Alfa Network AWAP02O-86 User Manual

Enterprise 2.4 ghz / 5 ghz 802.11 a+b/g wireless outdoor access point
Hide thumbs Also See for AWAP02O-86:

Advertisement

Quick Links

Enterprise Outdoor
802.11 a+b/g Access Point
USER MANUAL

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the AWAP02O-86 and is the answer not in the manual?

Questions and answers

Summary of Contents for Alfa Network AWAP02O-86

  • Page 1 Enterprise Outdoor 802.11 a+b/g Access Point USER MANUAL...
  • Page 2 User Guide 2.4 GHz / 5 GHz Wireless Outdoor Access Point IEEE 802.11g and 802.11a Dual-band Access Point...
  • Page 3: Table Of Contents

    Table of Contents Chapter 1: Introduction Chapter 2: Hardware Pole Installation Chapter 3: Hardware Wall Installation Chapter 4: Network Configuration Chapter 5: Configuration Chapter 6: System Configuration Chapter 7: Country code setting Appendix Glossary Index...
  • Page 4: Chapter 1: Introduction

    The access point supports up to four Virtual Access Points per physical radio interface, that is four on the 802.11a radio and four on the 802.11g radio. This allows traffic to be separated for different user groups using an access point that services one area.
  • Page 5: Package Checklist

    1. One Wireless Outdoor Access Point 2. One Mounting Kits 3. One 48W PoE Adapter 4. One User Guide CD Inform your dealer if there are any incorrect, missing or damaged parts Hardware Description Wireless Outdoor Access Point 48V Power Over Ethernet Adapter...
  • Page 6: Features And Benefits

    • Provides seamless roaming within the IEEE 802.11a, 802.11b and 802.11g WLAN environment • Scans all available channels and selects the best channel for each client based on the signal-to-noise ratio • Allows the country of operation to be set to match regulatory requirements (for...
  • Page 7: System Defaults

    Introduction System Defaults The following table lists some of the access point’s basic system defaults. Table 1-1. System Defaults Feature Parameter Default Identification System Name Enterprise Wireless AP Administration User Name admin Password Null (no passowrd) General HTTP Server Enabled...
  • Page 8 System Defaults Table 1-1. System Defaults Feature Parameter Default MAC Authentication Disabled Authentication Session Timeout 0 minutes (disabled) Local MAC System Default Allowed Local MAC Permission Allowed 802.1X Authentication Status Disabled Broadcast Key Refresh 0 minutes (disabled) Session Key Refresh...
  • Page 9 SNTP Server Status Enabled SNTP Server 1 IP 137.92.140.80 SNTP Server 2 IP 192.43.244.18 Date and Time 00:00, Jan 1, 1970 (when there is no time server) Daylight Saving Time Disabled Time Zone GMT-5 (Eastern Time, US and Canada) Ethernet Interface...
  • Page 10 Full Max Station Data Rate 54 Mbps Multicast Data Rate 6 Mbps Beacon Interval 100 TUs Data Beacon Rate (DTIM Interval) 1 beacon RTS Threshold 2347 bytes Association Timeout Interval 30 minutes Authentication Timeout Interval 60 minutes Rogue AP Detection...
  • Page 11 Max Station Data Rate 54 Mbps Multicast Data Rate 5.5 Mbps Preamble Length Long Beacon Interval 100 TUs Data Beacon Rate (DTIM Interval) 1 beacon RTS Threshold 2347 bytes Association Timeout Interval 30 minutes Authentication Timeout Interval 60 minutes Rogue AP Detection...
  • Page 12 System Defaults Table 1-1. System Defaults Feature Parameter Default Link Integrity Status Disabled Ping Interval 30 seconds Fail Retry Count 1-11...
  • Page 13: Chapter 2: Hardware Pole Installation

    Chapter 2 & 3: Hardware Installation...
  • Page 14: Chapter 4: Network Configuration

    Access Point also provides repeater and bridging services that can be configured independently on either the 5 GHz or 2.4 GHz radio interfaces. Access points can be deployed to support wireless clients and connect wired LANs in the following configurations: •...
  • Page 15: Network Topologies

