EliteConnect SMCE21011 User Guide April 2009 20 Mason Pub. # XXXXXXXXXXX Irvine, CA 92618 E042009-DT-R01 Phone: (949) 679-8000...
Page 3
Information furnished by SMC Networks, Inc. (SMC) is believed to be accurate and reliable. However, no responsibility is assumed by SMC for its use, nor for any infringements of patents or other rights of third parties which may result from its use. No license is granted by implication or otherwise under any patent or patent rights of SMC.
IMITED ARRANTY Limited Warranty Statement: SMC Networks, Inc. (“SMC”) warrants its products to be free from defects in workmanship and materials, under normal use and service, for the applicable warranty term. All SMC products carry a standard 90-day limited warranty from the date of purchase from SMC or its Authorized Reseller.
Page 5
SMC price list. Under the limited lifetime warranty, internal and external power supplies, fans, and cables are covered by a standard one-year warranty from date of purchase. SMC Networks, Inc. 20 Mason Irvine, CA 92618 – 5 –...
OMPLIANCES EDERAL OMMUNICATION OMMISSION NTERFERENCE TATEMENT This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation.
Page 8
BOUT UIDE IMPORTANT NOTE: FCC R ADIATION XPOSURE TATEMENT This equipment complies with FCC radiation exposure limits set forth for an uncontrolled environment. This equipment should be installed and operated with minimum distance 20 cm between the radiator & your body. IC S TATEMENT This Class B digital apparatus complies with Canadian ICES-003.
Page 9
BOUT UIDE AS/NZS 4771 USTRALIA EALAND ACN 066 352010 VCCI C APAN LASS AIWAN 根據交通部低功率管理辦法規定: 第十二條 經型式認證合格之低功率射頻電機,非經許可,公司、商號或使用者均不得擅自變更 頻率、加大功率或變更原設計之特性及功能。 第十四條 低功率射頻電機之使用不得影響飛航安全及干擾合法通信;經發現有干擾現象時,應 立即停用,並改善至無干擾時方得繼續使用。前項合法通信,指依電信法規定作業之無線電通 信。低功率射頻電機須忍受合法通信或工業、科學及醫療用電波輻射性電機設備之干擾。 EC C ONFORMANCE ECLARATION Marking by the above symbol indicates compliance with the Essential Requirements of the R&TTE Directive of the European Union (1999/5/EC). This equipment meets the following conformance standards: EN 60950-1 (IEC 60950-1) - Product Safety ◆...
Page 10
BOUT UIDE In Italy the end-user must apply for a license from the national ◆ spectrum authority to operate this device outdoors. In Belgium outdoor operation is only permitted using the 2.46 - 2.4835 ◆ GHz band: Channel 13. In France outdoor operation is only permitted using the 2.4 - 2.454 GHz ◆...
Page 11
BOUT UIDE In Italy the end-user must apply for a license from the national ◆ spectrum authority to operate this device outdoors. In Belgium outdoor operation is only permitted using the 2.46 - ◆ 2.4835 GHz band: Channel 13. In France outdoor operation is only permitted using the 2.4 - 2.454 ◆...
Page 12
BOUT UIDE Swedish Härmed intygar SMC att denna Radio LAN device står I överensstämmelse med de väsentliga egenskapskrav och övriga relevanta bestämmelser som framgår av direktiv Svenska 1999/5/EG. Danish Undertegnede SMC erklærer herved, at følgende udstyr Radio LAN device overholder de væsentlige krav og øvrige relevante krav i direktiv 1999/5/EF Dansk German...
BOUT UIDE This guide gives specific information on how to install the 11n wireless URPOSE access point and its physical and performance related characteristics. It also gives information on how to operate and use the management functions of the access point. This guide is intended for use by network administrators who are UDIENCE responsible for installing, operating, and maintaining network equipment;...
ONTENTS IMITED ARRANTY OMPLIANCES BOUT UIDE ONTENTS IGURES ABLES CLI C NDEX OF OMMANDS ECTION ETTING TARTED NTRODUCTION Key Hardware Features Description of Capabilities Package Contents Hardware Description Antennas External Antenna Connector LED Indicators Console Port Ethernet Port Power Connector Reset Button ETWORK OPOLOGIES...
Page 15
ONTENTS NSTALLING THE ACCESS POINT Location Selection Mounting on a Horizontal Surface Mounting on a Wall Connecting and Powering On NITIAL ONFIGURATION Connecting to the Login Page Home Page and Main Menu Common Web Page Buttons Quick Start Step 1 Step 2 Step 3 Main Menu Items...
Page 16
ONTENTS SNMP Basic Settings SNMP Trap Settings View Access Control Model SNMPv3 Users SNMPv3 Targets SNMPv3 Notification Filters DVANCED ETTINGS Local Bridge Filter Link Layer Discovery Protocol Access Control Lists Source Address Settings Destination Address Settings Ethernet Type IRELESS ETTINGS Spanning Tree Protocol (STP) Bridge Ethernet Interface...
Page 17
ONTENTS AP System Configuration AP Wireless Configuration Station Status System Logs ECTION OMMAND NTERFACE 11 U SING THE OMMAND NTERFACE Console Connection Telnet Connection Entering Commands Keywords and Arguments Minimum Abbreviation Command Completion Getting Help on Commands Showing Commands Negating the Effect of Commands Using Command History Understanding Command Modes Exec Commands...
Page 18
ONTENTS 21 MAC A DDRESS UTHENTICATION OMMANDS 22 F ILTERING OMMANDS 23 S PANNING OMMANDS 24 WDS B RIDGE OMMANDS 25 E THERNET NTERFACE OMMANDS 26 W IRELESS NTERFACE OMMANDS 27 W IRELESS ECURITY OMMANDS 28 L AYER ISCOVERY OMMANDS 29 VLAN C OMMANDS 30 WMM C...
ABLES Table 1: Key Hardware Features Table 2: LED Behavior Table 3: RADIUS Attributes Table 4: Logging Levels Table 5: WMM Access Categories Table 6: Command Modes Table 7: Keystroke Commands Table 8: General Commands Table 9: System Management Commands Table 10: Country Codes Table 11: System Management Commands Table 12: Logging Levels...
Page 22
ABLES Table 32: 10/100BASE-TX MDI and MDI-X Port Pinouts Table 33: 1000BASE-T MDI and MDI-X Port Pinouts Table 34: 10/100BASE-TX MDI and MDI-X Port Pinouts – 22 –...
CLI C NDEX OF OMMANDS 802.1x enable 175 interface wireless 802.1x session-timeout 176 interface-radio-mode 205 address filter default 177 ip address address filter delete ip dhcp 197 address filter entry 178 ip http port a-mpdu ip http server a-msdu ip https port APmgmtIP ip https server APmgmtUI...
Page 24
CLI C NDEX OF OMMANDS show bridge br-conf show bridge forward address show bridge port-conf show bridge status show bridge stp show config show dhcp-relay show dual-image show event-log show filters show hardware 142 show history show interface ethernet show interface wireless show line show lldp show logging 146...
ECTION ETTING TARTED This section provides an overview of the access point, and introduces some basic concepts about wireless networking. It also describes the basic settings required to access the management interface. This section includes these chapters: “Introduction” on page 27 ◆...
NTRODUCTION The EliteConnect SMCE21011 is an IEEE 802.11n access point (AP) that meets draft 2.0 standards. It is fully interoperable with older 802.11a/b/g standards, providing a transparent, wireless high speed data communication between the wired LAN and fixed or mobile devices. The unit includes three detachable dual-band 2.4/5 GHz antennas with the option to attach higher specification external antennas that boost network coverage.
| Introduction HAPTER Package Contents In addition, the access point offers full network management capabilities through an easy to configure web interface, a command line interface for initial configuration and troubleshooting, and support for Simple Network Management tools. The SMCE21011 utilises MIMO technology and Spatial Multiplexing to achieve the highest possible data rate and throughput on the 802.11n frequency.
| Introduction HAPTER Hardware Description ARDWARE ESCRIPTION Figure 1: Top Panel Antennas LED Indicators Figure 2: Rear Panel Reset Button DC Power Port RJ-45 PoE Port – 29 –...
| Introduction HAPTER Hardware Description Figure 3: Ports RJ-45 Console Port DC Power Port RJ-45 PoE Port The access point includes three integrated external MIMO (multiple-input NTENNAS and multiple-output) antennas. MIMO uses multiple antennas for transmitting and receiving radio signals to improve data throughput and link range.
| Introduction HAPTER Hardware Description The access point includes four status LED indicators, as described in the LED I NDICATORS following figure and table. Figure 6: LEDs 802.11 b/g/n Ethernet Power 802.11 a/n Indicator Link/Activity Indicator Table 2: LED Behavior Status Description The 802.11a/n radio is disabled.
| Introduction HAPTER Hardware Description Table 2: LED Behavior (Continued) Status Description POWER Indicates that there is no power or the power source has been disconnected. Flashing Green Indicates that the system is rebooting or has started a reset. Green Indicates that power is being supplied and the system is functioning normally.
| Introduction HAPTER Hardware Description The access point supports both endspan and midspan PoE. If the access point is connected to a PoE source device and also connected to a local power source through the AC power adapter, AC power will be disabled.
