Hirschmann BAT54 Installation Manual

Dual-band outdoor access point / bridge
Table of Contents

Advertisement

Quick Links

Installation Guide

Dual-Band Outdoor Access Point / Bridge
BAT54, BAT54M
User Guide
BAT54, BAT54M
Technische Unterstützung
Release 1.0 02/06
HAC-Support@hirschmann.de

Advertisement

Table of Contents
loading

Summary of Contents for Hirschmann BAT54

  • Page 1: Installation Guide

    Installation Guide Dual-Band Outdoor Access Point / Bridge BAT54, BAT54M User Guide BAT54, BAT54M Technische Unterstützung Release 1.0 02/06 HAC-Support@hirschmann.de...
  • Page 2 This publication has been created by Hirschmann Automation and Control GmbH according to the best of our knowledge. Hirschmann reserves the right to change the contents of this manual without prior notice. Hirschmann can give no guarantee in respect of the correctness or accuracy of the details in this publication.
  • Page 3 User Guide Dual-Band Outdoor Access Point/Bridge IEEE 802.11a/b/g Access Point / Bridge Master Unit with External Antenna Options (BAT54M) Slave Unit with Integrated High-Gain Antenna (BAT54)
  • Page 5: Federal Communication Commission Interference Statement

    Compliances Federal Communication Commission Interference Statement This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation. This equipment generates, uses and can radiate radio frequency energy and, if not installed and used in accordance with the instructions, may cause harmful interference to radio communications.
  • Page 6: Ec Conformance Declaration

    0560 EC Conformance Declaration Marking by the above symbol indicates compliance with the Essential Requirements of the R&TTE Directive of the European Union (1999/5/EC). This equipment meets the following conformance standards: • EN 60950 (IEC 60950) - Product Safety • EN 301 893 - Technical requirements for 5 GHz radio equipment •...
  • Page 7 • This device may be operated indoors or outdoors in all countries of the European Community using the 2.4 GHz band: Channels 1 - 13, except where noted below. - In Italy the end-user must apply for a license from the national spectrum authority to operate this device outdoors.
  • Page 8 Safety Compliance Power Cord Safety Please read the following safety information carefully before installing the device: Warning: Installation and removal of the unit must be carried out by qualified personnel only. • The unit must be connected to an earthed (grounded) outlet to comply with international safety standards.
  • Page 9 Power Cord Set Europe The supply plug must comply with CEE7/7 (“SCHUKO”). The mains cord must be <HAR> or <BASEC> marked and be of type HO3VVF3GO.75 (minimum). IEC-320 receptacle. Veuillez lire à fond l'information de la sécurité suivante avant d'installer l’appareil: AVERTISSEMENT: L’installation et la dépose de ce groupe doivent être confiés à...
  • Page 10 Cordon électrique - Il doit être agréé dans le pays d’utilisation Suisse: La prise mâle d’alimentation doit respecter la norme SEV/ASE 1011. Europe La prise secteur doit être conforme aux normes CEE 7/7 (“SCHUKO”) LE cordon secteur doit porter la mention <HAR> ou <BASEC> et doit être de type HO3VVF3GO.75 (minimum).
  • Page 11 Stromkabel. Dies muss von dem Land, in dem es benutzt wird geprüft werden: U.S.A und Canada Der Cord muß das UL gepruft und war das CSA beglaubigt. Das Minimum spezifikation fur der Cord sind: - Nu. 18 AWG - nicht mehr als 2 meter, oder 16 AWG. - Der typ SV oder SJ - 3-Leiter Der Cord muß...
  • Page 12 viii...
  • Page 13: Table Of Contents

    Contents Chapter 1: Introduction Package Checklist Hardware Description Integrated High-Gain Antenna External Antenna Options Ethernet Port Power Injector Module Receive Signal Strength Indicator (RSSI) BNC Connector Grounding Point Wall- and Pole-Mounting Bracket Kits System Configuration Features and Benefits System Defaults Chapter 2: Network Configuration Access Point Topologies Ad Hoc Wireless LAN (no Access Point or Bridge)
  • Page 14 Contents Align Antennas Chapter 5: Initial Configuration Initial Setup through the CLI Initial Configuration Steps Using the Web-based Management Setup Wizard Chapter 6: System Configuration Advanced Configuration System Identification TCP / IP Settings Radius PPPoE Settings Authentication 6-11 Filter Control 6-18 SNMP 6-20...
  • Page 15 Contents Understanding Command Modes Exec Commands Configuration Commands Command Line Processing Command Groups General Commands configure exit ping reset show history show line 7-10 System Management Commands 7-10 country 7-11 prompt 7-12 system name 7-12 username 7-13 password 7-13 ip http port 7-14 ip http server 7-14...
  • Page 16 Contents bootfile 7-28 copy 7-29 delete 7-30 7-30 RADIUS Client 7-31 radius-server address 7-32 radius-server port 7-32 radius-server key 7-33 radius-server retransmit 7-33 radius-server timeout 7-34 show radius 7-34 Authentication 7-35 802.1x 7-35 802.1x broadcast-key-refresh-rate 7-36 802.1x session-key-refresh-rate 7-37 802.1x session-timeout 7-38 802.1x supplicant 7-38...
  • Page 17 Contents show filters 7-56 PPPoE Commands 7-56 ip pppoe 7-57 pppoe ip allocation mode 7-57 pppoe ipcp dns 7-58 pppoe lcp echo-interval 7-58 pppoe lcp echo-failure 7-59 pppoe local ip 7-60 pppoe remote ip 7-60 pppoe username 7-61 pppoe password 7-61 pppoe service-name 7-62...
  • Page 18 Contents show interface wireless 7-84 show station 7-85 IAPP Commands 7-86 iapp 7-86 VLAN Commands 7-86 vlan 7-87 native-vlanid 7-87 Appendix A: Troubleshooting Appendix B: Specifications General Specifications Antenna Specifications 17 dBi Integrated Panel Appendix C: Cables and Pinouts Twisted-Pair Cable Assignments 10/100BASE-TX Pin Assignments Straight-Through Wiring Crossover Wiring...
  • Page 19: Chapter 1: Introduction

    Ethernet LANs, and wireless access point services for clients in the local LAN area: • BAT54 – Includes an integrated high-gain antenna for the 802.11a radio and is designed to operate as a “Slave” bridge in point-to-multipoint configurations, or provide a high-speed point-to-point wireless link between two sites that can be up to 15.4 km (9.6 miles) apart.
  • Page 20: Package Checklist

    Package Checklist The Dual-band Outdoor Access Point / Bridge package includes: • One Dual-band Outdoor Access Point / Bridge (BAT54 or BAT54M) • One Category 5 network cable, length 164 ft (50 m) • One power injector module and power cord •...
  • Page 21: Integrated High-Gain Antenna

    The BAT54 and BAT54M units both require the 2.4 GHz 8 dBi omnidirectional external antenna for 2.4 GHz operation. The following table...
  • Page 22: Ethernet Port

    Introduction Ethernet Port The wireless bridge has one 10BASE-T/100BASE-TX 8-pin DIN port that connects to the power injector module using the included Ethernet cable. The Ethernet port connection provides power to the wireless bridge as well as a data link to the local network.
  • Page 23: Receive Signal Strength Indicator (Rssi) Bnc Connector

    System Configuration The power injector module automatically adjusts to any AC voltage between 100-240 volts at 50 or 60 Hz. No voltage range settings are required. Warning: The power injector module is designed for indoor use only. Never mount the power injector outside with the wireless bridge unit.
  • Page 24: Features And Benefits

    Introduction Features and Benefits • BAT54 Slave units support a 5 GHz point-to-point wireless link up 15.4 km (at 6 Mbps data rate) using integrated high-gain 17 dBi antennas • BAT54M Master units support 5 GHz point-to-multipoint links using various external antenna options •...
  • Page 25 System Defaults Feature Parameter Default VLANs Status Disabled Native VLAN ID Filter Control Ethernet Type Disabled SNMP Status Enabled Location null Contact Contact Community (Read Only) Public Community (Read/Write) Private Traps Enabled Trap Destination IP Address null Trap Destination Community Name Public System Logging Syslog...
  • Page 26 Introduction Feature Parameter Default Wireless Security Authentication Type Open System 802.11a AES Encryption Disabled WEP Encryption Disabled WEP Key Length 128 bits WEP Key Type Hexadecimal WEP Transmit Key Number Wireless Interface Status Enabled 802.11b/g SSID DualBandOutdoor Radio Channel Default to first channel Auto Channel Select Enabled Transmit Power...
  • Page 27: Chapter 2: Network Configuration

    Chapter 2: Network Configuration The Dual-band Outdoor Access Point / Bridge system provides access point or bridging services through either the 5 GHz or 2.4 GHz radio interfaces. The wireless bridge units can be used just as normal 802.11a/b/g access points connected to a local wired LAN, providing connectivity and roaming services for wireless clients in an outdoor area.
  • Page 28: Infrastructure Wireless Lan

    Network Configuration Ad Hoc Wireless LAN Notebook with Wireless USB Adapter Notebook with Wireless PC Card PC with Wireless PCI Adapter Infrastructure Wireless LAN The access point function of the wireless bridge provides access to a wired LAN for 802.11a/b/g wireless workstations. An integrated wired/wireless LAN is called an Infrastructure configuration.
  • Page 29: Infrastructure Wireless Lan For Roaming Wireless Pcs

