Table of Contents

Advertisement

Quick Links

AP-51xx Access Point
Product Reference Guide

Advertisement

Table of Contents
loading

Summary of Contents for Motorola AP-51XX

  • Page 1 AP-51xx Access Point Product Reference Guide...
  • Page 2 MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. Symbol is a registered trademark of Symbol Technologies, Inc. All other product or service names are the property of their respective owners. © 2008 Motorola, Inc. All rights reserved.
  • Page 3 AP-51xx Access Point Product Reference Guide 72E-103901-01 January 2008...
  • Page 5: Table Of Contents

    Contents About This Guide Introduction ............vii Document Conventions .
  • Page 6 AP-51xx Access Point Product Reference Guide Antenna Support for 2.4 GHz and 5.2 GHz Radios..... . .1-6 Sixteen Configurable WLANs ........1-6 Support for 4 BSSIDs per Radio .
  • Page 7 Theory of Operations ..........1-20 Cellular Coverage .
  • Page 8 viii AP-51xx Access Point Product Reference Guide AP-5181 Pole Mounted Installations ....... .2-24 AP-5181 Wall Mounted Installations .
  • Page 9 Chapter 5. Network Management Configuring the LAN Interface ......... .5-1 Configuring VLAN Support .
  • Page 10 AP-51xx Access Point Product Reference Guide Available Protocols .........6-33 Configuring Advanced Subnet Access.
  • Page 11 Chapter 8. CLI Reference Connecting to the CLI ..........8-2 Accessing the CLI through the Serial Port .
  • Page 12 AP-51xx Access Point Product Reference Guide System Radius Commands........8-193 System Network Time Protocol (NTP) Commands.
  • Page 13 xiii Chapter 10. Adaptive AP Adaptive AP Overview ..........10-1 Where to Go From Here .
  • Page 14 AP-51xx Access Point Product Reference Guide Electrical Characteristics ..........A-4 Radio Characteristics .
  • Page 15: About This Guide

    About This Guide Introduction This guide provides configuration and setup information for the AP-5131 and AP-5181 model access points. For the purposes of this guide, the devices will be called AP-51xx or the generic term “access point” when identical configuration activities are applied to both models. Document Conventions The following document conventions are used in this document: NOTE Indicate tips or special requirements.
  • Page 16: Notational Conventions

    If that is necessary, you will be given specific instructions. Motorola is not responsible for any damages incurred during shipment if the approved shipping container is not used. Shipping the units improperly can possibly void the warranty. If the original...
  • Page 17: Chapter 1. Introduction

    Introduction This AP-51xx Product Reference Guide contains setup and advanced configuration instructions for both the AP-5131 and AP-5181 model access points. Both the AP-5131 and AP-5181 model access points share the same Web UI, CLI and MIB interfaces. There are no differences in how the devices are configured using the instructions within this guide, even though the Web UI displays AP-5131 or AP-5181 specifically.
  • Page 18: New Features

    An adaptive AP (AAP) is an AP-51XX access point that can adopt like an AP300 (L3). The management of an AAP is conducted by a switch, once the access point connects to a Motorola WS5100 or RFS7000 model switch and receives its AAP configuration.
  • Page 19: Rogue Ap Enhancements

    Introduction For a information overview of the adaptive AP feature as well as how to configure it, refer to Adaptive AP on page 10-1. 1.1.2 Rogue AP Enhancements With the 2.0 release of the access point firmware, the access point now has the option to scan for rogues over all channels on both of the access point’s 11a and 11bg radio bands.
  • Page 20: Feature Overview

    AP-51xx Access Point Product Reference Guide point and the access point’s station count. This information is very helpful in assessing the access point’s overall load on a channel, its availability for additional device associations and multi media traffic support. For information on enabling QBSS and defining the channel utilization transmission interval, see Configuring the 802.11a or 802.11b/g Radio on page 5-55.
  • Page 21: Single Or Dual Mode Radio Options

    Introduction • Multi-Function LEDs • Mesh Networking • Additional LAN Subnet • On-board Radius Server Authentication • Hotspot Support • Routing Information Protocol (RIP) • Manual Date and Time Settings • Dynamic DNS • Auto Negotiation 1.2.1 Single or Dual Mode Radio Options One or two possible configurations are available on the access point depending on which model is purchased.
  • Page 22: Multiple Mounting Options

    AP-51xx Access Point Product Reference Guide For detailed information on locating the access point’s MAC addresses, see Viewing WAN Statistics on page 7-2 Viewing LAN Statistics on page 7-6. For information on access point MAC address assignments, see AP-51xx MAC Address Assignment on page 1-27.
  • Page 23: Quality Of Service (Qos) Support

    Introduction If the radio MAC address displayed on the Radio Settings screen is 00:A0:F8:72:20:DC, then the BSSIDs for that radio will have the following MAC addresses: BSSID MAC Address Hexadecimal Addition BSSID #1 00:A0:F8:72:20:DC Same as Radio MAC address BSSID #2 00:A0:F8:72:20:DD Radio MAC address +1 BSSID #3...
  • Page 24: Kerberos Authentication

    AP-51xx Access Point Product Reference Guide • Kerberos Authentication • EAP Authentication The following encryption techniques are supported: • WEP Encryption • KeyGuard Encryption • Wi-Fi Protected Access (WPA) Using TKIP Encryption • WPA2-CCMP (802.11i) Encryption In addition, the access point supports the following additional security features: •...
  • Page 25: Eap Authentication

    Introduction 1.2.8.2 EAP Authentication The Extensible Authentication Protocol (EAP) feature provides access points and their associated MU’s an additional measure of security for data transmitted over the wireless network. Using EAP, authentication between devices is achieved through the exchange and verification of certificates. EAP is a mutual authentication method whereby both the MU and AP are required to prove their identities.
  • Page 26: Keyguard Encryption

    Use KeyGuard to shield the master encryption keys from being discovered through hacking. KeyGuard negotiation takes place between the access point and MU upon association. The access point can use KeyGuard with Motorola MUs. KeyGuard is only supported on Motorola MUs making it a Motorola proprietary security mechanism.
  • Page 27: Wpa2-Ccmp (802.11I) Encryption

    Introduction 1-11 1.2.8.6 WPA2-CCMP (802.11i) Encryption WPA2 is a newer 802.11i standard that provides even stronger wireless security than Wi-Fi Protected Access (WPA) and WEP. Counter-mode/CBC-MAC Protocol (CCMP) is the security standard used by the Advanced Encryption Standard (AES). AES serves the same function TKIP does for WPA-TKIP. CCMP computes a Message Integrity Check (MIC) using the proven Cipher Block Message Authentication Code (CBC-MAC) technique.
  • Page 28: Vlan Support

    Motorola periodically releases updated versions of device firmware to the Motorola Web site. If the firmware version displayed on the System Settings page (see Configuring System Settings on page 4-2) is older than the version on the Web site, Motorola recommends updating the access point to...
  • Page 29: Programmable Snmp V1/V2/V3 Trap Support

    4-23. 1.2.13 Power-over-Ethernet Support When users purchase a Motorola WLAN solution, they often need to place access points in obscure locations. In the past, a dedicated power source was required for each access point in addition to the Ethernet infrastructure. This often required an electrical contractor to install power drops at each access point location.
  • Page 30: Mu-Mu Transmission Disallow

    1-14 AP-51xx Access Point Product Reference Guide The Power Injector (Part No. AP-PSBIAS-T-1P-AF) is a single-port, 802.3af compliant Power over Ethernet hub combining low-voltage DC with Ethernet data in a single cable connecting to the access point. The Power Injector’s single DC and Ethernet data cable creates a modified Ethernet cabling environment on the access point’s LAN port eliminating the need for separate Ethernet and power cables.
  • Page 31: Support For Cam And Psp Mus

    Introduction 1-15 1.2.16 Support for CAM and PSP MUs The access point supports both CAM and PSP powered MUs. CAM (Continuously Aware Mode) MUs leave their radios on continuously to hear every beacon and message transmitted. These systems operate without any adjustments by the access point. A beacon is a uniframe system packet broadcast by the AP to keep the network synchronized.
  • Page 32: Advanced Event Logging Capability

    1-16 AP-51xx Access Point Product Reference Guide 1.2.19 Advanced Event Logging Capability The access point provides the capability for periodically logging system events. Logging events is useful in assessing the throughput and performance of the access point or troubleshooting problems on the access point managed Local Area Network (LAN).
  • Page 33: Multi-Function Leds

    Introduction 1-17 The DHCP client automatically sends a DHCP request at an interval specified by the DHCP server to renew the IP address lease as long as the access point is running (this parameter is programmed at the DHCP server). For example: Windows 2000 servers typically are set for 3 days. 1.2.23 Multi-Function LEDs Both AP-5131 and AP-5181 model access points house seven LED indicators.
  • Page 34: Additional Lan Subnet

    1-18 AP-51xx Access Point Product Reference Guide Once the access point (in client bridge mode) establishes at least one wireless connection, it establishes other wireless connections in the background as they become available. In this way, the access point can establish simultaneous redundant links. An access point (in client bridge mode) can establish up to 3 simultaneous wireless connections with other AP-5131s or AP-5181s.
  • Page 35: Hotspot Support

    Introduction 1-19 screen enables the administrator to set WLAN access based on user groups defined within the User Database screen. Each user is authorized based on the access policies applicable to that user. Access policies allow an administrator to control access to a user groups based on the WLAN configurations. For detailed information on configuring the access point for AAA Radius Server support, see Configuring User Authentication on page 6-64.
  • Page 36: Manual Date And Time Settings

    1-20 AP-51xx Access Point Product Reference Guide 1.2.29 Manual Date and Time Settings As an alternative to defining a NTP server to provide access point system time, the access point can now have its date and time set manually. A new Manual Date/Time Setting screen can be used to set the time using a Year-Month-Day HH:MM:SS format.
  • Page 37: Cellular Coverage

    2.4 to 2.5-GHz frequency range (802.11b/g radio) or the 5.2 GHz frequency range (802.11a radio), the actual range is country-dependent. Motorola devices, like other Ethernet devices, have unique, hardware encoded Media Access Control (MAC) or IEEE addresses.
  • Page 38: Mac Layer Bridging

    1-22 AP-51xx Access Point Product Reference Guide If the MU does not find an access point with a workable signal, it can perform a scan to find any AP. As MUs switch APs, the AP updates its association statistics. The user can configure the ESSID to correspond to up to 16 WLANs on each 802.11a or 802.11b/g radio.
  • Page 39: Direct-Sequence Spread Spectrum

    Introduction 1-23 supports multiple-cell operations with fast roaming between cells. Within a direct-sequence system, each cell can operates independently. Adding cells to the network provides an increased coverage area and total system capacity. The RS-232 serial port provides a Command Line Interface (CLI) connection. The serial link supports a direct serial connection.
  • Page 40: Operating Modes

    1-24 AP-51xx Access Point Product Reference Guide • Signal strength between the and MU • Number of MUs currently associated with the access point • MUs encryption and authentication capabilities • MUs supported data rate MUs perform pre-emptive roaming by intermittently scanning for ’s and associating with the best available access point.
  • Page 41: Management Access Options

    Introduction 1-25 • Access Point - As an Access Point, the access point functions as a layer 2 bridge. The wired uplink can operate as a trunk and support multiple VLANs. Up to 16 WLANs can be defined and mapped to WLANs. Each WLAN can be configured to be broadcast by one or both radios (unlike the AP-4131 model access point).
  • Page 42 1-26 AP-51xx Access Point Product Reference Guide Make configuration changes to access point’s individually. Optionally, use the access point import/export configuration function to download settings to other access points. For detailed information, see Importing/Exporting Configurations on page 4-44.
  • Page 43: Ap-51Xx Mac Address Assignment

    Introduction 1-27 1.3.8 AP-51xx MAC Address Assignment For both an AP-5131 and AP-5181 model access point, MAC address assignments are as follows: • WAN - The access point MAC address can be found underneath the access point chassis. • LAN1 - WAN MAC address + 1. •...
  • Page 44 1-28 AP-51xx Access Point Product Reference Guide...
  • Page 45: Chapter 2. Hardware Installation

    Hardware Installation An access point installation includes mounting the access point, connecting the access point to the network (LAN or WAN port connection), connecting antennae and applying power. Installation procedures vary for different environments. See the following sections for more details: •...
  • Page 46: Precautions

    2.1 Precautions Before installing an AP-5131 or AP-5181 model access point verify the following: • Do not install in wet or dusty areas without additional protection. Contact a Motorola representative for more information. • Verify the environment has a continuous temperature range between -20° C to 50° C.
  • Page 47 Hardware Installation Part No. Description AP-5131-13043-WWR AP-5131 802.11a+g Dual Radio Access Point AP-5131 Install Guide Software and Documentation CD-ROM Power Injector (Part No. AP-PSBIAS-1P2-AFR) (4) Dual-Band Antennae (Part No. ML-2452-APA2-01) Accessories Bag AP-5131-40020-WW AP-5131 802.11a/g Single Radio Access Point AP-5131 Install Guide Software and Documentation CD-ROM Accessories Bag AP-5131-40021-WWR...
  • Page 48: Ap-5181 Configurations

    AP-5181 to a pole or wall. NOTE If installing the AP-5181 in an outdoor area prone to high winds and rain, Motorola recommends using the AP-5181 Heavy Weather Kit (Part No. KT-5181-HW-01R). This kit shields an AP-5181 from wind and rain...
  • Page 49: Requirements

    Hardware Installation NOTE Though the AP-5181 can use the standard Power Injector solution (Part No. AP-PSBIAS-1P2-AFR), Motorola recommends using the AP-5181 Power Tap (Part No. AP-PSBIAS-5181-01R), designed specifically for outdoor deployments. 2.3 Requirements The minimum installation requirements for a single-cell, peer-to-peer network (regardless of access point model) •...
  • Page 50: Site Surveys

    Motorola recommends conducting a new site survey and developing a new coverage area floor plan when switching from 2 or 11Mbps access points (AP-3021 or AP-4131 models) to 54Mbps access points (AP-5131 and AP-5181 models), as the device placement requirements are significantly different.
  • Page 51 Yagi Antenna 13.9 ML-2452-APA2-01 Dual-Band NOTE An additional adapter is required to use ML-2499-11PNA2-01 and ML-2499-BYGA2-01 model antennae. Please contact Motorola for more information. The AP-5131 5.2 GHz antenna suite includes the following models: Part No. Antenna Type Nominal Net Gain (dBi)
  • Page 52: Ap-5181 Antenna Options

    Two antennae per radio provides diversity that can improve performance and signal reception. Motorola supports two antenna suites for the AP-5181. One antenna suite supporting the 2.4 GHz band and another antenna suite supporting the 5.2 GHz band. Select an antenna model best suited to the intended operational environment of your AP-5181.
  • Page 53: Power Options

    Hardware Installation Nominal Net Gain Part Number Antenna Type (dBi) Description ML-2452-PNA7-01R Panel Antenna (Dual-Band) 2.4 - 2.5/4.9 - 5.99 GHz, 66 deg/60 deg Type N connector, with pigtail ML-2452-PNA5-01R Sector Antenna (Dual-Band) 6.0 2.3 - 2.4/4.9 - 5.9 GHz, 120 deg Sector Type N connector, with pigtail...
  • Page 54: Ap-5181 Power Options

    The power options for the AP-5181 include: CAUTION An AP-5181 model access point cannot use the AP-5131 recommended 48-Volt Power Supply (Part No. 50-14000-243R). Motorola recommends the AP-PSBIAS-5181-01R Power Tap for use an AP-5181 and its intended outdoor deployment. • Power Injector (Part No. AP-PSBIAS-1P2-AFR) •...
  • Page 55: Installing The Power Injector Or Power Tap

    (including non-Motorola power sources). However, using the wrong solution (including a POE system used on a legacy Motorola access point) could severely damage the access point and void the product warranty. A separate Power Injector or Power Tap is required for each access point comprising the network.
  • Page 56: Power Injector Led Indicators

    2-12 AP-51xx Access Point Product Reference Guide CAUTION Ensure AC power is supplied to the Power Injector or Power Tap (for AP-5181 installations) using an AC cable with an appropriate ground connection approved for the country of operation. 1. Connect an RJ-45 Ethernet cable between the network data supply (host) and the Power Injector’s Data In or the Power Tap’s DATA IN connector.
  • Page 57: Mounting An Ap-5131

    For more information and device specifications for the Power Injector, refer to the Power Injector Quick Install Guide (Part No. 72-70762-01) available from the Motorola Web site. 2.7 Mounting an AP-5131 The AP-5131 can rest on a flat surface, attach to a wall, mount under a suspended T-Bar or above a ceiling (plenum or attic).
  • Page 58 2-14 AP-51xx Access Point Product Reference Guide CAUTION Both the Dual and Single Radio model AP-5131’s use RSMA type antenna connectors. On the Dual Radio AP-5131, a single dot on the antenna connector indicates the primary antenna for both Radio 1 (2.4 GHz) and Radio 2 (5.2 GHz).
  • Page 59: Wall Mounted Installations

    Hardware Installation 2-15 For standard 48-Volt power adapter (Part No. 50-14000-243R) and line cord installations: a. Connect RJ-45 Ethernet cable between the network data supply (host) and the AP-5131 LAN port. b. Verify the power adapter is correctly rated according the country of operation. c.
  • Page 60 2-16 AP-51xx Access Point Product Reference Guide If pre-drilling a hole, the recommended hole size is 2.8mm (0.11in.) if the screws are going directly into the wall and 6mm (0.23in.) if wall anchors are being used. 4. If required, install and attach a security cable to the AP-5131 lock port. 5.
  • Page 61: Suspended Ceiling T-Bar Installations

    NOTE If the AP-5131 is utilizing remote management antennae, a wire cover can be used to provide a clean finished look to the installation. Contact Motorola for more information. 9. Verify the behavior of the AP-5131 LEDs. For more information, see...
  • Page 62 2-18 AP-51xx Access Point Product Reference Guide CAUTION Both the Dual and Single Radio model AP-5131s use RSMA type antenna connectors. On a Dual Radio AP-5131, a single dot on the antenna connector indicates the primary antenna for both Radio 1 (2.4 GHz) and Radio 2 (5.2 GHz).
  • Page 63 3-1. For specific details on AP-5131 system configurations, see System Configuration on page 4-1. NOTE If the AP-5131 is utilizing remote management antennae, a wire cover can be used to provide a clean finished look to the installation. Contact Motorola for more information.
  • Page 64: Above The Ceiling (Plenum) Installations

    NOTE The AP-5131 is Plenum rated to UL2043 and NEC1999 to support above the ceiling installations. CAUTION Motorola does not recommend mounting the AP-5131 directly to any suspended ceiling tile with a thickness less than 12.7mm (0.5in.) or a suspended ceiling tile with an unsupported span greater than 660mm (26in.).
  • Page 65 Hardware Installation 2-21 CAUTION Motorola recommends care be taken not to damage the finished surface of the ceiling tile when creating the light pipe hole and installing the light pipe. 7. Remove the light pipe’s rubber stopper before installing the light pipe.
  • Page 66 2-22 AP-51xx Access Point Product Reference Guide 13. Attach safety wire (if used) to the AP-5131 safety wire tie point or security cable (if used) to the AP-5131’s lock port. 14. Align the ceiling tile into its former ceiling space. 15.
  • Page 67: Ap-5131 Led Indicators

    Hardware Installation 2-23 2.8 AP-5131 LED Indicators The AP-5131 utilizes seven LED indicators. Five LEDs display within four LED slots on the front of the AP-5131 (on top of the AP-5131 housing) and two LEDs (for above the ceiling installations) are located on the back of the device (the side containing the LAN, WAN and antenna connectors).
  • Page 68: Mounting An Ap-5181

    2-24 AP-51xx Access Point Product Reference Guide The LEDs on the rear of the AP-5131 are viewed using a single (customer installed) extended lightpipe, adjusted as required to suit above the ceiling installations. The LEDs displayed using the lightpipe have the following color display and functionality: Solid white indicates the AP-5131 is adequately powered.
  • Page 69 Hardware Installation 2-25 Fit the edges of the V-shaped part into the slots Tighten the securing bolts 3. Attach the square mounting plate to the bridge with the supplied screws. Attach the square plate to the bridge 4. Attach the AP-5181 and mounting plate to the bracket already fixed to the pole. 5.
  • Page 70 2-26 AP-51xx Access Point Product Reference Guide 7. Cable the AP-5181 using either the AP-5181 Power Tap (Part No. AP-PSBIAS-5181-01R) or the Power Injector (Part No. AP-PSBIAS-1P2-AFR). NOTE The access point must be mounted with the RJ45 cable connectors oriented upwards to ensure proper operation. CAUTION Do not supply power to the AP-5181 Power Tap or Power Injector until the cabling of the access point is complete.
  • Page 71: Ap-5181 Wall Mounted Installations

    4-1. NOTE If installing the AP-5181 in an outdoor area prone to high winds and rain, Motorola recommends using the AP-5181 Heavy Weather Kit (Part No. KT-5181-HW-01R). This kit shields an AP-5181 from high winds and water damage as a result of driving rain.
  • Page 72 2-28 AP-51xx Access Point Product Reference Guide 5. Use the included nuts to tightly secure the wireless bridge to the bracket. Fit the edges of the V-shaped clamp into the slots on the flat side of the rectangular plate. 6. Attach the radio antenna to their correct connectors. 7.
  • Page 73: Ap-5181 Led Indicators

    4-1. NOTE If installing the AP-5181 in an outdoor area prone to high winds and rain, Motorola recommends using the AP-5181 Heavy Weather Kit (Part No. KT-5181-HW-01R). This kit shields an AP-5181 from high winds and water damage as a result of driving rain.
  • Page 74 2-30 AP-51xx Access Point Product Reference Guide Power and error conditions (split LED) Data over Ethernet 802.11a radio activity 802.11b/g radio activity Solid white indicates the access point is adequately powered. Power Status Solid red indicates the access point is experiencing a problem condition requiring immediate attention.
  • Page 75: Setting Up Mus

    3-14. Refer to the LA-5030 & LA-5033 Wireless Networker PC Card and PCI Adapter Users Guide, available from the Motorola Web site, for installing drivers and client software if operating in an 802.11a/g network environment. Refer to the Spectrum24 LA-4121 PC Card, LA-4123 PCI Adapter & LA-4137 Wireless Networker User Guide, available from the Motorola Web site, for installing drivers and client software if operating in an 802.11b network environment.
  • Page 76 2-32 AP-51xx Access Point Product Reference Guide...
  • Page 77: Chapter 3. Getting Started

    Getting Started The access point should be installed in an area tested for radio coverage using one of the site survey tools available to the field service technician. Once an installation site has been identified, the installer should carefully follow the hardware precautions, requirements, mounting guidelines and power options outlined in Hardware Installation.
  • Page 78: Configuration Options

    AP-51xx Access Point Product Reference Guide For installing an AP-5131 model access point • For instructions on installing the AP-5131 on a table top, see Desk Mounted Installations on page 2-13. • For instructions on mounting an AP-5131 to a wall, see Wall Mounted Installations on page 2- •...
  • Page 79: Default Configuration Changes For The Access Point

    Getting Started • Config file - Readable text file; Importable/Exportable via FTP, TFTP and HTTP. Configuration settings for an access point can be downloaded from the current configuration of another access point meeting the import/export requirements. For information on importing or exporting configuration files, see Importing/Exporting Configurations on page 4-44.
  • Page 80: Initially Connecting To The Access Point

    1. Connect AC power to the access point, as Power-Over-Ether support is not available on the access point’s WAN port. 2. Start a browser and enter the access point’s static IP WAN address (10.1.1.1). The default password is “motorola.” 3. Refer to Basic Device Configuration on page 3-5 for instructions on the initial (basic) configuration of the access point.
  • Page 81: Basic Device Configuration

    4. Press <ESC> or <Enter> to access the access point CLI. 5. Enter the default username of “admin” and the default password of “motorola.” As this is the first time you are logging into the access point, you are prompted to enter a new password and set the county code.
  • Page 82 AP-51xx Access Point Product Reference Guide 2. If the default login is successful, the Change Admin Password window displays. Change the password. Enter the current password and a new admin password in fields provided. Click Apply. Once the admin password has been updated, a warning message displays stating the access point must be set to a country.
  • Page 83: Configuring Device Settings

    Admin User password WILL NOT get imported. NOTE Though the access point can have its basic settings defined using a number of different screens, Motorola recommends using the access point Quick Setup screen to set the correct country of operation and define its minimum required configuration from one convenient location.
  • Page 84 AP-51xx Access Point Product Reference Guide The System Name is useful if multiple devices are being administered. 3. Select the Country for the access point’s country of operation from the drop-down menu The access point prompts the user for the correct country code on the first login. A warning message also displays stating that an incorrect country settings may result in illegal radio operation.
  • Page 85 DHCP server to a host. Some of these parameters are IP address, network mask, and gateway. NOTE Motorola recommends that the WAN and LAN ports should not both be configured as DHCP clients.
  • Page 86 DHCP server over the LAN connection. Select the Bootp client option to enable a diskless system to discover its own IP address. NOTE Motorola recommends that the WAN and LAN ports should not both be configured as DHCP clients.
  • Page 87 Getting Started 3-11 c. If using the static or DHCP Server option, enter the network-assigned IP Address of the access point. NOTE DNS names are not supported as a valid IP address for the access point. The user is required to enter a numerical IP address. d.
  • Page 88: Configuring Wlan Security Settings

    Multiple WLANs can share the same security policy, so be careful not to name security policies after specific WLANs or risk defining a WLAN to single policy. Motorola...
  • Page 89 The access point, other proprietary routers and MUs use the same algorithm to convert an ASCII string to the same hexadecimal number. Non-Motorola clients and devices need to enter WEP keys manually as hexadecimal numbers. The access point and its target client(s) must use the same pass key to...
  • Page 90: Testing Connectivity

    (WNMP) ping packets to the associated MU. Use the Echo Test screen to specify a target MU and configure the parameters of the test. The WNMP ping test only works with Motorola MUs. Only use a Motorola MU to test access point connectivity using WNMP.
  • Page 91: Where To Go From Here

    Getting Started 3-15 Packet Length Specifies the length of each packet transmitted to the MU during the test. The default length is 100 bytes. 4. Click the Ping button to begin transmitting packets to the specified MU address. Refer to the Number of Responses value to assess the number of responses from the MU versus the number of ping packets transmitted by the access point.
  • Page 92 3-16 AP-51xx Access Point Product Reference Guide...
  • Page 93: Chapter 4. System Configuration

    WAN port, the default static IP address is 10.1.1.1. The default password is “ .” If connected motorola to the access point using the LAN port, the default setting is DHCP client. The user is required to know the IP address to connect to the access point using a Web browser.
  • Page 94: Configuring System Settings

    AP-51xx Access Point Product Reference Guide System configuration topics include: • Configuring System Settings • Adaptive AP Setup • Configuring Data Access • Managing Certificate Authority (CA) Certificates • Configuring SNMP Settings • Configuring Network Time Protocol (NTP) • Logging Configuration •...
  • Page 95 System Name Specify a device name for the access point. Motorola recommends selecting a name serving as a reminder of the user base the access point supports (engineering, retail, etc.).
  • Page 96 CAUTION Restoring the access point’s configuration back to default settings changes the administrative password back to “motorola.” If restoring the configuration back to default settings, be sure you change the...
  • Page 97 Click the Restart access point button to reboot the AP. Restarting the access point resets all data collection values to zero. Motorola does not recommend restarting the AP during significant system uptime or data collection activities. CAUTION After a reboot, static route entries disappear from the AP Route Table if a LAN Interface is set to DHCP Client.
  • Page 98: Adaptive Ap Setup

    Adaptive AP on page 10-1. NOTE AAP functionality is only supported on a Motorola WS5100 model switch (running firmware version 3.1) or higher and a Motorola RFS7000 model switch (running firmware version 1.1 or higher). NOTE The Adaptive AP Setup screen does not display the AAP’s adoption status or adopted switch.
  • Page 99 System Configuration 2. Define the following to prioritize a switch connection scheme and AP interface used to adopt to the switch. Control Port Define the port used by the switch FQDN to transmit and receive with the AAP. The default control port is 24576. Switch FQDN Add a complete switch fully qualified domain name (FQDN) to add a switch to the 12 available switch IP addresses available for...
  • Page 100 AP-51xx Access Point Product Reference Guide Auto Discovery Enable When the Auto Discovery Enable checkbox is selected, the access point begins the switch discovery (adoption) process using DHCP first, then a user provided domain name, lastly using static IP addresses. This setting is disabled by default. When disabled, the AP functions as a standalone access point without trying to adopt a switch.
  • Page 101: Configuring Data Access

