Hide thumbs Also See for WBS-2400 SCT 120:
Table of Contents

Advertisement

Quick Links

WBS-2400 User Manual and
WBS-2400 SCT 120
(FCC models)
SW version 3.1
June 2009

Advertisement

Table of Contents
loading

Summary of Contents for Wavion WBS-2400 SCT 120

  • Page 1 WBS-2400 User Manual and WBS-2400 SCT 120 (FCC models) SW version 3.1 June 2009...
  • Page 2 Copyright Notice ©2006, 2007, 2008 Wavion, Inc. All rights reserved. Wavion is a registered trademark of Wavion in the United States and certain other jurisdictions. Specifications are subject to change without notice. FCC Notice to Users and Operators This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to Part 15 of the FCC Rules.
  • Page 3: Read This First

    This apparatus must be connected to earth ground. ARNING Do not open the unit. There is a risk of electric shock inside. AUTION You are cautioned that any change or modification not expressly approved in this manual could void your authority to operate this equipment. 3 Wavion...
  • Page 4 AUTION The RJ45 connectors of your Wavion WBS-2400 may source DC power on pins 4,5 and 7,8. The IEEE 802.3 standards allow for pins 4,5 and 7,8 to be used for Power Over Ethernet. Some products may be incompatible with the Wavion Power Over Ethernet capability.
  • Page 5: About This Manual

    About This Manual The following describes configuration of the WBS-2400. It is intended for use by network engineers and administrators charged with setting up and administering Wavion wireless networks. This manual contains the following: : Explains the Home page with its summary of the Chapter 1: Viewing the System Status •...
  • Page 6: Table Of Contents

    Contents Viewing the System Status ................10 C h a p t e r 1 Logging in........................... 10 Logging out ........................10 Viewing the Home Page....................10 To view the Home page ..................10 Managing the System Configuration ............13 C h a p t e r 2 Viewing the System Configuration .................
  • Page 7 Firmware Upgrade Procedure ................98 Roll back procedure ....................104 To return to the system default software version ........... 104 Appendix: Troubleshooting ............... 106 C h a p t e r 8 Basic Troubleshooting ..................106 LED Description ..................... 107 7 Wavion...
  • Page 8 Introduction Wavion is glad to have the opportunity to offer the WBS2400 product as the best wireless coverage solution for your project requirements. Wavion’s next-generation base stations, referred to as spatially adaptive WiFi Base Stations, are designed specifically to address shortcomings in current outdoor access points for rural and metro WiFi applications.
  • Page 9 Wavion ASIC CPU – Control and synchronize the whole system performance • Two Wavion ASIC - Smart RF technology resides in the ASIC and software • Six RF modules and Antennas - Standard off-the-shelf components and antennas • Wired Data – 10/100 Base-T Ethernet terminals with POE in or optional output.
  • Page 10: Viewing The System Status

    Viewing the System Status Chapter 1 Viewing the System Status The Home page shows a summary of status data of the system. From within this page, you can quickly link from fields to other related pages for more information. Logging in The default IP address of the unit is IP: 192.168.1.1 and mask: 255.255.255.0.
  • Page 11 Home: Summary Status Page The following fields appear on the Summary Status page: Table 1.1 Home: Summary Status Page Field Description BST Status Associated Stations Links to Associated Stations page Active SSIDs Service Set Identifier; links to Editing SSID page 11 Wavion...
  • Page 12 Viewing the System Status Table 1.1 Home: Summary Status Page Field Description System Identity Links to System Configuration page System Description Description of the device as written in MIB-II SysDescr System Up Time Total time since system was switched on or last re- initialized System Contact Administratively-assigned email address of system...
  • Page 13: Managing The System Configuration

    Managing the System Configuration Chapter 2 Managing the System Configuration The System Configuration page displays system identification parameters like, IP information, system location servers etc. The other system pages allow updating of the software version and system configuration, and a view of the system components. Viewing the System Configuration To view the System Configuration page •...
  • Page 14 Managing the System Configuration Figure 2.1 System Configuration Page The following fields appear on the System Configuration page: Table- 2.1 System Configuration Field Description System Identity System Description Description of the device as written in MIB-II SysDescr OID System Up Time Total time since system was switched on or last re-initialized System Contact, Name, These parameters are for the user convenience while...
  • Page 15 Change the IP address to allow the full configuration. The Current IP Address Configuration area lists a default IP address; it is possible to perform initial testing with this address, but it is highly recommended to change the IP address. To change the IP address In the IP Address Configuration section, 15 Wavion...
  • Page 16 Managing the System Configuration 1. For a DHCP obtained address, select DHCP. Following a reboot, the WBS-2400 will automatically obtain and IP address, Subnet mask, and Default Gateway from the DHCP server. 2 To allow entry of a new IP address, select Static from the Configured Boot Protocol dropdown list.
  • Page 17: Saving Changes