    Access Point Topologies Infrastructure Wireless LAN for Roaming Wireless PCs The Basic Service Set (BSS) defines the communications domain for each access point and its associated wireless clients. The BSS ID is a 48-bit binary number based on the access point’s wireless MAC address, and is set automatically and transparently as clients associate with the access point.
  • Page 30: Bridge Link Topologies

    WDS to forward traffic on links between units. Up to 16 WDS links can be specified for a BAT54M unit, which acts as the “Master” in the wireless bridge network. BAT54 units support only one WDS link, which must be to the network’s master unit.
  • Page 31 Bridge Link Topologies BAT54 BAT54 Slave Slave BAT54 BAT54M BAT54 Slave Master with Slave Omnidirectional Antenna BAT54 BAT54 Slave Slave BAT54 Slave BAT54M BAT54 Master with Slave Sector Antenna BAT54...
  • Page 32 Network Configuration...
  • Page 33: Chapter 3: Bridge Link Planning

    Data Rates Using its 5 GHz integrated antenna, the BAT54 Slave bridge can operate over a range of up to 15.4 km (9.6 miles) or provide a high-speed connection of 54 Mbps (108 Mbps in turbo mode).
  • Page 34: Radio Path Planning

    Bridge Link Planning Distances Achieved Using Normal Mode Data Rate 17 dBi 8 dBi Omni 13.5 dBi 16.5 dBi 23 dBi Panel Integrated 120-Degree 60-Degree Sector Sector 48 Mbps 2.9 km 0.4 km 1.2 km 2.3 km 9.2 km 54 Mbps 1.8 km 0.2 km 0.7 km...
  • Page 35 Radio Path Planning The following figure illustrates the concept of a good radio line-of-sight. Radio Line of Sight Visual Line of Sight If there are obstacles in the radio path, there may still be a radio link but the quality and strength of the signal will be affected.
  • Page 36: Antenna Height

    Bridge Link Planning Antenna Height A reliable wireless link is usually best achieved by mounting the antennas at each end high enough for a clear radio line of sight between them. The minimum height required depends on the distance of the link, obstacles that may be in the path, topology of the terrain, and the curvature of the earth (for links over 3 miles).
  • Page 37: Antenna Position And Orientation

    Radio Path Planning Radio Line of Sight Visual Line of Sight 3 miles (4.8 km) 2.4 m 1.4 m 5.4 m 20 m 17 m 12 m A wireless bridge link is deployed to connect building A to a building B, which is located three miles (4.8 km) away.
  • Page 38: Radio Interference

    Bridge Link Planning direction. The antenna polarization is marked on the wireless bridge, as indicated in the following figure. Radio Interference The avoidance of radio interference is an important part of wireless link planning. Interference is caused by other radio transmissions using the same or an adjacent channel frequency.
  • Page 39: Ethernet Cabling

    Ethernet Cabling • Snow and Ice — Falling snow, like rain, has no significant effect on the radio signal. However, a build up of snow or ice on antennas may cause the link to fail. In this case, the snow or ice has to be cleared from the antennas to restore operation of the link.
  • Page 40 Bridge Link Planning...
  • Page 41: Chapter 4: Hardware Installation

    Chapter 4: Hardware Installation Before mounting antennas to set up your wireless bridge links, be sure you have selected appropriate locations for each antenna. Follow the guidance and information in Chapter 2, “Wireless Link Planning.” Also, before mounting units in their intended locations, you should first perform initial configuration and test the basic operation of the wireless bridge links in a controlled environment over a very short range.
  • Page 42 Hardware Installation Place the U-shaped part of the bracket around the pole and tighten the securing nut just enough to hold the bracket to the pole. (The bracket may need to be rotated around the pole during the alignment process.) Attach bracket to pole with mounting grooves facing up...
  • Page 43: Using The Wall-Mounting Bracket

    Mount the Unit Mounting on Larger Diameter Poles In addition, there is a method for attaching the pole-mounting bracket to a pole that is 2 to 5 inches in diameter using an adjustable steel band clamp (not included in the kit).
  • Page 44: Connect External Antennas

    Typically, a bridge link requires a 5 GHz antenna, and access point operation a 2.4 GHz antenna. BAT54 Slave units also require an external antenna for 2.4 GHz operation.
  • Page 45: Connect Cables To The Unit

    Connect Cables to the Unit Connect Cables to the Unit Attach the Ethernet cable to the Ethernet port on the wireless bridge. Note: The Ethernet cable included with the package is 30 m (100 ft) long. To wire a longer cable (maximum 100 m, 325 ft), use the connector pinout information in Appendix B.
  • Page 46: Align Antennas

    Hardware Installation AC power Ethernet cable from LAN switch I n p t p u Power LED indicator Ethernet cable to wireless bridge Insert the power cable plug directly into the standard AC receptacle on the power injector. Plug the other end of the power cable into a grounded, 3-pin socket, AC power source.
  • Page 47 Align Antennas The RSSI connector provides an output voltage between 0 and 3.28 VDC that is proportional to the received radio signal strength. The higher the voltage reading, the stronger the signal. The radio signal from the remote antenna can be seen to have a strong central main lobe and smaller side lobes.
  • Page 48 Hardware Installation RSSI BNC Connection Voltmeter Pan the antenna horizontally back and forth while checking the RSSI voltage. If using the pole-mounting bracket with the unit, you must rotate the mounting bracket around the pole. Other external antenna brackets may require a different horizontal adjustment.
  • Page 49: Chapter 5: Initial Configuration

    Chapter 5: Initial Configuration The wireless bridge offers a variety of management options, including a web-based interface, a command line interface (CLI), or using SNMP management software. Most initial configuration steps can be made through the web browser interface using the Setup Wizard (page 5-3). However, for units that do not have a preset country code, you must first set the country code using the CLI.
  • Page 50: Initial Configuration Steps

    Initial Configuration Initial Configuration Steps Setting the Country Code – Regulations for wireless products differ from country to country. Setting the country code restricts the wireless bridge to use only the radio channels and power settings permitted in the specified country of operation. If the wireless bridge unit is shipped with a preset country code, you are not permitted to change it, as required by country regulations.
  • Page 51: Using The Web-Based Management Setup Wizard

    Using the Web-based Management Setup Wizard Using the Web-based Management Setup Wizard There are only a few basic steps you need to complete to set up the wireless bridge for your network. The Setup Wizard takes you through configuration procedures for the radio channel selection, IP configuration, and basic WEP encryption for wireless security.
  • Page 52 Initial Configuration Launching the Setup Wizard – To perform initial configuration, click Setup Wizard on the home page, then click on the [Next] button to start the process.
  • Page 53 Using the Web-based Management Setup Wizard Service Set ID – Enter the service set identifier in the SSID box which all wireless 802.11g clients must use to associate with the access point. The SSID is case sensitive and can consist of up to 32 alphanumeric characters (Defaults: DualBandOurdoor).
  • Page 54 Initial Configuration • 802.11a Turbo Mode – If you select Enable, the wireless bridge will operate in turbo mode with a data rate of up to 108 Mbps. Normal mode supports 13 channels, Turbo mode supports only 5 channels. (Default: Disable) 802.11a Radio Channel –...
  • Page 55 Using the Web-based Management Setup Wizard Note: If there is no DHCP server on your network, then the access point will automatically start up with its default IP address, 192.168.1.1. Security (802.11g) – Set the Authentication Type to “Open System” to allow open access without authentication, or “Shared Key”...
  • Page 56 Initial Configuration 128-Bit Manual Entry: The key can contain 26 hexadecimal digits or 13 alphanumeric characters. Note: All wireless devices must be configured with the same Key ID values to communicate with the access point. Click Finish. Click the OK button to restart the access point.
  • Page 57: Chapter 6: System Configuration

    Chapter 6: System Configuration Before continuing with advanced configuration, first complete the initial configuration steps described in Chapter 4 to set up an IP address for the wireless bridge. The wireless bridge can be managed by any computer using a web browser (Internet Explorer 5.0 or above, or Netscape Navigator 6.2 or above).
  • Page 58: Advanced Configuration

    System Configuration Advanced Configuration The Advanced Configuration pages include the following options. Menu Description Page System Configures basic administrative and client access Identification Specifies the system name, location and contact information TCP / IP Settings Configures the IP address, subnet mask, gateway, and domain name servers Radius Configures the RADIUS server for wireless client authentication...
  • Page 59: System Identification

    Advanced Configuration System Identification The system information parameters for the wireless bridge can be left at their default settings. However, modifying these parameters can help you to more easily distinguish different devices in your network. The wireless bridge allows the selection of the band to be used for bridge links. The bridge band can support no wireless clients.
  • Page 60 System Configuration CLI Commands for System Identification – Enter the global configuration mode and use the command to specify a new system name. Use the system name commands to indicate the physical snmp-server location snmp-server contact location of the wireless bridge and define a system contact. Then return to the Exec mode, and use the command to display the changes to the system show system...
  • Page 61: Tcp / Ip Settings

    Advanced Configuration TCP / IP Settings Configuring the wireless bridge with an IP address expands your ability to manage the wireless bridge. A number of wireless bridge features depend on IP addressing to operate. You can use the web browser interface to access IP addressing only if the Note: wireless bridge already has an IP address that is reachable through your network.
  • Page 62 System Configuration DHCP Client (Disable) – Select this option to manually configure a static address for the wireless bridge. • IP Address: The IP address of the wireless bridge. Valid IP addresses consist of four decimal numbers, 0 to 255, separated by periods. •...
  • Page 63: Radius