    To avoid jeopardizing the network data managed by the access point, Motorola recommends enabling only those interfaces used in the routine (daily) management of the network, and disabling all other interfaces until they are required.
  • Page 102 4-10 AP-51xx Access Point Product Reference Guide 2. Use the access point Access field checkboxes to enable/disable the following on the access point’s LAN1, LAN2 or WAN interfaces: Applet HTTP (port 80) Select the LAN1, LAN2 and/or WAN checkboxes to enable access to the access point configuration applet using a Web browser.
  • Page 103 System Configuration 4-11 SNMP (port 161) Select the LAN1, LAN2 and/or WAN checkboxes to enable access to the access point configuration settings from an SNMP-capable client. 3. Refer to the Applet Timeout field to set an HTTPS timeout interval. HTTP/S Timeout Disables access to the access point if no data activity is detected over Applet HTTPS (port 443) after the user defined interval.
  • Page 104 Radius-enabled device configured with the same shared secret. Apply the qualifications of a well-chosen password to the generation of a shared secret. Generate a random, case-sensitive string using letters and numbers. The default is motorola. 7. Update the Administrator Access field to change the administrative password used to access the configuration settings.
  • Page 105 System Configuration 4-13 8. Refer to the Login Message field to optionally define a message displayed to the customer as they login into the access point. Message Settings Click the Message Settings button to display a screen used to create a text message. Once displayed, select the Enable Login Message checkbox to allow your customized message to be...
  • Page 106: Managing Certificate Authority (Ca) Certificates

    4-14 AP-51xx Access Point Product Reference Guide 9. Click Apply to save any changes to the access point Access screen. Navigating away from the screen without clicking the Apply button results in all changes to the screen being lost. 10. Click Undo Changes (if necessary) to undo any changes made.
  • Page 107 System Configuration 4-15 certificate. A browser must contain this CA certificate in its Trusted Root Library so it can trust certificates “signed” by the CA's private key. Depending on the public key infrastructure, the digital certificate includes the owner's public key, the certificate expiration date, the owner's name and other public key owner information.
  • Page 108: Creating Self Certificates For Accessing The Vpn

    4-16 AP-51xx Access Point Product Reference Guide 2. Copy the content of the CA Certificate message (using a text editor such as notepad) and click on Paste from Clipboard. The content of the certificate displays in the Import a root CA Certificate field.
  • Page 109 System Configuration 4-17 CAUTION Self certificates can only be generated using the access point GUI and CLI interfaces. No functionality exists for creating a self-certificate using the access point’s SNMP configuration option. To create a self certificate: 1. Select System Configuration ->...
  • Page 110 4-18 AP-51xx Access Point Product Reference Guide Key ID Enter a logical name for the certificate to help distinguish between certificates. The name can be up to 7 characters in length. Subject The required Subject value contains important information about the certificate.
  • Page 111 System Configuration 4-19 The generated certificate request displays in Self Certificates screen text box. 6. Click the Copy to Clipboard button. The content of certificate request is copied to the clipboard. Create an email to your CA, paste the content of the request into the body of the message and send it to the CA.
  • Page 112: Creating A Certificate For Onboard Radius Authentication

    4-20 AP-51xx Access Point Product Reference Guide NOTE If the access point is restarted after a certificate request has been generated but before the signed certificate is imported, the import will not execute properly. Do not restart the access point during this process. 8.
  • Page 113 RSA encryption. • SHA1-RSA - Secure Hash Algorithm 1 in combination with RSA encryption. Key Length Defines the length of the key. Possible values are 512, 1024, and 2048. Motorola recommends setting this value to 1024 to ensure optimum functionality.
  • Page 114 4-22 AP-51xx Access Point Product Reference Guide 4. Complete as many of the optional values within the Certificate Request screen as possible. 5. When the form is completed, click the Generate button from within the Certificate Request screen. The Certificate Request screen disappears and the ID of the generated certificate request displays in the drop-down list of certificates within the Self Certificates screen.
  • Page 115: Configuring Snmp Settings

    NOTE The Symbol-AP-5131-MIB contains the majority of the information contained within the Symbol-CC-WS2000-MIB-2.0 file. This feature rich information has been validated with the Motorola WS2000 and proven reliable. The remaining portion of the Symbol-AP-5131-MIB contains supplemental information unique to the access point feature set.
  • Page 116 4-24 AP-51xx Access Point Product Reference Guide If using the Symbol-CC-WS2000-MIB-2.0 and/or Symbol-AP-5131-MIB to configure the AP-5131, use the table below to locate the MIB where the feature can be configured. Feature Feature LAN Configuration Symbol-AP-5131-MIB Subnet Configuration Symbol-CC-WS2000-MIB-2.0 VLAN Configuration Symbol-AP-5131-MIB DHCP Server Symbol-CC-WS2000-MIB-2.0...
  • Page 117 System Configuration 4-25 Automatic Update Symbol-AP-5131-MIB SNMP Access Symbol-CC-WS2000-MIB-2.0 Configuration SNMP Trap Symbol-CC-WS2000-MIB-2.0 Configuration NTP Server Symbol-CC-WS2000-MIB-2.0 Configuration Logging Configuration Symbol-CC-WS2000-MIB-2.0 Firmware Update Symbol-CC-WS2000-MIB-2.0 Wireless Stats Symbol-CC-WS2000-MIB-2.0 Radio Stats Symbol-CC-WS2000-MIB-2.0 MU Stats Symbol-CC-WS2000-MIB-2.0 Automatic Update Symbol-CC-WS2000-MIB-2.0 SNMP allows a network administrator to manage network performance, find and solve network problems, and plan for network growth.
  • Page 118 A read-only community string allows a remote device to retrieve information, while a read/ write community string allows a remote device to modify settings. Motorola recommends considering adding a community definition using a site-appropriate name and access level. Set up a read/write definition (at a minimum) to facilitate full access by the access point administrator.
  • Page 119 System Configuration 4-27 Delete Select Delete to remove a SNMP v1/v2c community definition. Community Use the Community field to specify a site-appropriate name for the community. The name is required to match the name used within the remote network management software. Use the (Object Identifier) pull-down list to specify a setting of All or a enter a Custom OID.
  • Page 120 4-28 AP-51xx Access Point Product Reference Guide Passwords Select Passwords to display the Password Settings screen for specifying authentication and password settings for an SNMP v3 user. The maximum password length is 11 characters. Use the Authentication Algorithm drop-down menu to specify SHA1 as the authentication algorithm.
  • Page 121: Configuring Snmp Access Control

    System Configuration 4-29 7. Click Undo Changes (if necessary) to undo any changes made. Undo Changes reverts the settings displayed on the SNMP Access screen to the last saved configuration. 8. Click Logout to securely exit the access point Access Point applet. A prompt displays confirming the logout before the applet is closed.
  • Page 122 4-30 AP-51xx Access Point Product Reference Guide 2. Configure the SNMP Access Control screen to add the IP addresses of those users receiving SNMP access. Access Control List Enter Start IP and End IP addresses (numerical addresses only, no DNS names supported) to specify a range of user that can access the access point SNMP interface.
  • Page 123: Enabling Snmp Traps

    System Configuration 4-31 Click to return to the SNMP Access screen. Click Apply within the SNMP Access screen to save any changes made on the SNMP Access Control screen. Cancel Click Cancel to undo any changes made on the SNMP Access Control screen.
  • Page 124 4-32 AP-51xx Access Point Product Reference Guide 2. Configure the SNMP v1/v2c Trap Configuration field (if SNMP v1/v2c Traps are used) to modify the following: Click to create a new SNMP v1/v2c Trap Configuration entry. Delete Click Delete to remove a selected SNMP v1/v2c Trap Configuration entry.
  • Page 125 System Configuration 4-33 Click to create a new SNMP v1/v2c Trap Configuration entry. SNMP Version Use the SNMP Version drop-down menu to specify v1 or v2. Some SNMP clients support only SNMP v1 traps, while others support SNMP v2 traps and possibly both, verify the correct traps are in use with clients that support them.
  • Page 126: Configuring Specific Snmp Traps

    Use the SNMP Traps screen to enable specific traps on the access point. Motorola recommends defining traps to capture unauthorized devices operating within the access point coverage area. Trap configuration depends on the network machine that receives the generated traps. SNMP v1/v2c and v3 trap configurations function independently.
  • Page 127 System Configuration 4-35 2. Configure the MU Traps field to generate traps for MU associations, MU association denials and MU authentication denials. When a trap is enabled, a trap is sent every 10 seconds until the condition no longer exists. MU associated Generates a trap when an MU becomes associated with one of the access point’s WLANs.
  • Page 128 4-36 AP-51xx Access Point Product Reference Guide Physical port status Generates a trap whenever the status changes on the access point. change The physical port status changes when a link is lost between the access point and a connected device. DynDNS Update Generates a trap whenever domain name information is updated as a result of the IP address associated with that domain being...
  • Page 129: Configuring Snmp Rf Trap Thresholds

    System Configuration 4-37 7. Click Undo Changes (if necessary) to undo any changes made. Undo Changes reverts the settings displayed on SNMP Traps screen to the last saved configuration. 8. Click Logout to securely exit the access point Access Point applet. A prompt displays confirming the logout before the applet is closed.
  • Page 130 Enter the minimum number of packets that must pass through the packets required for a device before an SNMP rate trap is sent. Motorola recommends trap to fire using the default setting of 1000 as a minimum setting for the field.
  • Page 131: Configuring Network Time Protocol (Ntp)

    System Configuration 4-39 6. Click Logout to securely exit the access point Access Point applet. A prompt displays confirming the logout before the applet is closed. 4.6 Configuring Network Time Protocol (NTP) Network Time Protocol (NTP) manages time and/or network clock synchronization in the access point- managed network environment.
  • Page 132 4-40 AP-51xx Access Point Product Reference Guide 2. From within the Current Time field, click the Refresh button to update the time since the screen was displayed by the user. The Current Time field displays the current time based on the access point system clock. If NTP is disabled or if there are no servers available, the system time displays the access point uptime starting at 1970-01-01 00:00:00, with the time and date advancing.
  • Page 133 System Configuration 4-41 CAUTION If using the Radius time-based authentication feature to authenticate access point user permissions, ensure has been selected from Time Zone field. If UTC is not selected, time based authentication will not work properly. For information on configuring Radius time-based authentication, see Defining User Access Permissions by Group on page...
  • Page 134: Logging Configuration

    4-42 AP-51xx Access Point Product Reference Guide 8. Click Logout to securely exit the access point Access Point applet. A prompt displays confirming the logout before the applet is closed. 4.7 Logging Configuration The access point provides the capability for periodically logging system events that prove useful in assessing the throughput and performance of the access point or troubleshooting problems on the access point managed Local Area Network (LAN).
  • Page 135 System Configuration 4-43 View Log Click View to save a log of events retained on the access point. The system displays a prompt requesting the administrator password before saving the log. After the password has been entered, click Get File to display a dialogue with buttons to Open Save...
  • Page 136: Importing/Exporting Configurations

    4-44 AP-51xx Access Point Product Reference Guide 4. Click Undo Changes (if necessary) to undo any changes made. Undo Changes reverts the settings displayed on the Logging Configuration screen to the last saved configuration. 5. Click Logout to securely exit the access point Access Point applet. A prompt displays confirming the logout before the applet is closed.
  • Page 137 802.1x EAP Radius shared secret password will remain “symbol,” instead of “motorola” (as now required with the 2.0 baseline). If the shared secret password is not changed to “motorola” there will be a shared secret mis-match resulting in MU authentication failures.
  • Page 138 4-46 AP-51xx Access Point Product Reference Guide 2. Configure the FTP and TFTP Import/Export field to import/export configuration settings. Filename Specify the name of the configuration file to be written to the FTP or TFTP server. Server IP Enter the numerical (non DNS name) IP address of the destination FTP or TFTP server where the configuration file is imported or exported.
  • Page 139 System Configuration 4-47 Username Specify a username to be used when logging in to the FTP server. A username is not required for TFTP server logins. Password Define a password allowing access to the FTP server for the import or export operation. Import Configuration Click the Import Configuration...
  • Page 140 4-48 AP-51xx Access Point Product Reference Guide 4. Refer to the Status field to assess the completion of the import/export operation. Status After executing an operation (by clicking any of the buttons in the window), check the Status field for a progress indicator and messages about the success or errors in executing the Import/ Export operation.
  • Page 141: Updating Device Firmware

    AP-5131 or AP-5181 on page B-20. 4.9 Updating Device Firmware Motorola periodically releases updated versions of the access point device firmware to the Motorola Web site. If the access point firmware version displayed on the System Settings page (see...
  • Page 142 Using Auto Update, the access point will automatically update itself twice when upgrading. Upgrading to a new access point firmware baseline does not retain the configuration of the previous (lower version) firmware. Motorola recommends users export their 1.0 configuration for backup purposes prior to upgrading.
  • Page 143 System Configuration 4-51 CAUTION Loaded and signed CA certificates will be lost when changing the access point’s firmware version using either the GUI or CLI. After a certificate has been successfully loaded, export it to a secure location to ensure its availability after a firmware update. If restoring the access point’s factory default firmware, you must export the certificate file BEFORE restoring the access point’s factory default configuration.
  • Page 144 DHCP Options checkboxes to enable/disable automatic firmware and/or configuration file updates. DHCP options are used for out-of-the-box rapid deployment for Motorola wireless products. The following are the two options available on the access point: • Enable Automatic Firmware Update • Enable Automatic Configuration Update Both DHCP options are enabled by default.
  • Page 145 System Configuration 4-53 Enable Automatic Enable this checkbox to allow an automatic firmware update when Firmware Update firmware versions are found to be different between what is running on the access point and the firmware that resides on the server. A firmware update will only occur if the access point is reset or when the access point does a DHCP request.
  • Page 146 •Username - Specify a username for the FTP server login. • Password - Specify a password for FTP server login. Default is motorola. A blank password is not supported. NOTE Click Apply to save the settings before performing the firmware update.
  • Page 147: Upgrade/Downgrade Considerations

    System Configuration 4-55 FAIL: user interrupted FAIL: no valid interface found FAIL: conflict ip address FAIL: command exchange time out FAIL: invalid subnet number 11. Confirm the access point configuration is the same as it was before the firmware update. If they are not, restore the settings.
  • Page 148 Using Auto Update, the access point will automatically update itself twice when upgrading. Upgrading from v1.0 to v1.1/v1.1.1 retains existing settings. Motorola recommends that users export their 1.0 configuration for backup purposes prior to upgrading. When downloading from v1.1.1/v1.1 to v1.0, all configuration settings are lost...
  • Page 149: Chapter 5. Network Management

    Network Management Refer to the following for network management configuration activities supported by the access point user interface: • Configuring the LAN Interface • Configuring WAN Settings • Enabling Wireless LANs (WLANs) • Configuring Router Settings 5.1 Configuring the LAN Interface The access point has one physical LAN port supporting two unique LAN interfaces.
  • Page 150 AP-51xx Access Point Product Reference Guide Use the LAN Configuration screen to enable one (or both) of the access point’s LAN interfaces, assign them names, define which LAN is currently active on the access point Ethernet port and assign a timeout value to disable the LAN connection if no data traffic is detected within a defined interval. To configure the access point LAN interface: 1.
  • Page 151 802.1x supplicant to authenticate to a server on the network. If using 802.1x authentication, enter the authentication server user name and password. The default password is “motorola.” For information on enabling and configuring authentication schemes on the access point, see Enabling Authentication and Encryption Schemes on page 6-5.
  • Page 152 AP-51xx Access Point Product Reference Guide 5. Use the Port Settings field to define how the access point manages throughput over the LAN port. Auto Negotiation Select the Auto Negotiation checkbox to enable the access point to automatically exchange information (over its LAN port) about data transmission speed and duplex capabilities.
  • Page 153: Configuring Vlan Support

    Network Management 5.1.1 Configuring VLAN Support A Virtual Local Area Network (VLAN) is a means to electronically separate data on the same access point from a single broadcast domain into separate broadcast domains. The access point can group devices on one or more WLANs so that they can communicate as if they were attached to the same wire, when in fact they are located on a different LAN segment.
  • Page 154 AP-51xx Access Point Product Reference Guide 1. Select Network Configuration -> from the access point menu tree. 2. Ensure the Enable 802.1q Trunking button is selected from within the LAN Setting field. Trunk links are required to pass VLAN information between destinations. A trunk port is by default a member of all the VLANs existing on the access point and carry traffic for all those VLANs.
  • Page 155 5. Define a 32 ASCII character maximum VLAN Name. Enter a unique name that identifies members of the VLAN. Motorola recommends selecting the name carefully, as the VLAN name should signify a group of clients with a common set of requirements independent of their physical location.
  • Page 156 By default, the access point forwards untagged traffic with the native VLAN configured for the port. The Native VLAN is VLAN 1 by default. Motorola suggests leaving the Native VLAN set to 1 as other layer 2 devices also have their Native VLAN set to 1.
  • Page 157: Configuring Lan1 And Lan2 Settings

    VLAN to map to the WLAN listed on the left-hand side of the screen. Motorola recommends mapping VLANs strategically in order to keep VLANs tied to the discipline they most closely match. For example, If WLAN1 is comprised of MUs supporting the sales area, then WLAN1 should be mapped to sales if a sales VLAN has been already been created.
  • Page 158 2. Configure the DHCP Configuration field to define the DHCP settings used for the LAN. NOTE Motorola recommends the WAN and LAN ports should not both be configured as DHCP clients. This interface is a Select this button to enable DHCP to set network address DHCP Client information via this LAN1 or LAN2 connection.
  • Page 159 Network Management 5-11 This interface is a Select this button to enable BOOTP to set access point network BOOTP Client address information via this LAN1 or LAN2 connection. When selected, only BOOTP responses are accepted by the access point. If both DHCP and BOOTP services are required, do not select BOOTP Client.
  • Page 160: Configuring Advanced Dhcp Server Settings

    5-12 AP-51xx Access Point Product Reference Guide Secondary DNS Motorola recommends entering the numerical IP address of an Server additional DNS server (if available), used if the primary DNS server goes down. A maximum of two DNS servers can be used.
  • Page 161 Network Management 5-13 To generate a list of client MAC address to IP address mappings for the access point: 1. Select Network Configuration -> -> LAN1 (or LAN2) from the access point menu tree. 2. Click the Advanced DHCP Server button from within the LAN1 LAN2...
  • Page 162: Setting The Type Filter Configuration

    5-14 AP-51xx Access Point Product Reference Guide 6. Click to return to the LAN1 or LAN2 page, where the updated settings within the Advanced DHCP Server screen can be saved by clicking the Apply button. 7. Click Cancel to undo any changes made. Undo Changes reverts the settings displayed to the last saved configuration.
  • Page 163 Network Management 5-15 2. Use the all ethernet types, except drop-down menu to designate whether the Ethernet Types defined for the LAN are allowed or denied for use by the access point. 3. To add an Ethernet type, click the button.
  • Page 164: Configuring Wan Settings

    Packet types supported for the type filtering function include 16-bit DIX Ethernet types as well as Motorola proprietary types. Select an Ethernet type from the drop down menu, or enter the Ethernet type’s hexadecimal value. See your System Administrator if unsure of the implication of adding or omitting a type from the list for either LAN1 or LAN2.
  • Page 165 WAN IP Configuration field to enable the WAN interface, and set network address information for the WAN connection. NOTE Motorola recommends that the WAN and LAN ports should not both be configured as DHCP clients. Enable WAN Interface Select the...
  • Page 166 The ISP or a network administrator provides this address. A DNS server translates a domain name (for example, www.motorola.com) into an IP address that networks can use. Secondary DNS Specify the address of a secondary DNS server if one is used. A...
  • Page 167 Network Management 5-19 More IP Addresses Click the More IP Addresses button to specify additional static IP addresses for the access point. Additional IP addresses are required when users within the WAN need dedicated IP addresses, or when servers need to be accessed (addressed) by the outside world.
  • Page 168 5-20 AP-51xx Access Point Product Reference Guide half duplex Select this option to transmit data to and from the access point, but not at the same time. Using a half duplex transmission, the access point can send data over its WAN port then immediately receive data from the same direction in which the data was transmitted.
  • Page 169: Configuring Network Address Translation (Nat) Settings

    Network Management 5-21 Idle Time (seconds) Specify an idle time in seconds to limit how long the access point’s WAN connection remains active after outbound and inbound traffic is not detected. The Idle Time field is grayed out if Keep-Alive enabled.
  • Page 170 5-22 AP-51xx Access Point Product Reference Guide requests, and minimizes the number of WAN IP addresses needed when a range of local IP addresses is mapped to each WAN IP address. NAT can be applied in one of two ways: •...
  • Page 171: Configuring Port Forwarding

    Network Management 5-23 NAT Type Specify the NAT Type as 1 to 1 to map a WAN IP address to a single host (local) IP address. 1 to 1 mapping is useful when users need dedicated addresses, and for public-facing servers connected to the access point.
  • Page 172 5-24 AP-51xx Access Point Product Reference Guide To configure port forwarding for the access point: 1. Select Network Configuration -> -> from the access point menu tree. 2. Select 1 to 1 1 to Many from the NAT Type drop-down menu. 3.
  • Page 173: Configuring Dynamic Dns

    Network Management 5-25 Start Port and End Port Enter the port or ports used by the port forwarding service. To specify a single port, enter the port number in the Start Port area. To specify a range of ports, use both the Start Port End Port options to enter the port numbers.
  • Page 174 5-26 AP-51xx Access Point Product Reference Guide 2. Select the Enable checkbox to allow domain name information to be updated when the IP address associated with that domain changes. A username, password and hostname must be specified for domain name information to be updated.
  • Page 175: Enabling Wireless Lans (Wlans)

    Network Management 5-27 NOTE DynDNS supports devices directly connected to the Internet. Having VPN enabled, and the DynDNS Server on the other side of the VPN is not supported. 7. Once the DynDNS configuration has been updated, click the Show Update Response button to open a sub-screen displaying the hostname, IP address and any messages received during an update from the DynDNS Server.
  • Page 176 5-28 AP-51xx Access Point Product Reference Guide If a WLAN is defined, that WLAN displays within the Wireless Configuration screen. When the access point is first booted, WLAN1 exists as a default WLAN available immediately for connection. 2. Refer to the information within the Wireless Configuration screen to view the name, ESSID, access point radio designation, VLAN ID and security policy of existing WLANs.
  • Page 177 Network Management 5-29 Radio Radio field displays the name of the access point radio the WLAN is mapped to (either the 802.11a radio or the 802.11b/g radio). To change the radio designation for a specific WLAN, see Creating/Editing Individual WLANs on page 5-30.
  • Page 178: Creating/Editing Individual Wlans

    5-30 AP-51xx Access Point Product Reference Guide 5.3.1 Creating/Editing Individual WLANs If the WLANs displayed within the Wireless Configuration screen do not satisfy your network requirements, you can either create a new WLAN or edit the properties of an existing WLAN. NOTE Before editing the properties of an existing WLAN, ensure it is not being used by an access point radio, or is a WLAN that is needed in its current configuration.
  • Page 179 Network Management 5-31 3. Set the parameters in the Configuration field as required for the WLAN. ESSID Enter the Extended Services Set Identification (ESSID) associated with the WLAN. The WLAN name is auto-generated using the ESSID until changed by the user. The maximum number of characters that can be used for the ESSID is 32.
  • Page 180 5-32 AP-51xx Access Point Product Reference Guide Name Define or revise the name for the WLAN. The name should be logical representation of WLAN coverage area (engineering, marketing etc.). The maximum number of characters that can be used for the name is 31. Available On Use the Available On...
  • Page 181 Network Management 5-33 CAUTION A WLAN cannot be enabled for both mesh and hotspot support at the same time. Only one of these two options can be enabled at one time, as the GUI and CLI will prevent both from being enabled. NOTE If 802.11a is selected as the radio used for the WLAN, the WLAN cannot use a Kerberos supported security policy.
  • Page 182: Configuring Wlan Security Policies

    ESSID. If a hacker tries to find an ESSID via an MU, the ESSID does not display since the ESSID is not in the beacon. Motorola recommends keeping the option enabled to reduce the likelihood of hacking into the WLAN.
  • Page 183 Network Management 5-35 security requirements of the WLAN. Once new policies are defined, they are available within the New WLAN Edit WLAN screens and can be mapped to any WLAN. A single security policy can be used by more than one WLAN if its logical to do so. For example, there may be two or more WLANs within close proximity of each other requiring the same data protection scheme.
  • Page 184: Configuring A Wlan Access Control List (Acl)

    WLANs based on MU interoperability requirements. Motorola recommends using the New MU ACL Policy or Edit MU ACL Policy screens strategically to name and configure ACL policies meeting the requirements of the particular WLANs they may map to.
  • Page 185 Network Management 5-37 2. Click the Create button to configure a new ACL policy, or select a policy and click the Edit button to modify an existing ACL policy. The access point supports a maximum of 16 MU ACL policies.
  • Page 186 5-38 AP-51xx Access Point Product Reference Guide Either the New MU ACL Policy Edit MU ACL Policy screens display. 3. Assign a name to the new or edited ACL policy that represents an inclusion or exclusion policy specific to a particular type of MU traffic you may want to use with a single or group of WLANs.
  • Page 187: Setting The Wlan Quality Of Service (Qos) Policy

    WLANs based on MU interoperability requirements. Motorola recommends using the New QoS Policy and Edit QoS Policy screens strategically to name and configure QoS policies meeting the requirements of the particular WLANs they may to. However, be careful not to name policies after specific WLANs, as individual QoS policies can be used by more than one WLAN.
  • Page 188 5-40 AP-51xx Access Point Product Reference Guide NOTE When the access point is first launched, a single QoS policy (default) is available and mapped to WLAN 1. It is anticipated additional QoS policies will be created as the list of WLANs grows. 2.
  • Page 189 Network Management 5-41 3. Assign a name to the new or edited QoS policy that makes sense to the access point traffic receiving priority. More than one WLAN can use the same QoS policy. 4. Select the Support Voice prioritization checkbox to allow legacy voice prioritization.
  • Page 190 11b voice Use this setting for “Voice-Over-IP” traffic over the 802.11b radio. CAUTION Motorola recommends using the drop-down menu to define the intended radio traffic within the WLAN. Once an option is selected, you do not need to adjust the values for the Access Categories, unless qualified to do so.
  • Page 191 Network Management 5-43 Background Backgrounds traffic is typically of a low priority (file transfers, print jobs ect.). Background traffic typically does not have strict latency (arrival) and throughput requirements. Best Effort Best Effort traffic includes traffic from legacy devices or applications lacking QoS capabilities.
  • Page 192 5-44 AP-51xx Access Point Product Reference Guide TXOPs Time ms TXOP times range from 0.2 ms (background priority) to 3 ms (video priority) in a 802.11a network, and from 1.2 ms to 6 ms in an 802.11b/g network. The TXOP bursting capability greatly enhances the efficiency for high data rate traffic such as streaming video 9.
  • Page 193: Configuring Wlan Hotspot Support

    Network Management 5-45 5.3.1.4 Configuring WLAN Hotspot Support The access point enables hotspot operators to provide user authentication and accounting without a special client application. The access point uses a traditional Internet browser as a secure authentication device. Rather than rely on built-in 802.11security features to control access point association privileges, configure a WLAN with no WEP (an open network).
  • Page 194 5-46 AP-51xx Access Point Product Reference Guide 3. Refer to the HTTP Redirection field to specify how the Login, Welcome, and Fail pages are maintained for this specific WLAN. The pages can be hosted locally or remotely Use Default Files Select the Use Default Files checkbox if the login, welcome and...
  • Page 195 Network Management 5-47 Use External URL Select the Use External URL checkbox to define a set of external URLs for hotspot users to access the login, welcome and fail pages. To create a redirected page, you need to have a TCP termination locally.
  • Page 196 5-48 AP-51xx Access Point Product Reference Guide NOTE The Enable Hotspot User Timeout option is only available if using the access point’s internal Radius Server for user authentication. 6. Click the White List Entries button (within the WhiteList Configuration field) to create a set of allowed destination IP addresses.
  • Page 197 Network Management 5-49 8. Refer to the Radius Configuration field to define a primary and secondary Radius server port and shared secret password. Select mode Use the Select mode drop-down menu to define whether an Internal or External server is to be used for the primary server. Pri Server IP Define the IP address of the primary Radius server.
  • Page 198 5-50 AP-51xx Access Point Product Reference Guide When a client requests a URL from a Web server, the login handler returns an HTTP redirection status code (for example, 301 Moved Permanently), which indicates to the browser it should look for the page at another URL.
  • Page 199: Setting The Wlan's Radio Configuration

