Symbol WS5000 series Reference Manual
Symbol WS5000 series Reference Manual

Symbol WS5000 series Reference Manual

Hide thumbs Also See for WS5000 series:
Table of Contents

Advertisement

WS5000 Series Switch
System Reference Guide

Advertisement

Table of Contents
loading

Summary of Contents for Symbol WS5000 series

  • Page 1 WS5000 Series Switch System Reference Guide...
  • Page 2 Symbol reserves the right to make changes to any product to improve reliability, function, or design. No license is granted, either expressly or by implication, estoppel, or otherwise under any Symbol Technologies, Inc., intellectual property rights. An implied license only exists for equipment, circuits, and subsystems contained in Symbol products.
  • Page 3: Table Of Contents

    Contents Chapter 1. WS5000 Series Switch Overview 1.1 Wireless Switch Feature List ........1-2 1.1.1 Installation Features.
  • Page 4 3.3 Command File Example ......... . 3-7 Chapter 4. Using the WS5000 Series Switch GUI 4.1 Logging In.
  • Page 5 4.2.3 Creating Kerberos User Accounts ........4-5 4.2.4 Setting Kerberos Time Synchronization.
  • Page 6 WS5000 Series Switch System Reference Guide 5.2.6 emergencymode ..........5-6 5.2.7 history .
  • Page 7 5.4.28 set daylight........... 5-44 5.4.29 set emergencypolicy.
  • Page 8 WS5000 Series Switch System Reference Guide 5.8.5 show ............5-71 5.9 Access Port Policy (APPolicy) Context .
  • Page 9 5.15.2 ce ............5-100 5.15.3 remove .
  • Page 10 WS5000 Series Switch System Reference Guide 5.24.2 host ............5-130 5.24.3 remove.
  • Page 11 5.32.2 policy ............5-157 5.32.3 remove .
  • Page 12 WS5000 Series Switch System Reference Guide 5.39.5 set adoptionList..........5-187 5.39.6 set .
  • Page 13: About This Guide

    Service Information Who Should Use this Guide The WS5000 Series Switch System Reference Guide is intended for system administrators responsible for the implementing, configuring, and maintaining the WS5000 Series Switch within the wireless local area network. It also serves as a reference for configuring and modifying most common system settings. The administrator should be familiar with wireless technologies, network concepts, Ethernet concepts, as well as IP addressing and SNMP concepts.
  • Page 14: How To Use This Guide

    WS5000 Series Switch System Reference Guide How to Use this Guide This guide will help you implement, configure, and administer the WS5000 Series Switch and associated network elements. This guide is organized into the following sections: Table 1 Quick Reference on How This Guide Is Organized Chapter Jump to this section if you want to...
  • Page 15: Notational Conventions

    Sequential lists (those describing step-by-step procedures) appear as numbered lists. Service Information If a problem with is encountered with the WS5000 Series Switch, contact Symbol Customer Support. See Symbol’s Web site (http://www.symbol.com) for Symbol Customer Support contact information and policies.
  • Page 16 WS5000 Series Switch System Reference Guide...
  • Page 17: Chapter 1. Ws5000 Series Switch Overview

    Access port configuration is managed by the switch through the Graphical User Interface (GUI) or the Command Line Interface (CLI). A WS5000 Series Switch streamlines management of a large wireless system...
  • Page 18: Wireless Switch Feature List

    Quality of Service (QoS), virtual WLANs and packet forwarding. 1.1 Wireless Switch Feature List WS5000 Series Switch includes a robust set of features. These features are briefly listed and described in the following sections: •...
  • Page 19: Security Features

    • Central MAC address-based access control list • WEP 40/128 • KeyGuard Mobile Computing Mode (MCM) support (Symbol’s TKIP encryption implementation based on the 802.11i standard) • Wi-Fi Protected Access (WPA) support with Temporal Key Integrity Protocol (TKIP) • Optional broadcast key rotation support, which improves broadcast traffic security •...
  • Page 20: Access Port Support

    AP 3020, AP 3021 1.2 Hardware Overview A WS5000 Series Switch solution is comprised of two types of hardware: a wireless switch and a set of access ports. The wireless switch is a rack-mountable device that manages all inbound and outbound traffic on the wireless network.
  • Page 21: Power Cord Specifications

    WS5000 Series Switch Installation Guide. 1.2.2 System Status LED Codes A WS5000 Series Switch has two LEDs on the front panel, adjacent to the RJ45 ports. The System Status LEDs display three colors—blue, amber, or red —and three “lit” states—solid, blinking, or off.
  • Page 22: 10/100/1000 Port Status Led Codes

    During first time setup, the LEDs will remain in this state until the country code is configured. 1.2.3 10/100/1000 Port Status LED Codes A WS5000 Series Switch includes two indicators for the RJ-45 ports, as follows: • Upper left (amber/green) for link rate •...
  • Page 23: Access Point Conversion Overview

    ACS for FH access port conversions 1.3 Software Overview A WS5000 Series Switch uses a set of rules, or “policies,” to configure the wireless LAN (WLAN), the access ports that it adopts, and to integrate the wired LANs and VLANs. The policy-based management architecture lets a network administrator create a class of service (CoS) by defining network access, type of WLAN security, and quality of service (QoS) for a group of users.
  • Page 24: Access Port Adoption Process

    Figure 1.1 Principal Policies of a WS5000 Series Switch 1.3.1 Access Port Adoption Process “Adoption” is the process of adopting and configuring 802.11 access ports by the WS5000 Series switch. The process includes configuring the adoption lists, loading the correct firmware image to the access port, and configuring the access port radios according to the policy.
  • Page 25: Multi-Bssid And Essid Access Ports

    1.3.3 Multi-BSSID and ESSID Access Ports In a networked wireless environment, multiple access ports are connected to a WS5000 Series Switch to provide RF connectivity to MUs. Each access port radio sends and receives RF signals over a range of space, the Basic Service Set (BSS).
  • Page 26: On-Board Kdc

    “Failover” or Standby Management enables the network administrator to significantly reduce the chance of a disruption in service to the switch and associated MUs by placing one or more additional WS5000 Series Switches as backup to a Primary wireless switch if it fails.
  • Page 27: Automatic Channel Select

    WS5000 Series Switch Overview 1-11 1.3.7 Automatic Channel Select The Automatic Channel Selection (ACS) feature enables the switch to determine the best radio frequency or channel for access port performance. The switch determines the best channel for each access port through a set of algorithms that analyze the channels permitted by country regulations and the relative signal strength of each access port in the wireless coverage area.
  • Page 28: Simple Network Management Protocol (Snmp) Overview

    1.3.10 Accessing and Configuring the Switch Software To access and configure the WS5000 Series Switch administration controls and options, the administrator can access a CLI through a Telnet session, or log into a Web-based graphical user interface.
  • Page 29: Chapter 2. Installing The System Image

    Installing the System Image This chapter describes how to install a new system image with the latest software on the WS5000 Series Switch, as needed. In addition, this chapter guides you through the CLI commands for restoring the site configuration file for the switch as well. Refer to the following sections, in order: •...
  • Page 30: Verify Current Software Version And Update Path

    Note The WS5000 Series Switch Graphical User Interface does not support this process. 2.1.1 Verify Current Software Version and Update Path Upon first logging into the WS5000 Series Switch, the systems’s currently installed software version is displayed. For example:. user name:cli WS-5000 Wireless Switch...
  • Page 31: Upload System Image Files To Tftp Server

    To upload files to the TFTP server, follow these steps: 1. On a computer networked on the LAN, insert the CD that was shipped with WS5000 Series Switch or launch the image files downloaded from the Symbol Website. If the CD does not launch automatically, use Windows Explorer and double-click on ws_5000.exe...
  • Page 32: Save And Copy The Current Running Configuration

    TFTP server. WS5000>copy system tftp 4. The system prompts for the file name to download from the WS5000 Series Switch to the TFTP server. Enter File Name to be copied to TFTP : siteconfig.cfg IP address of the TFTP server : xxx.xxx.xx.xx Copying from system to tftp...
  • Page 33 System Name : WS5000 Description : WS5000 Wireless Network Switch Location Software Ver. : 1.4.1.0-003D Licensed to : Symbol Technologies Copyright : Copyright(c) 2000-2005. All rights reserved. Serial Number : 00A0F8658C10 Number of Licenses : 48 Max Access Ports : 48...
  • Page 34: Restore Site Configuration File

    2.3 Restore Site Configuration File The site configuration file contains the site-specific settings for the WS5000 Series Switch. To restore a site configuration, follow these steps: 1. Log into the WS5000 CLI and from the System Context, use the...
  • Page 35: Chapter 3. Automatic Installation

    • A command file – This is an ASCII text file that contains site-specific settings for the WS5000 Series Switch (the file name must end with a .sym suffix). The name of the file is obtained via DHCP and stored in the returned DHCP lease file.
  • Page 36: Command File Options

    WS5000 Series Switch System Reference Guide The command-file option specifies a valid file name for an ASCII text format file that exists on the TFTP server and contains site-specific settings for the wireless switch. The command file (see Command File Example on...
  • Page 37: Event Logging

    Automatic Installation Note The command file is not invoked automatically using this method. The correct method is to use the DHCP option to send the file to the switch. 3.2.1 Event Logging The service option is a setting to turn on or off the logging feature, which pushes auto-installation event messages to a log file named CmdProcErrors.txt.
  • Page 38: General Network Configuration And Standby Management

    Value Notes ConfigFile <config_name (.cfg)> This is the name of a WS5000 Series Switch configuration. This file is downloaded automatically from a specified TFTP server or though the CLI copy command. If the file is not found, or if there were errors during the TFTP download, the installation software will abort the configuration immediately and exit.
  • Page 39 Automatic Installation Warning! A WS5000 model switch cannot be configured as a standby for a WS5100 model switch. Table 3.3 General Network Configuration and Standby Management Option Value Notes Eth1DNSServer1 <ip_address> DNS server configuration for each interface. Users can configure up to two DNS servers per interface.
  • Page 40: Kerberos Configuration Section

    WS5000 Series Switch System Reference Guide 3.2.4 Kerberos Configuration Section The Wireless Switch features a built-in Kerberos KDC (Key Distribution Center) for authentication services, a site may require settings for configuring Kerberos functionality. The settings in the command file for configuring the KDC include Primary or Slave status, hostname, IP address, realm and domain.
  • Page 41: Command File Example

    Wireless Switch. The same command file can configure both a Primary Wireless Switch and an associated Standby Wireless Switch. Figure 3.1 Example ############################################################################# # Copyright (c) 2005, Symbol Technologies, Inc. # All rights reserved. # cmd_template.sym file # This is a template file to illustrate the format of auto configuration command files.
  • Page 42 WS5000 Series Switch System Reference Guide Gateway #default gateway # Primary IP configuration HostnamePrimary #Hostname of primary CC Eth1PrimaryIP #ip address of primary CC Eth2PrimaryIP #ip address of primary CC # Standby IP configuration HostnameStandby #Hostname of standby CC Eth1StandbyIP...
  • Page 43 Automatic Installation # SNMP Traps SNMPCommunity1Trap #SNMP community trap SNMPCommunity1TrapIP #SNMP community trap IP SNMPCommunity2Trap #SNMP community trap SNMPCommunity2TrapIP #SNMP community trap IP SNMPCommunity3Trap #SNMP community trap SNMPCommunity3TrapIP #SNMP community trap IP SNMPCommunity4Trap #SNMP community trap SNMPCommunity4TrapIP #SNMP community trap IP ############################################################################# # SECTION: SYSLOG Configuration #############################################################################...
  • Page 44 3-10 WS5000 Series Switch System Reference Guide...
  • Page 45: Chapter 4. Using The Ws5000 Series Switch Gui

    For CLI command reference, see to Chapter 5, CLI Command Reference. See the following sections for details on using the WS5000 Series Switch GUI. 4.1 Logging In To log into the WS5000 Series Switch graphical user interface, follow these steps: 1.
  • Page 46: Key Distribution Center

    WS5000 Series Switch GUI. This file is included on the CD that ships with the product Figure 4.1 WS5000 Series Switch GUI Console Login 3. Type a User ID and Password and click the Login button. The default is “admin” and “symbol”, respectively. 4.2 Key Distribution Center The WS5000 Series wireless switch has an on-board Key Distribution Center (KDC), or Kerberos authentication server.
  • Page 47: Configuring Master Kdc Information

    To configure master KDC information, follow these steps: 1. From the WS5000 Series Switch GUI main window, click System Settings > Kerberos > Configuration > KDC. The Kerberos Security Manager dialog box appears. Figure 4.2 Kerberos Security Manager—Configuring the Master KDC 2.
  • Page 48: Configuring The Kdc Slave

    CONFIGURED. To configure a KDC as a slave KDC, follow these steps: 1. From the WS5000 Series Switch GUI main window, click System Settings > Kerberos > Configuration > KDC. The Kerberos Security Manager dialog box appears. Figure 4.3 Kerberos Security Manager—Configuring a Slave KDC 2.
  • Page 49: Creating Kerberos User Accounts