ETWORK OPOLOGIES Wireless networks support a standalone configuration as well as an integrated configuration with 10/100/1000 Mbps Ethernet LANs. The SMCE21011 also provides bridging services that can be configured independently on either the 5 GHz or 2.4 GHz radio interfaces. Access points can be deployed to support wireless clients and connect wired LANs in the following configurations: Infrastructure for wireless LANs...
| Network Topologies HAPTER Infrastructure Wireless LAN for Roaming Wireless PCs The infrastructure configuration extends the accessibility of wireless PCs to the wired LAN. A wireless infrastructure can be used for access to a central database, or for connection between mobile workers, as shown in the following figure. Figure 7: Infrastructure Wireless LAN Wired LAN Extension to Wireless Clients...
| Network Topologies HAPTER Infrastructure Wireless Bridge coverage area is created, wireless users within this ESS can roam freely. All wireless network cards and adapters and wireless access points within a specific ESS must be configured with the same SSID. Figure 8: Infrastructure Wireless LAN for Roaming Wireless PCs Seamless Roaming Between Access Points...
NSTALLING THE ACCESS POINT This chapter describes how to install the access point. OCATION ELECTION Choose a proper place for the access point. In general, the best location is at the center of your wireless coverage area, within line of sight of all wireless devices.
| Installing the access point HAPTER Mounting on a Horizontal Surface OUNTING ON A ORIZONTAL URFACE To keep the access point from sliding on the surface, attach the four rubber feet provided in the accessory kit to the marked circles on the bottom of the access point.
| Installing the access point HAPTER Mounting on a Wall OUNTING ON A To mount on a wall follow the instructions below. Figure 11: Wall Mounting Mounting Slots The access point should be mounted only to a wall or wood surface that is at least 1/2-inch plywood or its equivalent.
| Installing the access point HAPTER Connecting and Powering On ONNECTING AND OWERING Connect the power adapter to the access point, and the power cord to an AC power outlet. Otherwise, the access point can derive its operating power directly from the RJ-45 port when connected to a device that provides IEEE 802.3af compliant Power over Ethernet (PoE).
NITIAL ONFIGURATION The SMCE21011 offers a user-friendly web-based management interface for the configuration of all the unit’s features. Any PC directly attached to the unit can access the management interface using a web browser, such as Internet Explorer (version 6.0 or above). ONNECTING TO THE OGIN It is recommended to make initial configuration changes by connecting a...
| Initial Configuration HAPTER Home Page and Main Menu AGE AND After logging in to the web interface, the Home page displays. The Home page shows some basic settings for the AP, including Country Code and the management access password. Figure 13: Home Page The web interface Main Menu menu provides access to all the configuration settings available for the access point.
| Initial Configuration HAPTER Common Web Page Buttons You must set the country code to the country of operation. AUTION Setting the country code restricts operation of the access point to the radio channels and transmit power levels permitted for wireless networks in the specified country.
| Initial Configuration HAPTER Quick Start Logout – Ends the web management session. ◆ Save Config – Saves the current configuration so that it is retained ◆ after a restart. UICK TART The Quick Start menu is designed to help you configure the basic settings required to get the access point up and running.
| Initial Configuration HAPTER Quick Start HANGE ASSWORD Username — The name of the user, non-configurable. ◆ (Default: accton) Old Password — If the unit has been configured with a password ◆ already, enter that password, otherwise enter a null string. New Password —...
Page 48
| Initial Configuration HAPTER Quick Start The following items are displayed on this page: DHCP DHCP Status — Enables/disables DHCP on the access point. (Default: ◆ disabled) ◆ IP Address — Specifies an IP address for management of the access point.
| Initial Configuration HAPTER Quick Start The Step 3 page of the Quick Start configures radio interface settings. Figure 18: Quick Start - Step 3 The following items are displayed on this page: NTERFACE ETTING WiFi Mode — Selects mode of operation of the radio chip from ◆...
ECTION ONFIGURATION This section provides details on configuring the access point using the web browser interface. This section includes these chapters: “System Settings” on page 52 ◆ “Management Settings” on page 65 ◆ “Advanced Settings” on page 76 ◆ ◆ “Wireless Settings”...
YSTEM ETTINGS This chapter describes basic system settings on the access point. It includes the following sections: ◆ “Administration Settings” on page 52 “IP Address” on page 54 ◆ “Radius Settings” on page 55 ◆ “System Time” on page 58 ◆...
| System Settings HAPTER Administration Settings Figure 19: Administration The following items are displayed on this page: System Name — An alias for the access point, enabling the device to ◆ be uniquely identified on the network. (Default: SMC; Range: 1-32 characters) ◆...
| System Settings HAPTER IP Address IP A DDRESS Configuring the access point with an IP address expands your ability to manage the access point. A number of access point features depend on IP addressing to operate. You can use the web browser interface to access IP addressing only if the access point already has an IP address that is reachable through your network.
| System Settings HAPTER Radius Settings DHCP Status — Enables/disables DHCP on the access point. ◆ IP Address — Specifies an IP address for management of the access ◆ point. Valid IP addresses consist of four decimal numbers, 0 to 255, separated by periods.
| System Settings HAPTER Radius Settings A primary RADIUS server must be specified for the access point to RIMARY AND implement IEEE 802.1X network access control and Wi-Fi Protected Access RADIUS ECONDARY (WPA) wireless security. A secondary RADIUS server may also be specified ERVER ETUP as a backup should the primary server fail or become inaccessible.
| System Settings HAPTER Radius Settings Figure 23: RADIUS Settings The following items are displayed on the RADIUS Settings page: RADIUS Status — Enables/disables the primary RADIUS server. ◆ IP Address — Specifies the IP address or host name of the RADIUS ◆...
| System Settings HAPTER System Time The following items are displayed on the RADIUS Settings page: RADIUS A CCOUNTING Account Status — Enables/disables RADIUS accounting. ◆ IP Address — Specifies the IP address or host name of the RADIUS ◆ accounting server.
| System Settings HAPTER System Time Figure 24: SNTP Settings The following items are displayed on this page: Configures the access point to operate as an SNTP client. When enabled, at SNTP S ERVER least one time server IP address must be specified. ETTINGS SNTP Status —...
| System Settings HAPTER SpectraLink Voice Priority The access point provides a way to automatically adjust the system clock AYLIGHT AVING for Daylight Savings Time changes. To use this feature you must define the ETTINGS month and date to begin and to end the change from standard time. During this period the system clock is set back by one hour.
Page 61
| System Settings HAPTER VLAN Configuration The management VLAN is for managing the access point through ◆ remote management tools, such as the web interface, SSH, SNMP, or Telnet. The access point only accepts management traffic that is tagged with the specified management VLAN ID. All wireless clients associated to the access point are assigned to a ◆...
| System Settings HAPTER System Logs Table 3: RADIUS Attributes Number RADIUS Attribute Value Tunnel-Type VLAN (13) Tunnel-Medium-Type Tunnel-Private-Group-ID VLANID (1 to 4094 as hexadecimal or string) VLAN IDs on the RADIUS server can be entered as hexadecimal digits or a string The specific configuration of RADIUS server software is beyond the scope of this guide.
| System Settings HAPTER System Logs Figure 27: System Log Settings The following items are displayed on this page: syslog status — Enables/disables the logging of error messages. ◆ (Default: enabled) Server 1~4 — Enables the sending of log messages to a Syslog server ◆...
| System Settings HAPTER Quick Start Wizard severe (Debug). The message levels that are logged include the specified minimum level up to the Emergency level. Table 4: Logging Levels Error Level Description Emergency System unusable Alerts Immediate action needed Critical Critical conditions (e.g., memory allocation, or free memory error - resource exhausted) Error Error conditions (e.g., invalid input, default used)
ANAGEMENT ETTINGS This chapter describes management access settings on the access point. It includes the following sections: ◆ “Remote Management Settings” on page 65 “Access Limitation” on page 67 ◆ “Simple Network Management Protocol” on page 68 ◆ EMOTE ANAGEMENT ETTINGS The Web, Telnet, and SNMP management interfaces are enabled and open to all IP addresses by default.
| Management Settings HAPTER Remote Management Settings The client and server generate session keys for encrypting and ◆ decrypting data. The client and server establish a secure encrypted connection. ◆ A padlock icon should appear in the status bar for Internet Explorer 5.x. ◆...
| Management Settings HAPTER Access Limitation HTTP Port — Specifies the HTTP port for IP connectivity. (Default: 80; ◆ Range 1024-65535) HTTPS Server — Enables/disables management access from a HTTPS ◆ server. (Default: enabled) HTTPS Port — Specifies the HTTPS port for secure IP connectivity. ◆...
| Management Settings HAPTER Simple Network Management Protocol IP Address — Specifies the IP address. ◆ Subnet Mask — Specifies the subnet mask in the form 255.255.255.x ◆ ESTRICT ANAGEMENT Enable/Disable — Enables/disables management of the device by a ◆ wireless client.
| Management Settings HAPTER Simple Network Management Protocol Figure 30: SNMP Basic Settings The following items are displayed on this page: SNMP — Enables or disables SNMP management access and also ◆ enables the access point to send SNMP traps (notifications). (Default: Disable) System Location —...
| Management Settings HAPTER Simple Network Management Protocol Traps indicating status changes are issued by the AP to specified trap SNMP T ETTINGS managers. You must specify trap managers so that key events are reported by the AP to your management station (using network management platforms).
| Management Settings HAPTER Simple Network Management Protocol affect. Clicking ‘OK’ returns to the home page. Changes will not be saved upon a reboot unless the running configuration file is saved. To configure SNMPv3 management access to the AP, follow these steps: CCESS ONTROL ODEL...