    Network Management 5-51 5.3.2 Setting the WLAN’s Radio Configuration Each access point WLAN can have a separate 802.11a or 802.11b/g radio configured and mapped to that WLAN. The first step is to enable the radio. One of two possible radio configuration pages are available on the access point depending on which model SKU is purchased.
  • Page 200 5-52 AP-51xx Access Point Product Reference Guide 2. Enable the radio(s) using the Enable checkbox(es). Refer to RF Band of Operation parameter to ensure you are enabling the correct 802.11a or 802.11b/g radio. After the settings are applied within this Radio Configuration screen, the Radio Status MUs connected values update.
  • Page 201 WLAN (ESS) the client bridge uses to establish a wireless link. The default setting, is (WLAN1). Motorola recommends creating (and naming) a WLAN specifically for mesh networking support to differentiate the Mesh supported WLAN from non-Mesh supported WLANs.
  • Page 202 5-54 AP-51xx Access Point Product Reference Guide Once the settings within the Radio Configuration screen are applied (for an initial deployment), the current number of base bridges visible to the radio displays within the Visible field, and the number of base bridges currently connected to the radio displays within the BBs Connected field.
  • Page 203: Configuring The 802.11A Or 802.11B/G Radio

    Network Management 5-55 For a detailed overview on mesh networking and how to configure the radio for mesh networking support, see Configuring Mesh Networking Support on page 9-6. 8. Click Apply to save any changes to the Radio Configuration screen. Navigating away from the screen without clicking Apply results in all changes to the screens being lost.
  • Page 204 5-56 AP-51xx Access Point Product Reference Guide 2. Configure the Properties field to assign a name and placement designation for the radio. Placement Use the Placement drop-down menu to specify whether the radio is located outdoors or indoors. Default placement depends on the country of operation selected for the access point.
  • Page 205 Network Management 5-57 Radio Type Radio Type parameter simply displays the radio type as 802.11a or 802.11b/g. This field is read only and always displays the radio type selected from the access point menu tree under the Radio Configuration item. ERP Protection Extended Rate PHY (ERP) allows 802.11g MUs to interoperate with 802.11b only MUs.
  • Page 206 Clicking Cancel reverts the Set Rates screen to the last saved configuration. Motorola recommends using the default rates unless qualified to understand the performance risks of changing them. The appearance of the Set Rates screen varies depending on the 802.11a or 802.11b/g used, as the dates rates available to the...
  • Page 207 Motorola recommends decreasing the DTIM interval for that specific BSSID. However, decreasing the DTIM interval decreases the battery life on power save stations. The default is 10 for each BSSID. Motorola recommends using the default value unless qualified to understand the performance risks of changing it.
  • Page 208 5-60 AP-51xx Access Point Product Reference Guide 5. Refer to the QBSS Load Element Setting field to optionally allow the access point to communicate channel usage data to associated devices and define the beacon interval used for channel utilization transmissions. The QBSS load represents the percentage of time the channel is in use by the access point and its station count.
  • Page 209 802.11b/g radio, not the QoS policies configured for the WLAN (as created or edited from the Quality of Service Configuration screen). Motorola recommends only advanced users manually set these values. If the type of data-traffic is known, use the drop-down menu to select a 11g-wifi, 11b-wifi, 11g-default,...
  • Page 210 5-62 AP-51xx Access Point Product Reference Guide Defining Primary WLANs allows an administrator to dedicate BSSIDs (4 BSSIDs are available for mapping) to WLANs. From that initial BSSID assignment, Primary WLANs can be defined from within the WLANs assigned to BSSID groups 1 through 4. Each BSSID beacons only on the primary WLAN.
  • Page 211: Configuring Bandwidth Management Settings

    Network Management 5-63 WLAN Lists the WLAN names available to the 802.11a or 802.11b/g radio that can be assigned to a BSSID. BSSID Assign a BSSID value of 1 through 4 to a WLAN in order to map the WLAN to a specific BSSID. BC/MC Cipher A read only field displaying the downgraded BC/MC (Broadcast/ Multicast) cipher for a WLAN based on the BSSID and VLAN ID to...
  • Page 212 5-64 AP-51xx Access Point Product Reference Guide 1. Select Network Configuration -> Wireless -> Bandwidth Management from the access point menu tree. 2. Select either the Radio 1(802.11b/g) Radio 2(802.11a) tab to display the WLANs enabled for the selected radio and their existing configurations. The WLANs displaying for the selected radio were assigned when the WLAN was created or modified.
  • Page 213 Network Management 5-65 Weighted Round- If selected, a weighting (prioritization) scheme (configured within Robin the QoS Configuration screen) is used to define which WLANs access point receive resources first. 4. Configure the Bandwidth Share for Each WLAN field to set a raw weight (for WLANs using the Weighted Round-Robin option) for each WLAN.
  • Page 214: Configuring Router Settings

    5-66 AP-51xx Access Point Product Reference Guide NOTE Though the Rogue AP and Firewall features appear after the Bandwidth Management features within the access point menu tree, they are described in Chapter 6, Configuring Access Point Security on page 6-1, as both items are data protection functions.
  • Page 215: Setting The Rip Configuration

    Network Management 5-67 2. Refer to the access point Router Table field to view existing routes. The access point Router Table field displays a list of connected routes between an enabled subnet and the router. These routes can be changed by modifying the IP address and subnet masks of the enabled subnets.
  • Page 216 5-68 AP-51xx Access Point Product Reference Guide 1. From within the RIP Configuration field, select the RIP Type from the drop-down menu. The following options are available: No RIP No RIP option prevents the access point’s router from exchanging routing information with other routers. Routing information may not be appropriate to share, for example, if the access point manages a private LAN.
  • Page 217 Network Management 5-69 3. If RIP v2 or RIP v2 (v1 compat) is the selected RIP type, the RIP v2 Authentication field becomes active. Select the type of authentication to use from the Authentication Type drop-down menu. Available options include: None This option disables the RIP authentication.
  • Page 218 5-70 AP-51xx Access Point Product Reference Guide 5. If the MD5 authentication method is selected, fill in the Key #1 field (Key #2 is optional). Enter any numeric value between 0 and 256 into the MD5 ID area. Enter a string consisting of up to 16 alphanumeric characters in the MD5 Auth Key area.
  • Page 219: Chapter 6. Configuring Access Point Security

    Configuring Access Point Security Security measures for the access point and its WLANs are critical. Use the available access point security options to protect the access point LAN from wireless vulnerabilities, and safeguard the transmission of RF packets between the access point and its associated MUs. WLAN security can be configured on an ESS by ESS basis on the access point.
  • Page 220: Configuring Security Options

    AP-51xx Access Point Product Reference Guide NOTE Security for the access point can be configured in various locations throughout the access point menu structure. This chapter outlines the security options available to the access point, and the menu locations and steps required to configure specific security measures.
  • Page 221: Setting Passwords

    NOTE DNS names are not supported as a valid IP address for the access point. The user is required to enter a numerical IP address. 4. Log in using the “admin” as the default Username and “motorola” as the default Password.
  • Page 222: Resetting The Access Point Password

    6.2.1 Resetting the Access Point Password The access point Command Line Interface (CLI) enables users who forget their password to reset it to the factory default (motorola). From there, a new password can be defined. To reset the password back to its default setting: 1.
  • Page 223: Enabling Authentication And Encryption Schemes

    When the access point re-boots again, the password will return to its default value of “motorola.” You can now access the access point. 6.3 Enabling Authentication and Encryption Schemes To complement the built-in firewall filters on the WAN side of the access point, the WLAN side of the access point supports authentication and encryption schemes.
  • Page 224 Remember, multiple WLANs can share the same security policy, so be careful not to name security policies after specific WLANs or risk defining a WLAN to single policy. Motorola recommends naming the policy after the attributes of the authentication or encryption type...
  • Page 225 Configuring Access Point Security 4. Enable and configure an Authentication option if necessary for the target security policy. Manually Pre-Shared Select this button to disable authentication. This is the default Key / No value for the Authentication field. Authentication Kerberos Select the Kerberos button to display the...
  • Page 226: Configuring Kerberos Authentication

    Once a client and server use Kerberos to prove their identity, they can encrypt all communications to assure privacy and data integrity. Kerberos can only be used on the access point with Motorola 802.11b clients.
  • Page 227 NTP server. NOTE If 802.11a is selected as the radio used for a specific WLAN, the WLAN cannot use a Kerberos supported security policy, as no Motorola 802.11a clients can support Kerberos. To configure Kerberos on the access point: 1.
  • Page 228 Realm Name Specify a realm name that is case-sensitive, for example, MOTOROLA.COM. The realm name is the name domain/realm name of the KDC Server. A realm name functions similarly to a DNS domain name. In theory, the realm name is arbitrary. However, in practice a Kerberos realm is named by uppercasing the DNS domain name that is associated with hosts in the realm.
  • Page 229: Configuring 802.1X Eap Authentication

    Configuring Access Point Security 6-11 Backup KDC Optionally, specify a numerical (non-DNS) IP address and port for a backup KDC. Backup KDCs are referred to as slave servers. The slave server periodically synchronizes its database with the primary (or master) KDC. Remote KDC Optionally, specify a numerical (non-DNS) IP address and port for a remote KDC.
  • Page 230 6-12 AP-51xx Access Point Product Reference Guide 3. Select the 802.1x EAP radio button. 802.1x EAP Settings field displays within the New Security Policy screen. 4. Ensure the Name of the security policy entered suits the intended configuration or function of the policy.
  • Page 231 Configuring Access Point Security 6-13 Radius Server If using an External Radius Server, specify the numerical (non-DNS) Address IP address of a primary Remote Dial-In User Service (Radius) server. Optionally, specify the IP address of a secondary server. The secondary server acts as a failover server if the primary server cannot be contacted.
  • Page 232 6-14 AP-51xx Access Point Product Reference Guide 7. Select the Accounting tab as required to define a timeout period and retry interval Syslog for MUs interoperating with the access point and EAP authentication server. The items within this tab could be enabled or disabled depending on whether Internal or External has been selected from the Radius Server drop-down menu.
  • Page 233 Configuring Access Point Security 6-15 Max. Retries (1-99) Define the maximum number of MU retries to reauthenticate after retries failing to complete the EAP process. Failure to reauthenticate in the specified number of retries results in a terminated connection. The default is 2 retries.
  • Page 234: Configuring Wep Encryption

    6-16 AP-51xx Access Point Product Reference Guide 6.6 Configuring WEP Encryption Wired Equivalent Privacy (WEP) is a security protocol specified in the IEEE Wireless Fidelity (Wi-Fi) standard. WEP is designed to provide a WLAN with a level of security and privacy comparable to that of a wired LAN.
  • Page 235 The pass key can be any alphanumeric string. The access point, other proprietary routers and Motorola MUs use the algorithm to convert an ASCII string to the same hexadecimal number. MUs without Motorola adapters need to use WEP keys manually...
  • Page 236: Configuring Keyguard Encryption

    6.7 Configuring KeyGuard Encryption KeyGuard is a proprietary encryption method developed by Motorola. KeyGuard is Motorola's enhancement to WEP encryption, and was developed before the finalization of WPA-TKIP. This encryption implementation is based on the IEEE Wireless Fidelity (Wi-Fi) standard, 802.11i.
  • Page 237 Configuring Access Point Security 6-19 1. Select Network Configuration -> Wireless -> Security from the access point menu tree. If security policies supporting KeyGuard exist, they appear within the Security Configuration screen. These existing policies can be used as is, or their properties edited by clicking the Edit button.
  • Page 238 The pass key can be any alphanumeric string. The other proprietary routers, and Motorola MUs use the algorithm to convert an ASCII string to the same hexadecimal number. MUs without Motorola adapters need to use WEP keys manually configured as hexadecimal numbers.
  • Page 239: Configuring Wpa/Wpa2 Using Tkip

    Configuring Access Point Security 6-21 6.8 Configuring WPA/WPA2 Using TKIP Wi-Fi Protected Access (WPA) is a robust encryption scheme specified in the IEEE Wireless Fidelity (Wi-Fi) standard, 802.11i. WPA provides more sophisticated data encryption than WEP. WPA is designed for corporate networks and small-business environments where more wireless traffic allows quicker discovery of encryption keys by an unauthorized person.
  • Page 240 6-22 AP-51xx Access Point Product Reference Guide 5. Configure the Key Rotation Settings area as needed to broadcast encryption key changes to MUs and define the broadcast interval. Broadcast Key Select the Broadcast Key Rotation checkbox to enable or disable Rotation broadcast key rotation.
  • Page 241 Configuring Access Point Security 6-23 6. Configure the Key Settings area as needed to set an ASCII Passphrase and key values. ASCII Passphrase To use an ASCII passphrase (and not a hexadecimal value), select the checkbox and enter an alphanumeric string of 8 to 63 characters.
  • Page 242: Configuring Wpa2-Ccmp (802.11I)

    6-24 AP-51xx Access Point Product Reference Guide 9. Click the Apply button to save any changes made within this New Security Policy screen. 10. Click the Cancel button to undo any changes made within the WPA/TKIP Settings field and return to the WLAN screen.
  • Page 243 Configuring Access Point Security 6-25 5. Configure the Key Rotation Settings field as required to set Broadcast Key Rotation and the update interval. Broadcast Key Select the Broadcast Key Rotation checkbox to enable or disable Rotation broadcast key rotation. When enabled, the key indices used for encrypting/decrypting broadcast traffic will be alternatively rotated on every interval specified in the Broadcast Key Rotation Interval.
  • Page 244 WPA-TKIP and WPA2-TKIP but do not support WPA2-CCMP. Motorola recommends enabling this feature if WPA-TKIP or WPA2-TKIP supported MUs operate within a WLAN populated by WPA2-CCMP enabled clients. 8. Configure the Fast Roaming (802.1x only)
  • Page 245: Configuring Firewall Settings

    Configuring Access Point Security 6-27 NOTE PMK key caching is enabled internally by default when 802.1x EAP authentication is enabled. 9. Click the Apply button to save any changes made within this New Security Policy screen. 10. Click the Cancel button to undo any changes made within the WPA2/CCMP Settings field and return to the WLAN...
  • Page 246 6-28 AP-51xx Access Point Product Reference Guide 2. Refer to the Global Firewall Disable field to enable or disable the access point firewall. Disable Firewall Select the Disable Firewall checkbox to disable all firewall functions on the access point. This includes firewall filters, NAT, VP, content filtering, and subnet access.
  • Page 247 Configuring Access Point Security 6-29 4. Refer to the Configurable Firewall Filters field to set the following firewall filters: SYN Flood Attack A SYN flood attack requests a connection and then fails to Check promptly acknowledge a destination host's response, leaving the destination host vulnerable to a flood of connection requests.
  • Page 248: Configuring Lan To Wan Access

    6-30 AP-51xx Access Point Product Reference Guide 6.10.1 Configuring LAN to WAN Access The access point LAN can be configured to communicate with the WAN side of the access point. Use Subnet Access screen to control access from the LAN1 (or LAN2) interfaces to the WAN interface.
  • Page 249 Configuring Access Point Security 6-31 3. Configure the Rules field as required to allow or deny access to selected (enabled) protocols. Allow or Deny all Use the drop-down menu to select either Allow Deny. protocols, except selected setting applies to all protocols except those with enabled checkboxes and any traffic that is added to the table.
  • Page 250 6-32 AP-51xx Access Point Product Reference Guide Pre configured Rules The following protocols are preconfigured with the access point. To enable a protocol, check the box next to the protocol name. • HTTP - Hypertext Transfer Protocol is the protocol for transferring files on the Web.
  • Page 251: Available Protocols

    Configuring Access Point Security 6-33 End Port Enter the ending port number for a port range. If the protocol uses a single port, leave the field blank. A new entry might use Web Traffic for its name, TCP for its protocol, and 80 for its port number. 4.
  • Page 252: Configuring Advanced Subnet Access

    6-34 AP-51xx Access Point Product Reference Guide between two end points. ESP can also be used in tunnel mode, providing security like that of a Virtual Private Network (VPN). • GRE - General Routing Encapsulation supports VPNs across the Internet. GRE is a mechanism for encapsulating network layer protocols over any other network layer protocol.
  • Page 253 Configuring Access Point Security 6-35 2. Configure the Settings field as needed to override the settings in the Subnet Access screen and import firewall rules into the Advanced Subnet Access screen. Override Subnet Select this checkbox to enable advanced subnet access rules and Access settings disable existing subnet access rules, port forwarding, and 1 to many mappings from the system.
  • Page 254: Configuring Vpn Tunnels

    6-36 AP-51xx Access Point Product Reference Guide Source IP Source IP range defines the origin address or address range for the firewall rule. To configure the Source IP range, click on the field. A new window displays for entering the IP address and range. Destination IP Destination IP range determines the target address or...
  • Page 255 Configuring Access Point Security 6-37 Use the screen to add and remove VPN tunnels. To configure an existing VPN tunnel, select it from the list in the VPN Tunnels field. The selected tunnel’s configuration displays in a VPN Tunnel Config field.
  • Page 256 6-38 AP-51xx Access Point Product Reference Guide Tunnel Name Tunnel Name column lists the name of each VPN tunnel on access point Remote Subnet Remote Subnet column lists the remote subnet for each tunnel. The remote subnet is the subnet the remote network uses for connection.
  • Page 257 Configuring Access Point Security 6-39 Interface name Use the drop-down menu to specify the LAN1, LAN2 or WAN connection used for routing VPN traffic. Remember, only one LAN connection can be active on the access point Ethernet port at a time.
  • Page 258: Configuring Manual Key Settings

    6-40 AP-51xx Access Point Product Reference Guide IKE Settings After selecting Auto (IKE) Key Exchange, click the IKE Settings button to open a screen where IKE specific settings can be configured. For more information, see Configuring IKE Key Settings on page 6-47.
  • Page 259 Configuring Access Point Security 6-41 3. Configure the Manual Key Settings screen to modify the following: NOTE When entering Inbound or Outbound encryption or authentication keys, an error message could display stating the keys provided are “weak”. Some WEP attack tools invoke a dictionary to hack WEP keys based on commonly used words.
  • Page 260 6-42 AP-51xx Access Point Product Reference Guide AH Authentication AH provides data authentication and anti-replay services for the VPN tunnel. Select the required authentication method from the drop-down menu: • None - Disables AH authentication. The rest of the fields are not active.
  • Page 261 Configuring Access Point Security 6-43 ESP Encryption Select the encryption and authentication algorithms for the VPN Algorithm tunnel using the drop-down menu. • DES - Uses the DES encryption algorithm requiring 64-bit (16-character hexadecimal) keys. • 3DES - Uses the 3DES encryption algorithm requiring 192-bit (48-character hexadecimal) keys.
  • Page 262: Configuring Auto Key Settings

    6-44 AP-51xx Access Point Product Reference Guide Inbound SPI (Hex) Define an (up to) six-character (maximum) hexadecimal value to identify the inbound security association created by the encryption algorithm. The value must match the corresponding outbound SPI value configured on the remote security gateway. Outbound SPI (Hex) Enter an (up to) six-character (maximum) hexadecimal value to identify the outbound security association created by the...
  • Page 263 Configuring Access Point Security 6-45 3. Configure the Auto Key Settings screen to modify the following: Use Perfect Forward Forward secrecy is a key-establishment protocol guaranteeing the Secrecy discovery of a session key or long-term private key does not compromise the keys of other sessions. Select to enable Perfect Forward Secrecy.
  • Page 264 6-46 AP-51xx Access Point Product Reference Guide ESP Type ESP provides packet encryption, optional data authentication and anti-replay services for the VPN tunnel. Use the drop-down menu to select the ESP type. • None - Disables ESP. The rest of the fields are not active. •...
  • Page 265: Configuring Ike Key Settings

    Configuring Access Point Security 6-47 6.11.3 Configuring IKE Key Settings The Internet Key Exchange (IKE) is an IPsec standard protocol used to ensure security for VPN negotiation and remote host or network access. IKE provides an automatic means of negotiation and authentication for communication between two or more parties.
  • Page 266 • FQDN - Select FQDN if the remote ID type is a fully qualified domain name (such as sj.motorola.com). The setting for this field does not have to be fully qualified, however it must match the setting for the Certificate Authority.
  • Page 267 Configuring Access Point Security 6-49 IKE Authentication Select the appropriate IKE authentication mode: Mode • Pre-Shared Key (PSK) - Specify an authenticating algorithm and passcode used during authentication. • RSA Certificates - Select this option to use RSA certificates for authentication purposes. See the CA Certificates and Self certificates screens to create and import certificates into the system.
  • Page 268: Viewing Vpn Status

    6-50 AP-51xx Access Point Product Reference Guide Diffie Hellman Group Select a Diffie-Hellman Group to use. The Diffie-Hellman key agreement protocol allows two users to exchange a secret key over an insecure medium without any prior secrets. Two algorithms exist, 768-bit and 1024-bit. Select one of the following options: •...
  • Page 269 Configuring Access Point Security 6-51 2. Reference the Security Associations field to view the following: Tunnel Name Tunnel Name column lists the names of all the tunnels configured on the access point. For information on configuring a tunnel, see Configuring VPN Tunnels on page 6-36.
  • Page 270: Configuring Content Filtering Settings

    6-52 AP-51xx Access Point Product Reference Guide Life Time Use the Life Time column to view the lifetime associated with a particular Security Association (SA). Each SA has a finite lifetime defined. When the lifetime expires, the SA can no longer be used to protect data traffic.
  • Page 271 Configuring Access Point Security 6-53 To configure content filtering for the access point: 1. Select Network Configuration -> -> Content Filtering from the access point menu tree. 2. Configure the HTTP field to configure block Web proxies and URL extensions. Block Outbound HTTP HyperText Transport Protocol (HTTP) is the protocol used to transfer information to and from Web sites.
  • Page 272 6-54 AP-51xx Access Point Product Reference Guide Block Outbound URL Enter a URL extension or file name per line in the format of Extensions filename.ext. An asterisk (*) can be used as a wildcard in place of the filename to block all files with a specific extension. 3.
  • Page 273: Configuring Rogue Ap Detection

    It is possible that not all of the devices identified by the access point are operating legitimately within the access point’s radio coverage area. A rogue AP is a device located nearby an authorized Motorola access point but recognized as having properties rendering its operation illegal and threatening to the access point and the LAN.
  • Page 274 6-56 AP-51xx Access Point Product Reference Guide The rogue detection interval is used in conjunction with Motorola MUs that identify themselves as rogue detection capable to the access point. The detection interval defines how often the access point requests these MUs to scan for a rogue AP. A shorter interval can affect the performance of the MU, but it will also decrease the time it takes for the access point to scan for a rogue AP.
  • Page 275 3. Use the field to restrict Motorola AP’s from Rogue AP detection and create Allowed AP List a list of device MAC addresses and ESSID’s approved for interoperability with the access point.
  • Page 276 6-58 AP-51xx Access Point Product Reference Guide Click to display a single set of editable MAC address and ESS address values. Del (Delete) Click the Delete button to remove the highlighted line from the Rule Management field. The MAC and ESS address information previously defined is no longer applicable unless the previous configuration is restored.
  • Page 277: Moving Rogue Aps To The Allowed Ap List

    Configuring Access Point Security 6-59 6.13.1 Moving Rogue APs to the Allowed AP List Active APs screen enables the user to view the list of detected rogue APs and, if necessary, select and move an AP into a list of allowed devices. This is helpful when the settings defined within Rogue AP Detection screen inadvertently detect and define a device as a rogue AP.
  • Page 278: Displaying Rogue Ap Details

    7. To remove the Rogue AP entries displayed within the e Rogue APs field, click the Clear Rogue AP List button. Motorola only recommends clearing the list of Rogue APs when the devices displaying within the list do not represent a threat to the access point managed network. 8. Click Apply to save any changes to the Active APs screen.
  • Page 279 BSSID/MAC Displays the MAC address of the rogue AP. This information could be useful if the MAC address is determined to be a Motorola MAC address and the device is interpreted as non-hostile and the device should be defined as an allowed AP.
  • Page 280: Using Mus To Detect Rogue Devices

    6-62 AP-51xx Access Point Product Reference Guide Detection Method Displays the RF Scan by RF On-Channel Detection Scan by Detector Radio method selected from the Rogue AP screen to detect rogue devices. For information on detection methods, see Configuring Rogue AP Detection on page 6-55.
  • Page 281 Configuring Access Point Security 6-63 2. Highlight an MU from within the Rogue AP enabled MUs field and click the scan button. The target MU begins scanning for rogue devices using the detection parameters defined within the Rogue AP Detection screen. To modify the detection parameters, see Configuring Rogue AP Detection on page 6-55.
  • Page 282: Configuring User Authentication

    6-64 AP-51xx Access Point Product Reference Guide 5. Highlight a different MU from the Rogue AP enabled MUs field as needed to scan for additional rogue APs. 6. Click Logout to return to the Rogue AP Detection screen. 6.14 Configuring User Authentication The access point can work with external Radius and LDAP Servers (AAA Servers) to provide user database information and user authentication.
  • Page 283 Configuring Access Point Security 6-65 2. From within the Data Source Configuration field, use the Data Source drop-down menu to select the data source for the Radius server. Local An internal user database serves as the data source. Use the User Database screen to enter the user data.
  • Page 284 6-66 AP-51xx Access Point Product Reference Guide Default Specify a PEAP and/or TTLS Authentication Type for EAP to use Authentication Type from the drop-down menu to the right of each checkbox item. PEAP options include: • GTC - EAP Generic Token Card (GTC) is a challenge handshake authentication protocol using a hardware token card to provide the response string.
  • Page 285: Configuring Ldap Authentication

    Configuring Access Point Security 6-67 WARNING! If you have imported a Server or CA certificate, the certificate will not be saved when updating the access point’s firmware. Export your certificates before upgrading the access point’s firmware. From the access point CLI, use the command to admin(system.cmgr)>...
  • Page 286 Time Based Rule restriction feature. NOTE The LDAP screen displays with unfamiliar alphanumeric characters (if new to LDAP configuration). Motorola recommends only qualified administrators change the default values within the LDAP screen. 2. Enter the appropriate information within the LDAP Configuration field to allow the access point to interoperate with the LDAP server.
  • Page 287 Configuring Access Point Security 6-69 LDAP Server IP Enter the IP address of the external LDAP server acting as the data source for the Radius server. The LDAP server must be accessible from the WAN port or from the access point’s active subnet. Port Enter the TCP/IP port number for the LDAP server acting as a data source for the Radius.
  • Page 288: Configuring A Proxy Radius Server

    6-70 AP-51xx Access Point Product Reference Guide 6.14.3 Configuring a Proxy Radius Server The access point has the capability to proxy authentication requests to a remote Radius server based on the suffix of the user ID (such as myisp.com or company.com). The access point supports up to 10 proxy servers.
  • Page 289 Configuring Access Point Security 6-71 2. Refer to the Proxy Configuration field to define the proxy server’s retry count and timeout values. Retry Count Enter a value between 3 and 6 to indicate the number of times the access point attempts to reach a proxy server before giving up. Timeout Enter a value between 5 and 10 to indicate the number of elapsed seconds causing the access point to time out on a request to a...
  • Page 290: Managing The Local User Database

    6-72 AP-51xx Access Point Product Reference Guide Port Enter the TCP/IP port number for the Radius server acting as a proxy server. The default port is 1812. Shared Secret Set a shared secret used for each suffix used for authentication with the Radius proxy server.
  • Page 291 Configuring Access Point Security 6-73 Refer to the Groups field for a list of all groups in the local Radius database. The groups are listed in the order added. Although groups can be added and deleted, there is no capability to edit a group name.
  • Page 292: Mapping Users To Groups