    Configuring Master KDC Information on page 4-3 for more details. To create a Kerberos user account, follow these steps: 1. From the WS5000 Series Switch GUI main window, select System Settings > Kerberos > Administration > Users. The Kerberos User Administration dialog box appears.
  • Page 50: Setting Kerberos Time Synchronization

    Except in a master/slave configuration, KDC NTP time configuration is optional. To synchronize the NTP server with the switch’s on board KDC, follow these steps: 1. From the WS5000 Series Switch GUI main window, click System Settings > Kerberos > Configuration > NTP.
  • Page 51: Network Policies

    Quality of Service on page 1-11 for more details on QoS and types of service protocols supported by the WS5000 Series wireless switch. To see the configuration hierarchy while creating an Network Policy, click Where Am I? at any point. A Where...
  • Page 52: Classifiers

    WS5000 Series Switch System Reference Guide Figure 4.7 Network Policy Where Am I? Dialog Box Access Port policies use network policies (see Access Port Policies on page 4-41) , but prior to creating a network policy, other network related components and policies must be configured within the switch. These are: •...
  • Page 53: Creating A Classifier

    4.3.1.1 Creating a Classifier To create a classifier, follow these steps: 1. From the WS5000 Series Switch GUI main window, select Create > Network > Classifier. The system launches the Classifier Wizard. Figure 4.9 Creating a Classifier—Naming the Classifier (and Optionally, Choosing a Template) 2.
  • Page 54 4-10 WS5000 Series Switch System Reference Guide Figure 4.10 Creating a Classifier—Defining Match Criteria Each row of the Match Criteria table is a simple declaration. For each Criteria type to be defined, a value must also be defined. Unless otherwise noted, the Classifier uses a case-insensitive comparison when evaluating network packet values.
  • Page 55: Classification Groups

    Using the WS5000 Series Switch GUI 4-11 Table 4.2 Classifier Types and Acceptable Value Ranges (Continued) Criteria Type Description Source Port The Ethernet port number, on the originating device, through which the packet was sent. Dest[ination] Port The Ethernet port number, on the recipient device, to which the packet is being sent.
  • Page 56: Creating A Classification Group

    4.3.2.1 Creating a Classification Group To create a classification group, follow these steps: 1. From the WS5000 Series Switch GUI main window, click Create > Network > Classification Group. The system launches the Classification Group Wizard. Figure 4.12 Creating a Classification Group—Naming the Group (and Optionally, Choosing a Template) 2.
  • Page 57: Modifying A Classification Group

    7. Click Finish to save the new Classification Group and exit the wizard. 4.3.2.2 Modifying a Classification Group To modify an existing Classification Group, follow these steps: 1. From the WS5000 Series Switch GUI main window, click Modify > Network > Classification Group. The system launches the Classification Group Manager.
  • Page 58 4-14 WS5000 Series Switch System Reference Guide Figure 4.14 Classification Group Manager 2. This panel lists all available Classification Groups configured on the system. Table 4.3 describes the fields and options within this panel. To edit a classification group, select the its name in the left pane first.
  • Page 59: Creating A Network Input Policy

    Network Input Policies define incoming packet filters that are subsequently used with Network Policies. To create a Network Input Policy, follow these steps: 1. From the WS5000 Series Switch GUI main window, select Create > Network > Input Policy. The system launches New Input Policy Wizard.
  • Page 60 4-16 WS5000 Series Switch System Reference Guide To create a new Classification Group, click Create. See Creating a Classification Group on page 4-12 more details. 5. Click Next. A panel for applying prioritization actions to each chosen classification group is displayed.
  • Page 61: Creating A Network Output Policy

    4.3.4 Creating a Network Output Policy To create a network output policy, follow these steps: 1. From the WS5000 Series Switch GUI main window, select Create > Network > Output Policy. The system launches Create a New Output Policy Wizard.
  • Page 62 4-18 WS5000 Series Switch System Reference Guide 4. Select from among the Available Classifier Groups and then click the >> button to move a group(s) to the Selected pane, and to apply it to the Output Policy. To create a new Classification Group, click Create. See Creating a Classification Group on page 4-12 more details.
  • Page 63: Creating A Network Policy

    4.3.5 Creating a Network Policy To create a network policy, follow these steps: 1. From the WS5000 Series Switch GUI main window, select Create > Network > New Policy. The system launches Create a New Network Policy Wizard Figure 4.21 Creating a Network Policy—Naming the Policy (and Optionally, Choosing a Template) 2.
  • Page 64: Modifying A Network Policy

    6. Click Finish to save the new Network Policy and exit the wizard. 4.3.6 Modifying a Network Policy To modify an existing network policy, follow these steps: 1. From the WS5000 Series Switch GUI main window, select Modify > Network > Existing Policy. The system launches the Network Policy Manager.
  • Page 65 Using the WS5000 Series Switch GUI 4-21 Figure 4.24 Modifying an Existing Network Policy—Network Policy Manager 2. This panel lists all available Network Policies configured on the system. Table 4.6 describes the fields and options within this panel. To edit a policy, select the policy name in the left pane first.
  • Page 66: Switch Policies

    A Security Policy defines the authentication and encryption methods that are used to secure communication between the WS5000 Series switch, through its APs, and on to the mobile units. Each WLAN can have a different security policy associated with it.
  • Page 67: Creating A Security Policy

    4.4.1.1 Creating a Security Policy To create a security policy, follow these steps: 1. From the WS5000 Series Switch GUI main window, select Create > Access Port > Security Policy. The Security Policy Wizard appears. Figure 4.27 Creating a Security Policy—Naming the Policy and Specifying an Encryption Type 2.
  • Page 68 4-24 WS5000 Series Switch System Reference Guide • AES CCMP – WPA2 dynamic encryption. If using PSK, an ASCII or hexadecimal value is required to complete configuration. 4. Click Next. A panel for specifying authentication/key management methods is displayed. Figure 4.28 Creating a Security Policy—Authentication/Key Management Methods 5.
  • Page 69 Using the WS5000 Series Switch GUI 4-25 • Kerberos Authentication Settings on page 4-25 • WEP Encryption Settings on page 4-26 • EAP Authentication Settings on page 4-27 Figure 4.29 Kerberos Authentication Settings The Kerberos Authentication Settings panel is where Kerberos KDC (Key Distribution Center) servers...
  • Page 70 4-26 WS5000 Series Switch System Reference Guide Table 4.8 Kerberos Authentication Settings (Continued) Setting Description Realm Name In addition to a Primary KDC server, a Kerberos Realm Name is required. The Realm Name value should, by convention be all upper-case letters (since it is usually also the DNS domain) Note Only properly formed, full-qualified realm names are required.
  • Page 71 Using the WS5000 Series Switch GUI 4-27 Table 4.9 WEP Encryption Setting Descriptions (Continued) Setting Description Key Values There are three ways to define your WEP key values: • Generate a key from a plain text password (or "pass key"). Enter the pass key in the Pass Key field, select the key you want to generate by clicking a radio button next to one of the Key #N fields, and then click the Generate button.
  • Page 72 4-28 WS5000 Series Switch System Reference Guide Table 4.10 describes the EAP authentication settings and RADIUS identification settings to be configured. Table 4.10 EAP Authentication Settings and RADIUS Identification Settings Setting Description Authentication Settings Pre-authentication When enabled, pre-authentication (or "fast-associate in advance") lets an access port send a mobile unit's authentication credentials (from a previous RADIUS authentication attempt) to the "next"...
  • Page 73: Access Control Lists

    Using the WS5000 Series Switch GUI 4-29 Table 4.10 EAP Authentication Settings and RADIUS Identification Settings (Continued) Setting Description Tx Period Specifies how long the switch waits, in seconds, for an MU to respond to a "request identity" message. After the Tx period expires, the switch sends another "request identity"...
  • Page 74: Creating An Access Control List

    4.4.2.1 Creating an Access Control List To create an access control list, follow these steps: 1. From the WS5000 Series Switch GUI main window, select Create > Access Port > Access Control List. The system launches the Access Control List Wizard.
  • Page 75: Modifying An Access Control List

    4.4.2.2 Modifying an Access Control List To modify an existing Access Control List, follow these steps: 1. From the WS5000 Series Switch GUI main window, select Modify > Access Port > Access Control List. The system launches the Access Control List Manager.
  • Page 76: Wlans

    4-32 WS5000 Series Switch System Reference Guide Figure 4.35 Modifying an Access Control List—Access Control List Manager 2. This panel lists all available Access Control Lists configured on the system. See Table 4.11 for more details on the controls within this panel to modify the ACL appropriately.
  • Page 77: Creating A Wlan

    4.4.3.1 Creating a WLAN To define a WLAN, follow these steps: 1. From the WS5000 Series Switch GUI main window, select Create > Access Port > WLAN. The system launches the WLAN Wizard. Figure 4.37 Creating a WLAN—Naming the WLAN (and Optionally, Choosing a Template) 2.
  • Page 78 4-34 WS5000 Series Switch System Reference Guide Table 4.12 Creating a WLAN—Configuring ESS ID, MU Associations, and WLAN Network Address Controls Configuration Components Description ESS ID Controls ESSID Use this text field (1 to 32 characters) to assign an Extended Service Set Identifier (ESSID) to the WLAN.
  • Page 79: Modifying A Wlan

    4.4.3.2 Modifying a WLAN To modify an existing WLAN’s definition, follow these steps: 1. From the WS5000 Series Switch GUI main window, select Modify > Access Port > WLAN. The system launches the WLAN Manager. Figure 4.40 Modifying an Existing WLAN Definition—WLAN Manager...
  • Page 80: Ethernet Port Policies

    The Ethernet Port Policy configures the switch’s Ethernet ports, and associates multiple WLANs with multiple LANs or VLANs. There are two Ethernet ports on WS5000 Series switches. By convention, port 1 (the left port) connects to the wireless LAN, and port 2 (the right port) connects to the wired LAN.
  • Page 81: Creating An Ethernet Port Policy

    Ethernet port (2) in this configuration). To create an Ethernet Port Policy, follow these steps: 1. From the WS5000 Series Switch GUI main window, click Create > Ethernet > New Policy. The system launches the Ethernet Port Policy Wizard.
  • Page 82 4-38 WS5000 Series Switch System Reference Guide Figure 4.42 Creating an Ethernet Port Policy—Naming the Policy (and Optionally, Choosing a Template) 2. Enter a name and description for the new Ethernet Port Policy, then if desired, select Use an existing Ethernet Policy as a template.
  • Page 83 Using the WS5000 Series Switch GUI 4-39 Figure 4.43 Creating an Ethernet Port Policy—Specifying VLAN Support 4. When done specifying a VLAN(s), click Next. A panel for associating WLANs to its NICs (or VLANs) is displayed (for trunk ports only).
  • Page 84: Modifying An Ethernet Port Policy

    4.4.4.2 Modifying an Ethernet Port Policy To modify an existing Ethernet Port Policy, follow these steps: 1. From the WS5000 Series Switch GUI main window, select Modify > Ethernet > Existing Policy. The system launches the Ethernet Policy Manager. Figure 4.45 Modifying an Existing Ethernet Policy—Ethernet Policy Manager 2.
  • Page 85: Configuring Vlans

    4.4.5.1 Creating an Access Port Policy To create a new Access Port Policy, follow these steps: 1. From the WS5000 Series Switch GUI main window, select Create > Access Port > New Policy. The system launches the New Access Port Policy Wizard.
  • Page 86 4-42 WS5000 Series Switch System Reference Guide Figure 4.47 Creating an Access Port Policy—Naming the Policy (and Optionally, Choosing a Template) 2. Enter a name and description for the new Access port policy, then if desired, select Use an existing Access Port Policy as a template.
  • Page 87 Using the WS5000 Series Switch GUI 4-43 Figure 4.49 Creating an Access Port Policy—Specifying Policy Definition for Specific AP Hardware Types There are seven AP hardware types: AP 100, AP 200a, AP 200b, AP 300a, AP 300g, and converted access points AP 302x (frequency-hopping) and AP 4121.
  • Page 88 4-44 WS5000 Series Switch System Reference Guide 6. When done configuring hardware type specifics, click Next. A panel for assigning a network policy is displayed. For each WLAN listed in the left column, select a Network Policy to be applied for the WLAN.
  • Page 89 Using the WS5000 Series Switch GUI 4-45 Edit the bandwidth field, in each hardware type tab, to divide the network RF bandwidth across all WLANs assigned per hardware type grouping. The total bandwidth in each tab must be equal to 100%.
  • Page 90: Modifying An Access Port Policy

    4.4.5.2 Modifying an Access Port Policy To modify an existing Access Port Policy, follow these steps: 1. From the WS5000 Series Switch GUI main window, select Modify > Access Port > Existing Policy. The system launches the Access Port Policy Manager.
  • Page 91: Setting The Country