    Advanced Configuration Radius Remote Authentication Dial-in User Service (RADIUS) is an authentication protocol that uses software running on a central server to control access to RADIUS-aware devices on the network. An authentication server contains a database of user credentials for each user that requires access to the network. A primary RADIUS server must be specified for the access point to implement IEEE 802.1X network access control and Wi-Fi Protected Access (WPA) wireless security.
  • Page 64 System Configuration • Timeout: Number of seconds the access point waits for a reply from the RADIUS server before resending a request. (Range: 1-60 seconds; Default: 5) • Retransmit attempts: The number of times the access point tries to resend a request to the RADIUS server before authentication fails.
  • Page 65: Pppoe Settings

    Advanced Configuration PPPoE Settings The wireless bridge uses a Point-to-Point Protocol over Ethernet (PPPoE) connection, or tunnel, only for management traffic between the wireless bridge and a remote PPPoE server (typically at an ISP). Examples of management traffic that may initiated by the wireless bridge and carried over a PPPoE tunnel are RADIUS, Syslog, or DHCP traffic.
  • Page 66 System Configuration to allocate the IP addresses for the PPPoE connection. If static addresses have been assigned to you by the service provider, you must manually enter the assigned addresses. (Default: Automatic) • Automatically allocated: IP addresses are dynamically assigned by the service provider during PPPoE session initialization.
  • Page 67: Authentication

    When enabled, a unique MD5 user name and password needs to be configured for the WDS port. For a BAT54 Slave unit, there is only one WDS port. For a BAT54M Master unit, there are 16 WDS ports. (Default: Disabled)
  • Page 68 System Configuration MAC Authentication – You can configure a list of the MAC addresses for wireless clients that are authorized to access the network. This provides a basic level of authentication for wireless clients attempting to gain access to the network. A database of authorized MAC addresses can be stored locally on the access point or remotely on a central RADIUS server.
  • Page 69 Advanced Configuration server. Client authentication is then verified on the RADIUS server before the access point grants client access to the network. The 802.1X EAP packets are also used to pass dynamic unicast session keys and static broadcast keys to wireless clients. Session keys are unique to each client and are used to encrypt and correlate traffic passing between a specific client and the access point.
  • Page 70 System Configuration Local MAC Authentication – Configures the local MAC authentication database. The MAC database provides a mechanism to take certain actions based on a wireless client’s MAC address. The MAC list can be configured to allow or deny network access to specific clients.
  • Page 71 Advanced Configuration DUAL OUTDOOR(config)#802.1X supplicant wds_user 1 David 7-38 DUAL OUTDOOR(config)#802.1X supplicant wds_password 1 ABC 7-38 DUAL OUTDOOR(config)#802.1X supplicant wds 1 7-38 DUAL OUTDOOR(config)# CLI Commands for Local MAC Authentication – Use the mac-authentication server command from the global configuration mode to enable local MAC authentication.
  • Page 72 System Configuration CLI Commands for RADIUS MAC Authentication – Use the mac-authentication server command from the global configuration mode to enable remote MAC authentication. Set the timeout value for re-authentication using the mac-authentication session-timeout command. Be sure to also configure connection settings for the RADIUS server (not shown in the following example).
  • Page 73 Advanced Configuration CLI Commands for 802.1X Authentication – Use the 802.1X supported command from the global configuration mode to enable 802.1X authentication. Set the session and broadcast key refresh rate, and the re-authentication timeout. To display the current settings, use the show authentication command from the Exec mode. DUAL OUTDOOR(config)#802.1X supported 7-35 DUAL OUTDOOR(config)#802.1X broadcast-key-refresh-rate 5...
  • Page 74: Filter Control

    System Configuration Filter Control The wireless bridge can employ VLAN tagging support and network traffic frame filtering to control access to network resources and increase security. Native VLAN ID – The VLAN ID assigned to wireless clients that are not assigned to a specific VLAN by RADIUS server configuration.
  • Page 75 Advanced Configuration A VLAN ID (1-4094) is assigned to a client after successful authentication using IEEE 802.1X and a central RADIUS server. The user VLAN IDs must be configured on the RADIUS server for each user authorized to access the network. If a user does not have a configured VLAN ID, the access point assigns the user to its own configured native VLAN ID.
  • Page 76: Snmp

    System Configuration CLI Commands for VLAN Support – From the global configuration mode use the native-vlanid command to set the default VLAN ID for the Ethernet interface, then enable VLANs using the vlan enable command. When you change the access point’s VLAN support setting, you must reboot the access point to implement the change.
  • Page 77 Advanced Configuration SNMP – Enables or disables SNMP management access and also enables the wireless bridge to send SNMP traps (notifications). SNMP management is enabled by default. Community Name (Read Only) – Defines the SNMP community access string that has read-only access. Authorized management stations are only able to retrieve MIB objects.
  • Page 78 System Configuration CLI Commands for SNMP – Use the command from the snmp-server enable server global configuration mode to enable SNMP. To set read/write and read-only community names, use the command. The snmp-server community snmp-server command defines a trap receiver host. To view the current SNMP settings, use host command.
  • Page 79: Administration

    Advanced Configuration Administration Changing the Password Management access to the web and CLI interface on the wireless bridge is controlled through a single user name and password. You can also gain additional access security by using control filters (see “Filter Control” on page 6-18). To protect access to the management interface, you need to configure an Administrator’s user name and password as soon as possible.
  • Page 80 System Configuration Upgrading Firmware You can upgrade new wireless bridge software from a local file on the management workstation, or from an FTP or TFTP server. After upgrading new software, you must reboot the wireless bridge to implement the new code. Until a reboot occurs, the wireless bridge will continue to run the software it was using before the upgrade started.
  • Page 81 Advanced Configuration Firmware Upgrade Local – Downloads an operation code image file from the web management station to the wireless bridge using HTTP. Use the Browse button to locate the image file locally on the management station and click Start Upgrade to proceed.
  • Page 82 System Configuration CLI Commands for Downloading Software from a TFTP Server – Use the copy tftp command from the Exec mode and then specify the file type, name, and IP file address of the TFTP server. When the download is complete, the command can be used to check that the new file is present in the wireless bridge file system.
  • Page 83: System Log

    Advanced Configuration System Log The wireless bridge can be configured to send event and error messages to a System Log Server. The system clock can also be synchronized with a time server, so that all the messages sent to the Syslog server are stamped with the correct time and date.
  • Page 84 System Configuration The system allows you to limit the messages that are logged by specifying a minimum severity level. The following table lists the error message levels from the most severe (Emergency) to least severe (Debug). The message levels that are logged include the specified minimum level up to the Emergency level.
  • Page 85 Advanced Configuration CLI Commands for System Logging – To enable logging on the wireless bridge, use command from the global configuration mode. The logging on logging level command sets the minimum level of message to log. Use the logging console command to enable logging to the console.
  • Page 86 System Configuration Set Time Zone – SNTP uses Coordinated Universal Time (or UTC, formerly Greenwich Mean Time, or GMT) based on the time at the Earth’s prime meridian, zero degrees longitude. To display a time corresponding to your local time, you must indicate the number of hours your time zone is located before (east) or after (west) UTC.
  • Page 87: Wireless Distribution System (Wds)

    Advanced Configuration CLI Commands for the System Clock – The following example shows how to manually set the system time when SNTP server support is disabled on the wireless bridge. DUAL OUTDOOR(config)#no sntp-server enable 7-21 DUAL OUTDOOR(config)#sntp-server date-time 7-21 Enter Year<1970-2100>: 2003 Enter Month<1-12>: 10 Enter Day<1-31>: 10 Enter Hour<0-23>: 18...
  • Page 88 System Configuration Mode – The wireless bridge is set to operate as a Slave or Master unit: • Master Mode: In a point-to-multipoint network configuration, only one wireless bridge unit must be a Master unit (all others must be Slave units). A Master wireless bridge provides support for up to 16 MAC addresses in the WDS forwarding table.
  • Page 89: Bridge

    Advanced Configuration Port Number (Master bridge only) – The wireless port identifier. MAC Address – The physical layer address of the wireless bridge unit at the other end of the wireless link. (12 hexadecimal digits in the form “xx:xx:xx:xx:xx:xx”) Port Status – Enables or disables the wireless bridge link. The wireless MAC address for each bridge unit is printed on the label on the Note: back of the unit.
  • Page 90 System Configuration The Bridging page allows the MAC address aging time to be set for both the Ethernet port and the bridge radio interface. If the MAC address of an entry in the address table is not seen on the associated interface for longer than the aging time, the entry is discarded.
  • Page 91 Advanced Configuration CLI Commands for Bridging – The following example shows how to set the MAC address aging time for the wireless bridge. DUAL OUTDOOR(config)#bridge timeout 0 300 7-46 DUAL OUTDOOR(config)#bridge timeout 2 1000 7-46 DUAL OUTDOOR(config)#exit DUAL OUTDOOR#show bridge 7-52 Bridge Information...
  • Page 92: Spanning Tree Protocol (Stp)