    6-74 AP-51xx Access Point Product Reference Guide 7. Click the List of Groups cell. A new screen displays enabling you to associate groups with the user. For more information on mapping groups with a user, see Mapping Users to Groups on page 6-74.
  • Page 293 Configuring Access Point Security 6-75 3. To add the user to a group, select the group in the Available list (on the right) and click the <-Add button. Assigned users will display within the Assigned table. Map one or more groups as needed for group authentication access for this particular user.
  • Page 294: Defining User Access Permissions By Group

    6-76 AP-51xx Access Point Product Reference Guide 6.14.5 Defining User Access Permissions by Group An external AAA server maintains the users and groups database used by the access point for access permissions. Various kinds of access policies can be applied to each group. With this latest 2.0 version access point firmware, individual groups can be associated with their own time-based access policy.
  • Page 295 Configuring Access Point Security 6-77 The Access Policy screen displays the following fields: groups groups field displays the names of those existing groups that can have access intervals applied to them. Click the Edit button to display a screen designed to create access intervals for specific days and hours.
  • Page 296: Editing Group Access Permissions

    6-78 AP-51xx Access Point Product Reference Guide grid Refer to the grid field to review a bar graph of the selected group’s access privileges. Revise the selected group’s privileges as needed 2. Review the existing access intervals assigned to each group by selecting the group from amongst those displayed.
  • Page 297 Configuring Access Point Security 6-79 4. Define up to 10 access policies for the selected group within the Time Based Access Policy field. Use the drop-down menus on the left-hand side of the screen to define the day of the week for which each policy applies.
  • Page 298 6-80 AP-51xx Access Point Product Reference Guide NOTE Groups have a strict start and end time (as defined using the Edit Access Policy screen). Only during this period of time can authentication requests from users be honored (with no overlaps). Any authentication request outside of this defined interval is denied regardless of whether a user’s credentials match or not.
  • Page 299: Chapter 7. Monitoring Statistics

    Monitoring Statistics The access point has functionality to display robust transmit and receive statistics for its WAN and LAN port. Wireless Local Area Network (WLAN) stats can also be displayed collectively for each enabled WLAN as well as individually for up to 16 specific WLANs. Transmit and receive statistics can also be displayed for the access point’s 802.11a and 802.11b/g radios.
  • Page 300: Viewing Wan Statistics

    AP-51xx Access Point Product Reference Guide See the following sections for more details on viewing statistics for the access point: • Viewing WAN Statistics • Viewing LAN Statistics • Viewing Wireless Statistics • Viewing Radio Statistics Summary • Viewing MU Statistics Summary •...
  • Page 301 Monitoring Statistics 2. Refer to the Information field to reference the following access point WAN data: Status Status field displays Enabled if the WAN interface is enabled on the screen. If the WAN interface is disabled on the WAN screen, the WAN Stats screen displays no connection information and statistics.
  • Page 302 AP-51xx Access Point Product Reference Guide Mask Mask field displays the subnet mask number for the access point’s WAN connection. This value is set on the screen. Refer to Configuring WAN Settings on page 5-16 to change the subnet mask. Link Link parameter displays...
  • Page 303 Monitoring Statistics RX Frame RX Frame field displays the number of TCP/IP data frame errors received. 4. Refer to the Transmitted field to reference data received over the access point WAN port. TX Packets TX packets are data packets sent over the WAN connection. The displayed number is a cumulative total since the WAN was last enabled or the access point was last restarted.
  • Page 304: Viewing Lan Statistics

    AP-51xx Access Point Product Reference Guide 7.2 Viewing LAN Statistics Use the LAN Stats screen to monitor the activity of the access point’s LAN1 or LAN2 connection. The Information field of the LAN Stats screen displays network traffic information as monitored over the access point LAN1 or LAN2 port.
  • Page 305 Monitoring Statistics Status Displays whether this particular LAN has been enabled as viable subnet from within the LAN Configuration screen. IP Address The Internet Protocol (IP) addresses for the access point LAN port. Network Mask The first two sets of numbers specify the network domain, the next set specifies the subset of hosts within a larger network.
  • Page 306 AP-51xx Access Point Product Reference Guide RX Errors RX errors include dropped data packets, buffer overruns, and frame errors on inbound traffic. The number of RX errors is a total of RX Dropped, RX Overruns and RX Carrier errors. Use this information to determine performance quality of the current LAN connection.
  • Page 307: Viewing A Lan's Stp Statistics

    Monitoring Statistics TX Carrier TX Carrier field displays the number of TCP/IP data carrier errors. 5. Click the Clear LAN Stats button to reset each of the data collection counters to zero in order to begin new data collections. The RX/TX Packets and RX/TX Bytes totals remain at their present values and are not cleared.
  • Page 308 7-10 AP-51xx Access Point Product Reference Guide 2. Refer to the Spanning Tree Info field to for details on spanning tree state, and root access point designation. Spanning Tree State Displays whether the spanning tree state is currently enabled or disabled.
  • Page 309 Monitoring Statistics 7-11 Root Path Cost Bridge message traffic contains information identifying the root bridge and the sending bridge. The root path cost represents the distance (cost) from the sending bridge to the root bridge. Bridge Max Msg. Age The Max Msg Age measures the age of received protocol information recorded for a port, and to ensure the information is discarded when it exceeds the value set for the Maximum Message age timer.
  • Page 310: Viewing Wireless Statistics

    7-12 AP-51xx Access Point Product Reference Guide Designated Bridge There is only one root bridge within each mesh network. All other bridges are designated bridges that look to the root bridge for several mesh network timeout values. For information on root and bridge designations, see Setting the LAN Configuration for Mesh Networking Support on page...
  • Page 311 Monitoring Statistics 7-13 2. Refer to the WLAN Summary field to reference high-level data for each enabled WLAN. Name Displays the names of all the enabled WLANs on the access point. For information on enabling a WLAN, see Enabling Wireless LANs (WLANs) on page 5-27.
  • Page 312 7-14 AP-51xx Access Point Product Reference Guide % NU Displays a percentage of the total packets for each active WLAN that are non-unicast. Non-unicast packets include broadcast and multicast packets. Retries Displays the average number of retries per packet. An excessive number could indicate possible network or hardware problems.
  • Page 313: Viewing Wlan Statistics

    Monitoring Statistics 7-15 7.3.1 Viewing WLAN Statistics Use the WLAN Stats screen to view detailed statistics for individual WLANs.The WLAN Stats screen is separated into four fields; Information, Traffic, RF Status, and Errors. The Information field displays basic information such as number of associated Mobile Units, ESSID and security information.
  • Page 314 7-16 AP-51xx Access Point Product Reference Guide ESSID Displays the Extended Service Set ID (ESSID) for the target WLAN. Radio/s Displays the name of the 802.11a or 802.11b/g radio the target WLAN is using for access point transmissions. Authentication Type Displays the authentication type (802.1x EAP or Kerberos) defined for the WLAN.
  • Page 315 Monitoring Statistics 7-17 Avg. Bit Speed Total column displays the average bit speed in Mbps for a given time period on the selected WLAN.This includes all packets that are sent and received. The number in black represents statistics for the last 30 seconds and the number in blue represents statistics for the last hour.
  • Page 316: Viewing Radio Statistics Summary

    7-18 AP-51xx Access Point Product Reference Guide Dropped Packets Displays the percentage of packets which the AP gave up on for all MUs associated with the selected WLAN. The number in black represents this statistic for the last 30 seconds and the number in blue represents this statistic for the last hour.
  • Page 317 Monitoring Statistics 7-19 2. Refer to the Radio Summary field to reference access point radio information. Type Displays the type of radio (either 802.11a or 802.11b/g) currently deployed by the access point. To configure the radio type, see Setting the WLAN’s Radio Configuration on page 5-51.
  • Page 318: Viewing Radio Statistics

    7-20 AP-51xx Access Point Product Reference Guide % NU Displays the percentage of the total packets that are non-unicast. Non-unicast packets include broadcast and multicast packets. Retries Displays the average number of retries per packet on each radio. A high number could indicate network or hardware problems. 3.
  • Page 319 Monitoring Statistics 7-21 2. Refer to the Information field to view the access point 802.11a or 802.11b/g radio’s MAC address, placement and transmission information. HW Address The Media Access Control (MAC) address of the access point housing the 802.11a radio. The MAC address is set at the factory and can be found on the bottom of the access point.
  • Page 320 7-22 AP-51xx Access Point Product Reference Guide Placement Lists whether the access point radio is indoors or outdoors. To change the placement setting, see Configuring the 802.11a or 802.11b/g Radio on page 5-55. Current Channel Indicates the channel for communications between the access point radio and its associated MUs.
  • Page 321 Monitoring Statistics 7-23 4. Refer to the RF Status field to view the following MU signal, noise and performance information for the target access point 802.11a or 802.11b/g radio. Avg MU Signal Displays the average RF signal strength in dBm for all MUs associated with the radio.
  • Page 322: Retry Histogram

    7-24 AP-51xx Access Point Product Reference Guide 7. Click the Logout button to securely exit the Access Point applet. 7.4.1.1 Retry Histogram Refer to the Retry Histrogram screen for an overview of the retries transmitted by an access point radio and whether those retries contained any data packets. Use this information in combination with the error fields within a Radio Stats screen to assess overall radio performance.
  • Page 323: Viewing Mu Statistics Summary

    Monitoring Statistics 7-25 number of packets requiring 1 retry, 2 retries etc. Use this information to assess whether an abundance of retries warrants reconfiguring the access point radio to achieve better performance. 2. Click Apply to save any changes to the Radio Histogram screen. Navigating away from the screen without clicking Apply results in changes to the screens being lost.
  • Page 324 7-26 AP-51xx Access Point Product Reference Guide 2. Refer to the MU List field to reference associated MU address, throughput and retry information. IP Address Displays the IP address of each of the associated MU. MAC Address Displays the MAC address of each of the associated MU. WLAN Displays the WLAN name each MU is interoperating with.
  • Page 325: Viewing Mu Details

    7-30 NOTE An echo test initiated from the access point MU Stats Summary screen uses WNMP pings. Therefore, target clients that are not Motorola MUs are unable to respond to the echo test. 5. Click the MU Authentication Statistics button to display a screen with detailed authentication statistics for the an MU.
  • Page 326 Save Protocol mode. In PSP, the MU runs enough power to check for beacons and is otherwise inactive. CAM indicates the MU is continuously aware of all radio traffic. Motorola recommends CAM for those MUs transmitting with the AP frequently and for periods of time of two hours.
  • Page 327 Monitoring Statistics 7-29 Throughput Total column displays the average total packets per second crossing the selected MU. The column displays the average total packets per second received on the MU. The column displays the average total packets per second sent on the MU. The number in black represents throughput for the last 30 seconds, the number in blue represents throughput for the last hour.
  • Page 328: Pinging Individual Mus

    NOTE An echo test initiated from the access point MU Stats Summary screen uses WNMP pings. Therefore, target clients that are not Motorola MUs are unable to respond to the echo test. To ping a specific MU to assess its connection with an access point: 1.
  • Page 329: Mu Authentication Statistics

    Monitoring Statistics 7-31 4. Click the Ping button to begin transmitting ping packets to the station address specified. Refer to the Number of Responses parameter to assess the number of responses from the target MU versus the number of pings transmitted by the access point. Use the ratio of packets sent versus packets received to assess the link quality between MU and the access point Click the...
  • Page 330: Viewing The Mesh Statistics Summary

    7-32 AP-51xx Access Point Product Reference Guide 7.6 Viewing the Mesh Statistics Summary The access point has the capability of detecting and displaying the properties of other access points in mesh network (either base bridges or client bridges) mode. This information is used to create a list of known wireless bridges.
  • Page 331: Viewing Known Access Point Statistics

    7.7 Viewing Known Access Point Statistics The access point has the capability of detecting and displaying the properties of other Motorola access points located within its coverage area. Detected access point’s transmit a WNMP message indicating their channel, IP address, firmware version, etc.
  • Page 332 7-34 AP-51xx Access Point Product Reference Guide Known AP Statistics screen displays the following information: IP Address The network-assigned Internet Protocol address of the located AP. MAC Address The unique 48-bit, hard-coded Media Access Control address, known as the devices station identifier. This value is hard coded at the factory by the manufacturer and cannot be changed.
  • Page 333 Monitoring Statistics 7-35 The Known AP Details screen displays the target AP’s MAC address, IP address, radio channel, number of associated MUs, packet throughput per second, radio type(s), model, firmware version, ESS and client bridges currently connected to the AP radio. Use this information to determine whether this AP provides better MU association support than the locating access point or warrants consideration as a member of a different mesh network.
  • Page 334 NOTE A ping test initiated from the access point Known AP Statistics screen uses WNMP pings. Therefore, target devices that are not Motorola access points are unable to respond to the ping test. 5. Click the Send Cfg to APs button to send the your access point’s configuration to other...
  • Page 335: Chapter 8. Cli Reference

    CLI Reference The access point Command Line Interface (CLI) is accessed through the serial port or a Telnet session. The access point CLI follows the same conventions as the Web-based user interface. The CLI does, however, provide an “escape sequence” to provide diagnostics for problem identification and resolution.
  • Page 336: Connecting To The Cli

    If this is your first time logging into the access point, you are unable to access any of the access point’s commands until the country code is set. A new password will also need to be created.
  • Page 337: Admin And Common Commands

    8.2 Admin and Common Commands AP51xx>admin> Description: Displays admin configuration options. The items available under this command are shown below. Syntax: help Displays general user interface help. passwd Changes the admin password. summary Shows a system summary. network Goes to the network submenu system Goes to the system submenu.
  • Page 338 AP-51xx Access Point Product Reference Guide AP51xx>admin>help Description: Displays general CLI user interface help. Syntax: help Displays command line help using combinations of function keys for navigation. Example: admin>help : display command help - Eg. ?, show ?, s? * Restriction of “?”: : “?”...
  • Page 339 AP51xx>admin>passwd Description: Changes the password for the admin login. Syntax: passwd Changes the admin password for access point access. This requires typing the old admin password and entering a new password and confirming it. Passwords can be up to 11 characters. The access point CLI treats the following as invalid characters: "...
  • Page 340 AP-51xx Access Point Product Reference Guide AP51xx>admin>summary Description: Displays the access point’s system summary. Syntax: summary Displays a summary of high-level characteristics and settings for the WAN, LAN and WLAN. Example: admin>summary AP-51xx firmware version 2.0.0.0-xxx country code serial number 00A0F8716A74 WLAN 1: WLAN Name...
  • Page 341 AP51xx>admin>.. Description: Displays the parent menu of the current menu. This command appears in all of the submenus under admin. In each case, it has the same function, to move up one level in the directory structure. Example: admin(network.lan)>.. admin(network)>...
  • Page 342 AP-51xx Access Point Product Reference Guide AP51xx>admin> / Description: Displays the root menu, that is, the top-level CLI menu. This command appears in all of the submenus under admin. In each case, it has the same function, to move up to the top level in the directory structure.
  • Page 343 AP51xx>admin>save Description: Saves the configuration to system flash. The save command appears in all of the submenus under admin. In each case, it has the same function, to save the current configuration. Syntax: save Saves configuration settings. The save command works at all levels of the CLI. The save command must be issued before leaving the CLI for updated settings to be retained.
  • Page 344 8-10 AP-51xx Access Point Product Reference Guide AP51xx>admin>quit Description: Exits the command line interface session and terminates the session. The quit command appears in all of the submenus under admin. In each case, it has the same function, to exit out of the CLI. Once the quit command is executed, the login prompt displays again.
  • Page 345: Network Commands

    8-11 8.3 Network Commands AP51xx>admin(network)> Description: Displays the network submenu. The items available under this command are shown below. Goes to the LAN submenu. Goes to the WAN submenu. wireless Goes to the Wireless Configuration submenu. firewall Goes to the firewall submenu. router Goes to the router submenu.
  • Page 346: Network Lan Commands

    8-12 AP-51xx Access Point Product Reference Guide 8.3.1 Network LAN Commands AP51xx>admin(network.lan)> Description: Displays the LAN submenu. The items available under this command are shown below. show Shows current access point LAN parameters. Sets LAN parameters. bridge Goes to the mesh configuration submenu. wlan-mapping Goes to the WLAN/Lan/Vlan Mapping submenu.
  • Page 347 8-13 AP51xx>admin(network.lan)> show Description: Displays the access point LAN settings. Syntax: show Shows the settings for the access point LAN1 and LAN2 interfaces. Example: admin(network.lan)>show LAN On Ethernet Port : LAN1 LAN Ethernet Timeout : disable 802.1x Port Authentication: Username : admin Password : ********...
  • Page 348 8-14 AP-51xx Access Point Product Reference Guide Network Mask : 255.255.255.255 Default Gateway : 192.168.1.1 Domain Name Primary DNS Server : 192.168.0.2 Secondary DNS Server : 192.168.0.3 WINS Server : 192.168.0.255 admin(network.lan)> For information on displaying LAN information using the applet (GUI), see Configuring the LAN Interface on page 5-1.
  • Page 349 8-15 AP51xx>admin(network.lan)> set Description: Sets the LAN parameters for the LAN port. Syntax: <mode> Enables or disables the access point LAN interface. name <idx-name > Defines the LAN name by index. ethernet-port-lan <idx> Defines which LAN (LAN1 or LAN2) is active on the Ethernet port. timeout <seconds>...
  • Page 350 8-16 AP-51xx Access Point Product Reference Guide Related Commands: show Shows the current settings for the access point LAN port. For information on configuring the LAN using the applet (GUI), see Configuring the LAN Interface on page 5-1.
  • Page 351: Network Lan, Bridge Commands

    8-17 8.3.1.1 Network LAN, Bridge Commands AP51xx>admin(network.lan.bridge)> Description: Displays the access point Bridge submenu. show Displays the mesh configuration parameters for the access point’s LANs. Sets the mesh configuration parameters for the access point’s LANs.. Moves to the parent menu. Goes to the root menu.
  • Page 352 8-18 AP-51xx Access Point Product Reference Guide AP51xx>admin(network.lan.bridge)> show Description: Displays the mesh bridge configuration parameters for the access point’s LANs. Syntax: show Displays the mesh bridge configuration parameters for the access point’s LANs. Example: admin(network.lan.bridge)>show ** LAN1 Bridge Configuration ** Bridge Priority :32768 Hello Time (seconds)
  • Page 353 8-19 AP51xx>admin(network.lan.bridge)> set Description: Sets the mesh configuration parameters for the access point’s LANs. Syntax: set priority <LAN-idx> <seconds> Sets bridge priority time in seconds (0-65535) for specified LAN. hello <LAN-idx> <seconds> Sets bridge hello time in seconds (0-10) for specified LAN. msgage <LAN-idx>...
  • Page 354: Network Lan, Wlan-Mapping Commands

    8-20 AP-51xx Access Point Product Reference Guide 8.3.1.2 Network LAN, WLAN-Mapping Commands AP51xx>admin(network.lan.wlan-mapping)> Description: Displays the WLAN/Lan/Vlan Mapping submenu. show Displays the VLAN list currently defined for the access point. Sets the access point VLAN configuration. create Creates a new access point VLAN. edit Edits the properties of an existing access point VLAN.
  • Page 355 8-21 AP51xx>admin(network.lan.wlan-mapping)> show Description: Displays the VLAN list currently defined for the access point.. These parameters are defined with the set command. Syntax: show name Displays the existing list of VLAN names. vlan-cfg Shows WLAN-VLAN mapping and VLAN configuration. lan-wlan Displays a WLAN-LAN mapping summary.
  • Page 356 8-22 AP-51xx Access Point Product Reference Guide admin(network.lan.wlan-mapping)>show wlan WLAN1: WLAN Name :WLAN1 ESSID :101 Radio VLAN Security Policy :Default QoS Policy :Default For information on displaying the VLAN screens using the applet (GUI), see Configuring VLAN Support on page 5-5.
  • Page 357 8-23 AP51xx>admin(network.lan.wlan-mapping)> set Description: Sets VLAN parameters for the access point. Syntax: set mgmt- tag <id> Defines the Management VLAN tag (1-4095). native-tag <id> Sets the Native VLAN tag (1-4095). mode <wlan-idx> Sets WLAN VLAN mode (WLAN 1-16) to either dynamic or static. Example: admin(network.lan.wlan-mapping)>set mgmt-tag 1 admin(network.lan.wlan-mapping)>set native-tag 2...
  • Page 358 8-24 AP-51xx Access Point Product Reference Guide AP51xx>admin(network.lan.wlan-mapping)> create Description: Creates a VLAN for the access point. Syntax: create vlan-id <id> Defines the VLAN ID (1-4095). vlan-name <name> Specifies the name of the VLAN (1-31 characters in length). Example: admin(network.lan.wlan-mapping)> admin(network.lan.wlan-mapping)>create 5 vlan-5 For information on creating VLANs using the applet (GUI), see Configuring VLAN Support on page...
  • Page 359 8-25 AP51xx>admin(network.lan.wlan-mapping)> edit Description: Modifies a VLAN’s name and ID. Syntax: edit name <name> Modifies an exisiting VLAN name (1-31 characters in length) <id> Modifies an existing VLAN ID (1-4095) characters in length). For information on editing VLANs using the applet (GUI), see Configuring VLAN Support on page 5-5.
  • Page 360 8-26 AP-51xx Access Point Product Reference Guide AP51xx>admin(network.lan.wlan-mapping)> delete Description: Deletes a specific VLAN or all VLANs. Syntax: delete < VLAN id> Deletes a specific VLAN ID (1-16). Deletes all defined VLANs. For information on deleting VLANs using the applet (GUI), see Configuring VLAN Support on page 5-5.
  • Page 361 8-27 AP51xx>admin(network.lan.wlan-mapping)> lan-map Description: Maps an access point VLAN to a WLAN. Syntax: lan-map <wlan name Maps an existing WLAN to an enabled LAN. All names and IDs are case-sensitive. <lan name> Defines enabled LAN name. All names and IDs are case-sensitive. admin(network.lan.wlan-mapping)>lan-map wlan1 lan1 For information on mapping VLANs using the applet (GUI), see Configuring VLAN Support on page...
  • Page 362 8-28 AP-51xx Access Point Product Reference Guide AP51xx>admin(network.lan.wlan-mapping)> vlan-map Description: Maps an access point VLAN to a WLAN. Syntax: vlan-map <wlan name> Maps an existing WLAN to an enabled LAN. All names and IDs are case-sensitive. <vlan name> Defines the existing VLAN name. All names and IDs are case-sensitive. admin(network.lan.wlan-mapping)>vlan-map wlan1 vlan1 For information on mapping VLANs using the applet (GUI), see Configuring VLAN Support on page...
  • Page 363: Network Lan, Dhcp Commands

    8-29 8.3.1.3 Network LAN, DHCP Commands AP51xx>admin(network.lan.dhcp)> Description: Displays the access point DHCP submenu. The items available are displayed below. show Displays DHCP parameters. Sets DHCP parameters. Adds static DHCP address assignments. delete Deletes static DHCP address assignments. list Lists static DHCP address assignments. Goes to the parent menu.
  • Page 364 8-30 AP-51xx Access Point Product Reference Guide AP51xx>admin(network.lan.dhcp)> show Description: Shows DHCP parameter settings. Syntax: show Displays DHCP parameter settings for the access point. These parameters are defined with the set command. Example: admin(network.lan.dhcp)>show **LAN1 DHCP Information** DHCP Address Assignment Range: Starting IP Address : 192.168.0.100 Ending IP Address...
  • Page 365 8-31 AP51xx>admin(network.lan.dhcp)> set Description: Sets DHCP parameters for the LAN port. Syntax: set range <LAN-idx> <ip1> <ip2> Sets the DHCP assignment range from IP address <ip1> to IP address <ip2> for the specified LAN. lease <LAN-idx> <lease> Sets the DHCP lease time <lease> in seconds (1-999999) for the specified LAN. Example: admin(network.lan.dhcp)>set range 1 192.168.0.100 192.168.0.254 admin(network.lan.dhcp)>set lease 1 86400...
  • Page 366 8-32 AP-51xx Access Point Product Reference Guide AP51xx>admin(network.lan.dhcp)> add Description: Adds static DHCP address assignments. Syntax: <LAN-idx> <mac> <ip> Adds a reserved static IP address to a MAC address for the specified LAN Example: admin(network.lan.dhcp)>add 1 00A0F8112233 192.160.24.6 admin(network.lan.dhcp)>add 1 00A0F1112234 192.169.24.7 admin(network.lan.dhcp)>list 1 ----------------------------------------------------------------------------- Index...
  • Page 367 8-33 AP51xx>admin(network.lan.dhcp)> delete Description: Deletes static DHCP address assignments. Syntax: delete <LAN-idx> <entry> Deletes the static DHCP address entry for the specified LAN. <LAN-idx> Deletes all static DHCP addresses. Example: admin(network.lan.dhcp)>list 1 ----------------------------------------------------------------------------- Index MAC Address IP Address ----------------------------------------------------------------------------- 00A0F8112233 10.1.2.4 00A0F8102030 10.10.1.2...
  • Page 368 8-34 AP-51xx Access Point Product Reference Guide AP51xx>admin(network.lan.dhcp)> list Description: Lists static DHCP address assignments. Syntax: list <LAN-idx> <cr> Lists the static DHCP address assignments for the specified LAN (1-LAN1, 2 LAN2). Example: admin(network.lan.dhcp)>list 1 ----------------------------------------------------------------------------- Index MAC Address IP Address ----------------------------------------------------------------------------- 00A0F8112233 10.1.2.4...
  • Page 369: Network Type Filter Commands

    8-35 8.3.1.4 Network Type Filter Commands AP51xx>admin(network.lan.type-filter)> Description: Displays the access point Type Filter submenu. The items available under this command include: show Displays the current Ethernet Type exception list. Defines Ethernet Type Filter parameters. Adds an Ethernet Type Filter entry. delete Removes an Ethernet Type Filter entry.
  • Page 370 8-36 AP-51xx Access Point Product Reference Guide AP51xx>admin(network.lan.type-filter)> show Description: Displays the access point’s current Ethernet Type Filter configuration. Syntax: show <LAN-idx> Displays the existing Type-Filter configuration for the specified LAN. Example: admin(network.lan.type-filter)>show 1 Ethernet Type Filter mode : allow ----------------------------------------------------------------------------- index ethernet type...
  • Page 371 8-37 AP51xx>admin(network.lan.type-filter)> set Description: Defines the access point Ethernet Type Filter configuration. Syntax: set mode <LAN-idx> allow deny Allows or denies the access point from processing a specified Ethernet data type for the specified LAN. Example: admin(network.lan.type-filter)>set mode 1 allow For information on configuring the type filter settings using the applet (GUI), see Setting the Type Filter Configuration on page 5-14.
  • Page 372 8-38 AP-51xx Access Point Product Reference Guide AP51xx>admin(network.lan.type-filter)> add Description: Adds an Ethernet Type Filter entry. Syntax: <LAN-idx> <type> Adds entered Ethernet Type to list of data types either allowed or denied access point processing permissions for the specified LAN (either LAN1 or LAN2). Example: admin(network.lan.type-filter)>...
  • Page 373 8-39 AP51xx>admin(network.lan.type-filter)> delete Description: Removes an Ethernet Type Filter entry individually or the entire Type Filter list. Syntax: delete <LAN-idx> <index> Deletes the specified Ethernet Type index entry (1 through 16). <LAN-idx> Deletes all Ethernet entries currently in list. Example: admin(network.lan.type-filter)>delete 1 1 admin(network.lan.type-filter)>show 1 Ethernet Type Filter mode...
  • Page 374: Network Wan Commands