    4.4.7 Creating a Switch Policy To create a wireless switch policy, follow these steps: 1. From the WS5000 Series Switch GUI main window, click Create > Wireless Switch > New Policy. The system launches the Wireless Switch Policy Wizard. Figure 4.54 Creating a Wireless Switch Policy—Naming a Policy (and Optionally, Choosing a Template) 2.
  • Page 92 4-48 WS5000 Series Switch System Reference Guide Figure 4.55 Creating a Wireless Switch Policy—Configuring Settings Configure the Wireless Switch Policy settings per the descriptions in Table 4.18. Table 4.18 Wireless Switch Policy Settings Setting Description Switch Settings Country Select the appropriate country for the location of the wireless switch. The switch Once a country is specified, will not adopt Access Ports until the country is set.
  • Page 93 Using the WS5000 Series Switch GUI 4-49 Table 4.18 Wireless Switch Policy Settings (Continued) Setting Description AP Channel and Power Settings Channel Select a value from the Channel .11x field. The set of discreet channels that are available depends on the country of operation, and is further limited by the restricted channels that declared in the Automatic Channel Settings panel.
  • Page 94 4-50 WS5000 Series Switch System Reference Guide Figure 4.56 Creating a Wireless Switch Policy—Associating Access Port Policies 5. Select from among the Available Access Port Policies and then click the >> button to move a Policy(s) to the Selected pane, and to apply it to the Wireless Switch Policy.
  • Page 95 Using the WS5000 Series Switch GUI 4-51 Figure 4.58 Creating a Wireless Switch Policy—Disallowed Adoption Lists 9. If desired, create an Access Port List that includes "disallowed" MAC address ranges. Only those APs that fall within the specified address range(s) are disallowed to be adopted.
  • Page 96: Defining/Activating An Emergency Switch Policy

    4-52 WS5000 Series Switch System Reference Guide the adopted AP, for each of the radio types. 12. When done, click Next. A Wireless Switch Policy Created Successfully! message panel is displayed. 13. Click Finish to save the new Wireless Switch Policy and exit the wizard.
  • Page 97: Chapter 5. Cli Command Reference

    The default cli user is “cli”. The default username and password is admin and symbol, respectively. 5.1 Basic Understandings Before you begin working with the WS5000 Series Switch CLI, review the following sections to gain some basic understandings of the CLI, in the following areas: •...
  • Page 98: About Contexts

    WS 5000 Series System Reference 5.1.1 About Contexts For a WS5000 Series Switch, CLI commands are invoked within “contexts.” Contexts are hierarchical in a manner similar to directories are hierachical in a traditional file system; in other words, contexts may contain other contexts.
  • Page 99: About Instances

    CLI Command Reference WS5000.(Cfg).wlan> .. ws5000.(Cfg)> To jump to the system context use exit WS5000.(Cfg).wlan> exit ws5000> Note You can’t go “up and over” when navigating the CLI—constructions such as “.. context” or “../context” do not work. 5.1.2 About Instances Most contexts contain “instances”...
  • Page 100: Common Commands

    WS 5000 Series System Reference 5.2 Common Commands Table 5.2 summarizes the commands common amongst many contexts and instance contexts within the WS5000 Series command line interface. Table 5.2 Common Commands Among Most Contexts Command Brief Description Ref. .. or end Terminate a current session and moves up a context, hierarchically.
  • Page 101: Or Help

    CLI Command Reference Syntax exit Parameters None. Example WS5000.(Cfg).ACL> exit WS5000> 5.2.3 ? or help Common to all contexts and instances Retreives a list of commands supported given the context or instance. Syntax help Parameters None. Example WS5000> ? WS5000> help 5.2.4 logout or bye Common to all contexts and instances Closes or logs out of the current session.
  • Page 102: Clear

    WS 5000 Series System Reference 5.2.5 clear Common to all contexts and instances Clear the screen of all running command input and output entries. Syntax clear Parameters None. Example WS5000> clear 5.2.6 emergencymode Common to all contexts and instances Enables or disables the “Emergency” Switch Policy (ESP), a switch policy that can activated (enabled) at any time in case of an emergency.
  • Page 103: Ping

    CLI Command Reference 5.2.8 ping System Context, Configuration (Cfg) Context, Host Context Sends ICMP ECHO_REQUEST packets to a network host. Syntax ping [-Rdfnqrv] [-c count] [-i wait] [-l preload] [-p pattern] [-s packetsize] <host/IP_address> Parameters -Rdfnqrv These optional flags are can be broken down as follows: •...
  • Page 104 WS 5000 Series System Reference 64 bytes from 10.1.1.101: icmp_seq=2 ttl=255 time=0.05 ms 64 bytes from 10.1.1.101: icmp_seq=3 ttl=255 time=0.052 ms --- WS5000 ping statistics --- 4 packets transmitted, 4 packets received, 0% packet loss round-trip min/avg/max = 0.037/0.045/0.052 ms WS5000>...
  • Page 105: System Context

    CLI Command Reference 5.3 System Context Table 5.3 summarizes the commands within this context. Common commands between multiple contexts are described in further detail in the Common Commands section. Table 5.3 System Context Command Summary Commands Brief Description Ref. ? or help Get the command information.
  • Page 106: Copy

    5-10 WS 5000 Series System Reference None. Example WS5000> configure WS5000.(Cfg)> 5.3.2 copy System Context Copies a file from the WS5000 to a (T)FTP server, or vice versa. TFTP can be used to transfer *.sys.img , and files. FTP can be used to transfer , and files.
  • Page 107: Delete

    CLI Command Reference 5-11 IP address of the TFTP server : 10.1.1.1 Copying 'backup.sys.img' from tftp://10.1.1.1 to Switch... WS5000> ftp://100.10.10.1/ftpimages/DefaultConfig.cfg system Copying 'DefaultConfig.cfg' from ftp://100.10.10.1/ftpimages/ to Switch... 5.3.3 delete System Context Deletes the specified image or config file from the WS5000. Use the directory command to list the files that can be deleted.
  • Page 108: Directory

    5-12 WS 5000 Series System Reference 5.3.5 directory System Context Lists the image and configuration files that are stored on the WS5000. Note As a shortcut, “dir” can be used instead of “directory”. Syntax directory Parameters None. Example WS5000> directory Date &...
  • Page 109: Name

    This may take a few mins ... Restoring configuration from siteconfig.cfg Software Ver. : 1.4.1.0-003D Starting the Wireless Switch 5000 ... Licensed to : Symbol Configuring ethernet ports ... Done. Done. No TFTP server is present. Max Mobile Clients Exiting auto install script...
  • Page 110: Save Configuration

    Places the user in a Service Mode (for which a new password is required also). This is a command line mode used mostly by Symbol technicians. For more details on working within Service Mode, refer to the WS5000 Series Switch Troubleshooting Guide. 5.3.11 show System Context Show the settings for the specified system component.
  • Page 111 CLI Command Reference 5-15 • Invoked with the display_parameter, it displays information about that component. • Invoked with both the display_parameter and the instance_name argument, information about the named instance within the component (context) is displayed. (Of course, this only applies to contexts that contain instances.) For example: WS5000>...
  • Page 112 5-16 WS 5000 Series System Reference Table 5.4 show Command’s display_parameter Summary (Continued) display_parameter Description Example securitypolicy Display security policy details page 5-23 snmpclients Display the SNMP Client/community details page 5-23 snmpstatus Display SNMP status page 5-23 Display SSH configuration page 5-23 standby Display Standby configuration...
  • Page 113 CLI Command Reference 5-17 WS5000> show ce Classifier information... Available Classifiers (CE): 1. Ex HTTP Traffic. 2. Ex Telnet Traffic. 3. RTP_Data. 4. Spectra_Link_Phone. 5. VoIP_Call_Setup_In. 6. VoIP_Call_Setup_Out. 7. VoIP_Ext_Services_Out. 8. VoIP_Ext_Services_In. 9. VoIP_RAS_In. 10. VoIP_RAS_Out. 11. New HTTP Traffic Classifier. WS5000>...
  • Page 114 5-18 WS 5000 Series System Reference Ecuador B Ch: 1-11 G Ch: 1-11 FH Ch: 2-80 A Ch: 149,153,157,161 Egypt B Ch: 1-13 G Ch: 1-13 FH Ch: 2-80 A Ch: Estonia B Ch: 1-13 G Ch: 1-13 FH Ch: 2-80 A Ch: 36,40,44,48,52,56,60,64,100,104,10 Finland B Ch: 1-13...
  • Page 115 CLI Command Reference 5-19 Panama B Ch: 1-11 G Ch: 1-11 FH Ch: 2-80 A Ch: Peru B Ch: 1-13 G Ch: 1-13 FH Ch: 0-0 A Ch: 149,153,157,161 Philippines B Ch: 1-13 G Ch: 1-13 FH Ch: 2-80 A Ch: Poland B Ch: 1-13 G Ch: 1-13...
  • Page 116 5-20 WS 5000 Series System Reference System Fan (rpm) 8544 8653 8437 None CPU Fan (rpm) 21093 675000 5000 None WS5000> show configaccess Configuration Access restriction details: Telnet access (CLI) : Disable. System access via SNMP : Enable. KDC configuration over remote console : Enable.
  • Page 117 CLI Command Reference 5-21 34 WLAN auth success Enabled Disabled Disabled 35 WLAN auth failed Enabled Enabled Disabled 36 WLAN max MU count reached Enabled Enabled Disabled 37 Mgt user auth failed [radius] Disabled Disabled Disabled 38 Mgt user auth rejected Disabled Disabled Disabled...
  • Page 118 5-22 WS 5000 Series System Reference Available EtherPorts are: Ethernet 1 Ethernet 2 WS5000> show kdc The system is configured as MASTER KDC. Kerberos Realm : realm1 Interface : ethernet1 User count (Active + deleted) Active users (MUs and WLANs) Slave KDCsIP AddressDomain -------------------------- No entry available.
  • Page 119 CLI Command Reference 5-23 Primary NTP Server First alternate NTP Server Second alternate NTP Server WS5000> show po Policy Object information..Available Policies (PO): 1. NetVision Priority for RF. 2. NetVision Packet Marking for Ethernet. 3. New Input Policy. 4. New Output Policy. WS5000>...
  • Page 120 5-24 WS 5000 Series System Reference Standby Management: StandBy mode : Primary Standby Status : Disable State : Startup Failover Reason Standby Connectivity status : Not Connected Standby AutoRevert Mode : Disable Standby AutoRevert Delay : 15 Minutes Interface (Ethernet) 1 ---------------------- StandBy Heart-Beat MAC : Auto Discovery Enabled...
  • Page 121 System Name : WS5000 Description : WS5000 Wireless Network Switch Location Software Ver. : 1.4.1.0-003D Licensed to : Symbol Technologies Copyright : Copyright (c) 2000-2005. All rights reserved. Serial Number : 00A0F8658C10 Number of Licenses : 48 Max Access Ports...
  • Page 122 ---------- --------------- LAN 1 Ethernet 1 eth1 LAN 2 Ethernet 2 eth1 WS5000> show wlan WLAN Name ESSID Security Policy --------- ----- --------------- Symbol Default Default Secure Access secure Kerberos Default Private Access private WEP128 Default Public Access public Default...
  • Page 123: Configuration (Cfg) Context

    CLI Command Reference 5-27 5.4 Configuration (Cfg) Context The Configuration context is where detailed configurations for the switch and network can be accessed, as well as configured. Also, in order to get to any uniquely defined policies for the switch, you must first access the Configuration context.
  • Page 124 5-28 WS 5000 Series System Reference Table 5.5 Configuration Context Commands (Continued) Command Description Ref. name Set or change the name. page 5-39 Configure a Network Policy. page 5-39 ping Ping a network host/IP address page 5-7 Configure a Policy Object. page 5-40 radius Configure RADIUS setting.
  • Page 125: Accessport

    CLI Command Reference 5-29 5.4.1 accessport Configuration (Cfg) Context Display the current access ports being managed by the switch. Also, the context is changed to the Access Port (APort) Context. See page 5-62 for more details. Note As a shortcut, “aport” can be used instead of “accessport”. Syntax accessport Parameters...
  • Page 126: Appolicy

    5-30 WS 5000 Series System Reference 5.4.3 appolicy Configuration (Cfg) Context Display the currently available access port policies for the switch. Also, the context is changed to the Access Port Policy (APPolicy) Context. See page 5-73 for more details. Syntax appolicy Parameters None.
  • Page 127: Chassis

    CLI Command Reference 5-31 5.4.5 cg Configuration (Cfg) Context Display the currently available classifiers for the switch. Also, the context is changed to the Classification Group (CG) Context. See page 5-92 for more details. Syntax Parameters None. Example WS5000.(Cfg)> cg Classification Group information...
  • Page 128: Date

    5-32 WS 5000 Series System Reference • *.sym • *.krb (FTP only) IMPORTANT! DO NOT USE THIS COMMAND FOR FILES LARGER THAN 32MB. Syntax For TFTP: copy <source> <destination> For FTP: copy <source> <destination> [ -u <ftp_user> ] [ -m <ftp_mode> ] Parameters source The source of the file.
  • Page 129: Delete

    CLI Command Reference 5-33 Syntax date [time_format] [time_zone] [daylight_savings] Parameters time_format The time to be set, in one of the following formats: • yyyymmddhhmm[.ss] • yymmddhhmm[.ss] • mmddhhmm[.ss] • ddhhmm[.ss] • hhmm[.ss] time_zone Valid range is -12:00 to +13:00 [+/-](HH:MM), where 0.00 is Greenwich Mean Time. Note that the ‘+’...
  • Page 130: Description

