Hide thumbs Also See for AP-51 Series:
Table of Contents

Advertisement

AP-51xx Access Point
Product Reference Guide

Advertisement

Table of Contents
loading

Summary of Contents for Motorola AP-51 Series

  • Page 1 AP-51xx Access Point Product Reference Guide...
  • Page 2 MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. Symbol is a registered trademark of Symbol Technologies, Inc. All other product or service names are the property of their respective owners. © 2008 Motorola, Inc. All rights reserved.
  • Page 3 AP-51xx Access Point Product Reference Guide 72E-113664-01 July 2008...
  • Page 5: Table Of Contents

    Contents About This Guide Introduction ............vii Document Conventions .
  • Page 6 AP-51xx Access Point Product Reference Guide Feature Overview ........... .1-5 Single or Dual Mode Radio Options.
  • Page 7 Routing Information Protocol (RIP) ........1-20 Manual Date and Time Settings ........1-21 Dynamic DNS .
  • Page 8 viii AP-51xx Access Point Product Reference Guide Above the Ceiling (Plenum) Installations......2-20 AP-5131 LED Indicators .
  • Page 9 Configuring Network Time Protocol (NTP) ....... .4-43 Logging Configuration ..........4-47 Importing/Exporting Configurations .
  • Page 10 AP-51xx Access Point Product Reference Guide Configuring WEP Encryption ......... .6-16 Configuring KeyGuard Encryption .
  • Page 11 Viewing MU Statistics Summary ........7-25 Viewing MU Details .
  • Page 12 AP-51xx Access Point Product Reference Guide Adaptive AP Setup Commands ........8-151 System Access Commands .
  • Page 13 xiii Configuring AP#3 ......... . .9-33 Verifying Mesh Network Functionality for Scenario #2.
  • Page 14 AP-51xx Access Point Product Reference Guide Appendix A. Technical Specifications Physical Characteristics ..........A-1 AP-5131 Physical Characteristics .
  • Page 15: About This Guide

    About This Guide Introduction This guide provides configuration and setup information for the AP-5131 and AP-5181 model access points. For the purposes of this guide, the devices will be called AP-51xx or the generic term “access point” when identical configuration activities are applied to both models. Document Conventions The following document conventions are used in this document: NOTE Indicate tips or special requirements.
  • Page 16: Notational Conventions

    If that is necessary, you will be given specific instructions. Motorola is not responsible for any damages incurred during shipment if the approved shipping container is not used. Shipping the units improperly can possibly void the warranty. If the original...
  • Page 17: Chapter 1. Introduction

    Introduction This AP-51xx Product Reference Guide contains setup and advanced configuration instructions for both the AP-5131 and AP-5181 model access points. Both the AP-5131 and AP-5181 model access points share the same Web UI, CLI and MIB interfaces. There are no differences in how the devices are configured using the instructions within this guide, even though the Web UI displays AP-5131 or AP-5181 specifically.
  • Page 18: New Features

    AP-51xx Access Point Product Reference Guide If you are new to using an access point for managing your network, refer to Theory of Operations on page 1-21 for an overview on wireless networking fundamentals. 1.1 New Features The following new features have been introduced since the 2.0 release: •...
  • Page 19: Apache Certificate Management

    An adaptive AP (AAP) is an AP-51XX access point that can adopt like an AP300 (L3). The management of an AAP is conducted by a switch, once the access point connects to a Motorola WS5100, RFS6000 or RFS7000 model switch and receives its AAP configuration.
  • Page 20: Bandwidth Management Enhancements

    AP-51xx Access Point Product Reference Guide For information on configuring the access point for Rogue AP support, see Configuring Rogue AP Detection on page 6-55. 1.1.6 Bandwidth Management Enhancements Use the Bandwidth Management screen to control the network bandwidth allotted to individual WLANs.
  • Page 21: Feature Overview

    Introduction 1.2 Feature Overview The access point has the following features carried forward from previous releases: • Single or Dual Mode Radio Options • Separate LAN and WAN Ports • Multiple Mounting Options • Antenna Support for 2.4 GHz and 5 GHz Radios •...
  • Page 22: Single Or Dual Mode Radio Options