    System Configuration Spanning Tree Protocol (STP) The Spanning Tree Protocol (STP) can be used to detect and disable network loops, and to provide backup links between switches, bridges or routers. This allows the wireless bridge to interact with other bridging devices (that is, an STP-compliant switch, bridge or router) in your network to ensure that only one route exists between any two stations on the network, and provide backup links which automatically take over when a primary link goes down.
  • Page 93 Advanced Configuration Forward Delay – The maximum time (in seconds) this device waits before changing states (i.e., discarding to learning to forwarding). This delay is required because every device must receive information about topology changes before it starts to forward frames. In addition, each port needs time to listen for conflicting information that would make it return to a discarding state;...
  • Page 94 System Configuration Priority – Defines the priority used for this port in the Spanning Tree Protocol. If the path cost for all ports on a switch are the same, the port with the highest priority (i.e., lowest value) will be configured as an active link in the spanning tree. This makes a port with higher priority less likely to be blocked if the Spanning Tree Protocol is detecting network loops.
  • Page 95 Advanced Configuration CLI Commands for STP – The following example configures spanning tree paramters for the bridge and wireless port 5. DUAL OUTDOOR(config)#bridge stp-bridge priority 40000 7-49 DUAL OUTDOOR(config)#bridge stp-bridge hello-time 5 7-48 DUAL OUTDOOR(config)#bridge stp-bridge max-age 38 7-48 DUAL OUTDOOR(config)#bridge stp-bridge forward-time 20 7-47 DUAL OUTDOOR(config)#no bridge stp-port spanning-disabled 5 7-52...
  • Page 96: Rssi

    System Configuration RSSI The RSSI value displayed on the RSSI page represents a signal to noise ratio. A value of 30 would indicate that the power of the received signal is 30 dBm above the signal noise threshold. This value can be used to align antennas (see page 4-6) and monitor the quality of the received signal for bridge links.
  • Page 97: Radio Interface

    Radio Interface Distance – This value is used to adjust timeout values to take into account transmit delays due to link distances in the wireless bridge network. For a point-to-point link, specify the approximate distance between the two bridges. For a point-to-multipoint network, specify the distance of the Slave bridge farthest from the Master bridge •...
  • Page 98: Radio Settings A (802.11A)

    System Configuration Radio Settings A (802.11a) The IEEE 802.11a interface operates within the 5 GHz band, at up to 54 Mbps in normal mode or up to 108 Mbps in Turbo mode. Enable – Enables radio communications on the wireless interface. (Default: Enabled) Description –...
  • Page 99 Radio Interface In normal mode, the wireless bridge provides a channel bandwidth of 20 Note: MHz, and supports the maximum number of channels permitted by local regulations (e.g., 11 channels for the United States). In Turbo Mode, the channel bandwidth is increased to 40 MHz to support the increased data rate.
  • Page 100 System Configuration (BSS) and forward them after every second beacon. Using smaller DTIM intervals delivers broadcast/multicast frames in a more timely manner, causing stations in Power Save mode to wake up more often and drain power faster. Using higher DTIM values reduces the power used by stations in Power Save mode, but delays the transmission of broadcast/multicast frames.
  • Page 101 Radio Interface CLI Commands for the 802.11a Wireless Interface – From the global configuration mode, enter the command to access the 802.11a radio interface wireless a interface. If required, configure a name for the interface using the description command. Use the command to enable this feature before setting the radio turbo channel with the...
  • Page 102: Radio Settings G (802.11G)

    System Configuration Radio Settings G (802.11g) The IEEE 802.11g standard operates within the 2.4 GHz band at up to 54 Mbps. Also note that because the IEEE 802.11g standard is an extension of the IEEE 802.11b standard, it allows clients with 802.11b wireless network cards to associate to an 802.11g access point.
  • Page 103 Radio Interface Working Mode – Selects the operating mode for the 802.11g wireless interface. (Default: b & g mixed mode) • b & g mixed mode: Both 802.11b and 802.11g clients can communicate with the access point (up to 54 Mbps). •...
  • Page 104: Security (Bridge Mode)

    System Configuration DUAL OUTDOOR#show interface wireless g 7-84 Wireless Interface Information =========================================================== ----------------Identification----------------------------- Description : Enterprise 802.11g Access Point Service Type : Access Point SSID : r&d Channel : 11 (AUTO) Status : Enable ----------------802.11 Parameters-------------------------- Transmit Power : FULL (14 dBm) Max Station Data Rate : 6Mbps Fragmentation Threshold...
  • Page 105 Radio Interface Setting up IEEE 802.11 Wired Equivalent Privacy (WEP) shared keys prevents unauthorized access to the wireless bridge network. Be sure to define at least one static WEP key for data encryption. Also, be sure that the WEP keys are the same for all bridge units in the wireless network. Data Encryption Setup –...
  • Page 106 System Configuration • Transmit Key Select: Selects the key number to use for encryption. Bridge units in the wireless network must have all four keys configured to the same values. Key index and type must match on all bridge units in the wireless network. Note: Advanced Encryption Standard (AES) AES has been designated by the National Institute of Standards and Technology as...
  • Page 107 Radio Interface Key Type – Select the preferred method of entering AES encryption keys on the wireless bridge and enter a key for each bridge link in the network: • Hexadecimal: Enter keys as exactly 32 hexadecimal digits (0 to 9 and A to F). •...
  • Page 108 System Configuration CLI Commands for AES Security – From the 802.11a interface configuration mode, use the command to enable AES encryption. To enter AES keys, use the encryption command. To view the current security settings, use the show interface wireless command.
  • Page 109: Security (Access Point Mode)

    Radio Interface Security (Access Point Mode) A radio band set to access point mode is configured by default as an “open system,” which broadcasts a beacon signal including the configured SSID. Wireless clients can read the SSID from the beacon, and automatically reset their SSID to allow immediate connection to the access point.
  • Page 110 System Configuration Security Client Support Implementation Considerations Mechanism WPA over Requires WPA-enabled • Provides robust security in WPA-only 802.1X Mode system and network card mode (i.e., WPA clients only) driver • Offers support for legacy WEP clients, but with increased security risk (i.e., WEP (native support provided in authentication keys disabled) Windows XP)
  • Page 111 Radio Interface Setting up shared keys enables the basic IEEE 802.11 Wired Equivalent Privacy (WEP) on the access point to prevent unauthorized access to the network. If you choose to use WEP shared keys instead of an open system, be sure to define at least one static WEP key for user authentication and data encryption.
  • Page 112 System Configuration Shared Key Setup – Select 64 Bit, 128 Bit, or 152 Bit key length. Note that the same size of encryption key must be supported on all wireless clients. 152 Bit key length is only supported on 802.11a radio. (Default: 128 Bit) Key Type –...
  • Page 113 Radio Interface The configuration settings for WEP are summarized below: WEP only WEP over 802.1X Authentication Type: Shared Key Authentication Type: Open System WEP (encryption): Enable WEP (encryption): Enable WPA clients only: Disable WPA clients only: Disable Multicast Cipher: WEP Multicast Cipher: WEP Shared Key: 64/128/152 Shared Key: 64/128...
  • Page 114 System Configuration ----------------Security----------------------------------- Closed System : DISABLED Multicast cipher : WEP Unicast cipher : TKIP WPA clients : SUPPORTED WPA Key Mgmt Mode : DYNAMIC WPA PSK Key Type : HEX Encryption : 128-BIT ENCRYPTION Default Transmit Key Static Keys : Key 1: ***** Key 2: EMPTY Key 3: EMPTY...
  • Page 115 Radio Interface Wi-Fi Protected Access (WPA) WPA employs a combination of several technologies to provide an enhanced security solution for 802.11 wireless networks. The access point supports the following WPA components and features: IEEE 802.1X and the Extensible Authentication Protocol (EAP): WPA employs 802.1X as its basic framework for user authentication and dynamic key management.
  • Page 116 System Configuration to encrypt each data packet. TKIP provides further data encryption enhancements by including a message integrity check for each packet and a re-keying mechanism, which periodically changes the master key. WPA Pre-Shared Key (PSK) Mode: For enterprise deployment, WPA requires a RADIUS authentication server to be configured on the wired network.
  • Page 117 Radio Interface WPA Key Management – WPA can be configured to work in an enterprise environment using IEEE 802.1X and a RADIUS server for user authentication. For smaller networks, WPA can be enabled using a common pre-shared key for client authentication with the access point.
  • Page 118 System Configuration The configuration settings for WPA are summarized below: WPA pre-shared key only WPA over 802.1X Authentication Type: Open System Authentication Type: Open System WEP (encryption): Enable WEP (encryption): Enable WPA clients only: Enable WPA clients only: Enable WPA Mode: Pre-shared-key WPA Mode: WPA over 802.1X Multicast Cipher: WEP/TKIP/AES Multicast Cipher: WEP/TKIP/AES...
  • Page 119: Status Information

    Status Information the current 802.11g security settings, use the show interface wireless g command (not shown in example). AP(config)#interface wireless g 7-69 Enter Wireless configuration commands, one per line. AP(if-wireless g)#authentication open 7-76 AP(if-wireless g)#encryption 128 7-77 AP(if-wireless g)#wpa-clients required 7-81 AP(if-wireless g)#wpa-mode dynamic 7-82...
  • Page 120 System Configuration AP System Configuration – The AP System Configuration table displays the basic system configuration settings: • System Up Time: Length of time the management agent has been up. • MAC Address: The physical layer address for this device. •...
  • Page 121: Station Status

    Status Information current radio interface settings, use the command (see show interface wireless a page 7-84). DUAL OUTDOOR#show system 7-15 System Information ============================================================ Serial Number System Up time : 0 days, 5 hours, 2 minutes, 4 seconds System Name : Dual Band Outdoor AP System Location System Contact : Contact...
  • Page 122 System Configuration The Station Status page displays basic connection information for all associated stations. Note that this page is automatically refreshed every five seconds. • Station Address: The MAC address of the remote wireless bridge. • Authenticated: Shows if the station has been authenticated. The two basic methods of authentication supported for 802.11 wireless networks are “open system”...
  • Page 123: Event Logs