    The Software Upgrade tab shows details about the current software version and allows setting properties required to install a new software version. It is also possible to return to the factory default software, backup the current version of the software and return to a previously backed up version of the software. 17 Wavion...
  • Page 18: Managing The System

    Managing the System Configuration Figure 2.2 Software Upgrade Tab Returning to the Default Software Version You can reinstall the default software version, using one of two options: 1.1. Default Except IP – In this case, the unit will lose its current setting without changing the IP address.
  • Page 19 To back up the current version of the software • Click Backup. The current version of the software is saved, and can be restored to the system if necessary. Restoring the Last Saved Software Version 19 Wavion...
  • Page 20: Managing The System Configuration

    Managing the System Configuration If you backed up a software version before upgrading to a new one, it is possible to return to the previous version. To return to a previous system software version • Click Restore. The last backed up version of the system software is restored to the system. Managing the System Configuration On the System Configuration tab you can manage current system configuration file name and the configuration management parameters.
  • Page 21: Exporting The Current Startup Configuration File

    1. Click on the name of the current software configuration. A File Download dialog box will appear listing the Name, Type, and From IP address. A File Download dialog box will appear listing the Name, Type, and From IP address. 21 Wavion...
  • Page 22: Importing A New System Configuration File

    Managing the System Configuration A Save As dialog box will appear. 5 Choose the save in folder, create the correct File name, and click on the Save button. Importing a New System Configuration File To import a new system configuration Select the import protocol to be used, either TFTP or HTTP.
  • Page 23: Managing The System

    Although WBS-2400 antennas can be detached from the unit, they should be considered as integral part of the WBS-2400. The beamforming capability takes into account the specific attributes of the antennas. Replacement of antenna should never be done without official instructions from Wavion Technical Support person 23 Wavion...
  • Page 24: Debug Interface

    Software and Hardware. In case of faulty system behavior you may be asked by a Wavion technical support member to save the file listed in the Debug Interface page, or to enter a code that will generate special file for engineer's inspection.
  • Page 25 File List This list contains debugging files that helps Wavion technical support to define HW or SW problems in field. Please send this file to Wavion technical support for analyzing your system conditions. 25 Wavion...
  • Page 26: Managing Network Interfaces

    Managing Network Interfaces Chapter 3 Managing Network Interfaces You can view the status of the network interfaces. There is a summary page and a separate page where each interface can be managed. Viewing the Network Interfaces Summary To view the Network Interfaces Summary page •...
  • Page 27 Options Apply Click to have your changes take effect temporarily Save Click to have your changes remain in effect after a reboot Cancel Click to clear your changes; this is only possible if Apply or 27 Wavion...
  • Page 28: Managing The Ethernet Interface

    Managing Network Interfaces Table- 3.1 Network Interfaces Summary page Field Description Save were not clicked Managing the Ethernet Interface The Ethernet page displays status and configuration parameters, and statistics information for the Ethernet interface. To view the Ethernet interface parameters and statistics. •...
  • Page 29 Indicates whether transmission through the interface is Duplex full duplex or half duplex Default VLAN of this interface, when working in VLAN Default VLAN mode Options Negotiation Auto/Manual Link Speed 10/100 Duplex Full/Half Figure 3.4 Ethernet Page for systems with embedded switch 29 Wavion...
  • Page 30: Managing The Wireless Interface

