Alfa Network AWAP05O User Manual

Dual-band outdoor access point / bridge
Table of Contents

Advertisement

Quick Links

Dual-Band Outdoor Access Point /
Bridge
User Guide

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the AWAP05O and is the answer not in the manual?

Questions and answers

Subscribe to Our Youtube Channel

Summary of Contents for Alfa Network AWAP05O

  • Page 1 Dual-Band Outdoor Access Point / Bridge User Guide...
  • Page 3 User Guide Guide Dual-Band Outdoor Access Point / Bridge IEEE 802.11a/b/g Access Point / Bridge Master unit with External Antenna Options Slave unit with Integrated High-Gain Antenna...
  • Page 4 AWAP05O-ZZ AWAP05OM-ZZ F1.1.0.0 E072004-R01 150xxxxxxxxA...
  • Page 5: Federal Communication Commission Interference Statement

    Compliances Federal Communication Commission Interference Statement This equipment generates, uses, and can radiate radio frequency energy and, if not installed and used in accordance with the instruction manual, may cause interference to radio communications. It has been tested and found to comply with the limits for a Class A computing device pursuant to Subpart B of Part 15 of FCC Rules, which are designed to provide reasonable protection against such interference when operated in a commercial environment.
  • Page 6: Safety Compliance

    Safety Compliance Power Cord Safety Please read the following safety information carefully before installing the wireless bridge: Warning: Installation and removal of the unit must be carried out by qualified personnel only. • The unit must be connected to an earthed (grounded) outlet to comply with international safety standards.
  • Page 7 Veuillez lire à fond l'information de la sécurité suivante avant d'installer le wireless bridge: AVERTISSEMENT: L’installation et la dépose de ce groupe doivent être confiés à un personnel qualifié. • Ne branchez pas votre appareil sur une prise secteur (alimentation électrique) lorsqu'il n'y a pas de connexion de mise à...
  • Page 8 • Das Gerät sollte nicht an eine ungeerdete Wechselstromsteckdose angeschlossen werden. • Das Gerät muß an eine geerdete Steckdose angeschlossen werden, welche die internationalen Sicherheitsnormen erfüllt. • Der Gerätestecker (der Anschluß an das Gerät, nicht der Wandsteckdosenstecker) muß einen gemäß EN 60320/IEC 320 konfigurierten Geräteeingang haben. •...
  • Page 9: Table Of Contents

    Contents Chapter 1: Introduction Package Checklist Hardware Description Integrated High-Gain Antenna External Antenna Options Ethernet Port Power Injector Module Receive Signal Strength Indicator (RSSI) BNC Connector Grounding Point Wall- and Pole-Mounting Bracket Kits System Configuration Features and Benefits System Defaults Chapter 2: Network Configuration Access Point Topologies Ad Hoc Wireless LAN (no Access Point or Bridge)
  • Page 10 Contents Align Antennas Chapter 5: Initial Configuration Initial Setup through the CLI Initial Configuration Steps Using the Web-based Management Setup Wizard Chapter 6: System Configuration Advanced Configuration System Identification TCP / IP Settings Radius PPPoE Settings Authentication Filter Control SNMP Administration System Log Wireless Distribution System (WDS)
  • Page 11 Exec Commands Configuration Commands Command Line Processing Command Groups General Commands configure exit ping reset show history show line System Management Commands country prompt system name username password ip http port ip http server System Logging Commands logging on logging host logging console logging level logging facility-type...
  • Page 12 Contents copy delete RADIUS Client radius-server address radius-server port radius-server key radius-server retransmit radius-server timeout show radius Authentication 802.1x 802.1x broadcast-key-refresh-rate 802.1x session-key-refresh-rate 802.1x session-timeout address filter default address filter entry address filter delete mac-authentication server mac-authentication session-timeout show authentication WDS Commands wds channel wds mac-address...
  • Page 13 pppoe ip allocation mode pppoe ipcp dns pppoe lcp echo-interval pppoe lcp echo-failure pppoe local ip pppoe remote ip pppoe username pppoe password pppoe service-name pppoe restart show pppoe Ethernet Interface Commands interface ethernet dns server ip address ip dhcp shutdown show interface ethernet Wireless Interface Commands...
  • Page 14 Contents iapp VLAN Commands vlan native-vlanid Appendix A: Troubleshooting Appendix B: Specifications General Specifications Antenna Specifications 17 dBi Integrated Panel 8 dBi Omnidirectional (2.4 GHz) 8 dBi Omnidirectional (5 GHz) 13.5 dBi 120-Degree Sector 16.5 dBi 60-Degree Sector 23 dBi High-Gain Panel Appendix C: Cables and Pinouts Twisted-Pair Cable Assignments 10/100BASE-TX Pin Assignments...
  • Page 15: Chapter 1: Introduction

    Ethernet LANs, and wireless access point services for clients in the local LAN area: • AWAP05O – Includes an integrated high-gain antenna for the 802.11a radio and is designed to operate as a “Slave” bridge in point-to-multipoint configurations, or provide a high-speed point-to-point wireless link between two sites that can be up to 28 km (17 miles) apart.
  • Page 16: Package Checklist

    Package Checklist The Dual-band Outdoor Access Point / Bridge package includes: • One Dual-band Outdoor Access Point / Bridge (AWAP05O or AWAP05OM) • One Category 5 network cable, length 100 ft (30 m) • One power injector module and power cord •...
  • Page 17: Integrated High-Gain Antenna

    The AWAP05O and AWAP05OM units both require the 2.4 GHz 8 dBi omnidirectional external antenna for 2.4 GHz operation. The following table...
  • Page 18: Ethernet Port

    Introduction Ethernet Port The wireless bridge has one 10BASE-T/100BASE-TX 8-pin DIN port that connects to the power injector module using the included Ethernet cable. The Ethernet port connection provides power to the wireless bridge as well as a data link to the local network.
  • Page 19: Receive Signal Strength Indicator (Rssi) Bnc Connector

    The power injector module automatically adjusts to any AC voltage between 100-240 volts at 50 or 60 Hz. No voltage range settings are required. Warning: The power injector module is designed for indoor use only. Never mount the power injector outside with the wireless bridge unit. Receive Signal Strength Indicator (RSSI) BNC Connector The RSSI connector provides an output voltage that is proportional to the received radio signal strength.
  • Page 20: Features And Benefits

    Introduction Features and Benefits • AWAP05O Slave units support a 5 GHz point-to-point wireless link up 28 km (at 36 Mbps data rate) using integrated high-gain 17 dBi antennas • AWAP05OM Master units support 5 GHz point-to-multipoint links using various external antenna options •...
  • Page 21 Feature Parameter VLANs Status Native VLAN ID Filter Control Ethernet Type SNMP Status Location Contact Community (Read Only) Community (Read/Write) Traps Trap Destination IP Address Trap Destination Community Name System Logging Syslog Logging Host Logging Console IP Address / Host Name Logging Level Logging Facility Type Spanning Tree...
  • Page 22 Introduction Feature Parameter Wireless Security Authentication Type 802.11a AES Encryption WEP Encryption WEP Key Length WEP Key Type WEP Transmit Key Number Wireless Interface Status 802.11b/g Radio Channel Auto Channel Select Transmit Power Maximum Data Rate Beacon Interval Data Beacon Rate (DTIM Interval) RTS Threshold Wireless Security Authentication Type...
  • Page 23: Chapter 2: Network Configuration

    The Dual-band Outdoor Access Point / Bridge system provides access point or bridging services through either the 5 GHz or 2.4 GHz radio interfaces. The wireless bridge units can be used just as normal 802.11a/b/g access points connected to a local wired LAN, providing connectivity and roaming services for wireless clients in an outdoor area.
  • Page 24: Infrastructure Wireless Lan

    The infrastructure configuration not only extends the accessibility of wireless PCs to the wired LAN, but also increases the effective wireless transmission range for wireless PCs by passing their signals through one or more access points. A wireless infrastructure can be used for access to a central database, or for connection between mobile workers, as shown in the following figure.
  • Page 25: Infrastructure Wireless Lan For Roaming Wireless Pcs

    Service Set Identifier (SSID) that identifies the service set provided by one or more access points. The SSID can be manually configured by the clients, can be detected in an access point’s beacon, or can be obtained by querying for the identity of the nearest access point.
  • Page 26: Bridge Link Topologies

    WDS to forward traffic on links between units. Up to 16 WDS links can be specified for a AWAP05OM unit, which acts as the “Master” in the wireless bridge network. AWAP05O units support only one WDS link, which must be to the network’s master unit.
  • Page 27 AWAP05O Slave AWAP05O AWAP05OM Slave Master with Omnidirectional AWAP05O Slave AWAP05OM Master with Sector Antenna Bridge Link Topologies AWAP05O Slave Antenna AWAP05O Slave AWAP05O Slave AWAP05O Slave AWAP05O AWAP05O Slave...
  • Page 28 Network Configuration...
  • Page 29: Chapter 3: Bridge Link Planning

    Data Rates Using its 5 GHz integrated antenna, the AWAP05O Slave bridge can operate over a range of up to 28 km (17 miles) or provide a high-speed connection of 54 Mbps (108 Mbps in turbo mode).
  • Page 30: Radio Path Planning

    Bridge Link Planning Radio Path Planning Although the wireless bridge uses IEEE 802.11a radio technology, which is capable of reducing the effect of multipath signals due to obstructions, the wireless bridge link requires a “radio line-of-sight” between the two antennas for optimum performance.
  • Page 31: Antenna Height

    • Check the topology of the land between the antennas using topographical maps, aerial photos, or even satellite image data (software packages are available that may include this information for your area) • Avoid a path that may incur temporary blockage due to the movement of cars, trains, or aircraft.
  • Page 32: Antenna Position And Orientation