    5-34 WS 5000 Series System Reference Note As a shortcut, “del” can be used instead of “delete”. Syntax delete <filename> Parameters Name of file to be deleted. filename Example WS5000.(Cfg)> directory Date & Time Bytes File Name Jan 25 15:11 15155 WS5000Defaults_v1.4.1.0-003D.cfg Jan 25...
  • Page 131: Ethernet

    CLI Command Reference 5-35 Example WS5000.(Cfg)> directory Date & Time Bytes File Name Jan 25 15:11 15155 WS5000Defaults_v1.4.1.0-003D.cfg Jan 25 15:35 18819400 WS5000_v1.4.1.0-003D.sys.img Jan 25 14:05 6517 cmd_template.sym 5.4.12 ethernet Configuration (Cfg) Context Display the currently available ethernet ports for the switch. Also, the context is changed to the Ethernet Port Context.
  • Page 132: Events

    5-36 WS 5000 Series System Reference 5.4.14 events Configuration (Cfg) Context Display the event settings currently applied to the switch. Also, the context is changed to the Event Context. See page 5-119 for more details. Syntax events Parameters None. Example WS5000.(Cfg)>...
  • Page 133: Ftp

    CLI Command Reference 5-37 46 WPA counter-measures [active] Enabled Enabled Disabled 47 Primary lost heartbeat Enabled Disabled Disabled 48 Standby active Enabled Enabled Disabled 49 Primary internal failure [reset] Enabled Disabled Disabled 50 Standby internal failure [reset] Enabled Disabled Disabled 51 Standy auto-revert Enabled Enabled...
  • Page 134: Install

    5-38 WS 5000 Series System Reference Example WS5000.(Cfg)> host Host Name IP Address Domain --------- ---------- ------ SFhost 111.222.111.32 domain1 WS5000.(Cfg).Host> 5.4.17 install Configuration (Cfg) Context Configures the switch’s failover role as Primary or Standby, and applies all settings specified in the command file (.sym).
  • Page 135: Name

    CLI Command Reference 5-39 Example WS5000.(Cfg)> kdc The system is configured as MASTER KDC. Kerberos Realm : realm1 Interface : ethernet1 User count (Active + deleted) Active users (MUs and WLANs) Slave KDCsIP AddressDomain -------------------------- No entry available. List of all active KDC users (MUs & WLANs): No active Users available. WS5000.(Cfg).KDC>...
  • Page 136: Radius

    5-40 WS 5000 Series System Reference WS5000.(Cfg).NP> 5.4.21 po Configuration (Cfg) Context Display the currently available policy object information on the switch. Also, the context is changed to the Policy Object (PO) Context. See page 5-147 for more details. Syntax Parameters None.
  • Page 137: Reset

    CLI Command Reference 5-41 5.4.23 reset Configuration (Cfg) Context WS5000.(Cfg)> reset Resets the switch. Resetting the switch includes a graceful shutdown, and reboot. Syntax reset Parameters None. Example WS5000.(Cfg)> reset This command will reset the system. Are you sure (yes/no) : y System shutdown may take a few mins..
  • Page 138: Runacs

    This may take a few mins ... Restoring configuration from siteconfig.cfg Software Ver. : 1.4.1.0-003D Starting the Wireless Switch 5000 ... Licensed to : Symbol Configuring ethernet ports ... Done. Done. No TFTP server is present. Max Mobile Clients Exiting auto install script...
  • Page 139: Save Configuration

    CLI Command Reference 5-43 5.4.26 save configuration Configuration (Cfg) Context Saves the running system configuration to the specified file. Use directory to list the saved configuration files. Syntax save configuration <filename> Parameters filename The filename into which you want to save the running configuration. The .cfg extension is automatically appended.
  • Page 140: Set Daylight

    5-44 WS 5000 Series System Reference 5.4.28 set daylight Configuration (Cfg) Context Sets daylight savings mode, based on country location. Syntax set daylight <daylight_savings_mode_#> Parameters daylight_savings_mode_# Daylight savings mode. Possible values are: • 0 – Disabled • 1 – USA •...
  • Page 141: Set Licensekey

    WS5000.(Cfg)> 5.4.30 set licensekey Configuration (Cfg) Context Sets the license key for the switch. The license key, issued by Symbol, is used to determine the number of APs and MUs that the switch is able to support. Syntax set licensekey <licensekey>...
  • Page 142: Set Logout

    : WS5000 Description : WS5000 Wireless Network Switch Location : San Francisco Software Ver. : 1.4.1.0-003D Licensed to : Symbol Technologies Copyright : Copyright (c) 2000-2005. All rights reserved. Serial Number : 00A0F8658C10 Number of Licenses : 48 Max Access Ports...
  • Page 143: Set Snmptrap

    CLI Command Reference 5-47 5.4.33 set snmptrap Configuration (Cfg) Context Enables or disables SNMP traps, globally. Syntax set snmptrap <snmptrap_flag> Parameters snmptrap_flag Indicates whether to enable or disable SNMP traps on the switch. Possible values are: • enable • disable Example WS5000.(Cfg)>...
  • Page 144: Set Time

    : WS5000 Description : WS5000 Wireless Network Switch Location : San Francisco Software Ver. : 1.4.1.0-003D Licensed to : Symbol Technologies Copyright : Copyright (c) 2000-2005. All rights reserved. Serial Number : 00A0F8658C10 Number of Licenses : 48 Max Access Ports...
  • Page 145: Set Zone

    CLI Command Reference 5-49 Setting system time/date... Status: Success. System clock: 01:45:11 AM Date Fri Feb 11 2005 Time Zone (GMT -08:00) Pacific Time (US & Canada); Tijuana Daylight Saving: USA WS5000.(Cfg)> 5.4.36 set zone Configuration (Cfg) Context Sets the time zone, without changing the time, date, and daylight savings setting. Syntax set zone <time_zone>...
  • Page 146: Show

    5-50 WS 5000 Series System Reference 5.4.37 show Configuration (Cfg) Context Display all the available commands within the Configuration context. Also, any of the show commands, with an associated <display_parameter> will show a summary specific to the parameter. Syntax show show [<display_parameter>...
  • Page 147: Shutdown

    CLI Command Reference 5-51 5.4.38 shutdown Configuration (Cfg) Context Gracefully shuts down the switch. Before turning off the switch (power down), wait 10 seconds or more. After the switch has been shut down, bring it back up with a full power cycle (power down and then power back up).
  • Page 148: Ssh

    5-52 WS 5000 Series System Reference 5.4.40 ssh Configuration (Cfg) Context Display the Secure Shell settings currently applied to the switch. Also, the context is changed to the (Secure Shell) Context. See page 5-171 for more details. Syntax Parameters None. Example WS5000.(Cfg)>...
  • Page 149: Switchpolicy

    CLI Command Reference 5-53 Example WS5000.(Cfg)> standby Standby Management: StandBy mode : Primary Standby Status : Disable State : Startup Failover Reason Standby Connectivity status : Not Connected Standby AutoRevert Mode : Disable Standby AutoRevert Delay : 15 Minutes Interface (Ethernet) 1 ---------------------- StandBy Heart-Beat MAC : Auto Discovery Enabled...
  • Page 150: User

    Context. See page 5-203 for more details. Syntax wlan Parameters None. Example WS5000.(Cfg)> wlan WLAN Name ESSID Security Policy --------- ----- --------------- Symbol Default Default Secure Access secure Kerberos Default Private Access private WEP128 Default Public Access public Default WS5000.(Cfg).WLAN>...
  • Page 151: Access Control List (Acl) Context

    CLI Command Reference 5-55 5.5 Access Control List (ACL) Context An Access Control List is a set of rules that governs the adoption of mobile units. Each rule contains a MAC address or MAC address range, and an allow or deny declaration deeming whether the device can have associations with access ports or not.
  • Page 152: Add

    5-56 WS 5000 Series System Reference ACL Name : New ACL Default action on ACL items : allow MAC address (range) Rule ------------------- ---- 00:A0:F8:6E:4A:7A allow WS5000.(Cfg).ACL.[New ACL]> 5.5.2 add Access Control List (ACL) Context Adds a new ACL and then changes the context to the named ACL instance context. Syntax add <ACLname>...
  • Page 153: Show

    CLI Command Reference 5-57 Status: Success. Available ACLs: 1. 2-10ACL. WS5000.(Cfg).ACL> 5.5.4 show Access Control List (ACL) Context Display all defined ACLs within the switch. Syntax show Parameters None. Example WS5000.(Cfg).ACL> show Available ACLs: 1. 2-10ACL. WS5000.(Cfg).ACL>...
  • Page 154: Acl Instance Context

    5-58 WS 5000 Series System Reference 5.6 ACL Instance Context Table 5.7 summarizes the commands within this context. Common commands between multiple contexts are described in further detail in the Common Commands section. Table 5.7 ACL Instance Context Command Summary Commands Brief Description Ref.
  • Page 155: Set Name

    CLI Command Reference 5-59 name, addItem, remItem, editItem, and set defaultAction for more details. Syntax set <set_operation> [applicable_parameters] 5.6.2.1 set name ACL Instance Context Renames an ACL, while displaying the MAC addresses included with the ACL. Similar command to the name command.
  • Page 156: Set Edititem

    5-60 WS 5000 Series System Reference Parameters The MAC address of the device(s) to be removed. If the MAC address identifies the MAC_Address beginning of an device range, the entire range is removed from the ACL. Example EditorNote: 5.6.2.4 set editItem ACL Instance Context Edits an MU in the ACL list.
  • Page 157: Show

    CLI Command Reference 5-61 5.6.3 show ACL Instance Context Display the ACL device lists and default settings. Syntax show Parameters None. Example WS5000.(Cfg).ACL.[oldACL]> show ACL Name : oldACL Default action on ACL items : allow MAC address (range) Rule ------------------- ---- WS5000.(Cfg).ACL.[oldACL]>...
  • Page 158: Access Port (Aport) Context

    5-62 WS 5000 Series System Reference 5.7 Access Port (APort) Context The Access Port context lets you name the RF devices (the radios in the Access Ports and converted Access Points) that exist on your WLAN. You can create Access Port instances by hand through the command, or allow them to be created as Access Ports are discovered and adopted by the switch.
  • Page 159: Port

    CLI Command Reference 5-63 a_MAC, b_MAC, g_MAC For dual-radio APs, you must supply the MAC of (at least) the AP’s “first” radio. The MAC of the second radio is optional. The a_name, b_name, and g_name arguments refer to the 802.11x radio types. name, a_name, b_name, Unique names that you give to the Access Port and/or its radios.
  • Page 160: Remove

    5-64 WS 5000 Series System Reference Note The system never needs to automatically assign a name to an 802.11g or a frequency-hopping (FH) radio since you’re compelled to supply names for these radios when you add their Access Port instances. Syntax port <APort_name>...
  • Page 161: Show

    CLI Command Reference 5-65 Syntax remove <name> Parameters name Removes the port with the given name. Example 5.7.4 show Access Port (APort) Context Shows the Access Port configuration values. Syntax show show interfaces show channelInfo Parameters (none) Display a list of Access Port instances. interfaces Display a list of Access Port instances and lists the available Ethernet ports.
  • Page 162 5-66 WS 5000 Series System Reference ------------ ---- ---------------------------- Argentina B Ch: 1-11 G Ch: 1-11 FH Ch: 2-80 A Ch: 149,153,157,161 Australia B Ch: 1-13 G Ch: 1-13 FH Ch: 2-80 A Ch: 36,40,44,48,52,56,60,64,149,153,11 Austria B Ch: 1-13 G Ch: 1-13 FH Ch: 2-80 A Ch: 36,40,44,48,52,56,60,64,100,104,10 Bahrain...
  • Page 163: Access Port Instance

    CLI Command Reference 5-67 5.8 Access Port Instance To drop into an Access Port instance, use the < > command from within the context. port name APort Table 5.9 summarizes the commands within this context.Common commands between multiple contexts are described in further detail in the Common Commands section.
  • Page 164: Reset

    5-68 WS 5000 Series System Reference Syntax name <AP_name> Parameters AP_name Name defined for the Access Port. Example WS5000.(Cfg).APort.[ap_name]> name New_AP_name WS5000.(Cfg).APort.[New_AP_name]> 5.8.3 reset Access Port Instance Resets the Access Port or its radio, depending on the parameter value. Syntax reset <reset_flag>...
  • Page 165 CLI Command Reference 5-69 Table 5.10 Access Port Instance “Set” Command Summary (Continued) Set Command Description AP Models Syntax channel Access Port transmit channel. Possible values are: All except: set channel <value> • <channel#> – Specific channel number • AP 3020 •...
  • Page 166 5-70 WS 5000 Series System Reference Table 5.10 Access Port Instance “Set” Command Summary (Continued) Set Command Description AP Models Syntax statistics Enable/disable Access Port information gathering. set statistics <enable_flag> When enabled, the Access Port reports throughput in packets-per-second, as well as the amount of time that it has been adopted by the switch.
  • Page 167: Show

