Page 1
Dual-Band Outdoor Access Point / Bridge User Guide...
Page 3
User Guide Guide Dual-Band Outdoor Access Point / Bridge IEEE 802.11a/b/g Access Point / Bridge Master unit with External Antenna Options Slave unit with Integrated High-Gain Antenna...
Compliances Federal Communication Commission Interference Statement This equipment generates, uses, and can radiate radio frequency energy and, if not installed and used in accordance with the instruction manual, may cause interference to radio communications. It has been tested and found to comply with the limits for a Class A computing device pursuant to Subpart B of Part 15 of FCC Rules, which are designed to provide reasonable protection against such interference when operated in a commercial environment.
Safety Compliance Power Cord Safety Please read the following safety information carefully before installing the wireless bridge: Warning: Installation and removal of the unit must be carried out by qualified personnel only. • The unit must be connected to an earthed (grounded) outlet to comply with international safety standards.
Page 7
Veuillez lire à fond l'information de la sécurité suivante avant d'installer le wireless bridge: AVERTISSEMENT: L’installation et la dépose de ce groupe doivent être confiés à un personnel qualifié. • Ne branchez pas votre appareil sur une prise secteur (alimentation électrique) lorsqu'il n'y a pas de connexion de mise à...
Page 8
• Das Gerät sollte nicht an eine ungeerdete Wechselstromsteckdose angeschlossen werden. • Das Gerät muß an eine geerdete Steckdose angeschlossen werden, welche die internationalen Sicherheitsnormen erfüllt. • Der Gerätestecker (der Anschluß an das Gerät, nicht der Wandsteckdosenstecker) muß einen gemäß EN 60320/IEC 320 konfigurierten Geräteeingang haben. •...
Contents Chapter 1: Introduction Package Checklist Hardware Description Integrated High-Gain Antenna External Antenna Options Ethernet Port Power Injector Module Receive Signal Strength Indicator (RSSI) BNC Connector Grounding Point Wall- and Pole-Mounting Bracket Kits System Configuration Features and Benefits System Defaults Chapter 2: Network Configuration Access Point Topologies Ad Hoc Wireless LAN (no Access Point or Bridge)
Page 10
Contents Align Antennas Chapter 5: Initial Configuration Initial Setup through the CLI Initial Configuration Steps Using the Web-based Management Setup Wizard Chapter 6: System Configuration Advanced Configuration System Identification TCP / IP Settings Radius PPPoE Settings Authentication Filter Control SNMP Administration System Log Wireless Distribution System (WDS)
Page 11
Exec Commands Configuration Commands Command Line Processing Command Groups General Commands configure exit ping reset show history show line System Management Commands country prompt system name username password ip http port ip http server System Logging Commands logging on logging host logging console logging level logging facility-type...
Page 13
pppoe ip allocation mode pppoe ipcp dns pppoe lcp echo-interval pppoe lcp echo-failure pppoe local ip pppoe remote ip pppoe username pppoe password pppoe service-name pppoe restart show pppoe Ethernet Interface Commands interface ethernet dns server ip address ip dhcp shutdown show interface ethernet Wireless Interface Commands...
Ethernet LANs, and wireless access point services for clients in the local LAN area: • AWAP05O – Includes an integrated high-gain antenna for the 802.11a radio and is designed to operate as a “Slave” bridge in point-to-multipoint configurations, or provide a high-speed point-to-point wireless link between two sites that can be up to 28 km (17 miles) apart.
Package Checklist The Dual-band Outdoor Access Point / Bridge package includes: • One Dual-band Outdoor Access Point / Bridge (AWAP05O or AWAP05OM) • One Category 5 network cable, length 100 ft (30 m) • One power injector module and power cord •...
Introduction Ethernet Port The wireless bridge has one 10BASE-T/100BASE-TX 8-pin DIN port that connects to the power injector module using the included Ethernet cable. The Ethernet port connection provides power to the wireless bridge as well as a data link to the local network.
The power injector module automatically adjusts to any AC voltage between 100-240 volts at 50 or 60 Hz. No voltage range settings are required. Warning: The power injector module is designed for indoor use only. Never mount the power injector outside with the wireless bridge unit. Receive Signal Strength Indicator (RSSI) BNC Connector The RSSI connector provides an output voltage that is proportional to the received radio signal strength.
Introduction Features and Benefits • AWAP05O Slave units support a 5 GHz point-to-point wireless link up 28 km (at 36 Mbps data rate) using integrated high-gain 17 dBi antennas • AWAP05OM Master units support 5 GHz point-to-multipoint links using various external antenna options •...
Page 21
Feature Parameter VLANs Status Native VLAN ID Filter Control Ethernet Type SNMP Status Location Contact Community (Read Only) Community (Read/Write) Traps Trap Destination IP Address Trap Destination Community Name System Logging Syslog Logging Host Logging Console IP Address / Host Name Logging Level Logging Facility Type Spanning Tree...
Page 22
Introduction Feature Parameter Wireless Security Authentication Type 802.11a AES Encryption WEP Encryption WEP Key Length WEP Key Type WEP Transmit Key Number Wireless Interface Status 802.11b/g Radio Channel Auto Channel Select Transmit Power Maximum Data Rate Beacon Interval Data Beacon Rate (DTIM Interval) RTS Threshold Wireless Security Authentication Type...
The Dual-band Outdoor Access Point / Bridge system provides access point or bridging services through either the 5 GHz or 2.4 GHz radio interfaces. The wireless bridge units can be used just as normal 802.11a/b/g access points connected to a local wired LAN, providing connectivity and roaming services for wireless clients in an outdoor area.
The infrastructure configuration not only extends the accessibility of wireless PCs to the wired LAN, but also increases the effective wireless transmission range for wireless PCs by passing their signals through one or more access points. A wireless infrastructure can be used for access to a central database, or for connection between mobile workers, as shown in the following figure.
Service Set Identifier (SSID) that identifies the service set provided by one or more access points. The SSID can be manually configured by the clients, can be detected in an access point’s beacon, or can be obtained by querying for the identity of the nearest access point.
WDS to forward traffic on links between units. Up to 16 WDS links can be specified for a AWAP05OM unit, which acts as the “Master” in the wireless bridge network. AWAP05O units support only one WDS link, which must be to the network’s master unit.
Data Rates Using its 5 GHz integrated antenna, the AWAP05O Slave bridge can operate over a range of up to 28 km (17 miles) or provide a high-speed connection of 54 Mbps (108 Mbps in turbo mode).
Bridge Link Planning Radio Path Planning Although the wireless bridge uses IEEE 802.11a radio technology, which is capable of reducing the effect of multipath signals due to obstructions, the wireless bridge link requires a “radio line-of-sight” between the two antennas for optimum performance.
• Check the topology of the land between the antennas using topographical maps, aerial photos, or even satellite image data (software packages are available that may include this information for your area) • Avoid a path that may incur temporary blockage due to the movement of cars, trains, or aircraft.
Bridge Link Planning Visual Line of Sight 2.4 m 20 m A wireless bridge link is deployed to connect building A to a building B, which is located three miles (4.8 km) away. Mid-way between the two buidings is a small tree-covered hill.
direction. The antenna polarization is marked on the wireless bridge, as indicated in the following figure. Radio Interference The avoidance of radio interference is an important part of wireless link planning. Interference is caused by other radio transmissions using the same or an adjacent channel frequency.
Bridge Link Planning • Snow and Ice — Falling snow, like rain, has no significant effect on the radio signal. However, a build up of snow or ice on antennas may cause the link to fail. In this case, the snow or ice has to be cleared from the antennas to restore operation of the link.
Chapter 4: Hardware Installation Before mounting antennas to set up your wireless bridge links, be sure you have selected appropriate locations for each antenna. Follow the guidance and information in Chapter 2, “Wireless Link Planning.” Also, before mounting units in their intended locations, you should first perform initial configuration and test the basic operation of the wireless bridge links in a controlled environment over a very short range.
Page 36
Hardware Installation Place the U-shaped part of the bracket around the pole and tighten the securing nut just enough to hold the bracket to the pole. (The bracket may need to be rotated around the pole during the alignment process.) Attach bracket to pole with mounting grooves facing up...