    AP-51xx Access Point Product Reference Guide • Manual Date and Time Settings • Dynamic DNS • Auto Negotiation 1.2.1 Single or Dual Mode Radio Options One or two possible configurations are available on the access point depending on which model is purchased.
  • Page 23: Multiple Mounting Options

    Introduction 1.2.3 Multiple Mounting Options The access point rests on a flat surface, attaches to a wall, mounts under a ceiling or above a ceiling (attic). Choose a mounting option based on the physical environment of the coverage area. Do not mount the access point in a location that has not been approved in an either an AP-5131 or outdoor AP-5181 radio coverage site survey.
  • Page 24: Quality Of Service (Qos) Support

    AP-51xx Access Point Product Reference Guide If the radio MAC address displayed on the Radio Settings screen is 00:A0:F8:72:20:DC, then the BSSIDs for that radio will have the following MAC addresses: BSSID MAC Address Hexadecimal Addition BSSID #1 00:A0:F8:72:20:DC Same as Radio MAC address BSSID #2 00:A0:F8:72:20:DD Radio MAC address +1...
  • Page 25: Industry Leading Data Security

    Introduction 1.2.8 Industry Leading Data Security The access point supports numerous encryption and authentication techniques to protect the data transmitting on the WLAN. The following authentication techniques are supported: • Kerberos Authentication • EAP Authentication The following encryption techniques are supported: •...
  • Page 26: Eap Authentication

    1-10 AP-51xx Access Point Product Reference Guide where any wireless device can associate with an AP without authorization. Kerberos requires device authentication before access to the wired network is permitted. For detailed information on Kerbeors configurations, see Configuring Kerberos Authentication on page 6-8.
  • Page 27: Keyguard Encryption

    Use KeyGuard to shield the master encryption keys from being discovered through hacking. KeyGuard negotiation takes place between the access point and MU upon association. The access point can use KeyGuard with Motorola MUs. KeyGuard is only supported on Motorola MUs making it a Motorola proprietary security mechanism.
  • Page 28: Wpa2-Ccmp (802.11I) Encryption

    1-12 AP-51xx Access Point Product Reference Guide WPA uses an encryption method called Temporal Key Integrity Protocol (TKIP). WPA employs 802.1X and Extensible Authentication Protocol (EAP). For detailed information on WPA using TKIP configurations, see Configuring WPA/WPA2 Using TKIP on page 6-21.
  • Page 29: Content Filtering

    Introduction 1-13 1.2.8.9 Content Filtering Content filtering allows system administrators to block specific commands and URL extensions from going out through the WAN port. Therefore, content filtering affords system administrators selective control on the content proliferating the network and is a powerful screening tool. Content filtering allows the blocking of up to 10 files or URL extensions and allows blocking of specific outbound HTTP, SMTP, and FTP requests.
  • Page 30: Updatable Firmware

    System Settings page (see Configuring System Settings on page 4-2) is older than the version on the Web site, Motorola recommends updating the access point to the latest firmware version for full feature functionality. An AP-5181 model access point does not support firmware earlier than 1.1.1.0.
  • Page 31: Mu-Mu Transmission Disallow

    Introduction 1-15 An approved power injector solution merges power and Ethernet into one cable, reducing the burden of installation and allows optimal access point placement in respect to the intended radio coverage area. The AP-5131 Power Injector is a single-port, 802.3af compliant Power over Ethernet hub combining low-voltage DC with Ethernet data in a single cable connecting to the access point.
  • Page 32: Support For Cam And Psp Mus

    1-16 AP-51xx Access Point Product Reference Guide 1.2.16 Support for CAM and PSP MUs The access point supports both CAM and PSP powered MUs. CAM (Continuously Aware Mode) MUs leave their radios on continuously to hear every beacon and message transmitted. These systems operate without any adjustments by the access point.
  • Page 33: Advanced Event Logging Capability

    Introduction 1-17 1.2.19 Advanced Event Logging Capability The access point provides the capability for periodically logging system events. Logging events is useful in assessing the throughput and performance of the access point or troubleshooting problems on the access point managed Local Area Network (LAN). For detailed information on access point events, see Logging Configuration on page 4-47.
  • Page 34: Multi-Function Leds