    LAN. Computers in a specific ad hoc wireless LAN must therefore be configured to the same radio channel. An ad hoc wireless LAN can be used for a branch office or SOHO operation.
  • Page 16: Infrastructure Wireless Lan

    Service Set (BSS) consists of a group of wireless PC users, and an access point that is directly connected to the wired LAN. Each wireless PC in this BSS can talk to any computer in its wireless group via a radio link, or access other computers or network resources in the wired LAN infrastructure via the access point.
  • Page 17: Infrastructure Wireless Lan For Roaming Wireless Pcs

    The BSS ID is only set by the access point, never by its clients. The clients only need to set the Service Set Identifier (SSID) that identifies the service set provided by one or more access points.
  • Page 18: Infrastructure Wireless Bridge

    2.4 GHz (802.11b/g) bands and can be used with various external antennas to offer flexible deployment options. Up to six WDS bridge links can be specified for each unit in the wireless bridge network. One unit only must be configured as the “root bridge” in the wireless network.
  • Page 19: Infrastructure Wireless Repeater

    The access point supports up to six WDS repeater links. In repeater mode, the access point does not support an Ethernet link to a wired LAN. Note that when the access point operates in this mode only half the normal throughput is possible.
  • Page 20: Chapter 5: Configuration

    The initial configuration steps can be made through the web browser interface or CLI. The access point requests an IP address via DHCP by default. If no response is received from the DHCP server, then the access point uses the default address 192.168.2.2 If this address is not compatible with your network, you can first use the...
  • Page 21 Logging In Logging In There are only a few basic steps you need to complete to connect the access point to your corporate network, and provide network access to wireless clients. The access point can be managed by any computer using a web browser (Internet Explorer 5.0 or above, or Netscape 6.2 or above).
  • Page 22 Initial Configuration The home page displays the Main Menu.
  • Page 23: Chapter 6: System Configuration

    Chapter 6: System Configuration Before continuing with advanced configuration, first complete the initial configuration steps described in Chapter 4 to set up an IP address for the access point. The access point can be managed by any computer using a web browser (Internet Explorer 5.0 or above, or Netscape 6.2 or above).
  • Page 24: Advanced Configuration

    Configures SNMP settings 6-38 SNMP Controls access to this access point from management stations 6-38 using SNMP, as well as the hosts that will receive trap messages SNMP Trap Filters Defines trap filters for SNMPv3 users 6-46 SNMP Targets Specifies SNMPv3 users that will receive trap messages...
  • Page 25: System Identification

    Shows log messages stored in memory 6-91 System Identification The system name for the access point can be left at its default setting. However, modifying this parameter can help you to more easily distinguish different devices in your network. System Name – An alias for the access point, enabling the device to be uniquely...
  • Page 26 IP configuration, if needed. Note: If there is no DHCP server on your network, or DHCP fails, the access point will automatically start up with a default IP address of 192.168.2.2.
  • Page 27 • Subnet Mask: The mask that identifies the host address bits used for routing to specific subnets. • Default Gateway: The default gateway is the IP address of the router for the access point, which is used if the requested destination address is not on the local subnet.
  • Page 28 An authentication server contains a database of user credentials for each user that requires access to the network. A primary RADIUS server must be specified for the access point to implement IEEE 802.1X network access control and Wi-Fi Protected Access (WPA) wireless security.
  • Page 29 System Configuration...
  • Page 30 VLAN ID Format – A VLAN ID (a number between 1 and 4094) can be assigned to each client after successful authentication using IEEE 802.1X and a central RADIUS server.
  • Page 31: Ssh Settings

    Advanced Configuration SSH Settings Telnet is a remote management tool that can be used to configure the access point from anywhere in the network. However, Telnet is not secure from hostile attacks. The Secure Shell (SSH) can act as a secure replacement for Telnet. The SSH...
  • Page 32 MAC addresses can be manually configured on the access point itself without the need to set up a RADIUS server, but managing a large number of MAC addresses across many access points is very cumbersome. A RADIUS server can be used to centrally manage a larger database of user MAC addresses.
  • Page 33 Use the Local MAC Authentication section of this web page to set up the local database, and configure all access points in the wireless network service area with the same MAC address database.
  • Page 34 • MAC Address: Physical address of a client. Enter six pairs of hexadecimal digits separated by hyphens; for example, 00-90-D1-12-AB-89. • Permission: Select Allow to permit access or Deny to block access. If Delete is selected, the specified MAC address entry is removed from the database.
  • Page 35: Filter Control