    Bridge Link Planning Visual Line of Sight 2.4 m 20 m A wireless bridge link is deployed to connect building A to a building B, which is located three miles (4.8 km) away. Mid-way between the two buidings is a small tree-covered hill.
  • Page 33: Radio Interference

    direction. The antenna polarization is marked on the wireless bridge, as indicated in the following figure. Radio Interference The avoidance of radio interference is an important part of wireless link planning. Interference is caused by other radio transmissions using the same or an adjacent channel frequency.
  • Page 34: Ethernet Cabling

    Bridge Link Planning • Snow and Ice — Falling snow, like rain, has no significant effect on the radio signal. However, a build up of snow or ice on antennas may cause the link to fail. In this case, the snow or ice has to be cleared from the antennas to restore operation of the link.
  • Page 35: Chapter 4: Hardware Installation

    Chapter 4: Hardware Installation Before mounting antennas to set up your wireless bridge links, be sure you have selected appropriate locations for each antenna. Follow the guidance and information in Chapter 2, “Wireless Link Planning.” Also, before mounting units in their intended locations, you should first perform initial configuration and test the basic operation of the wireless bridge links in a controlled environment over a very short range.
  • Page 36 Hardware Installation Place the U-shaped part of the bracket around the pole and tighten the securing nut just enough to hold the bracket to the pole. (The bracket may need to be rotated around the pole during the alignment process.) Attach bracket to pole with mounting grooves facing up...
  • Page 37: Mounting On Larger Diameter Poles

    Mounting on Larger Diameter Poles In addition, there is a method for attaching the pole-mounting bracket to a pole that is 2 to 5 inches in diameter using an adjustable steel band clamp (not included in the kit). A steel band clamp up to 0.5 inch (1.27 cm) wide can be threaded through the main part of the bracket to secure it to a larger diameter pole with out using the U-shaped part of the bracket.
  • Page 38: Connect External Antennas

    Typically, a bridge link requires a 5 GHz antenna and access point operation a 2.4 GHz antenna. AWAP05O Slave units also require an external antenna for 2.4 GHz operation.
  • Page 39: Connect Cables To The Unit

    Connect Cables to the Unit The wireless bridge’s Ethernet port does not support Power over Ethernet Caution: (PoE) based on the IEEE 802.3af standard. Do not try to power the unit by connecting it directly to a network switch that provides IEEE 802.3af PoE. Always connect the unit to the included power injector module.
  • Page 40: Align Antennas

    Hardware Installation Ethernet cable from LAN switch Insert the power cable plug directly into the standard AC receptacle on the power injector. Plug the other end of the power cable into a grounded, 3-pin socket, AC power source. Note: For International use, you may need to change the AC line cord. You must use a line cord set that has been approved for the receptacle type in your country.
  • Page 41 The RSSI connector provides an output voltage between 0 and 3.28 VDC that is proportional to the received radio signal strength. The higher the voltage reading, the stronger the signal. The radio signal from the remote antenna can be seen to have a strong central main lobe and smaller side lobes.
  • Page 42 Hardware Installation Pan the antenna horizontally back and forth while checking the RSSI voltage. If using the pole-mounting bracket with the unit, you must rotate the mounting bracket around the pole. Other external antenna brackets may require a different horizontal adjustment. Find the point where the signal is strongest (highest voltage) and secure the horizontal adjustment in that position.
  • Page 43: Chapter 5: Initial Configuration

    Chapter 5: Initial Configuration The wireless bridge offers a variety of management options, including a web-based interface, a command line interface (CLI), or using SNMP management software. Most initial configuration steps can be made through the web browser interface using the Setup Wizard (page 5-3). However, for units that do not have a preset country code, you must first set the country code using the CLI.
  • Page 44: Initial Configuration Steps

    Initial Configuration Initial Configuration Steps Setting the Country Code – Regulations for wireless products differ from country to country. Setting the country code restricts the wireless bridge to use only the radio channels and power settings permitted in the specified country of operation. If the wireless bridge unit is shipped with a preset country code, you are not permitted to change it, as required by country regulations.
  • Page 45: Using The Web-Based Management Setup Wizard

    Using the Web-based Management Setup Wizard Using the Web-based Management Setup Wizard There are only a few basic steps you need to complete to set up the wireless bridge for your network. The Setup Wizard takes you through configuration procedures for the radio channel selection, IP configuration, and basic WEP encryption for wireless security.
  • Page 46 Initial Configuration Launching the Setup Wizard – To perform initial configuration, click Setup Wizard on the home page, then click on the [Next] button to start the process. Service Set ID – Enter the service set identifier in the SSID box which all wireless clients must use to associate with the access point.
  • Page 47 Radio Channel – You must enable radio communications for the 802.11a radio and set the operating channel. • 802.11a Turbo Mode – If you select Enable, the wireless bridge will operate in turbo mode with a data rate of up to 108 Mbps. Normal mode supports 13 channels, Turbo mode supports only 5 channels.
  • Page 48 Initial Configuration 802.11a Radio Channel – Set the operating radio channel number. (Default: 56ch, 5.280 GHz) Auto Channel Select – Select Enable for automatic radio channel detection. (Default: Enable) • 802.11b/g 802.11g Radio Channel: Set the operating radio channel number. (Range 1-11;...
  • Page 49 transmissions. To configure other security features use the Advanced Setup menu as described in Chapter 5. Authentication Type – Use “Open System” to allow open access to all wireless clients without performing authentication, or “Shared Key” to perform authentication based on a shared key that has been distributed to all stations. (Default: Open System) WEP –...
  • Page 50 Initial Configuration Click the OK button to restart the access point.
  • Page 51: Chapter 6: System Configuration

    Chapter 6: System Configuration Before continuing with advanced configuration, first complete the initial configuration steps described in Chapter 4 to set up an IP address for the wireless bridge. The wireless bridge can be managed by any computer using a web browser (Internet Explorer 5.0 or above, or Netscape Navigator 6.2 or above).
  • Page 52: System Identification

    System Configuration Menu Description Radius Configures the RADIUS server for wireless client authentication PPPoE Settings Configures PPPoE on the Ethernet interface for a connection to an ISP Authentication Configures 802.1x client authentication and MAC address authentication Filter Control Enables VLAN support and filters traffic matching specific Ethernet protocol types SNMP Controls access to this wireless bridge from management stations...
  • Page 53 System Name – An alias for the wireless bridge, enabling the device to be uniquely identified on the network. (Default: Outdoor Bridge; Range: 1-22 characters) Outdoor Bridge Band – Selects the radio band used for bridge links. • A – Bridging is supported on the 802.11a 5 GHz band. •...
  • Page 54: Tcp / Ip Settings

    System Configuration mode, and use the show system identification settings. DUAL OUTDOOR#configure DUAL OUTDOOR(config)#system name R&D DUAL OUTDOOR(config)#snmp-server location building-1 DUAL OUTDOOR(config)#snmp-server contact Paul DUAL OUTDOOR(config)#exit DUAL OUTDOOR#show system System Information =================================================== Serial Number : 0000000005 System Up time : 0 days, 0 hours, 35 minutes, 56 seconds System Name : R&D System Location...
  • Page 55 using a DHCP server to configure IP addressing, use the CLI to manually configure the initial IP values (page 5-2). After you have network access to the wireless bridge, you can use the web browser interface to modify the initial IP configuration, if needed.
  • Page 56: Radius

    System Configuration • Primary and Secondary DNS Address: The IP address of Domain Name Servers on the network. A DNS maps numerical IP addresses to domain names and can be used to identify network hosts by familiar names instead of the IP addresses. If you have one or more DNS servers located on the local network, type the IP addresses in the text fields provided.
  • Page 57 This guide assumes that you have already configured RADIUS server(s) to Note: support the access point. Configuration of RADIUS server software is beyond the scope of this guide, refer to the documentation provided with the RADIUS server software. Primary Radius Server Setup – Configure the following settings to use RADIUS authentication on the access point.
  • Page 58: Pppoe Settings

    System Configuration CLI Commands for RADIUS – From the global configuration mode, use the radius-server address command to specify the address of the primary or secondary RADIUS servers. (The following example configures the settings for the primary RADIUS server.) Configure the other parameters for the RADIUS server. Then use the show show radius command from the Exec mode to display the current settings for the primary and secondary RADIUS servers.
  • Page 59 PPP over Ethernet – Enable PPPoE on the RJ-45 Ethernet interface to pass management traffic between the unit and a remote PPPoE server. (Default: Disable) PPPoE Username – The user name assigned for the PPPoE tunnel. (Range: 1-63 alphanumeric characters) PPPoE Password –...
  • Page 60 System Configuration Remote IP Address – IP address of the remote end of the PPPoE tunnel. (Must be entered for static IP allocation mode.) CLI Commands for PPPoE – From the CLI configuration mode, use the interface ethernet command to access interface configuration mode. Use the ip pppoe command to enable PPPoE on the Ethernet interface.
  • Page 61: Authentication