Mounting on Larger Diameter Poles In addition, there is a method for attaching the pole-mounting bracket to a pole that is 2 to 5 inches in diameter using an adjustable steel band clamp (not included in the kit). A steel band clamp up to 0.5 inch (1.27 cm) wide can be threaded through the main part of the bracket to secure it to a larger diameter pole with out using the U-shaped part of the bracket.
Typically, a bridge link requires a 5 GHz antenna and access point operation a 2.4 GHz antenna. AWAP05O Slave units also require an external antenna for 2.4 GHz operation.
Connect Cables to the Unit The wireless bridge’s Ethernet port does not support Power over Ethernet Caution: (PoE) based on the IEEE 802.3af standard. Do not try to power the unit by connecting it directly to a network switch that provides IEEE 802.3af PoE. Always connect the unit to the included power injector module.
Hardware Installation Ethernet cable from LAN switch Insert the power cable plug directly into the standard AC receptacle on the power injector. Plug the other end of the power cable into a grounded, 3-pin socket, AC power source. Note: For International use, you may need to change the AC line cord. You must use a line cord set that has been approved for the receptacle type in your country.
Page 41
The RSSI connector provides an output voltage between 0 and 3.28 VDC that is proportional to the received radio signal strength. The higher the voltage reading, the stronger the signal. The radio signal from the remote antenna can be seen to have a strong central main lobe and smaller side lobes.
Page 42
Hardware Installation Pan the antenna horizontally back and forth while checking the RSSI voltage. If using the pole-mounting bracket with the unit, you must rotate the mounting bracket around the pole. Other external antenna brackets may require a different horizontal adjustment. Find the point where the signal is strongest (highest voltage) and secure the horizontal adjustment in that position.
Chapter 5: Initial Configuration The wireless bridge offers a variety of management options, including a web-based interface, a command line interface (CLI), or using SNMP management software. Most initial configuration steps can be made through the web browser interface using the Setup Wizard (page 5-3). However, for units that do not have a preset country code, you must first set the country code using the CLI.
Initial Configuration Initial Configuration Steps Setting the Country Code – Regulations for wireless products differ from country to country. Setting the country code restricts the wireless bridge to use only the radio channels and power settings permitted in the specified country of operation. If the wireless bridge unit is shipped with a preset country code, you are not permitted to change it, as required by country regulations.
Using the Web-based Management Setup Wizard Using the Web-based Management Setup Wizard There are only a few basic steps you need to complete to set up the wireless bridge for your network. The Setup Wizard takes you through configuration procedures for the radio channel selection, IP configuration, and basic WEP encryption for wireless security.
Page 46
Initial Configuration Launching the Setup Wizard – To perform initial configuration, click Setup Wizard on the home page, then click on the [Next] button to start the process. Service Set ID – Enter the service set identifier in the SSID box which all wireless clients must use to associate with the access point.
Page 47
Radio Channel – You must enable radio communications for the 802.11a radio and set the operating channel. • 802.11a Turbo Mode – If you select Enable, the wireless bridge will operate in turbo mode with a data rate of up to 108 Mbps. Normal mode supports 13 channels, Turbo mode supports only 5 channels.
Page 48
Initial Configuration 802.11a Radio Channel – Set the operating radio channel number. (Default: 56ch, 5.280 GHz) Auto Channel Select – Select Enable for automatic radio channel detection. (Default: Enable) • 802.11b/g 802.11g Radio Channel: Set the operating radio channel number. (Range 1-11;...
Page 49
transmissions. To configure other security features use the Advanced Setup menu as described in Chapter 5. Authentication Type – Use “Open System” to allow open access to all wireless clients without performing authentication, or “Shared Key” to perform authentication based on a shared key that has been distributed to all stations. (Default: Open System) WEP –...
Page 50
Initial Configuration Click the OK button to restart the access point.
Chapter 6: System Configuration Before continuing with advanced configuration, first complete the initial configuration steps described in Chapter 4 to set up an IP address for the wireless bridge. The wireless bridge can be managed by any computer using a web browser (Internet Explorer 5.0 or above, or Netscape Navigator 6.2 or above).
System Configuration Menu Description Radius Configures the RADIUS server for wireless client authentication PPPoE Settings Configures PPPoE on the Ethernet interface for a connection to an ISP Authentication Configures 802.1x client authentication and MAC address authentication Filter Control Enables VLAN support and filters traffic matching specific Ethernet protocol types SNMP Controls access to this wireless bridge from management stations...
Page 53
System Name – An alias for the wireless bridge, enabling the device to be uniquely identified on the network. (Default: Outdoor Bridge; Range: 1-22 characters) Outdoor Bridge Band – Selects the radio band used for bridge links. • A – Bridging is supported on the 802.11a 5 GHz band. •...
System Configuration mode, and use the show system identification settings. DUAL OUTDOOR#configure DUAL OUTDOOR(config)#system name R&D DUAL OUTDOOR(config)#snmp-server location building-1 DUAL OUTDOOR(config)#snmp-server contact Paul DUAL OUTDOOR(config)#exit DUAL OUTDOOR#show system System Information =================================================== Serial Number : 0000000005 System Up time : 0 days, 0 hours, 35 minutes, 56 seconds System Name : R&D System Location...
Page 55
using a DHCP server to configure IP addressing, use the CLI to manually configure the initial IP values (page 5-2). After you have network access to the wireless bridge, you can use the web browser interface to modify the initial IP configuration, if needed.
System Configuration • Primary and Secondary DNS Address: The IP address of Domain Name Servers on the network. A DNS maps numerical IP addresses to domain names and can be used to identify network hosts by familiar names instead of the IP addresses. If you have one or more DNS servers located on the local network, type the IP addresses in the text fields provided.
Page 57
This guide assumes that you have already configured RADIUS server(s) to Note: support the access point. Configuration of RADIUS server software is beyond the scope of this guide, refer to the documentation provided with the RADIUS server software. Primary Radius Server Setup – Configure the following settings to use RADIUS authentication on the access point.
System Configuration CLI Commands for RADIUS – From the global configuration mode, use the radius-server address command to specify the address of the primary or secondary RADIUS servers. (The following example configures the settings for the primary RADIUS server.) Configure the other parameters for the RADIUS server. Then use the show show radius command from the Exec mode to display the current settings for the primary and secondary RADIUS servers.
Page 59
PPP over Ethernet – Enable PPPoE on the RJ-45 Ethernet interface to pass management traffic between the unit and a remote PPPoE server. (Default: Disable) PPPoE Username – The user name assigned for the PPPoE tunnel. (Range: 1-63 alphanumeric characters) PPPoE Password –...
Page 60
System Configuration Remote IP Address – IP address of the remote end of the PPPoE tunnel. (Must be entered for static IP allocation mode.) CLI Commands for PPPoE – From the CLI configuration mode, use the interface ethernet command to access interface configuration mode. Use the ip pppoe command to enable PPPoE on the Ethernet interface.
Authentication Wireless clients can be authenticated for network access by checking their MAC address against the local database configured on the access point, or by using a database configured on a central RADIUS server. Alternatively, authentication can be implemented using the IEEE 802.1x network access control protocol. MAC Authentication –...
Page 62
System Configuration • System Default: Specifies a default action for all unknown MAC addresses (that is, those not listed in the local MAC database). - Deny: Blocks access for all MAC addresses except those listed in the local database as “Allow.” - Allow: Permits access for all MAC addresses except those listed in the local database as “Deny.”...
Page 63
• Supported: The access point supports 802.1x authentication only for clients initiating the 802.1x authentication process (i.e., the access point does not initiate 802.1x authentication). For clients initiating 802.1x, only those successfully authenticated are allowed to access the network. For those clients not initiating 802.1x, access to the network is allowed after successful wireless association with the access point.
