US Robotics Instant802 APSDK Administrator's Manual

Professional access point
Table of Contents

Advertisement

Quick Links

Professional Access Point

Administrator Guide
R46.1224.00
rev 2.0 07/06

Advertisement

Table of Contents
loading

Summary of Contents for US Robotics Instant802 APSDK

  • Page 1: Professional Access Point

    Professional Access Point Administrator Guide R46.1224.00 rev 2.0 07/06...
  • Page 3 LICENSE. If you are unable to locate a copy, please contact USRobotics and a copy will be provided to you.
  • Page 4 Professional Access Point Administrator Guide...
  • Page 5: Table Of Contents

    Contents About This Document ........ix Getting Started Overview .
  • Page 6 Events ............. . . 79 Transmit/Receive Statistics .
  • Page 7 CE Compliance ............295 U.S.
  • Page 8 Professional Access Point Administrator Guide viii...
  • Page 9: About This Document

    Professional Access Point Administrator Guide About This Document This guide describes setup, configuration, administration and maintenance of one or more Professional Access Points on a wireless network. Administrator Audience This information is intended for the person responsible for installing, configuring, monitoring, and maintaining the Professional Access Point as part of a small-to-medium business information technology infrastructure.
  • Page 10: Typographical Conventions

    Recommended Settings, Notes and Cautions An arrow next to field description information indicates a recommended or suggested configuration setting for an option on the A Note provides more information about a feature or technology and cross-references to related topics. A Caution provides information about critical aspects of access point configuration, combinations of set- tings, events, or procedures that can adversely affect network connectivity, security, and so on.
  • Page 11: Getting Started

    Getting Started This part of the Professional Access Point Administrator Guide provides the information that you need to establish a network by performing basic installation for one or more Professional Access Points: • Overview • Pre-Launch Checklist: Default Settings and Supported Administrator/Client Platforms •...
  • Page 12: Features And Benefits

    • Maintainability • What’s Next? Features and Benefits IEEE Standards Support and Wi-Fi Compliance • Support for IEEE 802.11b and IEEE • Provides bandwidth of up to 11 Mbps for IEEE • Wi-Fi compliance required for certification Wireless Features • Auto channel selection at startup •...
  • Page 13 • Wi-Fi Protected Access 2 (WPA2/802.11i) • Advanced Encryption Standard (AES) • User-based access control, local user database, and user life-cycle management with built-in RADIUS authentication server • WPA/WPA2 Enterprise • MAC address filtering Guest Interface • Captive portal to guide guests to customized, guest-only Web page •...
  • Page 14: What's Next

    SNMP v1 and v2 MIBs • IEEE802.11 MIB • Four USRobotics proprietary MIBs support product, system, channel, and wireless system statistics. Maintainability • Status, monitoring, and tracking views of the network including session monitoring, client associations, transmit/receive statistics, and event log •...
  • Page 15: Pre-Launch Checklist: Default Settings And Supported Administrator

    Pre-Launch Checklist: Default Settings and Supported Administrator/Client Platforms Before you plug in and boot a new client configuration requirements and for compatibility issues. Make sure that you have everything you need for a successful launch and test of your new or extended wireless network. •...
  • Page 16 Default Settings for the Professional Access Point Option Default Settings System Name USR5453-AP User Name admin The user name is read-only. It cannot be modi- fied. Password admin Network Name (SSID) USR5453 Internal Network nal interface USR5453 Guest Network interface Network Time Protocol (NTP) None IP Address...
  • Page 17 Option Default Settings Radio IEEE 802.11 Mode 802.11g 802.11g Channel Auto Beacon Interval DTIM Period Fragmentation Threshold 2346 Regulatory Domain RTS Threshold 2347 MAX Stations 2007 Transmit Power 100 percent Rate Sets Supported (Mbps) • IEEE 802.11g: 54, 48, 36, 24, 18, 12, 11, 9, 6, 5.5, 2, 1 •...
  • Page 18: Administrator's Computer

    Web Browser / Operating Configuration and administration of the Professional Access Point is provided System through a Web-based user interface hosted on the access point. USRobotics rec- ommends using one of the following supported Web browsers to access the Web User Interface: •...
  • Page 19: Wireless Client Computers

    Required Software or Description Component Detection Utility Wizard on You can run the Installation CD-ROM on any Windows laptop or computer that is CD-ROM connected to the access point via wired or wireless connection. It detects Profes- sional Access Points on the network. The wizard steps you through initial configura- tion of new access points, and provides a link to the Web User Interface where you finish the basic setup process in a step-by-step mode and launch the network.
  • Page 20: Understanding Dynamic And Static Ip Addressing On The Professional Access Point

    Required Component Description Client Security Settings Security should be disabled on the client used to do initial configuration of the access point. If the Security mode on the access point is set to anything other than None, wire- less clients will need to set a profile to the authentication mode used by the access point and provide a valid user name and password, certificate, or similar user iden- tity proof.
  • Page 21: Static Ip Addressing

    Static IP. You can either assign a new Static IP address to the access point or continue using the default address. USRobotics recommends assigning a new Static IP address so that if later you bring up another Professional Access Point on the same network, the IP address for each access point will be unique.
  • Page 22 Professional Access Point Administrator Guide Pre-Launch Checklist: Default Settings and Supported Administrator/Client Platforms - 22...
  • Page 23: Setting Up And Launching Your Wireless Network

    An access point is a single-purpose device designed to function as a wireless hub. Inside the access point is a Wi-Fi radio system, a microprocessor, and a mini-PC card. The access point boots from FlashROM that contains USRobotics firmware with the configurable, runtime features summarized in “Overview” on page 11.
  • Page 24: Step 2. Connect The Access Point To Network And Power

    It is possible to detect access points on the network (using the Detection Utility) with a wireless con- nection. However, USRobotics strongly advises against using this method. In your environment you may have no way of knowing whether you are connecting to the intended access point, and the initial configuration changes required may cause you to lose connectivity with the access point over a wire- less connection.
  • Page 25: A Note About Setting Up Connections For A Guest Network

    Figure 1. Ethernet Connections When Using DHCP for Initial Configuration. Switch Figure 2. Ethernet Connections When Using Static IP Address for Initial Configuration. Professional Access Point 2. Connect the power adapter to the power port on the back of the access point, and then plug the other end of the power adapter into a power outlet (preferably, via a surge protector).
  • Page 26: Step 3. Run The Detection Utility To Find Access Points On The Network

    Points. The Detection Utility scans the network looking for access points, and displays ID details on those it finds. • Keep in mind that the Detection Utility recognizes and configures only USRobotics Professional Access Points. The Detection Utility will not find any other devices. •...
  • Page 27 Professional Access Point Administrator Guide program to access your network. If network access is blocked, the Detection Utility cannot find your access point. The Detection Utility Welcome screen is displayed. Next 2. Click to search for access points. Wait for the search to complete, or until the Detection Utility has found your new access points.
  • Page 28 Professional Access Point Administrator Guide If no access points are found, the Detection Utility indicates this and presents troubleshooting informa- tion about your LAN and power connections. Once you have checked hardware power and Ethernet connections, you can click the Detection Utility Back button to search again for access points.
  • Page 29 Professional Access Point Administrator Guide Click Next. 4. Go to the Access Point Web User Interface by clicking the link provided on the Detection Utility page. Setting Up and Launching Your Wireless Network - 29...
  • Page 30: Step 4. Log On To The Web User Interface

    The Detection Utility provides a link to the Web User Interface via the IP address of the first Professional Access Point.The Web User Interface is a management tool that you can access via the IP address for any access point in a cluster. (For more information about clustering see “Understanding Clustering”...
  • Page 31: Step 5. Configure Basic Settings And Start The Wireless Network

    Step 5. Configure Basic Settings and start the wireless network Provide a minimal set of configuration information by defining the basic settings for your wireless network. These settings are all available on the Basic Settings page of the Web User Interface, and are categorized into steps 1-4 on the Web page.
  • Page 32: Default Configuration

    Provide a new administrator password for clustered access points. For more information, see “Provide Administrator Password and Wireless Network Name” on page 38. 3. Set Configuration Policy for New Access Points. Choose to configure new access points automatically (as new members of the cluster) or ignore new access points.
  • Page 33: Wall Mounting The Access Point

    Professional Access Point Administrator Guide Wall Mounting the Access Point The access point has keyhole openings for easy wall mounting. To expose the openings, remove the pads from the rear feet. You can then mount the access point to the wall with two anchored screws, as shown in the following illustration: What’s Next? Next, make sure the access point is connected to the LAN, bring up your wireless clients, and connect the...
  • Page 34: Test Lan Connectivity With Wireless Clients

    Professional Access Point Administrator Guide Test LAN Connectivity with Wireless Clients Test the Professional Access Point by trying to detect it and associate with it from a wireless client device. (See “Wireless Client Computers” on page 19 in the Pre-Launch Checklist: Default Settings and Supported Administrator/Client Platforms for information on requirements for these clients.) Secure and Fine-Tune the Access Point Using Advanced Features Once the wireless network is operational and has been tested with a wireless client, you can add more...
  • Page 35: Web User Interface

    Web User Interface This part of the Professional Access Point Administrator Guide covers usage of the Web User Interface with each section corresponding to a menu section: • “Basic Settings” on page 35 • “Cluster” on page 43 • “Status” on page 77 •...
  • Page 36: Navigating To Basic Settings

    Professional Access Point Administrator Guide Navigating to Basic Settings To configure initial settings, click Basic Settings. If you use the Detection Utility to link to the Web User Interface, the Basic Settings page is displayed by default. Fill in the fields on the Basic Settings page as described below. Basic Settings - 36...
  • Page 37: Review / Describe The Access Point

    Review / Describe the Access Point Field IP Address MAC Address Firmware Version Location Description The IP address assigned to this access point. This field is not editable because the IP address is already assigned (either via DHCP, or statically through the Ethernet (wired) settings as described in “Configuring Guest Interface Ethernet (Wired) Settings”...
  • Page 38: Provide Administrator Password And Wireless Network Name

    Provide Administrator Password and Wireless Network Name Field Administrator Password Administrator Password (again) Wireless Network Name (SSID) The Professional Access Point is not designed for multiple, simultaneous configuration changes. If more than one administrator is making changes to the configuration at the same time, all access points in the cluster will stay synchronized, but there is no guarantee that all changes specified by all of the administrators will be applied.
  • Page 39: Set Configuration Policy For New Access Points

    Set Configuration Policy for New Access Points Field New Access Points Description Choose the policy that you want to put in effect for adding the network. • If you choose are configured automatically, then when a new access point is added to the network it automatically joins the existing cluster. The cluster configuration is copied to the new access point, and no manual configura- tion is required to deploy it.
  • Page 40: Update Basic Settings

    Professional Access Point Administrator Guide Update Basic Settings When you have reviewed the new configuration, click Update to apply the settings and deploy the access points as a wireless network. Summary of Settings When you update the Basic Settings, a summary of the new settings is shown along with information about next steps.
  • Page 41: Basic Settings For A Standalone Access Point

    At this point if you click Basic Settings again, the summary of settings page is replaced by the standard Basic Settings configuration options. Basic Settings for a Standalone Access Point The Basic Settings page for a standalone access point indicates that the mode is standalone and provides a link for adding the access point to a cluster (group).
  • Page 42 Professional Access Point Administrator Guide Basic Settings - 42...
  • Page 43: Cluster

    Cluster This section covers the Web User Interface Cluster items: • “Access Points” on page 43 • “User Management” on page 53 • “Sessions” on page 59 • “Channel Management” on page 63 • “Wireless Neighborhood” on page 71 Access Points The Professional Access Point shows current basic configuration settings for clustered access points (location, IP address, MAC address, status, and availability) and provides a way of navigating to the full configuration for specific APs if they are cluster members.
  • Page 44: Navigating To Access Points Management

