Page 2
Disclaimer Proxim reserves the right to revise this publication and to make changes in the content from time-to-time without obligation on the part of Proxim to provide notification of such revision or change. Proxim may make improvements or changes in the product(s) described in this guide at any time.
Preface Preface This chapter contains the information on the following: • About this Guide • Products Covered • Audience • Prerequisites • Documentation Conventions • Related Documents About this Guide ® This guide gives a jump-start working knowledge on the ORiNOCO 802.11n Access Points.
Page 6
Caution A warning, that cautions the user of the possible danger. Related Documents For more information, please refer to the following additional documents that are available at the Proxim’s support site http://support.proxim.com. • Quick Installation Guide (QIG): A quick reference guide that provides essential information to install and configure the device.
WLAN. In a typical network environment, the AP Device functions as a wireless network access point to data and voice networks. ® 1.2 About ORiNOCO 802.11n Access Points ® Proxim’s ORiNOCO 802.11n Access Point family comprises of the products tabulated below: Product(s) Description Image ®...
Page 8
1. Multiple high definition IP-surveillance cameras used for monitoring airports, offices, restaurants, warehouses, etc., can be monitored and managed by using a single AP Device. 2. Proxim’s AP Devices exhibit a secure data transfer via high speed network links and over-the-air encryption of data. 3. Enterprise Connectivity: Delivering a secure, flexible, scalable and reliable enterprise class 802.11n standard Data, Voice, and Video for small...
Page 9
Wireless Distribution System (WDS), that helps you establish a Proxim’s high capacity, 802.11n AP Devices support wireless communication between two AP Devices or two Basic Service Sets (BSS), thus allowing you to extend the WLAN or an access point coverage to wide areas.
Introduction 1.3 Multiple-Input-Multiple-Output ® ORiNOCO 802.11n AP Devices support Multiple-Input-Multiple-Output (MIMO) antenna technology that uses multiple antennas at both the transmitting end and receiving end to improve communication performance. The underlying technology of these access point radio(s) are based on a combination of MIMO and OFDM (Orthogonal Frequency Division Multiplexing). MIMO-OFDM combination radios solve interference, fading and multipath problems.
Management and Monitoring Capabilities This chapter contains information on the following: • Managing and Monitoring Capabilities Web (HTTP/HTTPS) Interface — Command Line Interface (CLI) (Terminal Emulators) — Simple Network Management Protocol (SNMP)v1/v2c/v3 — ProximVision ES (PVES) — 2.1 Managing and Monitoring Capabilities A Network Administrator can use the following interfaces to configure, manage and monitor the device.
Page 12
Management and Monitoring Capabilities Port COM1 (default) Baud Rate 115200 Data 8-bit Parity None Stop 1-bit Flow Control None • If you are using Windows 7 operating system, then use Terminal Emulator programs for serial connection. • HyperTerminal Serial Connection is not applicable to AP-8100, as it does not have a serial port. However, you can access the CLI via your LAN (switch, hub and so on), internet, or with an ethernet cable connected directly to your computer’s ethernet Port.
Page 13
These MIB files are available on Proxim's web site at http://support.proxim.com. You need to compile one or more of the above MIBs into your SNMP program’s database before you can manage the device by using SNMP. The MIB can be opened with any text editor, such as Microsoft Word, Notepad, or WordPad.
Page 14
Points - Reference Guide. 2.1.4 ProximVision ES (PVES) ProximVision ES (commonly known as PVES) is Proxim’s Network Management System that helps to manage and administer your wireless network effectively and efficiently. ProximVision ES combines industry-leading functionality with an intuitive user interface, enabling Network Administrators and Help Desk staff to support and control a wireless network.
By default, the IP Address type is set to Dynamic. If there is no response from the DHCP server, then the device will fall back to the IP Address 169.254.128.132. 3.1.1 ScanTool Proxim’s ScanTool (Answer ID 1735) is a software utility that runs on Microsoft's Windows machine. By using ScanTool, you can •...
Page 16
1. Power on, or reset the device http://support.proxim.com 2. To download Proxim’s ScanTool, log on to Proxim’s support site at and search for ScanTool with (Answer ID 1735). Upon successful download, double-click the ScanTool icon on the Windows desktop to launch the program (if the program is not already running).
Page 17
Device Initialization — Bootloader Version (BL-V1.0.2) 7. Click Select Adapter, to change the adapter settings. 8. Locate the MAC address of the device you want to initialize from the Scan List and click Web Config to logon to the Logging onto the Web Interface Web Interface.
Device Initialization 3. Click OK to save the changes. 4. Click Rescan to verify the changes applied. 3.1.3.2 Assigning the IP Address Dynamically : Before setting the IP Address Type as Dynamic, ensure there is a DHCP server on the network. To change the IP Address type from Static to Dynamic, follow these steps: 1.
Page 19
Device Initialization • If the connection is slow or unable to connect, use the Internet Explorer Tools option to ensure that you are not using a proxy server for the connection. • If you are unable to log on to the configuration pages by using default user name and password, please check with the Forced Reload administrator or follow procedures.
Device Initialization 3.3 Home Page Upon successful login, the Home Page screen appears. Figure 3-5 System Summary The home page contains the following information: 1. Device Description: The device description is displayed on the top-right corner of the home page. It displays the system-name, device type, regulatory domain, latest software version supported and firmware version loaded on the device.
Page 21
Device Initialization Before applying commit, the system displays a confirmation message, as shown in the following figure: Figure 3-6 Commit Click OK, if you wish to commit the changed parameters. On successful Commit operation, the following screen appears: Figure 3-7 Commit Status If the configured parameters requires reboot, on committing the following screen appears.
Page 22
Device Initialization Click OK, if you want to reboot the device. • Every parameter requiring REBOOT upon its configuration, is marked with a red asterisk and it is recommended to reboot the device immediately after modifying a rebootable parameter. • If the device does not reboot and redirect you to the HOME Page within 2 minutes, then we recommended you to check the network connectivity and try accessing the page later.
Basic Configuration This chapter contains information on the following: • Basic Configuration • Factory Default Configuration • Parameters requiring Reboot : All the interface (radio) 2 parameters discussed in this chapter are applicable only to a dual-radio device. 4.1 Basic Configuration Tabulated below are the parameters to be configured to operate the AP device at a basic level: Parameter Description...
Basic Configuration SSID Default SSID set on both the radios, is as tabulated below: Device Type SSID Radio 1 Radio 2 AP-800 My Wireless Network 1_1 Not Applicable AP-8000 My Wireless Network 1_1 My Wireless Network 2_1 AP-8100 My Wireless Network 1_1 My Wireless Network 2_1 Virtual Access Point (VAP) For details on how to change SSID, refer to...