    8-40 AP-51xx Access Point Product Reference Guide 8.3.2 Network WAN Commands AP51xx>admin(network.wan)> Description: Displays the WAN submenu. The items available under this command are shown below. show Displays the access point WAN configuration and the access point’s current PPPoE configuration. Defines the access point’s WAN and PPPoE configuration.
  • Page 375 8-41 AP51xx>admin(network.wan)> show Description: Displays the access point WAN port parameters. Syntax: show Shows the general IP parameters for the WAN port along with settings for the WAN interface.. Example: admin(network.wan)>show Status : enable Primary DNS Server : 0.0.0.0 Secondary DNS Server : 0.0.0.0 Auto-negotiation : disable...
  • Page 376 8-42 AP-51xx Access Point Product Reference Guide AP51xx>admin(network.wan)> set Description: Defines the configuration of the access point WAN port. Syntax: set wan enable/disable Enables or disables the access point WAN port. dhcp enable/disable Enables or disables WAN DHCP Client mode. ipadr <idx>...
  • Page 377: Network Wan Nat Commands

    8-43 8.3.2.1 Network WAN NAT Commands AP51xx>admin(network.wan.nat)> Description: Displays the NAT submenu. The items available under this command are shown below. show Displays the access point’s current NAT parameters for the specified index. Defines the access point NAT settings. Adds NAT entries. delete Deletes NAT entries.
  • Page 378 8-44 AP-51xx Access Point Product Reference Guide AP51xx>admin(network.wan.nat)> show Description: Displays access point NAT parameters. Syntax: show <idx> <cr> Displays access point NAT parameters for the specified NAT index. Example: admin(network.wan.nat)>show 2 WAN IP Mode : enable WAN IP Address : 157.235.91.2 NAT Type : 1-to-many...
  • Page 379 8-45 AP51xx>admin(network.wan.nat)> set Description: Sets NAT inbound and outbound parameters. Syntax: set type <index> <type> Sets the type of NAT translation for WAN address index <idx> (1-8) to <type> (none, 1-to-1, or 1-to-many). <index> <ip> Sets NAT IP mapping associated with WAN address <idx> to the specified IP address <ip>.
  • Page 380 8-46 AP-51xx Access Point Product Reference Guide AP51xx>admin(network.wan.nat)> add Description: Adds NAT entries. Syntax: <idx> <name> <tran> <port1> <port2> <ip> <dst_port> Sets an inbound network address translation (NAT) for WAN address <idx>, where <name> is the name of the entry (1 to 7 characters), <tran>...
  • Page 381 8-47 AP51xx>admin(network.wan.nat)> delete Description: Deletes NAT entries. Syntax: delete <idx> <entry> Deletes a specified NAT index entry <entry> associated with the WAN. <idx> Deletes all NAT entries associated with the WAN. Example: admin(network.wan.nat)>list 1 ----------------------------------------------------------------------------- index name prot start port end port internal ip translation port...
  • Page 382 8-48 AP-51xx Access Point Product Reference Guide AP51xx>admin(network.wan.nat)> list Description: Lists access point NAT entries for the specified index. Syntax: list <idx> Lists the inbound NAT entries associated with the WAN index (1-8). Example: admin(network.wan.nat)>list 1 ----------------------------------------------------------------------------- index name Transport start port end port internal ip...
  • Page 383: Network Wan, Vpn Commands

    8-49 8.3.2.2 Network WAN, VPN Commands AP51xx>admin(network.wan.vpn)> Description: Displays the VPN submenu. The items available under this command include: Adds VPN tunnel entries. Sets key exchange parameters. delete Deletes VPN tunnel entries. list Lists VPN tunnel entries reset Resets all VPN tunnels. stats Lists security association status for the VPN tunnels.
  • Page 384 8-50 AP-51xx Access Point Product Reference Guide AP51xx>admin(network.wan.vpn)> add Description: Adds a VPN tunnel entry. Syntax: <name> <idx> <LWanIP> <RSubnetIP> <RSubnetMask <RGatewayIP> Creates a tunnel <name> (1 to 13 characters) to gain access through local WAN IP <LWanIP> from the remote subnet with address <RSubnetIP>...
  • Page 385 8-51 AP51xx>admin(network.wan.vpn)> set Description: Sets VPN entry parameters. Syntax: set type <name> <tunnel type> Sets the tunnel type <name> to Auto Manual for the specified tunnel name. authalgo <name> <authalgo> Sets the authentication algorithm for <name> to (None, MD5, or SHA1). authkey <name>...
  • Page 386 8-52 AP-51xx Access Point Product Reference Guide salife <name> <lifetime> Defines the name of the tunnnel <name> the Security Association Life Time <300-65535> applies to in seconds. opmode <name> <opmode> Sets the Operation Mode of IKE for <name> to Main or Aggr(essive).
  • Page 387 8-53 AP51xx>admin(network.wan.vpn)> delete Description: Deletes VPN tunnel entries. Syntax: delete Deletes all VPN entries. <name> Deletes VPN entries <name>. Example: admin(network.wan.vpn)>list -------------------------------------------------------------------------- Tunnel Name Type Remote IP/Mask Remote Gateway Local WAN IP -------------------------------------------------------------------------- Eng2EngAnnex Manual 192.168.32.2/24 192.168.33.1 192.168.24.198 SJSharkey Manual 206.107.22.45/27 206.107.22.2 209.235.12.55...
  • Page 388 8-54 AP-51xx Access Point Product Reference Guide AP51xx>admin(network.wan.vpn)> list Description: Lists VPN tunnel entries. Syntax: list <cr> Lists all tunnel entries. <name> Lists detailed information about tunnel named <name>. Note that the <name> must match case with the name of the VPN tunnel entry Example: admin(network.wan.vpn)>list...
  • Page 389 8-55 AP51xx>admin(network.wan.vpn)> reset Description: Resets all of the access point’s VPN tunnels. Syntax: reset Resets all VPN tunnel states. Example: admin(network.wan.vpn)>reset VPN tunnels reset. admin(network.wan.vpn)> For information on configuring VPN using the applet (GUI), see Configuring VPN Tunnels on page 6-36.
  • Page 390 8-56 AP-51xx Access Point Product Reference Guide AP51xx>admin(network.wan.vpn)> stats Description: Lists statistics for all active tunnels. Syntax: stats Display statistics for all VPN tunnels. Example: admin(network.wan.vpn)>stats ----------------------------------------------------------------------------- Tunnel Name Status SPI(OUT/IN) Life Time Bytes(Tx/Rx) ----------------------------------------------------------------------------- Eng2EngAnnex Not Active SJSharkey Not Active For information on displaying VPN information using the applet (GUI), see Viewing VPN Status on page 6-50.
  • Page 391 8-57 AP51xx>admin(network.wan.vpn)> ikestate Description: Displays statistics for all active tunnels using Internet Key Exchange (IKE). Syntax: ikestate Displays status about Internet Key Exchange (IKE) for all tunnels. In particular, the table indicates whether IKE is connected for any of the tunnels, it provides the destination IP address, and the remaining lifetime of the IKE key. Example: admin(network.wan.vpn)>ikestate ----------------------------------------------------------------------...
  • Page 392: Ap51Xx>Admin(Network.wan.content)

    8-58 AP-51xx Access Point Product Reference Guide 8.3.2.3 AP51xx>admin(network.wan.content)> Description: Displays the Outbound Content Filtering menu. The items available under this command include: addcmd Adds control commands to block outbound traffic. delcmd Deletes control commands to block outbound traffic. list Lists application control commands.
  • Page 393 8-59 AP51xx>admin(network.wan.content)> addcmd Description: Adds control commands to block outbound traffic. Syntax: addcmd Adds WEB commands to block outbound traffic. proxy Adds a Web proxy command. activex Adds activex files. file Adds Web URL extensions (10 files maximum) smtp Adds SMTP commands to block outbound traffic. helo helo command mail...
  • Page 394 8-60 AP-51xx Access Point Product Reference Guide AP51xx>admin(network.wan.content)> delcmd Description: Deletes control commands to block outbound traffic. Syntax: delcmd Deletes WEB commands to block outbound traffic. proxy Deletes a Web proxy command. activex Deletes activex files. file Deletes Web URL extensions (10 files maximum) smtp Deletes SMTP commands to block outbound traffic.
  • Page 395 8-61 AP51xx>admin(network.wan.content)> list Description: Lists application control commands. Syntax: list Lists WEB application control record. smtp Lists SMTP application control record. Lists FTP application control record. Example: admin(network.wan.content)>list web HTTP Files/Commands Web Proxy : deny ActiveX : allow filename admin(network.wan.content)>list smtp SMTP Commands HELO : deny...
  • Page 396: Network Wan, Dynamic Dns Commands

    8-62 AP-51xx Access Point Product Reference Guide 8.3.2.4 Network WAN, Dynamic DNS Commands AP51xx>admin(network.wan.dyndns)> Description: Displays the Dynamic DNS submenu. The items available under this command include: Sets Dynamic DNS parameters. update Sets key exchange parameters. show Shows the Dynamic DNS configuration. Goes to the parent menu.
  • Page 397 8-63 AP51xx>admin(network.wan.dyndns)> set Description: Sets the access point’s Dynamic DNS configuration. Syntax: mode enable/disable Enables or disbales the Dynamic DNS service for the access point. username <name> Enter a 1 - 32 character username for the account used for the access point. password <password>...
  • Page 398 8-64 AP-51xx Access Point Product Reference Guide AP51xx>admin(network.wan.dyndns)> update Description: Updates the access point’s current WAN IP address with the DynDNS service. Syntax: update Updates the access point’s current WAN IP address with the DynDNS service. Example: admin(network.wan.dyndns)>update IP Address : 157.235.91.231 Hostname : greengiant...
  • Page 399 8-65 AP51xx>admin(network.wan.dyndns)> show Description: Shows the current Dynamic DNS configuration. Syntax: show Shows the access point’s current Dynamic DNS configuration. Example: admin(network.wan.dyndns)>show DynDNS Configuration Mode : enable Username : percival Password : ******** Hostname : greengiant DynDNS Update Response IP Address : 157.235.91.231 Hostname : greengiant...
  • Page 400: Network Wireless Commands

    8-66 AP-51xx Access Point Product Reference Guide 8.3.3 Network Wireless Commands AP51xx>admin(network.wireless) Description: Displays the access point wireless submenu. The items available under this command include: wlan Displays the WLAN submenu used to create and configure up to 16 WLANs per access point. security Displays the security submenu used to create encryption and authentication based security policies for use with...
  • Page 401: Network Wlan Commands

    8-67 8.3.3.1 Network WLAN Commands AP51xx>admin(network.wireless.wlan)> Description: Displays the access point wireless LAN (WLAN) submenu. The items available under this command include: show Displays the access point’s current WLAN configuration. create Defines the parameters of a new WLAN. edit Modifies the properties of an existing WLAN. delete Deletes an existing WLAN.
  • Page 402 8-68 AP-51xx Access Point Product Reference Guide AP51xx>admin(network.wireless.wlan)> show Description: Displays the access point’s current WLAN configuration. Syntax: show summary Displays the current configuration for existing WLANs. wlan <number> Displays the configuration for the requested WLAN (WLAN 1 through 16). Example: admin(network.wireless.wlan)>show summary WLAN1...
  • Page 403 8-69 AP51xx>admin(network.wireless.wlan)> create Description: Defines the parameters of a new WLAN. Syntax: create show wlan <number> Displays newly created WLAN and policy number. <essid> Defines the ESSID for a target WLAN. <name> Determines the name of this particlular WLAN (1-32). wlan-name <mode>...
  • Page 404 8-70 AP-51xx Access Point Product Reference Guide QoS Policy : Default admin(network.wireless.wlan.create)>show security ---------------------------------------------------------------------- Secu Policy Name Authen Encryption Associated WLANs ---------------------------------------------------------------------- 1 Default Manual no encrypt Front Lobby 2 WEP Demo Manual WEP 64 2nd Floor 3 Open Manual no encrypt 1st Floor WPA Countermeasure...
  • Page 405 8-71 AP51xx>admin(network.wireless.wlan)> edit Description: Edits the properties of an existing WLAN policy. Syntax: edit <index> Edits the properties of an existing (and specified) WLAN policy. show Displays the WLANs pamaters and summary. Edits the same WLAN parameters that can be modified using the create command. change Completes the WLAN edits and exits the CLI session.
  • Page 406 8-72 AP-51xx Access Point Product Reference Guide AP51xx>admin(network.wireless.wlan)> delete Description: Deletes an existing WLAN. Syntax: delete <wlan-name> Deletes a target WLAN by name supplied. Deletes all WLANs defined. For information on deleting a WLAN using the applet (GUI), see Creating/Editing Individual WLANs on page 5-30.
  • Page 407 8-73 AP51xx>admin(network.wireless.wlan.hotspot)> Description: Displays the Hotspot submenu. The items available under this command include: show Show hotspot parameters. redirection Goes to the hotspot redirection menu. radius Goes to the hotspot Radius menu. white-list Goes to the hotspot white-list menu. save Saves the configuration to system flash.
  • Page 408 8-74 AP-51xx Access Point Product Reference Guide AP51xx>admin(network.wireless.wlan.hotspot)> show Description: Displays the current access point Rogue AP detection configuration. Syntax: show hotspot <idx> Shows hotspot parameters per wlan index (1-16). Example: admin(network.wireless.wlan.hotspot)>show hotspot 1 WLAN1 Hotspot Mode : enable Hotspot Page Location : default External Login URL : www.sjsharkey.com...
  • Page 409 8-75 AP51xx>admin(network.wireless.wlan.hotspot)> redirection Description: Goes to the hotspot redirection menu. Syntax: redirection set <page-loc> Sets the hotspot http-re-direction by index (1-16) for the specified URL. <exturl> Shows hotspot http-redirection details for specifiec index (1-16) for specified page (login, welcome, fail) and target URL.. show Shows hotspot http-redirection details.
  • Page 410 8-76 AP-51xx Access Point Product Reference Guide AP51xx>admin(network.wireless.wlan.hotspot)> radius Description: Goes to the hotspot Radius menu. Syntax: Sets the Radius hotspot configuration. show Shows Radius hotspot server details. save Saves the configuration to system flash. quit Quits the CLI. Goes to the parent menu. Goes to the root menu.
  • Page 411 8-77 AP51xx>admin(network.wireless.wlan.hotspot.radius)> set Description: Sets the Radius hotspot configuration. Syntax: server <idx> <srvr_type> <ipadr> Sets the Radius hotpost server IP address per wlan index (1-16) port <idx> <srvr_type> <port> Sets the Radius hotpost server port per wlan index (1-16) secret <idx>...
  • Page 412 8-78 AP-51xx Access Point Product Reference Guide AP51xx>admin(network.wireless.wlan.hotspot.radius)> show Description: Shows Radius hotspot server details. Syntax: show radius <idx> Displays Radius hotspot server details per index (1-16) Example: admin(network.wireless.wlan.hotspot.radius)>show radius 1 WLAN 1 Hotspot Mode : enable Primary Server Ip adr : 157.235.12.12 Primary Server Port : 1812...
  • Page 413 8-79 AP51xx>admin(network.wireless.wlan.hotspot)> white-list Description: Goes to the hotspot white-list menu. Syntax: white-list add <rule> Adds hotspot whitelist rules by index (1-16) for specified IP address. clear Clears hotspot whitelist rules for specified index (1-16). show Shows hotspot whitelist rules for specified index (1-16). save Saves the updated hotspot configuration to flash memory.
  • Page 414: Network Security Commands

    8-80 AP-51xx Access Point Product Reference Guide 8.3.3.2 Network Security Commands AP51xx>admin(network.wireless.security)> Description: Displays the access point wireless security submenu. The items available under this command include: show Displays the access point’s current security configuration. create Defines the parameters of a security policy. edit Edits the properties of an existing security policy.
  • Page 415 8-81 AP51xx>admin(network.wireless.security)> show Description: Displays the access point’s current security configuration. Syntax: show summary Displays list of existing security policies (1-16). policy <id> Displays the specified security policy <id>. Example: admin(network.wireless.security)>show summary ---------------------------------------------------------------------- Secu Policy Name Authen Encryption Associated WLANs ---------------------------------------------------------------------- 1 Default Manual...
  • Page 416 8-82 AP-51xx Access Point Product Reference Guide AP51xx>admin(network.wireless.security)> create Description: Defines the parameter of access point security policies. Syntax: create Defines the parameters of a security policy. show Displays new or existing security policy parameters. sec-name <name> Sets the name of the security policy. auth <authtype>...
  • Page 417 “symbol.” Be cognizant of this when importing a configuration from 1.1 to 2.0, as this shared secret will have to be changed to motorola (after the import) to avoid MU authentication failures. This change can only be made using the access point CLI.
  • Page 418 8-84 AP-51xx Access Point Product Reference Guide mu-retry <count> Sets the EAP maximum number of MU retries to <count> (1-10). svr-timeout <time> Sets the server timeout <time> in seconds (1- 255). svr-retry <count> Sets the maximum number of server retries to <count>...
  • Page 419 “symbol,” instead of “motorola” (as now required with the 2.0 baseline). If the shared secret password is not changed to “motorola” there will be a shared secret mis-match resulting in MU authentication failures. This password cannot be set using the access point Web UI, and must be changed using the CLI.
  • Page 420 8-86 AP-51xx Access Point Product Reference Guide AP51xx>admin(network.wireless.security.edit)> Description: Edits the properties of a specific security policy. Syntax: show Displays the new or modified security policy parameters. <index> Edits security policy parameters. change Completes policy changes and exits the session. Cancels the changes made and exits the session.
  • Page 421 8-87 AP51xx>admin(network.wireless.security)> delete Description: Deletes a specific security policy. Syntax: delete <sec-name> Removes the specified security policy from the list of supported policies. <all> Removes all security policies except the default policy. For information on configuring the encryption and authentication options available to the access point using the applet (GUI), see Configuring Security Options on page 6-2.
  • Page 422: Network Acl Commands

    8-88 AP-51xx Access Point Product Reference Guide 8.3.3.3 Network ACL Commands AP51xx>admin(network.wireless.acl)> Description: Displays the access point Mobile Unit Access Control List (ACL) submenu. The items available under this command include: show Displays the access point’s current ACL configuration. create Creates an MU ACL policy.
  • Page 423 8-89 AP51xx>admin(network.wireless.acl)> show Description: Displays the access point’s current ACL configuration. Syntax: show summary Displays the list of existing MU ACL policies. policy <index> Displays the requested MU ACL index policy. Example: admin(network.wireless.acl)>show summary ---------------------------------------------------------------------- ACL Policy Name Associated WLANs ---------------------------------------------------------------------- 1 Default Front Lobby, WLAN1...
  • Page 424 8-90 AP-51xx Access Point Product Reference Guide AP51xx>admin(network.wireless.acl)> create Description: Creates an MU ACL policy. Syntax: create show <acl-name> Displays the parameters of a new ACL policy. acl-name <index> Sets the MU ACL policy name. mode <acl-mode> Sets the ACL mode for the defined index (1-16). Allowed MUs can access the access point managed LAN.
  • Page 425 8-91 AP51xx>admin(network.wireless.acl.edit)> Description: Edits the properties of an existing MU ACL policy. Syntax: show Displays MU ACL policy and its parameters. Modifies the properties of an existing MU ACL policy. add-addr Adds an MU ACL table entry. delete Deletes an MU ACL table entry, including starting and ending MAC address ranges. change Completes the changes made and exits the session.
  • Page 426 8-92 AP-51xx Access Point Product Reference Guide AP51xx>admin(network.wireless.acl)> delete Description: Removes an MU ACL policy. Syntax: delete <acl name> Deletes a partilcular MU ACL policy. Deletes all MU ACL policies. For information on configuring the ACL options available to the access point using the applet (GUI), see Configuring a WLAN Access Control List (ACL) on page 5-36.
  • Page 427: Network Radio Configuration Commands

    8-93 8.3.3.4 Network Radio Configuration Commands AP51xx>admin(network.wireless.radio)> Description: Displays the access point Radio submenu. The items available under this command include: show Summarizes access point radio parameters at a high-level. Defines the access point radio configuration. radio1 Displays the 802.11b/g radio submenu. radio2 Displays the 802.11a radio submenu.
  • Page 428 8-94 AP-51xx Access Point Product Reference Guide AP51xx>admin(network.wireless.radio)> show Description: Displays the access point’s current radio configuration. Syntax: show Displays the access point’s current radio configuration. Example: admin(network.wireless.radio)>show Radio Configuration Radio 1 Name : Radio 1 Radio Mode : enable RF Band of Operation : 802.11b/g (2.4 GHz) Wireless AP Configuration:...
  • Page 429 8-95 AP51xx>admin(network.wireless.radio)> set Description: Enables an access point Radio and defines the RF band of operation. Syntax: set 11a <mode> Enables or disables the access point’s 802.11a radio. 11bg <mode> Enables or disables the access point’s 802.11b/g radio. mesh-base <mode> Enables or disables base bridge mode.
  • Page 430 8-96 AP-51xx Access Point Product Reference Guide AP51xx>admin(network.wireless.radio.radio1)> Description: Displays a specific 802.11b/g radio submenu. The items available under this command include: Syntax: show Displays 802.11b/g radio settings. Defines specific 802.11b/g radio parameters. advanced Displays the Adavanced radio settings submenu. mesh Goes to the Wireless AP Connections submenu.
  • Page 431 8-97 AP51xx>admin(network.wireless.radio.radio1)> show Description: Displays specific 802.11b/g radio settings. Syntax: show radio Displays specific 802.11b/g radio settings. Displays specific 802.11b/g radio WMM QoS settings. Example: admin(network.wireless.radio.radio1)>show radio Radio Setting Information Placement : indoor MAC Address : 00A0F8715920 Radio Type : 802.11b/g ERP Protection : Off Channel Setting...
  • Page 432 8-98 AP-51xx Access Point Product Reference Guide admin(network.wireless.radio.radio1)>show qos Radio QOS Parameter Set 11g-default ----------------------------------------------------------------------------- Access Category CWMin CWMax AIFSN TXOPs (32 usec) TXOPs ms ----------------------------------------------------------------------------- Background 1023 0.000 Best Effort 0.992 Video 3.008 Voice 1.504 CAUTION If you do NOT include the index number (for example, "set dtim 50"), the DTIMs for all four BSSIDs will be changed to 50.
  • Page 433 8-99 AP51xx>admin(network.wireless.radio.802-11bg)> set Description: Defines specific 802.11b/g radio parameters. Syntax: set placement Defines the access point radio placement as indoors or outdoors. ch-mode Determines how the radio channel is selected. channel Defines the actual channel used by the radio. antenna Sets the radio antenna power power Defines the radio antenna power transmit level.
  • Page 434 8-100 AP-51xx Access Point Product Reference Guide AP51xx>admin(network.wireless.radio.802-11bg.advanced)> Description: Displays the advanced submenu for the 802.11b/g radio. The items available under this command include: Syntax: show Displays advanced radio settings for the 802.11b/g radio. Defines advanced parameters for the 802.11b/g radio. Goes to the parent menu.
  • Page 435 8-101 AP51xx>admin(network.wireless.radio.802-11bg.advanced)> show Description: Displays the BSSID to WLAN mapping for the 802.11b/g radio. Syntax: show advanced Displays advanced settings for the 802.11b/g radio. wlan Displays WLAN summary list for the 802.11b/g radio. Example: admin(network.wireless.radio.802-11bg.advanced)>show advanced ----------------------------------------------------------------------------- WLAN BSS ID BC/MC Cipher Status Message...
  • Page 436 8-102 AP-51xx Access Point Product Reference Guide AP51xx>admin(network.wireless.radio.802-11bg.advanced)> set Description: Defines advanced parameters for the target 802.11b/g radio. Syntax: <wlan-name> <bssid> set wlan Defines advanced WLAN to BSSID mapping for the target radio. <bss-id> <wlan name> Sets the BSSID to primary WLAN definition. Example: admin(network.wireless.radio.802-11bg.advanced)>set wlan demoroom 1 admin(network.wireless.radio.802-11bg.advanced)>set bss 1 demoroom...
  • Page 437 8-103 AP51xx>admin(network.wireless.radio.radio2)> Description: Displays a specific 802.11a radio submenu. The items available under this command include: Syntax: show Displays 802.11a radio settings Defines specific 802.11a radio parameters. advanced Displays the Advanced radio settings submenu. mesh Goes to the Wireless AP Connections submenu. Goes to the parent menu.
  • Page 438 8-104 AP-51xx Access Point Product Reference Guide AP51xx>admin(network.wireless.radio.802-11a)> show Description: Displays specific 802.11a radio settings. Syntax: show radio Displays specific 802.11a radio settings. Displays specific 802.11a radio WMM QoS settings. Example: admin(network.wireless.radio.802-11a)>show radio Radio Setting Information Placement : indoor MAC Address : 00A0F8715920 Radio Type : 802.11a...
  • Page 439 8-105 admin(network.wireless.radio.802-11a)>show qos Radio QOS Parameter Set: 11a default ----------------------------------------------------------------------------- Access Category CWMin CWMax AIFSN TXOPs (32 sec) TXOPs ms ----------------------------------------------------------------------------- Background 1023 0.000 Best Effort 0.992 Video 3.008 Voice 1.504 For information on configuring Radio 2 Configuration options available to the access point using the applet (GUI), see Configuring the 802.11a or 802.11b/g Radio on page 5-55.
  • Page 440 8-106 AP-51xx Access Point Product Reference Guide AP51xx>admin(network.wireless.radio.802-11a)> set Description: Defines specific 802.11a radio parameters. Syntax: set placement Defines the access point radio placement as indoors or outdoors. ch-mode Determines how the radio channel is selected. channel Defines the actual channel used by the radio. antenna Sets the radio antenna power.
  • Page 441 8-107 AP51xx>admin(network.wireless.radio.802-11a.advanced)> Description: Displays the advanced submenu for the 802-11a radio. The items available under this command include: Syntax: show Displays advanced radio settings for the 802-11a radio. Defines advanced parameters for the 802-11a radio. Goes to the parent menu. Goes to the root menu.
  • Page 442 8-108 AP-51xx Access Point Product Reference Guide AP51xx>admin(network.wireless.radio.802-11a.advanced)> show Description: Displays the BSSID to WLAN mapping for the 802.11a radio. Syntax: show advanced Displays advanced settings for the 802.11a radio. wlan Displays WLAN summary list for 802.11a radio. Example: admin(network.wireless.radio.802-11a.advanced)>show advanced ----------------------------------------------------------------------------- WLAN BSS ID...
  • Page 443 8-109 AP51xx>admin(network.wireless.radio.802-11a.advanced)> set Description: Defines advanced parameters for the target 802..11a radio. Syntax: <wlan-name> <bssid> set wlan Defines advanced WLAN to BSSID mapping for the target radio. <bss-id> <wlan name> Sets the BSSID to primary WLAN definition. Example: admin(network.wireless.radio.802-11a.advanced)>set wlan demoroom 1 admin(network.wireless.radio.802-11a.advanced)>set bss 1 demoroom For information on configuring Radio 2 Configuration options available to the access point using the applet (GUI), see Configuring the...
  • Page 444: Network Quality Of Service (Qos) Commands

    8-110 AP-51xx Access Point Product Reference Guide 8.3.3.5 Network Quality of Service (QoS) Commands AP51xx>admin(network.wireless.qos)> Description: Displays the access point Quality of Service (QoS) submenu. The items available under this command include: show Displays access point QoS policy information. create Defines the parameters of the QoS policy.
  • Page 445 8-111 AP51xx>admin(network.wireless.qos)> show Description: Displays the access point’s current QoS policy by summary or individual policy. Syntax: show summary Displays all exisiting QoS policies that have been defined. policy <index> Displays the configuration for the requested QoS policy. Example: admin(network.wireless.qos)>show summary ---------------------------------------------------------------------- QOS Policy Name Associated WLANs...
  • Page 446 8-112 AP-51xx Access Point Product Reference Guide AP51xx>admin(network.wireless.qos.create)> Description: Defines an access point QoS policy. Syntax: show Displays QoS policy parameters. qos-name <index> Sets the QoS name for the specified index entry. <index> Enables or disables support (by index) for legacy VOIP devices. mcast <mac>...
  • Page 447 8-113 AP51xx>admin(network.wireless.qos.edit)> Descripton: Edits the properties of an existing QoS policy. Syntax: show Displays QoS policy parameters. qos-name <index> Sets the QoS name for the specified index entry. <index> Enables or disables support (by index) for legacy VOIP devices. mcast <mac>...
  • Page 448 8-114 AP-51xx Access Point Product Reference Guide AP51xx>admin(network.wireless.qos)> delete Description: Removes a QoS policy. Syntax: delete <qos-name> Deletes the specified QoS polciy index, or all of the policies (except default policy). <all> For information on configuring the WLAN QoS options available to the access point using the applet (GUI), see Setting the WLAN Quality of Service (QoS) Policy on page 5-39.
  • Page 449: Network Bandwith Management Commands