    • Cluster Size and Membership • Intra-Cluster Security • Auto-Synchronization of Cluster Configuration • Understanding Access Point Settings • Modifying the Location Description • Removing an Access Point from the Cluster • Adding an Access Point to a Cluster • Navigating to the Web User Interface for a Specific Access Point Navigating to Access Points Management To view or edit information on access points in a cluster, click the Cluster menu’s...
  • Page 45: Which Settings Are Shared As Part Of The Cluster Configuration And Which Are Not

    participate in a self-organizing cluster which makes it easier for you to deploy, administer, and secure your wireless network. The cluster provides a single point of administration and lets you view the deployment of access points as a single wireless network rather than a series of separate wireless devices. What is a Cluster? A cluster is a group of access points which are coordinated as a single group via Professional Access Point administration.
  • Page 46 • Radio settings The following radio settings are synchronized across clusters: • Mode • Channel Channel Planning When See “Stopping/Starting Automatic Channel Assignment” on page 66. • Fragmentation Threshold • RTS Threshold • Rate Sets The following radio settings are not synchronized across clusters: •...
  • Page 47: Cluster Mode

    point. To access the Web User Interface for an access point that is a member of the current cluster, click the Cluster menu’s Access Points tab in the Web User Interface of the current access point, then click the IP Address member access point’s Cluster Mode When an access point is a cluster member, it is considered to be in cluster mode.
  • Page 48: Cluster Size And Membership

    Professional Access Point Administrator Guide Cluster Size and Membership The upper limit of a cluster is eight access points. The Cluster Web User Interface pages provide a visual indicator of the number of access points in the current cluster and warn when the cluster has reached capacity.
  • Page 49: Modifying The Location Description

    The following table describes the access point settings and information display in detail. Field Description Location Description of the access point’s physical location. MAC Address Media Access Control (MAC) address of the access point. A MAC address is a permanent, unique hardware address for any device that repre- sents an interface to the network.
  • Page 50: Adding An Access Point To A Cluster

    Adding an Access Point to a Cluster To add a standalone access point into a cluster, do the following. 1. Go to the Web User Interface for the standalone access point. (See “Navigating to an Access Point by Using its IP Address in a URL” on page 50.) The Web User Interface pages for the standalone access point are displayed.
  • Page 51 Professional Access Point Administrator Guide For a standalone access point, this is the only way to navigate to the configuration information. If you do not know the IP address for a standalone access point, use the Detection Utility to find all APs on the network and you should be able to derive which ones are standalone by comparing the Detection Utility findings with access points listed on the Cluster menu’s Access Points page.
  • Page 52 Professional Access Point Administrator Guide Access Points - 52...
  • Page 53: User Management

    User Management The Professional Access Point includes user management capabilities for controlling access to your access points. User management and authentication must always be used in conjunction with the following two security modes, which require use of a RADIUS • IEEE 802.1x mode (see “IEEE 802.1x”...
  • Page 54: Navigating To User Management For Clustered Access Points

    Navigating to User Management for Clustered Access Points To set up or modify user accounts, click the Cluster Menu’s Viewing User Accounts User accounts are shown at the top of the screen under (enabled or disabled) are shown. Adding a User To create a new user, do the following: Add a User, 1.
  • Page 55: Editing A User Account

    Field Description Real Name For information purposes, provide the user’s full name. Real name is a maximum of 256 characters long. Password Specify a password for this user. The password is an alphanumeric string of up to 256 characters. Do not use special characters or spaces.
  • Page 56: Disabling A User Account

    A user with an account that is enabled can log on to the wireless access points in your network. Disabling a User Account To disable a user account, select the check box next to the user name and click Disable. A user with an account that is disabled cannot log on to the wireless access points in your network.
  • Page 57 Professional Access Point Administrator Guide 3. Click the Restore button. When the backup restore process is complete, a message indicates that the user database has been successfully restored. (This process is not time-consuming; the restore should complete almost imme- diately.) Click the Cluster menu’s User Management tab to see the restored user accounts.
  • Page 58 Professional Access Point Administrator Guide User Management - 58...
  • Page 59: Sessions

    Sessions The Professional Access Point provides real-time session monitoring information including which users and clients are associated with a particular access point, data rates, transmit/receive statistics, signal strength, and idle time. The following Session Monitoring topics are covered here: • Navigating to Session Monitoring •...
  • Page 60: Understanding Session Monitoring Information

    Understanding Session Monitoring Information The Sessions page shows information about users and client devices associated with access points in the cluster. Each session is identified by user name and client (location) to which the client is connected. To view a particular statistic for a session, select the item from the Idle Time, Data Rate, Signal, Utilization, and so on;...
  • Page 61: Viewing Session Information For Access Points

    Field Signal Utilization Rx Total Tx Total Error Rate Viewing Session Information for Access Points You can view session information for all access points on the network at the same time, or you can set the display to show session information for a specified access point chosen from the list at the top of the page. To view information on all access points, select To view session information on a particular access point, select access point name from the list.
  • Page 62 Professional Access Point Administrator Guide Sessions - 62...
  • Page 63: Channel Management

    Channel Management The following Channel Management topics are covered here: • Navigating to Channel Management • Understanding Channel Management • How it Works: Overview • Overlapping Channels: Background Information • Example: A Network before and after Channel Management • Configuring and Viewing Channel Management Settings •...
  • Page 64: Navigating To Channel Management

    Professional Access Point Administrator Guide Navigating to Channel Management To view session monitoring information, click the Cluster menu’s Channel Management tab. Understanding Channel Management When Channel Management is enabled, the Professional Access Point automatically assigns radio channels used by clustered access points to reduce interference with access points both within and outside of its cluster.
  • Page 65: Configuring And Viewing Channel Management Settings

    Interference can occur when multiple access points within range of each other are broadcasting on the same or overlapping channels. The impact of this interference on network performance can intensify during busy times when large amounts of data and media traffic compete for bandwidth. Channel management uses a predetermined set of channels that minimizes interference.
  • Page 66 access points. By default, automatic channel assignment is disabled. You can start channel management to optimise channel usage across the cluster on a scheduled interval. From this page, you can view channel assignments for all APs in the cluster, stop and start automatic channel management, and manually update the current channel map (APs to channels).
  • Page 67: Viewing Current Channel Assignments And Setting Locks

    Viewing Current Channel Assignments and Setting Locks Current Channel Assignments show a list of all access points in the cluster by IP Address. The display shows the band on which each access point is broadcasting, the channel currently used by each access point, and an option to lock an access point on its current radio channel so that it cannot be reassigned to another.
  • Page 68 to implement channel management. Advanced You can use settings to modify the interference reduction potential that triggers channel reassignment, change the schedule for automatic updates, and reconfigure the channel set used for assignments Field Advanced Change channels if interference is reduced by at least Determine if there is better set of channels every Use these channels when applying channel assignments Administrator Guide...
  • Page 69 Field Apply channel modifications even when the network is busy Update Advanced Settings Click Update under Advanced settings to apply these settings. Advanced settings take affect when they are applied, and they influence how automatic channel management is performed. The new interference reduction minimum, scheduled tuning interval, channel set, and network busy settings will be taken into account for automated and manual updates.
  • Page 70 Professional Access Point Administrator Guide Channel Management - 70...
  • Page 71: Wireless Neighborhood

    Wireless Neighborhood The Wireless Neighborhood view shows those access points within range of any access point in the cluster. This page provides a detailed view of neighbouring access points including identifying information such as SSIDs and MAC addresses for each, cluster status, and statistical information such as the broadcast channel and signal strength of each AP.
  • Page 72: Navigating To Wireless Neighborhood

    Navigating to Wireless Neighborhood To view the Wireless Neighborhood, click the Cluster menu’s Figure 5. Neighbour APs Both in Cluster and Not in Cluster. Understanding Wireless Neighbourhood Information The Wireless Neighborhood view shows all access points within range of every member of the cluster, shows which access points are within range of which cluster members, and distinguishes between cluster members and non-members.
  • Page 73: Viewing Wireless Neighborhood

    • Detect faults. Unexpected changes in the coverage pattern are evident at a glance in the colour coded table. Viewing Wireless Neighborhood Details about Wireless Neighborhood information shown is described below. Field Display neighboring APs Cluster Description Click one of the following radio buttons to change the view: In cluster •...
  • Page 74 Field Description Neighbors Access points that are neighbours of one or more of the clustered APs are listed in the left column by SSID (Network Name). An access point which is detected as a neighbour of a cluster member can also be a cluster member itself.
  • Page 75: Viewing Details For A Cluster Member

    Professional Access Point Administrator Guide Viewing Details for a Cluster Member To view details on a cluster member AP, click the IP address of a cluster member at the top of the table. Figure 6. Details for a Cluster Member AP. Wireless Neighborhood - 75...
  • Page 76 The following table explains the details shown about the selected AP. Field SSID MAC Address Channel Rate Signal Beacon Interval Beacon Age Description Shows the Service Set Identifier (SSID) for the access point. The SSID is an alphanumeric string of up to 32 characters that uniquely identi- fies a wireless local area network.
  • Page 77: Status

    Status You can view information about an individual access point from the Status menu. Because the Status pages display settings for a specific access point—not for a cluster configuration that is automatically shared by multiple access points—it is important to ensure that you are accessing the Web User Interface for the access point that you want to monitor (see “Navigating to the Web User Interface for a Specific Access Point”...
  • Page 78 This page displays the current Ethernet (Wired) Settings Ethernet (Wired) Settings The Internal interface includes the Ethernet The Guest interface includes the MAC Address, If you want to change any of these settings, click the Wireless Settings The Radio Interface settings include radio Mode and Channel. Also shown here are network names for internal and guest interfaces.
  • Page 79: Events

    Events To view system events and kernel log for a particular access point, navigate to the Status menu’s tab on the Web User Interface for the access point that you want to monitor This page lists the most recent events generated by this access point (see “Events Log” on page 82). This page also gives you the option of enabling a remote log relay host to capture all system events and errors in a Kernel Log.
  • Page 80: Understanding Remote Logging

    • Enabling and Disabling the Log Relay Host on the Status Menu’s Events Page Understanding Remote Logging The kernel log is a comprehensive list of system events (shown in the System Log) and kernel messages, such as an error message for dropping frames. You cannot view kernel log messages directly from the Web User Interface for an access point.
  • Page 81 4. Restart the syslog server by typing the following at the command line prompt: /etc/init.d/sysklogd restart The syslog process will default to use port 514. USRobotics recommends using this default port. However, if you choose to reconfigure the log port, make sure that the port number that you assign to syslog is not being used by another process.
  • Page 82: Transmit/Receive Statistics

    Professional Access Point Administrator Guide Events Log The Events Log shows system events on the access point such as stations associating or being authenticated. The real-time Events Log is always shown on the Status menu’s Events page for the access point you are monitoring.
  • Page 83: Client Associations

    This page provides basic information about the current access point and a real-time display of the transmit and receive statistics for this access point as described in the table below. All transmit and receive statistics shown are totals accumulated since the access point was last started. If the access point is rebooted, these figures indicate transmit/receive totals since the reboot.
  • Page 84: Link Integrity Monitoring

    Professional Access Point Administrator Guide The associated stations are displayed along with information about packet traffic transmitted and received for each station. Link Integrity Monitoring The Professional Access Point provides link integrity monitoring to continually verify the access point’s connection to each associated client, even when no data exchange is occurring. To perform this verification, the access point sends data packets to clients every few seconds when no other traffic is passing.
  • Page 85: Neighboring Access Points

    Professional Access Point Administrator Guide Neighboring Access Points The status page for neighbouring access points provides real-time statistics for all access points within range of the access point on which you are viewing the Web User Interface. To view information about other access points on the wireless network, Neighboring Access Points 1.
  • Page 86 Information provided for neighbouring access points is described in the following table: Field MAC Address Beacon Int. Type SSID Privacy Band Description Shows the address of the neighbouring access point. address is a hardware address that uniquely identifies each node of a network.
  • Page 87 Field Description Channel Shows the channel on which the access point is currently broadcasting. transmitting and receiving. The channel is set on the Advanced menu’s Radio Settings page. (See “Radio” on page 129.) Signal Indicates the strength of the radio signal emitting from this access point as measured in decibels (Db).
  • Page 88 Professional Access Point Administrator Guide Neighboring Access Points - 88...
  • Page 89: Advanced