Basic Configuration Operational Mode Device Operational Mode (Supported Frequency Band) Type Radio 1 Radio 2 AP-800 802.11g/n (2.4 GHz) Not Applicable AP-8000 802.11a/n (5 GHz) 802.11g/n (2.4 GHz) AP-8100 802.11a/n (5 GHz) 802.11g/n (2.4 GHz) Current Bandwidth 40 MHz VAP SSID Device SSID Type...
Page 26
Basic Configuration Parameter(s) Web Page(s) Address Type IP Address CONFIGURATION - > Network - > IP Configuration Subnet Mask Gateway IP Address DNS Primary IP and Secondary IP Address Radio Mode Country Code CONFIGURATION - > Wireless - > Interface 1/ Interface 2 - > Properties Operational Mode Current Bandwidth Frequency Extension...
Device Configuration This chapter explains the step-by-step procedure to configure the following features on the device, by using Web Interface: • System • Network IP Configuration — Link Integrity — Spanning Tree Protocol (STP) — • Ethernet • Wireless Interface Interface 1 —...
Device Configuration 5.1 System The System feature enables you to configure system specific information. Navigate to CONFIGURATION > System. The System screen appears. Figure 5-1 System Tabulated below are ‘System’ parameters and the method to configure the configurable parameters: Parameter Description System Name Specifies the name assigned to the device.
Page 29
Device Configuration Figure 5-3 Network IP Configuration Tabulated below are ‘Network IP’ parameters and the method to configure the configurable parameters: Parameter Description Address Type By default this parameter is set to Dynamic. When set to dynamic, the device will obtain IP settings from a network Dynamic Host Configuration Protocol (DHCP) server automatically during the boot-up.
Page 30
Device Configuration Primary IP Address Specifies the IP Address of the Primary DNS Server. When the address type is set to Dynamic, this parameter is read-only and displays the DNS Primary IP Address obtained from the DHCP server. If the Address Type is set to Static then you will have to manually enter the IP Address in the Primary IP Address box.
Page 31
Device Configuration Tabulated below are ‘Link Integrity’ parameters and the method to configure the configurable parameters Parameter Description Status Specifies the status of the link integrity feature on the device. By default, it is disabled. To enable, select Enable from the drop down menu. Polling Time Specifies the time interval, during which the device will check the link integrity with its configured server(s) by sending the ICMP echo probes.
Page 32
Device Configuration Figure 5-5 Link Integrity Server Table - Add Row 2. Configure the following properties: Parameter Description Server IP Address Specifies the IP Address of the configured server. Comment Specifies the user comment on the configured server. Entry Status Specifies the entry status of the server.
Page 33
Device Configuration d. Blocking: After selecting the low cost path, the device blocks and disables all the other high cost paths active on other interfaces. Once the path is blocked, no traffic is allowed via that high cost path. e. Forwarding: The device easily forwards the data packet to the destination via single low cost path selected, with zero loops and interference on the bridged network.
Page 34
Device Configuration Figure 5-7 STP Configuration Tabulated below are ‘STP’ parameters and the method to configure the configurable parameters: Parameter Description Status Specifies the status of the STP feature on the AP device. By default, STP is disabled. To enable, select Enable from the drop down menu. : If you enable STP, disable 'Filter STP Frames' in Filters.
Page 35
Device Configuration Bridge Priority Specifies the priority assigned to a bridge. By default, a bridge is assigned with a priority of 4096. To configure, enter a value between 0 - 61440 (as multiples of 4096). : Bridge assigned with the lowest value gets the highest priority, and is selected as Root Bridge.
Device Configuration Entry Status Specifies the status of the selected port. By default, the Entry Status is disabled. To enable, select Enable from the drop down menu. Click OK and COMMIT, to save the configured parameters. 5.3 Ethernet This feature enables you to view and configure the speed and transmission mode of the ethernet interface. Navigate to CONFIGURATION >...
Device Configuration 5.4 Wireless Interface The Wireless feature enables you to use Multiple Input Multiple Output (MIMO) technology, that uses several antennas to transfer multiple data streams thus enabling more data to be transferred in the same period of time. The wireless architecture is based on the cellular architecture where the systems are divided into cells, and each cell is called a Basic Service Set (BSS).
Page 38
Device Configuration Tabulated below are ‘Wireless Interface’ parameters and the method to configure the configurable parameters: Parameter Description Radio Status Specifies the status of the Interface (Radio). By default, it is enabled. To disable, select Disable from the drop down menu. If the radio status is disabled, the interface gets shutdown.
Page 39
Device Configuration Current Bandwidth Specifies the frequency band used to transmit the wireless data. The available bandwidths are 20 MHz and 40 MHz. By default, Current Bandwidth is set to 40MHz. To configure, select a value from the drop down menu. : Set the current bandwidth to 20 MHz, to enable the legacy operational modes of 802.11a or 802.11g.
Page 40
Device Configuration TPC (Transmit Power The AP device transmits maximum output power, as per the selected frequency and country Control) Back-off (regulatory domain). With TPC Back-off, you can adjust the output power of the AP device to a lower level, in order to reduce the interference with the neighboring devices or to use a higher gain antenna without violating the maximum radiated output power allowed for your regulatory domain.
Page 41
Device Configuration Cell Size WDS (Wireless Distribution WDS Cell Size In case of a WDS link (See System) Mode), when the cell size is set from Large to Functionality Micro, Mini, Small or Medium, the transmit power is retained to the maximum value. Data tabulated below are the details that explain the WDS Cell Size Functionality for different Cell Sizes.
Page 42
Device Configuration WDS Optimization Mode : When WDS optimization mode is enabled with configured channel bandwidth of 40 MHz (i.e Dynamic 20/40 Mode), AP will not dynamically switch to 20 MHz bandwidth, when it finds extension channel is busy. DTIM Specifies the number of beacon frames that can be transmitted before another DTIM is transmitted.
Page 43
Device Configuration Channel Blacklist Information A channel is blacklisted when a RADAR is detected in it. The Channel Blacklist Information table lists all the blacklisted channels, which includes the information tabulated below. Parameter Description Channel Number Specifies the channel number of the blacklisted channel. Reason Specifies the reason for blacklisting a channel.
Page 44
Device Configuration Frequency Extension Specifies the frequency extension for the wireless interface. By default, Upper Extension Channel is taken. To configure, select frequency extension between Lower Extension Channel or Upper Extension Channel, from the drop down menu. : Applicable only to 40 MHz bandwidth. Click OK and COMMIT, to save the configured parameters.
Page 45
Device Configuration Figure 5-12 Wireless Interface 1 / VAP in AP Mode - Edit Properties Tabulated below are ‘VAP-AP Mode’ parameters and the method to configure the configurable parameters: Parameter Description Status Specifies the status of the VAP. By default, the first VAP is always enabled and other VAPs are disabled. To enable a VAP, select Enable from the drop down menu.