    CLI Command Reference 5-71 Status : Active Tx Channel Current Tx Channel Policy Attached : appol1 Tx Power : 20 dBm1 Current Tx Power : 20 dBm Location NIC Connected : Ethernet 1 VLAN id : None VLAN Tags seen : None CCA Mode CCA Threshold...
  • Page 168 5-72 WS 5000 Series System Reference Up Time : 6d:20h:36m Statistics gathering : Disable Tx Packets/second Antenna : unknown Indoor/Outdoor : in Antenna Correction MU Power Adjustment All Channels : 1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, Valid Power Range : 4-20 WS5000.(Cfg).APort.[00:A0:F8:A2:91:7C [B]]...
  • Page 169: Access Port Policy (Appolicy) Context

    CLI Command Reference 5-73 5.9 Access Port Policy (APPolicy) Context An Access Port Policy configures a physical Access Port by defining attributes such as beacon interval, RTS threshold, the set of supported data rates, and so on. The APPolicy is also responsible for adding WLANs to the Access Port, and for attaching a Security Policy, Access Control List, and Network Policy (or packet filter) to each AP.
  • Page 170: Policy

    5-74 WS 5000 Series System Reference Access Port Policy details for "newpolicy": Policy Name : newpolicy Description Basic Rate for 11a : 6,12,24 Supported Rate for 11a : 9,18,36,48,54 Basic Rate for 11b : 1,2 Supported Rate for 11b : 5.5,11 Basic Rate for 11g : 1,2,5.5,11 Supported Rate for 11g...
  • Page 171: Remove

    CLI Command Reference 5-75 WLAN details for the Access Port policy 'appol1' WLAN Name Network Policy --------- -------------- WLAN_NE WS5000.(Cfg).APPolicy.[appol1]> 5.9.3 remove Access Port Policy (APPolicy) Context Removes the named Access Port policy. Syntax remove <name> Parameters name The name of the Access Port policy that’s to be removed. Example WS5000.(Cfg).APPolicy>...
  • Page 172: Access Port Policy Instance

    5-76 WS 5000 Series System Reference 5.10 Access Port Policy Instance Table 5.12 summarizes the commands within this context. Common commands between multiple contexts are described in further detail in the Common Commands section. Table 5.12 Access Port Policy Instance Context Command Summary Commands Brief Description Ref.
  • Page 173: Description

    CLI Command Reference 5-77 WLAN details for the Access Port policy 'NY_APpolicy' WLAN Name Network Policy --------- -------------- WLAN_NE WS5000.(Cfg).APPolicy.[NY_APpolicy]> 5.10.2 description Access Port Policy Instance Configures a b rief description for the Access Port Policy instance Syntax description <description_text> Parameters description_text Brief description of the Access Port Policy instance.
  • Page 174: Name

    5-78 WS 5000 Series System Reference Some explanation is necessary, as follows. There are six Access Port device/radio types: AP 100, AP 200a, AP 200b, AP 300(a/g), AP 302x, and AP 4121. These hardware types are grouped by the number of BSSs and ESSs that they support.
  • Page 175: Remove

    CLI Command Reference 5-79 Configuring name... Status : Success. WS5000.(Cfg).APPolicy.[NY_APPolicy]> 5.10.5 remove Access Port Policy Instance Remove an AP Policy instance. Syntax remove <APPolicy_name> Parameters APPolicy_name Name of the AP Policy to be removed. Example WS5000.(Cfg).APPolicy> remove "New Access Port Policy" Removing Access Port Policy...
  • Page 176: Set

    5-80 WS 5000 Series System Reference DTIM Period : 10 Beacon Interval : 100 Allow MUs w/o Spectrum Mgmt : false WLAN details for the Access Port policy 'NY_APpolicy' WLAN Name Network Policy --------- -------------- WLAN_NE WS5000.(Cfg).APPolicy.[NY_APpolicy]> 5.10.7 set Access Port Policy Instance Sets various configurations related to the Access Port Policy instance.
  • Page 177: Set Basicrates

    CLI Command Reference 5-81 5.10.7.1 set basicRates Access Port Policy Instance Sets the basic frequency rates for a given 802.11 radio type. Syntax set basicRates <radioType> <rates ...> Parameters radioType One of A, B, G, or FH (frequency hopping). Radio values are: •...
  • Page 178: Set Dtim

    5-82 WS 5000 Series System Reference Example WS5000.(Cfg).APPolicy.[NY_APPolicy]> set beacon 125 Configuring a Access Port Policy... Status: Success. Access Port Policy details for "NY_APPolicy": Policy Name : NY_APPolicy Description Basic Rate for 11a : 6,12,24 Supported Rate for 11a : 9,18,36,48,54 Basic Rate for 11b : 1,2 Supported Rate for 11b...
  • Page 179: Set Np

    CLI Command Reference 5-83 5.10.7.5 set np Access Port Policy Instance Assigns the Network Policy that’s associated with the combination of this Access Port Policy and WLAN. Syntax set np <np_name> <wlan_name> Parameters The name of the Network Policy. name The name of the WLAN.
  • Page 180: Set Supportedrates

    5-84 WS 5000 Series System Reference Supported Rate for 11a : 9,18,36,48,54 Basic Rate for 11b : 1,2 Supported Rate for 11b : 5.5,11 Basic Rate for 11g : 1,2,5.5,11 Supported Rate for 11g : 6,9,12,18,24,36,48,54 Basic Rate for FH Supported Rate for FH RF Preamble : short...
  • Page 181: Access Port Map Context

    CLI Command Reference 5-85 5.11 Access Port Map Context See the command for an introduction to the Map context, a context where mapping of WLANs to different Table radio types is configured. The four Map contexts and the radios that use each mapping are shown in 5.13.
  • Page 182: Select

    5-86 WS 5000 Series System Reference Table 5.14 Access Port Map Context Command Summary (Continued) Commands Brief Description BSS Map (AP Type) Ref. set bw Set the guaranteed bandwidth that is assigned to a 1BSS-to-16ESS page 5-87 (AP200a) WLAN. 4BSS-to-16ESS (AP200b, AP300, AP4121) set primaryWLAN...
  • Page 183: Set Bss

    CLI Command Reference 5-87 5.11.2 set bss Access Port Map Context Assigns a BSS index ID to a WLAN. The WLAN must already be part of the Access Port Policy that owns this Map. Note This command applies only to: 4BSS-to-16ESS (AP200b, AP300, AP4121) Syntax set bss <bss_index>...
  • Page 184: Set Primarywlan

    5-88 WS 5000 Series System Reference Example WS5000.(Cfg).APPolicy.[NY_APpolicy].Map.[4BSS-16ESS]> set bw 20 WLAN_NE Configuring a Access Port Policy... Status: Success. 4BSS-16BSS mapping (used for AP200 11b radio, AP300 and AP4121): WLAN Name Primary BW(%) --------- ------- ----- WLAN_NE 20.00% Total BandWidth: 20.00% WS5000.(Cfg).APPolicy.[NY_APpolicy].Map.[4BSS-16ESS]>...
  • Page 185: Show

    CLI Command Reference 5-89 Success. 4BSS-4ESS mapping (used for AP100): WLAN Name Selected BW(%) --------- -------- ----- WLAN_NE Total BandWidth: 0.00% WS5000.(Cfg).APPolicy.[NY_APpolicy].Map.[4BSS-4ESS]> 5.11.6 show Access Port Map Context Syntax show Parameters None. Example WS5000.(Cfg).APPolicy.[NY_APPolicy].Map.[4BSS-4ESS]> show 4BSS-4ESS mapping (used for AP100): WLAN Name Selected BW(%)
  • Page 186: Chassis Context

    5-90 WS 5000 Series System Reference 5.12 Chassis Context Display and manage CPU and system temperature. Table 5.15 summarizes the commands within this context. Common commands between multiple contexts are described in further detail in the Common Commands section.. Table 5.15 Chassis Context Command Summary Commands Brief Description Ref.
  • Page 187: Show

    CLI Command Reference 5-91 CPU Temperature 42 C 48 C 40 C System Temperature 38 C 40 C 36 C 30 C System Fan (rpm) 8437 8653 8437 None CPU Fan (rpm) 23275 675000 5000 None WS5000.(Cfg).Chassis> set notify cpu-temperature 40 Configuring notify temperature...
  • Page 188: Classification Group (Cg) Context

    5-92 WS 5000 Series System Reference 5.13 Classification Group (CG) Context A Classification Group (CG) is a collection of classifiers that evaluate network packets as they are sent to or arrive from wireless devices. In addition to collecting Classifiers, the CG declares the action that is to be taken after a packet is evaluated by a Classifier.
  • Page 189: Remove

    CLI Command Reference 5-93 Available Classification Groups: 1. NetVision_VoIP_In. 2. NetVision_VoIP_Out. 3. New Classification Group. 4. voip_in_cg. Classification Group information... Classification Group Name : voip_in_cg CG Description No of classifiers for this CG WS5000.(Cfg).CG.[voip_in_cg]> 5.13.2 cg Classification Group (CG) Context Changes the prompt to the context for a Classification Group instance.
  • Page 190: Show

    5-94 WS 5000 Series System Reference Available Classification Groups: 1. NetVision_VoIP_In. 2. NetVision_VoIP_Out. 3. voip_in_cg. WS5000.(Cfg).CG> 5.13.4 show Classification Group (CG) Context Display information about a system component or named context instance. Syntax show show ce Parameters None. Example WS5000.(Cfg).CG> show Classification Group information...
  • Page 191: Classification Group Instance

    CLI Command Reference 5-95 5.14 Classification Group Instance When you drop into a Classification Group instance, the CG’s set of Classifiers and associated actions are displayed. Table 5.17 summarizes the commands within this context. Common commands between multiple contexts are described in further detail in the Common Commands section.
  • Page 192: Name

    5-96 WS 5000 Series System Reference 5.14.2 name Classification Group Instance Rename a Classification Group Instance. Syntax name <new_name> Parameters new_name New Name that the current Classification Group will be renamed. Example WS5000.(Cfg).CG.[new_CG]> name anotherName Configuring name... Status : Success. WS5000.(Cfg).CG.[anotherName]>...
  • Page 193 CLI Command Reference 5-97 WS5000.(Cfg).CG.[voip_in_cg]> show ce Classifier information... Available Classifiers (CE): 1. Ex HTTP Traffic. 2. Ex Telnet Traffic. 3. RTP_Data. 4. Spectra_Link_Phone. 5. VoIP_Call_Setup_In. 6. VoIP_Call_Setup_Out. 7. VoIP_Ext_Services_Out. 8. VoIP_Ext_Services_In. 9. VoIP_RAS_In. 10. VoIP_RAS_Out. 11. New HTTP Traffic Classifier. WS5000.(Cfg).CG.[voip_in_cg]>...
  • Page 194: Show

    5-98 WS 5000 Series System Reference Syntax show Parameters None. Example WS5000.(Cfg).CG.[CG_name]> show Classification Group information... Classification Group Name : anotherName CG Description : This is a VOIP Group No of classifiers for this CG WS5000.(Cfg).CG.[CG_name]>...
  • Page 195: Classifier Context (Ce)

    CLI Command Reference 5-99 5.15 Classifier Context (CE) A Classifier is a predicate that tests various aspects of a network packet: Source and destination IP, transport protocol, and so on. A packet will either “pass” or “fail” the predicate. The action that is taken when a packet passes or fails a Classifier isn’t included in the Classifier definition—that is the job (primarily) of a Classification Group.
  • Page 196: Remove

    5-100 WS 5000 Series System Reference Available Classifiers (CE): 1. Ex HTTP Traffic. 2. Ex Telnet Traffic. 3. RTP_Data. 4. Spectra_Link_Phone. 5. VoIP_Call_Setup_In. 6. VoIP_Call_Setup_Out. 7. VoIP_Ext_Services_Out. 8. VoIP_Ext_Services_In. 9. VoIP_RAS_In. 10. VoIP_RAS_Out. 11. New HTTP Traffic Classifier. 12. HTTP_ce. Classifier information...
  • Page 197 CLI Command Reference 5-101 Shows Classifier details. Syntax show Parameters None. Example...
  • Page 198: Classifier Instance

    5-102 WS 5000 Series System Reference 5.16 Classifier Instance A Classifier instance contains a collection of “matching criteria” (MC). Each MC consists of a network packet attribute and the value to which the attribute is compared. As packets arrive from or are sent to the wireless network, they’re evaluated by the Classifier.
  • Page 199 CLI Command Reference 5-103 Parameters MACsource <MAC_address> The MAC address of the device that sent the packet. The value is a MAC address in the usual form. MACdestination <dest_MAC_address> The MAC address of the device to which the packet is being sent. The value is a MAC address in the usual form.
  • Page 200: Removemc

    5-104 WS 5000 Series System Reference 1. 172.39.80.2 IP Mask: 255.255.255.0 WS5000.(Cfg).CE.[HTTP_ce]> 5.16.2 removeMC Classifier Instance Removes the matching criterion for the named criteria. Syntax removeMC <parameters> Parameters See parameters described in addMC command on page 5-102. Example WS5000.(Cfg).CE.[HTTP_ce]> removemc IPsource Removing Matching Criteria...
  • Page 201: Show

