTP server, that file can later be downloaded to the wireless bridge to restore system operation.
Command Line Interface • The destination file name should not contain slashes (\ or /), the leading letter of the file name should not be a period (.), and the maximum length for file names on the FTP/TFTP server is 255 characters or 32 characters for files on the wireless bridge.
Default Setting None Command Mode Exec Beware of deleting application images from flash Caution: memory. At least one application image is required in order to boot the wireless bridge. If there are multiple image files in flash memory, and the one used to boot the wireless bridge is deleted, be sure you first use the bootfile command to update the application image file booted at startup before you reboot the wireless bridge.
Page 214
Command Line Interface Command Usage File information is shown below: Column Heading File Name Type File Size Example The following example shows how to display all file information: AP#dir apimg1 zz-img.bin dflt-img.bin ap3xart.sys syscfg_bak syscfg apcfg zz-imgf.bin apcfg.bak 2502656 bytes free 7-44 Description The name of the file.
RADIUS Client Remote Authentication Dial-in User Service (RADIUS) is a logon authentication protocol that uses software running on a central server to control access for RADIUS-aware devices to the network. An authentication server contains a database of credentials, such as users names and passwords, for each wireless client that requires access to the access point.
Command Line Interface Command Mode Global Configuration Example AP(config)#radius-server address 192.168.1.25 AP(config)# radius-server port This command sets the RADIUS server network port. Syntax radius-server [secondary] port <port_number> • secondary - Secondary server. • port_number - RADIUS server UDP port used for authentication messages.
radius-server key This command sets the RADIUS encryption key. Syntax radius-server [secondary] key <key_string> • secondary - Secondary server. • key_string - Encryption key used to authenticate logon access for client. Do not use blank spaces in the string. (Maximum length: 20 characters) Default Setting DEFAULT Command Mode...
Command Line Interface Example AP(config)#radius-server retransmit 5 AP(config)# radius-server timeout This command sets the interval between transmitting authentication requests to the RADIUS server. Syntax radius-server [secondary] timeout number_of_seconds • secondary - Secondary server. • number_of_seconds - Number of seconds the access point waits for a reply before resending a request.
Example AP#show radius Radius Server Information ======================================== Port Retransmit Timeout ======================================== Radius Secondary Server Information ======================================== Port Retransmit Timeout ======================================== Authentication The access point supports IEEE 802.1x access control for wireless clients. This control feature prevents unauthorized access to the network by requiring a 802.1x client application to submit user credentials for authentication.
Page 220
Command Line Interface Client MAC addresses can also be used for authentication on the access point. For local MAC authentication, first define the default filtering policy using the address filter default command. Then enter the MAC addresses to be filtered, indicating if they are allowed or denied.
Page 221
Command mac-authentication session-timeout show authentication Shows all 802.1x authentication 802.1x This command configures 802.1x as optionally supported or as required for wireless clients. Use the no form to disable 802.1x support. Syntax 802.1x <supported | required> no 802.1x • supported - Authenticates clients that initiate the 802.1x authentication process.
Command Line Interface • When 802.1x is supported, the access point supports 802.1x authentication only for clients initiating the 802.1x authentication process (i.e., the access point does NOT initiate 802.1x authentication). For stations initiating 802.1x, only those stations successfully authenticated are allowed to access the network.
Command Usage • The access point uses EAPOL (Extensible Authentication Protocol Over LANs) packets to pass dynamic unicast session and broadcast keys to wireless clients. The 802.1x broadcast-key-refresh-rate command specifies the interval after which the broadcast keys are changed. The 802.1x session-key-refresh-rate command specifies the interval after which unicast session keys are changed.
Command Line Interface Example AP(config)#802.1x session-key-refresh-rate 5 AP(config)# 802.1x session-timeout This command sets the time period after which a connected client must be re-authenticated. Use the no form to disable 802.1x re-authentication. Syntax 802.1x session-timeout <seconds> no 802.1x session-timeout seconds - The number of seconds. (Range: 0-65535) Default 0 (Disabled) Command Mode...
802.1x supplicant This command sets the user name and password used for authentication of the access point when operating as a 802.1x supplicant and enables supplicant authentication. Use the no form to disable the feature. Syntax 802.1x supplicant eth_password <password> 802.1x supplicant eth_user <username>...