    Advanced Advanced Settings include the following: • “Ethernet (Wired) Settings” on page 89 • “Wireless Settings” on page 97 • “Security” on page 101 • “Guest Login” on page 121 • “Virtual Wireless Networks” on page 125 • “Radio” on page 129 •...
  • Page 90 • Navigating to Ethernet (Wired) Settings • Setting the DNS Name • Managing Guest Access • Configuring an Internal LAN and a Guest Network • Enabling and Disabling Guest Access • Specifying a Virtual Guest Network • Enabling and Disabling Virtual Wireless Networks on the Access Point •...
  • Page 91: Setting The Dns Name

    Setting the DNS Name Field DNS Name Managing Guest Access You can provide controlled guest access over an isolated network and a secure internal Professional Access Point by using VLANs. You can also configure an access point for guest access only, without maintaining a separate secure LAN.
  • Page 92: Specifying A Virtual Guest Network

    Access on the Ethernet (Wired) Settings tab. Field Guest Access Specifying a Virtual Guest Network If you enable Guest Access, you must represent both an Internal and a Guest Network on this access point virtually, by connecting the LAN port on the access point to a tagged port on a VLAN-capable switch and then defining two different virtual LANs on the Ethernet (Wired) Settings page.
  • Page 93: Configuring Internal Interface Ethernet Settings

    page 125. Field Virtual Wireless Networks (Using VLANs on Ethernet Port) Configuring Internal Interface Ethernet Settings To configure Ethernet (Wired) settings for the Internal LAN, fill in the fields as described below. Field Description MAC Address Shows the access point. This is a read-only field. VLAN ID If you choose to configure Internal and Guest networks by VLANs, this field is ena- bled.
  • Page 94 Static IP Address, Subnet DHCP server on the Internal network and do not plan Static IP Address USRobotics Subnet Mask in the text boxes. You must obtain this information from your Default Gateway in the text boxes. 66.93.138.219 ). A DNS server is called a Nameserver.
  • Page 95: Updating Settings

    Configuring Guest Interface Ethernet (Wired) Settings To configure Ethernet (Wired) Settings for the Guest interface, fill in the fields as described below. Field Description MAC Address Shows the point. This is a read-only field. VLAN ID If you choose to configure Internal and Guest networks by VLANs, this field will be enabled.
  • Page 96 Professional Access Point Administrator Guide Ethernet (Wired) Settings - 96...
  • Page 97: Wireless Settings

    Wireless Settings Wireless settings describe aspects of the local area network (LAN) related specifically to the radio device in the access point (802.11 Mode and Channel) and to the network interface to the access point address for access point and wireless network name, also known as SSID). The following sections describe how to configure the wireless address and related settings on the Professional Access Point: •...
  • Page 98 Configuring 802.11d Regulatory Domain Support You can enable or disable IEEE 802.11d country code information as described below. Field 802.11d Regulatory Domain Support Regulatory Domain Support to broadcast the access point Description Enabling support for IEEE 802.11d on the access point causes the access point to broadcast which country it is operating in as a part of its beacons: •...
  • Page 99: Configuring The Radio Interface

    Configuring the Radio Interface The radio interface allows you to set the radio Field Mode Channel Configuring Internal LAN Wireless Settings Internal Settings describe the internal Wireless LAN (WLAN) as described below. Field MAC Address Wireless Network Name (SSID) Channel 802.11 mode as described below.
  • Page 100: Configuring Guest Network Wireless Settings

    Configuring Guest Network Wireless Settings Guest Settings describe the Network as described below. Configuring an access point with two different network names (SSIDs) allows you to implement the Guest interface feature on the Professional Access Point. For more information, see “Guest Login”...
  • Page 101: Security

    How Do I Know Which Security Mode to Use? In general, USRobotics recommends that on your Internal network you use the most robust security mode that is feasible in your environment. When configuring security on the access point, you first must choose the security mode.
  • Page 102 Wi-Fi Protected Access (WPA) with Remote Authentication Dial-In User Service (RADIUS) using the CCMP (AES) encryption algorithm provides the best data protection available and is clearly the best choice if all client devices are equipped with WPA supplicants. However, backward compatibility or interoperability issues with clients or even with other access points may require that you configure WPA with RADIUS with a different encryption algorithm or choose one of the other security modes.
  • Page 103 For information on how to configure this mode, see “None” on page 108 under “Configuring Security Settings”. When to Use Static WEP Static Wired Equivalent Privacy (WEP) is a data encryption protocol for 802.11 wireless networks. All wireless stations and access points on the network are configured with a static 64-bit (40-bit secret key + 24-bit initialization vector (IV)) or 128-bit (104-bit secret key + 24-bit IV) Shared Key for data encryption.
  • Page 104 Key Management IEEE 802.1x provides dynamically- generated keys that are periodically refreshed. There are different Unicast keys for each station. ECOMMENDATIONS IEEE 802.1x mode is a better choice than Static WEP because keys are dynamically generated and changed periodically. However, the encryption algorithm used is the same as that of Static WEP and is therefore not as reliable as the more advanced encryption methods such as in Wi-Fi Protected Access (WPA) or WPA2.
  • Page 105 RADIUS server. Embedded printer servers or other small client devices with very limited space for implementation may not support RADIUS. For such cases, USRobotics recommends that you use WPA/ WPA2 Personal (PSK). For information on how to configure this security mode, see “WPA/WPA2 Personal (PSK)” on page 115.
  • Page 106: How Does Station Isolation Protect The Network

    1. The best security you can have to-date on a wireless network is WPA/WPA2 Enterprise (RADIUS) mode using CCMP (AES) encryption algorithm. AES is a symmetric 128-bit block data encryption technique that works on multiple layers of the network. It is the most effective encryption system currently available for wireless networks.
  • Page 107: Navigating To Security Settings

    Professional Access Point Administrator Guide Navigating to Security Settings To set the security mode, click the Advanced menu’s Security tab, and update the fields as described below. Configuring Security Settings The following configuration information explains how to configure security modes on the access point. Keep in mind that each wireless client that wants to exchange data with the access point must be configured with the same security mode and encryption key settings consistent with access point security.
  • Page 108: Static Wep

    Isolation as extra precautions as mentioned below. Field Broadcast SSID Station Isolation Security Mode None None means that any data transferred to and from the Professional Access Point is not encrypted. There are no further options for this mode.Running without security can be useful during initial network configuration or for problem solving, but it is not recommended for regular use on the Internal network because it is not secure.
  • Page 109 Professional Access Point Administrator Guide tialization vector (IV)) or 128-bit (104-bit secret key + 24-bit IV) Shared Key for data encryption. You cannot mix 64-bit and 128-bit WEP keys between the access point and its clients. None Static WEP is not the most secure mode available, but it offers more protection than as it does pre- vent an outsider from easily sniffing out unencrypted wireless traffic.
  • Page 110 Field Description Transfer Key Index Select a key index. Key indexes 1 through 4 are available. The default is 1. The transfer key index indicates which WEP key the access point will use to encrypt the data it transmits. Key Length Specify one of the following lengths for the key: •...
  • Page 111 Field Description Authentication Algorithm The authentication algorithm defines the method used to determine whether a client is allowed to associate with an access point when static WEP is the security mode. Specify the authentication algorithm you want to use by choosing one of the follow- ing: •...
  • Page 112 Professional Access Point Administrator Guide Example of Using Static WEP For a simple example, suppose that you configure three WEP keys on the access point. In this example, the Transfer Key Index for the access point is set to 3. This means that the WEP key in slot 3 is the key that the access point will use to encrypt the data it sends.
  • Page 113 Professional Access Point Administrator Guide Figure 8. Providing a Wireless Client with a WEP Key If you have a second client, that client also needs to have one of the WEP keys defined on the access point. You could give it the same WEP key that you gave to the first station. Or, for a more secure solution, you could give the second station a different WEP key (key 2, for example) so that the two stations cannot decrypt each other’s transmissions.
  • Page 114 Figure 9. Example of Using Multiple WEP Keys and Transfer Key Index on Client Devices Access Point transmits to both stations with WEP key 3 IEEE 802.1x IEEE 802.1x is the standard that defines port-based authentication and provides a framework for implementing key management.
  • Page 115 Field Description Authentication Server Select one of the following: • Built-in—To use the authentication server provided with the Professional Access Point. If you choose this option, you do not have to provide the Radius IP and Radius Key; they are automatically provided. •...
  • Page 116 (AES)—Counter mode/CBC-MAC Protocol (CCMP) is an encryption method for 802.11i that uses the Advanced Encryption Algorithm (AES). It uses a CCM Administrator Guide WPA, but none support the newer USRobotics suggests using WPA2, standard. WPA2 and others which sup- Security - 116...
  • Page 117 WPA2 for clients who support it. This WPA configuration allows more interoperability, at the expense of some security. 802.11i standard, which includes Advanced Encryption Security Mode, you must provide the following: USRobotics IEEE 802.11i Administrator Guide WPA, but none support the newer suggests using WPA2, standard.
  • Page 118 Field Description Enable pre-authentication If for WPA Versions WPA2 Click tication packet. The pre-authentication information will be relayed from the access point the client is currently using to the target access point. Enabling this feature can help speed up authentication for roaming clients who connect to multiple access points.
  • Page 119 Field Description Radius IP Enter the Radius IP. The Radius IP is the IP address of the (The Professional Access Point internal authentication server is For information on setting up user accounts, see “User Management” on page 53. Radius Key Enter the Radius Key.
  • Page 120 Professional Access Point Administrator Guide Security - 120...
  • Page 121: Guest Login

    Guest Login The Professional Access Point’s Guest Interface features allow you to configure the access point for controlled guest access to an isolated network. You can configure the access point for guest access only, or you can configure it to broadcast and function as two different wireless networks: a secure Internal LAN and a public Guest network.
  • Page 122 If you want to configure the Guest and Internal networks on Virtual LAN (VLANs), the switch and DHCP server you are using must support VLANs. As a prerequisite step, configure a port on the switch for handling VLAN tagged packets as described in the IEEE 802.1Q standard.
  • Page 123 Configuring the Welcome Screen (Captive Portal) You can set up or modify the Welcome screen that guest clients see when they open a Web browser or try to browse the Web. To set up the captive portal, do the following. 1.
  • Page 124 Professional Access Point Administrator Guide 2. The guest network advertises itself via a Guest SSID or a similar name, depending on how the guest SSID is specified in the Web User Interface for the Guest interface. 3. The guest chooses Guest SSID. 4.
  • Page 125: Virtual Wireless Networks

    Virtual Wireless Networks The following sections describe how to configure multiple wireless networks on Virtual LANs (VLANs): • Navigating to Virtual Wireless Network Settings • Configuring VLANs • Updating Settings Navigating to Virtual Wireless Network Settings To set up multiple networks on VLANs, click the Advanced menu’s the fields as described below.
  • Page 126: Configuring Vlans

    Configuring VLANs • To configure additional networks on VLANs, you must first enable Virtual Wireless Networks on the Ethernet (Wired) interface. See “Enabling and Disabling Virtual Wireless Networks on the Access Point” on page 92. • If you configure VLANs, you may lose connectivity to the access point. First, be sure to verify that the switch and DHCP server you are using can support VLANs per the...
  • Page 127 Field Broadcast SSID Security Mode Updating Settings To apply your changes, click Update. Description Select the Broadcast SSID setting by clicking the "Allow" or "Prohibit" radio but- ton. By default, the access point broadcasts (allows) the Service Set Identifier (SSID) in its beacon frames. You can suppress (prohibit) this broadcast to discourage stations from auto- matically discovering your access point.
  • Page 128 Professional Access Point Administrator Guide Virtual Wireless Networks - 128...
  • Page 129: Radio

    Radio The following sections describe how to configure Radio Settings on the Professional Access Point: • Understanding Radio Settings • Navigating to Radio Settings • Configuring Radio Settings • Updating Settings Understanding Radio Settings Radio settings directly control the behaviour of the radio device in the access point and its interaction with the physical medium, that is, how and what type of electromagnetic waves the access point emits.
  • Page 130: Navigating To Radio Settings