    Advanced Configuration Filter Control The access point can employ network traffic frame filtering to control access to network resources and increase security. You can prevent communications between wireless clients and prevent access point management from wireless clients. Also, you can block specific Ethernet traffic from being forwarded by the access point.
  • Page 36 • Disabled: Access point does not filter Ethernet protocol types. • Enabled: Access point filters Ethernet protocol types based on the configuration of protocol types in the filter table. If the status of a protocol is set to “ON,” the protocol is filtered from the access point.
  • Page 37 RADIUS server to be assigned to each client. If a client is not assigned to a specific VLAN or if 802.1X is not used, the client is assigned to the default VLAN for the VAP interface with which it is associated. The access point only allows traffic tagged with assigned VLAN IDs or default VLAN IDs to access clients associated on each VAP interface.
  • Page 38 Advanced Configuration When setting up VLAN IDs for each user on the RADIUS server, be sure to use the RADIUS attributes and values as indicated in the following table. Number RADIUS Attribute Value Tunnel-Type VLAN (13) Tunnel-Medium-Type Tunnel-Private-Group-ID VLANID (1 to 4094 as hexadecimal or string) VLAN IDs on the RADIUS server can be entered as hexadecimal digits or a string (see “radius-server vlan-format”...
  • Page 39: Wds Settings

    “Parent” link to the root bridge or to a bridge connected to the root bridge. The other five WDS links are available as “Child” links to other bridges. • Bridge Role – Each radio interface can be set to operate in one of the following four modes: (Default: AP) •...
  • Page 40 • Root Bridge: Operates as the root bridge in the wireless bridge network. Up to six ”Child” links are available to other bridges in the network. • Bridge Parent – The physical layer address of the root bridge unit or the bridge unit connected to the root bridge. (12 hexadecimal digits in the form “xx-xx-xx-xx-xx-xx”)
  • Page 41 (STP-compliant switch, bridge or router) that serves as the root of the spanning tree network. It selects a root port on each bridging device (except for the root device) which incurs the lowest path cost when forwarding a packet from that device to the root device.
  • Page 42 Any port that ages out STP information (provided in the last configuration message) becomes the designated port for the attached LAN. If it is a root port, a new root port is selected from among the device ports attached to the network. (Range: 6-40 seconds) •...
  • Page 43 • Link Port Priority – Defines the priority used for this port in the Spanning Tree Protocol. If the path cost for all ports on a switch are the same, the port with the highest priority (i.e., lowest value) will be configured as an active link in the spanning tree.
  • Page 44 • Any IP: Indicates that any IP address is allowed management access. • Single IP: Specifies a single IP address that is allowed management access. • Multiple IP: Specifies an address range as defined by the entered IP address and subnet mask. For example, IP address 192.168.2.6 and subnet mask 255.255.255.0, defines all IP addresses from 192.168.2.2 to 192.168.2.254.
  • Page 45: Changing The Password

    “admin” user name from the system. Note: Pressing the Reset button on the back of the access point for more than five seconds resets the user name and password to the factory defaults. For this reason, we recommend that you protect the access point from physical access by unauthorized persons.
  • Page 46: Upgrading Firmware

    System Configuration Setting the Timeout Interval You can set the timeout interval for web access to the unit, after which the user will have to re-enter the username and password. Session Timeout for WEB – Sets the time limit for an idle web interface session.
  • Page 47 FTP or TFTP server is associated, and then configure the management station, or the network port to which it is attached, with the same VLAN ID. If you are managing the access point from a wireless client, the VLAN ID for the wireless client must be configured on a RADIUS server.
  • Page 48 “myfolder/syscfg.” Other than to indicate a path, the file name must not contain any slashes (\ or /), the leading letter cannot be a period (.), and the maximum length for file names on the FTP/TFTP server is 255 characters.
  • Page 49 Advanced Configuration Upon uploading a new configuration file you will be prompted to either restore factory settings, or reboot the unit. 6-33...
  • Page 50: System Log