    CLI Command Reference 5-105 Matching Criteria details for 'Source IP' : (MC Offset: 7) Matching Criteria details for 'Destination IP' : (MC Offset: 8) Matching Criteria details for 'Source Port' : (MC Offset: 9) 1. 7001. 2. 7001-7010. WS5000.(Cfg).CE.[HTTP_ce]> 5.16.4 show Classifier Instance Shows details for this Classifier instance.
  • Page 202: Ethernet Port Context

    5-106 WS 5000 Series System Reference 5.17 Ethernet Port Context There are two Ethernet ports on WS5000 Series switches. • Port 1 connects (by convention) to the wired LAN. • Port 2 connects to the wireless LAN. Table 5.20 summarizes the commands within this context. Common commands between multiple contexts are...
  • Page 203: Show

    CLI Command Reference 5-107 Network Mask : 255.255.255.0 Domain Name : domain1 Port type (trunk/non-trunk) : Non-Trunk VLAN Tags seen : None Up-Time : 12d:03h:54m Transmit packets : 4260726 Received packets : 4959514 Gateway : 111.222.111.254 DNS servers 1. 111.222.111.100. WS5000.(Cfg).Ethernet.[1]>...
  • Page 204: Ethernet Port Instance

    5-108 WS 5000 Series System Reference 5.18 Ethernet Port Instance There are two Ethernet Port instances, one for each of the WS5000’s NICs. The instances are identified by number: 1 or 2. By convention, the WLAN is connected to the switch through NIC 1, and NIC 2 connects the switch to the wired network.
  • Page 205: Set

    CLI Command Reference 5-109 Configuring IP address of Ethernet 1... Status: Success. Name : Ethernet 1 Network Interface Card # Description : Ethernet Adapter MAC Address : 00:A0:F8:65:94:B8 Status : Enable Online : Yes Configured Mode : auto Negotiated Mode - Duplex : Full Negotiated Mode - Speed : 100...
  • Page 206 5-110 WS 5000 Series System Reference attribute Description nonTrunk Sets the port to be non-trunked. trunk <primary_vLanID> Sets the port to be a trunked. vLanId Sets the primary VLAN ID. The port automatically becomes trunked. clearVlanTags Clears the VLAN tag register. Example WS5000.(Cfg).Ethernet.[1]>...
  • Page 207: Show

    CLI Command Reference 5-111 5.18.3 show Ethernet Port Instance Display Ethernet Port instance information. Syntax show show interfaces Parameters (none) Display a list of Ethernet port instances. interfaces Shows adopted Access Port info and lists the switch’s Ethernet ports Example WS5000.(Cfg).Ethernet.[1]>...
  • Page 208: Ethernet Policy (Etherpolicy) Context

    WS 5000 Series System Reference 5.19 Ethernet Policy (EtherPolicy) Context EThernet policies are used by the WS5000 Series switch to configure a VLAN ID to an Ethernet port. Table 5.22 summarizes the commands within this context. Common commands between multiple contexts are...
  • Page 209: Policy

    CLI Command Reference 5-113 WS5000.(Cfg).EtherPolicy.[LabEtherPolicy]> 5.19.2 policy Ethernet Policy (EtherPolicy) Context Changes the prompt to the context of the named Ethernet policy instance. Syntax policy <name> Parameters name Selects the Ethernet policy. Example WS5000.(Cfg).EtherPolicy> policy LabEtherPolicy Ether Policy Name : LabEtherPolicy Description Rest of Network on : Ethernet 2...
  • Page 210 5-114 WS 5000 Series System Reference Syntax show Parameters None. Example WS5000.(Cfg).EtherPolicy> show Available EtherPolicies are: 1. Default Ethernet Policy. 2. New Ethernet Port Policy. 3. eth1. WS5000.(Cfg).EtherPolicy>...
  • Page 211: Ethernet Policy Instance

    CLI Command Reference 5-115 5.20 Ethernet Policy Instance An Ethernet policy instance configures the two Ethernet ports to support the LAN and the WLAN, and creates and maps VLANs to the two ports. Table 5.23 summarizes the commands within this context. Common commands between multiple contexts are described in further detail in the Common Commands section.
  • Page 212: Remove

    5-116 WS 5000 Series System Reference LAN2 --> Ethernet: 2 VLAN 200 --> Ethernet: 1 Interface Priority # of WLANs Ethernet Policy --------- -------- ---------- --------------- VLAN 200 Ethernet 1 LabEtherPolicy WS5000.(Cfg).EtherPolicy.[LabEtherPolicy].Vlan.[200]> 5.20.2 remove Ethernet Policy Instance Removes a VLAN from this Ethernet Policy instance. Syntax remove <vlan_id>...
  • Page 213: Show

    CLI Command Reference 5-117 VLANs mapped are: LAN2 --> Ethernet: 2 WS5000.(Cfg).EtherPolicy.[LabEtherPolicy]> set ronnic 1 Ether Policy Name : LabEtherPolicy Description Rest of Network on : Ethernet 1 VLANs mapped are: LAN2 --> Ethernet: 2 WS5000.(Cfg).EtherPolicy.[LabEtherPolicy]> description “Created 3-8-05” Ether Policy Name : LabEtherPolicy Description : Created 3-8-05...
  • Page 214 5-118 WS 5000 Series System Reference Ether Policy Name : LabEtherPolicy Description Rest of Network on : Ethernet 2 VLANs mapped are: LAN2 --> Ethernet: 2 VLAN 200 --> Ethernet: 1 Interface Priority # of WLANs Ethernet Policy --------- -------- ---------- --------------- VLAN 200...
  • Page 215: Event Context

    CLI Command Reference 5-119 5.21 Event Context The Event context provides a place to configure notifications and severities of system events. Table 5.24 summarizes the commands within this context. Common commands between multiple contexts are described in further detail in the Common Commands section.
  • Page 216: Syslog

    5-120 WS 5000 Series System Reference default This form of the command resets all events to their factory defaults. Example EditorNote: 5.21.2 syslog Event Context Changes the prompt to the Syslog Context. See page 5-122 for more details. 5.21.3 show Event Context Display available system events, and notification settings in terms of the following logging: •...
  • Page 217 CLI Command Reference 5-121 22 MU assoc failed [ACL violation] Enabled Enabled Disabled 23 MU assoc failed Enabled Enabled Disabled 24 MU status [associated] Enabled Enabled Disabled 25 MU status [roamed] Enabled Enabled Disabled 26 MU status [disassociated] Enabled Enabled Disabled 27 MU EAP auth failed Enabled...
  • Page 218: Syslog Context

    5-122 WS 5000 Series System Reference 5.22 Syslog Context The Syslog context is a subcontext of Event. The commands in the Syslog context let you configure and control the remote event logging service. The remote service sends system logging information to a remote host, which must have a message logging daemon running.
  • Page 219: Remove

    CLI Command Reference 5-123 Example WS5000.(Cfg).Event.Syslog> add SFhost 111.222.111.32 domain1 Adding Host... Status: Success. Host Name IP Address Domain --------- ---------- ------ SFhost 111.222.111.32 domain1 WS5000.(Cfg).Event.Syslog> 5.22.2 remove Syslog Context Remove a Syslog host. Syntax remove <name> Parameters name The name of the Syslog host, as assigned in the command.
  • Page 220 5-124 WS 5000 Series System Reference severity Specifies a type of message tracked to be sent to the Syslog. Possible values are: • emerg – emergency messages • alert • crit – critical messages • err – error messages • info – information only messages •...
  • Page 221: Show

    CLI Command Reference 5-125 Changing severity level... Status: Success. Syslog Status: Enable (Syslog Deamon is Running). Host emerg alert crit warning notice info debug ---- ----- ----- ---- ------- ------ ---- ----- SFhost WS5000.(Cfg).Event.Syslog> set SFhost err enable Changing severity level... Status: Success.
  • Page 222: Start

    5-126 WS 5000 Series System Reference WS5000.(Cfg).Event.Syslog> 5.22.5 start Syslog Context Starts the Syslog service. Syntax syslog Parameters None. Example WS5000.(Cfg).Event.Syslog> start Status: Success. Syslog Status: Enable (Syslog Deamon is Running). Host emerg alert crit warning notice info debug ---- ----- ----- ----...
  • Page 223: Ftp Context

    CLI Command Reference 5-127 5.23 FTP Context Table 5.19 summarizes the commands within this context. Common commands between multiple contexts are described in further detail in the Common Commands section. Table 5.26 FTP Context Command Summary Commands Brief Description Ref. ..
  • Page 224: Show

    5-128 WS 5000 Series System Reference None. Example WS5000.(Cfg).FTP> disable Disabling... Status : Success. FTP Status: Disabled. WS5000.(Cfg).FTP> 5.23.3 show FTP Context Display the state of the FTP server. Syntax show Parameters None. Example WS5000.(Cfg).FTP> show FTP Status: Active. WS5000.(Cfg).FTP>...
  • Page 225: Host Context

    CLI Command Reference 5-129 5.24 Host Context The Host context collects the various hosts that are declared in other contexts. Table 5.27 summarizes the commands within this context. Common commands between multiple contexts are described in further detail in the Common Commands section.
  • Page 226: Host

    5-130 WS 5000 Series System Reference 5.24.2 host Host Context Changes the prompt to the context of a specified Host instance context. Syntax edit <host> Parameters host The name of the host that you want to edit. Example WS5000.(Cfg).Host> host NYhost Host Name IP Address Domain...
  • Page 227: Host Instance

    CLI Command Reference 5-131 5.25 Host Instance The Host instance context lets you modify an entry in the host list. Table 5.28 summarizes the commands within this context. Common commands between multiple contexts are described in further detail in the Common Commands section.
  • Page 228: Show

    System Name : WS5000 Description : WS5000 Wireless Network Switch Location Software Ver. : 1.4.1.0-003D Licensed to : Symbol Technologies Copyright : Copyright (c) 2000-2005. All rights reserved. Serial Number : 00A0F86594B8 Number of Licenses : 48 Max Access Ports...
  • Page 229: Kdc Context

    CLI Command Reference 5-133 5.26 KDC Context KDC Context The KDC context provides configuration options to configure the switch-resident Kerberos Key Distribution Center (KDC) as a Master or Slave. Table 5.19 summarizes the commands within this context. Common commands between multiple contexts are described in further detail in the Common Commands section.
  • Page 230: Remove Slave Kdc

    5-134 WS 5000 Series System Reference Example WS5000.(Cfg).KDC> add slavekdc slaveKDC_NY 111.222.111.30 NYdomain1 Adding slave KDC..Status: Success. The system is configured as MASTER KDC. Kerberos Realm : realm1 Interface : ethernet1 User count (Active + deleted) Active users (MUs and WLANs) Slave KDCs IP Address Domain...
  • Page 231: Remove Mu

    CLI Command Reference 5-135 Parameters Name of the MU. ticket_life Ticket life duration, in minutes. Example WS5000.(Cfg).KDC> add mu 489-45-5672 3 Enter password for the mu "489-45-5672" : *** Confirm password for mu "489-45-5672" : *** Adding mu '489-45-5672' to the KDC. Status: Success.
  • Page 232: Ntpserver

    5-136 WS 5000 Series System Reference Example WS5000.(Cfg).KDC> dump kdcTracks Saving KDC principals in: kdcTracks.krb Status: Success. WS5000.(Cfg).KDC> dir ERROR: Command 'dir' not found in KDC context. WS5000.(Cfg).KDC> .. WS5000.(Cfg)> dir Date & Time Bytes File Name 21:33 1068 KerberosErrorLog.txt Jan 25 15:11 15155...
  • Page 233: Set Clear

    CLI Command Reference 5-137 Parameters protocol_type Defines the type of protocol to be used to configure the KDC. Possible values are: • CLI • SNMP enable_flag Indicates whether access is granted or not. Possible values are: • enable – Enable access for KDC configuration via the protocol type defined. •...
  • Page 234: Set Master

    5-138 WS 5000 Series System Reference 5.26.9 set master KDC Context Sets the switch to be the Master KDC. Syntax set master <realm> [master_name] [domain] Parameters realm KDC realm name master_name Name assigned to the Master KDC. domain Optional domain over which the KDC has dominion. Example EditorNote: 5.26.10 set ntpServer...
  • Page 235: Show

    CLI Command Reference 5-139 master_name Name of the Master KDC. master_ip IP address of the Master KDC. The Ethernet port (1 or 2) through which the Slave will communicate with the Master. Example EditorNote: 5.26.12 show KDC Context Shows KDC details. Syntax show Display context specific attributes...
  • Page 236 5-140 WS 5000 Series System Reference Syntax synchronize <slave_name> <slave_ip> <slave_domain> Parameters slave_name Name of the KDC slave. slave_ip IP address of the KDC slave. slave_domain Domain of the KDC slave. Example WS5000.(Cfg).KDC> synchronize slaveKDC_NY 111.222.111.30 NYdomain1 Synchronizing slave KDC (slaveKDC_NY) DB with master..
  • Page 237: Network Policy (Np) Context