Page 46
Device Configuration Multicast Rate Specifies the rate at which the multicast data packets are transmitted over the wireless network. By default, the Multicast Rate is 9 Mbps for operational modes 11na/a and 11 Mbps for operational modes 11ng/g. To configure, select the rate of data transmission from the drop down menu.
Page 47
Device Configuration QoS Profile Name Specifies the name of the QoS profile assigned to a wireless VAP. You can configure the QoS Profile name as either ‘Default’ or ‘NONE’. Profile) By default, it is ‘Default’. To configure, enter the QoS Profile Name. (See •...
Page 48
Device Configuration Max Stations This parameter allows you to restrict maximum number of wireless clients that can be associated with each VAP. A maximum of 128 wireless clients can be connected per radio. By default, it is 64 for each VAP. To configure, enter a value ranging from 1 to 128. : A VAP (connected to maximum number of clients) sends a probe response to the probe request from a new client.
Page 49
Device Configuration Figure 5-13 Wireless Distribution System In such a scenario, the MAC address of Access Point 1 is configured on Access Point 2 (within the same vicinity) and vice versa. Once configured, a WDS link is established between BSS 1 and BSS 2. The data transmission over the WDS link follows a four address format, which contains 1) MAC address of the source, 2) MAC address of the destination, 3) MAC address of the transmitting AP device, 4) MAC address of the receiving AP device.
Page 50
Device Configuration Figure 5-14 4 (b) VAP in WDS - 11n Mode Figure 5-14 (a) VAP in WDS - Legacy Mode Tabulated below are the ‘VAP-WDS Mode’ parameters and the method to configure the configurable parameters: Parameter Description Status Specifies the status of the VAP. By default, it is enabled.
Device Configuration : When WDS link is DOWN, the following behavior is expected: • If WDS-END-A and VAP-AP are on same radio, then the VAP-AP transmits the beacons. • All the VAPs on the same interface (radio) as WDS-END-B, stop transmitting the beacons. •...
Page 52
Device Configuration • 802.1x Authentication 802.1x provides an authentication framework for wireless LANs, allowing a user to be authenticated by a central authority. 802.1x uses an existing protocol, the Extensible Authentication Protocol (EAP, RFC 2284), that works on Ethernet, Token Ring, or wireless LANs for message exchange during the authentication process. In a wireless LAN with 802.1x, a user (known as the Supplicant) requests access to an access point (known as the Authenticator).
Page 53
Device Configuration 5.5.1.1 Create a New Security Profile To add a new security profile, click Add in the Wireless Security Configuration screen. The Wireless Security Add Row screen appears. Figure 5-16 Wireless Security Profile - Add Row Tabulated below are the ‘Wireless Security Profile’ parameters and the method to configure the configurable parameters: Parameter Description Profile Name...
Page 54
Device Configuration Authentication Configure the following parameters in WEP authentication mode: Mode Parameter Description This parameter allows you to configure the WEP key for the wireless security. Enter a WEP Key in the Key box. – For 64-bit encryption, an encryption key is 10 hexadecimal characters (0-9 and A-F) or 5 ASCII ASCII Character Chart.
Page 55
Device Configuration Authentication Parameter Description Mode Encryption Type Specifies the Encryption Type. By default, it is taken as WPA-TKIP. To configure, select either WPA-TKIP, WPA2-AES or WPA-WPA2AES-TKIP from the drop down menu. :When Encryption Type WPA-WPA2AES-TKIP, the device supports clients with the encryption type of either WPA-TKIP or WPA2-AES.
Page 56
Device Configuration Authentication Parameter Description Mode Encryption Type Specifies the Encryption Type. By default, it is taken as WEP. To configure, enter the Encryption Type as either WEP, WPA-TKIP, WPA2-AES or WPA-WPA2AES-TKIP from the drop down menu. :When Encryption Type WPA-WPA2AES-TKIP, the device supports clients with the encryption type of either WPA-TKIP or WPA2-AES.
Page 57
Device Configuration Figure 5-20 AP - Edit Wireless Security Profile Configure the following parameters: Parameter Description Profile Name Specifies the name of the Security Profile that is being created. To configure, enter the desired Profile Name. Authentication Specifies the security mode for the wireless network. The Auth Mode may vary between Create a New Security Profile) Mode...
Page 58
Device Configuration • NAS-IP-Address: Specifies the identifying IP Address of the NAS (AP device) which is requesting authentication of the user, and should be unique to the NAS (AP device) within the scope of the RADIUS server. NAS-IP-Address is only used in Access-Request packets.
Page 59
Device Configuration Figure 5-21 RADIUS Server Profile Tabulated below are the ‘RADIUS Server Profile’ parameters and the method to configure the configurable parameters: Parameter Description Profile Name Specifies the RADIUS profile name which is used to identify a set of four RADIUS servers configured one per Accounting, Authentication, Secondary Accounting and Secondary Authentication.
Page 60
Device Configuration Server Port Specifies the number of the port, that the AP device and server use to communicate with each other. To configure, enter the Server Port number in the box. Shared Secret Specifies the password, shared by the RADIUS server and the AP device. To configure, enter a Shared Secret in the box, with a maximum of 64 characters.
Device Configuration 5.5.3.1 Add Wireless Clients to MAC Access Control Table To add a MAC address of a wireless client in the MAC Access Control Table, click Add in the MAC Access Control screen. The MAC ACL Add Row screen appears. Figure 5-23 MAC ACL Add Row Configure the following parameters: Parameter...
Page 62
The EDCA parameters assign priorities to traffic types where higher priority packets gain access to the wireless medium more frequently than lower priority packets. : Proxim recommends you not to modify the default values of EDCA parameters defined in the web interface, unless strictly necessary.
Page 63
Device Configuration The QoS EDCA screen is categorized under two headings, namely, Station EDCA Table and AP EDCA Table. The Station EDCA Table allows you to configure the EDCA parameters for the wireless client, and the AP EDCA Table allows you to configure the EDCA parameters for the AP device.
Page 64
Device Configuration Tabulated below are the ‘QoS EDCA’ parameters and the method to configure the configurable parameters: Parameter Description Access Category Specifies a label for the common set of EDCA parameters that are used by a QoS Station/AP to contend for the channel in order to transmit MSDUs with certain priorities.Available access categories are: –...
Page 65
Device Configuration 5.6.2 802.1d to IP DSCP Navigate to CONFIGURATION > QoS > 802.1d to IP DSCP. The 802.1d to IP DSCP Mapping Table screen appears. Figure 5-26 802.1d To IP DSCP Mapping Table Tabulated below are the ‘QoS 802.1d and IP DSCP (Differentiated Services Code Point) (for layer 3 policies)’ parameters and the method to configure the configurable parameters: Parameter Description...