    Authentication Wireless clients can be authenticated for network access by checking their MAC address against the local database configured on the access point, or by using a database configured on a central RADIUS server. Alternatively, authentication can be implemented using the IEEE 802.1x network access control protocol. MAC Authentication –...
  • Page 62 System Configuration • System Default: Specifies a default action for all unknown MAC addresses (that is, those not listed in the local MAC database). - Deny: Blocks access for all MAC addresses except those listed in the local database as “Allow.” - Allow: Permits access for all MAC addresses except those listed in the local database as “Deny.”...
  • Page 63 • Supported: The access point supports 802.1x authentication only for clients initiating the 802.1x authentication process (i.e., the access point does not initiate 802.1x authentication). For clients initiating 802.1x, only those successfully authenticated are allowed to access the network. For those clients not initiating 802.1x, access to the network is allowed after successful wireless association with the access point.
  • Page 64 System Configuration address filter delete command. To display the current settings, use the show authentication command from the Exec mode. DUAL OUTDOOR(config)#mac-authentication server local DUAL OUTDOOR(config)#address filter default denied DUAL OUTDOOR(config)#address filter entry 00-70-50-cc-99-1a denied DUAL OUTDOOR(config)#address filter entry 00-70-50-cc-99-1b allowed DUAL OUTDOOR(config)#address filter entry 00-70-50-cc-99-1c allowed DUAL OUTDOOR(config)#address filter delete 00-70-50-cc-99-1c DUAL OUTDOOR(config)#exit...
  • Page 65 display the current settings, use the show authentication command from the Exec mode. DUAL OUTDOOR(config)#mac-authentication server remote DUAL OUTDOOR(config)#mac-authentication session-timeout 300 DUAL OUTDOOR(config)#exit DUAL OUTDOOR#show authentication Authentication Information ========================================================= MAC Authentication Server MAC Auth Session Timeout Value : 300 secs 802.1x Broadcast Key Refresh Rate Session Key Refresh Rate...
  • Page 66 System Configuration and broadcast key refresh rate, and the re-authentication timeout. To display the current settings, use the show authentication command from the Exec mode. DUAL OUTDOOR(config)#802.1x supported DUAL OUTDOOR(config)#802.1x broadcast-key-refresh-rate 5 DUAL OUTDOOR(config)#802.1x session-key-refresh-rate 5 DUAL OUTDOOR(config)#802.1x session-timeout 300 DUAL OUTDOOR(config)#exit DUAL OUTDOOR#show authentication Authentication Information...
  • Page 67: Filter Control

    Filter Control The wireless bridge can employ VLAN tagging support and network traffic frame filtering to control access to network resources and increase security. Native VLAN ID – The VLAN ID assigned to wireless clients that are not assigned to a specific VLAN by RADIUS server configuration.
  • Page 68 System Configuration on the RADIUS server for each user authorized to access the network. If a user does not have a configured VLAN ID, the access point assigns the user to its own configured native VLAN ID. When setting up VLAN IDs for each user on the RADIUS server, be sure to use the RADIUS attributes and values as indicated in the following table.
  • Page 69: Snmp

    CLI Commands for VLAN Support – From the global configuration mode use the native-vlanid command to set the default VLAN ID for the Ethernet interface, then enable VLANs using the vlan enable command. When you change the access point’s VLAN support setting, you must reboot the access point to implement the change.
  • Page 70 System Configuration SNMP – Enables or disables SNMP management access and also enables the wireless bridge to send SNMP traps (notifications). SNMP management is enabled by default. Community Name (Read Only) – Defines the SNMP community access string that has read-only access. Authorized management stations are only able to retrieve MIB objects.
  • Page 71 CLI Commands for SNMP – Use the global configuration mode to enable SNMP. To set read/write and read-only community names, use the command defines a trap receiver host. To view the current SNMP settings, use host command. show snmp DUAL OUTDOOR(config)#snmp-server enable server DUAL OUTDOOR(config)#snmp-server community alpha rw DUAL OUTDOOR(config)#snmp-server community beta ro DUAL OUTDOOR(config)#snmp-server host 10.1.19.23 alpha...
  • Page 72: Administration

    System Configuration Administration Changing the Password Management access to the web and CLI interface on the wireless bridge is controlled through a single user name and password. You can also gain additional access security by using control filters (see “Filter Control” on page 6-17). To protect access to the management interface, you need to configure an Administrator’s user name and password as soon as possible.
  • Page 73: Upgrading Firmware

    Upgrading Firmware You can upgrade new wireless bridge software from a local file on the management workstation, or from an FTP or TFTP server. After upgrading new software, you must reboot the wireless bridge to implement the new code. Until a reboot occurs, the wireless bridge will continue to run the software it was using before the upgrade started.
  • Page 74 System Configuration • New firmware file: Specifies the name of the code file on the server. The new firmware file name should not contain slashes (\ or /), the leading letter of the file name should not be a period (.), and the maximum length for file names is 32 characters for files on the wireless bridge.
  • Page 75: System Log

    be used to check that the new file is present in the wireless bridge file system. To run the new software, use the DUAL OUTDOOR#copy tftp file 1. Application image 2. Config file 3. Boot block image Select the type of download<1,2,3>: TFTP Source file name:bridge-img.bin TFTP Server IP:192.168.1.19 DUAL OUTDOOR#dir...
  • Page 76: Enabling System Logging

    System Configuration Enabling System Logging The wireless bridge supports a logging process that can control error messages saved to memory or sent to a Syslog server. The logged messages serve as a valuable tool for isolating wireless bridge and network problems. System Log Setup –...
  • Page 77: Configuring Sntp

    command to set the facility-type number to use on the Syslog server. To view the current logging settings, use the DUAL OUTDOOR(config)#logging on DUAL OUTDOOR(config)#logging level alert DUAL OUTDOOR(config)#logging console DUAL OUTDOOR(config)#logging host 1 10.1.0.3 514 DUAL OUTDOOR(config)#logging facility-type 19 DUAL OUTDOOR(config)#exit DUAL OUTDOOR#show logging Logging Information...
  • Page 78 System Configuration indicate the number of hours your time zone is located before (east) or after (west) UTC. Enable Daylight Saving – The wireless bridge provides a way to automatically adjust the system clock for Daylight Savings Time changes. To use this feature you must define the month and date to begin and to end the change from standard time.
  • Page 79: Wireless Distribution System (Wds)

    Wireless Distribution System (WDS) The IEEE 802.11 standard defines a WIreless Distribution System (WDS) for connections between wireless bridges. The access point uses WDS to forward traffic on bridge links between units. When using WDS, only wireless bridge units can associate to each other using the bridge band. A wireless client cannot associate with the access point on the wireless bridge band.
  • Page 80: Bridge

    System Configuration MAC Address – The physical layer address of the wireless bridge unit at the other end of the wireless link. (12 hexadecimal digits in the form “xx:xx:xx:xx:xx:xx”) Port Status – Enables or disables the wireless bridge link. The wireless MAC address for each bridge unit is printed on the label on the Note: back of the unit.
  • Page 81 Bridge Aging Time – Changes the aging time for entries in the dynamic address table: • Ethernet: The time after which a learned Ethernet port entry is discarded. (Range: 60-1800 seconds; Default: 100 seconds) • Wireless 802.11a (g): The time after which a learned wireless entry is discarded. (Range: 60-1800 seconds;...
  • Page 82 System Configuration CLI Commands for Bridging – The following example shows how to set the MAC address aging time for the wireless bridge. DUAL OUTDOOR(config)#bridge timeout 0 300 DUAL OUTDOOR(config)#bridge timeout 2 1000 DUAL OUTDOOR(config)#exit DUAL OUTDOOR#show bridge Bridge ================================================= Media Type | Age Time(sec)| ================================================= EtherNet...
  • Page 83: Spanning Tree Protocol (Stp)

    Advanced Configuration Spanning Tree Protocol (STP) The Spanning Tree Protocol (STP) can be used to detect and disable network loops, and to provide backup links between switches, bridges or routers. This allows the wireless bridge to interact with other bridging devices (that is, an STP-compliant switch, bridge or router) in your network to ensure that only one route exists between any two stations on the network, and provide backup links which automatically take over when a primary link goes down.
  • Page 84 System Configuration Forward Delay – The maximum time (in seconds) this device waits before changing states (i.e., discarding to learning to forwarding). This delay is required because every device must receive information about topology changes before it starts to forward frames. In addition, each port needs time to listen for conflicting information that would make it return to a discarding state;...
  • Page 85 Advanced Configuration Priority – Defines the priority used for this port in the Spanning Tree Protocol. If the path cost for all ports on a switch are the same, the port with the highest priority (i.e., lowest value) will be configured as an active link in the spanning tree. This makes a port with higher priority less likely to be blocked if the Spanning Tree Protocol is detecting network loops.
  • Page 86 System Configuration CLI Commands for STP – The following example configures spanning tree paramters for the bridge and wireless port 5. DUAL OUTDOOR(config)#bridge stp-bridge priority 40000 DUAL OUTDOOR(config)#bridge stp-bridge hello-time 5 DUAL OUTDOOR(config)#bridge stp-bridge max-age 38 DUAL OUTDOOR(config)#bridge stp-bridge forward-time 20 DUAL OUTDOOR(config)#no bridge stp-port spanning-disabled 5 DUAL OUTDOOR(config)#bridge stp-port priority 5 0 DUAL OUTDOOR(config)#bridge stp-port path-cost 5 50...
  • Page 87: Radio Interface

    Radio Interface The IEEE 802.11a and 802.11g interfaces include configuration options for radio signal characteristics and wireless security features. The configuration options are nearly identical, but depend on which interface is operating as the bridge band. Both interfaces and operating modes are covered in this section of the manual. The access point can operate in the following modes: •...
  • Page 88: Radio Settings (802.11A)

    System Configuration Radio Settings (802.11a) The IEEE 802.11a interface operates within the 5 GHz band, at up to 54 Mbps in normal mode or up to 108 Mbps in Turbo mode. Enable – Enables radio communications on the wireless interface. (Default: Enabled) Description –...
  • Page 89 In normal mode, the wireless bridge provides a channel bandwidth of 20 Note: MHz, and supports the maximum number of channels permitted by local regulations (e.g., 11 channels for the United States). In Turbo Mode, the channel bandwidth is increased to 40 MHz to support the increased data rate.
  • Page 90 System Configuration (BSS) and forward them after every second beacon. Using smaller DTIM intervals delivers broadcast/multicast frames in a more timely manner, causing stations in Power Save mode to wake up more often and drain power faster. Using higher DTIM values reduces the power used by stations in Power Save mode, but delays the transmission of broadcast/multicast frames.
  • Page 91 channel with the command. Set any other parameters as required. To view channel the current 802.11a radio settings, use the DUAL OUTDOOR(config)#interface wireless a Enter Wireless configuration commands, one per line. DUAL OUTDOOR(if-wireless a)#description RD-AP#3 DUAL OUTDOOR(if-wireless a)#ssid r&d DUAL OUTDOOR(if-wireless a)#no turbo DUAL OUTDOOR(if-wireless a)#channel 44 DUAL OUTDOOR(if-wireless a)#closed-system DUAL OUTDOOR(if-wireless a)#transmit-power full...
  • Page 92: Radio Settings (802.11G)