    1-18 AP-51xx Access Point Product Reference Guide The DHCP client automatically sends a DHCP request at an interval specified by the DHCP server to renew the IP address lease as long as the access point is running (this parameter is programmed at the DHCP server).
  • Page 35: Additional Lan Subnet

    Introduction 1-19 access point is configured as both a client bridge and a base bridge, it begins accepting client bridge connections. In this way, the mesh network builds itself over time and distance. Once the access point (in client bridge mode) establishes at least one wireless connection, it establishes other wireless connections in the background as they become available.
  • Page 36: Hotspot Support

    1-20 AP-51xx Access Point Product Reference Guide associate digital certificates with the authentication scheme. The LDAP screen allows the administrator to configure an external LDAP Server for use with the access point. A new Access Policy screen enables the administrator to set WLAN access based on user groups defined within the User Database screen.
  • Page 37: Manual Date And Time Settings

    Introduction 1-21 1.2.29 Manual Date and Time Settings As an alternative to defining a NTP server to provide access point system time, the access point can now have its date and time set manually. A new Manual Date/Time Setting screen can be used to set the time using a Year-Month-Day HH:MM:SS format.
  • Page 38: Cellular Coverage

    2.4 to 2.5-GHz frequency range (802.11b/g radio) or the 5 GHz frequency range (802.11a radio), the actual range is country-dependent. Motorola devices, like other Ethernet devices, have unique, hardware encoded Media Access Control (MAC) or IEEE addresses.
  • Page 39: Mac Layer Bridging

    Introduction 1-23 If the MU does not find an access point with a workable signal, it can perform a scan to find any AP. As MUs switch APs, the AP updates its association statistics. The user can configure the ESSID to correspond to up to 16 WLANs on each 802.11a or 802.11b/g radio.
  • Page 40: Direct-Sequence Spread Spectrum

    1-24 AP-51xx Access Point Product Reference Guide supports multiple-cell operations with fast roaming between cells. Within a direct-sequence system, each cell can operate independently. Adding cells to the network provides an increased coverage area and total system capacity. The RS-232 serial port provides a Command Line Interface (CLI) connection. The serial link supports a direct serial connection (assuming a DB9 connector is used).
  • Page 41: Mu Association Process

    Introduction 1-25 1.3.5 MU Association Process An access point recognizes MUs as they begin the association process. An access point keeps a list of the MUs it services. MUs associate with an access point based on the following conditions: • Signal strength between the access point and MU •...
  • Page 42: Operating Modes

    1-26 AP-51xx Access Point Product Reference Guide The scanning and association process continues for active MUs. This process allows the MUs to find new access points and discard out-of-range or deactivated access points. By testing the airwaves, the MUs can choose the best network connection available. 1.3.6 Operating Modes The access point can operate in a couple of configurations.
  • Page 43 Introduction 1-27 • Config file - Human-readable; Importable/Exportable via FTP and TFTP • MIB (Management Information Base) accessing the access point SNMP function using a MIB Browser. The AP-5131 or AP-5181 downloads site contains the following 2 MIB files: • Symbol-CC-WS2000-MIB-2.0 (standard MIB file) •...
  • Page 44: Ap-51Xx Mac Address Assignment

    1-28 AP-51xx Access Point Product Reference Guide 1.3.8 AP-51xx MAC Address Assignment For both an AP-5131 and AP-5181 model access point, MAC address assignments are as follows: • WAN - The access point MAC address can be found underneath the access point chassis. •...
  • Page 45: Chapter 2. Hardware Installation

    Hardware Installation An access point installation includes mounting the access point, connecting the access point to the network (LAN or WAN port connection), connecting antennae and applying power. Installation procedures vary for different environments. See the following sections for more details: •...
  • Page 46: Precautions

    2.1 Precautions Before installing an AP-5131 or AP-5181 model access point verify the following: • Do not install in wet or dusty areas without additional protection. Contact a Motorola representative for more information. • Verify the environment has a continuous temperature range between -20° C to 50° C.
  • Page 47 Hardware Installation Part No. Description AP-5131-13043-WWR AP-5131 802.11a+g Dual Radio Access Point AP-5131 Install Guide Software and Documentation CD-ROM Power Injector (Part No. AP-PSBIAS-1P2-AFR) (4) Dual-Band Antennae (Part No. ML-2452-APA2-01) Accessories Bag AP-5131-40020-WW AP-5131 802.11a/g Single Radio Access Point AP-5131 Install Guide Software and Documentation CD-ROM Accessories Bag AP-5131-40021-WWR...
  • Page 48: Ap-5181 Configurations