Page 64
System Configuration address filter delete command. To display the current settings, use the show authentication command from the Exec mode. DUAL OUTDOOR(config)#mac-authentication server local DUAL OUTDOOR(config)#address filter default denied DUAL OUTDOOR(config)#address filter entry 00-70-50-cc-99-1a denied DUAL OUTDOOR(config)#address filter entry 00-70-50-cc-99-1b allowed DUAL OUTDOOR(config)#address filter entry 00-70-50-cc-99-1c allowed DUAL OUTDOOR(config)#address filter delete 00-70-50-cc-99-1c DUAL OUTDOOR(config)#exit...
Page 65
display the current settings, use the show authentication command from the Exec mode. DUAL OUTDOOR(config)#mac-authentication server remote DUAL OUTDOOR(config)#mac-authentication session-timeout 300 DUAL OUTDOOR(config)#exit DUAL OUTDOOR#show authentication Authentication Information ========================================================= MAC Authentication Server MAC Auth Session Timeout Value : 300 secs 802.1x Broadcast Key Refresh Rate Session Key Refresh Rate...
Page 66
System Configuration and broadcast key refresh rate, and the re-authentication timeout. To display the current settings, use the show authentication command from the Exec mode. DUAL OUTDOOR(config)#802.1x supported DUAL OUTDOOR(config)#802.1x broadcast-key-refresh-rate 5 DUAL OUTDOOR(config)#802.1x session-key-refresh-rate 5 DUAL OUTDOOR(config)#802.1x session-timeout 300 DUAL OUTDOOR(config)#exit DUAL OUTDOOR#show authentication Authentication Information...
Filter Control The wireless bridge can employ VLAN tagging support and network traffic frame filtering to control access to network resources and increase security. Native VLAN ID – The VLAN ID assigned to wireless clients that are not assigned to a specific VLAN by RADIUS server configuration.
Page 68
System Configuration on the RADIUS server for each user authorized to access the network. If a user does not have a configured VLAN ID, the access point assigns the user to its own configured native VLAN ID. When setting up VLAN IDs for each user on the RADIUS server, be sure to use the RADIUS attributes and values as indicated in the following table.
CLI Commands for VLAN Support – From the global configuration mode use the native-vlanid command to set the default VLAN ID for the Ethernet interface, then enable VLANs using the vlan enable command. When you change the access point’s VLAN support setting, you must reboot the access point to implement the change.
Page 70
System Configuration SNMP – Enables or disables SNMP management access and also enables the wireless bridge to send SNMP traps (notifications). SNMP management is enabled by default. Community Name (Read Only) – Defines the SNMP community access string that has read-only access. Authorized management stations are only able to retrieve MIB objects.
Page 71
CLI Commands for SNMP – Use the global configuration mode to enable SNMP. To set read/write and read-only community names, use the command defines a trap receiver host. To view the current SNMP settings, use host command. show snmp DUAL OUTDOOR(config)#snmp-server enable server DUAL OUTDOOR(config)#snmp-server community alpha rw DUAL OUTDOOR(config)#snmp-server community beta ro DUAL OUTDOOR(config)#snmp-server host 10.1.19.23 alpha...
System Configuration Administration Changing the Password Management access to the web and CLI interface on the wireless bridge is controlled through a single user name and password. You can also gain additional access security by using control filters (see “Filter Control” on page 6-17). To protect access to the management interface, you need to configure an Administrator’s user name and password as soon as possible.
Upgrading Firmware You can upgrade new wireless bridge software from a local file on the management workstation, or from an FTP or TFTP server. After upgrading new software, you must reboot the wireless bridge to implement the new code. Until a reboot occurs, the wireless bridge will continue to run the software it was using before the upgrade started.
Page 74
System Configuration • New firmware file: Specifies the name of the code file on the server. The new firmware file name should not contain slashes (\ or /), the leading letter of the file name should not be a period (.), and the maximum length for file names is 32 characters for files on the wireless bridge.
be used to check that the new file is present in the wireless bridge file system. To run the new software, use the DUAL OUTDOOR#copy tftp file 1. Application image 2. Config file 3. Boot block image Select the type of download<1,2,3>: TFTP Source file name:bridge-img.bin TFTP Server IP:192.168.1.19 DUAL OUTDOOR#dir...
System Configuration Enabling System Logging The wireless bridge supports a logging process that can control error messages saved to memory or sent to a Syslog server. The logged messages serve as a valuable tool for isolating wireless bridge and network problems. System Log Setup –...
command to set the facility-type number to use on the Syslog server. To view the current logging settings, use the DUAL OUTDOOR(config)#logging on DUAL OUTDOOR(config)#logging level alert DUAL OUTDOOR(config)#logging console DUAL OUTDOOR(config)#logging host 1 10.1.0.3 514 DUAL OUTDOOR(config)#logging facility-type 19 DUAL OUTDOOR(config)#exit DUAL OUTDOOR#show logging Logging Information...
Page 78
System Configuration indicate the number of hours your time zone is located before (east) or after (west) UTC. Enable Daylight Saving – The wireless bridge provides a way to automatically adjust the system clock for Daylight Savings Time changes. To use this feature you must define the month and date to begin and to end the change from standard time.
Wireless Distribution System (WDS) The IEEE 802.11 standard defines a WIreless Distribution System (WDS) for connections between wireless bridges. The access point uses WDS to forward traffic on bridge links between units. When using WDS, only wireless bridge units can associate to each other using the bridge band. A wireless client cannot associate with the access point on the wireless bridge band.
System Configuration MAC Address – The physical layer address of the wireless bridge unit at the other end of the wireless link. (12 hexadecimal digits in the form “xx:xx:xx:xx:xx:xx”) Port Status – Enables or disables the wireless bridge link. The wireless MAC address for each bridge unit is printed on the label on the Note: back of the unit.
Page 81
Bridge Aging Time – Changes the aging time for entries in the dynamic address table: • Ethernet: The time after which a learned Ethernet port entry is discarded. (Range: 60-1800 seconds; Default: 100 seconds) • Wireless 802.11a (g): The time after which a learned wireless entry is discarded. (Range: 60-1800 seconds;...
Page 82
System Configuration CLI Commands for Bridging – The following example shows how to set the MAC address aging time for the wireless bridge. DUAL OUTDOOR(config)#bridge timeout 0 300 DUAL OUTDOOR(config)#bridge timeout 2 1000 DUAL OUTDOOR(config)#exit DUAL OUTDOOR#show bridge Bridge ================================================= Media Type | Age Time(sec)| ================================================= EtherNet...
Advanced Configuration Spanning Tree Protocol (STP) The Spanning Tree Protocol (STP) can be used to detect and disable network loops, and to provide backup links between switches, bridges or routers. This allows the wireless bridge to interact with other bridging devices (that is, an STP-compliant switch, bridge or router) in your network to ensure that only one route exists between any two stations on the network, and provide backup links which automatically take over when a primary link goes down.
Page 84
System Configuration Forward Delay – The maximum time (in seconds) this device waits before changing states (i.e., discarding to learning to forwarding). This delay is required because every device must receive information about topology changes before it starts to forward frames. In addition, each port needs time to listen for conflicting information that would make it return to a discarding state;...
Page 85
Advanced Configuration Priority – Defines the priority used for this port in the Spanning Tree Protocol. If the path cost for all ports on a switch are the same, the port with the highest priority (i.e., lowest value) will be configured as an active link in the spanning tree. This makes a port with higher priority less likely to be blocked if the Spanning Tree Protocol is detecting network loops.
Page 86
System Configuration CLI Commands for STP – The following example configures spanning tree paramters for the bridge and wireless port 5. DUAL OUTDOOR(config)#bridge stp-bridge priority 40000 DUAL OUTDOOR(config)#bridge stp-bridge hello-time 5 DUAL OUTDOOR(config)#bridge stp-bridge max-age 38 DUAL OUTDOOR(config)#bridge stp-bridge forward-time 20 DUAL OUTDOOR(config)#no bridge stp-port spanning-disabled 5 DUAL OUTDOOR(config)#bridge stp-port priority 5 0 DUAL OUTDOOR(config)#bridge stp-port path-cost 5 50...
Radio Interface The IEEE 802.11a and 802.11g interfaces include configuration options for radio signal characteristics and wireless security features. The configuration options are nearly identical, but depend on which interface is operating as the bridge band. Both interfaces and operating modes are covered in this section of the manual. The access point can operate in the following modes: •...