Command Line Interface Command Mode Global Configuration Command Usage • Ethernet and WDS user names and passwords must be set before enabling the 802.1x supplicant feature for the specified port. • The access point currently only supports EAP-MD5 CHAP for 802.1x supplicant authentication. Example AP(config)#802.1x supplicant wds_user 1 David AP(config)#802.1x supplicant wds_password 1 ABC...
Example AP(config)#address filter default denied AP(config)# Related Commands address filter entry (page 7-57) show authentication (page 7-60) address filter entry This command enters a MAC address in the filter table. Syntax address filter entry <mac-address> <allowed | denied> • mac-address - Physical address of client. (Enter six pairs of hexadecimal digits separated by hyphens;...
Command Line Interface Example (config)#address filter entry 00-70-50-cc-99-1a allowed (config)# Related Commands address filter default (page 7-56) show authentication (page 7-60) address filter delete This command deletes a MAC address from the filter table. Syntax address filter delete <mac-address> mac-address - Physical address of client. (Enter six pairs of hexadecimal digits separated by hyphens.) Default None...
mac-authentication server This command sets address filtering to be performed with local or remote options. Use the no form to disable MAC address authentication. Syntax mac-authentication server [local | remote] • local - Authenticate the MAC address of wireless clients with the local authentication database during 802.11 association.
Command Line Interface mac-authentication session-timeout This command sets the interval at which associated clients will be re-authenticated with the RADIUS server authentication database. Use the no form to disable reauthentication. Syntax mac-authentication session-timeout <seconds> seconds - Re-authentication interval. (Range: 0-65535) Default 0 (disabled) Command Mode...
Example AP#show authentication Authentication Information ========================================================= MAC Authentication Server MAC Auth Session Timeout Value : 1 secs 802.1x Broadcast Key Refresh Rate Session Key Refresh Rate 802.1x Session Timeout Value Address Filtering System Default : DENY addresses not found in filter table. Filter Table MAC Address -----------------...
Command Line Interface wds channel This command selects the radio band to be used for WDS forwarding (bridging). Syntax wds channel <a | g | none> • a - Bridging is supported on the 802.11a 5 GHz band. • g - Bridging is supported on the 802.11b/g 2.4 GHz band. •...
Command Mode Global Configuration Command Usage • You can only configure one MAC address per wireless port • The Ethernet MAC address for each bridge unit is printed on the label on the back of the unit. • When trying to connect to other bridges, please input the Ethernet MAC address Example AP(config)#wds mac-address 1 00-12-34-56-78-9a...
Command Line Interface show wds This command displays the current entries in the WDS forwarding table. Syntax show wds Command Mode Exec Example AP#show wds Outdoor_Mode ================================================== Port ID ================================================== ================================================== AP(config)# 7-64 MASTER Status Mac-Address ENABLE 00-12-34-56-78-9A ENABLE 00-1A-2B-3C-4D-5E DISABLE 00-01-02-03-04-05 ENABLE...
Bridge Commands The commands described in this section are used to set the MAC address table aging time and spanning tree parameters for both the Ethernet and wireless interfaces. Command bridge timeout bridge stp-bridge spanning-tree bridge stp-bridge forward-time bridge stp-bridge hello-time bridge stp-bridge max-age...
Command Line Interface bridge timeout This command sets the aging time for both the Ethernet port and the wireless interface. Syntax bridge timeout <interface-id> <seconds> • interface-id - An identifier that specifies the interface. (0 for Ethernet, 2 for 802.11a wireless) •...
Default Setting Spanning tree is enabled. Command Mode Global Configuration Command Usage The Spanning Tree Protocol (STP) can be used to detect and disable network loops, and to provide backup links between switches, bridges or routers. This allows the wireless bridge to interact with other bridging devices (that is, an STP-compliant switch, bridge or router) in your network to ensure that only one route exists between any two stations on the network, and...
Command Line Interface Default Setting 15 seconds Command Mode Global Configuration Command Usage This command sets the maximum time (in seconds) the root device will wait before changing states (i.e., discarding to learning to forwarding). This delay is required because every device must receive information about topology changes before it starts to forward frames.
Command Mode Global Configuration Command Usage This command sets the time interval (in seconds) at which the root device transmits a configuration message. Example AP(config)#bridge stp-bridge hello-time 5 AP(config)# bridge stp-bridge max-age Use this command to configure the spanning tree bridge maximum age globally for the wireless bridge.