    CLI Command Reference 5-141 5.27 Network Policy (NP) Context A Network Policy is a collection of packet filters that you can use to implement various Quality of Service requirements. Each Network Policy contains an inbound Policy Object and an outbound Policy Object. The inbound policy filters packets that are sent from wireless devices to the WS5000.
  • Page 238: Remove

    5-142 WS 5000 Series System Reference 1. Default Network Policy. 2. NetVision_VoIP_Priority. 3. New Network Policy. 4. NY_ntwk_SwitchPolicy. Network Policy information Network Policy Name : NY_ntwk_SwitchPolicy Policy Description Outbound Policy Object name Inbound Policy Object name WS5000.(Cfg).NP.[NY_ntwk_SwitchPolicy]> 5.27.2 np Network Policy (NP) Context Changes the prompt to the context of a specific Network Policy instance.
  • Page 239: Show

    CLI Command Reference 5-143 WS5000.(Cfg).NP> remove "New Network Policy" Removing Network Policy... Status: Success. Network Policy information Available Network Policies: 1. Default Network Policy. 2. NetVision_VoIP_Priority. 3. NY_ntwk_SwitchPolicy. WS5000.(Cfg).NP> 5.27.4 show Network Policy (NP) Context Shows Network Policy details. Syntax show Display context specific attributes show ce...
  • Page 240: Network Policy Instance

    5-144 WS 5000 Series System Reference 5.28 Network Policy Instance Table 5.19 summarizes the commands within this context. Common commands between multiple contexts are described in further detail in the Common Commands section. Table 5.31 Network Policy Instance Context Command Summary Commands Brief Description Ref.
  • Page 241: Show

    CLI Command Reference 5-145 config_parameter Network Policy parameter to be cofigured. parameter_value Value for the NP parameter. Type 'remove' to remove a Policy Object config_parameter: name Change name of the Network Policy. inboundpolicy Assign Input Policy Object. outboundpolicy Assign Output Policy Object. ERROR: Command 'set' cancelled due to invalid or unrecognized parameter.
  • Page 242 5-146 WS 5000 Series System Reference Inbound Policy Object name : New Input Policy WS5000.(Cfg).NP.[NY_NetworkPolicy]>...
  • Page 243: Policy Object (Po) Context

    CLI Command Reference 5-147 5.29 Policy Object (PO) Context Table 5.19 summarizes the commands within this context. Common commands between multiple contexts are described in further detail in the Common Commands section. Table 5.32 Policy Object Context Command Summary Commands Brief Description Ref.
  • Page 244: Remove

    5-148 WS 5000 Series System Reference Adding Policy Object... Status: Success. Policy Object information..Available Policies (PO): 1. NetVision Priority for RF. 2. NetVision Packet Marking for Ethernet. 3. New Input Policy. 4. New Output Policy. 5. Inbound. Policy Object information..Network Policy Name : Inbound Description...
  • Page 245: Show

    CLI Command Reference 5-149 Example 5.29.4 show Policy Object (PO) Context Shows Policy Object details. Syntax show Display context specific attributes show ce Display Classifiers show cg Display Classification Group show np Display Network Policy information show po Display Policy Object information Parameters None.
  • Page 246: Policy Object Instance

    5-150 WS 5000 Series System Reference 5.30 Policy Object Instance Table 5.33 summarizes the commands within this context. Common commands between multiple contexts are described in further detail in the Common Commands section. Table 5.33 Policy Object Instance Context Command Summary Commands Brief Description Ref.
  • Page 247: Show

    CLI Command Reference 5-151 attribute Description Syntax priority Sets the ToS packet marking bits for packets set tos <bits> <cg_name> marked with the named Classification Group. The bits value is the packet marking/ToS given as a 6-bit bit-field. For example: 101101 Example WS5000.(Cfg).PO.[Inbound]>...
  • Page 248 5-152 WS 5000 Series System Reference Syntax show Display context specific attributes show ce Display Classifiers show cg Display Classification Group show np Display Network Policy information show po Display Policy Object information Parameters None. Example WS5000.(Cfg).PO.[Inbound]> show Policy Object information..Network Policy Name : Inbound Description...
  • Page 249: Radius Context

    CLI Command Reference 5-153 5.31 RADIUS Context The RADIUS server is always remote; the wireless switch doesn’t provide an on-board instance. You can’t configure the RADIUS server through the tools provided by the wireless switch. Most importantly, while you can identify the RADIUS server that you want the switch to use, this affection will be for naught unless the RADIUS server has added the switch to itself as a client.
  • Page 250: Set Primary

    5-154 WS 5000 Series System Reference 5.31.2 set primary RADIUS Context Sets the identity or parameter value of the primary RADIUS server. Syntax set <primary | secondary> <attribute> <value> Parameters attribute value Description host name | IP [port] [timeout] [retry] Identifies the RADIUS server by name or IP address.
  • Page 251: Show

    CLI Command Reference 5-155 5.31.4 show RADIUS Context Display the WS5000’s RADIUS settings. Syntax show Display context specific attributes show radius-server Display RADIUS information Parameters None. Example WS5000.(Cfg).RADIUS> show RADIUS authentication status: ----------------------------- Network users (Web, Telnet, etc.) : Enable Local users (via serial port) : Enable Authenticate locally if RADIUS server refuses access...
  • Page 252: Security Policy Context

    5-156 WS 5000 Series System Reference 5.32 Security Policy Context Table 5.35 summarizes the commands within this context. Common commands between multiple contexts are described in further detail in the Common Commands section. Table 5.35 Security Policy Context Command Summary Commands Brief Description Ref.
  • Page 253: Policy

    CLI Command Reference 5-157 EAP PreAuthentication : Enabled Opportunistic PMK Caching : Enabled Encryption Open KeyGuard-MCM TKIP AES CCMP ---------- ---- ------------ ---- -------- Status: Enable Disable Disable Disable Disable Authentication Pre-Shared Kerberos 802.1x,EAP with Radius -------------- ---------- -------- ---------------------- Status: Disable Disable...
  • Page 254: Show

    5-158 WS 5000 Series System Reference Parameters The name of the new Security Policy. name Example WS5000.(Cfg).SecurityPolicy> remove NewKerberosPolicy Removing Security Policy... Status: Success. Available Security Policies: 1. Kerberos Default. 2. Default. 3. WEP40 Default. 4. WEP128 Default. 5. New WEP Security Policy. WS5000.(Cfg).SecurityPolicy>...
  • Page 255: Security Policy Instance

    Open – No encryption; any unsecured Mobile Unit is allowed to associate with the system unless the adoption list specifically excludes it. • KeyGuard encryption for TKIP (Temporal Key Integrity Protocol) – This mode is only supported by Symbol mobile devices. KeyGuard requires a 128-bit WEP key. •...
  • Page 256: Set

    5-160 WS 5000 Series System Reference 5.33.1 set Security Policy Instance Sets an attribute of the Security policy instance. The tables, below, divide the settings into topical groups. Syntax set <attribute> <value(s)> Parameters attribute Description Syntax General Settings description Adds a description string to the Security policy instance. set description <text_string>...
  • Page 257 CLI Command Reference 5-161 attribute Description Syntax Kerberos Settings kerberos Sets the active WEP key string, identified by key index. set kerberos <key_index> Valid key_index values are [0, 3]. wepKey Sets the WEP key string for the given key index. Valid set wepKey <key_index>...
  • Page 258 5-162 WS 5000 Series System Reference set eap set radius set groupkeyupdate set presharedkey set preauthentication set opppmkcaching ERROR: Command 'set' cancelled due to invalid or unrecognized parameter. WS5000.(Cfg).SecurityPolicy.[New WEP Security Policy]> set wepkey Enter the WEP Key number or keyword 'string' to generate the Keys. Enter 'default' to set the WEP Keys to default values.
  • Page 259 CLI Command Reference 5-163 Syntax: set eap quietperiod <period: 1-99> [CR] Incomplete command... use '?' for help..exiting... WS5000.(Cfg).SecurityPolicy.[New WEP Security Policy]> set eap txperiod Enter the value for EAP txperiod. Syntax: set eap txperiod <period: 1-99> [CR] Incomplete command... use '?' for help..exiting... WS5000.(Cfg).SecurityPolicy.[New WEP Security Policy]>...
  • Page 260: Show

    5-164 WS 5000 Series System Reference Incomplete command... use '?' for help..exiting... WS5000.(Cfg).SecurityPolicy.[New WEP Security Policy]> set opppmkcaching Enter 'enable' or disable' Syntax: set opppmkcaching <enable/disable> [CR] Incomplete command... use '?' for help..exiting... WS5000.(Cfg).SecurityPolicy.[New WEP Security Policy]> 5.33.2 show Security Policy Instance Display the attributes of this Security policy instance.
  • Page 261: Snmp Context

    CLI Command Reference 5-165 5.34 SNMP Context The SNMP context provides commands that configure the SNMP system and that control the activity of the SNMP daemon. Table 5.37 summarizes the commands within this context. Common commands between multiple contexts are described in further detail in the Common Commands section.
  • Page 262: Disable

    5-166 WS 5000 Series System Reference ------------- SNMP (deamon) Status : Enabled SNMP Traps : Disabled WS5000.(Cfg).SNMP> 5.34.2 disable SNMP Context Starts and stops the SNMP daemon. Syntax disable Parameters None. Syntax WS5000.(Cfg).SNMP> disable Disabling... Status : Success. SNMP details: ------------- SNMP (deamon) Status : Disabled...
  • Page 263: Remove Traphost

    CLI Command Reference 5-167 WS5000.(Cfg).SNMP> remove ro client_ip is required parameter Syntax: remove ro <client_ip> Incomplete command... use '?' for help..exiting... WS5000.(Cfg).SNMP> remove rw client_ip is required parameter Syntax: remove rw <client_ip> Incomplete command... use '?' for help..exiting... WS5000.(Cfg).SNMP>...
  • Page 264: Set Snmptrap

    5-168 WS 5000 Series System Reference Status : Success. Configuration Access restriction details: Telnet access (CLI) : Disable. System access via SNMP : Enable. KDC configuration over remote console : Enable. KDC configuration through SNMP : Enable. WS5000.(Cfg).SNMP> 5.34.6 set snmpTrap SNMP Context Allows or disallows SNMP traps.
  • Page 265: Set Client

    CLI Command Reference 5-169 port_no Optional port number to which traps are sent. The default is 162. Example WS5000.(Cfg).SNMP> set traphost enable ERROR: Invalid IP address Syntax: set traphost <ip_address> <community_name> [port] ERROR: Command 'set' cancelled due to invalid or unrecognized parameter. WS5000.(Cfg).SNMP>...
  • Page 266 5-170 WS 5000 Series System Reference None. Example WS5000.(Cfg).SNMP> show SNMP details: ------------- SNMP (deamon) Status : Enabled SNMP Traps : Enabled WS5000.(Cfg).SNMP> show configaccess Configuration Access restriction details: Telnet access (CLI) : Disable. System access via SNMP : Enable. KDC configuration over remote console : Enable.
  • Page 267: Ssh (Secure Shell) Context

    CLI Command Reference 5-171 5.35 SSH (Secure Shell) Context The SSH context lets you configure the WS5000’s Secure Shell daemon. EditorNote: to edit below Table 5.19 summarizes the commands within this context. Common commands between multiple contexts are described in further detail in the Common Commands section.
  • Page 268 5-172 WS 5000 Series System Reference Syntax show <attribute> <value> Parameters (none) Display SSH configuration and session information. telnet Display telnet configuration and session information. See 5.41 Telnet Context on page Display SSH configuration and session information. Example WS5000.(Cfg).SSH> show WS5000.(Cfg).SSH>...
  • Page 269: Ssl (Secure Socket Layer) Context

    5.36 SSL (Secure Socket Layer) Context The SSL context defines the protocol (http or https) that a client needs to access the WS5000 Series Switch applet, or graphical user interface. With SSL enabled, the applet can only be accessed through the (secure) https protocol;...
  • Page 270: Revert Certificate

    5-174 WS 5000 Series System Reference Syntax disable Parameters None. Example WS5000.(Cfg).SSL> disable 5.36.3 revert certificate SSL (Secure Socket Layer) Context Tells the Web server to use the currently installed authentication certificate. You use this command after uploading a new certificate. Until the certificate is reverted, clients will not be able to establish new connections to the applet.
  • Page 271 CLI Command Reference 5-175 5.37 Standby Context The Standby context lets you configure the failover system (aka “Standby” or “warm Standby”). You need two switches to implement the failover system: The “Primary” switch handles all network traffic; the Standby switch takes over if the Primary switch goes down. After the Primary comes back up, it can automatically take over active duty, or you can configure the switch so that it waits to be re-activated manually.
  • Page 272: Standby Context

    5-176 WS 5000 Series System Reference 5.37.1 enable Standby Context Adds the switch to the Standby system. Syntax enable Parameters None. Example WS5000.(Cfg).standby> enable 5.37.2 disable Standby Context Removes the switch from the Standby system. Syntax disable Parameters None. Example WS5000.(Cfg).standby>...
  • Page 273: Set Ardelay