    Status Information Event Logs The Event Logs window shows the log messages generated by the wireless bridge and stored in memory. The Event Logs table displays the following information: • Log Time: The time the log message was generated. • Event Level: The logging level associated with this message. For a description of the various levels, see “logging level”...
  • Page 124 System Configuration 6-68...
  • Page 125: Chapter 7: Command Line Interface

    Chapter 7: Command Line Interface Using the Command Line Interface Accessing the CLI When accessing the management interface for the wireless bridge via a Telnet connection, the wireless bridge can be managed by entering command keywords and parameters at the prompt. Using the wireless bridge’s command-line interface (CLI) is very similar to entering commands on a UNIX system.
  • Page 126: Entering Commands

    Command Line Interface Entering Commands This section describes how to enter CLI commands. Keywords and Arguments A CLI command is a series of keywords and arguments. Keywords identify a command, and arguments specify configuration parameters. For example, in the command “show interface ethernet,” show and interface are keywords, and ethernet is an argument that specifies the interface type.
  • Page 127: Partial Keyword Lookup

    Entering Commands Interface). You can also display a list of valid keywords for a specific command. For example, the command “show ?” displays a list of possible show commands: Outdoor Bridge#show ? authentication Show Authentication parameters bootfile Show bootfile name bridge Show bridge table filters...
  • Page 128: Understanding Command Modes

    Command Line Interface Using the show history command displays a longer list of recently executed commands. Understanding Command Modes The command set is divided into Exec and Configuration classes. Exec commands generally display information on system status or clear statistical counters. Configuration commands, on the other hand, modify interface parameters or enable certain functions.
  • Page 129: Command Line Processing

    Entering Commands To enter Interface mode, you must enter the “interface ethernet” or “interface wireless a” command while in Global Configuration mode. The system prompt will change to “DUAL OUTDOOR(if-ethernet)#,” or “DUAL OUTDOOR(if-wireless a)” indicating that you have access privileges to the associated commands. You can use the end command to return to the Exec mode.
  • Page 130: Command Groups

    Command Line Interface Command Groups The system commands can be broken down into the functional groups shown below. Command Group Description Page General Basic commands for entering configuration mode, restarting the system, or quitting the CLI System Management Controls user name, password, browser management options, and a 7-10 variety of other system information System Logging...
  • Page 131: Configure

    General Commands configure This command activates Global Configuration mode. You must enter this mode to modify most of the settings on the wireless bridge. You must also enter Global Configuration mode prior to enabling the context modes for Interface Configuration. See “Using the Command Line Interface”...
  • Page 132: Ping

    Command Line Interface Example This example shows how to return to the Exec mode from the Interface Configuration mode, and then quit the CLI session: DUAL OUTDOOR(if-ethernet)#exit DUAL OUTDOOR#exit CLI session with the wireless bridge is now closed Username: ping This command sends ICMP echo request packets to another node on the network.
  • Page 133: Reset

    General Commands reset This command restarts the system or restores the factory default settings. Syntax reset <board | configuration> • board - Reboots the system. • configuration - Resets the configuration settings to the factory defaults, and then reboots the system. Default Setting None Command Mode...
  • Page 134: Show Line

    Command Line Interface show line This command displays the console port’s configuration settings. Command Mode Exec Example The console port settings are fixed at the values shown below. DUAL OUTDOOR#show line Console Line Information ====================================================== databits parity : none speed : 9600 stop bits ======================================================...
  • Page 135: Country

    System Management Commands country This command configures the wireless bridge’s country code, which identifies the country of operation and sets the authorized radio channels. Syntax country <country_code> country_code - A two character code that identifies the country of operation. See the following table for a full list of codes. Country Code Country...
  • Page 136: Prompt

    Command Line Interface Default Setting US - for units sold in the United States 99 (no country set) - for units sold in other countries Command Mode Exec Command Usage • If you purchased an wireless bridge outside of the United States, the country code must be set before radio functions are enabled.
  • Page 137: Username

    System Management Commands Default Setting Outdoor Bridge Command Mode Global Configuration Example DUAL OUTDOOR(config)#system name bridge-link DUAL OUTDOOR(config)# username This command configures the user name for management access. Syntax username name name - The name of the user. (Length: 3-16 characters, case sensitive) Default Setting admin Command Mode...
  • Page 138: Ip Http Port

    Command Line Interface Example DUAL OUTDOOR(config)#password bridgelink DUAL OUTDOOR(config)# ip http port This command specifies the TCP port number used by the web browser interface. Use the no form to use the default port. Syntax ip http port port-number no ip http port port-number - The TCP port to be used by the browser interface.
  • Page 139: Show System

    System Management Commands Example DUAL OUTDOOR(config)#ip http server DUAL OUTDOOR(config)# Related Commands ip http port (7-14) show system This command displays basic system configuration settings. Default Setting None Command Mode Exec Example DUAL OUTDOOR#show system System Information =========================================================== Serial Number : 0000000000 System Up time : 0 days, 0 hours, 17 minutes, 2 seconds...
  • Page 140: System Logging Commands

    Command Line Interface Example DUAL OUTDOOR#show version Version v1.1.2.1B05 DUAL OUTDOOR# System Logging Commands These commands are used to configure system logging on the wireless bridge. Command Function Mode Page logging on Controls logging of error messages 7-16 logging host Adds a syslog server host IP address that will receive logging 7-17 messages...
  • Page 141: Logging Host

    System Logging Commands logging host This command specifies a syslog server host that will receive logging messages. Use the no form to remove syslog server host. Syntax logging host <host_name | host_ip_address> no logging host • host_name - The name of a syslog server. (Range: 1-20 characters) •...
  • Page 142: Logging Level

    Command Line Interface Example DUAL OUTDOOR(config)#logging console DUAL OUTDOOR(config)# logging level This command sets the minimum severity level for event logging. Syntax logging level <Emergency | Alert | Critical | Error | Warning | Notice | Informational | Debug> Default Setting Error Command Mode Global Configuration...
  • Page 143: Show Logging

    System Logging Commands Command Mode Global Configuration Command Usage The command specifies the facility type tag sent in syslog messages. (See RFC 3164.) This type has no effect on the kind of messages reported by the wireless bridge. However, it may be used by the syslog server to sort messages or to store messages in the corresponding database.
  • Page 144: System Clock Commands

    Command Line Interface System Clock Commands These commands are used to configure SNTP and system clock settings on the wireless bridge. Command Function Mode Page sntp-server ip Specifies one or more time servers 7-20 sntp-server enable Accepts time from the specified time servers 7-21 sntp-server date-time Manually sets the system date and time...
  • Page 145: Sntp-Server Enable

    System Clock Commands sntp-server enable This command enables SNTP client requests for time synchronization with NTP or SNTP time servers specified by the sntp-server ip command. Use the no form to disable SNTP client requests. Syntax sntp-server enable no sntp-server enable Default Setting Disabled Command Mode...
  • Page 146: Sntp-Server Daylight-Saving

    Command Line Interface Related Commands sntp-server enable (7-21) sntp-server daylight-saving This command sets the start and end dates for daylight savings time. Use the no form to disable daylight savings time. Syntax sntp-server daylight-saving no sntp-server daylight-saving Default Setting Disabled Command Mode Global Configuration Command Usage...
  • Page 147: Show Sntp

    System Clock Commands Command Usage This command sets the local time zone relative to the Coordinated Universal Time (UTC, formerly Greenwich Mean Time or GMT), based on the earth’s prime meridian, zero degrees longitude. To display a time corresponding to your local time, you must indicate the number of hours and minutes your time zone is east (before) or west (after) of UTC.
  • Page 148: Snmp Commands

    Command Line Interface SNMP Commands Controls access to this wireless bridge from management stations using the Simple Network Management Protocol (SNMP), as well as the hosts that will receive trap messages. Command Function Mode Page snmp-server community Sets up the community access string to permit access to 7-24 SNMP commands snmp-server contact...
  • Page 149: Snmp-Server Contact

    SNMP Commands snmp-server contact This command sets the system contact string. Use the no form to remove the system contact information. Syntax snmp-server contact string no snmp-server contact string - String that describes the system contact. (Maximum length: 255 characters) Default Setting Contact Command Mode...
  • Page 150: Snmp-Server Host

    Command Line Interface Example DUAL OUTDOOR(config)#snmp-server enable server DUAL OUTDOOR(config)# Related Commands snmp-server host (7-26) snmp-server host This command specifies the recipient of an SNMP notification. Use the no form to remove the specified host. Syntax snmp-server host <host_ip_address | host_name> <community-string> no snmp-server host •...
  • Page 151: Snmp-Server Location

    SNMP Commands snmp-server location This command sets the system location string. Use the no form to remove the location string. Syntax snmp-server location text no snmp-server location text - String that describes the system location. (Maximum length: 20 characters) Default Setting None Command Mode Global Configuration...
  • Page 152: Flash/File Commands

    Command Line Interface Flash/File Commands These commands are used to manage the system code or configuration files. Command Function Mode Page bootfile Specifies the file or image used to start up the system Exec 7-28 copy Copies a code image or configuration between flash memory Exec 7-29 and a FTP/TFTP server...
  • Page 153: Copy

    Flash/File Commands copy This command copies a boot file, code image, or configuration file between the wireless bridge’s flash memory and a FTP/TFTP server. When you save the configuration settings to a file on a FTP/TFTP server, that file can later be downloaded to the wireless bridge to restore system operation.
  • Page 154: Delete