Command Line Interface Command Usage This command sets the maximum time (in seconds) a device can wait without receiving a configuration message before attempting to reconfigure. All device ports (except for designated ports) should receive configuration messages at regular intervals. Any port that ages out STP information (provided in the last configuration message) becomes the designated port for the attached LAN.
Command Usage Bridge priority is used in selecting the root device, root port, and designated port. The device with the highest priority becomes the STP root device. However, if all devices have the same priority, the device with the lowest MAC address will then become the root device.
Command Line Interface Command Usage • This command is used by the Spanning Tree Protocol to determine the best path between devices. Therefore, lower values should be assigned to ports attached to faster media, and higher values assigned to ports with slower media. •...
• Where more than one port is assigned the highest priority, the port with lowest numeric identifier will be enabled. Example AP(config)#bridge stp-port priority 1 64 AP(config)# Related Commands bridge stp-port path-cost (page 7-71) bridge stp-port portfast Use this command to set an interface to fast forwarding. Use the no form to disable fast forwarding.
Command Line Interface • Since end-nodes cannot cause forwarding loops, they can be passed through the spanning tree state changes more quickly than allowed by standard convergence time. Fast forwarding can achieve quicker convergence for end-node devices, and also overcome other STP related timeout problems.
show bridge This command displays aging time and spanning tree settings for the Ethernet and wireless interfaces. Syntax show bridge Command Mode Exec Example AP#show bridge ================================================= Media Type | Age Time(sec)| ================================================= EtherNet WLAN_A ================================================== Bridge Id Root Bridge Id Root Path Cost Root Port Id Bridge Status...
Command Line Interface Filtering Commands The commands described in this section are used to control access to the management interface from the wireless interface and filter traffic using specific Ethernet protocol types. Command filter local-bridge filter ap-manage filter ethernet-type enable filter ethernet-type protocol...
Command Usage This command can disable wireless-to-wireless communications between clients via the access point. However, it does not affect communications between wireless clients and the wired network. Example AP(config)#filter local-bridge AP(config)# Related Commands filter ethernet-type enable (page 7-78) filter ap-manage This command prevents access to wireless bridge management from the wireless interface.
Command Line Interface filter ethernet-type enable This command checks the Ethernet type on all incoming and outgoing Ethernet packets against the protocol filtering table. Use the no form to disable this feature. Syntax filter ethernet-type enable no filter ethernet-type enable Default Disabled Command Mode...
filter ethernet-type protocol This command sets a filter for a specific Ethernet type. Use the no form to disable filtering for a specific Ethernet type. Syntax filter ethernet-type protocol <protocol> no filter ethernet-type protocol <protocol> protocol - An Ethernet protocol type. (Options: ARP, RARP, Berkeley-Trailer-Negotiation, LAN-Test, X25-Level-3, Banyan, CDP, DEC XNS, DEC-MOP-Dump-Load, DEC-MOP, DEC-LAT, Ethertalk, Appletalk-ARP, Novell-IPX(old),...
Command Line Interface show filters This command shows the filter options and protocol entries in the filter table. Command Mode Exec Example AP#show filters Protocol Filter Information ========================================================= AP Management Ethernet Type Filter :ENABLED Enabled Protocol Filters --------------------------------------------------------- Protocol: ARP ========================================================= PPPoE Commands The commands described in this section configure PPPoE...
Command pppoe lcp echo-failure pppoe local ip pppoe remote ip pppoe username pppoe password pppoe service-name pppoe restart show pppoe ip pppoe This command enables Point-to-Point Protocol over Ethernet (PPPoE) on the Ethernet interface. Use the no form to disable PPPoE on the Ethernet interface.
Command Line Interface Command Usage The access point uses a PPPoE connection, or tunnel, only for management traffic between the access point and a remote PPPoE server (typically at an ISP). Examples of management traffic that may initiated by the access point and carried over a PPPoE tunnel are RADIUS, Syslog, or DHCP traffic.