    Enabling System Logging The access point supports a logging process that can control error messages saved to memory or sent to a Syslog server. The logged messages serve as a valuable tool for isolating access point and network problems. System Log Setup – Enables the logging of error messages. (Default: Disable) Server (1-4) –...
  • Page 51 Debug Debugging messages Note: The access point error log can be viewed using the Event Logs window in the Status section (page 6-91). The Event Logs window displays the last 128 messages logged in chronological order, from the newest to the oldest. Log messages saved in the access point’s memory are erased when the device is...
  • Page 52: Configuring Sntp

    If the clock is not set, the access point will only record the time from the factory default set at the last bootup.
  • Page 53 Advanced Configuration Note: The access point also allows you to disable SNTP and set the system clock manually. Set Time Zone – SNTP uses Coordinated Universal Time (or UTC, formerly Greenwich Mean Time, or GMT) based on the time at the Earth’s prime meridian, zero degrees longitude.
  • Page 54 Managed devices supporting SNMP contain software, which runs locally on the device and is referred to as an agent. A defined set of variables, known as managed objects, is maintained by the SNMP agent and used to manage the device. These objects are defined in a Management Information Base (MIB) that provides a standard presentation of the information controlled by the agent.
  • Page 55: Configuring Snmp And Trap Message Parameters

    SNMP Configuring SNMP and Trap Message Parameters The access point SNMP agent must be enabled to function (for versions 1, 2c, and 3 clients). Management access using SNMP v1 and v2c also requires community strings to be configured for authentication. Trap notifications can be enabled and sent to up to four management stations.
  • Page 56 ID is automatically generated that is unique to the access point. (Range: 10 to 64 hexadecimal characters) Note: If the local engine ID is deleted or changed, all SNMP users will be cleared. All existing users will need to be re-configured. If you want to change the default engine ID, change it first before configuring other SNMP v3 parameters.
  • Page 57 • iappContextDataSent - A client station’s Context Data has been sent to another access point with which the station has associated. • sntpServerFail - The access point has failed to set the time from the configured SNTP server. • wirelessExternalAntenna - An external antenna has been enabled.
  • Page 58 • dot11StationAuthenticateFail - A client station has tried and failed to authenticate to the network. • Enable All Traps - Click the button to enable all the available traps. • Disable All Traps - Click the button to disable all the available traps.
  • Page 59: Configuring Snmpv3 Users

    A minimum of eight plain text characters is required. Action – Click the Add button to add a new user to the list. Click the edit button to change details of an existing user. Click the Del button to remove a user from the list.
  • Page 60: Configuring Snmpv3 Trap Filters

    (see below). To edit an existing filter, select the radio button next to the entry in the table and then click the Edit button. To delete a filter, select the radio button next to the entry in the table and then click the Delete button.
  • Page 61 Filter Type – Indicates if the filter is to “include” or “exclude” the MIB subtree objects from the filter. Note that MIB objects included in the filter are not sent to the receiving target and objects excluded are sent. By default all traps are sent, so you can first use an “include”...
  • Page 62: Configuring Snmpv3 Targets

    (see below). To edit an existing target, select the radio button next to the entry in the table and then click the Edit button. To delete targets, select the radio button next to the entry in the table and then click the Delete button.
  • Page 63 10 target IDs. (Maximum length: 32 characters) IP Address – Specifies the IP address of the receiving management station. UDP Port – The UDP port that is used on the receiving management station for notification messages.
  • Page 64: Radio Interface

    Service Set Identification (SSID) and security settings. However, most radio signal parameters apply to all four VAP interfaces. The VAPs function similar to a VLAN, with each VAP mapped to its own VLAN ID. Traffic to specific VAPs can be segregated based on user groups or application traffic.
  • Page 65 Radio Interface Radio Settings A (802.11a) The IEEE 802.11a interface operates within the 5 GHz band, at up to 54 Mbps in normal mode or up to 108 Mbps in Turbo mode. First configure the radio settings that apply to the individual VAPs (Virtual Access Point) and the common radio settings that apply to the overall system.
  • Page 66 WPA2 PMKSA Life Time – WPA2 provides fast roaming for authenticated clients by retaining keys and other security settings in a cache for each VAP. In this way, when clients roam back into a VAP they had previously been using, re-authentication is not required.
  • Page 67: Configuring Rogue Ap Detection