    AP-5181 to a pole or wall. NOTE If installing the AP-5181 in an outdoor area prone to high winds and rain, Motorola recommends using the AP-5181 Heavy Weather Kit (Part No. KT-5181-HW-01R). This kit shields an AP-5181 from wind and rain...
  • Page 49: Requirements

    Hardware Installation NOTE Though the AP-5181 can use the Power Injector solution (Part No. AP-PSBIAS-1P2-AFR), Motorola recommends using the AP-5181 Power Tap (Part No. AP-PSBIAS-5181-01R), designed specifically for outdoor deployments. 2.3 Requirements The minimum installation requirements for a single-cell, peer-to-peer network (regardless of access point model) •...
  • Page 50: Site Surveys

    Motorola recommends conducting a new site survey and developing a new coverage area floor plan when switching from 2 or 11Mbps access points (AP-3021 or AP-4131 models) to 54Mbps access points (AP-5131 and AP-5181 models), as the device placement requirements are significantly different.
  • Page 51 Yagi Antenna 13.9 ML-2452-APA2-01 Dual-Band NOTE An additional adapter is required to use ML-2499-11PNA2-01 and ML-2499-BYGA2-01 model antennae. Please contact Motorola for more information. The AP-5131 5 GHz antenna suite includes the following models: Part No. Antenna Type Nominal Net Gain (dBi)
  • Page 52: Ap-5181 Antenna Options

    Two antennae per radio provides diversity that can improve performance and signal reception. Motorola supports two antenna suites for the AP-5181. One antenna suite supporting the 2.4 GHz band and another antenna suite supporting the 5 GHz band. Select an antenna model best suited to the intended operational environment of your AP-5181.
  • Page 53: Power Options

    Hardware Installation Nominal Net Gain Part Number Antenna Type (dBi) Description ML-2452-PNA7-01R Panel Antenna (Dual-Band) 2.4 - 2.5/4.9 - 5.99 GHz, 66 deg/60 deg Type N connector, with pigtail ML-2452-PNA5-01R Sector Antenna (Dual-Band) 6.0 2.3 - 2.4/4.9 - 5.9 GHz, 120 deg Sector Type N connector, with pigtail...
  • Page 54: Power Injector And Power Tap Systems

    The power options for the AP-5181 include: CAUTION An AP-5181 model access point cannot use the AP-5131 recommended 48-Volt Power Supply (Part No. 50-14000-243R). Motorola recommends the AP-PSBIAS-5181-01R Power Tap for use an AP-5181 and its intended outdoor deployment. • Power Injector (Part No. AP-PSBIAS-1P2-AFR) •...
  • Page 55: Installing The Power Injector Or Power Tap

    CAUTION The access point supports a 802.3af compliant power source (including non-Motorola power sources). However, using the wrong solution (including a POE system used on a legacy Motorola access point) could severely damage the access point and void the product warranty.
  • Page 56: Power Injector Led Indicators

    2-12 AP-51xx Access Point Product Reference Guide CAUTION Ensure AC power is supplied to the Power Injector or Power Tap (for AP-5181 installations) using an AC cable with an appropriate ground connection approved for the country of operation. 1. Connect an RJ-45 Ethernet cable between the network data supply (host) and the Power Injector’s Data In or the Power Tap’s DATA IN connector.
  • Page 57: Desk Mounted Installations

    For more information and device specifications for the Power Injector, refer to the Power Injector Quick Install Guide (Part No. 72-70762-01) available from the Motorola Web site. 2.7 Mounting an AP-5131 The AP-5131 can rest on a flat surface, attach to a wall, mount under a suspended T-Bar or above a ceiling (plenum or attic).
  • Page 58 2-14 AP-51xx Access Point Product Reference Guide CAUTION Both the Dual and Single Radio model AP-5131’s use RSMA type antenna connectors. On the Dual Radio AP-5131, a single dot on the antenna connector indicates the primary antenna for both Radio 1 (2.4 GHz) and Radio 2 (5 GHz).
  • Page 59: Wall Mounted Installations