Page 72
| Management Settings HAPTER Simple Network Management Protocol Mask (option) – A hexadecimal value with each bit masking the ◆ corresponding ID in the MIB subtree. A “1” in the mask indicates an exact match and a “0” indicates a “wild card.” For example, a mask value of 0xFFBF provides a bit mask “1111 1111 1011 1111.”...
| Management Settings HAPTER Simple Network Management Protocol The access point allows up to 10 SNMP v3 users to be configured. Each SNMP SERS SNMPv3 user is defined by a unique name. Users must be configured with a specific security level and assigned to a group. The SNMPv3 group restricts users to a specific read, write, or notify view.
| Management Settings HAPTER Simple Network Management Protocol An SNMP v3 notification Target ID is specified by the SNMP v3 user, IP SNMP ARGETS address, and UDP port. A user-defined filter can also be assigned to specific targets to limit the notifications received to specific MIB objects. (Note that the filter must first be configured.
| Management Settings HAPTER Simple Network Management Protocol Figure 35: SNMP Notification Filter The following items are displayed on this page: Filter ID — A user-defined name that identifies the filter. (Maximum ◆ length: 32 characters) Subtree — Specifies MIB subtree to be filtered. The MIB subtree must ◆...
DVANCED ETTINGS This chapter describes advanced settings on the access point. It includes the following sections: ◆ “Local Bridge Filter” on page 76 “Link Layer Discovery Protocol” on page 77 ◆ “Access Control Lists” on page 78 ◆ OCAL RIDGE ILTER The access point can employ network traffic frame filtering to control access to network resources and increase security.
| Advanced Settings HAPTER Link Layer Discovery Protocol Prevent Intra VAP client communication — When enabled, clients ◆ associated with a specific VAP interface cannot establish wireless communications with each other. Clients can communicate with clients associated to other VAP interfaces. Prevent Inter and Intra VAP client communication —...
| Advanced Settings HAPTER Access Control Lists Message Transmission Hold Time — Configures the time-to-live ◆ (TTL) value sent in LLDP advertisements as shown in the formula below. (Range: 2-10; Default: 4) The time-to-live tells the receiving LLDP agent how long to retain all information pertaining to the sending LLDP agent if it does not transmit updates in a timely manner.
| Advanced Settings HAPTER Access Control Lists Figure 38: Source ACLs The following items are displayed on this page: ◆ SA Status — Enables network traffic with specific source MAC addresses to be filtered (dropped) from the access point. MAC Address — Specifies a source MAC address to filter, in the form ◆...
| Advanced Settings HAPTER Access Control Lists The following items are displayed on this page: DA Status — Enables/disables the destination address to be filtered. ◆ MAC Address — Specifies a destination MAC address to filter, in the ◆ form xx.xx.xx.xx.xx.xx. Action —...
| Advanced Settings HAPTER Access Control Lists Figure 40: Ethernet Type Filter The following items are displayed on this page: Disabled — Access point does not filter Ethernet protocol types. ◆ ◆ Enabled — Access point filters Ethernet protocol types based on the configuration of protocol types in the filter table.
IRELESS ETTINGS This chapter describes wireless settings on the access point. It includes the following sections: ◆ “Spanning Tree Protocol (STP)” on page 82 “Authentication” on page 85 ◆ “Radio Settings” on page 89 ◆ “Virtual Access Points (VAPs)” on page 93 ◆...
| Wireless Settings HAPTER Spanning Tree Protocol (STP) Figure 41: Spanning Tree Protocol Sets STP bridge link parameters. RIDGE The following items are displayed on the STP page: Spanning Tree Protcol — Enables/disables STP on the wireless ◆ bridge. (Default: Enabled) Priority —...
| Wireless Settings HAPTER Spanning Tree Protocol (STP) numeric values indicate higher priority.) (Default:32768; Range: 0-65535) Max Age — The maximum time (in seconds) a device can wait without ◆ receiving a configuration message before attempting to reconfigure. All device ports (except for designated ports) should receive configuration messages at regular intervals.
| Wireless Settings HAPTER Authentication Sets STP settings for the radio interface. IRELESS NTERFACE Index — Describes the VAP in question. ◆ Link Path Cost — This parameter is used by the STP to determine the ◆ best path between devices. Therefore, lower values should be assigned to ports attached to faster media, and higher values assigned to ports with slower media.
| Wireless Settings HAPTER Authentication Figure 42: Local Authentication The following items are displayed on Authentication page: MAC Authentication — Selects between, disabled, Local MAC authentication and RADIUS authentication. Local MAC — The MAC address of the associating station is compared ◆...
| Wireless Settings HAPTER Authentication Add/Delete: Adds or deletes the specified MAC address and ■ permission setting into or from the local database. Permission: Select Allow to permit access or Deny to block access. ■ If Delete is selected, the specified MAC address entry is removed from the database.
| Wireless Settings HAPTER Interface Mode make MAC authentication take effect — Applies the specified ◆ settings. NTERFACE The access point can operate in two modes, IEEE 802.11a/n only, or 802.11g/n only. Also note that 802.11g is backward compatible with 802.11b.
| Wireless Settings HAPTER Radio Settings ADIO ETTINGS The IEEE 802.11n interfaces include configuration options for radio signal characteristics and wireless security features. The access point can operate in two modes, mixed 802.11g/n, or mixed 802.11a/n only. Also note that 802.11g is backward compatible with 802.11b, and 802.11n is backward compatible with both 802.11b/g and 802.11a at slower data transmit rates.
| Wireless Settings HAPTER Radio Settings Figure 45: Radio Settings The following items are displayed on this page: High Throughput Mode — The access point provides a channel ◆ bandwidth of 20 MHz by default giving an 802.11g connection speed of 54 Mbps and a 802.11n connection speed of up to 108 Mbps, and ensures backward compliance for slower 802.11b devices.
Page 91
| Wireless Settings HAPTER Radio Settings using channels 1, 6, 11. Note that wireless clients automatically set the channel to the same as that used by the access point to which it is linked. (The supported channels are dependent on the country code setting.) Auto Channel Select —...
Page 92
| Wireless Settings HAPTER Radio Settings broadcast/multicast frames in a more timely manner, causing stations in Power Save mode to wake up more often and drain power faster. Using higher DTIM values reduces the power used by stations in Power Save mode, but delays the transmission of broadcast/multicast frames.
| Wireless Settings HAPTER Virtual Access Points (VAPs) (VAP IRTUAL CCESS OINTS The access point supports up to eight virtual access point (VAP) interfaces numbered 0 to 7. Each VAP functions as a separate access point, and can be configured with its own Service Set Identification (SSID) and security settings.
| Wireless Settings HAPTER Virtual Access Points (VAPs) Edit Setting — CLicking “Edit” opens the dialogue box for configuring ◆ the selected VAP. Sets the basic operating mode and other settings for the VAP. VAP B ASIC ETTINGS Each VAP can operate in one of three modes; normal AP mode, WDS-AP bridge root mode, or WDS-STA bridge station mode.
| Wireless Settings HAPTER Virtual Access Points (VAPs) Authentication Timeout Interval — The time within which the client ◆ should finish authentication before authentication times out. (Range: 5-60 minutes; Default: 60 minutes) Default VLAN ID — The VLAN ID assigned to wireless clients ◆...
| Wireless Settings HAPTER Virtual Access Points (VAPs) Figure 49: Configuring VAPs - Common Settings The following items are common to all three modes: Association Mode — Defines the mode with which the access point ◆ will associate with other clients. Open System: The VAP is configured by default as an “open ■...
| Wireless Settings HAPTER Virtual Access Points (VAPs) WPA-WPA2 Mixed: Clients using WPA or WPA2 are accepted for ■ authentication. WPA-WPA2-PSK-mixed: Clients using WPA or WPA2 with a Pre- ■ shared Key are accepted for authentication. Encryption Method — Selects an encryption method for the global ◆...
| Wireless Settings HAPTER Virtual Access Points (VAPs) Setting up shared keys enables the basic IEEE 802.11 Wired Equivalent Privacy (WEP) on the access point to prevent unauthorized access to the network. If you choose to use WEP shared keys instead of an open system, be sure to define at least one static WEP key for user authentication and data encryption.
| Wireless Settings HAPTER Key index and type must match that configured on the clients. In a mixed-mode environment with clients using static WEP keys and WPA, select WEP transmit key index 2, 3, or 4. The access point uses transmit key index 1 for the generation of dynamic keys.
| Wireless Settings HAPTER WMM Operation — WMM uses traffic priority based on the four ACs; Voice, Video, Best Effort, and Background. The higher the AC priority, the higher the probability that data is transmitted. When the access point forwards traffic, WMM adds data packets to four independent transmit queues, one for each AC, depending on the 802.1D priority tag of the packet.
| Wireless Settings HAPTER Figure 52: QoS The following items are displayed on this page: ◆ WMM — Sets the WMM operational mode on the access point. When enabled, the parameters for each AC queue will be employed on the access point and QoS capabilities are advertised to WMM-enabled clients.