Page 66
Device Configuration 5.6.3 802.1d to 802.1p Navigate to CONFIGURATION > QoS > 802.1d to 802.1p. The 802.1d to 802.1p Mapping Table screen appears. Figure 5-27 802.1d to 802.1p Mapping Table Tabulated below are the ‘QoS 802.1d and 802.1p (for layer 2 policies) parameters and the method to configure the configurable parameters: Parameter Description...
Page 67
Device Configuration Tabulated below are the ‘QoS Profile’ parameters and the method to configure the configurable parameters: Parameter Description QoS Profile Name Represents the QoS profile name. It is a read-only parameter and cannot be configured. : By default, the available QoS Profile Name is ‘Default’. Policy Name Specifies the QoS policy name.
Device Configuration Policy Type It represents the QoS Policy Type. The available policy types are: – Inbound Layer 2: Represents inbound traffic direction with layer 2 traffic type. – Outbound Layer 2: Represents outbound traffic direction with layer 2 traffic type. –...
Page 69
Device Configuration VLAN tagged data is collected and distributed through the AP device’s wireless interface(s) based on their network names (SSID). Ethernet port on the AP device connects a wireless cell or network to a wired backbone. The AP device can communicate across a VLAN-capable switch that analyzes VLAN-tagged packet headers and directs traffic to the appropriate ports.
Page 70
Device Configuration RADIUS VLAN Status This parameter enables VLAN assignment to AP device’s wireless clients through a RADIUS server. This way of RADIUS based VLAN assignment helps: – To reduce the task of manually configuring VLAN parameters on each wireless client connected to the AP device.
Page 71
Device Configuration : It is recommended to configure the VLAN-Ethernet in Trunk mode, when RADIUS VLAN is enabled. This reduces the interference problems, by sending the VLAN traffic (broadcast/multicast) only to the intended wireless clients. Management VLAN Specifies the Management VLAN ID. The wireless clients must tag the management frames sent to the AP device, along with the management VLAN ID.
Page 72
Device Configuration VLAN Mode Specifies the VLAN mode to be configured on the ethernet interface. You can configure any of the following VLAN modes on the ethernet interface: a. Transparent Mode: Transparent Mode is configurable on the ethernet interface of the AP device.
Page 73
Device Configuration c. Trunk Mode: Trunk Mode is configurable on the ethernet interface of the AP device. It is mainly used to connect a VLAN aware network with an another VLAN aware network. An interface in the Trunk mode only forwards those tagged frames whose VLAN ID matches with a VLAN ID that is present in trunk table.
Device Configuration Configure the following parameters to add a row: Parameter Description Trunk ID Specifies the Trunk Id. To configure, enter the Trunk Id value in the range of 1 to 4094. The maximum Trunk Ids that you can create are 256. Entry Status Specifies the status of the entry being added.
Page 75
Device Configuration Intra BSS Filtering This parameter enables you to prevent the wireless clients within a BSS from exchanging traffic. By default, it is disabled. To configure, select Enable or Disable from the drop down menu. Click OK and COMMIT, to save the configured parameters. AP device supports the following filters: •...
Page 76
Device Configuration Tabulated below are the ‘Protocol Filter’ parameters and the method to configure the configurable parameters: Parameter Description Filtering Control Specifies the interface on which filtering is applied. By default, it is disabled. It can be configured as: – Ethernet: Packets are examined at the ethernet interface. –...
Page 77
Device Configuration Entry Status Specifies entry status of the protocol. By default, it is disabled. To configure, select either Enable/Disable/Delete from the drop down menu. – Enable: Enables the filter status on a protocol. – Disable: Disables the filter status on a protocol. –...
Page 78
Device Configuration • To prevent entire traffic from a specific wired MAC address from being forwarded to the wireless network, configure only the Wired MAC address and Wired Mask (leave the Wireless MAC address and Wireless Mask set to all zeros). •...
Page 79
Device Configuration Prevent all wireless devices Configure the following settings to prevent all The device blocks all traffic between from communicating with a three Wireless Clients from communicating Wired Interface 1 and all wireless single wired device with Wired Interface 1: clients.
Page 80
Device Configuration Tabulated below are the ‘Static MAC Address Filter’ parameters and the method to configure the configurable parameters: Parameter Description Wired MAC Address Specifies the MAC address of the device on the wired network that is restricted from communicating with a device on the wireless network. To configure, enter a Wired MAC Address.
Page 81
Device Configuration Tabulated below are the ‘Advanced Filter’ parameters and the method to configure the configurable parameters: Parameter Description Proxy ARP Status Specifies the status of the Proxy ARP feature on the AP device. By functioning as a Proxy ARP, the AP device helps: –...
Page 82
Device Configuration Figure 5-42 Advanced Filters - Edit Entries Modify the Direction and Status of the desired IP Protocol. Click OK and COMMIT, to save the configured parameters. 5.8.4 TCP/UDP Port Filters Port-based filtering enables you to control wireless user access to network services by selectively blocking TCP/UDP protocols through the device.
Page 83
Device Configuration Figure 5-43 TCP/UDP Port Filters Tabulated below are the ‘TCP/UDP Port Filters’ parameters and the method to configure the configurable parameters: Parameter Description Filter Control Specifies the Filter Control feature on the device. By default, it is disabled. To configure, select Enable or Disable from the drop down menu. TCP/UDP Port Filter Table The TCP/UDP Port Filters screen displays a list of default protocols supported by the device and the protocols created by the user.
Page 84
Device Configuration Status Set the entry status as Enable/Disable/Delete. – Enable: The device filters the TCP/UDP protocols. – Disable: The device allows all the TCP/UDP protocols. – Delete: The device deletes a protocol entry from the Filter Table. : System-defined default protocols entries cannot be deleted. Click OK and COMMIT, to save the configured parameters.
Page 85
Device Configuration Tabulated below are the ‘Storm Threshold Filter’ parameters and the method to configure the configurable parameters: Parameter Description Interface Represents the type of interface to which filters are applied. The Storm Threshold filter can be used to filter the traffic on either ethernet interface or wireless interface. By default, Storm Threshold filtering is disabled on both ethernet and wireless interfaces.
Device Configuration Tabulated below are the ‘Packet Forwarding’ parameters and method to configure the configurable parameters: Parameter Description Status Specifies the status of Packet Forwarding on the AP device. By default, it is disabled. To configure, select Enable from the drop down menu. Gateway MAC Specifies the MAC address of the destined gateway device.
Page 87
Device Configuration Navigate to CONFIGURATION > DHCP > DHCP Server. The DHCP Server screen appears. Figure 5-47 DHCP Server Tabulated below are the ‘DHCP Server’ parameters and method to configure the configurable parameters: Parameter Description DHCP Server Status Specifies the status of the DHCP Server functionality on the device. By default, it is disabled. To configure, select Enable or Disable from the drop down menu.
Page 88
Device Configuration Default Lease Time Specifies the least time provided by the DHCP server, to the DHCP client on that interface. By default, it is 86400 seconds. To configure, enter a value in the range 3600 to 172800 seconds. : If the ‘Default Lease Time’ value is greater than ‘Max Lease Time’, then the DHCP server assigns the Max Lease Time to the DHCP client.