    CLI Command Reference 5-177 5.37.4 set arDelay Standby Context Enables or disables the (sending of the) heartbeat on a particular NIC by setting an auto-revert delay, in minutes. Note You must call disable before calling this command. Syntax set arDelay <delay> Parameters delay The delay time, in minutes.
  • Page 274: Set Mode

    5-178 WS 5000 Series System Reference Parameters port Either the MAC address of the port, or auto for automatic discovery. The local NIC through which the heartbeat is sent. Either Example WS5000.(Cfg).standby> set mac auto 1 5.37.7 set mode Standby Context Set the mode that the switch should be running in (that is primary, standby, etc.).
  • Page 275 CLI Command Reference 5-179 None. Example WS5000.(Cfg).StandBy> show Standby Management: StandBy mode : Primary Standby Status : Disable State : Startup Failover Reason Standby Connectivity status : Not Connected Standby AutoRevert Mode : Disable Standby AutoRevert Delay : 15 Minutes Interface (Ethernet) 1 ---------------------- StandBy Heart-Beat MAC...
  • Page 276: Switch Policy (Spolicy) Context

    5-180 WS 5000 Series System Reference 5.38 Switch Policy (SPolicy) Context A Switch Policy acts as a container for all the other policies. Although you can define any number of Switch Policies, only one of them can be active at a time. The WS5000 lets you designate an “Emergency Switch Policy”...
  • Page 277: Policy

    CLI Command Reference 5-181 Active Switch Policy name: Default Wireless Switch Policy Available Switch Policies: 1. Default Wireless Switch Policy. 2. EmerPolicy2-10. 3. new_policy. Switch Policy details --------------------- Policy Name : new_policy Description Country : US Channel for .11a : Auto (once) Channel for .11b : Auto (once) Channel for .11g...
  • Page 278: Remove

    5-182 WS 5000 Series System Reference Include Adoption List details : List is Empty. Exclude Adoption List details : List is Empty. Default Adoption action for .11a : Adopt .11a with APPolicy appol1 Default Adoption action for .11b : Adopt .11b with APPolicy appol1 Default Adoption action for FH : Deny.
  • Page 279 CLI Command Reference 5-183 Parameters component Description none Display information about this Switch Policy instance. channelInfo Display a list of country codes and the channels each country supports. interfaces Display a list of Access Port instances and lists the available Ethernet ports. Example WS5000.(Cfg).SPolicy>...
  • Page 280 5-184 WS 5000 Series System Reference A Ch: 36,40,44,48,52,56,60,64,149,153,11 Austria B Ch: 1-13 G Ch: 1-13 FH Ch: 2-80 A Ch: 36,40,44,48,52,56,60,64,100,104,10 Bahrain B Ch: 1-13 G Ch: 1-13 FH Ch: 2-80 A Ch: Belarus B Ch: 1-13 G Ch: 1-13 FH Ch: 2-80 A Ch: Belgium...
  • Page 281: Switch Policy Instance

    CLI Command Reference 5-185 5.39 Switch Policy Instance Table 5.42 summarizes the commands within this context. Common commands between multiple contexts are described in further detail in the Common Commands section. Table 5.42 Switch Policy Instance Context Command Summary Commands Brief Description Ref.
  • Page 282: Edit

    5-186 WS 5000 Series System Reference Channel for .11a : Auto (once) Channel for .11b : Auto (once) Channel for .11g : Auto (once) Power Level for .11a : 20 dBm Power Level for .11b : 20 dBm Power Level for .11g : 20 dBm Active EtherPolicy Name : Default Ethernet Policy...
  • Page 283: Restrictedchannel

    CLI Command Reference 5-187 Parameters new_name New name to set or change the switch policy name to. Example WS5000.(Cfg).SPolicy.[Default Wireless Switch Policy]> name newname Configuring name... Status : Success. WS5000.(Cfg).SPolicy.[newname]> 5.39.4 restrictedchannel Switch Policy Instance Changes the prompt to the Restricted Channel context, where channels that cannot be chosen by Automatic Channel Selection for a particular radio type can be specified.
  • Page 284: Set

    5-188 WS 5000 Series System Reference Syntax set adoptionList <radio> include <start_MAC> [<end_MAC>] <app_name | remove> set adoptionList <radio> exclude <start_MAC> [<end_MAC>] [remove] set adoptionList <radio> default allow <app_name> set adoptionList <radio> default deny [traps <enable | disable>] Parameters radio The radio type that this list applies to.
  • Page 285: Show

    CLI Command Reference 5-189 attribute and value Description dsCoexistence <enable_flag> Frequence hopping/direct sequence (FH/DS) coexistence. With coexistence enabled, the access port divides the frequency spectrum such that FH devices use one portion, and DS devices use the other. Possible values are: enable or disable.
  • Page 286 5-190 WS 5000 Series System Reference Power Level for .11a : 20 dBm Power Level for .11b : 20 dBm Power Level for .11g : 20 dBm Active EtherPolicy Name : Default Ethernet Policy # of APPolicies attached List of APPolicies attached 1.
  • Page 287: Restricted Channel Instance

    CLI Command Reference 5-191 5.40 Restricted Channel Instance Restricted Channel is a subcontext of a Switch Policy instance. There are three Restricted Channel instances, one for each of the three 802.11x radio types. You drop into an instance by invoking restrictedchannel command from a Switch Policy instance.
  • Page 288: Remove

    5-192 WS 5000 Series System Reference 5.40.2 remove Restricted Channel Instance Remove a channel from the list of restricted channels, thus making it available for use during Automatic Channel Selection. Syntax remove <channel_num> Parameters channel_num The channel that you want to “unrestrict”. The set of valid channel numbers depends on the country setting and radio type.
  • Page 289: Telnet Context

    CLI Command Reference 5-193 5.41 Telnet Context You can use telnet to access the CLI and/or to configure the on-board KDC. The Telnet context provides commands to configure (allow and disallow) telnet access. Table 5.44 summarizes the commands within this context. Common commands between multiple contexts are described in further detail in the Common Commands section.
  • Page 290: Disable

    5-194 WS 5000 Series System Reference 5.41.2 disable Telnet Context Disable the port/service on the switch to allow for Telnet configuration via the CLI. Syntax disable Parameters None. Example WS5000.(Cfg).Telnet> disable WARNING: This will disable all remote (CLI) access to the switch. Do you want to continue (yes/no)? : n WS5000.(Cfg).Telnet>...
  • Page 291: Show

    CLI Command Reference 5-195 5.41.4 show Telnet Context Display Telnet-related details based on the attribute used with the command. Syntax show show <attribute> Parameters attribute Description (none) Display statistics about the current telnet session. configAccess Display the permissibility of configuring the system and the KDC through telnet and SNMP.
  • Page 292: User Context

    5-196 WS 5000 Series System Reference 5.42 User Context The user context is where users privileges are specified for particular users of the system. Users are added, removed, and configured via the User Context. Privileges that a specific user can have are categorized as follows: •...
  • Page 293: Add

    CLI Command Reference 5-197 5.42.1 add User Context Adds a new user to the switch. You are prompted to provide and then confirm the new user’s password. Syntax add <user_name> Parameters user_name The name (login) of the new user. The name can be 6 to 20 characters long. Example WS5000.(Cfg).User>...
  • Page 294: User

    5-198 WS 5000 Series System Reference 2. techsupport. WS5000.(Cfg).User> 5.42.3 user User Context Select a user to configure and drop into specified user instance context. Syntax user <user_name> Parameters user_name The user name of the user to be configured. Example WS5000.(Cfg).User>...
  • Page 295 CLI Command Reference 5-199 Policy Administration : true SNMP Administration : true Security Administration : true System Administration : true WS5000.(Cfg).User>...
  • Page 296: User Instance

    5-200 WS 5000 Series System Reference 5.43 User Instance Table 5.46 summarizes the commands within this context. Common commands between multiple contexts are described in further detail in the Common Commands section. Table 5.46 User Instance Context Command Summary Commands Brief Description Ref.
  • Page 297: Allow

    CLI Command Reference 5-201 5.43.1 allow User Instance Sets the list of subsystems that the user is allowed to configure. Syntax allow <subsystem1> [<subsystem2>] [...] Parameters subsystemN The subsystem that the user is allowed to configure. One or more of the following possible values: •...
  • Page 298: Show

    5-202 WS 5000 Series System Reference Syntax password Parameters None. Example WS5000.(Cfg).User.[admin]> password Creating the Event list... Enter new password : ****** Confirm new password : ****** Changing user password... done. WS5000.(Cfg).User.[admin]> 5.43.4 show User Instance Show the details of the user instance. Syntax show Parameters...
  • Page 299: Wlan Context

    CLI Command Reference 5-203 5.44 WLAN Context Table 5.47 summarizes the commands within this context. Common commands between multiple contexts are described in further detail in the Common Commands section. Table 5.47 WLAN Context Command Summary Commands Brief Description Ref. ..
  • Page 300: Add

    The name to be given to the WLAN (instance). Example WS5000.(Cfg).WLAN> add EastCoastWLAN 124 Adding WLAN... Status: Success. WLAN Name ESSID Security Policy --------- ----- --------------- Symbol Default Default Symbol Default Default Private Access private WEP128 Default Public Access public Default WLAN_NE...
  • Page 301: Show

    Otherwise, with no parameter, a summary list of all WLAN instances is shown. Example WS5000.(Cfg).WLAN> show WLAN Name ESSID Security Policy --------- ----- --------------- Symbol Default Default Secure Access secure Kerberos Default Private Access private WEP128 Default Public Access public Default WS5000.(Cfg).WLAN>...
  • Page 302 5-206 WS 5000 Series System Reference Parameters name The name of the WLAN instance. Example WS5000.(Cfg).WLAN> wlan "Secure Access" WLAN details... Name : Secure Access ESSID # : secure Description : Default WLAN Security Policy : Kerberos Default WLAN Auth. Status : Not-Authenticated ACL Status : Disabled...
  • Page 303: Wlan Instance

    WLAN Instance Set description text. Syntax description <description_text> Parameters description_text String of text that briefly describes the WLAN instance. Example WS5000.(Cfg).WLAN.[Symbol Default]> description “Sample description text” Adding description... Status : Success. WLAN details... Name : Symbol Default ESSID # : 101...
  • Page 304: Name

    : MU to MU Allow Maximum MUs allowed : 4096 Current MUs Default Route : 0.0.0.0 Network Mask : 0.0.0.0 WS5000.(Cfg).WLAN.[Symbol Default]> 5.45.2 name WLAN Instance Changes the name of the WLAN instance. Syntax name <new_name> Parameters new_name The new name of the WLAN instance.
  • Page 305: Show

    Display ACL information show securitypolicy Display security policy details show wlan Display WLAN details Parameters None. Example WS5000.(Cfg).WLAN.[Symbol Default]> show WLAN details... Name : Symbol Default ESSID # : 101 Description : Sample description text Security Policy : Default WLAN Auth.
  • Page 306 5-210 WS 5000 Series System Reference...
  • Page 307 Use this table to determine the correct power settings for International use when using external antennas with the AP 100 802.11b Access Port, Model CCRF-5020-10-WW. Note For US (FCC), all Symbol Technologies, certified antennas can be used on the maximum power level setting.
  • Page 308 WS5000 Series Switch System Reference AP 100 802.11b Access Port Table 6.1 International Antenna and Power Settings for (Continued) Antenna Model Max Power Setting Antenna Type Comments ML-2499-PNAHD-01 Heavy-duty Indoor/Outdoor ° H-Plane Directional Panel ° ML-2499-7PNA2-01 Indoor/Outdoor 65 H-Plane Diversity Directional Panel...
  • Page 309 Antennas and Power for The AP 200 802.11a/b Access Port Table 6.2 European Union and Japanese Antenna and Power Settings (Contin- Additional Cable Length in Feet Antenna Model Antenna Type/Pattern Max Authorized Power Settings ML-2499-7PNA2-01 Panel Directional ML-2499-BMMA1-01 Hi-gain in/outdoor Dipole Omni- Directional ML-2499-SD3-01 Patch Omni-Directional...
  • Page 310 Model CCRF-5030-100-WW (external antenna 802.11a radio only), CCRF-5030-200-WW (external antenna 802.11a/b radio), CCRF-5030-210-WW. Note All Symbol Technologies certified antennas can be used on the maximum power level setting.) Table 6.4 United States Antenna and Power Settings for the AP 200 802.11a/b Access Port...
  • Page 311 Antennas and Power Table 6.4 United States Antenna and Power Settings for the AP 200 802.11a/b Access Port (Continued) Additional Cable Length in Feet Antenna Model Antenna Type/Pattern Max Authorized Power Settings ML-2499-PNAHD-01 Hi-gain in/outdoor Panel Directional 3, 4, 3, 4, 3, 4, 3, 4, 3, 4,...
  • Page 312 WS5000 Series Switch System Reference...
  • Page 314 Symbol Technologies, Inc. One Symbol Plaza Holtsville, New York 11742-1300 http://www.symbol.com 72E-71559-01 Revision A March 2005...

Table of Contents