System Configuration Radio Settings (802.11a) The IEEE 802.11a interface operates within the 5 GHz band, at up to 54 Mbps in normal mode or up to 108 Mbps in Turbo mode. Enable – Enables radio communications on the wireless interface. (Default: Enabled) Description –...
Page 89
In normal mode, the wireless bridge provides a channel bandwidth of 20 Note: MHz, and supports the maximum number of channels permitted by local regulations (e.g., 11 channels for the United States). In Turbo Mode, the channel bandwidth is increased to 40 MHz to support the increased data rate.
Page 90
System Configuration (BSS) and forward them after every second beacon. Using smaller DTIM intervals delivers broadcast/multicast frames in a more timely manner, causing stations in Power Save mode to wake up more often and drain power faster. Using higher DTIM values reduces the power used by stations in Power Save mode, but delays the transmission of broadcast/multicast frames.
Page 91
channel with the command. Set any other parameters as required. To view channel the current 802.11a radio settings, use the DUAL OUTDOOR(config)#interface wireless a Enter Wireless configuration commands, one per line. DUAL OUTDOOR(if-wireless a)#description RD-AP#3 DUAL OUTDOOR(if-wireless a)#ssid r&d DUAL OUTDOOR(if-wireless a)#no turbo DUAL OUTDOOR(if-wireless a)#channel 44 DUAL OUTDOOR(if-wireless a)#closed-system DUAL OUTDOOR(if-wireless a)#transmit-power full...
For example, in the United States you can deploy up to three access points in the same area (e.g., channels 1, 6, 11). Also note that the channel for wireless clients is automatically set to the same as that used by the access point to which it is linked.
Page 93
• b only: Both 802.11b and 802.11g clients can communicate with the access point, but 802.11g clients can only transfer data at 802.11b standard rates (up to 11 Mbps). Maximum Station Data Rate – The maximum data rate at which the access point transmits unicast packets on the wireless interface.
System Configuration DUAL OUTDOOR#show interface wireless g Wireless Interface Information =========================================================== ----------------Identification----------------------------- Description Service Type SSID Channel Status ----------------802.11 Parameters-------------------------- Transmit Power Max Station Data Rate Fragmentation Threshold RTS Threshold Beacon Interval DTIM Interval Maximum Association ----------------Security----------------------------------- Closed System Multicast cipher Unicast cipher WPA clients WPA Key Mgmt Mode...
Page 95
Setting up IEEE 802.11 Wired Equivalent Privacy (WEP) shared keys prevents unauthorized access to the wireless bridge network. Be sure to define at least one static WEP key for data encryption. Also, be sure that the WEP keys are the same for all bridge units in the wireless network. Data Encryption Setup –...
System Configuration Advanced Encryption Standard (AES) AES has been designated by the National Institute of Standards and Technology as the successor to the Data Encryption Standard (DES) encryption algorithm, and will be used by the U.S. government for encrypting all sensitive, nonclassified information.
Page 97
• Alphanumeric: Enter keys as an alphanumeric string using between 8 and 31 characters. For each wireless port link (1 to 16), the AES keys must match on the Note: corresponding bridge unit. CLI Commands for WEP Security – From the 802.11a interface configuration mode, use the command to enable WEP encryption.
System Configuration command. To view the current security settings, use the command. DUAL OUTDOOR(config)#interface wireless a Enter Wireless configuration commands, one per line. DUAL OUTDOOR(if-wireless a)#encryption wdsaes alphanumeric DUAL OUTDOOR(if-wireless a)#key wdsaes 1 agoodsecretkey DUAL OUTDOOR(if-wireless a)#exit DUAL OUTDOOR#show interface wireless a Wireless Interface Information =========================================================== ----------------Identification-----------------------------...
Security (Access Point Mode) A radio band set to access point mode is configured by default as an “open system,” which broadcasts a beacon signal including the configured SSID. Wireless clients can read the SSID from the beacon, and automatically reset their SSID to allow immediate connection to the access point.
Page 100
System Configuration Security Client Support Mechanism WPA over Requires WPA-enabled 802.1x Mode system and network card driver (native support provided in Windows XP) WPA PSK Requires WPA-enabled Mode system and network card driver (native support provided in Windows XP) Although a WEP static key is not needed for WEP over 802.1x, WPA over Note: 802.1x, and WPA PSK modes, you must enable WEP encryption through the web or CLI in order to enable all types of encryption in the access point.
Page 101
Setting up shared keys enables the basic IEEE 802.11 Wired Equivalent Privacy (WEP) on the access point to prevent unauthorized access to the network. If you choose to use WEP shared keys instead of an open system, be sure to define at least one static WEP key for user authentication and data encryption.
Page 102
System Configuration Shared Key Setup – Select 64 Bit, 128 Bit, or 152 Bit key length. Note that the same size of encryption key must be supported on all wireless clients. 152 Bit key length is only supported on 802.11a radio. (Default: 128 Bit) Key Type –...
Page 103
The configuration settings for WEP are summarized below: WEP only Authentication Type: Shared Key WEP (encryption): Enable WPA clients only: Disable Multicast Cipher: WEP Shared Key: 64/128/152 Key Type - Hex: 10/26/32 characters ASCII: 5/13/16 characters Transmit Key: 1/2/3/4 (set index) 802.1x = Disabled MAC Authentication: Any setting 1: See Authentication (page 6-11)
Page 104
System Configuration ----------------Security----------------------------------- Closed System Multicast cipher Unicast cipher WPA clients WPA Key Mgmt Mode WPA PSK Key Type Encryption Default Transmit Key Static Keys : Key 1: ***** Key 2: EMPTY Authentication Type =========================================================== DUAL OUTDOOR# The index and length values used in the key command must be the same Note: values used in the encryption and transmit-key commands.
Wi-Fi Protected Access (WPA) WPA employs a combination of several technologies to provide an enhanced security solution for 802.11 wireless networks. The access point supports the following WPA components and features: IEEE 802.1x and the Extensible Authentication Protocol (EAP): WPA employs 802.1x as its basic framework for user authentication and dynamic key management.
Page 106
System Configuration to encrypt each data packet. TKIP provides further data encryption enhancements by including a message integrity check for each packet and a re-keying mechanism, which periodically changes the master key. WPA Pre-Shared Key (PSK) Mode: For enterprise deployment, WPA requires a RADIUS authentication server to be configured on the wired network.
Page 107
WPA Key Management – WPA can be configured to work in an enterprise environment using IEEE 802.1x and a RADIUS server for user authentication. For smaller networks, WPA can be enabled using a common pre-shared key for client authentication with the access point. •...
Page 108
System Configuration The configuration settings for WPA are summarized below: WPA pre-shared key only Authentication Type: Open System WEP (encryption): Enable WPA clients only: Enable WPA Mode: Pre-shared-key Multicast Cipher: WEP/TKIP/AES WPA PSK Type - Hex: 64 characters ASCII: 8-63 characters Shared Key: 64/128/152 802.1x = Disabled MAC Authentication: Disabled/Local...
Page 109
the current 802.11g security settings, use the show interface wireless g command (not shown in example). AP(config)#interface wireless g Enter Wireless configuration commands, one per line. AP(if-wireless g)#authentication open AP(if-wireless g)#encryption 128 AP(if-wireless g)#wpa-clients required AP(if-wireless g)#wpa-mode dynamic AP(if-wireless g)#multicast-cipher TKIP AP(if-wireless g)#end AP(config)#802.required AP(config)#no mac-authentication...
System Configuration Status Information The Status page includes information on the following items: Menu Description AP Status Displays configuration settings for the basic system and the wireless interfaces Station Status Shows wireless clients currently associated with the access point Event Logs Shows log messages stored in memory AP Status The AP Status window displays basic system configuration settings, as well as the...
• IP Default Gateway: IP address of the gateway router between this device and management stations that exist on other network segments. • HTTP Server: Shows if management access via HTTP is enabled. • HTTP Server Port: Shows the TCP port used by the HTTP interface. •...