    Hardware Installation 2-15 For standard 48-Volt power adapter (Part No. 50-14000-243R) and line cord installations: a. Connect RJ-45 Ethernet cable between the network data supply (host) and the AP-5131 LAN port. b. Verify the power adapter is correctly rated according the country of operation. c.
  • Page 60 2-16 AP-51xx Access Point Product Reference Guide If pre-drilling a hole, the recommended hole size is 2.8mm (0.11in.) if the screws are going directly into the wall and 6mm (0.23in.) if wall anchors are being used. 4. If required, install and attach a security cable to the AP-5131 lock port. 5.
  • Page 61: Suspended Ceiling T-Bar Installations

    NOTE If the AP-5131 is utilizing remote management antennae, a wire cover can be used to provide a clean finished look to the installation. Contact Motorola for more information. 9. Verify the behavior of the AP-5131 LEDs. For more information, see...
  • Page 62 2-18 AP-51xx Access Point Product Reference Guide CAUTION Both the Dual and Single Radio model AP-5131s use RSMA type antenna connectors. On a Dual Radio AP-5131, a single dot on the antenna connector indicates the primary antenna for both Radio 1 (2.4 GHz) and Radio 2 (5 GHz).
  • Page 63 3-1. For specific details on AP-5131 system configurations, see System Configuration on page 4-1. NOTE If the AP-5131 is utilizing remote management antennae, a wire cover can be used to provide a clean finished look to the installation. Contact Motorola for more information.
  • Page 64: Above The Ceiling (Plenum) Installations

    NOTE The AP-5131 is Plenum rated to UL2043 and NEC1999 to support above the ceiling installations. CAUTION Motorola does not recommend mounting the AP-5131 directly to any suspended ceiling tile with a thickness less than 12.7mm (0.5in.) or a suspended ceiling tile with an unsupported span greater than 660mm (26in.).
  • Page 65 Hardware Installation 2-21 CAUTION Motorola recommends care be taken not to damage the finished surface of the ceiling tile when creating the light pipe hole and installing the light pipe. 7. Remove the light pipe’s rubber stopper before installing the light pipe.
  • Page 66 2-22 AP-51xx Access Point Product Reference Guide 13. Attach safety wire (if used) to the AP-5131 safety wire tie point or security cable (if used) to the AP-5131’s lock port. 14. Align the ceiling tile into its former ceiling space. 15.
  • Page 67: Ap-5131 Led Indicators

    Hardware Installation 2-23 2.8 AP-5131 LED Indicators The AP-5131 utilizes seven LED indicators. Five LEDs display within four LED slots on the front of the AP-5131 (on top of the AP-5131 housing) and two LEDs (for above the ceiling installations) are located on the back of the device (the side containing the LAN, WAN and antenna connectors).
  • Page 68: Mounting An Ap-5181

    2-24 AP-51xx Access Point Product Reference Guide The LEDs on the rear of the AP-5131 are viewed using a single (customer installed) extended lightpipe, adjusted as required to suit above the ceiling installations. The LEDs displayed using the lightpipe have the following color display and functionality: Solid white indicates the AP-5131 is adequately powered.
  • Page 69 Hardware Installation 2-25 Fit the edges of the V-shaped part into the slots Tighten the securing bolts 3. Attach the square mounting plate to the bridge with the supplied screws. Attach the square plate to the bridge 4. Attach the AP-5181 and mounting plate to the bracket already fixed to the pole. 5.
  • Page 70 2-26 AP-51xx Access Point Product Reference Guide 7. Cable the AP-5181 using either the AP-5181 Power Tap (Part No. AP-PSBIAS-5181-01R) or the Power Injector (Part No. AP-PSBIAS-1P2-AFR). NOTE The access point must be mounted with the RJ45 cable connectors oriented upwards to ensure proper operation. CAUTION Do not supply power to the AP-5181 Power Tap or Power Injector until the cabling of the access point is complete.
  • Page 71: Ap-5181 Wall Mounted Installations