    Navigating to Radio Settings To specify radio settings, click the Advanced menu’s Configuring Radio Settings Field Status (On/Off) Radio tab, and update the fields as described below. Description Specify whether you want the radio on or off by clicking Administrator Guide or Off.
  • Page 131 Field Description Mode The Mode defines the Physical Layer (PHY) standard being used by the radio. Select one of these modes: • IEEE 802.11b • Super G Enabling Super G provides better performance by increasing radio throughput for a radio mode. Keep in mind that with Super G enabled the access point transmissions will consume more bandwidth.
  • Page 132 Maximum Stations Enter a value within the range 0–2007. Specify the maximum number of stations allowed to access this access point at any one time. USRobotics recommends not using fragmen- RTS Threshold value within the range 0–2347. Administrator Guide...
  • Page 133 Provide a percentage value to set the transmit power for this access point. The default is to have the access point transmit using 100 percent of its power. Recommendations: USRobotics • For most cases, recommends using the default and having the transmit power set to 100 percent.
  • Page 134 Professional Access Point Administrator Guide Radio - 134...
  • Page 135: Mac Filtering

    MAC Filtering A Media Access Control (MAC) address is a hardware address that uniquely identifies each node of a network. All IEEE 802 network devices share a common 48-bit MAC address format, usually displayed as a string of 12 hexadecimal digits separated by colons, for example FE:DC:BA:09:87:65. Each wireless network interface card (NIC) used by a wireless client has a unique MAC address.
  • Page 136: Using Mac Filtering

    Using MAC Filtering This page allows you to control access to Professional Access Point based on Media Access Control (MAC) addresses. You can choose to allow access by listed MAC addresses or prevent access by listed MAC addresses. For the Guest interface, Filtering settings apply to both BSSes.
  • Page 137 Field Stations List Updating Settings To apply your changes, click Update. Description To add a MAC Address to the Stations List, type the 48-bit MAC address into the lower text boxes, then click Add. The MAC Address is added to the Stations List. To remove a MAC Address from the Stations List, select its 48-bit MAC address, then click Remove.
  • Page 138 Professional Access Point Administrator Guide MAC Filtering - 138...
  • Page 139: Load Balancing

    Load Balancing The Professional Access Point allows you to balance the distribution of wireless client connections across multiple access points. Using load balancing, you can prevent the performance degradation that results when a single access point handles a disproportionate share of the wireless traffic. The following sections describe how to configure Load Balancing on your wireless network: •...
  • Page 140: Navigating To Load Balancing Settings

    Professional Access Point Administrator Guide Load Balancing and QoS Load balancing contributes to Quality of Service (QoS) for Voice Over IP (VoIP) and other such time- sensitive applications competing for bandwidth and timely access to the air waves on a wireless network. For more information about configuring your network for QoS, see “Quality of Service”...
  • Page 141 Utilization for Disassociation Theoretically, the maximum number of clients allowed is 2007. USRobotics recommends setting the maximum to between 30 and 50 clients . This allows for a workable load on the access point, given that bandwidth is shared among the access point clients.
  • Page 142 Professional Access Point Administrator Guide Updating Settings To apply your changes, click Update Settings. Load Balancing - 142...
  • Page 143: Quality Of Service

    Quality of Service Quality of Service (QoS) provides you with the ability to specify parameters on multiple queues for increased throughput and better performance of differentiated wireless traffic like Voice-over-IP (VoIP); other types of audio, video, and streaming media; and traditional IP data. The following sections describe how to configure Quality of Service queues on the Professional Access Point: •...
  • Page 144: Qos Queues And Parameters To Coordinate Traffic Flow

    Professional Access Point Administrator Guide IEEE 802.11e task group is in the process of defining a QoS standard for transmission quality and availability of service on wireless networks. QoS is designed to provide better network service by minimizing network congestion; limiting Jitter, Latency, and Packet Loss;...
  • Page 145 is automatically sent to this queue. Data 1 (Video). High priority queue, minimum delay. Time-sensitive data such as Video and other • streaming media are automatically sent to this queue. • Data 2 (Best Effort). Medium priority queue, medium throughput and delay. Most traditional IP data is sent to this queue.
  • Page 146 802.11e uses interframe spaces to regulate which frames get access to available channels and to coordinate wait times for transmission of different types of data. Management and control frames wait a minimum amount of time for transmission: they wait a short interframe space (SIF).
  • Page 147: Configuring Qos Queues

    Professional Access Point Administrator Guide Packet Bursting for Better Performance The Professional Access Point includes 802.11e based packet bursting technology that increases data throughput and speed of transmission over the wireless network. Packet bursting enables the transmission of multiple packets without the extra overhead of header information. The effect of this is to increase network speed and data throughput.
  • Page 148: Configuring Ap Edca Parameters

    transmission behaviour on the access point only, not to that of the client stations. • For the Guest interface, QoS queue settings apply to the access point load as a whole (both BSSes together). • Internal and Guest network traffic is always queued together. Configuring Quality of Service includes: •...
  • Page 149 Field cwMin (Minimum Contention Window) cwMax (Maximum Contention Window) Max. Burst (Maximum Burst Length) Enabling/Disabling Wi-Fi Multimedia By default, Wi-Fi MultiMedia (WMM) is enabled on the access point. With WMM enabled, QoS prioritisation and coordination of wireless medium access is on. With WMM enabled, QoS settings on the Professional Access Point control downstream traffic flowing from the access point to client station (access point EDCA parameters) and the upstream traffic flowing from the station to the access point (station EDCA parameters).
  • Page 150: Configuring Station Edca Parameters

    point to the client station (access point EDCA parameters). To disable WMM extensions, click Disabled. • To enable WMM extensions, click Enabled. • Configuring Station EDCA Parameters Station Enhanced Distributed Channel Access (EDCA) Parameters affect traffic flowing from the client station to the access point.
  • Page 151 Field cwMin (Minimum Contention Window) cwMax (Maximum Contention Window) TXOP Limit (Transmission Opportunity Limit) Updating Settings To apply your changes, click Update. Description This parameter is input to the algorithm that determines the initial random backoff wait time (window) for retry of a transmission. The value specified here in the Minimum Contention Window is the upper limit (in milliseconds) of a range from which the initial random backoff wait time is determined.
  • Page 152 Professional Access Point Administrator Guide Quality of Service - 152...
  • Page 153: Wireless Distribution System

    Wireless Distribution System The Professional Access Point lets you connect multiple access points using a Wireless Distribution System (WDS). WDS allows access points to communicate with one another wirelessly in a standardized way. This capability is critical to providing a seamless experience for roaming clients and for managing multiple wireless networks.
  • Page 154 and West Wing access points with a WDS link to create a single network for clients in both areas. Client Station Client Station "West Wing" AP LAN Segment 2 Using WDS to Extend the Network Beyond the Wired Coverage Area can extend the reach of the network into areas where cabling would be difficult, costly, or inefficient.
  • Page 155: Navigating To Wds Settings

    WDS link (bridge). When WEP is enabled, all data exchanged between the two access points in a WDS link is encrypted using a fixed WEP key that you provide. USRobotics recommends using Static WEP for your WDS link and the highest level of security available for the individual client networks that you are bridging.
  • Page 156: Configuring Wds Settings

    Professional Access Point Administrator Guide Configuring WDS Settings The following notes summarize critical guidelines regarding configuration. Please read all the notes Wireless Distribution System - 156...
  • Page 157 before proceeding with WDS configuration. • When using WDS, be sure to configure WDS settings on both access points participating in the WDS link. • You can have only one WDS link between any pair of access points. That is, a remote MAC address may appear only once on the WDS page for a particular access point.
  • Page 158: Example Of Configuring A Wds Link

    Field Key Length Key Type Characters Required WEP Key Example of Configuring a WDS Link When using WDS, be sure to configure WDS settings on both access points on the WDS link. For example, to create a WDS link between the pair of access points MyAP1 and MyAP2 do the following: 1.
  • Page 159 The MAC address for MyAP1 (the access point you are currently viewing) will appear as the Address at the top of the page. 3. Configure a WDS interface for data exchange with MyAP2. Start by entering the MAC address for MyAP2 as the specify the network (guest or internal), security, and so on.
  • Page 160 Professional Access Point Administrator Guide Wireless Distribution System - 160...
  • Page 161: Time Protocol

    Time Protocol The Network Time Protocol (NTP) is an Internet standard protocol that synchronizes computer clock times on your network. NTP servers transmit Coordinated Universal Time (UTC, also known as Greenwich Mean Time) to their client systems. NTP sends periodic time requests to servers, using the returned time stamp to adjust its clock.
  • Page 162 Professional Access Point Administrator Guide Enabling and Disabling a Network Time Protocol (NTP) Server To configure your access point to use a network time protocol (NTP) server, first enable the use of NTP, and then select the NTP server you want to use. (To shut down NTP service on the network, disable NTP on the access point.
  • Page 163 Field Network Time Protocol (NTP) NTP Server Updating Settings To apply your changes, click Update. Description NTP provides a way for the access point to obtain and maintain its time from a server on the network. Using an NTP server gives your access point the ability to provide the correct time of day in log messages and session information.
  • Page 164 Professional Access Point Administrator Guide Time Protocol - 164...
  • Page 165: Snmp

    SNMP The Simple Network Management Protocol (SNMP) is an Internet standard protocol that facilitates the monitoring and managing of network devices. SNMP lets you monitor events on your network through an SNMP software application. The following sections describe how to configure SNMP on your network: •...
  • Page 166 Professional Access Point Administrator Guide For more information about SNMP, visit http://www.snmplink.org. Navigating to Simple Network Management Protocol SNMP To enable SNMP, click the Advanced menu’s tab and update the fields as described below. Enabling and Disabling Simple Network Management Protocol (SNMP) To configure your access point to use Simple Network Management Protocol (SNMP) server, first enable the SNMP option that you want to use, and then provide the name of the community or host that can use...
  • Page 167 the option. Field Enable SNMP Read-only Community Name (entire MIB) Allow SNMP SET Requests Read-write community name (for per- mitted SETs) Designate source of permitted SNMP requests Description SNMP provides a way for the access point to store management information and to provide the information to a network-management system (NMS).
  • Page 168 In order to access the USRobotics proprietary MIBs, you need to import the MIBs into your network management system. You can find the MIB files in the Mib folder on the USRobotics CD-ROM. Refer to your network management system for instructions on importing and compiling MIBs.
  • Page 169 Rebooting Your Access Point Using SNMP. Name USR5453SystemReboot Module USR5453-SYSTEM-MIB 1.3.6.1.4.1.9086.3.2.1 Base Syntax OCTET STRING Description Setting this object to 1 will cause the access point to reboot. Upgrading your Access Point Name USR5453SystemUpgrade Module USR5453-SYSTEM-MIB 1.3.6.1.4.1.9086.3.2.2 Base Syntax OCTET STRING Description Setting this object to a name of a file causes the device to download the file from the path speci- fied.
  • Page 170 Professional Access Point Administrator Guide SNMP - 170...
  • Page 171: Reboot

    Reboot For maintenance purposes or as a troubleshooting measure, you can reboot the Professional Access Point as follows. 1. Click the Advanced menu’s Reboot Reboot 2. Click the button. The access point reboots. If the IP address of the access point changes after the reboot, you need to specify the new address in your Web browser in order to access the Web User Interface.
  • Page 172: Upgrade

    2. Click the Reset button. Factory defaults are restored.If the IP address of the access point changes after the reset, you need to specify the new address in your Web browser in order to access the Web User Interface. Keep in mind that if you do reset the configuration from this page, you are doing so for this access point only;...
  • Page 173 firmware on your devices to take advantages of new features and enhancements. Do not upgrade the firmware from a wireless client that is associated with the access point you are upgrading. Doing so will cause the upgrade to fail. Furthermore, all wireless clients will be disassoci- ated and no new associations will be allowed.
  • Page 174: Backup/Restore