System Configuration Station Status The Station Status window shows wireless clients currently associated with the access point. The Station Status page displays basic connection information for all associated stations. Note that this page is automatically refreshed every five seconds. • Station Address: The MAC address of the remote wireless bridge. •...
Page 113
CLI Commands for Displaying Station Information – To view status of clients currently associated with the access point, use the show station command from the Exec mode. DUAL OUTDOOR#show station Station Table Information =========================================================== 802.11a Channel : 56 No 802.11a Channel Stations. 802.11g Channel : 11 802.11g Channel Station Table Station Address...
System Configuration Event Logs The Event Logs window shows the log messages generated by the wireless bridge and stored in memory. The Event Logs table displays the following information: • Log Time: The time the log message was generated. • Event Level: The logging level associated with this message. For a description of the various levels, see “logging level”...
Chapter 7: Command Line Interface Using the Command Line Interface Accessing the CLI When accessing the management interface for the wireless bridge via a Telnet connection, the wireless bridge can be managed by entering command keywords and parameters at the prompt. Using the wireless bridge’s command-line interface (CLI) is very similar to entering commands on a UNIX system.
Command Line Interface Entering Commands This section describes how to enter CLI commands. Keywords and Arguments A CLI command is a series of keywords and arguments. Keywords identify a command, and arguments specify configuration parameters. For example, in the command “show interface ethernet,” show and interface are keywords, and ethernet is an argument that specifies the interface type.
Interface). You can also display a list of valid keywords for a specific command. For example, the command “show ?” displays a list of possible show commands: Outdoor Bridge#show ? bootfile Show bootfile name bridge Show bridge table filters Show filters hardware Show hardware version history...
Command Line Interface Understanding Command Modes The command set is divided into Exec and Configuration classes. Exec commands generally display information on system status or clear statistical counters. Configuration commands, on the other hand, modify interface parameters or enable certain functions. These classes are further divided into different modes. Available commands depend on the selected mode.
change to “Outdoor Bridge(if-ethernet)#,” or “Outdoor Bridge(if-wireless a)” indicating that you have access privileges to the associated commands. You can use the end command to return to the Exec mode. Outdoor Bridge(config)#interface ethernet Outdoor Bridge(if-ethernet)# Command Line Processing Commands are not case sensitive. You can abbreviate commands and parameters as long as they contain enough letters to differentiate them from any other currently available commands or parameters.
Configures connection parameters for the Ethernet interface Wireless Interface Configures connection parameters for the wireless interface IAPP Enables roaming between multi-vendor access points VLANs Configures VLAN support The access mode shown in the following tables is indicated by these abbreviations: GC (Global Configuration), and IC (Interface Configuration.
General Commands Command Function configure Activates global configuration mode Returns to the previous configuration mode exit Returns to Exec mode, or exits the CLI ping Sends ICMP echo request packets to another node on the network Exec reset Restarts the system show history Shows the command history buffer show line...
Command Line Interface exit This command returns to the Exec mode or exits the configuration program. Default Setting None Command Mode Example This example shows how to return to the Exec mode from the Interface Configuration mode, and then quit the CLI session: Outdoor Bridge(if-ethernet)#exit Outdoor Bridge#exit CLI session with the wireless bridge is now closed...
Example Outdoor Bridge#ping 10.1.0.19 192.168.1.19 is alive Outdoor Bridge# reset This command restarts the system or restores the factory default settings. Syntax reset <board | configuration> • board - Reboots the system. • configuration - Resets the configuration settings to the factory defaults, and then reboots the system.
Command Line Interface Example In this example, the show history command lists the contents of the command history buffer: Outdoor Bridge#show history config exit show history Outdoor Bridge# show line This command displays the console port’s configuration settings. Command Mode Exec Example The console port settings are fixed at the values shown below.
Command Function Web Server ip http port Specifies the port to be used by the web browser interface ip http server Allows the wireless bridge to be monitored or configured from a browser System Status show system Displays system information show version Displays version information for the system country...
Command Line Interface Country Code Country Costa Rica Japan Croatia Jordan Cyprus Kazakhstan Czech North Korea Republic Denmark Korea Republic Default Setting US - for units sold in the United States 99 (no country set) - for units sold in other countries Command Mode Exec Command Usage...
Example Outdoor Bridge(config)#prompt RD2 RD2(config)# system name This command specifies or modifies the system name for this device. Use the no form to restore the default system name. Syntax system name name no system name name - The name of this host. (Maximum length: 32 characters) Default Setting Outdoor Bridge...
Command Line Interface password After initially logging onto the system, you should set the password. Remember to record it in a safe place. Use the no form to reset the default password. Syntax password password no password password - Password for management access. (Length: 3-16 characters, case sensitive) Default Setting null...
ip http server This command allows this device to be monitored or configured from a browser. Use the no form to disable this function. Syntax ip http server no ip http server Default Setting Enabled Command Mode Global Configuration Example Outdoor Bridge(config)#ip http server Outdoor Bridge(config)# Related Commands...
Command Line Interface Command Mode Global Configuration Command Usage The logging process controls error messages saved to memory. You can use the logging level command to control the type of error messages that are stored in memory. Example Outdoor Bridge(config)#logging on Outdoor Bridge(config)# logging host This command specifies a syslog server host that will receive logging messages.
Command Line Interface Default Setting Command Mode Global Configuration Command Usage The command specifies the facility type tag sent in syslog messages. (See RFC 3164.) This type has no effect on the kind of messages reported by the wireless bridge. However, it may be used by the syslog server to sort messages or to store messages in the corresponding database.
sntp-server Sets the start and end dates for daylight savings time daylight-saving sntp-server timezone Sets the time zone for the wireless bridge’s internal clock show sntp Shows current SNTP configuration settings sntp-server ip This command sets the IP address of the servers to which SNTP time requests are issued.
Command Line Interface Default Setting Disabled Command Mode Global Configuration Command Usage The time acquired from time servers is used to record accurate dates and times for log events. Without SNTP, the wireless bridge only records the time starting from the factory default set at the last bootup (i.e., 00:14:00, January 1, 1970).
sntp-server daylight-saving This command sets the start and end dates for daylight savings time. Use the no form to disable daylight savings time. Syntax sntp-server daylight-saving no sntp-server daylight-saving Default Setting Disabled Command Mode Global Configuration Command Usage The command sets the system clock back one hour during the specified period.
Command Line Interface Example Outdoor Bridge(config)#sntp-server timezone +8 Outdoor Bridge(config)# show sntp This command displays the current time and configuration settings for the SNTP client. Command Mode Exec Example Outdoor Bridge#show sntp SNTP Information ========================================================= Service State : Enabled SNTP (server 1) IP : 137.92.140.80 SNTP (server 2) IP : 192.43.244.18...
Example Outdoor Bridge#show system System Information =========================================================== Serial Number : 0000000005 System Up time : 0 days, 2 hours, 27 minutes, 19 seconds System Name : Outdoor Bridge System Location System Contact : Contact System Country Code : US - UNITED STATES MAC Address : 00-30-F1-BE-F4-96 IP Address...
Command Line Interface Command Function snmp-server host Specifies the recipient of an SNMP notification operation snmp-server location Sets the system location string show snmp Displays the status of SNMP communications snmp-server community This command defines the community access string for the Simple Network Management Protocol.
Default Setting Contact Command Mode Global Configuration Example Outdoor Bridge(config)#snmp-server contact Paul Outdoor Bridge(config)# Related Commands snmp-server location (7-26) snmp-server enable server This command enables SNMP management access and also enables this device to send SNMP traps (i.e., notifications). Use the no form to disable SNMP service and trap messages.
Command Line Interface no snmp-server host • host_ip_address - IP of the host (the targeted recipient). • host_name - Name of the host. (Range: 1-20 characters) • community-string - Password-like community string sent with the notification operation. Although you can set this string using the snmp-server host command by itself, we recommend that you define this string using the snmp-server community command prior to using the snmp-server host command.
Example Outdoor Bridge(config)#snmp-server location building-1 Outdoor Bridge(config)# Related Commands snmp-server contact (7-24) show snmp This command displays the SNMP configuration settings. Command Mode Exec Example Outdoor Bridge#show snmp SNMP Information ============================================ Service State : Enable Community (ro) : ***** Community (rw) : ***** Location : WC-19 Contact...