    8-115 8.3.3.6 Network Bandwith Management Commands AP51xx>admin(network.wireless.bandwidth)> Description: Displays the access point Bandwidth Management submenu. The items available under this command include: show Displays Bandwidth Management information for how data is processed by the access point. Defines Bandwidth Management parameters for the access point. Goes to the parent menu.
  • Page 450 8-116 AP-51xx Access Point Product Reference Guide AP51xx>admin(network.wireless.bandwidth)> show Description: Displays the access point’s current Bandwidth Management configuration. Syntax: show Displays the current Bandwidth Management configuration for defined WLANs and how they are weighted. Example: admin(network.wireless.bandwidth)>show Bandwidth Share Mode : First In First Out For information on configuring the Bandwidth Management options available to the access point using the applet (GUI), see Configuring Bandwidth Management Settings on page 5-63.
  • Page 451 8-117 AP51xx>admin(network.wireless.bandwidth)> set Description: Defines the access point Bandwidth Management configuration. Syntax: set mode <bw-mode> Defines bandwidth share mode of First In First Out <fifo>, Round Robin <rr> or Weighted Round Robin <wrr> weight <num> Assigns a bandwidth share allocation for the WLAN <index 1- 16 >...
  • Page 452: Network Rogue-Ap Commands

    8-118 AP-51xx Access Point Product Reference Guide 8.3.3.7 Network Rogue-AP Commands AP51xx>admin(network.wireless.rogue-ap)> Description: Displays the Rogue AP submenu. The items available under this command include: show Displays the current access point Rogue AP detection configuration. Defines the Rogue AP detection method. mu-scan Goes to the Rogue AP mu-uscan submenu.
  • Page 453 MU Scan Interval : 60 minutes On-Channel : disable Detector Radio Scan : enable Auto Authorize Motorola APs : disable Approved APs age out : 0 minutes Rogue APs age out : 0 minutes For information on configuring the Rogue AP options available to the access point using the applet (GUI), see...
  • Page 454 Enables or disables AP detector scan (dual-radio model only). ABG-scan <mode> Enables or disables A/BG Detector Scan Mode. motorola-ap <mode> Enables or disables the Authorize Any AP with a Motorola MAC address option. applst-ageout <minutes> Sets the approved AP age out time. roglst-ageout <minutes>...
  • Page 455 8-121 AP51xx>admin(network.wireless.rogue-ap.mu-scan)> Description: Displays the Rogue-AP mu-scan submenu. Syntax: Add all or just one scan result to Allowed AP list. show Displays all APs located by the MU scan. start Initiates scan immediately by the MU. Goes to the parent menu. Goes to the root menu.
  • Page 456 8-122 AP-51xx Access Point Product Reference Guide AP51xx>admin(network.wireless.rogue-ap.mu-scan)> start Description: Initiates an MU scan from a user provided MAC address. Syntax: start <mu-mac> Initiates MU scan from user provided MAC address. For information on configuring the Rogue AP options available to the access point using the applet (GUI), see Configuring Rogue AP Detection on page 6-55.
  • Page 457 8-123 AP51xx>admin(network.wireless.rogue-ap.mu-scan)> show Description: Displays the results of an MU scan. Syntax: show Displays all APs located by the MU scan. For information on configuring the Rogue AP options available to the access point using the applet (GUI), see Configuring Rogue AP Detection on page 6-55.
  • Page 458 8-124 AP-51xx Access Point Product Reference Guide AP51xx>admin(network.wireless.rogue-ap.allowed-list)> Description: Displays the Rogue-AP allowed-list submenu. show Displays the rogue AP allowed list Adds an AP MAC address and ESSID to the allowed list. delete Deletes an entry or all entries from the allowed list. Goes to the parent menu.
  • Page 459 8-125 AP51xx>admin(network.wireless.rogue-ap.allowed-list)> show Description: Displays the Rogue AP allowed List. Syntax: show Displays the rogue-AP allowed list. Example: admin(network.wireless.rogue-ap.allowed-list)>show Allowed AP List ----------------------------------------------------------------------------- index ap mac essid ----------------------------------------------------------------------------- 00:A0:F8:71:59:20 00:A0:F8:33:44:55 00:A0:F8:40:20:01 Marketing For information on configuring the Rogue AP options available to the access point using the applet (GUI), see Configuring Rogue AP Detection on page 6-55.
  • Page 460 8-126 AP-51xx Access Point Product Reference Guide AP51xx>admin(network.wireless.rogue-ap.allowed-list)> add Description: Adds an AP MAC address and ESSID to existing allowed list. Syntax: <mac-addr> Adds an AP MAC address and ESSID to existing allowed list. “fffffffffffffffff” means any MAC <ess-id> Use a “*” for any ESSID. Example: admin(network.wireless.rogue-ap.allowed-list)>add 00A0F83161BB 103 admin(network.wireless.rogue-ap.allowed-list)>show...
  • Page 461 8-127 AP51xx>admin(network.wireless.rogue-ap.allowed-list)> delete Description: Deletes an AP MAC address and ESSID to existing allowed list. Syntax: delete <idx> Deletes an AP MAC address and ESSID (or all addresses) from the allowed list. <all> For information on configuring the Rogue AP options available to the access point using the applet (GUI), see Configuring Rogue AP Detection on page 6-55.
  • Page 462: Network Mu Locationing Commands

    8-128 AP-51xx Access Point Product Reference Guide 8.3.3.8 Network MU Locationing Commands AP51xx>admin(network.wireless.mu-locationing)> Description: Displays the MU Locationing submenu. The items available under this command include: show Displays the current MU Locationing configuration. Defines MU Locationing parameters. Goes to the parent menu. Goes to the root menu.
  • Page 463 8-129 AP51xx>admin(network.wireless.mu-locationing> show Description: Displays the MU probe table configuration Syntax: show Displays the MU probe table configuration. Example: admin(network.wireless.mu-locationing)>show MU Probe Table Mode : disable MU Probe Table Size : 200 admin(network.wireless.mu-locationing)>...
  • Page 464 8-130 AP-51xx Access Point Product Reference Guide AP51xx>admin(network.wireless.mu-locationing> set Description: Defines the MU probe table configuration used for locating MUs. Syntax: Defines the MU probe table configuration. mode Enables/disables a mu probe scan. size Defines the number of MUs in the table (the maximum allowed is 200). Example: admin(network.wireless.mu-locationing)>set admin(network.wireless.mu-locationing)>set mode enable...
  • Page 465: Network Firewall Commands

    8-131 8.3.4 Network Firewall Commands AP51xx>admin(network.firewall)> Description: Displays the access point firewall submenu. The items available under this command include: show Displays the access point’s current firewall configuration. Defines the access point’s firewall parameters. access Enables/disables firewall permissions through the LAN and WAN ports. advanced Displays interoperaility rules between the LAN and WAN ports.
  • Page 466 8-132 AP-51xx Access Point Product Reference Guide AP51xx>admin(network.firewall)> show Description: Displays the access point firewall parameters. Syntax: show Shows all access point’s firewall settings. Example: admin(network.firewall)>show Firewall Status : disable NAT Timeout : 10 minutes Configurable Firewall Filters: ftp bounce attack filter : enable syn flood attack filter : enable...
  • Page 467 8-133 AP51xx>admin(network.firewall)> set Description: Defines the access point firewall parameters. Syntax: set mode <mode> Enables or disables the firewall. nat-timeout <interval> Defines the NAT timeout value. <mode> Enables or disables SYN flood attack check. <mode> Enables or disables source routing check. <mode>...
  • Page 468 8-134 AP-51xx Access Point Product Reference Guide AP51xx>admin(network.firewall)> access Description: Enables or disables firewall permissions through LAN to WAN ports. Syntax: show Displays LAN to WAN access rules. Sets LAN to WAN access rules. Adds LAN to WAN exception rules. delete Deletes LAN to WAN access exception rules.
  • Page 469 8-135 AP51xx>admin(network.firewall)> advanced Description: Displays whether an access point firewall rule is intended for inbound traffic to an interface or outbound traffic from that interface.. Syntax: show Shows advanced subnet access parameters. Sets advanced subnet access parameters. import Imports rules from subnet access. inbound Goes to the Inbound Firewall Rules submenu.
  • Page 470: Network Router Commands

    8-136 AP-51xx Access Point Product Reference Guide 8.3.5 Network Router Commands AP51xx>admin(network.router)> Description: Displays the router submenu. The items available under this command are: show Displays the existing access point router configuration. Sets the RIP parameters. Adds user-defined routes. delete Deletes user-defined routes.
  • Page 471 8-137 AP51xx>admin(network.router)> show Description: Shows the access point route table. Syntax: show Shows the access point route table. Example: admin(network.router)>show routes ---------------------------------------------------------------------------- index destination netmask gateway interface metric ---------------------------------------------------------------------------- 192.168.2.0 255.255.255.0 0.0.0.0 lan1 192.168.1.0 255.255.255.0 0.0.0.0 lan2 192.168.0.0 255.255.255.0 0.0.0.0 lan1 192.168.24.0 255.255.255.0...
  • Page 472 8-138 AP-51xx Access Point Product Reference Guide AP51xx>admin(network.router)> set Description: Shows the access point route table. Syntax: set auth Sets the RIP authentication type. Sets RIP direction. Sets MD5 authetication ID. Sets MD5 authetication key. passwd Sets the password for simple authentication. type Defines the RIP type.
  • Page 473 8-139 AP51xx>admin(network.router)> add Description: Adds user-defined routes. Syntax: <dest> <netmask> <gw> <iface> <metric> Adds a route with destination IP address <dest>, IP netmask <netmask>, destination gateway IP address <gw>, interface LAN1, LAN2 or WAN <iface>, and metric set to <metric> (1-65536).
  • Page 474 8-140 AP-51xx Access Point Product Reference Guide AP51xx>admin(network.router)> delete Description: Deletes user-defined routes. Syntax: delete <idx> Deletes the user-defined route <idx> (1-20) from list. Deletes all user-defined routes. Example: admin(network.router)>list ---------------------------------------------------------------------------- index destination netmask gateway interface metric ---------------------------------------------------------------------------- 192.168.2.0 255.255.255.0 192.168.0.1 lan1 192.168.1.0...
  • Page 475 8-141 AP51xx>admin(network.router)> list Description: Lists user-defined routes. Syntax: list Displays a list of user-defined routes. Example: admin(network.router)>list ---------------------------------------------------------------------------- index destination netmask gateway interface metric ---------------------------------------------------------------------------- 192.168.2.0 255.255.255.0 192.168.0.1 lan1 192.168.1.0 255.255.255.0 0.0.0.0 lan2 192.168.0.0 255.255.255.0 0.0.0.0 lan1 For information on configuring the Router options available to the access point using the applet (GUI), see Configuring Router Settings on page 5-66.
  • Page 476: System Commands

    8-142 AP-51xx Access Point Product Reference Guide 8.4 System Commands AP51xx>admin(system)> Description: Displays the System submenu. The items available under this command are shown below. restart Restarts the access point. show Shows access point system parameter settings. Defines access point system parameter settings. lastpw Displays last debug password.
  • Page 477 ** Please be sure to save changes before resetting. ************************************************************************** Are you sure you want to restart the AP-51xx?? (yes/no): AP-51xx Boot Firmware Version 2.0.0.0-xxx Copyright(c) Motorola 2007. All rights reserved. Press escape key to run boot firmware ..Power On Self Test testing ram...
  • Page 478 8-144 AP-51xx Access Point Product Reference Guide AP51xx>admin(system)>show Description: Displays high-level system information helpful to differentiate this access point. Syntax: show Displays access point system information. Example: admin(system)>show system name : BldgC system location : Atlanta Field Office admin email address : johndoe@mycompany.com system uptime : 0 days 4 hours 41 minutes...
  • Page 479 8-145 AP51xx>admin(system)>set Description: Sets access point system parameters. Syntax: set name <name> Sets the access point system name to <name> (1 to 59 characters). The access point does not allow intermediate space characters between characters within the system name. For example, “AP51xx sales” must be changed to “AP51xxsales”...
  • Page 480 8-146 AP-51xx Access Point Product Reference Guide AP51xx>admin(system)>lastpw Description: Displays last expired debug password. Example: admin(system)>lastpw AP-51xx MAC Address is 00:15:70:02:7A:66 Last debug password was motorola Current debug password used 0 times, valid 4 more time(s) admin(system)>...
  • Page 481 8-147 AP51xx>admin(system)>arp Description: Dispalys the access point’s arp table. Example: admin(system)>arp Address HWtype HWaddress Flags Mask Iface 157.235.92.210 ether 00:11:25:14:61:A8 ixp1 157.235.92.179 ether 00:14:22:F3:D7:39 ixp1 157.235.92.248 ether 00:11:25:B2:09:60 ixp1 157.235.92.180 ether 00:0D:60:D0:06:90 ixp1 157.235.92.3 ether 00:D0:2B:A0:D4:FC ixp1 157.235.92.181 ether 00:15:C5:0C:19:27 ixp1 157.235.92.80 ether...
  • Page 482: Adaptive Ap Setup Commands

    8-148 AP-51xx Access Point Product Reference Guide 8.4.1 Adaptive AP Setup Commands AP51xx>admin(system)>aap-setup Description: Displays the Adaptive AP submenu. show Displays Adaptive AP information. Defines the Adaptive AP configuration. delete Deletes static switch address assignments. Goes to the parent menu. Goes to the root menu.
  • Page 483 8-149 AP51xx>admin(system.aap-setup)>show Description: Displays the access point’s Adaptive AP configuration. Syntax: show Displays the access point’s Adaptive AP configuration. Example: admin(system.aap-setup)>show Auto Discovery Mode : disable Switch Interface : lan1 Switch Name : greg Static IP Port : 24576 Static IP Address IP Address 1 : 0.0.0.0 IP Address 2...
  • Page 484 8-150 AP-51xx Access Point Product Reference Guide AP51xx>admin(system.aap-setup)>set Description: Sets access point’s Adaptive AP configuration. Syntax: set auto-discovery Sets the switch auto-discovery mode (enable/disable). interface Defines the tunnel interface. ipadr Defines the switch IP address used. name Defines the switch name for DNS lookups. port Sets the port.
  • Page 485 8-151 AP51xx>admin(system.aap-setup)>delete Description: Deletes static switch address assignments. Syntax: delete <idx> Deletes static switch address assignments by selecte index. <all> Deletes all assignments. Example: admin(system.aap-setup)>delete 1 admin(system.aap-setup)> For information on configuring Adaptive AP using the applet (GUI), see Adaptive AP Setup on page 4-6.
  • Page 486: System Access Commands

    8-152 AP-51xx Access Point Product Reference Guide 8.4.2 System Access Commands AP51xx>admin(system)>access Description: Displays the access point access submenu. show Displays access point system access capabilities. Goes to the access point system access submenu. Goes to the parent menu. Goes to the root menu. save Saves the current configuration to the access point system flash.
  • Page 487 8-153 AP51xx>admin(system.access)>set Description: Defines the permissions to access the access point applet, CLI, SNMP as well as defining their timeout values. Syntax: set applet Defines the applet HTTP/HTTPS access parameters. app-timeout <minutes> Sets the applet timeout. Default is 300 Mins. Defines CLI Telnet access parameters.
  • Page 488 8-154 AP-51xx Access Point Product Reference Guide AP51xx>admin(system.access)>show Description: Displays the current access point access permissions and timeout values. Syntax: show Shows all of the current system access settings for the access point.. Example: admin(system.access)>show -------------------------------From LAN1-------From LAN2-------From WAN applet http access enable enable enable...
  • Page 489: System Certificate Management Commands

    8-155 8.4.3 System Certificate Management Commands AP51xx>admin(system)>cmgr Description: Displays the Certificate Manager submenu. The items available under this command include: genreq Generates a Certificate Request. delself Deletes a Self Certificate. loadself Loads a Self Certificate signed by CA. listself Lists the self certificate loaded. loadca Loads trusted certificate from CA.
  • Page 490 8-156 AP-51xx Access Point Product Reference Guide AP51xx>admin(system.cmgr)> genreq Description: Generates a certificate request. Syntax: genreq <IDname> <Subject> [-ou <OrgUnit>] [-on <OrgName>] [-cn <City>] [-st <State>] ..[-p <PostCode>] [-cc <CCode>] [-e <Email>] [-d <Domain>] [-i <IP>] [-sa <SAlgo>] Generates a self-certificate request for a Certification Authority (CA), where:...
  • Page 491 8-157 AP51xx>admin(system.cmgr)> delself Description: ) Deletes a self certificate. Syntax: delself <IDname> Deletes the self certificate named <IDname>. Example: admin(system.cmgr)>delself MyCert2 For information on configuring self certificate settings using the applet (GUI), see Creating Self Certificates for Accessing the VPN on page 4-16.
  • Page 492 8-158 AP-51xx Access Point Product Reference Guide AP51xx>admin(system.cmgr)> loadself Description: Loads a self certificate signed by the Certificate Authority. Syntax: loadself <IDname> Load the self certificate signed by the CA with name <IDname>. For information on configuring self certificate settings using the applet (GUI), see Creating Self Certificates for Accessing the VPN on page 4-16.
  • Page 493 8-159 AP51xx>admin(system.cmgr)> listself Description: Lists the loaded self certificates. Syntax: listself Lists all self certificates that are loaded. For information on configuring self certificate settings using the applet (GUI), see Creating Self Certificates for Accessing the VPN on page 4-16.
  • Page 494 8-160 AP-51xx Access Point Product Reference Guide AP51xx>admin(system.cmgr)> loadca Description: Loads a trusted certificate from the Certificate Authority. Syntax: loadca Loads the trusted certificate (in PEM format) that is pasted into the command line. For information on configuring certificate settings using the applet (GUI), see Importing a CA Certificate on page 4-14.
  • Page 495 8-161 AP51xx>admin(system.cmgr)> delca Description: Deletes a trusted certificate. Syntax: delca <IDname> Deletes the trusted certificate. For information on configuring certificate settings using the applet (GUI), see Importing a CA Certificate on page 4-14.
  • Page 496 8-162 AP-51xx Access Point Product Reference Guide AP51xx>admin(system.cmgr)> listca Description: Lists the loaded trusted certificate. Syntax: listca Lists the loaded trusted certificates. For information on configuring certificate settings using the applet (GUI), see Importing a CA Certificate on page 4-14.
  • Page 497 8-163 AP51xx>admin(system.cmgr)> showreq Description: Displays a certificate request in PEM format. Syntax: showreq <IDname> Displays a certificate request named <IDname> generated from the genreq command. For information on configuring certificate settings using the applet (GUI), see Importing a CA Certificate on page 4-14.
  • Page 498 8-164 AP-51xx Access Point Product Reference Guide AP51xx>admin(system.cmgr)> delprivkey Description: Deletes a private key. Syntax: delprivkey <IDname> Deletes private key named <IDname>. For information on configuring certificate settings using the applet (GUI), see Creating Self Certificates for Accessing the VPN on page 4-16.
  • Page 499 8-165 AP51xx>admin(system.cmgr)> listprivkey Description: Lists the names of private keys. Syntax: listprivkey Lists all private keys. For information on configuring certificate settings using the applet (GUI), see Importing a CA Certificate on page 4-14.
  • Page 500 8-166 AP-51xx Access Point Product Reference Guide AP51xx>admin(system.cmgr)> expcert Description: Exports the certificate file to a user defined location. Syntax: expcert Exports the access point’s CA or Self certificate file. To export certificate information from an AP-5131 or AP-5181 model access point: admin(system.cmgr)>expcert ? <type>...
  • Page 501 8-167 AP51xx>admin(system.cmgr)> impcert Description: Imports the target certificate file. Syntax: impcert Imports the target certificate file. To import certificate information from an AP-5131 or AP-5181 model access point: admin(system.cmgr)>impcert ? <type> <file name> <cr> : type: ftp/tftp : file name: Certificate file name : Server options for this file are the same : as that for the configuration file admin(system.cmgr)>impcert tftp AP-51x1certs.txt...
  • Page 502: System Snmp Commands

    8-168 AP-51xx Access Point Product Reference Guide 8.4.4 System SNMP Commands AP51xx>admin(system)> snmp Description: Displays the SNMP submenu. The items available under this command are shown below. access Goes to the SNMP access submenu. traps Goes to the SNMP traps submenu. Goes to the parent menu.
  • Page 503: System Snmp Access Commands

    8-169 8.4.4.1 System SNMP Access Commands AP51xx>admin(system.snmp.access) Description: Displays the SNMP Access menu. The items available under this command are shown below. show Shows SNMP v3 engine ID. Adds SNMP access entries. delete Deletes SNMP access entries. list Lists SNMP access entries. Goes to the parent menu.
  • Page 504 8-170 AP-51xx Access Point Product Reference Guide AP51xx>admin(system.snmp.access)> show Description: Shows the SNMP v3 engine ID. Syntax: show Shows the SNMP v3 Engine ID. Example: admin(system.snmp.access)>show eid access point snmp v3 engine id : 000001846B8B4567F871AC68 admin(system.snmp.access)> For information on configuring SNMP access settings using the applet (GUI), see Configuring SNMP Access Control on page 4-29.
  • Page 505 8-171 AP51xx>admin(system.snmp.access)> add Description: Adds SNMP access entries for specific v1v2 and v3 user definitions. Syntax: add acl <ip1> <ip2> Adds an entry to the SNMP access control list with <ip1> as the starting IP address and <ip2> and as the ending IP address. v1v2c <comm>...
  • Page 506 8-172 AP-51xx Access Point Product Reference Guide AP51xx>admin(system.snmp.access)> delete Description: Deletes SNMP access entries for specific v1v2 and v3 user definitions. Syntax: delete acl <idx> Deletes entry <idx> (1-10) from the access control list. Deletes all entries from the access control list. v1v2c <idx>...
  • Page 507 8-173 AP51xx>admin(system.snmp.access)> list Description: Lists SNMP access entries. Syntax: list acl Lists SNMP access control list entries. v1v2c Lists SNMP v1/v2c configuration. <idx> Lists SNMP v3 user definition with index <idx>. Lists all SNMP v3 user definitions. Example: admin(system.snmp.access)>list acl ---------------------------------------------------------------- index start ip...
  • Page 508: System Snmp Traps Commands

    8-174 AP-51xx Access Point Product Reference Guide 8.4.4.2 System SNMP Traps Commands AP51xx>admin(system.snmp.traps) Description: Displays the SNMP traps submenu. The items available under this command are shown below. show Shows SNMP trap parameters. Sets SNMP trap parameters. Adds SNMP trap entries. delete Deletes SNMP trap entries.
  • Page 509 8-175 AP51xx>admin(system.snmp.traps)> show Description: Shows SNMP trap parameters. Syntax: show trap Shows SNMP trap parameter settings. rate-trap Shows SNMP rate-trap parameter settings. Example: admin(system.snmp.traps)>show trap SNMP MU Traps mu associated : enable mu unassociated : disable mu denied association : disable mu denied authentication : disable SNMP Traps...
  • Page 510 8-176 AP-51xx Access Point Product Reference Guide AP51xx>admin(system.snmp.traps)> set Description: Sets SNMP trap parameters. Syntax: set mu-assoc enable/disable Enables/disables the MU associated trap. mu-unassoc enable/disable Enables/disables the MU unassociated trap. mu-deny-assoc enable/disable Enables/disables the MU association denied trap. mu-deny-auth enable/disable Enables/disables the MU authentication denied trap.
  • Page 511 8-177 AP51xx>admin(system.snmp.traps)> add Description: Adds SNMP trap entries. Syntax: add v1v2 <ip> <port> <comm> <ver> Adds an entry to the SNMP v1/v2 access list with the destination IP address set to <ip>, the destination UDP port set to <port>, the community string set to <comm> (1 to 31 characters), and the SNMP version set to <ver>. <ip>...
  • Page 512 8-178 AP-51xx Access Point Product Reference Guide AP51xx>admin(system.snmp.traps)> delete Description: Deletes SNMP trap entries. Syntax: delete v1v2c <idx> Deletes entry <idx> from the v1v2c access control list. Deletes all entries from the v1v2c access control list. <idx> Deletes entry <idx> from the v3 access control list. Deletes all entries from the v3 access control list.
  • Page 513 8-179 AP51xx>admin(system.snmp.traps)> list Description: Lists SNMP trap entries. Syntax: list v1v2c Lists SNMP v1/v2c access entries. <idx> Lists SNMP v3 access entry <idx>. Lists all SNMP v3 access entries. Example: admin(system.snmp.traps)>add v1v2 203.223.24.2 162 mycomm v1 admin(system.snmp.traps)>list v1v2c ---------------------------------------------------------------------- index dest ip dest port community...
  • Page 514: System User Database Commands

    8-180 AP-51xx Access Point Product Reference Guide 8.4.5 System User Database Commands AP51xx>admin(system)> userdb Description: Goes to the user database submenu. Syntax: user Goes to the user submenu. group Goes to the group submenu. save Saves the configuration to system flash. Goes to the parent menu.
  • Page 515 8-181 8.4.5.1 Adding and Removing Users from the User Databse AP51xx>admin(system.userdb)> user Description: Adds and remvoves users from the user database and defines user passwords. Syntax: Adds a new user. delete Deletes a new user. clearall Removes all existing user IDs from the system. Sets a password for a user.
  • Page 516 8-182 AP-51xx Access Point Product Reference Guide AP51xx>admin(system.userdb.user)> add Description: Adds a new user to the user database. Syntax: Adds a new user to the user database. Example: admin(system.userdb.user>add george password admin(system.userdb.user> For information on configuring User Database permissions using the applet (GUI), see Defining User Access Permissions by Group on page 6-76.
  • Page 517 8-183 AP51xx>admin(system.userdb.user)> delete Description: Removes a new user to the user database. Syntax: delete Removes a new user to the user database. Example: admin(system.userdb.user>delete george admin(system.userdb.user> For information on configuring User Database permissions using the applet (GUI), see Defining User Access Permissions by Group on page 6-76.
  • Page 518 8-184 AP-51xx Access Point Product Reference Guide AP51xx>admin(system.userdb.user)>clearall Description: Removes all existing user IDs from the system. Syntax: clearall Removes all existing user IDs from the system. Example: admin(system.userdb.user>clearall admin(system.userdb.user> For information on configuring User Database permissions using the applet (GUI), see Defining User Access Permissions by Group on page 6-76.
  • Page 519 8-185 AP51xx>admin(system.userdb.user)>set Description: Sets a password for a user.. Syntax: <user> <pw> Sets a password for a specific user. Example: admin(system.userdb.user>set george password admin(system.userdb.user> For information on configuring User Database permissions using the applet (GUI), see Defining User Access Permissions by Group on page 6-76.
  • Page 520 8-186 AP-51xx Access Point Product Reference Guide 8.4.5.2 Adding and Removing Groups from the User Databse AP51xx>admin(system.userdb)> group Description: Adds and remvoves groups from the user database. Syntax: create Creates a group name. delete Deletes a group name. clearall Removes all existing group names from the system. Adds a user to an existing group.
  • Page 521 8-187 AP51xx>admin(system.userdb.group> create Description: Creates a group name. Once defined, users can be added to the group. Syntax: create Creates a group name. Once defined, users can be added to the group. Example: admin(system.userdb.group>create 2 admin(system.userdb.group> For information on configuring User Database permissions using the applet (GUI), see Defining User Access Permissions by Group on page 6-76.
  • Page 522 8-188 AP-51xx Access Point Product Reference Guide AP51xx>admin(system.userdb.group> delete Description: Deletes an existing group. Syntax: delete Deletes an existing group. Example: admin(system.userdb.group>delete 2 admin(system.userdb.group> For information on configuring User Database permissions using the applet (GUI), see Defining User Access Permissions by Group on page 6-76.
  • Page 523 8-189 AP51xx>admin(system.userdb.group> clearall Description: Removes all existing group names from the system. Syntax: clearall Removes all existing group names from the system. Example: admin(system.userdb.group>clearall admin(system.userdb.group> For information on configuring User Database permissions using the applet (GUI), see Defining User Access Permissions by Group on page 6-76.
  • Page 524 8-190 AP-51xx Access Point Product Reference Guide AP51xx>admin(system.userdb.group> add Description: Adds a user to an existing group. Syntax: <userid> <group> Adds a user <userid> to an existing group <group>. Example: admin(system.userdb.group>add lucy group x admin(system.userdb.group> For information on configuring User Database permissions using the applet (GUI), see Defining User Access Permissions by Group on page 6-76.
  • Page 525 8-191 AP51xx>admin(system.userdb.group> remove Description: Removes a user from an existing group. Syntax: remove <userid> <group> Removes a user <userid> from an existing group<group> . Example: admin(system.userdb.group>remove lucy group x admin(system.userdb.group> For information on configuring User Database permissions using the applet (GUI), see Defining User Access Permissions by Group on page 6-76...
  • Page 526 8-192 AP-51xx Access Point Product Reference Guide AP51xx>admin(system.userdb.group> show Description: Displays existing groups. Syntax: show Displays existing groups and users, users Displays configured user IDs for a group. groups Displays configured groups. Example: admin(system.userdb.group>show groups List of Group Names : engineering : marketing : demo room admin(system.userdb.group>...
  • Page 527: System Radius Commands