    Managing Network Interfaces Table- 3.3 Ethernet page ( embedded switch) Field Description for each Ethernet port: Configuration ETH A, ETH B, ETH C Port Enable/Disable of the port Negotiation Auto/Manual Speed Link Speed [Mbps]-Options: 10/100 Indicates whether transmission through the interface is Duplex full duplex or half duplex-Options: Full/Half Option for POE output from Ethernet port B (ETH B).
  • Page 31 Managing Network Interfaces Figure 3.5 Wireless Page The following fields appear on the Wireless page: Table- 3.4 Wireless page Field Description Status and Configuration Operational Status Up/Down BSSID Identifier MAC address of the BST 31 Wavion...
  • Page 32 Managing Network Interfaces Table- 3.4 Wireless page Field Description The wireless channel used by the unit. See Setting the Operational Channel Operational Channel Default Max=1 for maximum Tx Power and Min=6 for Transmission Power lowest Tx Power. It's a 3dB steps. Should be set to maximum for most applications.
  • Page 33 (in Percentage from the 100% of the total time). Selects the basic rates that will be supported for Basic Rates Mode wireless traffic: b+g mode: 802.11 b and 802.11g rates will • 33 Wavion...
  • Page 34 Managing Network Interfaces Table- 3.4 Wireless page Field Description be supported b only: Only 802.11b rates will be supported • g only: Only 802.11g rates will be supported • Data Rates The Basic Rate Set is the set of rates (modulations) that the CPE must support in order to connect to the BST.
  • Page 35: Setting The Operational Channel

    Default is Channel 6: 2437 MHz. Setting the Transmission Power Be sure the Transmission Power is set to the maximum; the radio button in this field should be set on the setting closest to the word Max. 35 Wavion...
  • Page 36: Selecting The Interference Handling Mode

    Managing Network Interfaces Selecting the Interference Handling Mode Normal Mode The default Interference Handing Mode is . This mode adaptively changes the system sensitivity according to the interference conditions in the environment. In some cases, Normal Mode using the other modes may result in better performance than due to limitations with tracking the exact interference.
  • Page 37: Automatic Channel Selection

    The scanning activation and results retrieval are available by SNMP to enable centralized operation of the channel scanning and selection. Note: During ACS scan, the WBS-2400 is not operational: No traffic from or to the BST. How to initiate Scan in Standalone Mode: 37 Wavion...
  • Page 38 Managing Network Interfaces Pressing scan button in the ACS page will initiate the scan process. During the process, the system will reboot to Scan Mode, perform the scan and afterwards will automatically reboot back to Operational Mode. Note: During scan mode the system will not be operational, i.e. clients will not be able to associate, although beacons will continue to be transmitted.
  • Page 39 Total CCA activity Total activity in the selected channel in percentage Noise level Level of the noise as measured by the BST Transmit failure rate Percentage of the times that the system failed to transmit due to the channel’s activity 39 Wavion...
  • Page 40: Self Backhaul

    Managing Network Interfaces Self Backhaul To reduce backhaul cost, Wavion's software feature allows operating a radio link between WBS-2400 units with up to 5 units per cluster: one central and up to 4 remote.. This feature is based on in-band wireless backhaul connectivity with the link gain of 156dB for 6Mbps and 136dB for 54Mbps allowing to create links of up to 20Km distance in Line of Sight (LOS).
  • Page 41 • Remote - The satellite BST that connects wirelessly to the central. Beamforming Backhaul configuration The Wavion Self backhaul: Support for up to 4 Self Backhaul links between Remote BST and central BST Deployment support tools for minimal field configuration of Self backhaul links through wireless media "scan"...
  • Page 42 Note: Only Wavion BSTs that configured to Central mode will be displayed in remote-scan. A list of all the BSTs found in the scan regardless of their vendor or mode appears in the Beacon detection results file in the Debug Interface.
  • Page 43 Step 3: Install Remote-BST Run Remote-Scan Select the desired Central BST by click on entry in table. Remote 1 will reboot in the desired channel with proper configuration Step 4: Execute Central-Scan and add Remote units to Central-BST 43 Wavion...
  • Page 44 Managing Network Interfaces Central Configuration 1. Set the BST role to Central 2. The page will change automatically to Central BST configuration page. 3. Configure the Network parameters 4. Logical network ID 5. Cluster ID 6. Configure the Remote base stations 7.
  • Page 45: Remote Configuration

    Normal mode is to fine-tuning Point-to-Point Backhaul Aggressive mode is to fine-tuning Point-to-MultiPoint Backhaul After you perform all of the above steps the BST's should be connected wirelessly via the Wavion Self-Backhaul link. Remote Configuration 1. Set the BST role to Remote The page will change automatically to Remote BST configuration page.
  • Page 46 Managing Network Interfaces Figure 3.10 Self Backhaul Configuration page To verify the connection qualities go to page: Network Interfaces Self Backhaul Connected BST The connection between the BST should be good or better. Figure 3.11 Connected BST page Rev 3.1 User Manual...
  • Page 47 Scan Mode, perform the scan and afterwards will automatically reboot back to Operational Mode. During scan mode the system will not be in operation, i.e. client will not be able to associate, although beacons will continue to be transmitted. 47 Wavion...
  • Page 48: Bridge