    To configure Rouge AP detection, select the Radio Settings page, and scroll down to the “Rouge AP” section. Rogue AP – A “rogue AP” is either an access point that is not authorized to participate in the wireless network, or an access point that does not have the correct security configuration.
  • Page 68 • AP Scan Interval – Sets the time between each rogue AP scan. (Range: 30 -10080 minutes; Default: 720 minutes) • AP Scan Duration – Sets the length of time for each rogue AP scan. A long scan duration time will detect more access points in the area, but causes more disruption to client access.
  • Page 69 54 Mbps. Turbo Mode is an enhanced mode (not regulated in IEEE 802.11a) that provides a higher data rate of up to 108 Mbps. Enabling Turbo Mode allows the access point to provide connections up to 108 Mbps. (Default: Disabled) Note: In normal mode, the access point provides a channel bandwidth of 20 MHz, and supports the maximum number of channels permitted by local regulations (e.g.,...
  • Page 70 Maximum Supported Rate – The maximum data rate at which the access point transmits unicast packets on the wireless interface. The maximum transmission distance is affected by the data rate. The lower the data rate, the longer the transmission distance. (Options: 54, 48, 36, 24 Mbps; Default: 54 Mbps) Maximum Associated Clients –...
  • Page 71 Antenna ID is set to "Default Antenna" to use the access point's integrated antennas. • Right: The radio only uses the antenna on the right side (the side closest to the access point LEDs). Select this method when using an optional external antenna that is connected to the right antenna connector.
  • Page 72 CTS (clear to send) frame to notify the sending station that it can start sending data. If the RTS threshold is set to 0, the access point always sends RTS signals. If set to 2347, the access point never sends RTS signals. If set to any other value, and the packet size equals or exceeds the RTS threshold, the RTS/CTS (Request to Send / Clear to Send) mechanism will be enabled.
  • Page 73 Access Categories — WMM defines four access categories (ACs): voice, video, best effort, and background. These categories correspond to traffic priority levels and are mapped to IEEE 802.1D priority tags (see Table 6-1). The direct mapping of the four ACs to 802.1D priorities is specifically intended to facilitate inter operability with other wired network QoS policies.
  • Page 74 • CW (Contention Window), a number used to calculate a random backoff time After a collision detection, a backoff wait time is calculated. The total wait time is the sum of a minimum wait time (Arbitration Inter-Frame Space, or AIFS) determined from the AIFSN, and a random backoff time calculated from a value selected from zero to the CW.
  • Page 75 For high-priority traffic, the AIFSN and CW values are smaller. The smaller values equate to less backoff and wait time, and therefore more transmit opportunities. To configure WMM, select the Radio Settings page, and scroll down to the WMM configuration settings.
  • Page 76 WMM allows the acknowledgement wait time to be turned off for each Access Category (AC). Although this increases data throughput, it can also result in a high number of errors when traffic levels are heavy. (Default: Acknowledge) WMM BSS Parameters –...
  • Page 77 System Configuration Radio Settings G (802.11g) The IEEE 802.11g standard operates within the 2.4 GHz band at up to 54 Mbps. Also note that because the IEEE 802.11g standard is an extension of the IEEE 802.11b standard, it allows clients with 802.11b wireless network cards to associate to an 802.11g access point.
  • Page 78 Radio Interface Most of the 802.11g commands are identical to those used by the 802.11a interface. For information on the these commands, refer to the following sections: • “Configuring VAP Radio Settings” on page 6-51 • “Configuring Rogue AP Detection” on page 6-53 •...
  • Page 79 For example, in the United States you can deploy up to three access points in the same area (e.g., channels 1, 6, 11). Also note that the channel for wireless clients is automatically set to the same as that used by the access point to which it is linked.
  • Page 80 The access point is configured by default as an “open system,” which broadcasts a beacon signal including the configured SSID. Wireless clients with an SSID setting of “any” can read the SSID from the beacon and automatically set their SSID to allow immediate connection to the nearest access point.