Command Line Interface Default Setting None Command Mode Exec Command Usage • The file name should not contain slashes (\ or /), the leading letter of the file name should not be a period (.), and the maximum length for file names is 32 characters.
copy This command copies a boot file, code image, or configuration file between the wireless bridge’s flash memory and a FTP/TFTP server. When you save the configuration settings to a file on a FTP/TFTP server, that file can later be downloaded to the wireless bridge to restore system operation.
Command Line Interface The following example shows how to download a configuration file: Outdoor Bridge#copy tftp file 1. Application image 2. Config file 3. Boot block image Select the type of download<1,2,3>: TFTP Source file name:syscfg TFTP Server IP:192.168.1.19 Outdoor Bridge# delete This command deletes a file or image.
Command Usage File information is shown below: Column Heading File Name Type File Size Example The following example shows how to display all file information: Outdoor Bridge#dir zz-img.bin 1099676 dflt-img.bin 1075164 syscfg 15316 syscfg_bak 15316 1386496 bytes free Outdoor Bridge# RADIUS Client Remote Authentication Dial-in User Service (RADIUS) is a logon authentication protocol that uses software running on a central server to control access for...
Command Line Interface Default Setting None Command Mode Global Configuration Example Outdoor Bridge(config)#radius-server address 192.168.1.25 Outdoor Bridge(config)# radius-server port This command sets the RADIUS server network port. Syntax radius-server [secondary] port <port_number> • secondary - Secondary server. • port_number - RADIUS server UDP port used for authentication messages. (Range: 1024-65535) Default Setting 1812...
Example Outdoor Bridge(config)#radius-server key green Outdoor Bridge(config)# radius-server retransmit This command sets the number of retries. Syntax radius-server [secondary] retransmit number_of_retries • secondary - Secondary server. • number_of_retries - Number of times the access point will try to authenticate logon access via the RADIUS server. (Range: 1 - 30) Default Setting Command Mode Global Configuration...
Command Line Interface show radius This command displays the current settings for the RADIUS server. Default Setting None Command Mode Exec Example Outdoor Bridge#show radius Radius Server Information ======================================== : 192.168.1.25 Port : 181 : ***** Retransmit Timeout : 10 ======================================== Radius Secondary Server Information ========================================...
Page 149
Command Function 802.1x session-timeout Sets the timeout after which a connected client must be re-authenticated address filter default Sets filtering to allow or deny listed addresses address filter entry Enters a MAC address in the filter table address filter delete Removes a MAC address from the filter table mac-authentication server Sets address filtering to be performed with local or remote...
Command Line Interface Example Outdoor Bridge(config)#802.1x supported Outdoor Bridge(config)# 802.1x broadcast-key-refresh-rate This command sets the interval at which the broadcast keys are refreshed for stations using 802.1x dynamic keying. Syntax 802.1x broadcast-key-refresh-rate <rate> rate - The interval at which the access point rotates broadcast keys. (Range: 0 - 1440 minutes) Default Setting 0 (Disabled)
Command Mode Global Configuration Command Usage Session keys are unique to each client, and are used to authenticate a client connection, and correlate traffic passing between a specific client and the access point. Example Outdoor Bridge(config)#802.1x session-key-refresh-rate 5 Outdoor Bridge(config)# 802.1x session-timeout This command sets the time period after which a connected client must be re-authenticated.
Command Line Interface Example Outdoor Bridge(config)#address filter default denied Outdoor Bridge(config)# Related Commands address filter entry (7-38) show authentication (7-40) address filter entry This command enters a MAC address in the filter table. Syntax address filter entry <mac-address> <allowed | denied> •...
Default None Command Mode Global Configuration Example Outdoor Bridge(config)#address filter delete 00-70-50-cc-99-1b Outdoor Bridge(config)# Related Commands show authentication (7-40) mac-authentication server This command sets address filtering to be performed with local or remote options. Use the no form to disable MAC address authentication. Syntax mac-authentication server [local | remote] •...
Command Line Interface mac-authentication session-timeout This command sets the interval at which associated clients will be re-authenticated with the RADIUS server authentication database. Use the no form to disable reauthentication. Syntax mac-authentication session-timeout <seconds> seconds - Re-authentication interval. (Range: 0-65535) Default 0 (disabled) Command Mode...
WDS Commands The commands described in this section are used to configure the WIreless Distribution System (WDS) forwarding table. Command Function wds channel Selects the radio band to be used for bridge links wds mac-address Configures MAC addresses of nodes in the wireless bridge network wds enable Enables WDS forwarding for specific wireless port IDs...
Command Line Interface Command Mode Global Configuration Command Usage • You can only configure one MAC address per wireless port ID. • The wireless MAC address for each bridge unit is printed on the label on the back of the unit. Example Outdoor Bridge(config)#wds mac-address 1 00-12-34-56-78-9a Outdoor Bridge(config)#...
Command Line Interface Bridge Commands The commands described in this section are used to set the MAC address table aging time and spanning tree parameters for both the Ethernet and wireless interfaces. Command bridge timeout bridge stp-bridge spanning-tree Enables the spanning tree protocol for the bridge bridge stp-bridge forward-time bridge stp-bridge hello-time bridge stp-bridge max-age...
bridge stp-bridge spanning-tree Use this command to enable the Spanning Tree Protocol globally for the wireless bridge. Use the no form to disable it. Syntax bridge stp-bridge spanning-tree no bridge stp-bridge spanning-tree Default Setting Spanning tree is enabled. Command Mode Global Configuration Command Usage The Spanning Tree Protocol (STP) can be used to detect and disable network...
Command Line Interface Command Usage This command sets the maximum time (in seconds) the root device will wait before changing states (i.e., discarding to learning to forwarding). This delay is required because every device must receive information about topology changes before it starts to forward frames. In addition, each port needs time to listen for conflicting information that would make it return to the discarding state;...
Default Setting 20 seconds Command Mode Global Configuration Command Usage This command sets the maximum time (in seconds) a device can wait without receiving a configuration message before attempting to reconfigure. All device ports (except for designated ports) should receive configuration messages at regular intervals.
Command Line Interface bridge stp-port path-cost Use this command to configure the spanning tree path cost for the specified port. Use the no form to restore the default for the specified port. Syntax bridge stp-port path-cost <port> cost no bridge stp-port path-cost <port> •...
Command Usage • This command defines the priority for the use of a port in the Spanning Tree Protocol. If the path cost for all ports on a wireless bridge are the same, the port with the highest priority (that is, lowest value) will be configured as an active link in the spanning tree.
Command Line Interface bridge stp-port spanning-disabled This command disables the Spanning Tree Protocol for the specified interface. Use the no form to reenable the Spanning Tree Protocol for the specified interface. Syntax bridge stp-port spanning-disabled <port> no bridge stp-port spanning-disabled <port> port - Specifies the port number on the wireless bridge.
Example Outdoor Bridge#show bridge Bridge Information ================================================= Media Type | Age Time(sec)| ================================================= EtherNet WLAN_A 1000 ================================================== Bridge Id : 32768.037fbef192 Root Bridge Id : 32768.01f47483e2 Root Path Cost : 25 Root Port Id Bridge Status : Enabled Bridge Priority : 32768 Bridge Hello Time : 2 Seconds...
Command Line Interface Command Mode Global Configuration Example Outdoor Bridge(config)#filter ap-manage Outdoor Bridge(config)# filter ethernet-type enable This command checks the Ethernet type on all incoming and outgoing Ethernet packets against the protocol filtering table. Use the no form to disable this feature. Syntax filter ethernet-type enable no filter ethernet-type enable...
Command Mode Global Configuration Command Usage Use the filter ethernet-type enable command to enable filtering for Ethernet types specified in the filtering table, or the no filter ethernet-type enable command to disable all filtering based on the filtering table. Example Outdoor Bridge(config)#filter ethernet-type protocol ARP Outdoor Bridge(config)# Related Commands...