    Managing Network Interfaces How to return to Operational Mode: The system will automatically return to operational mode with the previous selected channel after the scanning. During any time in which the system is not in operational mode, selecting channel from "Operational channel"...
  • Page 49 If the operator wished to limit the amount of multicast packets that are flooded from the Ethernet backhaul to the wireless, the configuration should be done on the Wireless field.In both cases the limit is determined by Kbps (kilo bits per second). 49 Wavion...
  • Page 50 Managing Network Interfaces ARNING if the multicast limit is very low, i.e. most of broadcast and multicast packets are dropped, including ARP and DHCP. This may result in difficulties to establish any type of connection. Figure 3.13 Limiting the multicast rate Peer traffic policing When peer-2-peer communication is blocked, all wireless clients are expected to communicate only with the Default GW.
  • Page 51 Managing Network Interfaces Figure 3.14 Blocking peer-to-peer traffic For each EtherType that is valid in this table, the LLC encapsulation 802.1H bridge tunnel encapsulation format is used. Otherwise, RFC1042 applies. Figure 3.15 LLC Encapsulation 51 Wavion...
  • Page 52: Viewing Associated Stations

    Viewing Associated Stations Chapter 4 Viewing Associated Stations The Association menu item allows you to view parameters of stations associated to the system. Viewing Stations To view a summary of associated stations • Click the Association menu item. The following summary chart appears if there are associated stations in the system. Figure 4.1 Association Statistics The following fields appear on the Association Statistics page:...
  • Page 53: Viewing Associated Stations

    PHY Rate (modulation) at which the associated station currently transmits to the base station SSID SSID to which the associated station is associated VLAN VLAN name to which the station is bound. Tx[Bytes] Number of bytes transmitted by BST to the station 53 Wavion...
  • Page 54: Viewing Specific Stations

    Viewing Associated Stations Rx[Bytes] Number of bytes received by the BST from the station RSSI[dBm] The Received Signal Strength Indicator power received by the BST from the associated station. State State of which the station is connected Reset Counters Reset the Tx and Rx bytes counters Add to white list When MAC filtering is active, adds the specific station to a list of accepted clients.
  • Page 55 Figure 4.4 Station Detailed Information tab part 1 In the above screen, the top of the tab is shown. RF Switching Related Information page is shown when the plus [+] sign is clicked. 55 Wavion...
  • Page 56 Viewing Associated Stations The Rx Rates are shown in the same way: Figure 4.5 Station Detailed Information tab part 2 Rev 3.1 User Manual...
  • Page 57 This counter increments every time the Retry Counter (below) Retry Limit Reached Counter reaches its limit (64). Retry Counter A counter of the retransmissions to this associated station. The listen interval of the client specified during association to the Station's Listen Interval BST. 57 Wavion...
  • Page 58 Viewing Associated Stations Time since first packet is If station is in Power Save mode, the amount of time for which the pending if station is in Doze first packet received is waiting to be delivered mode Last Activity Number of minutes since the station was last active. If a station is not active for this number of minutes, the BST will Inactivity Timeout de-authenticate it due to inactivity.
  • Page 59: Mac Filtering

    MAC filtering is a feature that enables the user to limit the maximal number of stations to be associated to the WBS-2400. It also allows the creation of “white” or “black” lists to control the identity of the stations to be associated. Figure 4.7 MAC Filtering main page 59 Wavion...
  • Page 60 Viewing Associated Stations When MAC filtering is enable, the following fields appear: Figure 4.8 MAC Filtering options Field Description Generic rules Maximal number of stations allowed to connect. Any connection request after the maximal number of Max number of stations connections is reached will be refused.
  • Page 61: Qos In Wbs-2400

    In the Uplink, the CPE will tag the frame with a specific priority. WMM provides the priority classification on the wireless side, again, according to the table. Note: WBS should be set to work with tagged VLAN in order to support QoS. 61 Wavion...
  • Page 62: Managing System And Station Security

    Managing System and Station Security Chapter 5 Managing System and Station Security Introducing IEEE 802.11 and WBS-2400 Security Concepts IEEE 802.11 security is supported by the WBS-2400. The primary BSSID, all associated stations share the same wireless media and therefore have a single broadcast domain.
  • Page 63: Authentication Combinations