    Information about the current firmware version is displayed and an option to upgrade a new firmware image is provided. New Firmware Image 2. If you know the path to the button and locate the firmware image file. 3. Click Update to apply the new firmware image.
  • Page 175 Backing up Configuration Setting for an Access Point To save a copy of the current settings on an access point to a backup configuration file (.cbk format): download configuration 1. Click the A File Download or Open dialogue is displayed. Save 2.
  • Page 176 1. Select the backup configuration file you want to use, either by typing the full path and file name in the Restore field or by clicking Browse, selecting the file, and clicking Open. (Only those files that were created with the Backup function and saved as .cbk backup configuration files are valid to use with Restore;...
  • Page 177: Command Line Interface

    Command Line Interface In addition to the Web-based user interface, the Professional Access Point includes a command line interface (CLI) for administering the access point. The CLI lets you view and modify status and configuration information. From the client station perspective, even a single deployed Professional Access Point broadcasting its "network name"...
  • Page 178: Comparison Of Settings Configurable With The Cli And Web User Interface

    • Access Point and Cluster Settings • User Accounts • Status • Ethernet (Wired) Interface • Wireless Interface • Security • Enable/Configure Guest Login Welcome Page • Configuring Multiple BSSIDs on Virtual Wireless Networks • Radio Settings • MAC Filtering •...
  • Page 179 Feature or Setting Basic Settings • Getting/changing Administrator Password • Getting/changing access point name and location • Viewing information like MAC, IP address, and Firmware version Access Point and Cluster Settings User Accounts User Database Backup and Restore Sessions Channel Management Wireless Neighborhood Status Configurable from CLI...
  • Page 180 Feature or Setting Ethernet (Wired) Interface Wireless Interface Security Set Up Guest Access Enable/Configure Guest Login Welcome Page Configuring Multiple BSSIDs on Virtual Wire- less Networks Radio Settings MAC Filtering Load Balancing Quality of Service Wireless Distribution System Time Protocol Reboot the Access Point Reset the Access Point to Factory Defaults Upgrade the Firmware...
  • Page 181: How To Access The Cli For An Access Point

    How to Access the CLI for an Access Point Use one of the following methods to access the command line interface (CLI) for the access point or wireless network: • Telnet Connection to the Access Point • SSH2 Connection to the Access Point Telnet Connection to the Access Point If you already have your network deployed and know the IP address of your access point, you can use a remote Telnet connection to the access point to view the system console over the network.
  • Page 182 status: Telnet Function Get the current Telnet status Enable Telnet acess Disable Telnet access Generate a new pair of SSH keys Any change that you make to the access point configuration through the command line interface remains in effect for the current session. To save your changes across sessions, use the save-running command SSH2 Connection to the Access Point If you already have your network deployed and know the IP address of your access point, you can use a...
  • Page 183 1. Start your SSH application. (This example uses PuTTY.) 2. Enter the IP address of the access point and click Open. (If your Domain Name Server is configured to map domain names to IP addresses via DHCP, you can enter the domain name of the access point instead of an IP address.) This brings up the SSH command window and establishes a connection to the access point.
  • Page 184: Quick View Of Commands And How To Get Help

    status: SSH Function Get the current SSH status Enable SSH acess Disable SSH access Any change that you make to the access point configuration through the command line interface remains in effect for the current session. To save your changes across sessions, use the save-running command Quick View of Commands and How to Get Help •...
  • Page 185 Command Description The "get" command allows you to get the field values of existing instances of a class. Classes can be "named" or "unnamed". The command syntax is: get unnamed-class [ field ... | detail ] get named-class [ instance | all [ field ... | name | detail ] ] The rest of the command line is optional.
  • Page 186 Command Description The "set" command allows you to set the field values of existing instances of a class. set unnamed-class [ with qualifier-field qualifier-value ... to ] field value . . . The first argument is an unnamed class in the configuration. After this is an optional qualifier that restricts the set to only some instances.
  • Page 187 Command Description remove The "remove" command allows you to remove an existing instance of a class. remove unnamed-class [ field value . . . ] remove named-class instance | all [ field value . . .] For example: remove radius-user wally The CLI also includes the following commands for maintenance tasks: save-running save-running...
  • Page 188: Command Usage And Configuration Examples

    cluster Clustering-based configuration settings cluster-member Member of a cluster of like-configured access points config Configuration settings detected-ap Detected access point dhcp-client DHCP client settings dot11 IEEE 802.11 host Internet host settings interface Network interface ip-route IP route entry klog-entry Kernel log entry Log settings log-entry Log entry...
  • Page 189 Professional Access Point Administrator Guide “Ethernet (Wired) Interface” on page 207 “Wireless Interface” on page 213 “Security” on page 213 “Enable/Configure Guest Login Welcome Page” on page 228 “Configuring Multiple BSSIDs on Virtual Wireless Networks” on page 229 “Radio Settings” on page 230 “MAC Filtering”...
  • Page 190 Understanding Interfaces as Presented in the CLI The following summary of interface names is provided to help clarify the related CLI commands and output results. These names are not exposed on the Web User Interface, but are used throughout the CLI. You get and set many configuration values on the access point by referring to interfaces.
  • Page 191: Saving Configuration Changes

    Interface Description A wireless distribution system (WDS) interface where "x" indicates the number of wlan0wds the WDS link. (For example, vlanxxxx A VLAN interface for VLAN ID (Internal, Guest, VWN1 or VWN2), use the following command to look at the " field: get interface vlanVLANID role For example:...
  • Page 192 Basic Settings Before configuring this feature, make sure you are familiar with the names of the interfaces as described in “Understanding Interfaces as Presented in the CLI” on page reference in a command determines whether a setting applies to a wired or wireless interface, or to the Internal or Guest network.
  • Page 193 Basic Setting Set the Wireless Network Name (SSID) Get the IP Address for the Internal Interface on an Access Point In the following example, the IP address for the access point is: 10.10.55.216. Use the shown to obtain the IP address for the Internal network. USR5453-AP# get interface br0 ip 10.10.55.216 Get the MAC Address for an Access Point...
  • Page 194 wlan0wds1 wlan0wds2 wlan0wds3 USR5453-AP# down down down Class Structure, Commands, and Examples - 194 Administrator Guide...
  • Page 195 Get the Firmware Version for the Access Point In the following example, the access point is running Firmware Version: 1.0.0.9. Use the shown to obtain the Firmware Version. USR5453-AP# get system version 1.0.0.9 Get the Location of the Access Point In the following example, the location of the access point has not been set.
  • Page 196: User Accounts

    Access Point and Cluster Settings The command examples in this section show how to get the configuration for a cluster of access points. These settings generally correspond to those on the Cluster menu’s Access Points tab in the Web User Interface.
  • Page 197 This table shows a quick view of User Management commands and provides links to detailed examples. User Account Command Get All User Accounts Add Users To set the user’s real name: To set user’s password: Enable a user account Disable a user account Remove a User Account The user account requires a value for the abled,...
  • Page 198 name username disabled ------------------------------------------------------------ larry larry (At the start, "larry" is the only user configured.) Add Users In this example, you will add four new users: (1) samantha, (2) endora, (3) darren, and (4) wally. You will set up user names, real names, and passwords for each. 1.
  • Page 199 Remove a User Account To remove a user account, type the following USR5453-AP# remove radius-user wally Use the "get" command to view all user names. (You can see "wally" has been removed.) USR5453-AP# get radius-user all name name -------- larry samantha endora darren...
  • Page 200 Status Command Get the Network Name (SSID) for the Wired Internal Interface Get the Current IEEE 802.11 Radio Mode Get the Channel the Access Point is Cur- rently Using Get Basic Radio Settings for the Internal Interface Get Status on Events Enable Remote Logging and Specify the Log Relay Host for the Kernel Log Get Transmit / Receive Statistics...
  • Page 201 Field Value -------------------- 00:a0:c9:8c:c4:7e 192.168.1.1 mask 255.255.255.0 Get the MAC Address for the Wired Internal Interface USR5453-AP# get interface wlan0 mac 02:0C:41:00:02:00 Get the Network Name (SSID) for the Wired Internal Interface USR5453-AP# get interface wlan0 ssid elliot_AP Get Current Settings for the Ethernet (Wired) Guest Interface The following example shows how to use the CLI to get the Ethernet (Wired) settings for the Guest interface for an access point.
  • Page 202 ------------------------------ status max-bsses channel-policy channel static-channel mode fragmentation-threshold rts-threshold ap-detection beacon-interval Get All Radio Settings on the Internal Interface USR5453-AP# get radio wlan0 detail Field ---------------------------------------------------- status description max-bss channel-policy mode static-channel channel tx-power tx-rx-status beacon-interval rts-threshold fragmentation-threshold load-balance-disassociation-utilization load-balance-disassociation-stations load-balance-no-association-utilization ap-detection station-isolation...
  • Page 203 Lease of 10.10.55.216 obtained, lease time 300 Enable Remote Logging and Specify the Log Relay Host for the Kernel Log The Kernel Log is a comprehensive list of system even its and kernel messages such as error conditions like dropping frames. To capture Access Point Kernel Log messages you need access to a remote syslog server on the network.
  • Page 204 USR5453-AP# set log relay-enabled 0 Specify the Relay Host To specify the Relay Host, provide either the "set log relay-host" command as shown below. parameters to the If you are using Instant802 Conductor, the Repository Server should receive the syslog messages from all access points.
  • Page 205 From the above output for the "get log" command, you can identify the following about the Log Relay Host (syslog server): • The syslog server is enabled (because "relay-enabled" is set to "1") • The syslog server is at the IP address 10.10.5.220 •...
  • Page 206 To see the kinds of information about access point neighbours you can search on, type get detected-ap TAB TAB. USR5453-AP# get detected-ap [Enter] * Get common fields * band Frequency band beacon-interval Beacon interval in kus (1.024 ms) capability IEEE 802.11 capability value channel Channel detail...
  • Page 207 ----------------------------------------- 00:e0:b8:76:28:c0 type privacy ssid domani channel signal Ethernet (Wired) Interface Before configuring this feature, make sure you are familiar with the names of the interfaces as described in “Understanding Interfaces as Presented in the CLI” on page reference in a command determines whether a setting applies to a wired or wireless interface or to the Internal or Guest network.
  • Page 208 Wired Interface Command Set DNS Nameservers to Use Static IP Addresses (Dynamic to Manual Mode) Set DNS Nameservers to Use DHCP IP Addressing (Manual to Dynamic Mode) Get Summary View of Internal and Guest Interfaces USR5453-AP# get bss name status -------------------------------------------------------------------- wlan0bssInternal wlan0bssGuest...
  • Page 209 interfaces as described in “Understanding Interfaces as Presented in the CLI” on page After you configure the Guest Network (as described in the sections below), you can enable a "captive portal" Welcome page for guest clients who are using the Web over your Guest network. You can mod- ify the Welcome page text that is displayed to guests when they log on to the Web.
  • Page 210 name status -------------------------------------------------------------------- wlan0bssInternal wlan0bssGuest USR5453-AP# get interface brguest Field Value ------------------------- type bridge status 00:01:02:03:04:02 10.10.56.248 mask 255.255.255.0 Disable Guest Access on VLANs This example assumes you start with Guest Access "enabled" on VLANs and provides commands to disable it. 1.
  • Page 211 Change VLAN IDs (VLANs Must Be Enabled Already) 1. Check the current configuration of Wired interfaces. The output of the following command shows that the Guest interface is already configured on VLANs: USR5453-AP# get bridge-port br0 Name Interface --------------- wlan0guest vlan1111 2.
  • Page 212 Re-Configure Static IP Addressing Values This section assumes you have already set the access point to use Static IP Addressing and set some initial values as described in “Get/Change the Connection Type (DHCP or Static IP)” on page If you are using static IP addressing on the access point (instead of DHCP), you may want to reconfigure the static IP address, subnet mask, default gateway, or DNS name servers.
  • Page 213 2. Turn off Dynamic DNS Nameservers and re-check the settings: USR5453-AP# set host dns-via-dhcp down USR5453-AP# get host dns-via-dhcp down 3. Get the current IP addresses for the DNS Nameservers: USR5453-AP# get host static-dns-1 10.10.3.9 USR5453-AP# get host static-dns-2 10.10.3.11 4.
  • Page 214 access point. These settings correspond to those available in the Web User Interface on the Advanced menu’s Security tab. For a detailed discussion of concepts and configuration options, page 101. This section focuses on configuring security on the Internal network. (Security on the Guest network defaults to None.
  • Page 215 radius-ip radius-key open-system-authentication shared-key-authentication wpa-cipher-tkip wpa-cipher-ccmp wpa-allowed wpa2-allowed rsn-preauthentication Set the Broadcast SSID (Allow or Prohibit) To set the Broadcast SSID to on (allow): USR5453-AP# set bss wlan0bssInternal ignore-broadcast-ssid on To set the Broadcast SSID to off (prohibit): USR5453-AP# set bss wlan0bssInternal ignore-broadcast-ssid off Enable / Disable Station Isolation USR5453-AP# get radio wlan0 station-isolation USR5453-AP# set radio wlan0 station-isolation off...
  • Page 216 Set Security to None USR5453-AP# set interface wlan0 security none Set Security to Static WEP 1. Set the Security Mode 2. Set the Transfer Key Index 3. Set the Key Length 4. Set the Key Type 5. Set the WEP Keys 6.
  • Page 217 In this example, you will set the Key Type to ASCII: USR5453-AP# set interface wlan0 wep-key-ascii yes 5. Set the WEP Keys The number of characters required for each WEP key depends on how you set Key Length and Key Type: •...
  • Page 218 Security. USR5453-AP# get bss wlan0bssInternal detail Field --------------------------------------------- status description radio beacon-interface dtim-period max-stations ignore-broadcast-ssid mac-acl-mode mac-acl-name radius-accounting radius-ip radius-key open-system-authentication shared-key-authentication wpa-cipher-tkip wpa-cipher-ccmp wpa-allowed wpa2-allowed rsn-preauthentication The following command gets details on the interface and shows the WEP Key settings, specifically. USR5453-AP# get interface wlan0 detail Field Value...
  • Page 219 tx-compressed ssid Vicky’s AP wlan0bssInternal security static-wep wpa-personal-key wep-key-ascii wep-key-length wep-default-key wep-key-1 abcde wep-key-2 fghij wep-key-3 klmno wep-key-4 vlan-interface vlan-id radio remote-mac wep-key Set Security to IEEE 802.1x 1. Set the Security Mode 2. Set the Authentication Server 3. Set the RADIUS Key (For External RADIUS Server Only) 4.
  • Page 220 authentication server the RADIUS key is automatically provided.) This command sets the RADIUS key to secret for an external RADIUS server. USR5453-AP# set bss wlan0bssInternal radius-key secret 4. Enable RADIUS Accounting (External RADIUS Server Only) You can enable RADIUS Accounting if you want to track and measure the resources a particular user has consumed such system time, amount of data transmitted and received, and so on.
  • Page 221 wpa-cipher-tkip wpa-cipher-ccmp wpa-allowed wpa2-allowed rsn-preauthentication Set Security to WPA/WPA2 Personal (PSK) 1. Set the Security Mode 2. Set the WPA Versions 3. Set the Cipher Suites 4. Set the Pre-shared Key 5. Get Current Security Settings After Re-Configuring to WPA/WPA2 Personal (PSK) 1.
  • Page 222 USR5453-AP# set bss wlan0bssInternal wpa-allowed on USR5453-AP# set bss wlan0bssInternal wpa2-allowed on 3. Set the Cipher Suites Set the cipher suite you want to use. The options are: Cipher Suite Option Example TKIP: Temporal Key Integrity set bss wlan0bssInternal wpa-cipher-tkip on Protocol (TKIP), which is the default.
  • Page 223 Shared secret keys can include spaces and special characters if the key is placed inside quotation marks as in the first example above. If the key is a string of characters with no spaces or special char- acters in it, the quotation marks are not necessary as in the second example above.. 5.
  • Page 224 8. Get Current Security Settings After Re-Configuring to WPA/WPA2 Enterprise (RADIUS) 1. Set the Security Mode USR5453-AP# set interface wlan0 security wpa-enterprise 2. Set the WPA Versions Select the WPA version based on what types of client stations you want to support. WPA Option Example WPA:...
  • Page 225 3. Enable Pre-Authentication If you set WPA versions to "WPA2" or "Both", you can enable pre-authentication for WPA2 clients. Enable pre-authentication if you want WPA2 wireless clients to send pre-authen- tication packet. The pre-authentication information will be relayed from the access point the client is currently using to the target access point.
  • Page 226 Cipher Suite Option Example Both - When the authentication set bss wlan0bssInternal wpa-cipher-tkip on algorithm is set to "Both", both TKIP and AES clients can asso- set bss wlan0bssInternal wpa-cipher-ccmp on ciate with the access point. WPA clients must have either a valid TKIP key or a valid CCMP (AES) key to be able to associ- ate with the AP.
  • Page 227 consumed such system time, amount of data transmitted and received, and so on. RADIUS accounting is not supported by the built-in server, so if you are using the built-in server make sure that RADIUS accounting is off. To enable RADIUS accounting: set bss wlan0bssInternal radius-accounting on To disable RADIUS accounting: set bss wlan0bssInternal radius-accounting off...
  • Page 228 Enable/Configure Guest Login Welcome Page Guest Welcome Option Example View Guest Login Settings: get portal Enable/Disable the Guest set portal status Welcome Page Set Guest Welcome Page set portal welcome-screen-text "Welcome Screen Text" Textl: Where " want displayed on the Guest Welcome Web Page. The Welcome message must be in quotes if it contains spaces, punctuation, and special characters."...
  • Page 229 Review Guest Login Settings The following example shows the results of the "set portal" command after specifying some new settings: USR5453-AP# get portal Field Value ----------------------------------------------------- status welcome-screen welcome-screen-text Welcome to the Stephens Network Configuring Multiple BSSIDs on Virtual Wireless Networks Before configuring this feature, make sure you are familiar with the names of the interfaces as described in “Understanding Interfaces as Presented in the CLI”...
  • Page 230: Radio Settings