    4-1. NOTE If installing the AP-5181 in an outdoor area prone to high winds and rain, Motorola recommends using the AP-5181 Heavy Weather Kit (Part No. KT-5181-HW-01R). This kit shields an AP-5181 from high winds and water damage as a result of driving rain.
  • Page 72 2-28 AP-51xx Access Point Product Reference Guide 5. Use the included nuts to tightly secure the wireless bridge to the bracket. Fit the edges of the V-shaped clamp into the slots on the flat side of the rectangular plate. 6. Attach the radio antenna to their correct connectors. 7.
  • Page 73: Ap-5181 Led Indicators

    4-1. NOTE If installing the AP-5181 in an outdoor area prone to high winds and rain, Motorola recommends using the AP-5181 Heavy Weather Kit (Part No. KT-5181-HW-01R). This kit shields an AP-5181 from high winds and water damage as a result of driving rain.
  • Page 74 2-30 AP-51xx Access Point Product Reference Guide Power and error conditions (split LED) Data over Ethernet 802.11a radio activity 802.11b/g radio activity Solid white indicates the access point is adequately powered. Power Status Solid red indicates the access point is experiencing a problem condition requiring immediate attention.
  • Page 75: Setting Up Mus

    3-14. Refer to the LA-5030 & LA-5033 Wireless Networker PC Card and PCI Adapter Users Guide, available from the Motorola Web site, for installing drivers and client software if operating in an 802.11a/g network environment. Refer to the Spectrum24 LA-4121 PC Card, LA-4123 PCI Adapter & LA-4137 Wireless Networker User Guide, available from the Motorola Web site, for installing drivers and client software if operating in an 802.11b network environment.
  • Page 76 2-32 AP-51xx Access Point Product Reference Guide...
  • Page 77: Chapter 3. Getting Started

    Getting Started The access point should be installed in an area tested for radio coverage using one of the site survey tools available to the field service technician. Once an installation site has been identified, the installer should carefully follow the hardware precautions, requirements, mounting guidelines and power options outlined in Hardware Installation.
  • Page 78: Configuration Options

    AP-51xx Access Point Product Reference Guide For installing an AP-5131 model access point • For instructions on installing the AP-5131 on a table top, see Desk Mounted Installations on page 2-13. • For instructions on mounting an AP-5131 to a wall, see Wall Mounted Installations on page 2- •...
  • Page 79: Default Configuration Changes For The Access Point

    Getting Started • Config file - Readable text file; Importable/Exportable via FTP, TFTP and HTTP. Configuration settings for an access point can be downloaded from the current configuration of another access point meeting the import/export requirements. For information on importing or exporting configuration files, see Importing/Exporting Configurations on page 4-49.
  • Page 80: Initially Connecting To The Access Point

    1. Connect AC power to the access point, as Power-Over-Ether support is not available on the access point’s WAN port. 2. Start a browser and enter the access point’s static IP WAN address (10.1.1.1). The default password is “motorola.” 3. Refer to Basic Device Configuration on page 3-5 for instructions on the initial (basic) configuration of the access point.
  • Page 81: Basic Device Configuration

    4. Press <ESC> or <Enter> to access the access point CLI. 5. Enter the default username of “admin” and the default password of “motorola.” As this is the first time you are logging into the access point, you are prompted to enter a new password and set the county code.
  • Page 82 AP-51xx Access Point Product Reference Guide 2. If the default login is successful, the Change Admin Password window displays. Change the password. Enter the current password and a new admin password in fields provided. Click Apply. Once the admin password has been updated, a warning message displays stating the access point must be set to a country.
  • Page 83: Configuring Device Settings

    Admin User password WILL NOT get imported. NOTE Though the access point can have its basic settings defined using a number of different screens, Motorola recommends using the access point Quick Setup screen to set the correct country of operation and define its minimum required configuration from one convenient location.
  • Page 84 AP-51xx Access Point Product Reference Guide The System Name is useful if multiple devices are being administered. 3. Select the Country for the access point’s country of operation from the drop-down menu The access point prompts the user for the correct country code on the first login. A warning message also displays stating that an incorrect country settings may result in illegal radio operation.
  • Page 85 DHCP server to a host. Some of these parameters are IP address, network mask, and gateway. NOTE Motorola recommends that the WAN and LAN ports should not both be configured as DHCP clients.
  • Page 86 DHCP server over the LAN connection. Select the Bootp client option to enable a diskless system to discover its own IP address. NOTE Motorola recommends that the WAN and LAN ports should not both be configured as DHCP clients.
  • Page 87 Getting Started 3-11 c. If using the static or DHCP Server option, enter the network-assigned IP Address of the access point. NOTE DNS names are not supported as a valid IP address for the access point. The user is required to enter a numerical IP address. d.
  • Page 88: Configuring Wlan Security Settings