    Command Line Interface The following example shows how to download a configuration file: DUAL OUTDOOR#copy tftp file 1. Application image 2. Config file 3. Boot block image Select the type of download<1,2,3>: [1]:2 TFTP Source file name:syscfg TFTP Server IP:192.168.1.19 DUAL OUTDOOR# delete This command deletes a file or image.
  • Page 155: Radius Client

    RADIUS Client Command Usage File information is shown below: Column Heading Description File Name The name of the file. Type (2) Operation Code and (5) Configuration file File Size The length of the file in bytes. Example The following example shows how to display all file information: DUAL OUTDOOR#dir apimg1 765652...
  • Page 156: Radius-Server Address

    Command Line Interface radius-server address This command specifies the primary and secondary RADIUS servers. Syntax radius-server address [secondary] <host_ip_address | host_name> • secondary - Secondary server. • host_ip_address - IP address of server. • host_name - Host name of server. (Range: 1-20 characters) Default Setting None Command Mode...
  • Page 157: Radius-Server Key

    RADIUS Client radius-server key This command sets the RADIUS encryption key. Syntax radius-server [secondary] key <key_string> • secondary - Secondary server. • key_string - Encryption key used to authenticate logon access for client. Do not use blank spaces in the string. (Maximum length: 20 characters) Default Setting DEFAULT Command Mode...
  • Page 158: Radius-Server Timeout

    Command Line Interface radius-server timeout This command sets the interval between transmitting authentication requests to the RADIUS server. Syntax radius-server [secondary] timeout number_of_seconds • secondary - Secondary server. • number_of_seconds - Number of seconds the access point waits for a reply before resending a request.
  • Page 159: Authentication

    Authentication Authentication The access point supports IEEE 802.1x access control for wireless clients. This control feature prevents unauthorized access to the network by requiring a 802.1x client application to submit user credentials for authentication. Client authentication is then verified via by a RADIUS server using EAP (Extensible Authentication Protocol) before the access point grants client access to the network.
  • Page 160: 802.1X Broadcast-Key-Refresh-Rate

    Command Line Interface Default Setting Disabled Command Mode Global Configuration Command Usage • When 802.1x is disabled, the access point does not support 802.1x authentication for any station. After successful 802.11 association, each client is allowed to access the network. •...
  • Page 161: 802.1X Session-Key-Refresh-Rate

    Authentication Command Usage • The access point uses EAPOL (Extensible Authentication Protocol Over LANs) packets to pass dynamic unicast session and broadcast keys to wireless clients. The 802.1x broadcast-key-refresh-rate command specifies the interval after which the broadcast keys are changed. The 802.1x session-key-refresh-rate command specifies the interval after which unicast session keys are changed.
  • Page 162: 802.1X Session-Timeout

    Command Line Interface 802.1x session-timeout This command sets the time period after which a connected client must be re-authenticated. Use the no form to disable 802.1x re-authentication. Syntax 802.1x session-timeout <seconds> no 802.1x session-timeout seconds - The number of seconds. (Range: 0-65535) Default 0 (Disabled) Command Mode...
  • Page 163: Address Filter Default

    Authentication Default Disabled Command Mode Global Configuration Command Usage • Ethernet and WDS user names and passwords must be set before enabling the 802.1x supplicant feature for the specified port. • The access point currently only supports EAP-MD5 CHAP for 802.1x supplicant authentication.
  • Page 164: Address Filter Entry

    Command Line Interface address filter entry This command enters a MAC address in the filter table. Syntax address filter entry <mac-address> <allowed | denied> • mac-address - Physical address of client. (Enter six pairs of hexadecimal digits separated by hyphens; e.g., 00-90-D1-12-AB-89.) •...
  • Page 165: Mac-Authentication Server

    Authentication Example DUAL OUTDOOR(config)#address filter delete 00-70-50-cc-99-1b DUAL OUTDOOR(config)# Related Commands show authentication (7-42) mac-authentication server This command sets address filtering to be performed with local or remote options. Use the no form to disable MAC address authentication. Syntax mac-authentication server [local | remote] •...
  • Page 166: Show Authentication

    Command Line Interface Command Mode Global Configuration Example DUAL OUTDOOR(config)#mac-authentication session-timeout 1 DUAL OUTDOOR(config)# show authentication This command shows all 802.1x authentication settings, as well as the address filter table. Command Mode Exec Example DUAL OUTDOOR#show authentication Authentication Information ========================================================= MAC Authentication Server : REMOTE MAC Auth Session Timeout Value : 1 secs...
  • Page 167: Wds Channel

    WDS Commands wds channel This command selects the radio band to be used for WDS forwarding (bridging). Syntax wds channel <a | g | none> • a - Bridging is supported on the 802.11a 5 GHz band. • g - Bridging is supported on the 802.11b/g 2.4 GHz band. •...
  • Page 168: Wds Enable

    Command Line Interface wds enable This command enables WDS forwarding for a wireless port ID. Use the no form to disable WDS forwarding for a wireless port ID. Syntax [no] wds enable <port-id> • port-id - The wireless port number for the link. (1 for Slave units; 1-16 for Master units) Default WDS forwarding disabled on all ports...
  • Page 169 WDS Commands Example DUAL OUTDOOR#show wds Outdoor_Mode MASTER ================================================== Port ID Status Mac-Address ================================================== ENABLE 00-12-34-56-78-9A ENABLE 00-1A-2B-3C-4D-5E DISABLE 00-01-02-03-04-05 ENABLE 00-0E-87-3B-60-51 DISABLE 00-00-00-00-00-00 DISABLE 00-00-00-00-00-00 DISABLE 00-00-00-00-00-00 DISABLE 00-00-00-00-00-00 DISABLE 00-00-00-00-00-00 DISABLE 00-00-00-00-00-00 DISABLE 00-00-00-00-00-00 DISABLE 00-00-00-00-00-00 DISABLE 00-00-00-00-00-00 DISABLE 00-00-00-00-00-00 DISABLE...
  • Page 170: Bridge Commands

    Command Line Interface Bridge Commands The commands described in this section are used to set the MAC address table aging time and spanning tree parameters for both the Ethernet and wireless interfaces. Command Function Mode Page bridge timeout Sets the aging time for the address table 7-46 bridge stp-bridge spanning-tree Enables the spanning tree protocol for the bridge 7-47...
  • Page 171: Bridge Stp-Bridge Spanning-Tree

    Bridge Commands bridge stp-bridge spanning-tree Use this command to enable the Spanning Tree Protocol globally for the wireless bridge. Use the no form to disable it. Syntax bridge stp-bridge spanning-tree no bridge stp-bridge spanning-tree Default Setting Spanning tree is enabled. Command Mode Global Configuration Command Usage...
  • Page 172: Bridge Stp-Bridge Hello-Time

    Command Line Interface Command Usage This command sets the maximum time (in seconds) the root device will wait before changing states (i.e., discarding to learning to forwarding). This delay is required because every device must receive information about topology changes before it starts to forward frames. In addition, each port needs time to listen for conflicting information that would make it return to the discarding state;...
  • Page 173: Bridge Stp-Bridge Priority

    Bridge Commands Default Setting 20 seconds Command Mode Global Configuration Command Usage This command sets the maximum time (in seconds) a device can wait without receiving a configuration message before attempting to reconfigure. All device ports (except for designated ports) should receive configuration messages at regular intervals.
  • Page 174: Bridge Stp-Port Path-Cost

    Command Line Interface bridge stp-port path-cost Use this command to configure the spanning tree path cost for the specified port. Use the no form to restore the default for the specified port. Syntax bridge stp-port path-cost <port> cost no bridge stp-port path-cost <port> •...
  • Page 175: Bridge Stp-Port Portfast

    Bridge Commands Command Usage • This command defines the priority for the use of a port in the Spanning Tree Protocol. If the path cost for all ports on a wireless bridge are the same, the port with the highest priority (that is, lowest value) will be configured as an active link in the spanning tree.
  • Page 176: Bridge Stp-Port Spanning-Disabled

    Command Line Interface bridge stp-port spanning-disabled This command disables the Spanning Tree Protocol for the specified interface. Use the no form to reenable the Spanning Tree Protocol for the specified interface. Syntax bridge stp-port spanning-disabled <port> no bridge stp-port spanning-disabled <port> port - Specifies the port number on the wireless bridge.
  • Page 177: Filtering Commands

    Filtering Commands Example DUAL OUTDOOR#show bridge Bridge Information ================================================= Media Type | Age Time(sec)| ================================================= EtherNet WLAN_A 1000 ================================================== Bridge Id : 32768.037fbef192 Root Bridge Id : 32768.01f47483e2 Root Path Cost : 25 Root Port Id Bridge Status : Enabled Bridge Priority : 32768 Bridge Hello Time...
  • Page 178: Filter Ap-Manage

    Command Line Interface Default Disabled Command Mode Global Configuration Command Usage This command can disable wireless-to-wireless communications between clients via the access point. However, it does not affect communications between wireless clients and the wired network. Example DUAL OUTDOOR(config)#filter local-bridge DUAL OUTDOOR(config)# Related Commands filter ethernet-type enable (7-54)
  • Page 179: Filter Ethernet-Type Protocol

    Filtering Commands Command Mode Global Configuration Command Usage This command is used in conjunction with the filter ethernet-type protocol command to determine which Ethernet protocol types are to be filtered. Example DUAL OUTDOOR(config)#filter ethernet-type enable DUAL OUTDOOR(config)# Related Commands filter ethernet-type protocol (7-55) filter ethernet-type protocol This command sets a filter for a specific Ethernet type.
  • Page 180: Show Filters