Page 102
| Wireless Settings HAPTER WMM BSS Parameters — These parameters apply to the wireless ◆ clients. WMM AP Parameters — These parameters apply to the access point. ◆ logCWMin (Minimum Contention Window): The initial upper limit of ■ the random backoff wait time before wireless medium access can be attempted.
AINTENANCE ETTINGS Maintenance settings includes the following sections: “Upgrading Firmware” on page 103 ◆ “Running Configuration” on page 106 ◆ ◆ “Resetting the Access Point” on page 107 PGRADING IRMWARE You can upgrade new access point software from a local file on the management workstation, or from an FTP or TFTP server.
| Maintenance Settings HAPTER Upgrading Firmware Figure 53: Firmware The following items are displayed on this page: Firmware Version — Displays what version of software is being used ◆ as a runtime image - “Active”, and what version is a backup image - “Backup”.
Page 105
| Maintenance Settings HAPTER Upgrading Firmware the maximum length for file names is 32 characters for files on the access point. (Valid characters: A-Z, a-z, 0-9, “.”, “-”, “_”) Remote — Downloads an operation code image file from a specified ◆...
| Maintenance Settings HAPTER Running Configuration UNNING ONFIGURATION A copy of a previous running configuration may be uploaded to the access point as a saved file from a remote location, or the current configuration saved and stored for restoration purposes at a later point. A configuration file may be saved or downloaded to/from a specified remote FTP or TFTP server.
| Maintenance Settings HAPTER Resetting the Access Point maximum length for file names on the FTP/TFTP server is 255 characters. (Valid characters: A-Z, a-z, 0-9, “.”, “-”, “_”) IP Address — IP address or host name of FTP or TFTP server. ◆...
Page 108
| Maintenance Settings HAPTER Resetting the Access Point – 108 –...
TATUS NFORMATION The Information menu displays information on the current system configuration, the wireless interface, the station status and system logs. Status Information includes the following sections: “AP Status” on page 109 ◆ “Station Status” on page 112 ◆ “System Logs” on page 112 ◆...
| Status Information HAPTER AP Status Figure 56: AP System Configuration The following items are displayed on this page: Serial Number — The serial number of the physical access point. ◆ System Up Time — Length of time the management agent has been ◆...
| Status Information HAPTER AP Status HTTPS Server Status — Shows if management access via HTTPS is ◆ enabled. HTTPS Port — Shows the TCP port used by the HTTPS interface. ◆ Software Version — Shows the software version number. ◆...
| Status Information HAPTER Station Status TATION TATUS The Station Status window shows the wireless clients currently associated with the access point. Figure 58: Station Status The following items are displayed on this page: Station Address — The MAC address of the wireless client. ◆...
Page 113
| Status Information HAPTER System Logs – 113 –...
ECTION OMMAND NTERFACE This section provides a detailed description of the Command Line Interface, along with examples for all of the commands. This section includes these chapters: “Using the Command Line Interface” on page 116 ◆ “General Commands” on page 122 ◆...
Page 115
| Command Line Interface ECTION “Link Layer Discovery Commands” on page 228 ◆ “IAPP Commands” on page 251 ◆ “VLAN Commands” on page 232 ◆ “WMM Commands” on page 235 ◆ – 115 –...
SING THE OMMAND NTERFACE When accessing the management interface for the over a direct connection to the console port, or via a Telnet connection, the access point can be managed by entering command keywords and parameters at the prompt. Using the access point’s command-line interface (CLI) is very similar to entering commands on a UNIX system.
| Using the Command Line Interface HAPTER Telnet Connection ELNET ONNECTION Telnet operates over the IP transport protocol. In this environment, your management station and any network device you want to manage over the network must have a valid IP address. Valid IP addresses consist of four numbers, 0 to 255, separated by periods.
| Using the Command Line Interface HAPTER Entering Commands NTERING OMMANDS This section describes how to enter CLI commands. A CLI command is a series of keywords and arguments. Keywords identify EYWORDS AND a command, and arguments specify configuration parameters. For RGUMENTS example, in the command “show interfaces ethernet,”...
| Using the Command Line Interface HAPTER Entering Commands filters Show filters. interface Show interface information. line TTY line information. lldp Show lldp parameters. logging Show the logging buffers. radius Show radius server. snmp Show snmp configuration. sntp Show sntp configuration. station Show 802.11 station table.
| Using the Command Line Interface HAPTER Entering Commands list of the commands available for the current mode. The command classes and associated modes are displayed in the following table: Table 6: Command Modes Class Mode Exec Privileged Configuration Global Interface-ethernet Interface-wireless Interface-wireless-vap...
| Using the Command Line Interface HAPTER Entering Commands To enter Interface mode, you must enter the “interface ethernet” while in Global Configuration mode. The system prompt will change to “AP(if-ethernet)#,” or “AP(if-wireless)” indicating that you have access privileges to the associated commands. You can use the end command to return to the Exec mode.
ENERAL OMMANDS This chapter details general commands that apply to the CLI. Table 8: General Commands Command Function Mode Page configure Activates global configuration mode Exec Returns to previous configuration mode GC, IC exit Returns to the previous configuration mode, or exits the CLI cli-session-timeout Enables, disbles or sets a timeout for the CLI or...
| General Commands HAPTER This command returns to the previous configuration mode. EFAULT ETTING None OMMAND Global Configuration, Interface Configuration XAMPLE This example shows how to return to the Configuration mode from the Interface Configuration mode: AP(if-ethernet)#end AP(config)# This command returns to the Exec mode or exits the configuration exit program.
| General Commands HAPTER OMMAND Exec XAMPLE The following example disables the CLI/Telnet timeout. AP(config)# cli-session-timeout disable AP(config)# This command sends ICMP echo request packets to another node on the ping network. YNTAX ping <host_name | ip_address> host_name - Alias of the host. ip_address - IP address of the host.
| General Commands HAPTER This command restarts the system or restores the factory default settings. reset YNTAX reset <board | configuration> board - Reboots the system. configuration - Resets the configuration settings to the factory defaults, and then reboots the system. EFAULT ETTING None...
| General Commands HAPTER This command displays the console port’s configuration settings. show line OMMAND Exec XAMPLE The console port settings are fixed at the values shown below. AP#show line Console Line Information ====================================================== databits parity : none speed : 9600 stop bits ====================================================== –...
YSTEM ANAGEMENT OMMANDS YSTEM ANAGEMENT OMMANDS These commands are used to configure the user name, password, system logs, browser management options, clock settings, and a variety of other system information. Table 9: System Management Commands Command Function Mode Page Country Setting country Sets the access point country code Exec...
| System Management Commands HAPTER System Management Commands Table 9: System Management Commands (Continued) Command Function Mode Page show config Displays detailed configuration information for the Exec system show hardware Displays the access point’s hardware version Exec This command configures the access point’s country code, which identifies country the country of operation and sets the authorized radio channels.
| System Management Commands HAPTER System Management Commands Table 10: Country Codes (Continued) Country Code Country Code Country Code Country Code Croatia Jordan Poland Venezuela Cyprus Kazakhstan Portugal Vietnam Czech North Korea Puerto Rico Zimbabwe Republic Denmark Korea Slovenia Republic Elsalvador Luxembourg South Africa...
| System Management Commands HAPTER System Management Commands EFAULT ETTING Enterprise AP OMMAND Global Configuration XAMPLE AP(config)#prompt RD2 RD2(config)# This command specifies or modifies the system name for this device. Use system name the no form to restore the default system name. YNTAX system name <name>...
| System Management Commands HAPTER System Management Commands EFAULT ETTING admin OMMAND Global Configuration XAMPLE AP(config)#username bob AP(config)# After initially logging onto the system, you should set the password. password Remember to record it in a safe place. Use the no form to reset the default password.
| System Management Commands HAPTER System Management Commands After boot up, the SSH server needs about two minutes to generate ◆ host encryption keys. The SSH server is disabled while the keys are being generated. The show system command displays the status of the SSH server.
| System Management Commands HAPTER System Management Commands This command specifies the TCP port number used by the web browser ip http port interface. Use the no form to use the default port. YNTAX ip http port <port-number> no ip http port port-number - The TCP port to be used by the browser interface.
| System Management Commands HAPTER System Management Commands Use this command to specify the UDP port number used for HTTPS/SSL ip https port connection to the access point’s Web interface. Use the no form to restore the default port. YNTAX ip https port <port_number>...
| System Management Commands HAPTER System Management Commands OMMAND SAGE ◆ Both HTTP and HTTPS service can be enabled independently. If you enable HTTPS, you must indicate this in the URL: ◆ https://device:port_number] When you start HTTPS, the connection is established in this way: ◆...
| System Management Commands HAPTER System Management Commands OMMAND Global Configuration OMMAND SAGE If anyone tries to access a management interface on the access point ◆ from an invalid address, the unit will reject the connection, enter an event message in the system log, and send a trap message to the trap manager.
| System Management Commands HAPTER System Management Commands EFAULT ETTING All enabled OMMAND Global Configuration XAMPLE This example restricts management access to the indicated addresses. AP(config)#apmgmtui SNMP enable AP(config)# This command shows the AP management configuration, including the IP show addresses of management stations allowed to access the access point, as apmanagement well as the interface protocols which are open to management access.
| System Management Commands HAPTER System Management Commands System Country Code : US - UNITED STATES MAC Address : 00-30-F1-F0-9A-9C IP Address : 192.168.1.1 Subnet Mask : 255.255.255.0 Default Gateway : 0.0.0.0 VLAN State : DISABLED Management VLAN ID(AP): 1 IAPP State : ENABLED DHCP Client...