    Creating VWN 'Two' on Radio One with WPA security To configure the second Virtual Wireless Network, repeat steps 1-3 as described above (in Configuring Virtual Wireless Network "One" on Radio One) with the following differences: • Create a second VLAN ID from the Web User Interface with a new SSID •...
  • Page 231 (The radio in this example is using IEEE 802.11g mode.) Get Radio Channel To get the current setting for radio Channel: USR5453-AP# get radio wlan0 channel (The radio in this example is on Channel 6.) Get Basic Radio Settings To get basic current Radio settings: USR5453-AP# get radio wlan0 Field Value...
  • Page 232 Get Supported Rate Set The Supported Rate Set is what the access point supports. The access point will automatically choose the most efficient rate based on factors like error rates and distance of client stations from the access point. USR5453-AP# get supported-rate name rate -----------...
  • Page 233 1. Turn the Radio On or Off To turn the radio on: set radio wlan0 status up To turn the radio off: set radio wlan0 status down 2. Set the Radio Mode Valid values depend on the capabilities of the radio. Possible values and how you would use the CLI to set each one are shown below.
  • Page 234 (2,346 bytes) effectively disables fragmentation. The following command sets the fragmentation threshold to 2000. USR5453-AP# set radio wlan0 fragmentation-threshold 2000 7. Set the RTS Threshold You can specify an RTS Threshold value between 0 and 2347. The RTS threshold specifies the packet size of a request to send (RTS) transmission.
  • Page 235 USR5453-AP# get supported-rate wlan0 rate ---- You can use the "get" command to view current rate sets from the CLI as described in Rate Set” on page 232 “Get Basic Rate Set” on page ported Rate Sets or Basic Rate Sets from the CLI. You must use the Advanced menu’s Radio page on the Web User Interface to configure this feature.
  • Page 236 Specify an Accept or Deny List To set up MAC filtering, you first need to specify which type of list you want to configure, and assign a name to the list. To set up an Accept list: With this type of list, client stations whose MAC addresses are listed will be allowed access to the access point.
  • Page 237 USR5453-AP# add mac-acl Internal mac 00:01:02:03:04:05 USR5453-AP# add mac-acl Internal mac 00:01:02:03:04:06 USR5453-AP# add mac-acl Internal mac 00:01:02:03:04:07 USR5453-AP# add mac-acl Internal mac 00:01:02:03:04:08 Remove MAC Address of a Client Station from the Filtering List To remove a MAC address from the list: remove mac-acl list_name mac MAC_Address_Of_Client Where list_name is the name of a MAC filtering list and MAC_Address_Of_Client is the MAC address of a wireless client that you want to remove from the MAC filtering list.
  • Page 238 Load Balancing Before configuring this feature, make sure you are familiar with the names of the interfaces as described in “Understanding Interfaces as Presented in the CLI” on page reference in a command determines whether a setting applies to a wired or wireless interface or to the Internal or Guest network.
  • Page 239 QoS Command About Access Point and Station EDCA Parameters Understanding the Queues for Access Point and Station Distinguishing between Access Point and Station Settings in QoS Commands Get QoS Settings on the Access Point Get QoS Settings on the Client Station Set Arbirtation Interframe Spaces (AIFS) Setting Minimum and Maximum Conten- tion Windows (cwmin, cwmax)
  • Page 240 the station to the access point. With WMM disabled, you can still set downstream access-point-to-station QoS parameters but no station-to-access-point QoS parameters. • To disable WMM: USR5453-AP# set radio wlan0 wme off USR5453-AP# get radio wlan0 wme • To enable WMM: USR5453-AP# set radio wlan0 wme on USR5453-AP# get radio wlan0 wme About Access Point and Station EDCA Parameters...
  • Page 241 Get QoS Settings on the Access Point To view the current QoS settings and queue names for access-point-to-station parameters: USR5453-AP# get tx-queue name queue aifs cwmin --------------------------------------- wlan0 data0 wlan0 data1 wlan0 data2 wlan0 data3 Get QoS Settings on the Client Station To view the current QoS settings queue names for station-to-access-point parameters: USR5453-AP# get wme-queue name...
  • Page 242 Set AIFS on the Client Station To set the AIFS on station-to-access-point traffic: set wme-queue wlan0 with queue Queue_Name to aifs AIFS_Value Where Queue_Name is the queue on the station to which you want the setting to apply and AIFS_Value is the wait time value you want to specify for AIFS.
  • Page 243 USR5453-AP# set tx-queue wlan0 with queue data1 cwmin 15 cwmax 31 View the results of this configuration update (bold in the command output highlights the modified values): USR5453-AP# get tx-queue name queue aifs cwmin --------------------------------------- wlan0 data0 wlan0 data1 wlan0 data2 wlan0 data3...
  • Page 244 USR5453-AP# set tx-queue wlan0 with queue data2 to burst 0.5 View the results of this configuration update (bold in the command output highlights the modified value): USR5453-AP# get tx-queue name queue aifs cwmin --------------------------------------- wlan0 data0 wlan0 data1 wlan0 data2 wlan0 data3 Set Transmission Opportunity Limit (txop-limit) for WMM client stations...
  • Page 245 Wireless Distribution System Before configuring this feature, make sure you are familiar with the names of the interfaces as described in “Understanding Interfaces as Presented in the CLI” on page reference in a command determines whether a setting applies to a wired or wireless interface or to the Internal or Guest network.
  • Page 246 For example, this command sets the NTP server by host name to " set ntp server ntp.instant802.com 3. Get Current Time Protocol Settings USR5453-AP# get ntp detail Administrator Guide the NTP server you want to use. (USRobotics recom- ntp.instant802.com" Class Structure, Commands, and Examples - 246...
  • Page 247: Keyboard Shortcuts And Tab Completion Help

    Field Value -------------------------- status server ntp.instant802.com Reboot the Access Point To reboot the access point, simply type "reboot" at the command line: USR5453-AP# reboot Reset the Access Point to Factory Defaults If you are experiencing extreme problems with the Professional Access Point and have tried all other troubleshooting measures, you can reset the access point.
  • Page 248: Keyboard Shortcuts