    For example, in the United States you can deploy up to three access points in the same area (e.g., channels 1, 6, 11). Also note that the channel for wireless clients is automatically set to the same as that used by the access point to which it is linked.
  • Page 93 • b only: Both 802.11b and 802.11g clients can communicate with the access point, but 802.11g clients can only transfer data at 802.11b standard rates (up to 11 Mbps). Maximum Station Data Rate – The maximum data rate at which the access point transmits unicast packets on the wireless interface.
  • Page 94: Security (Bridge Mode)

    System Configuration DUAL OUTDOOR#show interface wireless g Wireless Interface Information =========================================================== ----------------Identification----------------------------- Description Service Type SSID Channel Status ----------------802.11 Parameters-------------------------- Transmit Power Max Station Data Rate Fragmentation Threshold RTS Threshold Beacon Interval DTIM Interval Maximum Association ----------------Security----------------------------------- Closed System Multicast cipher Unicast cipher WPA clients WPA Key Mgmt Mode...
  • Page 95 Setting up IEEE 802.11 Wired Equivalent Privacy (WEP) shared keys prevents unauthorized access to the wireless bridge network. Be sure to define at least one static WEP key for data encryption. Also, be sure that the WEP keys are the same for all bridge units in the wireless network. Data Encryption Setup –...
  • Page 96: Advanced Encryption Standard (Aes)

    System Configuration Advanced Encryption Standard (AES) AES has been designated by the National Institute of Standards and Technology as the successor to the Data Encryption Standard (DES) encryption algorithm, and will be used by the U.S. government for encrypting all sensitive, nonclassified information.
  • Page 97 • Alphanumeric: Enter keys as an alphanumeric string using between 8 and 31 characters. For each wireless port link (1 to 16), the AES keys must match on the Note: corresponding bridge unit. CLI Commands for WEP Security – From the 802.11a interface configuration mode, use the command to enable WEP encryption.
  • Page 98: Show Interface Wireless

    System Configuration command. To view the current security settings, use the command. DUAL OUTDOOR(config)#interface wireless a Enter Wireless configuration commands, one per line. DUAL OUTDOOR(if-wireless a)#encryption wdsaes alphanumeric DUAL OUTDOOR(if-wireless a)#key wdsaes 1 agoodsecretkey DUAL OUTDOOR(if-wireless a)#exit DUAL OUTDOOR#show interface wireless a Wireless Interface Information =========================================================== ----------------Identification-----------------------------...
  • Page 99: Security (Access Point Mode)

    Security (Access Point Mode) A radio band set to access point mode is configured by default as an “open system,” which broadcasts a beacon signal including the configured SSID. Wireless clients can read the SSID from the beacon, and automatically reset their SSID to allow immediate connection to the access point.
  • Page 100 System Configuration Security Client Support Mechanism WPA over Requires WPA-enabled 802.1x Mode system and network card driver (native support provided in Windows XP) WPA PSK Requires WPA-enabled Mode system and network card driver (native support provided in Windows XP) Although a WEP static key is not needed for WEP over 802.1x, WPA over Note: 802.1x, and WPA PSK modes, you must enable WEP encryption through the web or CLI in order to enable all types of encryption in the access point.
  • Page 101 Setting up shared keys enables the basic IEEE 802.11 Wired Equivalent Privacy (WEP) on the access point to prevent unauthorized access to the network. If you choose to use WEP shared keys instead of an open system, be sure to define at least one static WEP key for user authentication and data encryption.
  • Page 102 System Configuration Shared Key Setup – Select 64 Bit, 128 Bit, or 152 Bit key length. Note that the same size of encryption key must be supported on all wireless clients. 152 Bit key length is only supported on 802.11a radio. (Default: 128 Bit) Key Type –...
  • Page 103 The configuration settings for WEP are summarized below: WEP only Authentication Type: Shared Key WEP (encryption): Enable WPA clients only: Disable Multicast Cipher: WEP Shared Key: 64/128/152 Key Type - Hex: 10/26/32 characters ASCII: 5/13/16 characters Transmit Key: 1/2/3/4 (set index) 802.1x = Disabled MAC Authentication: Any setting 1: See Authentication (page 6-11)
  • Page 104 System Configuration ----------------Security----------------------------------- Closed System Multicast cipher Unicast cipher WPA clients WPA Key Mgmt Mode WPA PSK Key Type Encryption Default Transmit Key Static Keys : Key 1: ***** Key 2: EMPTY Authentication Type =========================================================== DUAL OUTDOOR# The index and length values used in the key command must be the same Note: values used in the encryption and transmit-key commands.
  • Page 105: Wi-Fi Protected Access (Wpa)

    Wi-Fi Protected Access (WPA) WPA employs a combination of several technologies to provide an enhanced security solution for 802.11 wireless networks. The access point supports the following WPA components and features: IEEE 802.1x and the Extensible Authentication Protocol (EAP): WPA employs 802.1x as its basic framework for user authentication and dynamic key management.
  • Page 106 System Configuration to encrypt each data packet. TKIP provides further data encryption enhancements by including a message integrity check for each packet and a re-keying mechanism, which periodically changes the master key. WPA Pre-Shared Key (PSK) Mode: For enterprise deployment, WPA requires a RADIUS authentication server to be configured on the wired network.
  • Page 107 WPA Key Management – WPA can be configured to work in an enterprise environment using IEEE 802.1x and a RADIUS server for user authentication. For smaller networks, WPA can be enabled using a common pre-shared key for client authentication with the access point. •...
  • Page 108 System Configuration The configuration settings for WPA are summarized below: WPA pre-shared key only Authentication Type: Open System WEP (encryption): Enable WPA clients only: Enable WPA Mode: Pre-shared-key Multicast Cipher: WEP/TKIP/AES WPA PSK Type - Hex: 64 characters ASCII: 8-63 characters Shared Key: 64/128/152 802.1x = Disabled MAC Authentication: Disabled/Local...
  • Page 109 the current 802.11g security settings, use the show interface wireless g command (not shown in example). AP(config)#interface wireless g Enter Wireless configuration commands, one per line. AP(if-wireless g)#authentication open AP(if-wireless g)#encryption 128 AP(if-wireless g)#wpa-clients required AP(if-wireless g)#wpa-mode dynamic AP(if-wireless g)#multicast-cipher TKIP AP(if-wireless g)#end AP(config)#802.required AP(config)#no mac-authentication...
  • Page 110: Status Information

    System Configuration Status Information The Status page includes information on the following items: Menu Description AP Status Displays configuration settings for the basic system and the wireless interfaces Station Status Shows wireless clients currently associated with the access point Event Logs Shows log messages stored in memory AP Status The AP Status window displays basic system configuration settings, as well as the...
  • Page 111: Show System

    • IP Default Gateway: IP address of the gateway router between this device and management stations that exist on other network segments. • HTTP Server: Shows if management access via HTTP is enabled. • HTTP Server Port: Shows the TCP port used by the HTTP interface. •...
  • Page 112: Station Status

    System Configuration Station Status The Station Status window shows wireless clients currently associated with the access point. The Station Status page displays basic connection information for all associated stations. Note that this page is automatically refreshed every five seconds. • Station Address: The MAC address of the remote wireless bridge. •...
  • Page 113 CLI Commands for Displaying Station Information – To view status of clients currently associated with the access point, use the show station command from the Exec mode. DUAL OUTDOOR#show station Station Table Information =========================================================== 802.11a Channel : 56 No 802.11a Channel Stations. 802.11g Channel : 11 802.11g Channel Station Table Station Address...
  • Page 114: Event Logs

    System Configuration Event Logs The Event Logs window shows the log messages generated by the wireless bridge and stored in memory. The Event Logs table displays the following information: • Log Time: The time the log message was generated. • Event Level: The logging level associated with this message. For a description of the various levels, see “logging level”...
  • Page 115: Chapter 7: Command Line Interface

    Chapter 7: Command Line Interface Using the Command Line Interface Accessing the CLI When accessing the management interface for the wireless bridge via a Telnet connection, the wireless bridge can be managed by entering command keywords and parameters at the prompt. Using the wireless bridge’s command-line interface (CLI) is very similar to entering commands on a UNIX system.
  • Page 116: Entering Commands

    Command Line Interface Entering Commands This section describes how to enter CLI commands. Keywords and Arguments A CLI command is a series of keywords and arguments. Keywords identify a command, and arguments specify configuration parameters. For example, in the command “show interface ethernet,” show and interface are keywords, and ethernet is an argument that specifies the interface type.
  • Page 117: Partial Keyword Lookup

    Interface). You can also display a list of valid keywords for a specific command. For example, the command “show ?” displays a list of possible show commands: Outdoor Bridge#show ? bootfile Show bootfile name bridge Show bridge table filters Show filters hardware Show hardware version history...
  • Page 118: Understanding Command Modes

    Command Line Interface Understanding Command Modes The command set is divided into Exec and Configuration classes. Exec commands generally display information on system status or clear statistical counters. Configuration commands, on the other hand, modify interface parameters or enable certain functions. These classes are further divided into different modes. Available commands depend on the selected mode.
  • Page 119: Command Line Processing

    change to “Outdoor Bridge(if-ethernet)#,” or “Outdoor Bridge(if-wireless a)” indicating that you have access privileges to the associated commands. You can use the end command to return to the Exec mode. Outdoor Bridge(config)#interface ethernet Outdoor Bridge(if-ethernet)# Command Line Processing Commands are not case sensitive. You can abbreviate commands and parameters as long as they contain enough letters to differentiate them from any other currently available commands or parameters.
  • Page 120: Command Groups