Page 139
| System Management Commands HAPTER System Management Commands 802.1x supplicant user : EMPTY 802.1x supplicant password : EMPTY Address Filtering : ALLOWED System Default : ALLOW addresses not found in filter table. Filter Table ----------------------------------------------------------- No Filter Entries. Bootfile Information =================================== Bootfile : ec-img.bin ===================================...
Page 140
| System Management Commands HAPTER System Management Commands Default Transmit Key Static Keys : Key 1: EMPTY Key 2: EMPTY Key 3: EMPTY Key 4: EMPTY Key Length : Key 1: ZERO Key 2: ZERO Key 3: ZERO Key 4: ZERO Authentication Type : OPEN Rogue AP Detection...
| System Management Commands HAPTER System Management Commands HTTPS Server Port : 443 Slot Status : Dual band(a/g) Boot Rom Version : v3.0.7 Software Version : v4.3.2.2 SSH Server : ENABLED SSH Server Port : 22 Telnet Server : ENABLED WEB Redirect : DISABLED DHCP Relay...
YSTEM OGGING OMMANDS These commands are used to configure system logging on the access point. Table 11: System Management Commands Command Function Mode Page logging on Controls logging of error messages logging host Adds a syslog server host IP address that will receive logging messages logging console Initiates logging of error messages to the console...
| System Logging Commands HAPTER This command specifies syslog servers host that will receive logging logging host messages. Use the no form to remove syslog server host. YNTAX logging host <1 | 2 | 3 | 4> <host_name | host_ip_address> [udp_port] no logging host <1 | 2 | 3 | 4>...
| System Logging Commands HAPTER OMMAND SAGE The command specifies the facility type tag sent in syslog messages. (See RFC 3164.) This type has no effect on the kind of messages reported by the access point. However, it may be used by the syslog server to sort messages or to store messages in the corresponding database.
| System Logging Commands HAPTER This command displays log messages stored in the access point’s memory. show event-log YNTAX show event-log OMMAND Exec XAMPLE AP#show event-log Mar 09 11:57:55 Information: 802.11g:11g Radio Interface Enabled Mar 09 11:57:55 Information: 802.11g:Radio channel updated to 8 Mar 09 11:57:34 Information: 802.11g:11g Radio Interface Enabled Mar 09 11:57:18...
YSTEM LOCK OMMANDS These commands are used to configure SNTP and system clock settings on the access point. Table 13: System Clock Commands Command Function Mode Page sntp-server ip Specifies one or more time servers sntp-server Accepts time from the specified time enable servers sntp-server...
| System Clock Commands HAPTER XAMPLE AP(config)#sntp-server ip 10.1.0.19 ELATED OMMANDS sntp-server enable (149) show sntp (151) This command enables SNTP client requests for time synchronization with sntp-server enable NTP or SNTP time servers specified by the sntp-server ip command. Use the no form to disable SNTP client requests.
| System Clock Commands HAPTER AP#sntp-server date-time Enter Year<1970-2100>: 2003 Enter Month<1-12>: 6 Enter Day<1-31>: 19 Enter Hour<0-23>: 17 Enter Min<0-59>: 37 ELATED OMMANDS sntp-server enable (149) This command sets the start and end dates for daylight savings time. Use sntp-server the no form to disable daylight savings time.
| System Clock Commands HAPTER EFAULT ETTING -5 (BOGOTA, EASTERN, INDIANA) OMMAND Global Configuration OMMAND SAGE This command sets the local time zone relative to the Coordinated Universal Time (UTC, formerly Greenwich Mean Time or GMT), based on the earth’s prime meridian, zero degrees longitude. To display a time corresponding to your local time, you must indicate the number of hours and minutes your time zone is east (before) or west (after) of UTC.
DHCP R ELAY OMMANDS Dynamic Host Configuration Protocol (DHCP) can dynamically allocate an IP address and other configuration information to network clients that broadcast a request. To receive the broadcast request, the DHCP server would normally have to be on the same subnet as the client. However, when the access point’s DHCP relay agent is enabled, received client requests can be forwarded directly by the access point to a known DHCP server on another subnet.
SNMP C OMMANDS Controls access to this access point from management stations using the Simple Network Management Protocol (SNMP), as well as the hosts that will receive trap messages. Table 15: SNMP Commands Command Function Mode Page snmp-server community Sets up the community access string to permit access to SNMP commands snmp-server contact Sets the system contact string...
| SNMP Commands HAPTER EFAULT ETTING ◆ public - Read-only access. Authorized management stations are only able to retrieve MIB objects. private - Read/write access. Authorized management stations are able ◆ to both retrieve and modify MIB objects. OMMAND Global Configuration OMMAND SAGE If you enter a community string without the ro or rw option, the default is...
| SNMP Commands HAPTER ELATED OMMANDS snmp-server host (157) This command specifies the recipient of an SNMP notification. Use the no snmp-server host form to remove the specified host. YNTAX snmp-server host <host_ip_address> <community-string> no snmp-server host host_ip_address - IP of the host (the targeted recipient). community-string - Password-like community string sent with the notification operation.
Page 158
| SNMP Commands HAPTER trap - One of the following SNMP trap messages: dot11InterfaceAGFail - The 802.11a or 802.11g interface has failed. dot11InterfaceBFail - The 802.11b interface has failed. dot11StationAssociation - A client station has successfully associated with the access point. dot11StationAuthentication - A client station has been successfully authenticated.
| SNMP Commands HAPTER sysSystemDown - The access point is about to shutdown and reboot. sysSystemUp - The access point is up and running. EFAULT ETTING All traps enabled OMMAND Global Configuration OMMAND SAGE This command is used in conjunction with the snmp-server host and snmp-server enable server commands to enable SNMP notifications.
| SNMP Commands HAPTER Use the command more than once with the same filter ID to build a ◆ filter that includes or excludes multiple MIB objects. Note that the filter entries are applied in the sequence that they are defined. The MIB subtree must be defined in the form “.1.3.6.1”...
| SNMP Commands HAPTER OMMAND Global Configuration OMMAND SAGE The access point allows up to 10 notification filters to be created. Each ◆ filter can be defined by up to 20 MIB subtree ID entries. Use the command more than once with the same filter ID to build a ◆...
| SNMP Commands HAPTER OMMAND Global Configuration OMMAND SAGE Up to 10 SNMPv3 users can be configured on the access point. ◆ The SNMP engine ID is used to compute the authentication/privacy ◆ digests from the pass phrase. You should therefore configure the engine ID with the snmp-server engine-id command before using this configuration command.
| SNMP Commands HAPTER OMMAND Global Configuration OMMAND SAGE The access point supports up to 10 SNMP v3 target IDs. ◆ The SNMP v3 user name that is specified in the target must first be ◆ configured using the snmp-server user command. XAMPLE AP(config)#snmp-server targets mytraps 192.168.1.33 chris AP(config)#...
| SNMP Commands HAPTER This command displays the SNMP v3 notification filter settings. show snmp vacm group / show snmp vacm view YNTAX show snmp filter [filter-id] filter-id - A user-defined name that identifies an SNMP v3 notification filter. (Maximum length: 32 characters) OMMAND Exec XAMPLE...
LASH OMMANDS These commands are used to manage the system code or configuration files. Table 16: Flash/File Commands Command Function Mode Page dual-image Specifies the file or image used to start up the system copy Copies a code image or configuration between Exec flash memory and a FTP/TFTP server show dual-image...
| Flash/File Commands HAPTER This command copies a boot file, code image, or configuration file between copy the access point’s flash memory and a FTP/TFTP server. When you save the configuration settings to a file on a FTP/TFTP server, that file can later be downloaded to the access point to restore system operation.
| Flash/File Commands HAPTER AP#copy config tftp TFTP Source file name:syscfg TFTP Server IP:192.168.1.19 The following example shows how to download a configuration file: AP#copy tftp file 1. Application image 2. Config file 3. Boot block image Select the type of download<1,2,3>: [1]:2 TFTP Source file name:syscfg TFTP Server IP:192.168.1.19...