    Command Line Interface show filters This command shows the filter options and protocol entries in the filter table. Command Mode Exec Example DUAL OUTDOOR#show filters Protocol Filter Information ========================================================= AP Management :ENABLED Ethernet Type Filter :ENABLED Enabled Protocol Filters --------------------------------------------------------- Protocol: ARP ISO: 0x0806 =========================================================...
  • Page 181: Ip Pppoe

    PPPoE Commands ip pppoe This command enables Point-to-Point Protocol over Ethernet (PPPoE) on the Ethernet interface. Use the no form to disable PPPoE on the Ethernet interface. Syntax ip pppoe no ip pppoe Default Setting Disabled Command Mode Interface Configuration (Ethernet) Command Usage The access point uses a PPPoE connection, or tunnel, only for management traffic between the access point and a remote PPPoE server (typically at an...
  • Page 182: Pppoe Ipcp Dns

    Command Line Interface Example DUAL OUTDOOR#(if-ethernet)#pppoe ip allocation mode static DUAL OUTDOOR# Related Commands pppoe local ip (7-60) pppoe remote ip (7-60) pppoe ipcp dns This command requests allocation of IP addresses for Dynamic Naming System (DNS) servers from the device at the remote end of the PPPoE tunnel. Syntax pppoe ipcp dns no pppoe ipcp dns...
  • Page 183: Pppoe Lcp Echo-Failure

    PPPoE Commands Command Usage • Echo requests are used to verify the integrity of the link through the PPPoE tunnel. Devices at either end of the link can issue an echo-request. Devices receiving an echo-request must return an echo-reply. • If a link is busy with large data transfers, the echo-reply may not be issued in a timely manner causing the link to timeout.
  • Page 184: Pppoe Local Ip

    Command Line Interface pppoe local ip This command sets the local IP address for the PPPoE tunnel. Syntax pppoe local ip <ip-address> ip-address - IP address of the local end of the PPPoE tunnel. Default Setting None Command Mode Interface Configuration (Ethernet) Command Usage If the pppoe ip allocation mode is set to static, the local IP address must be entered with this command, and the remote IP address must be entered with...
  • Page 185: Pppoe Username

    PPPoE Commands Example DUAL OUTDOOR#(if-ethernet)#pppoe remote ip 192.168.1.20 DUAL OUTDOOR# Related Commands pppoe ip allocation mode (7-57) pppoe local ip (7-60) pppoe username This command sets the user name for the PPPoE tunnel. Syntax pppoe username <username> username - User name assigned by the service provider. (Range: 1-63 alphanumeric characters) Default Setting None...
  • Page 186: Pppoe Service-Name

    Command Line Interface Command Usage You must enter a password with this command, and a user name with the pppoe username command. Example DUAL OUTDOOR#(if-ethernet)#pppoe password 12345 DUAL OUTDOOR# Related Commands pppoe username (7-61) pppoe service-name This command sets the service name for the PPPoE tunnel. Syntax pppoe service-name <string>...
  • Page 187: Show Pppoe

    Ethernet Interface Commands show pppoe This command shows information about the PPPoE configuration. Command Mode Privileged Exec Example DUAL OUTDOOR#show pppoe PPPoE Information ====================================================== State : Link up Username : mike Service Name : classA IP Allocation Mode : Static DNS Negotiation : Enabled Local IP...
  • Page 188: Interface Ethernet

    Command Line Interface interface ethernet This command enters Ethernet interface configuration mode. Syntax interface ethernet Default Setting None Command Mode Global Configuration Example To specify the 10/100Base-TX network interface, enter the following command: DUAL OUTDOOR(config)#interface ethernet DUAL OUTDOOR(if-ethernet)# dns server This command specifies the address for the primary or secondary domain name server to be used for name-to-address resolution.
  • Page 189: Ip Address

    Ethernet Interface Commands ip address This command sets the IP address for the (10/100Base-TX) Ethernet interface. Use the no form to restore the default IP address. Syntax ip address <ip-address> <netmask> <gateway> no ip address • ip-address - IP address •...
  • Page 190: Ip Dhcp

    Command Line Interface ip dhcp This command enables the access point to obtain an IP address from a DHCP server. Use the no form to restore the default IP address. Syntax ip dhcp no ip dhcp Default Setting Enabled Command Mode Interface Configuration (Ethernet) Command Usage •...
  • Page 191: Show Interface Ethernet

    Ethernet Interface Commands Command Mode Interface Configuration (Ethernet) Command Usage This command allows you to disable the Ethernet port due to abnormal behavior (e.g., excessive collisions), and reenable it after the problem has been resolved. You may also want to disable the Ethernet port for security reasons.
  • Page 192: Wireless Interface Commands

    Command Line Interface Wireless Interface Commands The commands described in this section configure connection parameters for the wireless interface. Command Function Mode Page interface wireless Enters wireless interface configuration mode 7-69 description Adds a description to the wireless interface IC-W 7-69 ssid Configures the service set identifier...
  • Page 193: Interface Wireless

    Wireless Interface Commands Command Function Mode Page show interface wireless Shows the status for the wireless interface Exec 7-84 show station Shows the wireless clients associated with the access Exec 7-85 point interface wireless This command enters wireless interface configuration mode. Syntax interface wireless a •...
  • Page 194: Ssid

    Command Line Interface ssid This command configures the service set identifier (SSID). Syntax ssid <string> string - The name of a basic service set supported by the access point. (Range: 1 - 32 characters) Default Setting DualBandOutdoor Command Mode Interface Configuration (Wireless) Command Usage Clients that want to connect to the wireless network via an access point must set their SSIDs to the same as that of the access point.
  • Page 195: Speed

    Wireless Interface Commands speed This command configures the maximum data rate for transmitting unicast packets on the wireless interface. Syntax speed <speed> speed - Maximum access speed allowed for remote bridges. (Options: 802.11a: 6, 9, 12, 18, 24, 36, 48, 54 Mbps; 802.11g:1, 2, 5.5, 6, 9, 11, 12, 18, 24, 36, 48, 54 Mbps) Default Setting 54 Mbps...
  • Page 196: Turbo

    Command Line Interface Example DUAL OUTDOOR(if-wireless a)#channel 36 DUAL OUTDOOR(if-wireless a)# turbo This command sets the wireless bridge to an enhanced mode (not regulated in IEEE 802.11a) that provides a higher data rate of up to 108 Mbps. Default Setting Disabled Command Mode Interface Configuration (Wireless - 802.11a)
  • Page 197: Dtim-Period

    Wireless Interface Commands Command Usage The beacon signals allow remote bridges to maintain contact with the local wireless bridge. They may also carry power-management information. Example DUAL OUTDOOR(if-wireless a)#beacon-interval 150 DUAL OUTDOOR(if-wireless a)# dtim-period This command configures the rate at which remote bridges in sleep mode must wake up to receive broadcast/multicast transmissions.
  • Page 198: Fragmentation-Length

    Command Line Interface fragmentation-length This command configures the minimum packet size that can be fragmented when passing through the wireless bridge. Syntax fragmentation-length <length> length - Minimum packet size for which fragmentation is allowed. (Range: 256-2346 bytes) Default Setting 2346 Command Mode Interface Configuration (Wireless) Command Usage...
  • Page 199: Transmit-Power

    Wireless Interface Commands Command Usage • If the threshold is set to 0, the wireless bridge always sends RTS signals. If set to 2347, the wireless bridge never sends RTS signals. If set to any other value, and the packet size equals or exceeds the RTS threshold, the RTS/ CTS (Request to Send / Clear to Send) mechanism will be enabled.
  • Page 200: Max-Association

    Command Line Interface max-association This command configures the maximum number of clients that can be associated with the access point at the same time. Syntax max-association <count> count - Maximum number of associated stations. (Range: 0-64) Default Setting Command Mode Interface Configuration (Wireless) Example AP(if-wireless g)#max-association 32...
  • Page 201: Encryption

    Wireless Interface Commands encryption This command defines whether WEP or AES encryption is used to provide privacy for wireless communications. Use the no form to disable encryption. Syntax encryption {wep <key-length> | wdsaes <alphanumeric | hex>} no encryption • wep - The keyword that enables WEP encryption. - key-length - Size of encryption key.
  • Page 202: Key

    Command Line Interface Example DUAL OUTDOOR(if-wireless a)#encryption wep 128 DUAL OUTDOOR(if-wireless a)# Related Commands key (7-78) This command sets the keys used for WEP and AES encryption. Use the no form to delete a configured key. Syntax key {wep <index size type wep-value> | wdsaes <port-id aes-value>} no key {wep <index>...
  • Page 203: Transmit-Key

    Wireless Interface Commands • If AES is enabled, each wireless bridge link in the network must be configured to use the same AES key • The AES key type value entered using the key command must be the same as the type specified in the encryption command. Example DUAL OUTDOOR(if-wireless a)#key wep 1 64 ascii 12345 DUAL OUTDOOR(if-wireless a)#key wep 2 64 ascii abcde...
  • Page 204: Multicast-Cipher

    Command Line Interface multicast-cipher This command defines the cipher algorithm used for broadcasting and multicasting when using Wi-Fi Protected Access (WPA) security. Syntax multicast-cipher <AES | TKIP | WEP> • AES - Advanced Encryption Standard • TKIP - Temporal Key Integrity Protocol •...
  • Page 205: Wpa-Clients