Example AP#(if-ethernet)#pppoe ip allocation mode static Related Commands pppoe local ip (page 7-86) pppoe remote ip (page 7-86) pppoe ipcp dns This command requests allocation of IP addresses for Dynamic Naming System (DNS) servers from the device at the remote end of the PPPoE tunnel.
pppoe lcp echo-failure This command sets the Link Control Protocol (LCP) echo timeout for the PPPoE tunnel. Syntax pppoe lcp echo-failure <timeout> timeout - The number of timeouts allowed. (Range: 1-10) Default Setting Command Mode Interface Configuration (Ethernet) Command Usage •...
Command Line Interface pppoe local ip This command sets the local IP address for the PPPoE tunnel. Syntax pppoe local ip <ip-address> ip-address - IP address of the local end of the PPPoE tunnel. Default Setting None Command Mode Interface Configuration (Ethernet) Command Usage If the pppoe ip allocation mode is set to static, the local IP address must be entered with this command, and the remote...
Default Setting None Command Mode Interface Configuration (Ethernet) Command Usage If the pppoe ip allocation mode is set to static, the remote IP address must be entered with this command, and the local IP address must be entered with the pppoe local ip command. Example AP#(if-ethernet)#pppoe remote ip 192.168.1.20 Related Commands...
Command Line Interface Command Usage You must enter a user name with this command, and a password with the pppoe password command. Example AP#(if-ethernet)#pppoe username mike Related Commands pppoe password (page 7-88) pppoe password This command sets the password for the PPPoE tunnel. Syntax pppoe password <string>...
pppoe service-name This command sets the service name for the PPPoE tunnel. Syntax pppoe service-name <string> string - Service name assigned by the service provider. (Range: 1-63 alphanumeric characters) Default Setting None Command Mode Interface Configuration (Ethernet) Command Usage The service name is normally optional, but may be required by some service providers.
Command Line Interface Example AP#(if-ethernet)#pppoe restart show pppoe This command shows information about the PPPoE configuration. Command Mode Privileged Exec Example AP#show pppoe PPPoE Information ====================================================== State Username Service Name IP Allocation Mode DNS Negotiation Local IP Echo Interval Echo Failure ====================================================== 7-90 : Link up...
Ethernet Interface Commands The commands described in this section configure connection parameters for the Ethernet interface. Command interface ethernet dns primary-server secondary-server ip address ip dhcp shutdown show interface ethernet interface ethernet This command enters Ethernet interface configuration mode. Syntax interface ethernet Default Setting None...
Command Line Interface Example To specify the 10/100Base-TX network interface, enter the following command: AP(config)#interface ethernet AP(if-ethernet)# dns server This command specifies the address for the primary or secondary domain name server to be used for name-to-address resolution. Syntax dns primary-server <server-address> dns secondary-server <server-address>...
Related Commands show interface ethernet (page 7-96) ip address This command sets the IP address for the (10/100Base-TX) Ethernet interface. Use the no form to restore the default IP address. Syntax ip address <ip-address> <netmask> <gateway> no ip address • ip-address - IP address •...
Command Line Interface • You must assign an IP address to this device to gain management access over the network or to connect the wireless bridge to existing IP subnets. You can manually configure a specific IP address using this command, or direct the device to obtain an address from a DHCP server using the ip dhcp command.
Command Usage • You must assign an IP address to this device to gain management access over the network or to connect the wireless bridge to existing IP subnets. You can manually configure a specific IP address using the ip address command, or direct the device to obtain an address from a DHCP server using this command.
Command Line Interface Command Mode Interface Configuration (Ethernet) Command Usage This command allows you to disable the Ethernet port due to abnormal behavior (e.g., excessive collisions), and reenable it after the problem has been resolved. You may also want to disable the Ethernet port for security reasons.
Example AP#show interface ethernet Ethernet Interface Information ======================================== IP Address Subnet Mask Default Gateway Primary DNS Secondary DNS Admin status Operational status ======================================== Wireless Interface Commands The commands described in this section configure connection parameters for the wireless interface. Command interface wireless Enters wireless interface description ssid...
Page 268
Command Line Interface Command dtim-period fragmentation- length rts-threshold transmit-power max-association authentication encryption transmit-key multicast-cipher wpa-clients wpa-mode wpa-preshared- wpa-psk-type shutdown 7-98 Function Configures the rate at which stations in sleep mode must wake up to receive broadcast/multicast transmissions Configures the minimum packet size that can be fragmented Sets the packet size threshold at which an RTS must be sent to the...