Command Line Interface Command Function pppoe local ip Sets local IP address for the PPPoE tunnel pppoe remote ip Sets remote IP address for the PPPoE tunnel pppoe username Sets the user name for the PPPoE tunnel pppoe password Sets the password for the PPPoE tunnel pppoe service-name Sets the service name for the PPPoE tunnel pppoe restart...
Default Setting automatic Command Mode Interface Configuration (Ethernet) Command Usage The IP address allocation mode depends on the type of service provided by the ISP. If automatic mode is selected, DHCP is used to allocate the IP addresses for the PPPoE connection. If static addresses have been assigned to by the ISP, these must be entered using the pppoe local ip and pppoe remote ip commands.
Command Usage • Echo requests are used to verify the integrity of the link through the PPPoE tunnel. Devices at either end of the link can issue an echo-request. Devices receiving an echo-request must return an echo-reply. • If a link is busy with large data transfers, the echo-reply may not be issued in a timely manner causing the link to timeout.
Command Line Interface pppoe remote ip This command sets the remote IP address for the PPPoE tunnel. Syntax pppoe remote ip <ip-address> ip-address - IP address of the remote end of the PPPoE tunnel. Default Setting None Command Mode Interface Configuration (Ethernet) Command Usage If the pppoe ip allocation mode is set to static, the remote IP address must be entered with this command, and the local IP address must be entered with...
Related Commands pppoe password (7-59) pppoe password This command sets the password for the PPPoE tunnel. Syntax pppoe password <string> string - Password assigned by the service provider. (Range: 1-63 alphanumeric characters) Default Setting None Command Mode Interface Configuration (Ethernet) Command Usage You must enter a password with this command, and a user name with the pppoe username command.
Command Line Interface Example Outdoor Bridge#(if-ethernet)#pppoe service-name classA Outdoor Bridge# pppoe restart This command restarts the PPPoE connection with updated parameters. Command Mode Interface Configuration (Ethernet) Command Usage This command restarts PPPoE service using the most recently configured parameters. Example Outdoor Bridge#(if-ethernet)#pppoe restart Outdoor Bridge# show pppoe...
Ethernet Interface Commands The commands described in this section configure connection parameters for the Ethernet interface. Command Function interface ethernet Enters Ethernet interface configuration mode dns primary-server Specifies the primary name server dns secondary-server Specifies the secondary name server ip address Sets the IP address for the Ethernet interface ip dhcp Submits a DHCP request for an IP address...
Command Line Interface Command Mode Global Configuration Command Usage The primary and secondary name servers are queried in sequence. Example This example specifies two domain-name servers. Outdoor Bridge(if-ethernet)#dns primary-server 192.168.1.55 Outdoor Bridge(if-ethernet)#dns secondary-server 10.1.0.55 Outdoor Bridge(if-ethernet)# Related Commands show interface ethernet (7-64) ip address This command sets the IP address for the (10/100Base-TX) Ethernet interface.
Example Outdoor Bridge(config)#interface ethernet Enter Ethernet configuration commands, one per line. Outdoor Bridge(if-ethernet)#ip address 192.168.1.2 255.255.255.0 192.168.1.253 Outdoor Bridge(if-ethernet)# Related Commands ip dhcp (7-63) ip dhcp This command sets the IP address for the currently selected VLAN interface. Use the no form to restore the default IP address. Syntax ip dhcp no ip dhcp...
Command Line Interface shutdown This command disables the Ethernet interface. To restart a disabled interface, use the no form. Syntax shutdown no shutdown Default Setting Interface enabled Command Mode Interface Configuration (Ethernet) Command Usage This command allows you to disable the Ethernet port due to abnormal behavior (e.g., excessive collisions), and reenable it after the problem has been resolved.
Example Outdoor Bridge#show interface ethernet Ethernet Interface Information ======================================== IP Address : 192.168.1.1 Subnet Mask : 255.255.255.0 Default Gateway : 192.168.1.253 Primary DNS : 192.168.1.55 Secondary DNS : 10.1.0.55 Admin status : Up Operational status : Up ======================================== Outdoor Bridge# Wireless Interface Commands The commands described in this section configure connection parameters for the wireless interface.
Command Line Interface Command Function transmit-key Sets the index of the key to be used for WEP encryption IC-W multicast-cipher Defines the cipher algorithm used for multicasting wpa-clients Defines whether WPA is required or optionally supported for client stations wpa-mode Specifies dynamic keys or a pre-shared key wpa-preshared-key Defines a WPA preshared-key value...
Command Mode Interface Configuration (Wireless) Example Outdoor Bridge(config)#interface wireless a Outdoor Bridge(if-wireless a)#description RD-AP#3 Outdoor Bridge(if-wireless a)# ssid This command configures the service set identifier (SSID). Syntax ssid <string> string - The name of a basic service set supported by the access point. (Range: 1 - 32 characters) Default Setting Enterprise AP...
Command Line Interface Command Usage When closed system is enabled, the access point will not include its SSID in beacon messages. Nor will it respond to probe requests from clients that do not include a fixed SSID. Example AP(if-wireless g)#closed-system AP(if-wireless g)# speed This command configures the maximum data rate at which remote bridges can...
Command Mode Interface Configuration (Wireless) Command Usage The available channel settings are limited by local regulations, which determine the number of channels that are available. Example Outdoor Bridge(if-wireless a)#channel 36 Outdoor Bridge(if-wireless a)# turbo This command sets the wireless bridge to an enhanced mode (not regulated in IEEE 802.11a) that provides a higher data rate of up to 108 Mbps.
Command Line Interface Default Setting Command Mode Interface Configuration (Wireless) Command Usage The beacon signals allow remote bridges to maintain contact with the local wireless bridge. They may also carry power-management information. Example Outdoor Bridge(if-wireless a)#beacon-interval 150 Outdoor Bridge(if-wireless a)# dtim-period This command configures the rate at which remote bridges in sleep mode must wake up to receive broadcast/multicast transmissions.
fragmentation-length This command configures the minimum packet size that can be fragmented when passing through the wireless bridge. Syntax fragmentation-length <length> length - Minimum packet size for which fragmentation is allowed. (Range: 256-2346 bytes) Default Setting 2346 Command Mode Interface Configuration (Wireless) Command Usage •...
Command Line Interface Command Usage • If the threshold is set to 0, the wireless bridge never sends RTS signals. If set to 2347, the wireless bridge always sends RTS signals. If set to any other value, and the packet size equals or exceeds the RTS threshold, the RTS/CTS (Request to Send / Clear to Send) mechanism will be enabled.
max-association This command configures the maximum number of clients that can be associated with the access point at the same time. Syntax max-association <count> count - Maximum number of associated stations. (Range: 0-64) Default Setting Command Mode Interface Configuration (Wireless) Example AP(if-wireless g)#max-association 32 AP(if-wireless g)#...
Command Line Interface encryption This command defines whether WEP or AES encryption is used to provide privacy for wireless communications. Use the no form to disable encryption. Syntax encryption {wep <key-length> | wdsaes <alphanumeric | hex>} no encryption • wep - The keyword that enables WEP encryption. - key-length - Size of encryption key.
Example Outdoor Bridge(if-wireless a)#encryption wep 128 Outdoor Bridge(if-wireless a)# Related Commands key (7-75) This command sets the keys used for WEP and AES encryption. Use the no form to delete a configured key. Syntax key {wep <index size type wep-value> | wdsaes <port-id aes-value>} no key {wep <index>...
Command Line Interface • If AES is enabled, each wireless bridge link in the network must be configured to use the same AES key • The AES key type value entered using the key command must be the same as the type specified in the encryption command. Example Outdoor Bridge(if-wireless a)#key wep 1 64 ascii 12345 Outdoor Bridge(if-wireless a)#key wep 2 64 ascii abcde...
Default Setting Command Mode Interface Configuration (Wireless) Command Usage • WPA enables the access point to support different unicast encryption keys for each client. However, the global encryption key for multicast and broadcast traffic must be the same for all clients. This command sets the encryption type that is supported by all clients.
Command Line Interface • supported - Support clients with or without WPA. Default Setting Supported Command Mode Interface Configuration (Wireless) Command Usage Wi-Fi Protected Access (WPA) provides improved data encryption, which was weak in WEP, and user authentication, which was largely missing in WEP. WPA uses the following security mechanisms.