    Keyboard Shortcuts Action on CLI Move cursor to the beginning of the current line Move cursor to the end of the current line Move cursor back on the current line, one character at a time Move the cursor forward on the current line, one character at a time Start over at a blank command prompt (abandons the input on the current line) Remove one character on the current line.
  • Page 249 • Example 1: At a blank command line, hit TAB twice to get a list of all commands. USR5453-AP# Add an instance to the running configuration factory-reset Reset the system to factory defaults Get field values of the running configuration reboot Reboot the system remove...
  • Page 250: Cli Class And Field Overview

    dhcp-client DHCP client settings dot11 IEEE 802.11 host Internet host settings interface Network interface ip-route IP route entry Log settings mac-acl MAC address access list item Network Time Protocol client portal Guest captive portal radio Radio radius-user RADIUS user SSH access to the command line interface system System settings telnet...
  • Page 251 and Field Reference” on page 25–253. Configuration information for the Professional Access Point is represented as a set of classes and objects. Different kinds of information uses different classes. For example, information about a network interface is represented by the "interface" class, while information about an NTP client is represented by the "ntp" class.
  • Page 252 Professional Access Point Administrator Guide Figure 10. CLI Class Relationships Class Structure, Commands, and Examples - 252...
  • Page 253: Class And Field Reference

    Class and Field Reference Class Index Class Description association An associated station. basic-rate A radio rate. bridge-port A port that is a member of a bridge. A BSS of a radio. cluster Stores arbitrary data. cluster-member Stores arbitrary data. config Config settings.
  • Page 254 Persistent: No. Purpose: An associated station. Field Index Field Description interface The interface with which the station is associated. station The MAC address of the station. authenticated Whether the station is authenticated. associated Whether the station is associated. rx-packets The number of packets received from the station. tx-packets The number of packets transmitted by the station.
  • Page 255 rx-bytes Purpose The number of bytes received from the station. Valid values Positive integer. tx-bytes Purpose The number of bytes transmitted by the station. Valid values Positive integer. tx-rate Purpose The transmission rate. Valid values A rate, in 100 kbps. listen-interval Purpose The listen interval.
  • Page 256 Field Index Field Description path-cost The path cost. priority The port priority. path-cost Purpose The path cost. Used only when STP is on. Valid values 1-65535. priority Purpose The port priority. Used only when STP is on. Valid values 0-255. Persistent: Yes.
  • Page 257 Field Index Field Description status Controls whether this is on or off. description A human-readable description of the interface. radio The radio this is part of. beacon-interface The service-set interface to send beacons for. The MAC address of the interface. dtim-period Delivery Traffic Information Map period.
  • Page 258 Purpose The MAC address of the interface. Read-only; value is determined by the starting MAC of the radio. Valid values 6 colon-separated hexadecimal digit pairs. dtim-period Purpose Delivery Traffic Information Map period. Valid values 1-225. max-stations Purpose Maximum number of stations. Valid values 0-2007.
  • Page 259 open-system-authentication Purpose Whether Open System authentication is permitted. Valid values "on" or "off". shared-key-authentication Purpose Whether Shared Key authentication is permitted. Valid values "on" or "off". wpa-cipher-tkip Purpose Whether TKIP is permitted as a WPA cipher. Valid values "on" or "off". wpa-cipher-ccmp Purpose Whether CCMP is permitted as a WPA cipher.
  • Page 260 Purpose: Stores arbitrary data. Description: No services are restarted. config Persistent: Yes. Purpose: Configuration settings. Description: Used for configuration fields. Field Index Field Description startup Configuration at boot time. default Configuration after factory reset. no-external-updates Prevent external configuration updates startup Purpose Configuration at boot time.
  • Page 261 Field Index Field Description level Level of debugging information. timestamp Add a timestamp to debugging information. klevel Level of kernel debugging information. olevel Level of Orchestrator debugging information. ologhost Host for Orchestrator to send syslogs to. level Purpose Level of debugging information. Valid values 0-5.
  • Page 262 Field Index Field Description The MAC address of the AP. radio The radio that detected the AP. beacon-interval The beacon interval of the AP in kus (1. capability The capabilities of the AP. type The type of device detected. privacy Whether privacy (WEP or WPA) is enabled.
  • Page 263 type Purpose The type of device detected. Valid values "AP", "Ad hoc", or "Other". privacy Purpose Whether privacy (WEP or WPA) is enabled. Valid values "On" or "Off". ssid Purpose The SSID of the AP. Valid values String of up to 32 octets. Purpose Whether WPA security is enabled.
  • Page 264 Purpose The ERP of the AP. Valid values C-formatted hexadecimal number. beacons Purpose The number of beacons received from this AP. Valid values Positive integer. last-beacon Purpose The time of the last beacon received from this AP. Valid values Date and time, in Unix time format. supported-rates Purpose The supported rates of the AP.
  • Page 265 dot11 Persistent: Yes. Purpose: 802.11 settings (all radios). Description: Represents the wireless functions of the access point. Field Index Field Description status Controls whether 802. debug The debugging level for 802. dot11d Whether AP should enable 802. status Purpose Controls whether 802.11 is in use. Valid values "up"...
  • Page 266 Field Index Field Description dns-[12] Domain name servers in use. domain Domain name in use. The host name. static-dns-[12] Domain name servers to use when not obtained through DHCP. static-domain Domain name to use when not obtained through DHCP. dns-via-dhcp Whether DNS parameters are obtained through DHCP.
  • Page 267 interface Persistent: Yes. Purpose: A network interface. Description: Used for per-interface fields. Field Index Field Description The actual IP address of this interface. mask The actual netmask of this interface. status Controls whether this is on or off. type The type of the interface. description A human-readable description of the inter- face.
  • Page 268 Valid values Netmask in dotted-decimal notation. status Purpose Controls whether this is on or off. Valid values "up" or "down". type Purpose The type of the interface. Used to determine what additional fields are available. Read-only. Valid values "service-set", "bridge", "vlan", "wds", "pptp", "pppoe". description Purpose A human-readable description of the interface.
  • Page 269 rx-drop Purpose Received packets that were dropped Valid values Integer. rx-fifo Purpose Received packets with FIFO overflows. Valid values Integer. rx-frame Purpose Received packets with frame errors. Valid values Integer. rx-compressed Purpose Received packets with compression. Valid values Integer. rx-multicast Purpose Received packets that were multicast.
  • Page 270 Valid values Integer. tx-colls Purpose Transmitted packets will collisions. Valid values Integer. tx-carrier Purpose Transmitted packets with carrier errors. Valid values Integer. tx-compressed Purpose Transmitted packets with compression. Valid values Integer. ip-route Persistent: Yes. Purpose: An IP route. Description: An IP route. Field Index Field Description...
  • Page 271 Valid values Netmask. gateway Purpose The router by which the destination is reachable. Valid values IP address. Persistent: Purpose: Java Virtual Machine. Description: Represents a JVM. Field Index Field Description status Controls whether this is on or off. status Purpose Controls whether this is on or off.
  • Page 272 Field Index Field Description depth The number of log entries to keep depth Purpose The number of log entries to keep. Valid values Positive integer. log-entry Persistent: Purpose: An entry in the log. Description: An entry in the log. Field Index Field Description number...
  • Page 273 message Purpose The message. Valid values String. mac-acl Persistent: Yes. Purpose: A MAC access list entry. Description: Each instance represents a single MAC address. All instances with the same name form a list. This list can be used by BSSes. Field Index Field Description...
  • Page 274 portal Persistent: Yes. Purpose: Guest captive portal settings. Description: Represents a portal. When a portal is run on an interface, traffic entering that interface does not have unconditional access to the AP - they must satisfy some portal requirements, such as clicking through a welcome screen, before access is given.
  • Page 275 Field Index Field Description status Controls whether the radio is on or off. description A human-readable description of the inter- face. The MAC address of the radio. max-bss The maximum number of BSSes permitted on this radio. channel-policy The channel policy of this radio. mode The wireless mode of this radio.
  • Page 276 ware. This will be used as the starting MAC address for the BSSes. Valid values 6 colon-separated hexadecimal digit pairs. max-bss Purpose The maximum number of BSSes permitted on this radio. This limits the number of bss instances whose radio field can be this radio's name. Valid values Positive integers.
  • Page 277 rts-threshold Purpose The size of frames at which RTS/CTS will be used. Valid values 0-2347. fragmentation-threshold Purpose The size of frames at which they will be fragmented. Valid values 256-2346. load-balance-disassociation-utilization Purpose The load that must be exceeded in order for a station to be disassociated. The condition for load-balance-disassociation-stations must also be satisfied, if it is non-zero.
  • Page 278 Valid values "on" or "off". radius-user Persistent: Yes. Purpose: A local authentication server user. Description: Handles username/password and generates password hash serial Persistent: Yes. Purpose: The handler for the serial class. Description: Represents the serial access to the CLI. snmp Persistent: Yes.
  • Page 279 rw-community Purpose The read-write community name. Valid values String. Purpose The IP address of the interface to listen on. Valid values IP address. engine-id Purpose The engine identifier. Valid values A string. Persistent: Yes. Purpose: The handler for the ssh class. Description: Represents the SSH.
  • Page 280 Field Index Field Description password The login password. encrypted-password The login password, crypted. password-initialized Whether the password has been initialized since first boot. reboot Reboot the system. password Purpose The login password. Write-only. Valid values String. encrypted-password Purpose The login password, crypted. Valid values String.
  • Page 281 Field Index Field Description host The host to send traps to. community The community to send the traps with. type The type of traps to send. host Purpose The host to send traps to. Valid values IP address. community Purpose The community to send the traps with.
  • Page 282 aifs Purpose Adaptive Inter-Frame Space. Valid values 1-255. cwmin Purpose Minimum contention window. Valid values 1, 3, 7, 15, 31, 63, 127, 255, 511, or 1024. cwmax Purpose Maximum contention window. Valid values 1, 3, 7, 15, 31, 63, 127, 255, 511, or 1024. burst Purpose Maximum burst length.
  • Page 283: Troubleshooting

    Troubleshooting This part of the Professional Access Point Administrator Guide addresses installation and post-installation troubleshooting issues as follows: • Installation and Connectivity Troubleshooting • The installation procedure does not begin when I insert the Installation CD-ROM. • The Professional Access Point Detection Utility does not find the access point. •...
  • Page 284: Access Point

    Professional Access Point Administrator Guide access point. Possible Solution 1: 1. Ensure that all cables are plugged in firmly, and verify that the access point’s power indicator is lighted. Back Next 2. In the Detection Utility, click and then click to restart the discovery process.
  • Page 285 2. Select Never dial a connection, and then click the 3. Clear all the checkboxes and click OK. 4. Click again to apply the connection setting Netscape Navigator users: 1. Click Edit, Preferences, and then double-click 2. Click Proxies, select Direct connection to the Possible Solution 4: Resetting the access point returns all settings to their factory defaults.
  • Page 286 Possible Solution 2: Ensure that the wireless device is set to the access point: • SSID, also called Network Name. • Kind of security (for example, WPA) • Security key value • 802.11 mode If you change the settings on the access point, remember to change the settings on your wireless devices also.
  • Page 287: Configuration Troubleshooting

    Possible Solution 6: Resetting the access point returns all settings to their factory defaults. You will have to re-enter your configuration settings or restore your configuration backup after resetting the access point. Reset the access point by using a thin object, such as a paper clip, to press the Reset button press the Reset button until both the LAN and WLAN LEDs turn off briefly.
  • Page 288: Cluster Recovery

    The only security mode available on the WDS link is Static WEP, which is not particularly secure. Therefore, USRobotics recommends using WDS to bridge the Guest network only. Do not use WDS to bridge access points on the Internal network unless you are not concerned about the security risk for data traffic on that network.
  • Page 289 Where IPAddres0sOfAccessPoint is the IP address of the access point that you want to stop cluster- ing. You can find the IP addresses for the cluster members on the Cluster menu’s Access Points page for any of the clustered access points. USRobotics recommends making a note of all IP addresses at this point.
  • Page 290 Professional Access Point Administrator Guide Configuration Troubleshooting - 290...
  • Page 291: Support Information