Command show interface wireless show station interface wireless This command enters wireless interface configuration mode. Syntax interface wireless a • a - 802.11a radio interface. • g - 802.11g radio interface Default Setting None Command Mode Global Configuration Example To specify the wireless interface, enter the following command: AP(config)#interface wireless a AP(if-wireless a)# description...
Command Line Interface Default Setting None Command Mode Interface Configuration (Wireless) Example AP(config)#interface wireless a AP(if-wireless a)#description RD-AP#3 AP(if-wireless a)# ssid This command configures the service set identifier (SSID). Syntax ssid <string> string - The name of a basic service set supported by the access point.
closed-system This command closes access to clients without a pre-configured SSID. Use the no form to disable this feature. Syntax closed-system no closed-system Default Setting Disabled Command Mode Interface Configuration (Wireless) Command Usage When SSID Broadcast is disabled, the access point will not include its SSID in beacon messages.
Command Line Interface Command Mode Interface Configuration (Wireless) Command Usage The maximum transmission distance is affected by the data rate. The lower the data rate, the longer the transmission distance. Example AP(if-wireless a)#speed 6 AP(if-wireless a)# channel This command configures the radio channel through which the local wireless bridge communicates with remote bridges.
Example AP(if-wireless a)#channel 36 AP(if-wireless a)# turbo This command sets the wireless bridge to an enhanced mode (not regulated in IEEE 802.11a) that provides a higher data rate of up to 108 Mbps. Default Setting Disabled Command Mode Interface Configuration (Wireless - 802.11a) Command Usage •...
Command Line Interface beacon-interval This command configures the rate at which beacon signals are transmitted from the wireless bridge. Syntax beacon-interval <interval> interval - The rate for transmitting beacon signals. (Range: 20-1000 milliseconds) Default Setting Command Mode Interface Configuration (Wireless) Command Usage The beacon signals allow remote bridges to maintain contact with the local wireless bridge.
Default Setting Command Mode Interface Configuration (Wireless) Command Usage • The Delivery Traffic Indication Map (DTIM) packet interval value indicates how often the MAC layer forwards broadcast/multicast traffic. This parameter is necessary to wake up remote bridges that are using Power Save mode. •...
Command Line Interface Default Setting 2346 Command Mode Interface Configuration (Wireless) Command Usage • If the packet size is smaller than the preset Fragment size, the packet will not be segmented. • Fragmentation of the PDUs (Package Data Unit) can increase the reliability of transmissions because it increases the probability of a successful transmission due to smaller frame size.
Default Setting 2347 Command Mode Interface Configuration (Wireless) Command Usage • If the threshold is set to 0, the wireless bridge always sends RTS signals. If set to 2347, the wireless bridge never sends RTS signals. If set to any other value, and the packet size equals or exceeds the RTS threshold, the RTS/CTS (Request to Send / Clear to Send) mechanism will be enabled.
Command Line Interface Default Setting full Command Mode Interface Configuration (Wireless) Command Usage • The “min” keyword indicates minimum power. • The longer the transmission distance, the higher the transmission power required. Power selection is not just a trade off between coverage area and maximum data rates. You also have to ensure that high strength signals do not interfere with the operation of other radio devices in your area.
Example AP(if-wireless g)#max-association 32 AP(if-wireless g)# authentication This command defines the 802.11 authentication type allowed by the access point. Syntax authentication <open | shared> • open - Accepts the client without verifying its identity using a shared key. • shared - Authentication is based on a shared key that has been distributed to all stations.
Command Line Interface encryption This command defines whether WEP or AES encryption is used to provide privacy for wireless communications. Use the no form to disable encryption. Syntax encryption {wep <key-length> | wdsaes <alphanumeric | hex>} no encryption • wep - The keyword that enables WEP encryption. –...
Page 281
• AES has been designated by the National Institute of Standards and Technology as the successor to the Data Encryption Standard (DES) encryption algorithm, and will be used by the U.S. government for encrypting all sensitive, nonclassified information. Because of its strength, and resistance to attack, AES is also being incorporated as part of the 802.11 standard.
Command Line Interface This command sets the keys used for WEP and AES encryption. Use the no form to delete a configured key. Syntax key {wep <index size type wep-value> | wdsaes <port-id aes-value>} no key {wep <index> | wdsaes} •...