    The exact method is decided according to the packet that comes from the client. If multiple VLANs are defined over such an SSID, a client that is authenticated using PSK gets assigned to the default VLAN, while the clients that authenticate using RADIUS have their VLAN determined by the RADIUS. 63 Wavion...
  • Page 64: Encryption Methods

    Managing System and Station Security Encryption Methods Legacy 802.11 clients may connect Open (no encryption), or WEP. In WEP, the encryption key can be either 40bit or 104bit. In WPA, WBS-2400 supports TKIP encryption. Since some clients may be legacy (supporting only WEP), WBS-2400 has the capability to have SSIDs that support both WEP and TKIP clients.
  • Page 65 Managing System and Station Security Configuring RADIUS Server Parameters In case RADIUS Authentication is required choose WPA2 Radius from the Authentication drop down menu to open the Radius Servers configuration. Make changes as needed. Radius Servers Configuration 65 Wavion...
  • Page 66 Managing System and Station Security RADIUS Servers Configuration Field Description RADIUS Server IP IP Address of the RADIUS Server. If more than 1 address Address appears in the list, the following RADIUS Servers are used as backup (only if the previous RADIUS Servers cannot be reached).
  • Page 67 The SSID-VLAN page displays. This page allows management of the security configuration. It is recommended to rename the SSID. Figure 5.1 SSID Table Page Note: Only the Primary SSID (the first SSID) is advertised in Beacons. These additional SSIDs are hidden SSIDs. 67 Wavion...
  • Page 68 Managing System and Station Security The following information is displayed on the SSID Table. Table- 5.2 SSID Table Field Description Enabled Indicates whether the SSID is enabled or not SSID Name The full SSID string Security Parameters Authentication The specific Authentication method as defined for the SSID Encryption The specific Encryption method as defined for the SSID.
  • Page 69 Editing SSID Page Field Description Identity Rename SSID Wavion is the default SSID. Set new name for the SSID; the SSID is case-sensitive, and less than 32 characters SSID Index It's a chronological numbering for the SSID Table SSID Enabled Primary Broadcast is always Enabled.
  • Page 70 Managing System and Station Security Table- 5.3 Editing SSID Page Field Description WPA2 mixed mode PSK WPA2 mixed mode Radius WPA2 mixed mode PSK + Radius Encryption None WEP/40 WEP/104 TKIP TKIP+WEP/40 TKIP+WEP/104 AES + TKIP Exclude Unencrypted When this checkbox is marked, the BST excludes incoming packets that are unencrypted.
  • Page 71: Configuring Wep Security

    Security Configuration WEP Key # The key # (1-4) indicates the index of the WEP Key. The Key value is the hexadecimal value of the WEP key as stored in HW. For the WEP/40 this key holds 10 hexadecimal 71 Wavion...
  • Page 72: Configuring Wpa Security

    Managing System and Station Security Table- 5.4 Editing SSID WEP Page Field Description characters, for WEP/104 this key holds 26 hexadecimal characters. Options Apply Click to have changes take effect temporarily Save (from the Menu) Click to have changes remain in effect after a reboot Cancel Click to clear your changes;...
  • Page 73: Configuring Radius Server Parameters

    Managing System and Station Security Editing SSID - WPA Security Mode Configuring RADIUS Server Parameters • In case RADIUS Authentication is required choose WPA Radius from the Authentication drop down menu to open the Radius Servers configuration. Make changes as needed. 73 Wavion...
  • Page 74 Managing System and Station Security Radius Servers Configuration Table- 5.5 RADIUS Servers Configuration Field Description RADIUS Server IP IP Address of the RADIUS Server. If more than 1 address appears Address in the list, the following RADIUS Servers are used as backup (only if the previous RADIUS Servers cannot be reached).
  • Page 75: Configuring Wpa2 Security

    • For the Security Keys, select either by Value or by Pass Phrase and enter the appropriate value Editing SSID – WPA2 Security Mode Configuring RADIUS Server Parameters • In case RADIUS Authentication is required choose WPA2 Radius from the Authentication drop down menu to open the Radius Servers configuration. Make changes as needed. 75 Wavion...
  • Page 76 Managing System and Station Security Radius Servers Configuration Table- 5.6 RADIUS Servers Configuration Field Description RADIUS Server IP IP Address of the RADIUS Server. If more than 1 address appears Address in the list, the following RADIUS Servers are used as backup (only if the previous RADIUS Servers cannot be reached).
  • Page 77: Vlan Introduction And Configuration