Command Mode Interface Configuration (Wireless) Command Usage • When the WPA mode is set to “dynamic,” clients are authenticated using 802.1x via a RADIUS server. Each client has to be WPA-enabled or support 802.1x client software. A RADIUS server must also be configured and be available in the wired network.
show interface wireless This command displays the status for the wireless interface. Syntax show interface wireless a • a - 802.11a radio interface. Command Mode Exec Example Outdoor Bridge#show interface wireless a Wireless Interface Information ========================================================= ----------------Identification----------------------------- Description Turbo Mode Channel Status Service type...
Command Usage The current 802.11 standard does not specify the signaling required between access points in order to support clients roaming from one access point to another. In particular, this can create a problem for clients roaming between access points from different vendors. This command is used to enable or disable 802.11f handover signaling between different access points, especially...
Example AP(config)#iapp AP(config)# VLAN Commands The wireless bridge can enable the support of VLAN-tagged traffic passing between the wireless interface and the wired network. When VLAN support is enabled, the wireless bridge tags traffic passing to the wired network with the assigned native VLAN ID (a number between 1 and 64). Traffic received from the wired network must also be tagged with the same VLAN ID.
Command Line Interface Example Outdoor Bridge(config)#vlan enable Reboot system now? <y/n>: y Related Commands native-vlanid (7-84) native-vlanid This command configures the native VLAN ID for the wireless bridge. Syntax native-vlanid <vlan-id> vlan-id - Native VLAN ID. (Range: 1-64) Default Setting Command Mode Global Configuration Command Usage...
Appendix A: Troubleshooting Check the following items before you contact local Technical Support. If wireless bridge units do not associate with each other, check the following: • Check the power injector LED for each bridge unit to be sure that power is being supplied •...
Page 200
Troubleshooting If you forgot or lost the password: • Contact Technical Support.
Page 202
Specifications 802.11b/g: 2.4 ~ 2.4835 GHz (US, Canada, ETSI) 2.4 ~ 2.497 GHz (Japan) 2.400 ~ 2.4835 GHz (Taiwan) Power Injector Input: 100-240 VAC, 47-63 Hz, 1.5 A Output: 48 VDC, 1.2 A Bridge Power (DC) Input voltage: 48 volts, 1.2 A, 30 watts maximum Physical Size 19.8 cm x 19.8 cm x 6.33 cm (7.8 x 7.8 x 2.49 in) Weight...
Antenna Specifications 17 dBi Integrated Panel Frequency range 5.150 - 5.850 GHz Gain 17 dBi VSWR 1.8 : 1 max Polarization Linear, vertical/horizontal HPBW Horizontal: 20° Vertical: 22° Front-to-Back Ratio >25 dB Power Handling 10 W (cw) Impedance 50 Ohms Connector SMA female 17 dBi Integrated Panel Antenna Link Budget...
Specifications 17 dBi Integrated Panel Antenna Link Budget (5.825 GHz, Cable Loss 1 dB, Fade Margin 5 dB) Modulation/Rates Transmit Power Turbo Mode BPSK (12 Mbps) BPSK (18 Mbps) QPSK (24 Mbps) QPSK (36 Mbps) 16 QAM (48 Mbps) 16 QAM (72 Mbps) 64 QAM (96 Mbps) 64 QAM (108 Mbps) * The maximum range calculated with a 17 dBi panel antenna at the far end of the link.
8 dBi Omnidirectional Antenna Link Budget (5.825 GHz, Cable Loss 0 dB, Fade Margin 3 dB) Modulation/Rates Transmit Power 16 QAM (72 Mbps) 64 QAM (96 Mbps) 64 QAM (108 Mbps) * The maximum range calculated with a 2 dBi NIC antenna at the far end of the link. The maximum transmit power (hence range) may be lowered by regulatory (FCC etc) EIRP (effective isotropic radiated power) limits.
Specifications Mechanical Dimensions: 620 x 88 x 70 mm Weight: 590 g 13.5 dBi 120-Degree Sector Antenna Link Budget (5.825 GHz, Cable Loss 1 dB, Fade Margin 5 dB) Modulation/Rates Transmit Power Normal Mode BPSK (6 Mbps) BPSK (9 Mbps) QPSK (12 Mbps) QPSK (18 Mbps) 16 QAM (24 Mbps)
Page 209
HPBW Horizontal: 60° Vertical: 6° Downtilt 0° Power Handling 5 W (cw) Impedance 50 Ohms Connector N type, female Radome Material: ABS Color: Gray, white Environmental Survival Wind Speed: 216 km/hr Temperature: -40 °C to 80 °C Humidity: 95% @ 25 °C Mechanical Dimensions: 620 x 88 x 70 mm Weight: 565 g...
Specifications 16.5 dBi 60-Degree Sector Antenna Link Budget (5.825 GHz, Cable Loss 1 dB, Fade Margin 5 dB) Modulation/Rates Transmit Power QPSK (36 Mbps) 16 QAM (48 Mbps) 16 QAM (72 Mbps) 64 QAM (96 Mbps) 64 QAM (108 Mbps) * The maximum range calculated with a 16.5 dBi sector antenna at the far end of the link.
Page 211
Environmental Survival Wind Speed: 216 km/hr Temperature: -40 °C to 80 °C Humidity: 95% @ 25 °C Mechanical Dimensions: 360 x 360 x 16 mm Weight: 1.6 kg 23 dBi Panel Antenna Link Budget (5.825 GHz, Cable Loss 1 dB, Fade Margin 5 dB) Modulation/Rates Transmit Power Normal Mode...
Appendix C: Cables and Pinouts Twisted-Pair Cable Assignments Caution: DO NOT plug a phone jack connector into a power injector RJ-45 port. Use only twisted-pair cables with RJ-45 connectors that conform with FCC standards. For 10/100BASE-TX connections, a twisted-pair cable must have two pairs of wires. Each wire pair is identified by two different colors.
Cables and Pinouts 10/100BASE-TX Pin Assignments Use unshielded twisted-pair (UTP) or shielded twisted-pair (STP) cable for RJ-45 connections: 100-ohm Category 3 or better cable for 10 Mbps connections, or 100-ohm Category 5 or better cable for 100 Mbps connections. Also be sure that the length of any twisted-pair connection does not exceed 100 meters (328 feet).
connecting supports automatic MDI/MDI-X operation, you can use either “straight-through” or “crossover” cable. EIA/TIA 568B RJ-45 Wiring Standard End A 8-Pin DIN Connector Pinout The Ethernet cable from the power injector connects to an 8-pin DIN connector on the wireless bridge. This connector is described in the following figure and table. 8-Pin DIN Ethernet Port Pinout Signal Name Transmit Data plus (TD+)
Cables and Pinouts 8-Pin DIN to RJ-45 Cable Wiring an extended Ethernet cable to connect from the power injector’s RJ-45 construct Output port to the wireless bridge’s 8-pin DIN connector, follow the wiring diagram below. Use Category 5 or better UTP or STP cable, maximum length 100 m (328 ft), and be sure to connect all four wire pairs.
UTP cable. Access Point An internetworking device that seamlessly connects wired and wireless networks. Access points attached to a wired network, support the creation of multiple radio cells that enable roaming throughout a facility. Advanced Encryption Standard (AES) An encryption algorithm that implements symmetric key cryptography.
Page 218
Glossary of automatic allocation of reusable network addresses and additional configuration options. Encryption Data passing between the access point and clients can use encryption to protect from interception and evesdropping. Ethernet A popular local area data communications network, which accepts transmission from computers and terminals.
Page 219
Glossary RTS Threshold Transmitters contending for the medium may not be aware of each other. RTS/CTS mechanism can solve this “Hidden Node Problem.” If the packet size is smaller than the preset RTS Threshold size, the RTS/CTS mechanism will NOT be enabled. Service Set Identifier (SSID) An identifier that is attached to packets sent over the wireless LAN and functions as a password for joining a particular radio cell;...
Need help?
Do you have a question about the AWAP05O and is the answer not in the manual?
Questions and answers