• To enable AES encryption, use the encryption command to specify the key type, and use the key command to configure a key for each wireless port. • If WEP is enabled, all units in the wireless bridge network must be configured with the same keys. •...
Command Line Interface Command Mode Interface Configuration (Wireless) Command Usage • If you use WEP key encryption, the wireless bridge uses the transmit key to encrypt multicast and broadcast data signals that it sends to other nodes. Other keys can be used for decryption of data from other nodes.
Page 285
Command Usage • WPA enables the access point to support different unicast encryption keys for each client. However, the global encryption key for multicast and broadcast traffic must be the same for all clients. This command sets the encryption type that is supported by all clients. •...
Command Line Interface wpa-clients This command defines whether Wi-Fi Protected Access (WPA) is required or optionally supported for client stations. Syntax wpa-clients <required | supported> • required - Supports only clients using WPA. • supported - Support clients with or without WPA. Default Setting Supported Command Mode...
Example AP(if-wireless g)#wpa-client required AP(if-wireless g)# Related Commands wpa-mode (page 7-117) wpa-mode This command specifies whether Wi-Fi Protected Access (WPA) is to use 802.1x dynamic keys or a pre-shared key. Syntax wpa-mode <dynamic | pre-shared-key> • dynamic - WPA with 802.1x dynamic keys. •...
Command Line Interface Example AP(if-wireless g)#wpa-mode pre-shared-key AP(if-wireless g)# Related Commands wpa-clients (page 7-116) wpa-preshared-key (page 7-118) wpa-preshared-key This command defines a Wi-Fi Protected Access (WPA) preshared-key. Syntax wpa-preshared-key <type> <value> • type - Input format. (Options: ASCII, HEX) • value - The key string. For ASCII input, use 5/13 alphanumeric characters for 64/128 bit strings.
Command Line Interface shutdown This command disables the wireless interface. Use the no form to restart the interface. Syntax shutdown no shutdown Default Setting Interface enabled Command Mode Interface Configuration (Wireless) Example AP(if-wireless a)#shutdown AP(if-wireless a)# show interface wireless This command displays the status for the wireless interface. Syntax show interface wireless <a | g>...
Example AP#show interface wireless a Wireless Interface Information ========================================================= ----------------Identification----------------------------- Description Outdoor Bridge/AP Service Type SSID Turbo Mode Channel Status ----------------802.11 Parameters-------------------------- Transmit Power Max Station Data Rate Fragmentation Threshold RTS Threshold Beacon Interval DTIM Interval Maximum Association ----------------Security----------------------------------- Encryption AES Key type ========================================================= show station...
Command Line Interface Example AP#show station Station Table Information =========================================================== 802.11a Channel : 56 No 802.11a Channel Stations. 802.11g Channel : 11 802.11g Channel Station Table Station Address Authenticated Associated TRUE Counters:pkts Time:Associated 143854 =========================================================== IAPP Commands The command described in this section enables the protocol signaling required to ensure the successful handover of wireless clients roaming between different 802.11f-compliant access points.
Default Enabled Command Mode Global Configuration Command Usage The current 802.11 standard does not specify the signaling required between access points in order to support clients roaming from one access point to another. In particular, this can create a problem for clients roaming between access points from different vendors.
Command Line Interface Note: Before enabling VLANs on the the connected LAN switch port to accept tagged VLAN packets with the to the wireless bridge feature. The VLAN commands supported by the wireless bridge are listed below. Command vlan native-vlanid vlan This command enables VLANs for all traffic.
Example AP(config)#vlan enable Reboot system now? <y/n>: y Related Commands native-vlanid (page 7-125) native-vlanid This command configures the native VLAN ID for the wireless bridge. Syntax native-vlanid <vlan-id> vlan-id - Native VLAN ID. (Range: 1-64) Default Setting Command Mode Global Configuration Command Usage When VLANs are enabled, the wireless bridge tags traffic passing to the wired network with the configured native VLAN...
Troubleshooting Check the following items before you contact local Technical Support. 1. If wireless bridge units do not associate with each other, check the following: • Check the power injector LED for each bridge unit to be sure that power is being supplied •...
Page 298
Troubleshooting 3. If the wireless bridge cannot be configured using Telnet, a web browser, or SNMP software: • Be sure to have configured the wireless bridge with a valid IP address, subnet mask and default gateway. • Check that you have a valid network connection to the wireless bridge and that the Ethernet port or the wireless interface has not been disabled.