RADIUS C LIENT OMMANDS Remote Authentication Dial-in User Service (RADIUS) is a logon authentication protocol that uses software running on a central server to control access for RADIUS-aware devices to the network. An authentication server contains a database of credentials, such as users names and passwords, for each wireless client that requires access to the access point.
| RADIUS Client Commands HAPTER If want to take effect, please execute make-radius-effective command ! AP(config)# This command specifies the primary and secondary RADIUS server radius-server address. address YNTAX radius-server {primary | secondary} address <address> address - IP address of server. EFAULT ETTING None...
| RADIUS Client Commands HAPTER key_string - Encryption key used to authenticate logon access for client. Do not use blank spaces in the string. (Maximum length: 20 characters) EFAULT ETTING DEFAULT OMMAND Global Configuration XAMPLE AP(config)#radius-server primary key green AP(config)# This command sets the RADIUS Accounting server network IP address.
| RADIUS Client Commands HAPTER EFAULT ETTING 0 (disabled) OMMAND Global Configuration OMMAND SAGE When the RADIUS Accounting server UDP port is specified, a RADIUS ◆ accounting session is automatically started for each user that is successfully authenticated to the access point. XAMPLE AP(config)#radius-server accounting port 1024 AP(config)#...
| RADIUS Client Commands HAPTER OMMAND Global Configuration OMMAND SAGE The access point sends periodic accounting updates after every interim ◆ period until the user logs off and a “stop” message is sent. XAMPLE AP(config)#radius-server timeout-interim 500 AP(config)# This command displays the current settings for the RADIUS server. show radius EFAULT ETTING...
802.1X A UTHENTICATION OMMANDS The access point supports IEEE 802.1X access control for wireless clients. This control feature prevents unauthorized access to the network by requiring an 802.1X client application to submit user credentials for authentication. Client authentication is then verified by a RADIUS server using EAP (Extensible Authentication Protocol) before the access point grants client access to the network.
| 802.1X Authentication Commands HAPTER XAMPLE AP(config)#802.1x enable AP(config)# This command sets the time period after which a connected client must be 802.1x session- re-authenticated. Use the no form to disable 802.1X re-authentication. timeout YNTAX 802.1x session-timeout <seconds> seconds - The number of seconds. (Range: 0-65535) EFAULT 0 (Disabled) OMMAND...
MAC A DDRESS UTHENTICATION OMMANDS Use these commands to define MAC authentication on the access point. For local MAC authentication, first define the default filtering policy using the address filter default command. Then enter the MAC addresses to be filtered, indicating if they are allowed or denied. For RADIUS MAC authentication, the MAC addresses and filtering policy must be configured on the RADIUS server.
| MAC Address Authentication Commands HAPTER ELATED OMMANDS address filter entry (178) This command enters a MAC address in the filter table. address filter entry YNTAX address filter entry <mac-address> <allowed | denied> mac-address - Physical address of client. (Enter six pairs of hexadecimal digits separated by hyphens;...
| MAC Address Authentication Commands HAPTER OMMAND Global Configuration XAMPLE AP(config)#address filter delete 00-70-50-cc-99-1b AP(config)# This command sets address filtering to be performed with local or remote mac-authentication options. Use the no form to disable MAC address authentication. server YNTAX mac-authentication server [local | remote] local - Authenticate the MAC address of wireless clients with the local authentication database during 802.11 association.
ILTERING OMMANDS The commands described in this section are used to filter communications between wireless clients, control access to the management interface from wireless clients, and filter traffic using specific Ethernet protocol types. Table 20: Filtering Commands Command Function Mode Page filter local-bridge Disables communication between wireless...
| Filtering Commands HAPTER OMMAND SAGE This command can disable wireless-to-wireless communications between clients via the access point. However, it does not affect communications between wireless clients and the wired network. XAMPLE AP(config)#filter local-bridge AP(config)# This command prevents wireless clients from accessing the management filter ap-manage interface on the access point.
| Filtering Commands HAPTER This command enables filtering of source MAC addresses from the Ethernet filter acl-source- port. address mac- address YNTAX [no] filter acl-source-address {add | delete} address MAC address - Specifies a MAC address in the form xx-xx-xx-xx-xx- A maximum of eight addresses can be added to the filtering table.
| Filtering Commands HAPTER EFAULT Disabled OMMAND Global Configuration XAMPLE AP(config)#filter acl-source-address add xx:xx:xx:xx:xx:xx AP(config)# This command checks the Ethernet type on all incoming and outgoing filter ethernet-type Ethernet packets against the protocol filtering table. Use the no form to enabled disable this feature.
| Filtering Commands HAPTER DEC XNS, DEC-MOP-Dump-Load, DEC-MOP, DEC-LAT, Ethertalk, Appletalk-ARP, Novell-IPX(old), Novell-IPX(new), EAPOL, Telxon- TXP, Aironet-DDP, Enet-Config-Test, IP, IPv6, NetBEUI, PPPoE_Discovery, PPPoE_PPP_Session) EFAULT None OMMAND Global Configuration OMMAND SAGE Use the filter ethernet-type enable command to enable filtering for Ethernet types specified in the filtering table, or the no filter ethernet- type enable command to disable all filtering based on the filtering table.
PANNING OMMANDS The commands described in this section are used to set the MAC address table aging time and spanning tree parameters for both the Ethernet and wireless interfaces. Table 21: Spanning Tree Commands Command Function Mode Page bridge stp service Enables the Spanning Tree feature bridge stp br-conf Configures the spanning tree bridge forward...
| Spanning Tree Commands HAPTER AP(config)bridge stp service AP(config) Use this command to configure the spanning tree bridge forward time bridge stp br-conf globally for the wireless bridge. Use the no form to restore the default. forwarding-delay YNTAX bridge stp br-conf forwarding-delay <seconds> no bridge stp br-conf forwarding-delay seconds - Time in seconds.
| Spanning Tree Commands HAPTER OMMAND Global Configuration OMMAND SAGE This command sets the time interval (in seconds) at which the root device transmits a configuration message. XAMPLE AP(config)#bridge stp br-conf hello-time 5 AP(config)# Use this command to configure the spanning tree bridge maximum age bridge stp br-conf globally for the wireless bridge.
| Spanning Tree Commands HAPTER YNTAX bridge stp br-conf priority<priority> no bridge stp br-conf priority priority - Priority of the bridge. (Range: 0 - 65535) EFAULT ETTING 32768 OMMAND Global Configuration OMMAND SAGE Bridge priority is used in selecting the root device, root port, and designated port.
| Spanning Tree Commands HAPTER This command displays aging time and spanning tree settings for the show bridge stp Ethernet and wireless interfaces. YNTAX show bridge stp OMMAND Exec XAMPLE AP#show bridge stp Bridge STP Information ================================== Bridge MAC : 00:12:CF:A2:54:30 Status : Disabled priority...
| Spanning Tree Commands HAPTER OMMAND Exec XAMPLE AP#show bridge port-conf interface all ETH0 configuration ======================================== Link Port Priority : 32 Link Path Cost ======================================== ATH0 configuration ======================================== Link Port Priority : 32 Link Path Cost : 19 ======================================== ATH1 configuration ======================================== Link Port Priority : 32...
| Spanning Tree Commands HAPTER This command displays aging time and spanning tree settings for the show bridge status Ethernet and wireless interfaces. YNTAX show bridge status <all | 0-4095> OMMAND Exec XAMPLE AP# show bridge status all br0 status ===================================================== Bridge ID : 8000.0012cfa25430...
WDS B RIDGE OMMANDS The commands described in this section are used to set the operation mode for each access point interface and configure Wireless Distribution System (WDS) forwarding table settings. Table 22: WDS Bridge Commands Command Function Mode Page wds ap Selects the bridge operation mode for a radio IC-W...
| WDS Bridge Commands HAPTER OMMAND Interface Configuration (Wireless) VAP OMMAND SAGE Every bridge (except the root bridge) in the wireless bridge network must specify the MAC address of the parent bridge that is linked to the root bridge, or the root bridge itself. XAMPLE AP(if-wireless 0 [VAP 0])#wds sta ap red AP(if-wireless 0 [VAP 0])#...
THERNET NTERFACE OMMANDS The commands described in this section configure connection parameters for the Ethernet port and wireless interface. Table 23: Ethernet Interface Commands Command Function Mode Page interface ethernet Enters Ethernet interface configuration mode GC dns primary- server Specifies the primary name server IC-E dns secondary- server Specifies the secondary name server IC-E...
| Ethernet Interface Commands HAPTER This command specifies the address for the primary or secondary domain dns server name server to be used for name-to-address resolution. YNTAX dns primary-server <server-address> dns secondary-server <server-address> primary-server - Primary server used for name resolution. secondary-server - Secondary server used for name resolution.
Page 197
| Ethernet Interface Commands HAPTER OMMAND Interface Configuration (Ethernet) OMMAND SAGE DHCP is enabled by default. To manually configure a new IP address, ◆ you must first disable the DHCP client with the no ip dhcp command. You must assign an IP address to this device to gain management ◆...
| Ethernet Interface Commands HAPTER XAMPLE AP(config)#interface ethernet Enter Ethernet configuration commands, one per line. AP(if-ethernet)#ip dhcp AP(if-ethernet)# ELATED OMMANDS ip address (196) This command disables the Ethernet interface. To restart a disabled shutdown interface, use the no form. YNTAX shutdown no shutdown EFAULT...
| Ethernet Interface Commands HAPTER EFAULT ETTING OMMAND Interface Configuration OMMAND SAGE This command is used by the Spanning Tree Protocol to determine the ◆ best path between devices. Therefore, lower values should be assigned to ports attached to faster media, and higher values assigned to ports with slower media.