    Configures connection parameters for the Ethernet interface Wireless Interface Configures connection parameters for the wireless interface IAPP Enables roaming between multi-vendor access points VLANs Configures VLAN support The access mode shown in the following tables is indicated by these abbreviations: GC (Global Configuration), and IC (Interface Configuration.
  • Page 121: General Commands

    General Commands Command Function configure Activates global configuration mode Returns to the previous configuration mode exit Returns to Exec mode, or exits the CLI ping Sends ICMP echo request packets to another node on the network Exec reset Restarts the system show history Shows the command history buffer show line...
  • Page 122: Exit

    Command Line Interface exit This command returns to the Exec mode or exits the configuration program. Default Setting None Command Mode Example This example shows how to return to the Exec mode from the Interface Configuration mode, and then quit the CLI session: Outdoor Bridge(if-ethernet)#exit Outdoor Bridge#exit CLI session with the wireless bridge is now closed...
  • Page 123: Reset

    Example Outdoor Bridge#ping 10.1.0.19 192.168.1.19 is alive Outdoor Bridge# reset This command restarts the system or restores the factory default settings. Syntax reset <board | configuration> • board - Reboots the system. • configuration - Resets the configuration settings to the factory defaults, and then reboots the system.
  • Page 124: Show Line

    Command Line Interface Example In this example, the show history command lists the contents of the command history buffer: Outdoor Bridge#show history config exit show history Outdoor Bridge# show line This command displays the console port’s configuration settings. Command Mode Exec Example The console port settings are fixed at the values shown below.
  • Page 125: Country

    Command Function Web Server ip http port Specifies the port to be used by the web browser interface ip http server Allows the wireless bridge to be monitored or configured from a browser System Status show system Displays system information show version Displays version information for the system country...
  • Page 126: Prompt

    Command Line Interface Country Code Country Costa Rica Japan Croatia Jordan Cyprus Kazakhstan Czech North Korea Republic Denmark Korea Republic Default Setting US - for units sold in the United States 99 (no country set) - for units sold in other countries Command Mode Exec Command Usage...
  • Page 127: System Name

    Example Outdoor Bridge(config)#prompt RD2 RD2(config)# system name This command specifies or modifies the system name for this device. Use the no form to restore the default system name. Syntax system name name no system name name - The name of this host. (Maximum length: 32 characters) Default Setting Outdoor Bridge...
  • Page 128: Password

    Command Line Interface password After initially logging onto the system, you should set the password. Remember to record it in a safe place. Use the no form to reset the default password. Syntax password password no password password - Password for management access. (Length: 3-16 characters, case sensitive) Default Setting null...
  • Page 129: System Logging Commands

    ip http server This command allows this device to be monitored or configured from a browser. Use the no form to disable this function. Syntax ip http server no ip http server Default Setting Enabled Command Mode Global Configuration Example Outdoor Bridge(config)#ip http server Outdoor Bridge(config)# Related Commands...
  • Page 130: Logging Host

    Command Line Interface Command Mode Global Configuration Command Usage The logging process controls error messages saved to memory. You can use the logging level command to control the type of error messages that are stored in memory. Example Outdoor Bridge(config)#logging on Outdoor Bridge(config)# logging host This command specifies a syslog server host that will receive logging messages.
  • Page 131: Logging Level

    Example Outdoor Bridge(config)#logging console Outdoor Bridge(config)# logging level This command sets the minimum severity level for event logging. Syntax logging level <Emergency | Alert | Critical | Error | Warning | Notice | Informational | Debug> Default Setting Error Command Mode Global Configuration Command Usage Messages sent include the selected level down to the Emergency level.
  • Page 132: Show Logging

    Command Line Interface Default Setting Command Mode Global Configuration Command Usage The command specifies the facility type tag sent in syslog messages. (See RFC 3164.) This type has no effect on the kind of messages reported by the wireless bridge. However, it may be used by the syslog server to sort messages or to store messages in the corresponding database.
  • Page 133: Sntp-Server Ip

    sntp-server Sets the start and end dates for daylight savings time daylight-saving sntp-server timezone Sets the time zone for the wireless bridge’s internal clock show sntp Shows current SNTP configuration settings sntp-server ip This command sets the IP address of the servers to which SNTP time requests are issued.
  • Page 134: Sntp-Server Date-Time

    Command Line Interface Default Setting Disabled Command Mode Global Configuration Command Usage The time acquired from time servers is used to record accurate dates and times for log events. Without SNTP, the wireless bridge only records the time starting from the factory default set at the last bootup (i.e., 00:14:00, January 1, 1970).
  • Page 135: Sntp-Server Daylight-Saving

    sntp-server daylight-saving This command sets the start and end dates for daylight savings time. Use the no form to disable daylight savings time. Syntax sntp-server daylight-saving no sntp-server daylight-saving Default Setting Disabled Command Mode Global Configuration Command Usage The command sets the system clock back one hour during the specified period.
  • Page 136: Show Sntp

    Command Line Interface Example Outdoor Bridge(config)#sntp-server timezone +8 Outdoor Bridge(config)# show sntp This command displays the current time and configuration settings for the SNTP client. Command Mode Exec Example Outdoor Bridge#show sntp SNTP Information ========================================================= Service State : Enabled SNTP (server 1) IP : 137.92.140.80 SNTP (server 2) IP : 192.43.244.18...
  • Page 137: Show Version

    Example Outdoor Bridge#show system System Information =========================================================== Serial Number : 0000000005 System Up time : 0 days, 2 hours, 27 minutes, 19 seconds System Name : Outdoor Bridge System Location System Contact : Contact System Country Code : US - UNITED STATES MAC Address : 00-30-F1-BE-F4-96 IP Address...
  • Page 138: Snmp-Server Community

    Command Line Interface Command Function snmp-server host Specifies the recipient of an SNMP notification operation snmp-server location Sets the system location string show snmp Displays the status of SNMP communications snmp-server community This command defines the community access string for the Simple Network Management Protocol.
  • Page 139: Snmp-Server Enable Server

    Default Setting Contact Command Mode Global Configuration Example Outdoor Bridge(config)#snmp-server contact Paul Outdoor Bridge(config)# Related Commands snmp-server location (7-26) snmp-server enable server This command enables SNMP management access and also enables this device to send SNMP traps (i.e., notifications). Use the no form to disable SNMP service and trap messages.
  • Page 140: Snmp-Server Location

    Command Line Interface no snmp-server host • host_ip_address - IP of the host (the targeted recipient). • host_name - Name of the host. (Range: 1-20 characters) • community-string - Password-like community string sent with the notification operation. Although you can set this string using the snmp-server host command by itself, we recommend that you define this string using the snmp-server community command prior to using the snmp-server host command.
  • Page 141: Show Snmp

    Example Outdoor Bridge(config)#snmp-server location building-1 Outdoor Bridge(config)# Related Commands snmp-server contact (7-24) show snmp This command displays the SNMP configuration settings. Command Mode Exec Example Outdoor Bridge#show snmp SNMP Information ============================================ Service State : Enable Community (ro) : ***** Community (rw) : ***** Location : WC-19 Contact...
  • Page 142: Default Setting

    Command Line Interface Default Setting None Command Mode Exec Command Usage • The file name should not contain slashes (\ or /), the leading letter of the file name should not be a period (.), and the maximum length for file names is 32 characters.
  • Page 143: Copy

    copy This command copies a boot file, code image, or configuration file between the wireless bridge’s flash memory and a FTP/TFTP server. When you save the configuration settings to a file on a FTP/TFTP server, that file can later be downloaded to the wireless bridge to restore system operation.
  • Page 144: Delete

    Command Line Interface The following example shows how to download a configuration file: Outdoor Bridge#copy tftp file 1. Application image 2. Config file 3. Boot block image Select the type of download<1,2,3>: TFTP Source file name:syscfg TFTP Server IP:192.168.1.19 Outdoor Bridge# delete This command deletes a file or image.
  • Page 145: Radius Client

    Command Usage File information is shown below: Column Heading File Name Type File Size Example The following example shows how to display all file information: Outdoor Bridge#dir zz-img.bin 1099676 dflt-img.bin 1075164 syscfg 15316 syscfg_bak 15316 1386496 bytes free Outdoor Bridge# RADIUS Client Remote Authentication Dial-in User Service (RADIUS) is a logon authentication protocol that uses software running on a central server to control access for...
  • Page 146: Radius-Server Port

    Command Line Interface Default Setting None Command Mode Global Configuration Example Outdoor Bridge(config)#radius-server address 192.168.1.25 Outdoor Bridge(config)# radius-server port This command sets the RADIUS server network port. Syntax radius-server [secondary] port <port_number> • secondary - Secondary server. • port_number - RADIUS server UDP port used for authentication messages. (Range: 1024-65535) Default Setting 1812...
  • Page 147: Radius-Server Retransmit

    Example Outdoor Bridge(config)#radius-server key green Outdoor Bridge(config)# radius-server retransmit This command sets the number of retries. Syntax radius-server [secondary] retransmit number_of_retries • secondary - Secondary server. • number_of_retries - Number of times the access point will try to authenticate logon access via the RADIUS server. (Range: 1 - 30) Default Setting Command Mode Global Configuration...
  • Page 148: Show Radius

    Command Line Interface show radius This command displays the current settings for the RADIUS server. Default Setting None Command Mode Exec Example Outdoor Bridge#show radius Radius Server Information ======================================== : 192.168.1.25 Port : 181 : ***** Retransmit Timeout : 10 ======================================== Radius Secondary Server Information ========================================...
  • Page 149 Command Function 802.1x session-timeout Sets the timeout after which a connected client must be re-authenticated address filter default Sets filtering to allow or deny listed addresses address filter entry Enters a MAC address in the filter table address filter delete Removes a MAC address from the filter table mac-authentication server Sets address filtering to be performed with local or remote...
  • Page 150: 802.1X Broadcast-Key-Refresh-Rate