Network Management Web-browser, Telnet, SNMP Temperature Operating: -33 to 55 °C (-27.4 to 131 °F) Storage: -40 to 80 °C (-40 to 176 °F) Humidity 5% to 95% (non-condensing) EMC Compliance (Class B) FCC Class B (US) RTTED 1999/5/EC DGT (Taiwan) Radio Signal Certification FCC Part 15 15.407(b) (5 GHz) FCC Part 15.247 (2.4 GHz)
Specifications Antenna Specifications 17 dBi Integrated Panel Frequency Range 5.150 - 5.850 GHz Gain 17 dBi VSWR 1.8 : 1 max Polarization Linear, vertical/horizontal HPBW Horizontal: 20° Vertical: 22° Front-to-Back Ratio >25 dB Power Handling 10 W (cw) Impedance 50 Ohms Connector SMA female...
Cables and Pinouts Twisted-Pair Cable Assignments For 10/100BASE-TX connections, a twisted-pair cable must have two pairs of wires. Each wire pair is identified by two different colors. For example, one wire might be green and the other, green with white stripes. Also, an RJ-45 connector must be attached to both ends of the cable.
Cables and Pinouts 10/100BASE-TX Pin Assignments Use unshielded twisted-pair (UTP) or shielded twisted-pair (STP) cable for RJ-45 connections: 100-ohm Category 3 or better cable for 10 Mbps connections, or 100-ohm Category 5 or better cable for 100 Mbps connections. Also be sure that the length of any twisted-pair connection does not exceed 100 meters (328 feet).
Straight-Through Wiring Because the 10/100 Mbps Input port on the power injector uses an MDI pin configuration, you must use “straight-through” cable for network connections to hubs or switches that only have MDI-X ports. However, if the device to which you are connecting supports automatic MDI/MDI-X operation, you can use either “straight-through”...
Cables and Pinouts End A 8-Pin DIN Connector Pinout The Ethernet cable from the power injector connects to an 8-pin DIN connector on the wireless bridge. This connector is described in the following figure and table. 8-Pin DIN Ethernet Port Pinout Signal Name Transmit Data plus (TD+) Transmit Data minus (TD-)
8-Pin DIN Ethernet Port Pinout Signal Name +48 VDC power Receive Data minus (RD-) Return power Return power Note: The “+” and “-” signs represent the polarity of the wires that make up each wire pair. 8-Pin DIN to RJ-45 Cable Wiring To construct an extended Ethernet cable to connect from the power injector’s RJ-45 Output port to the wireless bridge’s 8-pin DIN connector, follow the wiring diagram below.
10BASE-T IEEE 802.3 specification for 10 Mbps Ethernet over two pairs of Category 3 or better UTP cable. 100BASE-TX IEEE 802.3u specification for 100 Mbps Fast Ethernet over two pairs of Category 5 or better UTP cable. Access Point An internetworking device that seamlessly connects wired and wireless networks.
Page 312
Glossary Basic Service Set (BSS) A set of 802.11-compliant stations and an access point that operate as a fully-connected wireless network. Beacon A signal periodically transmitted from the access point that is used to identify the service set, and to maintain contact with wireless clients.
Page 313
File Transfer Protocol (FTP) A TCP/IP protocol used for file transfer. Hypertext Transfer Protocol (HTTP) HTTP is a standard used to transmit and receive all data over the World Wide Web. Internet Control Message Protocol (ICMP) A network layer protocol that reports errors in processing IP packets.
Page 314
Glossary Open System A security option which broadcasts a beacon signal including the access point’s configured SSID. Wireless clients can read the SSID from the beacon, and automatically reset their SSID to allow immediate connection to the nearest access point. Orthogonal Frequency Division Multiplexing (ODFM) OFDM/ allows multiple users to transmit in an allocated band by dividing the bandwidth into many narrow bandwidth carriers.
Page 315
Simple Network Time Protocol (SNTP) SNTP allows a device to set its internal clock based on periodic updates from a Network Time Protocol (NTP) server. Updates can be requested from a specific NTP server, or can be received via broadcasts sent by NTP servers. Trivial File Transfer Protocol (TFTP) A TCP/IP protocol commonly used for software downloads.