Page 89
Device Configuration DHCP Pool Table End IP address Entry Status Specifies the status of the pool entry. By default, it is enabled. To configure, select Enable or Disable from the drop down menu. Click Add, to save the added entry. : You can add a maximum of five pool entries per interface.
Device Management This chapter contains the following information, that helps you to manage the device by using Web Interface. • System Information — Inventory Management — License Information — • File Management Update Firmware — Update Configuration — Retrieve from Device —...
Page 91
Device Management Figure 6-1 System Information In the System Information screen, you can view and configure the following configurable parameters: Parameter Description System Up-Time Represents the operational time of the device since its last reboot. It is a read-only parameter and cannot be configured.
Page 92
Device Management GPS Longitude Specifies the longitude at which the device is installed. To configure, enter a longitude value of maximum 255 characters (in the format required by your Network Management System) in the GPS Longitude box. GPS Latitude Specifies the latitude at which the device is installed. To configure, enter a latitude value of maximum 255 characters (in the format required by your Network Management System) in the GPS Latitude box.
Page 93
Device Management Figure 6-3 License Information : The above screenshot represents the licensed information of AP-8100. Licensed Features vary depending on your device. You can view the following license information: Parameter Description Product Description Specifies the device description. Number of Radios Specifies the number of radios that the device is licensed to operate with.
Device Management Allowed Operational Specifies the operational modes allowed on the wireless interface (radio) 2. Modes of Radio 2 MAC Address of the Specifies the MAC address of the device. Device 6.2 File Management The File Management tab enables you to upgrade the firmware and configuration files onto the device, and retrieve configuration and log files from the device through Hypertext Transfer Protocol (HTTP) and Trivial File Transfer Protocol (TFTP).
Page 95
Device Management Figure 6-5 Update Firmware by using TFTP 2. Configure the following parameters: Parameter Description Server IP Address Enter the TFTP server IP address. File Name Enter the name of the firmware file (including the file extension) to be downloaded onto the device.
Page 96
Device Management Figure 6-6 Update Configuration by using HTTP Retrieve from Device 2. In the HTTP screen, click Browse to locate the configuration file retrieved using option. Select • ‘.cfg’ for binary configuration file and config profile file • ‘.xml’ for text based configuration file : The file name should not contain any spaces or special characters.
Page 97
Device Management Figure 6-7 Update Configuration by using TFTP - Binary Config a. Configure the following parameters. Parameter Description Server IP Enter the TFTP server IP address. Address File Name Enter the Binary file (including the file extension) to be downloaded onto the device. b.
Page 98
Device Management b. Click Update, to update the device with new configuration file. c. Click Load, to apply the updated changes. d. Click Update & Load, to update and load the configuration file onto the device. 5. To update the device with Config Profile files, select Config Profile. Figure 6-9 Update Configuration by using TFTP - Config Profile a.
Page 99
Device Management Figure 6-10 Retrieve From Device by using HTTP 2. Configure the following parameters: Parameter Description File Type Specifies the type of file that you want to retrieve from the device. To configure, select any of the following File Type from the drop down menu. –...
Page 100
Device Management Select the parameters to exclude and click Create Profile. Next, click Retrieve. Update Configuration, to update the target device with the retrieved config profile. Once updated, the target device comes up with the configuration of the master device, by excluding the selected unique parameters. : Config Profile is applicable only to the compatible devices.
Page 101
Device Management File Type Specifies the file type that you want to retrieve from the device. To configure, select any of the following File Type from the drop down menu. – Config: Specifies the configuration files of the device. – Event Log: Specifies the Event Logs from the device. –...
Page 102
Device Management 6.2.3.3 Text Based Configuration (TBC) File Management Text Based Configuration (TBC) file is a simple text file that holds device template configurations. The device supports the TBC file in XML format which can be edited in any XML or text editors. You can generate the TBC file from the CLI session and manually edit the configurations and then load the edited TBC file onto the device so that the edited configurations are applied onto the device.
Page 103
The TBC file can easily be opened and edited in any standard Text-Editors like Wordpad, MS-Word, Notepad++, Standard XML Editors. Proxim recommends XML Notepad 7 editor for editing the TBC file. Do the following to edit the TBC file. •...
Device Management 6.3 Services The Services feature allows you to configure the management interface (HTTP/HTTPS, Telnet/SSH and SNMP) and SYSLOG host table parameters that prevent from unauthorized access to the device. 6.3.1 HTTP/HTTPS Navigate to MANAGEMENT > Services > HTTP/HTTPS. The configuration screen appears. Figure 6-16 HTTP/HTTPS Configure the following parameters in the HTTP/HTTPS screen: Parameter...
Page 105
Device Management 6.3.2 Telnet/SSH In the Web Interface, navigate to MANAGEMENT > Services > Telnet/SSH. The configuration screen appears. Figure 6-17 Telnet/SSH Configure the following parameters in the Telnet/SSH screen: Parameter Description Password Specifies the password that is required to log on to the CLI. By default, the password is set to public.
Page 106
Device Management SSH Port Specifies the number of the port on the SSH interface. By default, the SSH Port number is 22. To configure, enter a new port. SSH Sessions Specifies the number of SSH sessions which controls the number of active SSH connections. By default, the number of SSH Sessions allowed is 1.
Page 107
Device Management Version Specifies the SNMP versions v1-v2c or v3. By default, the SNMP version is v2c. • If you select the SNMP version as SNMP v1-v2c, the following configuration screen appears: Figure 6-18 SNMP Version - SNMPv1-v2c Configure the following parameters: Parameter Description Read Password...
Page 108
Device Management • If you select the SNMP version as SNMP v3, then following configuration screen appears: Figure 6-19 SNMP Version - SNMPv3 Configure the following parameters: Parameter Description Security Level Specifies the security level of the device. AP device supports the following security levels: –...
Page 109
Device Management Version Priv Password Specifies the pass key for privacy protocol selected. The default password is public123. To configure, enter a new password ranging from 8 to 32 characters. : Priv Password is applicable only when the security level is set to AuthPriv. Auth Protocol Specifies the type of Authentication protocol.
Page 110
Device Management Figure 6-20 SNMP Trap Host Table Add Row Configure the following parameters: Parameter Description IP Address Specifies the IP address to which SNMP traps will be delivered. To configure, enter the IP address in the IP Address box. Password To access SNMP traps, enter password in the Password box.
Page 111
Device Management Configure the following parameters: Parameter Description Log Status Specifies the status of the system log. To configure, select either Enable or Disable from the drop down menu. If enabled, it allows the device to generate log messages. Log Priority Specifies the priority assigned to the log.