    Command Line Interface Example Outdoor Bridge(config)#802.1x supported Outdoor Bridge(config)# 802.1x broadcast-key-refresh-rate This command sets the interval at which the broadcast keys are refreshed for stations using 802.1x dynamic keying. Syntax 802.1x broadcast-key-refresh-rate <rate> rate - The interval at which the access point rotates broadcast keys. (Range: 0 - 1440 minutes) Default Setting 0 (Disabled)
  • Page 151: 802.1X Session-Timeout

    Command Mode Global Configuration Command Usage Session keys are unique to each client, and are used to authenticate a client connection, and correlate traffic passing between a specific client and the access point. Example Outdoor Bridge(config)#802.1x session-key-refresh-rate 5 Outdoor Bridge(config)# 802.1x session-timeout This command sets the time period after which a connected client must be re-authenticated.
  • Page 152: Address Filter Entry

    Command Line Interface Example Outdoor Bridge(config)#address filter default denied Outdoor Bridge(config)# Related Commands address filter entry (7-38) show authentication (7-40) address filter entry This command enters a MAC address in the filter table. Syntax address filter entry <mac-address> <allowed | denied> •...
  • Page 153: Mac-Authentication Server

    Default None Command Mode Global Configuration Example Outdoor Bridge(config)#address filter delete 00-70-50-cc-99-1b Outdoor Bridge(config)# Related Commands show authentication (7-40) mac-authentication server This command sets address filtering to be performed with local or remote options. Use the no form to disable MAC address authentication. Syntax mac-authentication server [local | remote] •...
  • Page 154: Mac-Authentication Session-Timeout

    Command Line Interface mac-authentication session-timeout This command sets the interval at which associated clients will be re-authenticated with the RADIUS server authentication database. Use the no form to disable reauthentication. Syntax mac-authentication session-timeout <seconds> seconds - Re-authentication interval. (Range: 0-65535) Default 0 (disabled) Command Mode...
  • Page 155: Wds Commands

    WDS Commands The commands described in this section are used to configure the WIreless Distribution System (WDS) forwarding table. Command Function wds channel Selects the radio band to be used for bridge links wds mac-address Configures MAC addresses of nodes in the wireless bridge network wds enable Enables WDS forwarding for specific wireless port IDs...
  • Page 156: Wds Enable

    Command Line Interface Command Mode Global Configuration Command Usage • You can only configure one MAC address per wireless port ID. • The wireless MAC address for each bridge unit is printed on the label on the back of the unit. Example Outdoor Bridge(config)#wds mac-address 1 00-12-34-56-78-9a Outdoor Bridge(config)#...
  • Page 157 Example Outdoor Bridge#show wds Outdoor_Mode ================================================== Port ID Status ================================================== ENABLE ENABLE DISABLE ENABLE DISABLE DISABLE DISABLE DISABLE DISABLE DISABLE DISABLE DISABLE DISABLE DISABLE DISABLE DISABLE ================================================== Outdoor Bridge(config)# MASTER Mac-Address 00-12-34-56-78-9A 00-1A-2B-3C-4D-5E 00-01-02-03-04-05 00-0E-87-3B-60-51 00-00-00-00-00-00 00-00-00-00-00-00 00-00-00-00-00-00 00-00-00-00-00-00 00-00-00-00-00-00 00-00-00-00-00-00 00-00-00-00-00-00 00-00-00-00-00-00...
  • Page 158: Bridge Commands

    Command Line Interface Bridge Commands The commands described in this section are used to set the MAC address table aging time and spanning tree parameters for both the Ethernet and wireless interfaces. Command bridge timeout bridge stp-bridge spanning-tree Enables the spanning tree protocol for the bridge bridge stp-bridge forward-time bridge stp-bridge hello-time bridge stp-bridge max-age...
  • Page 159: Bridge Stp-Bridge Spanning-Tree

    bridge stp-bridge spanning-tree Use this command to enable the Spanning Tree Protocol globally for the wireless bridge. Use the no form to disable it. Syntax bridge stp-bridge spanning-tree no bridge stp-bridge spanning-tree Default Setting Spanning tree is enabled. Command Mode Global Configuration Command Usage The Spanning Tree Protocol (STP) can be used to detect and disable network...
  • Page 160: Bridge Stp-Bridge Hello-Time

    Command Line Interface Command Usage This command sets the maximum time (in seconds) the root device will wait before changing states (i.e., discarding to learning to forwarding). This delay is required because every device must receive information about topology changes before it starts to forward frames. In addition, each port needs time to listen for conflicting information that would make it return to the discarding state;...
  • Page 161: Bridge Stp-Bridge Priority

    Default Setting 20 seconds Command Mode Global Configuration Command Usage This command sets the maximum time (in seconds) a device can wait without receiving a configuration message before attempting to reconfigure. All device ports (except for designated ports) should receive configuration messages at regular intervals.
  • Page 162: Bridge Stp-Port Path-Cost

    Command Line Interface bridge stp-port path-cost Use this command to configure the spanning tree path cost for the specified port. Use the no form to restore the default for the specified port. Syntax bridge stp-port path-cost <port> cost no bridge stp-port path-cost <port> •...
  • Page 163: Bridge Stp-Port Portfast

    Command Usage • This command defines the priority for the use of a port in the Spanning Tree Protocol. If the path cost for all ports on a wireless bridge are the same, the port with the highest priority (that is, lowest value) will be configured as an active link in the spanning tree.
  • Page 164: Bridge Stp-Port Spanning-Disabled

    Command Line Interface bridge stp-port spanning-disabled This command disables the Spanning Tree Protocol for the specified interface. Use the no form to reenable the Spanning Tree Protocol for the specified interface. Syntax bridge stp-port spanning-disabled <port> no bridge stp-port spanning-disabled <port> port - Specifies the port number on the wireless bridge.
  • Page 165: Filtering Commands

    Example Outdoor Bridge#show bridge Bridge Information ================================================= Media Type | Age Time(sec)| ================================================= EtherNet WLAN_A 1000 ================================================== Bridge Id : 32768.037fbef192 Root Bridge Id : 32768.01f47483e2 Root Path Cost : 25 Root Port Id Bridge Status : Enabled Bridge Priority : 32768 Bridge Hello Time : 2 Seconds...
  • Page 166: Filter Ethernet-Type Enable

    Command Line Interface Command Mode Global Configuration Example Outdoor Bridge(config)#filter ap-manage Outdoor Bridge(config)# filter ethernet-type enable This command checks the Ethernet type on all incoming and outgoing Ethernet packets against the protocol filtering table. Use the no form to disable this feature. Syntax filter ethernet-type enable no filter ethernet-type enable...
  • Page 167: Show Filters

    Command Mode Global Configuration Command Usage Use the filter ethernet-type enable command to enable filtering for Ethernet types specified in the filtering table, or the no filter ethernet-type enable command to disable all filtering based on the filtering table. Example Outdoor Bridge(config)#filter ethernet-type protocol ARP Outdoor Bridge(config)# Related Commands...
  • Page 168: Ip Pppoe

    Command Line Interface Command Function pppoe local ip Sets local IP address for the PPPoE tunnel pppoe remote ip Sets remote IP address for the PPPoE tunnel pppoe username Sets the user name for the PPPoE tunnel pppoe password Sets the password for the PPPoE tunnel pppoe service-name Sets the service name for the PPPoE tunnel pppoe restart...
  • Page 169: Pppoe Ipcp Dns

    Default Setting automatic Command Mode Interface Configuration (Ethernet) Command Usage The IP address allocation mode depends on the type of service provided by the ISP. If automatic mode is selected, DHCP is used to allocate the IP addresses for the PPPoE connection. If static addresses have been assigned to by the ISP, these must be entered using the pppoe local ip and pppoe remote ip commands.
  • Page 170: Pppoe Lcp Echo-Interval

    Command Line Interface pppoe lcp echo-interval This command sets the Link Control Protocol (LCP) echo interval for the PPPoE tunnel. Syntax pppoe lcp echo-interval <interval> interval - The interval between sending echo requests. (Range: 1-60 seconds) Default Setting Command Mode Interface Configuration (Ethernet) Command Usage •...
  • Page 171: Pppoe Local Ip

    Command Usage • Echo requests are used to verify the integrity of the link through the PPPoE tunnel. Devices at either end of the link can issue an echo-request. Devices receiving an echo-request must return an echo-reply. • If a link is busy with large data transfers, the echo-reply may not be issued in a timely manner causing the link to timeout.
  • Page 172: Pppoe Remote Ip

    Command Line Interface pppoe remote ip This command sets the remote IP address for the PPPoE tunnel. Syntax pppoe remote ip <ip-address> ip-address - IP address of the remote end of the PPPoE tunnel. Default Setting None Command Mode Interface Configuration (Ethernet) Command Usage If the pppoe ip allocation mode is set to static, the remote IP address must be entered with this command, and the local IP address must be entered with...
  • Page 173: Pppoe Password

    Related Commands pppoe password (7-59) pppoe password This command sets the password for the PPPoE tunnel. Syntax pppoe password <string> string - Password assigned by the service provider. (Range: 1-63 alphanumeric characters) Default Setting None Command Mode Interface Configuration (Ethernet) Command Usage You must enter a password with this command, and a user name with the pppoe username command.
  • Page 174: Pppoe Restart