    1. Refer to the “Troubleshooting” 2. Go to the Support section of the USRobotics Web site at www.usr.com/support/. Many of the most common difficulties that users experience have been addressed in the FAQ and Troubleshooting Web pages for your product. The product number of the Professional Access Point is 5453. You may need to know this to obtain information on the USRobotics Web site.
  • Page 292 Country Webmail Turkey www.usr.com/emailsupport/tk www.usr.com/emailsupport/me www.usr.com/emailsupport/uk For current support contact information, go to www.usr.com/support. Administrator Guide Voice 0212 444 4 877 0800 877 63 0870 844 4546 Support Information - 292...
  • Page 293: Regulatory Information

    Professional Access Point Administrator Guide Regulatory Information Declaration of Conformity U.S. Robotics Corporation 935 National Parkway Schaumburg, IL 60173 U.S.A. declares that this product conforms to the FCC’s specifications: Part 15, Class B Operation of this device is subject to the following conditions: 1) this device may not cause harmful electromagnetic interference, and 2) this device must accept any interference received including interference that may cause undesired operations.
  • Page 294: For Canadian Users

    to try to correct the interference by one or more of the following measures: • Reorient or relocate the receiving antenna. • Increase the separation between the equipment and receiver. • Connect the equipment to an outlet on a circuit different from that to which the receiver is con- nected.
  • Page 295: Ce Compliance

    We, U.S. Robotics Corporation of 935 National Parkway, Schaumburg, Illinois, 60173-5157 USA, declare under our sole responsibility that the products, USRobotics Professional Access Point, Models 5453 and 5453A, to which this declaration relates, are in conformity with the following standards and/or other...
  • Page 296 SAR value of this wireless device measured in the conformity test is 0.52 W/Kg. EU Detachable Antenna Information This USRobotics wireless device has been designed to operate with the antenna included in this package only. Together this device and antenna combination has been tested and approved by a European Agency conforming with the European R&TTE directive 1999/5/EC to meet the radiated power level requirement of...
  • Page 297 Professional Access Point Administrator Guide Go to www.usr.com to see the most recent channel restriction information. Regulatory Information - 297...
  • Page 298 Professional Access Point Administrator Guide Regulatory Information - 298...
  • Page 299: Robotics Corporation Two (2) Year Limited Warranty

    Professional Access Point Administrator Guide U.S. Robotics Corporation Two (2) Year Limited Warranty 1.0 GENERAL TERMS: 1.1 This Limited Warranty is extended only to the original end-user purchaser (CUSTOMER) and is not transferable. 1.2 No agent, reseller, or business partner of U.S. Robotics Corporation (U.S. ROBOTICS) is authorised to modify the terms of this Limited Warranty on behalf of U.S.
  • Page 300: 3.0 Obtaining Warranty Service

    2.2 CUSTOMER is specifically advised to make a backup copy of all software provided with this product. 2.3 CUSTOMER assumes full responsibility to properly install and configure this product and to ensure proper installation, configuration, operation and compatibility with the operating environment in which this product is to function.
  • Page 301: 5.0 Limitations

    Professional Access Point Administrator Guide 4.4 Responsibility for loss or damage does not transfer to U.S. ROBOTICS until the returned product or part is received as an authorised return at an authorised U.S. ROBOTICS Return Centre. 4.5 Authorised CUSTOMER returns will be unpacked, visually inspected, and matched to the Product Model Number and Product Serial Number for which the RMA was authorised.
  • Page 302: 6.0 Disclaimer

    Professional Access Point Administrator Guide OTHER LIABILITY IN CONNECTION WITH THE SALE, INSTALLATION, MAINTENANCE, WARRANTY, OR USE OF ITS PRODUCTS. 5.4 LIMITATION OF LIABILITY. TO THE FULL EXTENT ALLOWED BY LAW, U.S. ROBOTICS ALSO EXCLUDES FOR ITSELF AND ITS SUPPLIERS ANY LIABILITY, WHETHER BASED IN CONTRACT OR TORT (INCLUDING NEGLIGENCE), FOR INCIDENTAL, CONSEQUENTIAL, INDIRECT, SPECIAL, OR PUNITIVE DAMAGES OF ANY KIND, OR FOR LOSS OF REVENUE OR PROFITS, LOSS OF BUSINESS, LOSS OF INFORMATION OR DATA, OR OTHER FINANCIAL LOSS ARISING OUT OF OR...
  • Page 303: Glossary

    Professional Access Point Administrator Guide Glossary 0-9 A B C D E F G H I J L M N O P Q R S T U V W X IEEE 802 (IEEE Std. 802-2001) is a family of standards for peer-to-peer communication over a LAN. These technologies use a shared-medium, with information broadcast for all stations to receive.
  • Page 304 Professional Access Point Administrator Guide 802.11b IEEE 802.11b (IEEE Std. 802.11b-1999) is an enhancement of the initial 802.11 PHY to include 5.5 Mbps and 11 Mbps data rates. It uses direct sequence spread spectrum (DSSS) or frequency hopping spread spectrum (FHSS) in the 2.4 GHz ISM band as well as complementary code keying (CCK) to provide the higher data rates.
  • Page 305 802.11k IEEE 802.11k is a developing IEEE network Channel selection, client Roaming, and automatically load balance network traffic across APs to improve network performance and prevent under or over-utilization of any one access point. 802.11k will eventually complement the service (QoS) standard by ensuring QoS for multimedia over a wireless link. 802.1Q IEEE 802.1Q is the IEEE...
  • Page 306: Broadcast Address

    Beacon Beacon frames announce the existence of the wireless local area network and enable stations to establish and maintain communications in an orderly fashion. A beacon frame carries the following information, some of which is optional: • The Timestamp is used by stations to update their local clock, enabling synchronization among all associated stations.
  • Page 307 Professional Access Point Administrator Guide BSSID Infrastructure Mode, the Basic Service Set Identifier (BSSID) is the 48-bit address of the wireless interface of the Access Point. CCMP Counter mode/CBC-MAC Protocol (CCMP) is an encryption method for 802.11i that uses AES. It employs a CCM mode of operation, combining the Cipher Block Chaining Counter mode (CBC-CTR) and the Cipher Block Chaining Message Authentication Code (CBC-MAC) for encryption and message integrity.
  • Page 308 Professional Access Point Administrator Guide The Distribution Control Function is a component of the IEEE 802.11e Quality of Service (QoS) technology standard. The DCF coordinates channel access among multiple stations on a wireless network by controlling wait times for channel access. Wait times are determined by a random backoff timer which is configurable by defining minimum and maximum contention windows.
  • Page 309 Professional Access Point Administrator Guide The Extensible Authentication Protocol (EAP) is an authentication protocol that supports multiple methods, such as token cards, Kerberos, one-time passwords, certificates, public key authentication, and smart cards. Variations on EAP include EAP Cisco Wireless (LEAP), Protected EAP (PEAP), EAP-TLS, and EAP Tunnelled TLS (EAP-TTLS).
  • Page 310 Frame A Frame consists of a discrete portion of data along with descriptive meta-information packaged for transmission on a wireless network. Each frame includes a source and destination field with protocol version, frame type, frame sequence number, frame body (with the actual information to be transmitted) and frame check sequence for error detection.
  • Page 311: Infrastructure Mode

    IBSS An independent basic service set (IBSS) is an stations communicate directly with each other. IEEE The Institute of Electrical and Electronic Engineers (IEEE) is an international standards body that develops and establishes industry standards for a broad range of technologies, including the 802 family of networking and wireless standards.
  • Page 312 There are a finite number of IP addresses that can exist. Therefore, a local area network typically uses one of the IANA-designated address ranges for use in private networks. These address ranges are: 10.0.0.0 to 10.255.255.255 172.16.0.0 to 172.31.255.255 192.168.0.0 to 192.168.255.255 Dynamic IP Address is an IP address that is automatically assigned to a host by a similar mechanism.
  • Page 313 Professional Access Point Administrator Guide A Local Area Network (LAN) is a communications network covering a limited area, for example, the computers in your home that you want to network together or a couple of floors in a building. A LAN connects multiple computers and other network devices such as storage and printers.
  • Page 314: Network Address

    transmit. Any messages larger than the MTU are fragmented into smaller packets before being sent. Multicast A Multicast sends the same message to a select group of recipients. Sending an e-mail message to a mailing list is an example of multicasting. In wireless networks, multicast usually refers to an interaction in which the access point sends data traffic in the form of stations (MAC...
  • Page 315: Packet Loss

    ponents of the physical layer. • Layer 2, the Data-Link layer, defines how data for transmission will be structured and formatted, along with low-level protocols for communication and addressing. For example, protocols such as CSMA/CA and components like of the Data-Link layer. •...
  • Page 316: Port Forwarding

    Professional Access Point Administrator Guide the fork() system call. It can be used by wait() or kill() to perform actions on the given process. Port Forwarding Port Forwarding creates a ‘tunnel’ through a firewall, allowing users on the Internet access to a service running on one of the computers on your LAN, for example, a Web server, an FTP or SSH server, or other services.
  • Page 317 Professional Access Point Administrator Guide group. A subset of 802.11e features is described in the specification. RADIUS The Remote Authentication Dial-In User Service (RADIUS) provides an authentication and accounting system. It is a popular authentication mechanism for many ISPs. A symmetric stream cipher provided by Security.
  • Page 318: Rts Threshold

    Professional Access Point Administrator Guide RTS Threshold The RTS threshold specifies the packet size of a request to send (RTS) transmission. This helps control traffic flow through the access point, and is especially useful for performance tuning on an access point with a many clients.
  • Page 319 The subnet mask allows a router to quickly determine if an IP address is local or needs to be forwarded by performing a bitwise AND operation on the mask and the IP address. For example, if an IP address is 192.168.2.128 and the netmask is 255.255.255.0, the resulting Network address is 192.168.2.0.
  • Page 320 The User Datagram Protocol (UDP) is a transport layer protocol providing simple but unreliable datagram services. It adds port address information and a checksum to an UDP neither guarantees delivery nor does it require a connection. It is lightweight and efficient. All error processing and retransmission must be performed by the application program.
  • Page 321 A Wide Area Network (WAN) is a communications network that spans a relatively large geographical area, extending over distances greater than one kilometer. A WAN is often connected through public networks, such as the telephone system. It can also be connected through leased lines or satellites. The Internet is essentially a very large WAN.
  • Page 322 Professional Access Point Administrator Guide Wireless Multimedia (WMM) is a IEEE technology standard designed to improve the quality of audio, video and multimedia applications on a wireless network. Both access points and wireless clients (laptops, consumer electronics products) can be WMM-enabled. WMM features are based on is a subset of the WLAN IEEE 802.11e...
  • Page 323: Index

    Index access point clustering 44 configuration policy 39 ethernet (wired) settings 89 factory default configuration 191 guest network 121 load balancing 139 MAC filtering 135 QoS 143 radio 129 running configuration 191 security 101 SNMP 165 standalone 47 startup configuration 191 time protocol 161 user management 53 WDS bridging 153...
  • Page 324 basic settings 192 bss 229 cluster 196 factory-reset 247 get 184 guest access 208 load balancing 238 MAC filtering 235 quality of service 238 radio settings 230 reboot 247 remove 184 save-running 191 security 213 set 184 status and monitoring 199 time protocol 246 user accounts 196 WDS 245...
  • Page 325 help, getting icons on Web User Interface 41 IEEE standards support 12 IEEE 802.11b configuring 130 IEEE 802.11g configuring 130 IEEE 802.1x radio mode configuring 130 IEEE 802.1x security mode configuring 114 when to use 103 IEEE rate set configuring 130 interface names used interframe spaces as related to QoS 145...
  • Page 326 power connections progress bar for cluster auto-synch quality of service quality of service configuration queueus configuring for QoS 147 radio beacon interval 130 channel managed of clustered APs 63 configuring 130 DTIM period 130 fragmentation threshold 130 IEEE 802.11 mode 130 maximum stations 130 rate sets 130 RTS threshold 130...
  • Page 327 transmit/receive information troubleshooting startup problems 33 upgrading the firmware user account commands user accounts backing up and restoring 56 for built-in authentication server 53 virtual wireless networks configuration VLANs for internal and guest interface 122 Voice over IP improved service with QoS 143 wait time for cluster auto-synch configuring 156 example 158...
  • Page 328 Professional Access Point Administrator Guide Index–328...

This manual is also suitable for:

Usr5453

Table of Contents