Device Management Figure 6-22 SYSLOG Host Table Add Row Configure the following parameters: Parameter Description IP Address Enter the IP address of the SYSLOG server in the IP Address box. Host Port Enter a Host Port in the range of 0 to 65535, in the Host Port box. Comment Enter any comments in the Comment box.
Device Management Parameter Description Enable SNTP Status Specifies the status of the SNTP feature on the device. Select Enable SNTP Status checkbox to synchronize the date and time of the device with the SNTP time server. Primary Server IP Specifies the host name or the IP address of the primary SNTP server. Address / Domain Name To configure, enter the Primary Server IP Address/Domain Name.
Page 114
Device Management Configure the following parameters: Parameter Description Access Table Status Specifies the status of the Access Control on the AP device. By default, the Management Access Control is disabled on the device. To enable it, select Enable from the drop down menu. IP Address Specifies the IP address of the machine that would manage the device.
Device Management 6.6 Reset to Factory The ‘Reset to Factory’ feature allows you to reset the device to its factory default state. When this operation is performed, the device will reboot automatically and operates with the factory default configuration. To reset the device to its factory defaults, navigate to MANAGEMENT > Reset To Factory. The Factory Reset screen appears.
Page 116
Device Management : In case, the ‘Reload Functionality Status’ is disabled and user cannot access the AP device, then follow the following steps to recover the device. • Step-1: Unplug the power cable. • Step-2: Press and hold the reload button on the device. •...
Device Monitoring This chapter contains the step-by-step procedure to monitor the following features of the device, by using Web Interface: • Interface Statistics • Station Statistics • Rogue Scan Statistics • Bridge Bridge Statistics — Learn Table — • Network Layer IP Address Resolution Protocol (ARP) —...
Page 118
Device Monitoring Figure 7-1 Ethernet Interface Statistics The Ethernet Interface Statistics screen contains the following information. Ethernet Interface Statistics Parameter Description Type Specifies the type of interface. Specifies the largest size of the data packet transmitted on the bridge. Physical Address Specifies the MAC address of the interface Operational Status Specifies the current operational status of the ethernet interface.
Page 119
Device Monitoring Out Unicast Packets Specifies the total number of packets that are requested by the higher level protocol and transmitted to the non-unicast address. Out Discards Specifies the number of error-free outbound packets that are discarded to free up the buffer space.
Page 120
Device Monitoring Figure 7-2 Wireless Interface Statistics The Wireless Interface Statistics screen contains the following information. Wireless 1/Wireless 2 Interface Statistics Parameter Description Operational Status Specifies the current operational status of the interface. In Errors Specifies the number of inbound packets with errors and that are restricted from being delivered.
Device Monitoring Tx RTS Failures Specifies the total number of RTS frames requests that receive no response. Tx Fragment Count Specifies the total number of fragments that are transmitted and acknowledged. Rx Fragment Count Specifies the total number of fragments that are transmitted and received successfully. Tx Failed Count Specifies the total number of undelivered frames.
Page 122
Device Monitoring IP Address Specifies the IP address of the wireless client. • IP Address is not applicable to a WDS enabled wireless client. By default, it is “0.0.0.0”. • IP Address is not applicable, if Proxy ARP is disabled. VAP Number Specifies the VAP number enabled on either interface 1 or interface 2.
Device Monitoring Figure 7-4 Station Statistics - Edit Click Refresh, to view the updated Station Statistics. 7.3 Rogue Scan Statistics Rogue Scan allows you to monitor all the wireless devices (AP/STA/WDS/ADHOC) and rogue AP devices detected, within the vicinity of your device. It provides with the statistics of all the devices detected under Current Channel Scan Mode or All Channel Scan Mode.
Page 124
Device Monitoring Figure 7-5 Wireless Interface 1 Rogue Scan Statistics The Rogue Scan Statistics screen, contains the following information: Parameter Description SSID Specifies the SSID of the detected device. MAC Address Specifies the MAC address of the detected device. (BSSID) Device Type Specifies the device type (AP, STA, Adhoc, WDS and other devices) detected.
Device Monitoring 7.4 Bridge The device serves as a bridge between the wired and the wireless networking devices. 7.4.1 Bridge Statistics The Bridge Statistics allows you to monitor the statistics of the Bridge. To view bridge statistics, navigate to MONITOR > Bridge > Bridge Statistics. The Bridge Statistics screen appears. Figure 7-6 Bridge Statistics The Bridge Statistics screen contains the following information: Parameter...
Device Monitoring Out Octets Specifies the total number of octets transmitted out of the bridge. Out Unicast Packets Specifies the total number of packets requested by the higher level protocol and then transmitted to the non-unicast address. Out Discards Specifies the number of error-free outbound packets which are discarded to free up buffer space.
Page 127
Device Monitoring Parameter Description Index Specifies the interface type. Physical Address Specifies the MAC address of a node on the network. Net Address Specifies the corresponding IP address of a node on the network. Type Specifies the type of mapping, that is dynamic or static. Click Refresh, to view updated IP ARP Table statistics and click Clear, to clear the IP ARP Table statistics.
Page 128
Device Monitoring In Time Excds/Out Specifies the number of ICMP time exceeded messages that are received or transmitted by Time Excds the device. In Parm Probs/Out Specifies the number of ICMP parameter problem messages that are received or transmitted Parm Probs by the device.
Device Monitoring 7.6 RADIUS 7.6.1 Authentication Statistics Authentication statistics provide information on RADIUS Authentication for both the primary and backup servers for each RADIUS server profile. To view authentication statistics, navigate to MONITOR > RADIUS > Authentication Statistics. The RADIUS Client Authentication Statistics screen appears.
Page 130
Device Monitoring Timeouts Specifies total number of time-outs for RADIUS access request messages since client startup. Unknown Types Specifies the number of messages with unknown RADIUS message code since client startup. Pkts Dropped Specifies the number of RADIUS packets dropped by the device. Click Refresh, to view updated RADIUS Client Authentication statistics.
Device Monitoring Unknown Types Specifies the number of messages with unknown RADIUS message code since client startup. Pkts Dropped Specifies the number of RADIUS accounting packets dropped by the device. Click Refresh, to view updated RADIUS Client Accounting statistics. 7.7 Logs 7.7.1 Event Log Event Logs track all the events that occur during the operation of the device and display the event occurring time, event type, and the name of the error or the error message.
Click Clear SysLog, to clear the system logs and click Refresh, to view updated system logs. 7.8 Console Commands The Console Commands feature helps Proxim’s Technical Support team to debug field issues. 7.9 SNMP v3 Statistics To view SNMP v3 Statistics, navigate to MONITOR > SNMP V3 Statistics. The SNMP v3 Statistics screen appears.
Page 133
Device Monitoring Figure 7-15 SNMP V3 Statistics The SNMP v3 Statistics screen contains the following information: Parameter Description Unsupported Sec Specifies the total number of packets received by the SNMP engine which were dropped Levels because they requested a security level that was unknown to the SNMP engine or otherwise unavailable.