    Command Line Interface Example Outdoor Bridge#(if-ethernet)#pppoe service-name classA Outdoor Bridge# pppoe restart This command restarts the PPPoE connection with updated parameters. Command Mode Interface Configuration (Ethernet) Command Usage This command restarts PPPoE service using the most recently configured parameters. Example Outdoor Bridge#(if-ethernet)#pppoe restart Outdoor Bridge# show pppoe...
  • Page 175: Ethernet Interface Commands

    Ethernet Interface Commands The commands described in this section configure connection parameters for the Ethernet interface. Command Function interface ethernet Enters Ethernet interface configuration mode dns primary-server Specifies the primary name server dns secondary-server Specifies the secondary name server ip address Sets the IP address for the Ethernet interface ip dhcp Submits a DHCP request for an IP address...
  • Page 176: Ip Address

    Command Line Interface Command Mode Global Configuration Command Usage The primary and secondary name servers are queried in sequence. Example This example specifies two domain-name servers. Outdoor Bridge(if-ethernet)#dns primary-server 192.168.1.55 Outdoor Bridge(if-ethernet)#dns secondary-server 10.1.0.55 Outdoor Bridge(if-ethernet)# Related Commands show interface ethernet (7-64) ip address This command sets the IP address for the (10/100Base-TX) Ethernet interface.
  • Page 177: Related Commands

    Example Outdoor Bridge(config)#interface ethernet Enter Ethernet configuration commands, one per line. Outdoor Bridge(if-ethernet)#ip address 192.168.1.2 255.255.255.0 192.168.1.253 Outdoor Bridge(if-ethernet)# Related Commands ip dhcp (7-63) ip dhcp This command sets the IP address for the currently selected VLAN interface. Use the no form to restore the default IP address. Syntax ip dhcp no ip dhcp...
  • Page 178: Shutdown

    Command Line Interface shutdown This command disables the Ethernet interface. To restart a disabled interface, use the no form. Syntax shutdown no shutdown Default Setting Interface enabled Command Mode Interface Configuration (Ethernet) Command Usage This command allows you to disable the Ethernet port due to abnormal behavior (e.g., excessive collisions), and reenable it after the problem has been resolved.
  • Page 179: Wireless Interface Commands

    Example Outdoor Bridge#show interface ethernet Ethernet Interface Information ======================================== IP Address : 192.168.1.1 Subnet Mask : 255.255.255.0 Default Gateway : 192.168.1.253 Primary DNS : 192.168.1.55 Secondary DNS : 10.1.0.55 Admin status : Up Operational status : Up ======================================== Outdoor Bridge# Wireless Interface Commands The commands described in this section configure connection parameters for the wireless interface.
  • Page 180: Interface Wireless

    Command Line Interface Command Function transmit-key Sets the index of the key to be used for WEP encryption IC-W multicast-cipher Defines the cipher algorithm used for multicasting wpa-clients Defines whether WPA is required or optionally supported for client stations wpa-mode Specifies dynamic keys or a pre-shared key wpa-preshared-key Defines a WPA preshared-key value...
  • Page 181: Ssid

    Command Mode Interface Configuration (Wireless) Example Outdoor Bridge(config)#interface wireless a Outdoor Bridge(if-wireless a)#description RD-AP#3 Outdoor Bridge(if-wireless a)# ssid This command configures the service set identifier (SSID). Syntax ssid <string> string - The name of a basic service set supported by the access point. (Range: 1 - 32 characters) Default Setting Enterprise AP...
  • Page 182: Speed

    Command Line Interface Command Usage When closed system is enabled, the access point will not include its SSID in beacon messages. Nor will it respond to probe requests from clients that do not include a fixed SSID. Example AP(if-wireless g)#closed-system AP(if-wireless g)# speed This command configures the maximum data rate at which remote bridges can...
  • Page 183: Turbo

    Command Mode Interface Configuration (Wireless) Command Usage The available channel settings are limited by local regulations, which determine the number of channels that are available. Example Outdoor Bridge(if-wireless a)#channel 36 Outdoor Bridge(if-wireless a)# turbo This command sets the wireless bridge to an enhanced mode (not regulated in IEEE 802.11a) that provides a higher data rate of up to 108 Mbps.
  • Page 184: Dtim-Period

    Command Line Interface Default Setting Command Mode Interface Configuration (Wireless) Command Usage The beacon signals allow remote bridges to maintain contact with the local wireless bridge. They may also carry power-management information. Example Outdoor Bridge(if-wireless a)#beacon-interval 150 Outdoor Bridge(if-wireless a)# dtim-period This command configures the rate at which remote bridges in sleep mode must wake up to receive broadcast/multicast transmissions.
  • Page 185: Fragmentation-Length

    fragmentation-length This command configures the minimum packet size that can be fragmented when passing through the wireless bridge. Syntax fragmentation-length <length> length - Minimum packet size for which fragmentation is allowed. (Range: 256-2346 bytes) Default Setting 2346 Command Mode Interface Configuration (Wireless) Command Usage •...
  • Page 186: Transmit-Power

    Command Line Interface Command Usage • If the threshold is set to 0, the wireless bridge never sends RTS signals. If set to 2347, the wireless bridge always sends RTS signals. If set to any other value, and the packet size equals or exceeds the RTS threshold, the RTS/CTS (Request to Send / Clear to Send) mechanism will be enabled.
  • Page 187: Max-Association

    max-association This command configures the maximum number of clients that can be associated with the access point at the same time. Syntax max-association <count> count - Maximum number of associated stations. (Range: 0-64) Default Setting Command Mode Interface Configuration (Wireless) Example AP(if-wireless g)#max-association 32 AP(if-wireless g)#...
  • Page 188: Encryption

    Command Line Interface encryption This command defines whether WEP or AES encryption is used to provide privacy for wireless communications. Use the no form to disable encryption. Syntax encryption {wep <key-length> | wdsaes <alphanumeric | hex>} no encryption • wep - The keyword that enables WEP encryption. - key-length - Size of encryption key.
  • Page 189: Key

    Example Outdoor Bridge(if-wireless a)#encryption wep 128 Outdoor Bridge(if-wireless a)# Related Commands key (7-75) This command sets the keys used for WEP and AES encryption. Use the no form to delete a configured key. Syntax key {wep <index size type wep-value> | wdsaes <port-id aes-value>} no key {wep <index>...
  • Page 190: Transmit-Key

    Command Line Interface • If AES is enabled, each wireless bridge link in the network must be configured to use the same AES key • The AES key type value entered using the key command must be the same as the type specified in the encryption command. Example Outdoor Bridge(if-wireless a)#key wep 1 64 ascii 12345 Outdoor Bridge(if-wireless a)#key wep 2 64 ascii abcde...
  • Page 191: Wpa-Clients

    Default Setting Command Mode Interface Configuration (Wireless) Command Usage • WPA enables the access point to support different unicast encryption keys for each client. However, the global encryption key for multicast and broadcast traffic must be the same for all clients. This command sets the encryption type that is supported by all clients.
  • Page 192: Wpa-Mode

    Command Line Interface • supported - Support clients with or without WPA. Default Setting Supported Command Mode Interface Configuration (Wireless) Command Usage Wi-Fi Protected Access (WPA) provides improved data encryption, which was weak in WEP, and user authentication, which was largely missing in WEP. WPA uses the following security mechanisms.
  • Page 193: Wpa-Preshared-Key

    Command Mode Interface Configuration (Wireless) Command Usage • When the WPA mode is set to “dynamic,” clients are authenticated using 802.1x via a RADIUS server. Each client has to be WPA-enabled or support 802.1x client software. A RADIUS server must also be configured and be available in the wired network.
  • Page 194: Wpa-Psk-Type

    Command Line Interface Example AP(if-wireless g)#wpa-preshared-key ASCII agoodsecret AP(if-wireless g)# Related Commands wpa-clients (7-77) wpa-mode (7-78) wpa-psk-type This command defines the Wi-Fi Protected Access (WPA) preshared-key type. Syntax wpa-psk-type <type> type - Input format. (Options: Alphanumeric, HEX) Default Setting Command Mode Interface Configuration (Wireless) Example AP(if-wireless a)#wpa-preshared-key ASCII agoodsecret...
  • Page 195: Show Interface Wireless

    show interface wireless This command displays the status for the wireless interface. Syntax show interface wireless a • a - 802.11a radio interface. Command Mode Exec Example Outdoor Bridge#show interface wireless a Wireless Interface Information ========================================================= ----------------Identification----------------------------- Description Turbo Mode Channel Status Service type...
  • Page 196: Iapp Commands

    Command Usage The current 802.11 standard does not specify the signaling required between access points in order to support clients roaming from one access point to another. In particular, this can create a problem for clients roaming between access points from different vendors. This command is used to enable or disable 802.11f handover signaling between different access points, especially...
  • Page 197: Vlan Commands

    Example AP(config)#iapp AP(config)# VLAN Commands The wireless bridge can enable the support of VLAN-tagged traffic passing between the wireless interface and the wired network. When VLAN support is enabled, the wireless bridge tags traffic passing to the wired network with the assigned native VLAN ID (a number between 1 and 64). Traffic received from the wired network must also be tagged with the same VLAN ID.
  • Page 198: Native-Vlanid

    Command Line Interface Example Outdoor Bridge(config)#vlan enable Reboot system now? <y/n>: y Related Commands native-vlanid (7-84) native-vlanid This command configures the native VLAN ID for the wireless bridge. Syntax native-vlanid <vlan-id> vlan-id - Native VLAN ID. (Range: 1-64) Default Setting Command Mode Global Configuration Command Usage...
  • Page 199: Appendix A: Troubleshooting

    Appendix A: Troubleshooting Check the following items before you contact local Technical Support. If wireless bridge units do not associate with each other, check the following: • Check the power injector LED for each bridge unit to be sure that power is being supplied •...
  • Page 200 Troubleshooting If you forgot or lost the password: • Contact Technical Support.
  • Page 201: Appendix B: Specifications