  • Page 81 Windows • Clients may require hardware upgrade to be WPA2 compliant Note: You must enable data encryption through the web or CLI in order to enable all types of encryption (WEP, TKIP, or AES) in the access point. 6-70...
  • Page 82 The configuration for these security combinations are outlined in the following table. Note that MAC address authentication can be configured independently to work with all security mechanisms and is indicated separately in the table. Required RADIUS server support is also listed.
  • Page 83 Authentication: WPA Encryption: Enable WPA Configuration: Supported Cipher Suite: WEP 802.1x: Required Set 802.1x key refresh and reauthentication rates Static and dynamic Enter 1 to 4 WEP keys Local or Disabled Yes (802.1x) WEP keys Select a WEP transmit key and 802.1x WPA...
  • Page 84 After you have configured the radio settings, select Security under Radio A or Radio G, set an SSID to identify the wireless network service provided by each VAP you want to use, and then click Apply to save your settings.
  • Page 85 (WEP) on the access point to prevent unauthorized access to the network. If you choose to use WEP shared keys instead of an open system, be sure to define at least one static WEP key for user authentication and data encryption. Also, be sure that the WEP shared keys are the same for each client in the wireless network.
  • Page 86 (Default: Key 1) Shared Key Setup – Select 64 Bit, 128 Bit, or 152 Bit key length. Note that the same size of encryption key must be supported on all wireless clients. (Default: None) Note: Key index and type must match that configured on the clients.
  • Page 87 Encryption – Enable or disable the access point to use data encryption (WEP, TKIP, or AES). If this option is selected when using static WEP keys, you must configure at least one key on the access point and all clients. (Default: Disabled) Note: You must enable data encryption through the web or CLI in order to enable all types of encryption (WEP, TKIP, or AES) in the access point.
  • Page 88 Temporal Key Integrity Protocol (TKIP): WPA specifies TKIP as the data encryption method to replace WEP. TKIP avoids the problems of WEP static keys by dynamically changing data encryption keys. Basically, TKIP starts with a master (temporal) key for each user session and then mathematically generates other keys to encrypt each data packet.
  • Page 89 • Key Caching: WPA2 provides fast roaming for authenticated clients by retaining keys and other security information in a cache, so that if a client roams away from an access point and then returns, re-authentication is not required. When a WPA2 client is first authenticated, it receives a Pairwise Master Key (PMK) that is used to generate other keys for unicast data encryption.
  • Page 90 The first time a client is authenticated to a wireless network it has to be fully authenticated. When the client is about to roam to another access point in the network, the access point sends pre-authentication messages to the new access point that include the client’s security association information.
  • Page 91 802.1X authentication. (Default: Disabled) Authentication Setup – To use WPA or WPA2, set the access point to one of the following options. If a WPA/WPA2 mode that operates over 802.1X is selected (WPA, WPA2, or WPA-WPA2-mixed), the 802.1X settings and RADIUS server...
  • Page 92 (requires RADIUS server to be specified) 1: You must enable data encryption in order to enable all types of encryption in the access point. 2: Select TKIP when any WPA clients do not support AES. Select AES only if all clients support AES. 6-83...
  • Page 93 System Configuration Configuring 802.1X IEEE 802.1X is a standard framework for network access control that uses a central RADIUS server for user authentication. This control feature prevents unauthorized access to the network by requiring an 802.1X client application to submit user credentials for authentication.
  • Page 94 Only those clients successfully authenticated with 802.1X are allowed to access the network. Note: If 802.1X is enabled on the access point, then RADIUS setup must be completed (see “RADIUS” on page 6-7). When 802.1X is enabled, the broadcast and session key rotation intervals can also be configured.
  • Page 95: Status Information