Device Management. • We recommend you to check our support site http://support.proxim.com, if the procedures discussed in this chapter do not provide a complete solution to your problem. • In some cases, rebooting the device clears the problem. If nothing helps, consider...
Troubleshooting • There is No Data Verify that the indicator on the device port is “ON.” Link Established • Verify that the PoE Injector hub is properly connected to the ethernet port of the device. • Verify that the ethernet cable is Category 5 or better and is less than 100 meters (approximately 325 feet) in length from the ethernet port of the device to the PoE.
Page 136
Troubleshooting • Serial Link Does Not Double-check the physical network connections. Work • Make sure your PC terminal program (such as HyperTerminal) is active and configured to the following values: – Com Port: (COM1, COM2 and so on depending on your computer); –...
When you power on the device and you do not see the “WIRELESS NETWORK1 PASSED” message in the POST message in the Serial Console, please contact Proxim’s support site at http://support.proxim.com. : Not applicable to AP-8100.
Page 138
Troubleshooting • HTTP Interface / Make sure you are using a compatible browser: Telnet Interface — Microsoft Internet Explorer 7.0 or later Does Not Work — Mozilla Firefox 3.0 or later • Make sure you have the proper IP address of device. Enter the device IP address in the address bar of the browser, for example http://169.254.128.132.
Page 139
Troubleshooting Uploading Older If you are trying to upload the configuration files of the older versions below AP 3.0 on AP Version 4.0, the device hangs and does not perform the normal AP functionality. Configuration Files This issue can be recovered by just deleting the uploaded configuration file and resetting the Soft Reset to factory values, by using soft and hard reload functionality of the device.
Troubleshooting • Clients connect at Check the security modes. legacy rates but not – WEP and WPA-TKIP will make the unit to operate at legacy rates. higher rates • Check the Channel bandwidth: Should be set to 40MHz • Check the Operating mode: It should be either 802.11gn or 802.11an VLAN Related Issues Problem Solution...
Page 141
Download a New Image using ScanTool – Download a New Image using the Bootloader CLI – As the CLI requires a physical connection to the device serial port, Proxim recommends you to use the ScanTool option. ® ORiNOCO 802.11n Access Points - Software Management Guide...
Page 142
Step 2: Download Procedure Follow these steps to download a software image to the device by using ScanTool: 1. Download the latest software from http://support.proxim.com. 2. Copy the latest software updates to your TFTP server. 3. Launch Proxim’s ScanTool.
Page 143
Make sure the TFTP server is running and configured to point to the default directory containing the image to be downloaded. Step 2: Download Procedure 1. Download the latest software from http://support.proxim.com. 2. Copy the latest software updates to your TFTP server’s default directory. 3. Connect the device serial port to your computer’s serial port.
Page 144
Troubleshooting : Optionally, you can enable Send line ends with line feeds (CTRL+F) under File > Properties > Settings > ASCII Setup, to allow the Terminal Emulator program send a line return at the end of each line of code. Enter the following CLI commands: Bootloader=>...
Page 145
Troubleshooting Follow the following steps to assign an IP address to the device: 1. Open your terminal emulation program and set the following connection properties: • Com Port: COM1, COM2 and so on depending on your computer • Baud Rate: 115200 •...
Troubleshooting AP-00:7D:09(config)#commit 1 Committing in progress, may take few seconds..Configuration Applied Successfully. AP-00:7D:09(config)#reboot 1 6. After the device reboots, verify the new IP address by reconnecting to the CLI. Alternatively, you can ping the device from a network computer to confirm that the new IP address has taken effect. 7.
Frequency Domains and Channels This chapter lists the available channels for the following frequencies, supported by the AP device for specific country codes: • Available Channels 2.4 GHz CHANNELS — 5 GHz CHANNELS — Available Channels Available channels vary based on radio, country, and frequency band. To verify which channels are available for your product locate the product model number on the underside of the device or on the unit box.
Page 148
Frequency Domains and Channels 2.4 GHz CHANNELS Region (SKU) Country 20 MHz 40 PLUS MHz 40 MINUS MHz Argentina 1 to 13 1 to 9 5 to 13 Austria (2412 ~ 2472) (2412 ~ 2452) (2432 ~ 2472) Belgium Brazil Bulgaria China Cyprus...
Page 149
Frequency Domains and Channels 2.4 GHz CHANNELS Region (SKU) Country 20 MHz 40 PLUS MHz 40 MINUS MHz Europe Austria 1 to 13 1 to 9 5 to 13 Belgium (2412 ~ 2472) (2412 ~ 2452) (2432 ~ 2472) Bulgaria Cyprus Czech Republic Denmark...
Page 150
Frequency Domains and Channels 5 GHz CHANNELS Region (SKU) Country 20 MHz 40 PLUS MHz 40 MINUS MHz NORTH AMERICA Canada 36 (5180) 36 (5180) 40 (5200) United States* 40 (5200) 44 (5220) 48 (5240) 44 (5220) 52 (5260) 56 (5280) 48 (5240) 60 (5300) 64 (5320)
Bootloader CLI and Scan Tool The Bootloader CLI provides you the ability to configure the initial setup parameters as well as download a software image to the device. : For AP-8100, you can download the software image using ScanTool, as the Bootloader CLI mode (only accessible through the serial interface) is not applicable to AP-8100.
Page 159
Bootloader CLI and Scan Tool To load the firmware from the Network • Use the show command to view parameters and their value, and use the set command to set the parameters value. To get the IP parameters dynamically for loading the firmware 1.
ASCII Character Chart You can configure WEP Encryption Keys in either Hexadecimal or ASCII format. Each ASCII character corresponds to two hexadecimal digits. The WEP Encryption Keys include ASCII characters consisting of 0-9, A-F, a-f (case sensitive), and punctuation marks. Tabulated below are the ASCII characters along with their Hexadecimal equivalent.
Frequently Asked Questions (FAQs) This chapter covers the Frequently Asked Questions (FAQs) on the following topics: • Link Integrity • Rogue Scan • Wireless Distribution Systems (WDS) • RADIUS VLAN • Packet Forwarding : All the interface (radio) 2 parameters discussed in this chapter are applicable only to a dual-radio device.
Page 163
Frequently Asked Questions (FAQs) Q. Can I perform the background Rogue Scan on both the radios (where, radio 1 = 5 GHz and radio 2 = 2.4 GHz) at the same time? Yes. You can perform the Rogue Scan on both the wireless interfaces (radios) at the same time. Q.
Page 164
Frequently Asked Questions (FAQs) Wireless Distribution Systems (WDS) Q. By using AP-8000 / AP-8100, can I form the WDS link on both the radios at the same time? Yes. You can form a WDS link on both the radios at the same time by configuring a VAP type in WDS mode (WDS-END-A/END-B), on both the radios.