    Appendix B: Specifications General Specifications Maximum Channels 802.11a: US & Canada: 8 (normal mode), 3 (turbo mode) Japan: 4 (normal mode), 1 (turbo mode) ETSI: 11 channels (normal mode), 4 (turbo mode) Taiwan: 8 (normal mode), 3 (turbo mode) 802.11g: FCC/IC: 1-11 ETSI: 1-13 France: 10-13...
  • Page 202 Specifications 802.11b/g: 2.4 ~ 2.4835 GHz (US, Canada, ETSI) 2.4 ~ 2.497 GHz (Japan) 2.400 ~ 2.4835 GHz (Taiwan) Power Injector Input: 100-240 VAC, 47-63 Hz, 1.5 A Output: 48 VDC, 1.2 A Bridge Power (DC) Input voltage: 48 volts, 1.2 A, 30 watts maximum Physical Size 19.8 cm x 19.8 cm x 6.33 cm (7.8 x 7.8 x 2.49 in) Weight...
  • Page 203: Antenna Specifications

    Antenna Specifications 17 dBi Integrated Panel Frequency range 5.150 - 5.850 GHz Gain 17 dBi VSWR 1.8 : 1 max Polarization Linear, vertical/horizontal HPBW Horizontal: 20° Vertical: 22° Front-to-Back Ratio >25 dB Power Handling 10 W (cw) Impedance 50 Ohms Connector SMA female 17 dBi Integrated Panel Antenna Link Budget...
  • Page 204: Dbi Omnidirectional (2.4 Ghz)

    Specifications 17 dBi Integrated Panel Antenna Link Budget (5.825 GHz, Cable Loss 1 dB, Fade Margin 5 dB) Modulation/Rates Transmit Power Turbo Mode BPSK (12 Mbps) BPSK (18 Mbps) QPSK (24 Mbps) QPSK (36 Mbps) 16 QAM (48 Mbps) 16 QAM (72 Mbps) 64 QAM (96 Mbps) 64 QAM (108 Mbps) * The maximum range calculated with a 17 dBi panel antenna at the far end of the link.
  • Page 205: Dbi Omnidirectional (5 Ghz)

    Radome Material: Fiber glass Color: Gray-white Environmental Survival Wind Speed: 216 km/hr Temperature: -40 °C to 80 °C Humidity: 95% @ 25 °C Mechanical Dimensions: 460 x 19 mm (diameter) Weight: 200 g 8 dBi Omnidirectional Antenna Link Budget (2.483 GHz, Cable Loss 0 dB, Fade Margin 3 dB) Modulation/Rates Transmit Power BPSK (6 Mbps)
  • Page 206 Specifications Downtilt 0° Power Handling 5 W (cw) Impedance 50 Ohms Connector N type, female Radome Material: Fiber glass Color: Gray-white Environmental Survival Wind Speed: 216 km/hr Temperature: -40 °C to 80 °C Humidity: 95% @ 25 °C Mechanical Dimensions: 70 x 80 x 373 mm Weight: 245 g 8 dBi Omnidirectional Antenna Link Budget (5.825 GHz, Cable Loss 0 dB, Fade Margin 3 dB)
  • Page 207: Dbi Omnidirectional (2.4 Ghz

    8 dBi Omnidirectional Antenna Link Budget (5.825 GHz, Cable Loss 0 dB, Fade Margin 3 dB) Modulation/Rates Transmit Power 16 QAM (72 Mbps) 64 QAM (96 Mbps) 64 QAM (108 Mbps) * The maximum range calculated with a 2 dBi NIC antenna at the far end of the link. The maximum transmit power (hence range) may be lowered by regulatory (FCC etc) EIRP (effective isotropic radiated power) limits.
  • Page 208: 16.5 Dbi 60-Degree Sector

    Specifications Mechanical Dimensions: 620 x 88 x 70 mm Weight: 590 g 13.5 dBi 120-Degree Sector Antenna Link Budget (5.825 GHz, Cable Loss 1 dB, Fade Margin 5 dB) Modulation/Rates Transmit Power Normal Mode BPSK (6 Mbps) BPSK (9 Mbps) QPSK (12 Mbps) QPSK (18 Mbps) 16 QAM (24 Mbps)
  • Page 209 HPBW Horizontal: 60° Vertical: 6° Downtilt 0° Power Handling 5 W (cw) Impedance 50 Ohms Connector N type, female Radome Material: ABS Color: Gray, white Environmental Survival Wind Speed: 216 km/hr Temperature: -40 °C to 80 °C Humidity: 95% @ 25 °C Mechanical Dimensions: 620 x 88 x 70 mm Weight: 565 g...
  • Page 210: 23 Dbi High-Gain Panel

    Specifications 16.5 dBi 60-Degree Sector Antenna Link Budget (5.825 GHz, Cable Loss 1 dB, Fade Margin 5 dB) Modulation/Rates Transmit Power QPSK (36 Mbps) 16 QAM (48 Mbps) 16 QAM (72 Mbps) 64 QAM (96 Mbps) 64 QAM (108 Mbps) * The maximum range calculated with a 16.5 dBi sector antenna at the far end of the link.
  • Page 211 Environmental Survival Wind Speed: 216 km/hr Temperature: -40 °C to 80 °C Humidity: 95% @ 25 °C Mechanical Dimensions: 360 x 360 x 16 mm Weight: 1.6 kg 23 dBi Panel Antenna Link Budget (5.825 GHz, Cable Loss 1 dB, Fade Margin 5 dB) Modulation/Rates Transmit Power Normal Mode...
  • Page 212 Specifications B-12...
  • Page 213: Appendix C: Cables And Pinouts

    Appendix C: Cables and Pinouts Twisted-Pair Cable Assignments Caution: DO NOT plug a phone jack connector into a power injector RJ-45 port. Use only twisted-pair cables with RJ-45 connectors that conform with FCC standards. For 10/100BASE-TX connections, a twisted-pair cable must have two pairs of wires. Each wire pair is identified by two different colors.
  • Page 214: 10/100Base-Tx Pin Assignments

    Cables and Pinouts 10/100BASE-TX Pin Assignments Use unshielded twisted-pair (UTP) or shielded twisted-pair (STP) cable for RJ-45 connections: 100-ohm Category 3 or better cable for 10 Mbps connections, or 100-ohm Category 5 or better cable for 100 Mbps connections. Also be sure that the length of any twisted-pair connection does not exceed 100 meters (328 feet).
  • Page 215: 8-Pin Din Connector Pinout

    connecting supports automatic MDI/MDI-X operation, you can use either “straight-through” or “crossover” cable. EIA/TIA 568B RJ-45 Wiring Standard End A 8-Pin DIN Connector Pinout The Ethernet cable from the power injector connects to an 8-pin DIN connector on the wireless bridge. This connector is described in the following figure and table. 8-Pin DIN Ethernet Port Pinout Signal Name Transmit Data plus (TD+)
  • Page 216: 8-Pin Din To Rj-45 Cable Wiring

    Cables and Pinouts 8-Pin DIN to RJ-45 Cable Wiring an extended Ethernet cable to connect from the power injector’s RJ-45 construct Output port to the wireless bridge’s 8-pin DIN connector, follow the wiring diagram below. Use Category 5 or better UTP or STP cable, maximum length 100 m (328 ft), and be sure to connect all four wire pairs.
  • Page 217: Glossary

    UTP cable. Access Point An internetworking device that seamlessly connects wired and wireless networks. Access points attached to a wired network, support the creation of multiple radio cells that enable roaming throughout a facility. Advanced Encryption Standard (AES) An encryption algorithm that implements symmetric key cryptography.
  • Page 218 Glossary of automatic allocation of reusable network addresses and additional configuration options. Encryption Data passing between the access point and clients can use encryption to protect from interception and evesdropping. Ethernet A popular local area data communications network, which accepts transmission from computers and terminals.
  • Page 219 Glossary RTS Threshold Transmitters contending for the medium may not be aware of each other. RTS/CTS mechanism can solve this “Hidden Node Problem.” If the packet size is smaller than the preset RTS Threshold size, the RTS/CTS mechanism will NOT be enabled. Service Set Identifier (SSID) An identifier that is attached to packets sent over the wireless LAN and functions as a password for joining a particular radio cell;...
  • Page 220 Glossary Glossary-4...
  • Page 221: Index

    Index Advanced Encryption Standard See AES 6-56 configuring 6-46 AES, configuring 6-44, 7-74 authentication 6-11, 7-73 configuring 6-11, 7-73 MAC address 6-11, 7-37, 7-38 type 5-6, 6-49, 7-68 Basic Service Set See BSS beacon interval 6-39, 7-69 rate 6-39, 7-70 BOOTP 7-62, 7-63 BPDU 6-33 BSS 2-2...
  • Page 222 hardware version, displaying 7-23 IAPP 7-82 IEEE 802.11a 1-1, 6-37, 7-66 configuring interface 6-38, 7-66 maximum data rate 6-39, 7-68 radio channel 6-39, 7-68 IEEE 802.11b 6-37 IEEE 802.11f 7-82 IEEE 802.11g 6-37 configuring interface 6-42 maximum data rate 6-43, 7-68 radio channel 6-42, 7-68 IEEE 802.1x 6-55, 7-34 configuring 6-11, 6-12, 7-34...
  • Page 223 shared key 5-7, 6-45, 6-52, 7-75 Simple Network Management Protocol See SNMP Simple Network Time Protocol See SNTP SNMP 6-19, 7-23 community name 6-19, 7-24 community string 7-24 enabling traps 6-20, 7-25 trap destination 6-20, 7-25 trap manager 6-20, 7-25 SNTP 6-27, 7-19 enabling client 6-27, 7-19 server 6-27, 7-19...
  • Page 224 Index Index-4...
  • Page 226 E032004-R01 150xxxxxxxxxA...

This manual is also suitable for:

Awap05om

Table of Contents