    8-193 8.4.6 System Radius Commands AP51xx>admin(system)> radius Description: Goes to the Radius system submenu. Syntax: Goes to the EAP submenu. policy Goes to the access policy submenu. ldap Goes to the LDAP submenu. proxy Goes to the proxy submenu. client Goes to the client submenu.
  • Page 528 8-194 AP-51xx Access Point Product Reference Guide AP51xx>admin(system.radius)> set/show Description: Sets or displays the Radius user database. Syntax: Sets the Radius user database. show all Displays the Radius user database. Example: admin(system.radius)>set database local admin(system.radius)>show all Database : local admin(system.radius)> For information on configuring Radius using the applet (GUI), see Configuring User Authentication on page 6-64.
  • Page 529 8-195 8.4.6.1 AP51xx>admin(system.radius)> eap Description: Goes to the EAP submenu. Syntax: peap Goes to the Peap submenu. ttls Goes to the TTLS submenu. import Imports the requested EAP certificates. Defines EAP parameters. show Displays the EAP configuration. save Saves the configuration to system flash. quit Quits the CLI.
  • Page 530 8-196 AP-51xx Access Point Product Reference Guide AP51xx>admin(system.radius.eap)> peap Description: Goes to the Peap submenu. Syntax: Defines Peap parameters. show Displays the Peap configuration. save Saves the configuration to system flash. quit Quits the CLI. Goes to the parent menu. Goes to the root menu.
  • Page 531 8-197 AP51xx>admin(system.radius.eap.peap> set/show Description: Defines and displays Peap parameters Syntax: Sets the Peap authentication <type>. show Displays the Peap authentication type. Example: admin(system.radius.eap.peap)>set auth gtc admin(system.radius.eap.peap)>show PEAP Auth Type : gtc For information on configuring EAP PEAP Radius values using the applet (GUI), see Configuring User Authentication on page 6-64.
  • Page 532 8-198 AP-51xx Access Point Product Reference Guide AP51xx>admin(system.radius.eap)> ttls Description: Goes to the TTLS submenu. Syntax: Defines TTLS parameters. show Displays the TTLS configuration. save Saves the configuration to system flash. quit Quits the CLI. Goes to the parent menu. Goes to the root menu.
  • Page 533 8-199 AP51xx>admin(system.radius.eap.ttls> set/show Description: Defines and displays TTLS parameters Syntax: Sets the TTLS authentication <type>. show Displays the TTLS authentication type. Example: admin(system.radius.eap.ttls)>set auth pap admin(system.radius.eap.ttls)>show TTLS Auth Type : gtc For information on configuring EAP TTLS Radius values using the applet (GUI), see Configuring User Authentication on page 6-64.
  • Page 534 8-200 AP-51xx Access Point Product Reference Guide 8.4.6.2 AP51xx>admin(system.radius)> policy Description: Goes to the access policy submenu. Syntax: Sets a group’s WLAN access policy. access-time Goes to the time based login submenu. show Displays the group’s access policy. save Saves the configuration to system flash. quit Quits the CLI.
  • Page 535 8-201 AP51xx>admin(system.radius.policy> set Description: Defines the group’s WLAN access policy. Syntax: <group name> Defines the group’s <group name> WLAN access policy (defined as a string). <wlan name> Example: admin(system.radius.policy)>set engineering 16 admin(system.radius.policy)> For information on configuring Radius WLAN policy values using the applet (GUI), see Configuring User Authentication on page 6-64.
  • Page 536 8-202 AP-51xx Access Point Product Reference Guide AP51xx>admin(system.radius.policy> access-time Description: set Goes to the time-based login submenu. Syntax: <group> Defines a target group’s access time permissions. Access time is in DayDDDD-DDDD format. <access-time> show Displays the group’s access time rule. save Saves the configuration to system flash.
  • Page 537 8-203 AP51xx>admin(system.radius.policy> show Description: Displays a group’s access policy. Syntax: show Displays a group’s access policy. Example: admin(system.radius.policy)>show List of Access Policies engineering : 16 marketing : 10 demo room test demo : No Wlans admin(system.radius.policy)> For information on configuring Radius WLAN policy values using the applet (GUI), see Configuring User Authentication on page 6-64...
  • Page 538 8-204 AP-51xx Access Point Product Reference Guide 8.4.6.3 AP51xx>admin(system.radius)> ldap Description: Goes to the LDAP submenu. Syntax: Defines the LDAP parameters. show all Displays existing LDAP parameters. save Saves the configuration to system flash. quit Quits the CLI. Goes to the parent menu. Goes to the root menu.
  • Page 539 8-205 AP51xx>admin(system.radius.ldap)> set Description: Defines the LDAP parameters. Syntax: Defines the LDAP parameters. ipadr Sets LDAP IP address. port Sets LDAP server port. binddn Sets LDAP bind distinguished name. basedn Sets LDAP base distinguished name. passwd Sets LDAP server password. login Sets LDAP login attribute.
  • Page 540 8-206 AP-51xx Access Point Product Reference Guide AP51xx>admin(system.radius.ldap)> show all Description: Displays existing LDAP parameters. Syntax: show all Displays existing LDAP parameters. Example: admin(system.radius.ldap)>show all LDAP Server IP 0.0.0.0 LDAP Server Port LDAP Bind DN cn=manager, o=trion LDAP Base DN 0=trion LDAP Login Attribute (uid=%{Stripped-User-Name:-%{User-Name}})
  • Page 541 8-207 8.4.6.4 AP51xx>admin(system.radius)> proxy Description: Goes to the Radius proxy server submenu. Syntax: Adds a proxy realm. delete Deletes a proxy realm. clearall Removes all proxy server records. Sets proxy server parameters. show Displays current Radius proxy server parameters. save Saves the configuration to system flash.
  • Page 542 8-208 AP-51xx Access Point Product Reference Guide AP51xx>admin(system.radius.proxy)> add Description: Adds a proxy. Syntax: Adds a proxy realm. name <name> Realm name. <ip1> Authentication server IP address. port <port> Authentication server port. <sec> Shared secret password. Example: admin(system.radius.proxy)>add lancelot 157.235.241.22 1812 muddy admin(system.radius.proxy)>...
  • Page 543 8-209 AP51xx>admin(system.radius.proxy)> delete Description: Adds a proxy. Syntax: delete <name> Deletes a realm name. Example: admin(system.radius.proxy)>delete lancelot admin(system.radius.proxy)> For information on configuring Radius proxy server values using the applet (GUI), see Configuring a Proxy Radius Server on page 6-70.
  • Page 544 8-210 AP-51xx Access Point Product Reference Guide AP51xx>admin(system.radius.proxy)> clearall Description: Removes all proxy server records from the system. Syntax: clearall Removes all proxy server records from the system. Example: admin(system.radius.proxy)>clearall admin(system.radius.proxy)> For information on configuring Radius proxy server values using the applet (GUI), see Configuring a Proxy Radius Server on page 6-70.
  • Page 545 8-211 AP51xx>admin(system.radius.proxy)> set Description: Sets Radius proxy server parameters. Syntax: Sets Radius proxy server parameters. delay Defines retry delay time (in seconds) for the proxy server. count Defines retry count value for the proxy server. Example: admin(system.radius.proxy)>set delay 10 admin(system.radius.proxy)>set count 5 admin(system.radius.proxy)>...
  • Page 546 8-212 AP-51xx Access Point Product Reference Guide 8.4.6.5 AP51xx>admin(system.radius)> client Description: Goes to the Radius client submenu. Syntax: Adds a Radius client to list of available clients. delete Deletes a Radius client from list of available clients. show Displays a list of configured clients. save Saves the configuration to system flash.
  • Page 547 8-213 AP51xx>admin(system.radius.client> add Description: Adds a Radius client to those available to the Radius server. Syntax: Adds a proxy. <ip> Client’s IP address. mask <ip1> Network mask address of the client. secret <sec> Shared secret password. Example: admin(system.radius.client)>add 157.235.132.11 255.255.255.225 muddy admin(system.radius.client)>...
  • Page 548 8-214 AP-51xx Access Point Product Reference Guide AP51xx>admin(system.radius.client> delete Description: Removes a specified Radius client from those available to the Radius server. Syntax: delete Removes a specified Radius client from those available to the Radius server Example: admin(system.radius.client)>delete 157.235.132.11 admin(system.radius.client)> For information on configuring Radius client values using the applet (GUI), see Configuring the Radius Server on page 6-64.
  • Page 549 8-215 AP51xx>admin(system.radius.client> show Description: Displays a list of configured Radius clients. Syntax: show Removes a specified Radius client from those available to the Radius server. Example: admin(system.radius.client)>show ---------------------------------------------------------------------------- Subnet/Host Netmask SharedSecret ---------------------------------------------------------------------------- 157.235.132.11 255.255.255.225 ***** admin(system.radius.client)> For information on configuring Radius client values using the applet (GUI), see Configuring the Radius Server on page 6-64.
  • Page 550: System Network Time Protocol (Ntp) Commands

    8-216 AP-51xx Access Point Product Reference Guide 8.4.7 System Network Time Protocol (NTP) Commands AP51xx>admin(system)> ntp Description: Displays the NTP menu. The correct network time is required for numerous functions to be configured accurately on the access point. Syntax: show Shows NTP parameters settings.
  • Page 551 8-217 AP51xx>admin(system.ntp)> show Description: Displays the NTP server configuration. Syntax: show Shows all NTP server settings. Example: admin(system.ntp)>show current time (UTC) : 2006-07-31 14:35:20 Time Zone: ntp mode : enable preferred Time server ip : 203.21.37.18 preferred Time server port : 123 first alternate server ip : 203.21.37.19...
  • Page 552 8-218 AP-51xx Access Point Product Reference Guide AP51xx>admin(system.ntp)> date-zone Description: Show date, time and time zone. Syntax: date-zone Show date, time and time zone. Example: date-zone admin(system.ntp)> Date/Time : Sat 1970-Jan-03 20:06:22 +0000 UTC Time Zone For information on configuring NTP using the applet (GUI), see Configuring Network Time Protocol (NTP) on page 4-39.
  • Page 553 8-219 AP51xx>admin(system.ntp)> zone-list Description: Displays an extensive list of time zones for countries around the world. Syntax: zone-list Displays list of time zone indexes for every known zone. Example: zone-list admin(system.ntp)> For information on configuring NTP using the applet (GUI), see Configuring Network Time Protocol (NTP) on page 4-39.
  • Page 554 8-220 AP-51xx Access Point Product Reference Guide AP51xx>admin(system.ntp)> set Description: Sets NTP parameters for access point clock synchronization. Syntax: set mode <ntp-mode> Enables or disables NTP. server <idx> <ip> Sets the NTP sever IP address. port <idx> <port> Defines the port number. intrvl <period>...
  • Page 555: System Log Commands

    8-221 8.4.8 System Log Commands AP51xx>admin(system)> logs Description: Displays the access point log submenu. Logging options include: Syntax: show Shows logging options. Sets log options and parameters. view Views system log. delete Deletes the system log. send Sends log to the designated FTP Server. Goes to the parent menu.
  • Page 556 8-222 AP-51xx Access Point Product Reference Guide AP51xx>admin(system.logs)> show Description: Displays the current access point logging settings. Syntax: show Displays the current access point logging configuration. Example: admin(system.logs)>show log level : L6 Info syslog server logging : enable syslog server ip address : 192.168.0.102 For information on configuring logging settings using the applet (GUI), see Logging Configuration on page...
  • Page 557 8-223 AP51xx>admin(system.logs)> set Description: Sets log options and parameters. Syntax: level <level> Sets the level of the events that will be logged. All events with a level at or above <level> (L0-L7) will be saved to the system log. L0:Emergency L1:Alert L2:Critical L3:Errors...
  • Page 558 8-224 AP-51xx Access Point Product Reference Guide AP51xx>admin(system.logs)> view Description: Displays the access point system log file. Syntax: view Displays the entire access point system log file. Example: admin(system.logs)>view 7 16:14:00 (none) syslogd 1.4.1: restart (remote reception). 7 16:14:10 (none) klogd: :ps log:fc: queue maintenance 7 16:14:41 (none) klogd: :ps log:fc: queue maintenance 7 16:15:43 (none) last message repeated 2 times 7 16:16:01 (none) CC:...
  • Page 559 8-225 AP51xx>admin(system.logs)> delete Description: Deletes the log files. Syntax: delete Deletes the access point system log file. Example: admin(system.logs)>delete For information on configuring logging settings using the applet (GUI), see Logging Configuration on page 4-42.
  • Page 560 8-226 AP-51xx Access Point Product Reference Guide AP51xx>admin(system.logs)> send Description: Sends log and core file to an FTP Server. Syntax: send Sends the system log file via FTP to a location specified with the set command. Refer to the command set under the AP51xx>admin(config) command for information on setting up an FTP server and login information.
  • Page 561: System Configuration-Update Commands

    8-227 8.4.9 System Configuration-Update Commands AP51xx>admin(system.config)> Description: Displays the access point configuration update submenu. Syntax: default Restores the default access point configuration. partial Restores a partial default access point configuration. show Shows import/export parameters. Sets import/export access point configuration parameters. export Exports access point configuration to a designated system.
  • Page 562 8-228 AP-51xx Access Point Product Reference Guide AP51xx>admin(system.config)> default Description: Restores the full access point factory default configuration. Syntax: default Restores the access point to the original (factory) configuration. Example: admin(system.config)>default Are you sure you want to default the configuration? <yes/no>: For information on importing/exporting access point configurations using the applet (GUI), see Importing/Exporting Configurations on page...
  • Page 563 8-229 AP51xx>admin(system.config)> partial Description: Restores a partial factory default configuration. The access point’s LAN, WAN and SNMP settings are uneffected by the partial restore. Syntax: default Restores a partial access point configuration. Example: admin(system.config)>partial Are you sure you want to partially default AP-51xx? <yes/no>: For information on importing/exporting access point configurations using the applet (GUI), see Importing/Exporting Configurations on page...
  • Page 564 8-230 AP-51xx Access Point Product Reference Guide AP51xx>admin(system.config)> show Description: Displays import/export parameters for the access point configuration file. Syntax: show Shows all import/export parameters. Example: admin(system.config)>show cfg filename : cfg.txt cfg filepath ftp/tftp server ip address : 192.168.0.101 ftp user name : myadmin ftp password : ********...
  • Page 565 8-231 AP51xx>admin(system.config)> set Description: Sets the import/export parameters. Syntax: file <filename> Sets the configuration file name (1 to 39 characters in length). path <path> Defines the path used for the configuration file upload. server <ipaddress> Sets the FTP/TFTP server IP address. user <username>...
  • Page 566 8-232 AP-51xx Access Point Product Reference Guide AP51xx>admin(system.config)> export Description: Exports the configuration from the system. Syntax: export Exports the access point configuration to the FTP server. Use the set command to set the server, user, password, and file name before using this command. tftp Exports the access point configuration to the TFTP server.
  • Page 567 In turn, a dual-radio model access point cannot import/export its configuration to a single-radio access point. CAUTION Motorola discourages importing a 1.0 baseline configuration file to a 1.1 version access point. Similarly, a 1.1 baseline configuration file should not be imported to a 1.0 version access point.
  • Page 568: Firmware Update Commands

    8-234 AP-51xx Access Point Product Reference Guide 8.4.10 Firmware Update Commands AP51xx>admin(system)>fw-update Description: Displays the firmware update submenu. The items available under this command are shown below. NOTE The access point must complete the reboot process to successfully update the device firmware, regardless of whether the reboot is conducted uing the GUI or CLI interfaces.
  • Page 569 8-235 AP51xx>admin(system.fw-update)>show Description: Displays the current access point firmware update settings. Syntax: show Shows the current system firmware update settings for the access point. Example: admin(system.fw-update)>show automatic firmware upgrade : enable automatic config upgrade : enable firmware filename : APFW.bin firmware path : /tftpboot/ ftp/tftp server ip address...
  • Page 570 <name> Specifies a username for FTP server login (1 to 39 characters).. passwd <password> Specifies a password for FTP server login (1 to 39 characters).. Default is motorola. admin(system.fw-update)>set fw-auto enable admin(system.fw-update)>set cfg-auto enable admin(system.fw-update)>set file 2.0.0.0-29D admin(system.fw-update)>set path c:/fw admin(system.fw-update)>set server 157.235.111.22...
  • Page 571 8-237 AP51xx>admin(system.fw-update)>update Description: Executes the access point firmware update over the WAN or LAN port using either ftp or tftp. Syntax: update <mode><iface> Defines the ftp ot tftp mode used to conduct the firmware update. Specifies whether the update is executed over the access point’s WAN, LAN1 or LAN2 interface <iface>. NOTE The access point must complete the reboot process to successfully update the device firmware, regardless of whether the reboot is conducted uing the GUI or CLI interfaces.
  • Page 572: Statistics Commands

    8-238 AP-51xx Access Point Product Reference Guide 8.5 Statistics Commands AP51xx>admin(stats) Description: Displays the access point statistics submenu. The items available under this command are: show Displays access point WLAN, MU, LAN and WAN statistics. send-cfg-ap Sends a config file to another access point within the known AP table. send-cfg-all Sends a config file to all access points within the known AP table.
  • Page 573 8-239 AP51xx>admin(stats)> show Description: Displays access point system information. Syntax: show Displays stats for the access point WAN port. Displays stats for the access point LAN port Displays LAN Spanning Tree Status wlan Displays WLAN status and statistics summary. s-wlan Displays status and statistics for an individual WLAN radio Displays a radio statistics transmit and receive summary.
  • Page 574 8-240 AP-51xx Access Point Product Reference Guide AP51xx>admin(stats)> send-cfg-ap Description: Copies the access point’s configuration to another access point within the known AP table. Syntax: send-cfg-ap <index> Copies the access point’s configuration to the access points within the known AP table. Mesh configuration attributes do not get copied using this command and must be configured manually.
  • Page 575 8-241 AP51xx>admin(stats)> send-cfg-all Description: Copies the access point’s configuration to all of the access points within the known AP table. Syntax: send-cfg-all Copies the access point’s configuration to all of the access points within the known AP table. Example: admin(stats)>send-cfg-all admin(stats)>...
  • Page 576 8-242 AP-51xx Access Point Product Reference Guide AP51xx>admin(stats)> clear Description: Clears the specified statistics counters to zero to begin new data calculations. Syntax: clear Clears WAN statistics counters. Clears LAN statistics counters for specified LAN index (either clear lan 1 or clear lan 2). all-rf Clears all RF data.
  • Page 577 8-243 AP51xx>admin(stats)> flash-all-leds Description: Starts and stops the illumination of a specified access point’s LEDs. Syntax: flash-all-leds <index> Defines the Known AP index number of the target AP to flash. <stop/start> Begins or terminates the flash activity. Example: admin(stats)> admin(stats)>flash-all-leds 1 start Password ******** admin(stats)>flash-all-leds 1 stop admin(stats)>...
  • Page 578 8-244 AP-51xx Access Point Product Reference Guide AP51xx>admin(stats)> echo Description: Defines the echo test values used to conduct a ping test to an associated MU. Syntax: show Shows the Mobile Unit Statistics Summary. list Defines echo test parameters and result. Determines echo test packet data.
  • Page 579 8-245 AP51xx>admin.stats.echo)> show Description: Shows Mobile Unit Statistics Summary. Syntax: show Shows Mobile Unit Statistics Summary. Example: admin(stats.echo)>show ---------------------------------------------------------------------------- IP Address MAC Address WLAN Radio T-put Retries ---------------------------------------------------------------------------- 192.168.2.0 00:A0F8:72:57:83 demo For information on MU Echo and Ping tests using the applet (GUI), see Pinging Individual MUs on page 7-30.
  • Page 580 8-246 AP-51xx Access Point Product Reference Guide AP51xx>admin.stats.echo)> list Description: Lists echo test parameters and results. Syntax: list Lists echo test parameters and results. Example: admin(stats.echo)>list Station Address : 00A0F8213434 Number of Pings : 10 Packet Length : 10 Packet Data (in HEX) : 55 admin(stats.echo)>...
  • Page 581 8-247 AP51xx>admin.stats.echo)>set Description: Defines the parameters of the echo test. Syntax: station <mac> Defines MU target MAC address. request <num> Sets number of echo packets to transmit (1-539). length <num> Determines echo packet length in bytes (1-539). data <hex> Defines the particular packet data. For information on MU Echo and Ping tests using the applet (GUI), see Pinging Individual MUs on page 7-30.
  • Page 582 8-248 AP-51xx Access Point Product Reference Guide AP51xx>admin.stats.echo)> start Description: Initiates the echo test. Syntax: start Initiates the echo test. Example: admin(stats.echo)>start admin(stats.echo)>list Station Address : 00A0F843AABB Number of Pings : 10 Packet Length : 100 Packet Data (in HEX) Number of MU Responses For information on MU Echo and Ping tests using the applet (GUI), see Pinging Individual MUs on page...
  • Page 583 8-249 AP51xx>admin(stats)> ping Description: Defines the ping test values used to conduct a ping test to an AP with the same ESSID. Syntax: ping show Shows Known AP Summary details. list Defines ping test packet length. Determines ping test packet data. start Begins pinging the defined station.
  • Page 584 8-250 AP-51xx Access Point Product Reference Guide AP51xx>admin.stats.ping)> show Description: Shows Known AP Summary Details. Syntax: show Shows Known AP Summary Details. Example: admin(stats.ping)>show ---------------------------------------------------------------------------- IP Address MAC Address KBIOS Unit Name ---------------------------------------------------------------------------- 192.168.2.0 00:A0F8:72:57:83 access point...
  • Page 585 8-251 AP51xx>admin.stats.ping)> list Description: Lists ping test parameters and results. Syntax: list Lists ping test parameters and results. Example: admin(stats.ping)>list Station Address : 00A0F8213434 Number of Pings : 10 Packet Length : 10 Packet Data (in HEX) : 55 admin(stats.ping)> For information on Known AP tests using the applet (GUI), see Pinging Individual MUs on page 7-30.
  • Page 586 8-252 AP-51xx Access Point Product Reference Guide AP51xx>admin.stats.ping)> set Description: Defines the parameters of the ping test. Syntax: station Defines the AP target MAC address. request Sets number of ping packets to transmit (1-539). length Determines ping packet length in bytes (1-539). data Defines the particular packet data.
  • Page 587 8-253 AP51xx>admin.stats.echo)> start Description: Initiates the ping test. Syntax: start Initiates the ping test. Example: admin(stats.ping)>start admin(stats.ping)>list Station Address : 00A0F843AABB Number of Pings : 10 Packet Length : 100 Packet Data (in HEX) Number of AP Responses For information on Known AP tests using the applet (GUI), see Pinging Individual MUs on page 7-30.
  • Page 588 8-254 AP-51xx Access Point Product Reference Guide...
  • Page 589: Chapter 9. Configuring Mesh Networking

    Configuring Mesh Networking 9.1 Mesh Networking Overview An AP-51xx can be configured in two modes to support the new mesh networking functionality. The access point can be set to a client bridge mode and/or a base bridge mode (which accepts connections from client bridges).
  • Page 590 A mesh network must use one of the two access point LANs. If intending to use the access point for mesh networking support, Motorola recommends configuring at least one WLAN (of the 16 WLANs available) specifically for mesh networking support.
  • Page 591: The Ap-51Xx Client Bridge Association Process

    MU traffic with its associated devices. CAUTION Only Motorola AP-5131 or AP-5181 model access points can be used as base bridges, client bridges or repeaters within an access point supported mesh network. If utilizing a mesh network, Motorola recommends considering a dual-radio model to optimize channel utilization and throughput.
  • Page 592: Client Bridge Configuration Process Example

    9.1.2 Spanning Tree Protocol (STP) The access point performs mesh networking using STP as defined in the 802.1d standard. NOTE The Motorola AP-4131 access point uses a non-standard form of 802.1d STP, and is therefore not compatible as a base bridge or client bridge within an access point managed network.
  • Page 593: Defining The Mesh Topology

    The user must be able to define one node as the root. Assigning a base bridge the lowest bridge priority defines it as the root. NOTE Motorola recommends using the Mesh STP Configuration screen to define a base bridge as a root.
  • Page 594: Normal Operation

    AP-51xx Access Point Product Reference Guide 9.1.5 Normal Operation Once the mesh network is defined, all normal access point operations are still allowed. MUs are still allowed to associate with the access point as usual. The user can create WLANs, security polices and VLANs as with any other access point.
  • Page 595 The user does not necessarily have to change these settings, as the default settings will work. However, Motorola encourages the user to define an access point as a base bridge and root (using the base bridge priority settings within the Bridge STP Configuration screen). Members of the mesh network can be configured as client bridges or additional base bridges with a higher priority value.
  • Page 596 (commonly referred to as the root). Motorola recommends assigning a Base Bridge AP with the lowest bridge priority so it becomes the root in the STP. If a root already exists, set the Bridge Priorities of new APs accordingly so the root of the STP doesn't get altered.
  • Page 597: Configuring A Wlan For Mesh Networking Support

    WLAN in order to share the same ESSID, radio designation, security policy, MU ACL and Quality of Service policy. If intending to use the access point for mesh networking support, Motorola recommends configuring at least one WLAN (of the 16 WLANs available) specifically for mesh networking support.
  • Page 598 WLAN that each access point will share when using this WLAN within their mesh network. Motorola recommends assigning a unique name to a WLAN supporting a mesh network to differentiate it from WLANs defined for non mesh support. The name assigned to the...
  • Page 599 Motorola also discourages user-based authentication schemes such as Kerberos and 802.1x EAP, as these authentication schemes are not supported within a...
  • Page 600 9-12 AP-51xx Access Point Product Reference Guide If none of the existing policies are suitable, select the Create button to the right of the Security Policy drop-down menu and configure a policy suitable for the mesh network. For information on configuring a security using the authentication and encryption techniques available to the access point, see Enabling Authentication and Encryption Schemes on page...
  • Page 601: Configuring The Access Point Radio For Mesh Support

    If a hacker tries to find an ESSID via an MU, the access point’s ESSID does not display since the ESSID is not in the beacon. Motorola recommends keeping the option enabled to reduce the likelihood of hacking into the WLAN.
  • Page 602 9-14 AP-51xx Access Point Product Reference Guide To configure the access point radio for mesh networking support: NOTE The dual-radio model access point affords users better optimization of the mesh network feature by allowing the access point to transmit to other access points (in base or client bridge mode) using one independent radio and transmit with its associated devices using the second independent radio.
  • Page 603 Configuring Mesh Networking 9-15 Radio Status MUs connected values update. If this is an existing radio within a mesh network, these values update in real-time. CAUTION If a radio is disabled, be careful not to accidentally configure a new WLAN, expecting the radio to be operating when you have forgotten it was disabled.
  • Page 604 WLAN (ESS) the client bridge uses to establish a wireless link. The default setting, is (WLAN1). Motorola recommends creating (and naming) a WLAN specifically for mesh networking support to differentiate the Mesh supported WLAN from non-Mesh supported WLANs.
  • Page 605 NOTE Auto link selection is based on the RSSI and load. The client bridge will select the best available link when the Automatic Link Selection checkbox is selected. Motorola recommends you do not disable this option, as (when enabled) the access point will select the best base bridge for connection.
  • Page 606 9-18 AP-51xx Access Point Product Reference Guide 12. Highlight a MAC address from the Preferred Base Bridge List and click the button to assign that device’s MAC address a higher priority and a greater likelihood of joining the mesh network if an association with another device is lost. If a MAC address is not desirable as others but still worthy of being on the preferred list, select it, and click the Down...
  • Page 607 Configuring Mesh Networking 9-19 Enabled If the mesh connection is down on one radio (radio 1), the other radio (radio 2) is brought down and stops beaconing after the timeout period (45 seconds). This allows the client bridge (radio 1) to roam without dropping the MU's associated to radio 2.
  • Page 608: Mesh Network Deployment - Quick Setup