Page 165
Frequently Asked Questions (FAQs) Q. What should I do if the WDS link is not getting established? • Make sure the operational mode and frequency configured is same for both the devices • Check whether the peer MAC address added is correct. •...
Page 166
Frequently Asked Questions (FAQs) Q. How to create 2 hop WDS link? AP1 (WDS-ENDA) -------- (WDS-ENDB) AP2 (WDS-ENDA) -------- (WDS-ENDB) AP3 1st VAP 1st VAP 2nd VAP 1st VAP You need to create two VAPs on AP2 and set both the VAPs in WDS mode. Q.
Page 167
Frequently Asked Questions (FAQs) Q. How is WDS related with STP? STP is enabled automatically when you enable a VAP in WDS mode. STP feature helps in avoiding loops in a ring topology formed by a WDS link. RADIUS VLAN Q.
Page 168
Frequently Asked Questions (FAQs) Packet Forwarding Q. In what scenarios Packet Forwarding can be used? Packet forwarding feature is useful for public wireless networks where the clients cannot communicate with each other but should be able to access internet. This feature can also be used to sniff all the packets by sending the wireless packets to the configured gateway, for security reasons.
Glossary Access point A wireless network transceiver or "base station" hub, often used to connect a local area network to one or more wireless devices. An access point (also called AP) can provide a communication link to a wired local area network also.
Page 170
Glossary Bridge An interface connecting a local area network to another local area network that uses the same protocol (for example, wireless, Ethernet or token ring). Wireless bridges are commonly used to link buildings in campuses. Broadcast Broadcast traffic is a large series of broadcast packets (most often caused by wrong network configuration) that severely impact the network performance.
Page 171
Glossary Digital Subscriber Line (DSL) Digital subscriber line is a technology that provides internet access by transmitting digital data over the wires of a local telephone network. Domain Name Server (DNS) A domain name server is an Internet service that translates domain names into IP addresses.
Page 172
Glossary Hexadecimal A numeral system with a radix or base, of 16. It uses sixteen distinct symbols, 0–9 to represent values zero to nine and A, B, C, D, E, F to represent values ten to fifteen. Each hexadecimal digit represents four binary digits (bits).
Page 173
Glossary NETBIOS It provides services related to the session layer of the OSI model allowing applications on separate computers to communicate over a local area network. Network Address Translation Network Address Translation is a method by which IP addresses are mapped from one address realm to another, providing transparent routing to end hosts.
Page 174
Glossary The Quality of Service (QoS) feature is based on the 802.16 standard and defines the classes, service flows, and packet identification rules for specific types of traffic. The main priority of QoS is to guarantee a reliable and adequate transmission quality for all types of traffic under conditions of high congestion and bandwidth over-subscription.
Page 175
Glossary Spanning Tree Protocol (STP) The Spanning Tree Protocol (STP) can be used to create redundant networks (“hot standby”) and to prevent loops. If enabled, spanning tree prevents loops by disabling redundant links. If a link fails, it can automatically enable a backup link. A security protocol for logging into a remote server.
Page 176
Glossary Trap A trap is used within SNMP to report an unexpected or unallowable condition. Trivial File Transfer Protocol (TFTP) Trivial File Transfer Protocol (TFTP) is a lightweight protocol for transferring files that is like a simple form of File Transfer Protocol (FTP). A TFTP client is implemented on the unit.
Page 177
Glossary Wi-Fi Protected Access is a security standard based on IEEE 802.11i specification, that provides a high level of wireless network security. It uses data encryption through the Temporal Key Integrity Protocol (TKIP). TKIP scrambles the keys and ensures that the keys haven't been tampered with.
Abbreviations Access Point Access Control List Automatic Channel Selection Admission Control Mandatory Advanced Encryption Standard AMPDU Aggregated MAC Protocol Data Unit Address Resolution Protocol ATPC Adaptive Transmit Power Control AIFS Arbitration Inter-Frame Spacing ASCII American Standard Code for Information Interchange Bulletin Board Systems BPDU Bridge Protocol Data Units...
Page 179
Abbreviations Device Under Test Extensible Authentication Protocol EDCA Enhanced Distributed Channel Access Gbps Gigabit Per Second General Public License Global Positioning System HTTP HyperText Transfer Protocol HTTPS HyperText Transfer Protocol Secure IANA Internet Assigned Numbers Authority (IANA) IBSS Independent Basic Service Set IEEE Institute of Electrical and Electronics Engineers Internet Protocol...
Page 180
Abbreviations Maximum Transmission Unit Network Attached Storage Network Address Translation Next Business Date NETBIOS Network Basic Input / Output System Network Management System Network Interface Card NoACK No Acknowledgement OFDM Orthogonal Frequency Division Multiplexing Power Over Ethernet POST Power On Self Test PSDU Protocol Service Data Unit Pre-Shared-Key...
Page 181
Abbreviations Secure Socket Layer Wireless client / Wireless Station Spanning Tree Protocol SSLv3 Secure Socket Layer - Version 3 SSID Service Set Identifier Text Based Configuration Transmission Control Protocol TFTP Trivial File Transfer Protocol TKIP Temporal Key Integrity Protocol Transmit Power Control TPID Tag Protocol Identifier TSLF...
In the event the Customer Service Center determines that the problem can be corrected with a software update, Buyer might be instructed to download the update from Proxim Wireless’s web site or, if that’s not possible, the update will be sent to Buyer.
Page 183
Support). is fee based (detailed in If Proxim Wireless reasonably determines that a returned product is not defective or is not covered by the terms of this Warranty, Buyer shall be charged a service charge and return shipping charges. Other Information Search Knowledgebase Proxim Wireless stores all resolved problems in a solution database at the following URL: http://support.proxim.com.
Obtaining Technical Service and Support If you are having trouble using the Proxim product, please read this manual and the additional documentation provided with your product. If you require additional support to resolve your issue, please be ready to provide the following information before you contact Proxim’s Technical Services team:...
Page 185
5 days a week from 8:00AM - 5:00PM (PDT). Typically, technical support is provided for free for the entire time the product is covered by a Proxim warranty. Beyond this period, technical support is available at cost on a per incident basis.
Page 186
Technical Support is defined as communication via the Proxim Support web site (http://support.proxim.com) and/or via telephone. This technical support will be provided for free for the entire time the product is covered by a Proxim warranty. The term of Proxim’s warranty is determined according to the agreement under which the product was sold and generally varies from 3 months to 2 years depending on the product.
Page 187
Customers can choose to call the reseller or distributor who sold them the product for technical support Tech Support on Discontinued Products Technical Support on some products that Proxim has declared as EOL (End of Life) or otherwise is no longer selling is available based upon one of the following three options Customers can choose: •...
Need help?
Do you have a question about the ORiNOCO AP-800 and is the answer not in the manual?
Questions and answers