    1.2. Click an SSID name to edit its parameters (e.g. VLAN2) to edit its parameters. Click Add VLAN at the bottom right of the window to configure the VLAN Parameters. The Add VLAN section of the page is displayed. 77 Wavion...
  • Page 78 Managing System and Station Security Editing SSID Page with Add VLAN Section 1.3. In the Rename SSID field, enter an SSID Name to be used in Probe Responses. Check the SSID Enabled checkbox. This enables the SSID. Configure all security parameters: Mode, Authentication, and Encryption as required. See Security Modes: Authentication and Encryption Methods.
  • Page 79 Managing System and Station Security Editing SSID Adding VLAN WEP 79 Wavion...
  • Page 80: Configuring Multiple Vlans Per Ssid

    Managing System and Station Security Editing SSID Add VLAN WPA Configuring Multiple VLANS per SSID The SSID acts as a "security template" - it determines the general security mode (WPA, WEP, etc.). The Security details (the keys themselves) are linked to the VLAN. Therefore, there is an option to assign multiple VLANs to the same "security template"...
  • Page 81: Configuring Radius Assigned Vlans

    RADIUS does not provide the assignment to VLAN (due to possible configuration problems in the RADIUS). Make sure you configure the RADIUS server to handle clients on multiple VLANs. Make sure that access to the RADIUS Server, including the Shared Secret, is configured correctly. 81 Wavion...
  • Page 82: Viewing The Security Page

    Managing System and Station Security You can manage system users and their passwords, as well as system security parameters. This chapter covers the following main areas: • Administration in Viewing the Management Configuration Page Authentication in HTTP Configuration • SSID and VLANs this area contains a full description of the concepts of VLANs and SSIDs in •...
  • Page 83: Viewing The Management Configuration Page

    HTTP configurations. Each section is separate, and has its own Apply and Cancel buttons. To view the Management Configuration page • Click Administration, either from the Security page, or from the menu bar, as a sub-menu under the Security item. The Management Configuration page displays. 83 Wavion...
  • Page 84 Managing System and Station Security Management Configuration Page The following fields appear on the Management Configuration page: Table- 5.8 Management Configuration page Field Description Use to change password or add new users to manage the unit; see HTTP/CLI Users below When registering a new user, enter user name;...
  • Page 85 Click to have changes take effect temporarily Click to have changes made on this page remain even after a Save (on menu bar) reboot. Click to clear changes made; Cancel only works on changes where Cancel neither Save or Apply was clicked 85 Wavion...
  • Page 86: Management Vlan

    Managing System and Station Security To change a password 1.1. In the HTTP/CLI Users section, select the user name for which you want to change the password in the username dropdown box. Enter a new password in the New Password field. A password contains at least 6 characters. Re-enter the new password in the Confirm Password field.
  • Page 87: Http Configuration

    The Authentication pages allow you to configure authentication parameters. To view the Authentication pages • Click Authentication, either from the Security page, or from the menu bar, as a sub-menu under the Security item. The Authentication pages display. 87 Wavion...
  • Page 88 Managing System and Station Security Authentication Tab The following fields appear on the Authentication tab. Table- 5.9 Authentication tab Field Description Re-Authentication interval and Caching Parameters Re-Authentication Threshold It indicates the threshold in time after which the re- authentication will occur. By default, after 70% of 43200 seconds which is 8.4hours, each client will have to pass re-authentication.
  • Page 89 Click to have changes made on this page remain even after a reboot. Cancel Click to clear changes made; Cancel only works on changes where neither Save or Apply was clicked Modifiable fields on this page are indicated in the table. 89 Wavion...
  • Page 90: Viewing Events

    Viewing Events Chapter 6 Viewing Events You can view and configure logs of system events. Viewing the Most Recent Events The Event Log page displays the systems most recent events. To display the event log • Click Event Log in the menu. The log of most recent system events displays.
  • Page 91: Viewing The Full Event Log

    At the top of the page are controls allowing you to navigate through the pages, and select how many events are shown per page. Figure 7.1 Full Event Log Page 91 Wavion...
  • Page 92: Navigating The Event Log

    Viewing Events The following fields appear on the Full Event Log page: Table- 6.2 Full Event Log page Field Description Total Events Number of total events in log Events per page Number of events shown per page; modifiable Page navigator Allows paging through log Time Since Uptime The time the event occurred.
  • Page 93: Configuring Event Logs