    Shows the wireless clients currently associated with the access 6-89 point Event Logs Shows log messages stored in memory 6-91 Access Point Status The AP Status window displays basic system configuration settings, as well as the settings for the wireless interface. 6-86...
  • Page 96 • System Contact: Administrator responsible for the system. • IP Address: IP address of the management interface for this device. • IP Default Gateway: IP address of the gateway router between this device and management stations that exist on other network segments.
  • Page 97 • Hardware Version: Shows the hardware version number. AP Wireless Configuration – The AP Wireless Configuration tables display the radio and VAP interface settings listed below. Note that Interface Wireless A refers to the 802.11a radio and Interface Wireless G refers the 802.11b/g radio.
  • Page 98: Station Status

    Once authentication is completed, stations can associate with the current access point, or reassociate with a new access point. The association procedure allows the wireless system to track the location of each mobile client, and ensure that frames destined for each client are forwarded to the appropriate access point.
  • Page 99: Event Logs

    • WEP keys do not match: When the access point uses “Shared Key Authentication,” but the key used by client and access point are not the same, the frame will be decrypted incorrectly, using the wrong algorithm and sequence number.
  • Page 100: Stp Status

    • Priority: The priority designated to the specified port. • Path Cost: Displays the path cost value for the specified port. • Status: Displays if STP is enabled or disabled for the specified port. • State: Display the STP state for the specified port.
  • Page 101 Command Line Interface country This command configures the access point’s country code, which identifies the country of operation and sets the authorized radio channels. Syntax country <country_code> country_code - A two character code that identifies the country of operation. See the following table for a full list of codes.
  • Page 102 System Management Commands Table 7-5. Country Codes Country Code Country Code Country Code Country Code Bahrain Germany Malaysia Switzerland Belarus Greece Malta Syria Belgium Guatemala Mexico Taiwan Honduras Monaco Thailand Belize Hong Kong Morocco Trinidad & Tobago Bolivia Hungary Netherlands...
  • Page 103 Check the following items before you contact local Technical Support. If wireless clients cannot access the network, check the following: • Be sure the access point and the wireless clients are configured with the same Service Set ID (SSID). • If authentication or encryption are enabled, ensure that the wireless clients are properly configured with the appropriate authentication or encryption keys.
  • Page 104 If you forgot or lost the password: • Set the access point to its default configuration by pressing the reset button on the back panel for 5 seconds or more. Then use the default user name “admin” to access the management interface.
  • Page 105 100 meters (328 feet). The RJ-45 port on the access point is wired with MDI pinouts. This means that you must use crossover cables for connections to PCs or servers, and straight-through cable for connections to switches or hubs.
  • Page 106 Straight-Through Wiring Because the 10/100 Mbps port on the access point uses an MDI pin configuration, you must use “straight-through” cable for network connections to hubs or switches that only have MDI-X ports. However, if the device to which you are connecting supports auto-MDIX operation, you can use either “straight-through”...
  • Page 107: Crossover Wiring

    Because the 10/100 Mbps port on the access point uses an MDI pin configuration, you must use “crossover” cable for network connections to PCs, servers or other end nodes that only have MDI ports. However, if the device to which you are connecting supports auto-MDIX operation, you can use either “straight-through” or “crossover”...
  • Page 108: General Specifications

    Data Rate 802.11a: Normal Mode: 6, 9, 12, 18, 24, 36, 48, 54 Mbps per channel Turbo Mode: 12, 18, 24, 36, 48, 54, 96, 108 Mbps per channel 802.11g: 6, 9, 11, 12, 18, 24, 36, 48, 54 Mbps per channel 802.11b: 1, 2, 5.5, 11 Mbps per channel...
  • Page 109 Specifications Operating Frequency 802.11a: 5.15 ~ 5.25 GHz (lower band) US/Canada, Japan 5.25 ~ 5.35 GHz (middle band) US/Canada 5.725 ~ 5.825 GHz (upper band) US/Canada 5.50~ 5.70 GHz Europe 5.25 ~ 5.35 GHz (middle band) Taiwan 5.725 ~ 5.825 GHz (high band) Taiwan 802.11b:...
  • Page 110 FCC Part 15C 15.247, 15.207 (2.4 GHz) FCC part 15E 15.407 (5 GHz) RSS-210 (Canada) EN 301.893, EN 300.328, EN 301.489-1, EN 301.489-17 MPT RCR std.33 (D33 1~13 Channel, T66 Channel 14) Safety cCSAus(CSA 22.2 No. 60950-1 & UL60950-1) EN60950-1 (TÜV/GS), IEC60950-1 (CB) Standards IEEE 802.3 10BASE-T, IEEE 802.3u 100BASE-TX,...
  • Page 111 Specifications Sensitivity IEEE 802.11a Sensitivity (GHz - dBm) Modulation/Rates 5.15-5.250 5.25-5.350 5.50-5.700 5.725-5.825 BPSK (6 Mbps) BPSK (9 Mbps) QPSK (12 Mbps) QPSK (18 Mbps) 16 QAM (24 Mbps) 16 QAM (36 Mbps) 64 QAM (48 Mbps) 64QAM(54 Mbps) IEEE 802.11g...
  • Page 112 Transmit Power Transmit Power IEEE 802.11a Maximum Output Power (GHz - dBm) Data Rate 5.15-5.250 5.25-5.350 5.50-5.700 5.725-5.825 6 Mbps 9 Mbps 12 Mbps 8 Mbps 24 Mbps 36 Mbps 48 Mbps 54 Mbps IEEE 802.11g Maximum Output Power (GHz - dBm) Data Rate 2.412...
  • Page 113: Operating Range