    Wireless Interface Commands Example AP(if-wireless g)#multicast-cipher TKIP AP(if-wireless g)# wpa-clients This command defines whether Wi-Fi Protected Access (WPA) is required or optionally supported for client stations. Syntax wpa-clients <required | supported> • required - Supports only clients using WPA. • supported - Support clients with or without WPA. Default Setting Supported Command Mode...
  • Page 206: Wpa-Mode

    Command Line Interface wpa-mode This command specifies whether Wi-Fi Protected Access (WPA) is to use 802.1x dynamic keys or a pre-shared key. Syntax wpa-mode <dynamic | pre-shared-key> • dynamic - WPA with 802.1x dynamic keys. • pre-shared-key - WPA with a pre-shared key. Default Setting dynamic Command Mode...
  • Page 207: Wpa-Psk-Type

    Wireless Interface Commands Command Mode Interface Configuration (Wireless) Command Usage • To support Wi-Fi Protected Access (WPA) for client authentication, use the wpa-clients command to specify the authentication type, use the wpa-mode command to specify pre-shared-key mode, and use this command to configure one static key.
  • Page 208: Shutdown

    Command Line Interface shutdown This command disables the wireless interface. Use the no form to restart the interface. Syntax shutdown no shutdown Default Setting Interface enabled Command Mode Interface Configuration (Wireless) Example DUAL OUTDOOR(if-wireless a)#shutdown DUAL OUTDOOR(if-wireless a)# show interface wireless This command displays the status for the wireless interface.
  • Page 209: Show Station

    Wireless Interface Commands Example DUAL OUTDOOR#show interface wireless a Wireless Interface Information ========================================================= ----------------Identification----------------------------- Description : Enterprise 802.11a Access Point Service Type : WDS Bridge SSID : DualBandOutdoor Turbo Mode : OFF Channel : 36 Status : Enable ----------------802.11 Parameters-------------------------- Transmit Power : FULL (15 dBm) Max Station Data Rate...
  • Page 210: Iapp Commands

    Command Line Interface IAPP Commands The command described in this section enables the protocol signaling required to ensure the successful handover of wireless clients roaming between different 802.11f-compliant access points. In other words, the 802.11f protocol can ensure successful roaming between access points in a multi-vendor environment. iapp This command enables the protocol signaling required to hand over wireless clients roaming between different 802.11f-compliant access points.
  • Page 211: Vlan

    VLAN Commands wireless bridge Note: Before enabling VLANs on the , you must configure the connected wireless bridge LAN switch port to accept tagged VLAN packets with the ’s native wireless bridge VLAN ID. Otherwise, connectivity to the will be lost when you enable the VLAN feature.
  • Page 212 Command Line Interface Command Mode Global Configuration Command Usage When VLANs are enabled, the wireless bridge tags traffic passing to the wired network with the configured native VLAN ID (a number between 1 and 64). Example DUAL OUTDOOR(config)#native-vlanid 3 DUAL OUTDOOR(config)# Related Commands vlan (7-87) 7-88...
  • Page 213: Appendix A: Troubleshooting

    Appendix A: Troubleshooting Check the following items before you contact local Technical Support. If wireless bridge units do not associate with each other, check the following: • Check the power injector LED for each bridge unit to be sure that power is being supplied •...
  • Page 214 Troubleshooting If you forgot or lost the password: • Contact Technical Support.
  • Page 215: Appendix B: Specifications

    Appendix B: Specifications General Specifications Maximum Channels (Outdoor) 802.11a: US & Canada: 9 (normal mode), 3 (turbo mode) Japan: 4 (normal mode), 1 (turbo mode) ETSI: 11 channels (normal mode), 4 (turbo mode) Taiwan: 4 (normal mode), 1 (turbo mode) 802.11g: FCC/IC: 1-11 ETSI: 1-13...
  • Page 216 Specifications Operating Frequency 802.11a: 5.15 ~ 5.25 GHz (lower band) US/Canada 5.25 ~ 5.35 GHz (middle band) US/Canada 5.725 ~ 5.825 GHz (upper band) US/Canada 5.25 ~ 5.35 GHz (middle band) Taiwan 5.725 ~ 5.825 GHz (high band) Taiwan 802.11b/g: 2.4 ~ 2.4835 GHz (US, Canada, ETSI) 2.4 ~ 2.497 GHz (Japan) 2.400 ~ 2.4835 GHz (Taiwan)
  • Page 217: Antenna Specifications

    Antenna Specifications Radio Signal Certification FCC Part 15 15.407(b) (5 GHz) FCC Part 15.247 (2.4 GHz) EN 300.328, EN 302.893 EN 300 826, EN 301.489-1, EN 301.489-17 ETSI 300.328; ETS 300 826 (802.11b) Safety CSA/NTRL (CSA 22.2 No. 950 & UL 1950) Standards IEEE 802.3 10BASE-T, IEEE 802.3u 100BASE-TX, IEEE 802.11a, b, g...
  • Page 218 Specifications 17 dBi Integrated Panel Antenna Link Budget (5.825 GHz, Cable Loss 1 dB, Fade Margin 5 dB) Modulation/Rates Transmit Power Receive Sensitivity Maximum Range (km) (dBm) (dBm) with 17 dBi Panel* Normal Mode BPSK (6 Mbps) 15.4 BPSK (9 Mbps) 14.7 QPSK (12 Mbps) 14.0...
  • Page 219: Appendix C: Cables And Pinouts

    Appendix C: Cables and Pinouts Twisted-Pair Cable Assignments For 10/100BASE-TX connections, a twisted-pair cable must have two pairs of wires. Each wire pair is identified by two different colors. For example, one wire might be green and the other, green with white stripes. Also, an RJ-45 connector must be attached to both ends of the cable.
  • Page 220: 10/100Base-Tx Pin Assignments

    Cables and Pinouts 10/100BASE-TX Pin Assignments Use unshielded twisted-pair (UTP) or shielded twisted-pair (STP) cable for RJ-45 connections: 100-ohm Category 3 or better cable for 10 Mbps connections, or 100-ohm Category 5 or better cable for 100 Mbps connections. Also be sure that the length of any twisted-pair connection does not exceed 100 meters (328 feet).
  • Page 221: Crossover Wiring

    8-Pin DIN Connector Pinout Crossover Wiring Because the 10/100 Mbps port on the power injector uses an MDI pin configuration, you must use “crossover” cable for network connections to PCs, servers or other end nodes that only have MDI ports. However, if the device to which you are connecting supports automatic MDI/MDI-X operation, you can use either “straight-through”...
  • Page 222: 8-Pin Din To Rj-45 Cable Wiring

    Cables and Pinouts 8-Pin DIN to RJ-45 Cable Wiring an extended Ethernet cable to connect from the power injector’s RJ-45 construct Output port to the wireless bridge’s 8-pin DIN connector, follow the wiring diagram below. Use Category 5 or better UTP or STP cable, maximum length 100 m (328 ft), and be sure to connect all four wire pairs.
  • Page 223: Glossary

    Glossary 10BASE-T IEEE 802.3 specification for 10 Mbps Ethernet over two pairs of Category 3 or better UTP cable. 100BASE-TX IEEE 802.3u specification for 100 Mbps Fast Ethernet over two pairs of Category 5 or better UTP cable. Access Point An internetworking device that seamlessly connects wired and wireless networks.
  • Page 224 Glossary The unit dBm refers to a precise measure of power based upon the decibel scale, but referenced to the milliwatt: i.e. 1 dBm = .001 Watt. The dBm is often used to describe absolute power level where the point of reference is 1 milliwatt. Dynamic Host Configuration Protocol (DHCP) Provides a framework for passing configuration information to hosts on a TCP/IP network.
  • Page 225 Glossary automatically reset their SSID to allow immediate connection to the nearest access point. Orthogonal Frequency Division Multiplexing (ODFM) OFDM/ allows multiple users to transmit in an allocated band by dividing the bandwidth into many narrow bandwidth carriers. RTS Threshold Transmitters contending for the medium may not be aware of each other.
  • Page 226 Glossary Glossary-4...
  • Page 227: Index

    Index 6-20 7-24 Advanced Encryption Stan- community string 6-21 7-24 dard See AES configuration settings, saving or restoring 6-60 6-25 7-29 configuring configuration, initial setup 6-50 AES, configuring country code 6-48 7-77 authentication configuring 6-11 7-76 7-11 configuring crossover cable 6-11 7-76 MAC address...
  • Page 228 Index configuring interface 6-46 factory defaults maximum data rate 6-47 restoring 6-25 7-71 fast forwarding, STP radio channel 6-38 6-46 7-71 filter IEEE 802.1x 6-18 7-39 6-59 7-35 address configuring 6-11 7-39 6-11 6-12 7-35 between wireless clients initial setup installation 6-19 7-53...
  • Page 229 Index threshold 6-44 7-74 OFDM open system security, options 6-53 7-70 6-53 operating frequency session key 6-13 7-37 shared key 6-49 6-56 7-78 package checklist Simple Network Management password Protocol See SNMP configuring Simple Network Time Proto- 6-23 7-13 management col See SNTP 6-23 7-13...
  • Page 230 Index displaying device status troubleshooting 6-63 7-15 displaying station status upgrading software 6-24 7-29 user name, manager 6-65 7-85 6-23 7-13 user password 6-23 7-13 fast forwarding 6-38 straight-through cable VLAN system clock, setting configuration 6-29 7-21 6-18 7-87 system log native ID 6-18 7-87...

This manual is also suitable for:

Bat54m

Table of Contents