    9-20 AP-51xx Access Point Product Reference Guide 9.3 Mesh Network Deployment - Quick Setup This section provides instructions on how to quickly setup and demonstrate mesh functionality using three access points. Two following two deployment scenarios will be addressed: • Scenario 1 - Two base bridges (redundant) and one client bridge •...
  • Page 609 Configuring Mesh Networking 9-21 AP#1 and AP#2 will be configured somewhat the same. However there are some important (yet subtle) differences. Therefore, the configuration of each access point will be described separately. 9.3.1.1 Configuring AP#1: 1. Provide a known IP address for the LAN1 interface. NOTE Enable the LAN1 Interface of AP#1 as a DHCP Server if you intend to associate MUs and require them to obtain an IP address via DHCP.
  • Page 610 9-22 AP-51xx Access Point Product Reference Guide 3. Define a mesh supported WLAN.
  • Page 611 Configuring Mesh Networking 9-23 4. Enable base bridge functionality on the 802.11a radio (Radio 2).
  • Page 612 9-24 AP-51xx Access Point Product Reference Guide 5. Define a channel of operation for the 802.11a radio.
  • Page 613 Configuring Mesh Networking 9-25 6. If needed, create another WLAN mapped to the 802.11bg radio if 802.11bg support is required for MUs on that 802.11 band.
  • Page 614 9-26 AP-51xx Access Point Product Reference Guide 9.3.1.2 Configuring AP#2 AP#2 can be configured the same as AP#1 with the following exceptions: • Assign an IP Address to the LAN1 Interface different than that of AP#1 • Assign a higher Mesh STP Priority 50000 to the AP#2 LAN1 Interface. NOTE In a typical deployment, each base bridge can be configured for a Mesh STP Priority of 50000.
  • Page 615 Configuring Mesh Networking 9-27 9.3.1.3 Configuring AP#3 To define the configuration for AP#3 (a client bridge connecting to both AP#1 and AP#2 simultaneously): 1. Provide a known IP address for the LAN1 interface. 2. Assign the maximum value (65535) for the Mesh STP Priority.
  • Page 616 9-28 AP-51xx Access Point Product Reference Guide 3. Create a mesh supported WLAN with the Enable Client Bridge Backhaul option selected. NOTE This WLAN should not be mapped to any radio. Therefore, leave both of the “Available On” radio options unselected...
  • Page 617 Configuring Mesh Networking 9-29 4. Select the Client Bridge checkbox to enable client bridge functionality on the 802.11a radio. Use the Mesh Network Name drop-down menu to select the name of the WLAN created in step 3. NOTE You don't need to configure channel settings on the client bridge (AP#3). It automatically finds the base bridges (AP#1 and AP#2) and uses the channel assigned to them.
  • Page 618 9-30 AP-51xx Access Point Product Reference Guide 5. If needed, create another WLAN mapped to the 802.11bg radio if 802.11bg support is required for MUs on that 802.11 band. 9.3.1.4 Verifying Mesh Network Functionality for Scenario #1 You now have a three AP mesh network ready to demonstrate. Associate a single MU on each AP WLAN configured for 802.11bg radio support.
  • Page 619 Configuring Mesh Networking 9-31 9.3.2 Scenario 2 - Two Hop Mesh Network with a Base Bridge Repeater and a Client Bridge A conceptual illustration of scenario two is as follows: By default, the mesh algorithm runs an automatic link selection algorithm to determine the best possible active and redundant links.
  • Page 620: Configuring Ap#1

    9-32 AP-51xx Access Point Product Reference Guide 9.3.2.1 Configuring AP#1 The setup of AP#1 within this usage scenario is exactly the same as the AP#1 configuration within Scenario 1 - Two Base Bridges and One Client Bridge for step by step instructions for configuring AP#1, see Configuring AP#1: on page 9-21.
  • Page 621: Configuring Ap#3

    Configuring Mesh Networking 9-33 2. Enable client and base bridge functionality on the 802.11a radio 9.3.2.3 Configuring AP#3 To define AP #3’s configuration: 1. The only change needed on AP#3 (with respect to the configuration used in scenario #1), is to disable the Auto Link Selection option.
  • Page 622 9-34 AP-51xx Access Point Product Reference Guide 2. Add the 802.11a Radio MAC Address. In scenario #2, the mesh WLAN is mapped to BSS1 on the 802.11a radio if each AP. The Radio MAC Address (the BSSID#1 MAC Address) is used for the AP#2 Preferred Base Bridge List.
  • Page 623 Configuring Mesh Networking 9-35 3. Determine the Radio MAC Address and BSSID MAC Addresses.
  • Page 624: Verifying Mesh Network Functionality For Scenario #2

    9-36 AP-51xx Access Point Product Reference Guide 9.3.2.4 Verifying Mesh Network Functionality for Scenario #2 You now have a three AP demo multi-hop mesh network ready to demonstrate. Associate an MU on the WLANs configured on the 802.11bg radio for each AP and pass traffic among the members of the mesh network.
  • Page 625: Mesh Networking Frequently Asked Questions

    Configuring Mesh Networking 9-37 9.4 Mesh Networking Frequently Asked Questions The following scenarios represent issues that could be encountered and resolved when defining an AP-5131 or AP-5181 mesh configuration: Mesh Deployment Issue 1 - Client Bridge can only connect to one of two Base Bridges You have two access points configured as base bridges (AP1, AP2) and one access point defined as a as a client bridge (AP3).
  • Page 626 Can I use secure beacons on the mesh backhaul supported WLAN? Resolution Yes, you can enable a secure beacon on a mesh backhaul supported WLAN. In fact, it is a Motorola recommended practice. Mesh Deployment Issue 6 - Is my mesh topology complete?
  • Page 627 Configuring Mesh Networking 9-39 Resolution Yes, both the AP-5131 and AP-5181 model access points are identical from a software deployment standpoint. so it is a supported configuration for AP-5131s and AP-5181s to exist in a single topology. Mesh Deployment Issue 9 - Can I mesh between and an access point and an AP300? Can you mesh between a AP-5131, AP-5181 and an AP300 model access port? Resolution No, an AP300 does not support mesh networking.
  • Page 628 9-40 AP-51xx Access Point Product Reference Guide each one of them. If you don’t, the base bridge configuration file could get applied on a client bridge or repeater and you will loose connectivity to that AP. Mesh Deployment Issue 13 - Why do I lose connectivity when updating configurations? When I make a configuration change and apply the changes on a client bridge or repeater, I momentarily loose connectivity to that AP, why?
  • Page 629: Chapter 10. Adaptive Ap

    An adaptive AP (AAP) is an AP-51XX access point that can adopt like an AP300 (L3). The management of an AAP is conducted by the switch, once the access point connects to a Motorola WS5100 or RFS7000 model switch and receives its AAP configuration.
  • Page 630: Where To Go From Here

    10-2 AP-51xx Access Point Product Reference Guide The benefits of an AAP deployment include: • Centralized Configuration Management & Compliance - Wireless configurations across distributed sites can be centrally managed by the wireless switch or cluster. • WAN Survivability - Local WLAN services at a remote sites are unaffected in the case of a WAN outage.
  • Page 631: Adaptive Ap Management

    Adaptive AP 10-3 10.1.2 Adaptive AP Management An AAP can be adopted, configured and managed like a thin access port from the wireless switch. NOTE To support AAP functionality, a WS5100 model switch must be running firmware version 3.1 or higher, whereas a RFS7000 model switch must be running firmware version 1.1 or higher.
  • Page 632: Licensing

    10-4 AP-51xx Access Point Product Reference Guide 10.1.4 Licensing An AAP uses the same licensing scheme as a thin access port. This implies an existing license purchased with a switch can be used for an AAP deployment. Regardless of how many AP300 and/or AAPs are deployed, you must ensure the license used by the switch supports the number of radio ports (both AP300s and AAPs) you intend to adopt.
  • Page 633: Manual Adoption Configuration

    Adaptive AP 10-5 ** The AP-51xx uses an encryption key to hash passphrases and security keys. To obtain the encryption passphrase, configure an AP-51xx with the passphrase and export the configuration file. 10.1.5.2 Manual Adoption Configuration A manual switch adoption of an AAP can be conducted using: •...
  • Page 634: Securing A Configuration Channel Between Switch And Ap

    10-6 AP-51xx Access Point Product Reference Guide 10.1.6 Securing a Configuration Channel Between Switch and AP Once an access point obtains a list of available switches, it begins connecting to each. The switch can be either on the LAN or WAN side of the access point to provide flexibility in the deployment of the network.
  • Page 635: Adaptive Ap Switch Failure

    Adaptive AP 10-7 To review a sample AAP configuration, see Sample Switch Configuration File for IPSec and Independent WLAN on page 10-20. 10.1.10 Adaptive AP Switch Failure In the event of a switch failure, an AAP's independent WLAN continues to operate without disruption. The AAP attempts to connect to other switches (if available) in background.
  • Page 636 10-8 AP-51xx Access Point Product Reference Guide before MUs can pass traffic. This typically takes about 90 to 180 seconds depending on the size of the mesh topology. NOTE When mesh is used with AAPs, the "ap-timeout" value needs to be set to a higher value (for example, 180 seconds) so Mesh AAPs remain adopted to the switch during the period when the configuration is applied and mesh links are re-established.
  • Page 637: Supported Adaptive Ap Topologies

    LAN1. If the WAN Interface is used, explicitly configure WAN as the default gateway interface. • Motorola recommends using the LAN1 interface for adoption in multi-cell deployments. • If you have multiple independent WLANs mapped to different VLANs, the AAP's LAN1 interface requires trunking be enabled with the correct management and native VLAN IDs configured.
  • Page 638: Extended Wlans Only

    10-10 AP-51xx Access Point Product Reference Guide 10.2.2 Extended WLANs Only An extended WLAN configuration forces all MU traffic through the switch. No wireless traffic is locally bridged by the AAP. Each extended WLAN is mapped to the access point's virtual LAN2 subnet. By default, the access point's LAN2 is not enabled and the default configuration is set to static with IP addresses defined as all zeros.
  • Page 639: Extended Wlan With Mesh Networking

    Converting an AP-5131 or AP-5181 model access point into an AAP requires: • A version 2.0 or higher firmware running on the access point. • A Motorola WS5100 (running firmware version 3.1 or later) or a RFS7000 (running firmware version 1.1 or later) model switch.
  • Page 640 Adaptive AP Configuration on page 10-13. Configuring the Switch for Adaptive AP Adoption The tasks described below are configured on a Motorola WS5100 or RFS7000 model switch. For information on configuring the switch for AAP support, see http://support.symbol.com/support/product/manuals.do. To adopt an AAP on a switch: 1.
  • Page 641: Establishing Basic Adaptive Ap Connectivity

    Adaptive AP 10-13 10.4 Establishing Basic Adaptive AP Connectivity This section defines the activities required to configure basic AAP connectivity with a WS5100 or RFS7000 model switch. In establishing a basic AAP connection, both the access point and switch require modifications to their respective default configurations. For more information, see: •...
  • Page 642 10-14 AP-51xx Access Point Product Reference Guide 2. Select the Auto Discovery Enable checkbox. Enabling auto discovery will allow the AAP to be detected by a switch once its connectivity medium has been configured (by completing steps 3-6) 3. Enter up to 12 Switch IP Addresses constituting the target switches available for AAP connection.
  • Page 643: Adopting An Adaptive Ap Using A Configuration File

    Adaptive AP 10-15 7. Click Apply to save the changes to the AAP setup. NOTE The manual AAP adoption described above can also be conducted using the access point’s CLI interface using the admin(system.aapsetup)> command. 10.4.1.2 Adopting an Adaptive AP Using a Configuration File To adopt an AAP using a configuration file: 1.
  • Page 644: Switch Configuration

    10-16 AP-51xx Access Point Product Reference Guide 10.4.2 Switch Configuration Both a WS5100 (running firmware version 3.1 or later) or a RFS7000 (running firmware version 1.1 or later) require an explicit adaptive configuration to adopt an access point (if IPSec is not being used for adoption).
  • Page 645 Adaptive AP 10-17 5. Select the target WLAN you would like to use for AAP support from those displayed and click Edit button. 6. Select the Independent Mode (AAP Only) checkbox. Selecting the checkbox designates the WLAN as independent and prevents traffic from being forwarded to the switch.
  • Page 646 10-18 AP-51xx Access Point Product Reference Guide Once an AAP is adopted by the switch, it displays within the switch Access Port Radios screen (under the Network parent menu item) as an AP-5131 or AP-5181 within the AP Type column.
  • Page 647: Adaptive Ap Deployment Considerations

    Adaptive AP 10-19 10.4.3 Adaptive AP Deployment Considerations Before deploying your switch/AAP configuration, refer to the following usage caveats to optimize its effectiveness: • Extended WLANs are mapped to the AP’s LAN2 interface and all independent WLANs are mapped to the AP’s LAN1 Interface. •...
  • Page 648: Sample Switch Configuration File For Ipsec And Independent Wlan

    10-20 AP-51xx Access Point Product Reference Guide 10.4.4 Sample Switch Configuration File for IPSec and Independent WLAN The following constitutes a sample RFS7000 switch configuration file supporting an AAP IPSec with Independent WLAN configuration. Please note new AAP specific CLI commands in and relevant comments in blue.
  • Page 649 Adaptive AP 10-21 snmp-server manager v2 snmp-server manager v3 snmp-server user snmptrap v3 encrypted auth md5 0x7be2cb56f6060226f15974c936e2739b snmp-server user snmpmanager v3 encrypted auth md5 0x7be2cb56f6060226f15974c936e2739b snmp-server user snmpoperator v3 encrypted auth md5 0x49c451c7c6893ffcede0491bbd0a12c4 To configure the passkey for a Remote VPN Peer - 255.255.255.255 denotes all AAPs. 12345678 is the default passkey.
  • Page 650 10-22 AP-51xx Access Point Product Reference Guide wlan 4 enable wlan 4 ssid qs5-open wlan 4 vlan 230 wlan 5 enable wlan 5 ssid Mesh wlan 5 vlan 111 wlan 5 encryption-type ccmp wlan 5 dot11i phrase 0 Symbol123 To configure a WLAN as an independent WLAN wlan 5 independent wlan 5 client-bridge-backhaul enable wlan 6 enable...
  • Page 651 Adaptive AP 10-23 radio 4 bss 2 6 radio 4 channel-power indoor 48 4 radio 4 rss enable radio 4 client-bridge bridge-select-mode auto radio 4 client-bridge ssid Mesh radio 4 client-bridge mesh-timeout 0 radio 4 client-bridge enable radio default-11a rss enable radio default-11bg rss enable radio default-11b rss enable no ap-ip default-ap switch-ip...
  • Page 652 10-24 AP-51xx Access Point Product Reference Guide interface ge3 switchport mode trunk switchport trunk native vlan 1 switchport trunk allowed vlan none switchport trunk allowed vlan add 1-9,100,110,120,130,140,150,160,170, switchport trunk allowed vlan add 180,190,200,210,220,230,240,250, static-channel-group 1 interface ge4 switchport access vlan 1 interface me1 ip address dhcp interface sa1...
  • Page 653 Adaptive AP 10-25 line con 0 line vty 0 24...
  • Page 654 10-26 AP-51xx Access Point Product Reference Guide...
  • Page 655: Appendix A. Technical Specifications

    Technical Specifications This appendix provides technical specifications in the following areas: • Physical Characteristics • Electrical Characteristics • Radio Characteristics • Antenna Specifications • Country Codes A.1 Physical Characteristics For more information, see: • AP-5131 Physical Characteristics • AP-5181 Physical Characteristics...
  • Page 656: Ap-5131 Physical Characteristics

    AP-51xx Access Point Product Reference Guide A.1.1 AP-5131 Physical Characteristics The AP-5131 has the following physical characteristics: Dimensions 5.32 inches long x 9.45 inches wide x 1.77 inches thick. 135 mm long x 240 mm wide x 45 mm thick. Housing Metal, Plenum Housing (UL2043) Weight...
  • Page 657: Ap-5181 Physical Characteristics

    Technical Specifications A.1.2 AP-5181 Physical Characteristics The AP-5181 has the following physical characteristics: Dimensions 12 inches long x 8.25 inches wide x 3.5 inches thick. Housing Aluminum Weight 4 lbs. Operating -30 to 55° Celsius Temperature Storage Temperature -40 to 85° Celsius Altitude 8,000 feet/2438 m @ 28°...
  • Page 658: Electrical Characteristics

    Both the AP-5131 and the AP-5181 access points have the following electrical characteristics: CAUTION An AP-5181 model access point cannot use the AP-5131 recommended Motorola 48-Volt Power Supply (Part No. 50-14000- 243R). However, Motorola does recommend the AP-PSBIAS-5181-01R model power supply for use the AP-5181.
  • Page 659: Antenna Specifications

    AP-5181 model access point. CAUTION Using an antenna other than the Dual-Band Antenna (Part No. ML-2452-APA2-01) could render the AP-5131’s Rogue AP Detector Mode feature inoperable. Contact your Motorola sales associate for specific information. A.4.1.1 2.4 GHz Antenna Matrix The following table describes each 2.4 GHz antenna approved for use with the AP-5131.
  • Page 660: Ghz Antenna Matrix

    Antenna ML-2452-APA2-01 Dual-Band A.4.1.3 AP-5131 Additional Antenna Components The following table lists the Motorola part number for various antenna accessories. This table also includes the loss for each accessory at both 2.4 and 5.2 GHz. Loss (db) Loss (db) Item...
  • Page 661: Ap-5181 Antenna Specifications

    Technical Specifications Item Connector1 Connector2 Length (meters) Cable Type LAK1 RPBNC-F 0.305 RG-58 LAK2 10JK 3.05 RG-8 25JK 7.62 RG-8 50JK 15.24 RG-8 100JK 30.48 RG-8 A.4.2 AP-5181 Antenna Specifications The AP-5181 2.4 GHz antenna suite includes the following models: Nominal Net Gain Part Number Antenna Type...
  • Page 662 AP-51xx Access Point Product Reference Guide The AP-5181 5.2 GHz antenna suite includes the following models: Nominal Net Gain Part Number Antenna Type (dBi) Description ML-5299-FHPA6-01R Omni-Directional Antenna 4.900-5.850 GHz, Type N connector, no pigtail ML-5299-FHPA10-01R Omni-Directional Antenna 10.0 5.8 GHz, Type N connector, no pigtail...
  • Page 663: Country Codes

    Technical Specifications A.5 Country Codes The following list of countries and their country codes is useful when using the access point configuration file, CLI or the MIB to configure the access point: Country Code Country Code Argentina Mexico Australia Montenegro Austria Morocco Bahamas...
  • Page 664 A-10 AP-51xx Access Point Product Reference Guide Cypress Serbia Czech Rep. Singapore Denmark Slovak Republic Dominican Republic Slovenia Ecuador South Africa El Salvador South Korea Estonia Spain Egypt Sri Lanka Falkland Islands Sweden Finland Switzerland France Taiwan Germany Thailand Greece Trinidad and Tobago Guam Turkey...
  • Page 665 Technical Specifications A-11 Japan Jordan Kazakhstan Kuwait Latvia Lebanon Liechtenstein Lithuania Luxembourg Macedonia Malaysia Malta Martinique...
  • Page 666 A-12 AP-51xx Access Point Product Reference Guide...
  • Page 667: Appendix B. Usage Scenarios

    Usage Scenarios This appendix provides practical usage scenarios for many of the access point’s key features. This information should be referenced as a supplement to the information contained within this Product Reference Guide. The following scenarios are described: • Configuring Automatic Updates using a DHCP or Linux BootP Server •...
  • Page 668: Windows - Dhcp Server Configuration

    (01) when making a comparison. Change the last two characters to update the configuration. The two characters can be alpha-numeric. NOTE A Motorola AP-5181 model access point does not support firmware prior to version 1.1.1.x.
  • Page 669 To configure the DHCP Server for automatic updates: 1. Set the Windows DHCP Server and access point on the same Ethernet segment. 2. Configure the Windows based DHCP Server as follows: a. Highlight the Server Domain Name (for example, apfw.motorola.com). From the Action menu, select Define Vendor Classes.
  • Page 670: Global Options - Using Extended/Standard Options

    To configure Global options using extended/standard options: 1. Set the Windows DHCP Server and access point on the same Ethernet segment. 2. Configure the Windows based DHCP Server as follows: a. Highlight the Server Domain Name (for example, apfw.motorola.com). From the Action menu, select Set Predefined Options.
  • Page 671: Dhcp Priorities

    Usage Scenarios Standard Options Code Data type Access point Firmware File Name String NOTE If using Standard Options and the configuration of the access point needs to be changed, use option 129 or 188 as specified in the Extended Options table.
  • Page 672: Linux - Bootp Server Configuration

    AP-51xx Access Point Product Reference Guide -------------------------------------------------------------------------------------------- If the DHCP Server is configured for options 186 and 66 (to assign TFTP Server IP addresses) the access point uses the IP address configured for option 186. Similarly, if the DHCP Server is configured for options 187 and 67 (for the firmware file) the access point uses the file name configured for option 187.
  • Page 673 Usage Scenarios B.1.2.1 BootP Options This section contains instructions for the automatic update of the access point firmware and configuration file using a BootP Server. The setup example described in this section includes: • 1 AP-5131 or AP-5181 model access point •...
  • Page 674 AP-51xx Access Point Product Reference Guide Using options sa, bf and 136: AP-5131:ha=00a0f88aa6d8\ < LAN M AC Address> :sm =255.255.255.0\ <Subnet M ask> :ip=157.235.93.128\ <IP A ddress> :gw =157.235.93.2\ <gatew ay> :sa=157.235.93.250\ <TFTP Server IP> :bf=/tftpboot/cfg.txt\ <Configuration file> :T136=”/tftpboot/”: <TFTP root directory> NOTE The bf option prefixes a forward slash (/) to the configuration file name.
  • Page 675: Bootp Priorities

    Usage Scenarios NOTE If the firmware files are the same, the firmware will not get updated. If the configuration file name matches the last used configuration file on the access point or if the configuration file versions are the same, the access point configuration will not get updated.
  • Page 676: Configuring A Vpn Tunnel Between Two Access Points

    B-10 AP-51xx Access Point Product Reference Guide • Frequently Asked VPN Questions B.2.1 Configuring a VPN Tunnel Between Two Access Points The access point can connect to a non-AP device supporting IPSec, such as a Cisco VPN device - labeled as "Device #2". For this usage scenario, the following components are required: •...
  • Page 677 Usage Scenarios B-11 5. Enter the WAN port IP address of AP #1 for the Local WAN 6. Within the Remote Subnet Remote Subnet Mask fields, enter the LAN IP subnet and mask of AP #2 /Device #2. 7. Enter the WAN port IP address of AP #2/ Device #2 for a Remote Gateway.
  • Page 678 B-12 AP-51xx Access Point Product Reference Guide 13. Select Pre Shared Key (PSK) from the IKE Authentication Mode drop-down menu. 14. Enter a Passphrase. Passphrases must match on both VPN devices. NOTE Ensure the IKE authentication Passphrase is the same as the Pre-shared key on the Cisco PIX device.
  • Page 679: Configuring A Cisco Vpn Device

    Usage Scenarios B-13 B.2.2 Configuring a Cisco VPN Device This section includes general instructions for configuring a Cisco PIX Firewall 506 series device. For the usage scenario described in this section, you will require the following: • 1 Cisco VPN device •...
  • Page 680: Frequently Asked Vpn Questions

    B-14 AP-51xx Access Point Product Reference Guide B.2.3 Frequently Asked VPN Questions The following are common questions that arise when configuring a VPN tunnel. • Question 1: Does the access point IPSec tunnel support multiple subnets on the other end of a VPN concentrator? Yes.
  • Page 681 Usage Scenarios B-15 • Question 3: Can the AP be accessed via its LAN interface of AP#1 from the local subnet of AP#2 and vice versa? Yes. • Question 4: Will the default "Manual Key Exchange" settings work without making any changes? No.
  • Page 682 B-16 AP-51xx Access Point Product Reference Guide Yes. Only packets that match the VPN Tunnel Settings will be sent through the VPN tunnel. All other packets will be handled by whatever firewall rules are set. • Question 8: How do I specify which certificates to use for an IKE policy from the access point certificate manager? When generating a certificate to use with IKE, use one of the following fields: address,...
  • Page 683 Usage Scenarios B-17 • Question 9: I am using a direct cable connection between my two VPN gateways for testing and cannot get a tunnel established, yet it works when I set them up across another network or router. Why? The packet processing architecture of the access point VPN solution requires the WAN default gateway to work properly.
  • Page 684 B-18 AP-51xx Access Point Product Reference Guide • Verify you can ping each of the remote Gateway IP addresses from clients on either side. Failed pings can indicate general network connection problems. • Pinging the internal gateway address of the remote subnet should run the ping through the tunnel as well.
  • Page 685 Usage Scenarios B-19 <WAN IP address> Transport Scr port 1:65535 Dst port Rev NAT None These three rules should be configured above all other rules (default or user defined). When Advanced LAN Access is used, certain inbound/outbound rules need to be configured to control incoming/outgoing packet flow for IPSec to work properly (with Advanced LAN Access).
  • Page 686: Replacing An Ap-4131 With An Ap-5131 Or Ap-5181

    B-20 AP-51xx Access Point Product Reference Guide B.3 Replacing an AP-4131 with an AP-5131 or AP-5181 The access point’s modified default configuration enables an AP-5131or AP-5181 to not only operate in a single-cell environment, but also function as a replacement for legacy AP-4131 model access points.
  • Page 687: Appendix C. Customer Support

    Support Central provides our customers with a wealth of information and online assistance including developer tools, software downloads, product manuals and online repair requests. When contacting the Motorola Support Center, please provide the following information: • serial number of unit • model number or product name...
  • Page 688 North American Contacts Support (for warranty and service information): telephone: 1-800-653-5350 fax: (631) 738-5410 Email: emb.support@motorola.com International Contacts Outside North America: Motorola, inc. Symbol Place Winnersh Triangle, Berkshire, RG41 5TP United Kingdom 0800-328-2424 (Inside UK) +44 118 945 7529 (Outside UK)
  • Page 689 Customer Support Web Support Sites Product Downloads http://www.symbol.com/downloads Manuals http://www.symbol.com/manuals Additional Information Obtain additional information by contacting Motorola at: 1-800-722-6234, inside North America +1-516-738-5200, in/outside North America http://www.motorola.com/...
  • Page 690 AP-51xx Access Point Product Reference Guide...
  • Page 691: Index

    Index AP-5131-13041-WW ......2-2 AP-5131-13042-WW ......2-2 access options .
  • Page 692 IN-6 AP-51xx Access Point Product Reference Guide Command Line Interface (CLI) configuration ......1-21 bandwidth management .
  • Page 693 IN-7 MIB......... 3-3 ML-2499-11PNA2-01 .
  • Page 694 IN-8 AP-51xx Access Point Product Reference Guide SNMP, v3 user definitions ..... .4-27 statistics, AP-5131 ......7-33 QoS support .
  • Page 695 IN-9 WLAN, editing ....... 5-30 WLAN, enabling......5-27 wall mounting .
  • Page 696 IN-10 AP-51xx Access Point Product Reference Guide...
  • Page 698 MOTOROLA INC. 1303 E. ALGONQUIN ROAD SCHAUMBURG, IL 60196 http://www.motorola.com 72E-103901-01 Revision A January 2008...

This manual is also suitable for:

Ap-51 seriesAp-5131Ap-5181

Table of Contents