    The operating range distances listed in the following tables are for typical environments only. Operating ranges can vary considerably depending on factors such as local interference and barrier composition. It is recommended to do a site survey to determine the maximum ranges for specific access point locations in your environment.
  • Page 114: Glossary

    Glossary 10BASE-T IEEE 802.3 specification for 10 Mbps Ethernet over two pairs of Category 3 or better UTP cable. 100BASE-TX IEEE 802.3u specification for 100 Mbps Fast Ethernet over two pairs of Category 5 or better UTP cable. Access Point An internetworking device that seamlessly connects wired and wireless networks.
  • Page 115 Glossary Broadcast Key Broadcast keys are sent to stations using 802.1X dynamic keying. Dynamic broadcast key rotation is often used to allow the access point to generate a random group key and periodically update all key-management capable wireless clients. CSMA/CA Carrier Sense Multiple Access with Collision Avoidance.
  • Page 116 A wireless standard that supports wireless communications in the 2.4 GHz band using using Orthogonal Frequency Division Multiplexing (OFDM). The standard provides for data rates of 6, 9, 11, 12, 18, 24, 36, 48, 54 Mbps. IEEE 802.11g is also backward compatible with IEEE 802.11b.
  • Page 117: Rts Threshold

    RTS Threshold size, the RTS/CTS mechanism will NOT be enabled. Service Set Identifier (SSID) An identifier that is attached to packets sent over the wireless LAN and functions as a password for joining a particular radio cell; i.e., Basic Service Set (BSS).
  • Page 118 Wireless devices without a valid WEP key will be excluded from network traffic. WPA Pre-shared Key (PSK) PSK can be used for small office networks that may not have the resources to configure and maintain a RADIUS server, WPA provides a simple operating mode that uses just a pre-shared password for network access.
  • Page 119: Index

    B-3 cipher suite 6-82, 7-121 CSMA/CA 1-1 closed system 7-109 CTS 6-59, 7-107 configuring 6-12 MAC address 6-13, 7-71, 7-72 type 6-69, 7-109 data rate web redirect 6-14, 7-20 maximum distances C-6 data rate, options C-1 default settings 1-6...
  • Page 120 6-35, 6-91, 6-93, 7-30 upgrading 6-30, 6-32, 7-57 server 6-34, 7-30 fragmentation 7-106 login CLI 7-1 gateway address 5-2, 6-6, 7-1, 7-91 web 5-3 logon authentication RADIUS client 6-14, 7-60 hardware version, displaying 7-25 HTTP, secure server 7-20 HTTPS 7-19...
  • Page 121 6-86, 7-24 reset 6-32, 7-10 displaying station status 6-89, 7-114 reset button 1-5, 6-32 straight-through cable B-2 resetting the access point 6-32, 7-10 system clock, setting 6-36, 7-36 restarting the system 6-32, 7-10 system log RJ-45 port...
  • Page 122 Index Wi-Fi Multimedia See WMM Wi-Fi Protected Access See WPA VLAN Wired Equivalent Protection See WEP configuration 6-52, 7-134 WPA 6-79 native ID 6-52 pre-shared key 6-82, 7-127 WPA, pre-shared key See PSK WEP 6-74 configuring 6-74 shared key 6-75, 7-123...

Table of Contents