IRELESS NTERFACE OMMANDS The commands described in this section configure connection parameters for the wireless interfaces. Table 24: Wireless Interface Commands Command Function Mode Page interface wireless Enters wireless interface configuration mode Provides access to the VAP interface IC-W configuration mode a-mpdu Sets the Aggregate MAC Protocol Data IC-W...
| Wireless Interface Commands HAPTER Table 24: Wireless Interface Commands Command Function Mode Page shutdown Disables the wireless interface IC-W- show interface Shows the status for the wireless interface Exec wireless show station Shows the wireless clients associated with Exec the access point This command enters wireless interface configuration mode.
| Wireless Interface Commands HAPTER OMMAND Interface Configuration (Wireless) XAMPLE AP(if-wireless 0)#a-msdu enable AP(if-wireless 0)# This command configures the radio channel through which the access point channel communicates with wireless clients. YNTAX channel <channel | auto> channel - Manually sets the radio channel used for communications with wireless clients.
| Wireless Interface Commands HAPTER This command adjusts the power of the radio signals transmitted from the transmit-power access point. YNTAX transmit-power <signal-strength> signal-strength - Signal strength transmitted from the access point. (Options: full, half, quarter, eighth, min) EFAULT ETTING full OMMAND Interface Configuration (Wireless)
Page 206
| Wireless Interface Commands HAPTER Both the 802.11g and 802.11b standards operate within the 2.4 GHz ◆ band. If you are operating in g mode, any 802.11b devices in the service area will contribute to the radio frequency noise and affect network performance.
| Wireless Interface Commands HAPTER device ath0 entered promiscuous mode br0: port 2(ath0) entering learning state br0: topology change detected, propagating br0: port 2(ath0) entering forwarding state Add port ath0 to bridge br0 successfully ath_vdrv: Version 0.1 All Rights Reserved AP(if-wireless 0)# Makes the RF setting effective.
| Wireless Interface Commands HAPTER Set the preamble to long to ensure the access point can support all ◆ 802.11b and 802.11g clients. XAMPLE AP(if-wireless g)#preamble short AP(if-wireless g)# Sets the protection method protection-method YNTAX protection-method <cts-only | rts-cts> EFAULT ETTING None OMMAND...
| Wireless Interface Commands HAPTER This command configures the rate at which beacon signals are transmitted beacon-interval from the access point. YNTAX beacon-interval <interval> interval - The rate for transmitting beacon signals. (Range: 20-1000 milliseconds) EFAULT ETTING OMMAND Interface Configuration (Wireless) OMMAND SAGE The beacon signals allow wireless clients to maintain contact with the...
| Wireless Interface Commands HAPTER Using smaller DTIM intervals delivers broadcast/multicast frames in a ◆ more timely manner, causing stations in Power Save mode to wake up more often and drain power faster. Using higher DTIM values reduces the power used by stations in Power Save mode, but delays the transmission of broadcast/multicast frames.
| Wireless Interface Commands HAPTER This command adds a description to a the wireless interface. Use the no description form to remove the description. YNTAX description <string> no description string - Comment or a description for this interface. (Range: 1-80 characters) EFAULT ETTING None...
| Wireless Interface Commands HAPTER This command prohibits access to clients without a pre-configured SSID. closed-system Use the no form to disable this feature. YNTAX closed-system no closed-system EFAULT ETTING Disabled OMMAND Interface Configuration (Wireless-VAP) OMMAND SAGE When closed system is enabled, the access point will not include its SSID in beacon messages.
| Wireless Interface Commands HAPTER This command configures the idle time interval (when no frames are sent) assoc-timeout- after which the client is disassociated from the VAP interface. interval YNTAX assoc-timeout-interval <minutes> minutes - The number of minutes of inactivity before disassociation. (Range: 5-60) EFAULT ETTING...
| Wireless Interface Commands HAPTER EFAULT ETTING Interface enabled OMMAND Interface Configuration (Wireless-VAP) OMMAND SAGE You must first enable VAP interface 0 before you can enable VAP interfaces 1, 2, 3, 4, 5, 6, or 7. XAMPLE AP(if-wireless g: VAP[0])#shutdown AP(if-wireless g)# This command displays the status for the wireless interface.
Page 216
| Wireless Interface Commands HAPTER MIC Mode : Software Super G : Disabled VLAN ID ----------------Security------------------------------------------------- Closed System : Disabled Multicast cipher : WEP Unicast cipher : TKIP and AES WPA clients : DISABLED WPA Key Mgmt Mode : PRE SHARED KEY WPA PSK Key Type : PASSPHRASE WPA PSK Key...
| Wireless Interface Commands HAPTER This command shows the wireless clients associated with the access point. show station OMMAND Exec XAMPLE AP#show station Station Table Information ======================================================== if-wireless A VAP [0] 802.11a Channel : 60 No 802.11a Channel Stations. if-wireless G VAP [0] 802.11g Channel : 1 802.11g Channel Station Table Station Address...
IRELESS ECURITY OMMANDS The commands described in this section configure parameters for wireless security on the 802.11a and 802.11g interfaces. Table 25: Wireless Security Commands Command Function Mode Page auth Defines the 802.11 authentication type IC-W- allowed by the access point encryption Defines whether or not WEP encryption is IC-W-...
Page 219
| Wireless Security Commands HAPTER wpa-wpa2-mixed - Clients using WPA or WPA2 are accepted for authentication. wpa-wpa2-psk-mixed - Clients using WPA or WPA2 with a Pre- shared Key are accepted for authentication EFAULT ETTING open-system OMMAND Interface Configuration (Wireless-VAP) OMMAND SAGE The auth command automatically configures settings for each ◆...
| Wireless Security Commands HAPTER encryption cipher suite is set to TKIP, the unicast encryption cipher (TKIP or AES-CCMP) is negotiated for each client. The access point advertises it’s supported encryption ciphers in beacon frames and probe responses. WPA and WPA2 clients select the cipher they support and return the choice in the association request to the access point.
Page 221
| Wireless Security Commands HAPTER XAMPLE AP(if-wireless g: VAP[0])#encryption AP(if-wireless g)# ELATED OMMANDS key (221) This command sets the keys used for WEP encryption. Use the no form to delete a configured key. YNTAX key <1-4> <static> <dynamic> no key 1-4 - Key index.
| Wireless Security Commands HAPTER AP(if-wireless 0)#key 3 64 hex 12345123451234512345123456 AP(if-wireless 0)# ELATED OMMANDS key (221) encryption (220) transmit-key (222) This command sets the index of the key to be used for encrypting data transmit-key frames for broadcast or multicast traffic transmitted from the VAP to wireless clients.
Page 223
| Wireless Security Commands HAPTER YNTAX multicast-cipher <aes-ccmp | tkip > aes-ccmp - Use AES-CCMP encryption for the unicast and multicast cipher. tkip - Use TKIP encryption for the multicast cipher. TKIP or AES- CCMP can be used for the unicast cipher depending on the capability of the client.
| Wireless Security Commands HAPTER OMMAND SAGE ◆ WPA2 provides fast roaming for authenticated clients by retaining keys and other security information in a cache, so that if a client roams away from an access point and then returns reauthentication is not required. When a WPA2 client is first authenticated, it receives a Pairwise Master ◆...
| Wireless Security Commands HAPTER ath_vdrv: driver unloaded ARGS: 1 ath_hal: 0.9.17.1 (AR5416, DEBUG, REGOPS_FUNC, WRITE_EEPROM, 11D) wlan: 0.8.4.2 (Atheros/multi-bss) ath_rate_atheros: Copyright (c) 2001-2005 Atheros Communications, Inc, All Right s Reserved ath_dfs: Version 2.0.0 Copyright (c) 2005-2006 Atheros Communications, Inc. All Rights Reserved ath_dev: Copyright (c) 2001-2007 Atheros Communications, Inc, All Rights Reserve ath_ahb: 0.9.4.5 (Atheros/multi-bss)(LSDK7.1.3.71_v2)
Page 227
| Wireless Security Commands HAPTER NO WIRELESS EXTENSIONS. WIFI0 NO WIRELESS EXTENSIONS. NO WIRELESS EXTENSIONS. ETH0 NO WIRELESS EXTENSIONS. NO WIRELESS EXTENSIONS. WIFI0 NO WIRELESS EXTENSIONS. NO WIRELESS EXTENSIONS. ETH0 NO WIRELESS EXTENSIONS. NO WIRELESS EXTENSIONS. WIFI0 NO WIRELESS EXTENSIONS. ieee80211_ioctl_setmode: CHH Mode: 11NAHT20 ath_set_config: Setting ATH parameter ath_set_config: Setting ATH parameter...