    The Event Log Control page displays. Figure 7.2 Event Log Control Page The following fields appear on the Event Log Control page. Table- 6.4 Event Log Control page Field Description Action Select the severity levels/types of events logged by each type 93 Wavion...
  • Page 94 Viewing Events Table- 6.4 Event Log Control page Field Description of event information collection mechanism Log to buffer Events marked in this row are logged to the internal buffer Send SNMP trap Events marked in this row are sent to the SNMP trap manager Send SysLog Events marked in this row are sent to the SysLog server Severity Level Events...
  • Page 95 Viewing Events 95 Wavion...
  • Page 96: Upgrading The System Software

    1.2. Administrator password of the unit that is to be upgraded. Default user string leaving admin admin Wavion facility is User: Pass: 1.3. IP address of unit. Default address of each unit leaving Wavion facility is 192.168.1.1/24 (or mask 255.255.255.0) 1.4. Firmware files: v2.5 1.5. Unit to be upgraded Rev 3.1...
  • Page 97 Upgrading the System Software 97 Wavion...
  • Page 98: Firmware Upgrade Procedure

    Upgrading the System Software Firmware Upgrade Procedure Note: To better reflect the value of Wavion products we are changing the name of our product family from Access Points (AP) to Wireless Base Stations (WBS), consequently the existing WS-410 product name will be changed to Wavion WBS-2400.
  • Page 99 Verify that the IP address of the unit is known. The default IP address of a unit leaving • Wavion facility is 192.168.1.1/24 with user name: admin pass: admin Change the IP address of the PC to be in the same subnet as the unit. For example if the •...
  • Page 100 Upgrading the System Software Figure 7.3 System Software Performing Software Upgrades using HTTP The Software Upgrade option shows details about the current software version, and allows you to set properties required to install a new software version. Other options: 1. Return to the factory default software 2.
  • Page 101 Upgrading the System Software Step 3: Reboot the system The system will come up with the new SW version. Figure 7.4 BST new version been uploaded successfully 101 Wavion...
  • Page 102 Upgrading the System Software Step 4: verify a new version is running When the upload has completed successfully and after the Reboot complete, the WEB GUI automatically refreshes the page back to SW Upgrade. Figure 7.5 The new software version is shown Rev 3.1 User Manual...
  • Page 103 Wait for Web page to change to "Reboot the system" Note: It is mandatory to have a TFTP server available on the same subnet with the WBS-2400. Step 3: Reboot the system The system will come up with the new SW version. Figure 7.6 Reboot Window 103 Wavion...
  • Page 104: Roll Back Procedure

    Upgrading the System Software Step 4: verify a new version is running After Reboot is complete, the WEB GUI automatically refresh back to SW Upgrade tab. Figure 7.7 The new software version is shown Roll back procedure Note: You can roll back to Backup version only if you saved a backup version before To return to the system default software version 1.
  • Page 105 If you backed up a software version before upgrading to a new one, it is possible to return to the previous version. To return to a previous system software version • Click Restore. The last backed up version of the system software is restored to the system. 105 Wavion...
  • Page 106: Appendix: Troubleshooting

    Appendix: Troubleshooting Chapter 8 Appendix: Troubleshooting We hope your experience with the WBS-2400 is as smooth as possible. In this section we provide tips to solve some common problems. Basic Troubleshooting Problem Solution Default user and password User: admin Password: admin Unable to Ping or HTTP the New Unit •...
  • Page 107: Led Description

    Ethernet Activity on port B GREEN, SLOW_BLINK Initialization state STATUS RED,STEADY Critical alert GREEN, SLOW_BLINK Operational without connected stations GREEN, STEADY Operational with connected stations AMBER, FAST_BLINK Operational GENERAL_WARNING AMBER, SLOW_BLINK Software RESET AMBER,STEADY Hardware RESET RED, SLOW_BLINK Factory default but IP 107 Wavion...
  • Page 108 Appendix: Troubleshooting LED name Status Description RED, FAST_BLINK Factory default RADIO GREEN, SLOW_BLINK Initialization state RED, STEADY Critical alert GREEN, SLOW_BLINK Operational without connected stations GREEN, STEADY Operational with connected stations AMBER, FAST_BLINK Operational GENERAL_WARNING Rev 3.1 User Manual...

Table of Contents