AYER ISCOVERY OMMANDS LLDP allows devices in the local broadcast domain to share information about themselves. LLDP-capable devices periodically transmit information in messages called Type Length Value (TLV) fields to neighbor devices. Advertised information is represented in Type Length Value (TLV) format according to the IEEE 802.1ab standard, and can include details such as device identification, capabilities and configuration settings.
| Link Layer Discovery Commands HAPTER This command configures the length of time the access point will sustain its lldp-transmit hold- LLDP signal on the network. (Default: 4 seconds; Range: 2-10 seconds) muliplier YNTAX lldp transmit hold-multiplier <seconds> no link-integrity ping-host seconds - Time in seconds.
| Link Layer Discovery Commands HAPTER EFAULT ETTING 2 seconds OMMAND Global Configuration XAMPLE AP(config)#lldp transmit re-init-delay 10 AP(config)# The length of time before which the access point will advertise its presence lldp transmit delay- on the network with an LLDP header. to-local-change YNTAX lldp transmit delay-to-local-change <seconds>...
VLAN C OMMANDS The access point can enable the support of VLAN-tagged traffic passing between wireless clients and the wired network. Up to 64 VLAN IDs can be mapped to specific wireless clients, allowing users to remain within the same VLAN as they move around a campus site. When VLAN is enabled on the access point, a VLAN ID (a number between 1 and 4094) can be assigned to each client after successful authentication using IEEE 802.1X and a central RADIUS server.
| VLAN Commands HAPTER OMMAND ESCRIPTION ◆ When VLANs are enabled, the access point tags frames received from wireless clients with the VLAN ID configured for each client on the RADIUS server. If the VLAN ID has not been configured for a client on the RADIUS server, then the frames are tagged with the access point’s native VLAN ID.
| VLAN Commands HAPTER This command configures the default VLAN ID for the VAP interface. vlan-id YNTAX vlan-id <vlan-id> vlan-id - Native VLAN ID. (Range: 1-4094) EFAULT ETTING OMMAND Interface Configuration (Wireless-VAP) OMMAND SAGE ◆ To implement the default VLAN ID setting for VAP interface, the access point must enable VLAN support using the vlan command.
WMM C OMMANDS The access point implements QoS using the Wi-Fi Multimedia (WMM) standard. Using WMM, the access point is able to prioritize traffic and optimize performance when multiple applications compete for wireless network bandwidth at the same time. WMM employs techniques that are a subset of the developing IEEE 802.11e QoS standard and it enables the access point to inter-operate with both WMM- enabled clients and other devices that may lack any WMM functionality.
| WMM Commands HAPTER This command allows the acknowledgement wait time to be enabled or wmm-acknowledge- disabled for each Access Category (AC). policy YNTAX wmm-acknowledge-policy <ac_number> <ack | noack> ac_number - Access categories. (Range: 0-3) ack - Require the sender to wait for an acknowledgement from the receiver.
| WMM Commands HAPTER ac_number - Access categories (ACs) – voice, video, best effort, and background. These categories correspond to traffic priority levels and are mapped to IEEE 802.1D priority tags as shown in Table 6-1. (Range: 0-3) LogCwMin - Minimum log value of the contention window. This is the initial upper limit of the random backoff wait time before wireless medium access can be attempted.
ECTION PPENDICES This section provides additional information and includes these items: “Hardware Specifications” on page 244 ◆ “Troubleshooting” on page 241 ◆ “Glossary” on page 252 ◆ ◆ “Index” on page 256 – 240 –...
ROUBLESHOOTING LED I IAGNOSING NDICATORS Table 31: LED Indicators Symptom Action POWER/ DIAG/FAIL LEDs ◆ The AC power adapter may be disconnected. Check are off connections between the SMCE21011, the power adapter, and the wall outlet. ◆ The PoE cable may be disconnected. Check connections between the SMCE21011 and the PoE power source.
Page 242
| Troubleshooting PPENDIX Before Contacting Technical Support If MAC address filtering is enabled, be sure the client’s address is ■ included in the local filtering database or on the RADIUS server database. If the wireless clients are roaming between access points, make ■...
Page 243
| Troubleshooting PPENDIX Before Contacting Technical Support Reset the access point’s hardware using the console interface, web ■ interface, or through a power reset. Reset the access point to its default configuration by pressing the ■ reset button on the back panel for 5 seconds or more. Then use the default user name “admin”...
Page 246
| Hardware Specifications PPENDIX 15% to 95% (non-condensing) UMIDITY FCC Part 15B Class B OMPLIANCES EN 55022B EN 55024 EN 61000-3-2 EN 61000-3-3 FCC Part 15C 15.247, 15.207 (2.4 GHz) ADIO IGNAL EN 300 328 ERTIFICATION EN 301 489-1 EN 301 489-17 IC RSS-210 IEEE 802.11b/g TANDARDS...
ABLES AND INOUTS WISTED ABLE SSIGNMENTS For 10/100BASE-TX connections, a twisted-pair cable must have two pairs of wires. For 1000BASE-T connections the twisted-pair cable must have four pairs of wires. Each wire pair is identified by two different colors. For example, one wire might be green and the other, green with white stripes.
| Cables and Pinouts PPENDIX 10/100BASE-TX Pin Assignments 10/100BASE-TX P SSIGNMENTS Use unshielded twisted-pair (UTP) or shielded twisted-pair (STP) cable for RJ-45 connections: 100-ohm Category 3 or better cable for 10 Mbps connections. Also be sure that the length of any twisted-pair connection does not exceed 100 meters (328 feet).
| Cables and Pinouts PPENDIX Crossover Wiring Figure 61: Straight Through Wiring EIA/TIA 568B RJ-45 Wiring Standard 10/100BASE-TX Straight-through Cable White/Orange Stripe Orange White/Green Stripe End A End B Blue White/Blue Stripe Green White/Brown Stripe Brown ROSSOVER IRING If the twisted-pair cable is to join two ports and either both ports are labeled with an “X”...
| Cables and Pinouts PPENDIX 1000BASE-T Pin Assignments 1000BASE-T P SSIGNMENTS All 1000BASE-T ports support automatic MDI/MDI-X operation, so you can use straight-through cables for all network connections to PCs or servers, switches or hubs. The table below shows the 1000BASE-T MDI and MDI-X port pinouts. These ports require that all four pairs of wires be connected.
| Cables and Pinouts PPENDIX Console Port Pin Assignments Reduce the number of connectors used in the link. Reconnect some of the connectors in the link. ONSOLE SSIGNMENTS The RJ-45 console port on the front panel of the access point is used to connect to the access point for out-of-band console configuration to a DB-9 connector on a PC.
LOSSARY IEEE 802.3-2005 specification for 10 Mbps Ethernet over two pairs of 10BASE-T Category 3 or better UTP cable. IEEE 802.3-2005 specification for 100 Mbps Fast Ethernet over two pairs of 100BASE-TX Category 5 or better UTP cable. IEEE 802.3ab specification for 1000 Mbps Gigabit Ethernet over four pairs 1000BASE-T of Category 5 or better UTP cable.
Page 253
LOSSARY Provides a framework for passing configuration information to hosts on a YNAMIC TCP/IP network. DHCP is based on the Bootstrap Protocol (BOOTP), adding ONFIGURATION the capability of automatic allocation of reusable network addresses and (DHCP) ROTOCOL additional configuration options. Data passing between the access point and clients can use encryption to NCRYPTION protect from interception and evesdropping.
Page 254
LOSSARY The physical layer address used to uniquely identify network nodes. MAC A DDRESS NTP provides the mechanisms to synchronize time across the network. The ETWORK time servers operate in a hierarchical-master-slave configuration in order (NTP) ROTOCOL to synchronize local clocks within the subnet and to national time standards via wire or radio.
Page 255
LOSSARY A data encryption method designed as a replacement for WEP. TKIP avoids EMPORAL the problems of WEP static keys by dynamically changing data encryption NTEGRITY ROTOCOL keys. (TKIP) A TCP/IP protocol commonly used for software downloads. RIVIAL RANSFER (TFTP) ROTOCOL Virtual AP technology multiplies the number of Access Points present within IRTUAL...
NDEX UMERICS 802.11g filter address between wireless clients local bridge local or remote antennas management access authentication protocol types cipher suite VLANs closed system firmware MAC address displaying version type upgrading beacon gateway address interval rate BOOTP bridge hardware capabilities hardware description hardware version, displaying HTTP, secure server...
Page 257
NDEX software displaying version LED indicators downloading location selection SSID messages server interface settings –?? path cost port priority startup files, setting MAC address, authentication station status mounting on a horizontal surface status mounting on a wall displaying device status displaying station status subnet mask system clock, setting...
Page 258
TECHNICAL SUPPORT From U.S.A. and Canada (24 hours a day, 7 days a week) Phn: 800-SMC-4-YOU / 949-679-8000 Fax: 949-502-3400 ENGLISH Technical Support information available at www.smc.com FRENCH Informations Support Technique sur www.smc.com DEUTSCH Technischer Support und weitere Information unter www.smc.com SPANISH En www.smc.com Ud.
Need help?
Do you have a question about the EliteConnect SMCE21011 and is the answer not in the manual?
Questions and answers