    Multiple WLANs can share the same security policy, so be careful not to name security policies after specific WLANs or risk defining a WLAN to single policy. Motorola...
  • Page 89 The access point, other proprietary routers and MUs use the same algorithm to convert an ASCII string to the same hexadecimal number. Non-Motorola clients and devices need to enter WEP keys manually as hexadecimal numbers. The access point and its target client(s) must use the same pass key to...
  • Page 90: Testing Connectivity

    (WNMP) ping packets to the associated MU. Use the Echo Test screen to specify a target MU and configure the parameters of the test. The WNMP ping test only works with Motorola MUs. Only use a Motorola MU to test access point connectivity using WNMP.
  • Page 91: Where To Go From Here

    Getting Started 3-15 Packet Length Specifies the length of each packet transmitted to the MU during the test. The default length is 100 bytes. 4. Click the Ping button to begin transmitting packets to the specified MU address. Refer to the Number of Responses value to assess the number of responses from the MU versus the number of ping packets transmitted by the access point.
  • Page 92 3-16 AP-51xx Access Point Product Reference Guide...
  • Page 93: Chapter 4. System Configuration

    WAN port, the default static IP address is 10.1.1.1. The default password is “ .” If connected motorola to the access point using the LAN port, the default setting is DHCP client. The user is required to know the IP address to connect to the access point using a Web browser.
  • Page 94: Configuring System Settings

    AP-51xx Access Point Product Reference Guide System configuration topics include: • Configuring System Settings • Adaptive AP Setup • Configuring Data Access • Managing Certificate Authority (CA) Certificates • Configuring SNMP Settings • Configuring Network Time Protocol (NTP) • Logging Configuration •...
  • Page 95 System Name Specify a device name for the access point. Motorola recommends selecting a name serving as a reminder of the user base the access point supports (engineering, retail, etc.).
  • Page 96 CAUTION Restoring the access point’s configuration back to default settings changes the administrative password back to “motorola.” If restoring the configuration back to default settings, be sure you change the...
  • Page 97 Click the Restart access point button to reboot the AP. Restarting the access point resets all data collection values to zero. Motorola does not recommend restarting the AP during significant system uptime or data collection activities. CAUTION After a reboot, static route entries disappear from the AP Route Table if a LAN Interface is set to DHCP Client.
  • Page 98: Adaptive Ap Setup

    Adaptive AP on page 10-1. NOTE AAP functionality is only supported on a Motorola WS5100 model switch (running firmware version 3.1) or higher and a Motorola RFS6000/ RFS7000 model switch (running firmware version 1.1 or higher). NOTE The Adaptive AP Setup screen does not display the AAP’s adoption status or adopted switch.
  • Page 99 System Configuration 2. Define the following to prioritize a switch connection scheme and AP interface used to adopt to the switch. Control Port Define the port used by the switch FQDN to transmit and receive with the AAP. The default control port is 24576. Switch FQDN Add a complete switch fully qualified domain name (FQDN) to add a switch to the 12 available switch IP addresses available for...
  • Page 100 AP-51xx Access Point Product Reference Guide Auto Discovery Enable When the Auto Discovery Enable checkbox is selected, the access point begins the switch discovery (adoption) process using DHCP first, then a user provided domain name, lastly using static IP addresses. This setting is disabled by default. When disabled, the AP functions as a standalone access point without trying to adopt a switch.
  • Page 101: Configuring Data Access

    To avoid jeopardizing the network data managed by the access point, Motorola recommends enabling only those interfaces used in the routine (daily) management of the network, and disabling all other interfaces until they are required.
  • Page 102 4-10 AP-51xx Access Point Product Reference Guide 2. Select the Trusted Hosts checkbox to display a field where up to 8 IP addresses can be defined for exclusive access to the AP. For more information, see Defining Trusted Hosts on page 4-14.
  • Page 103 System Configuration 4-11 CLI SSH (port 22) Select the LAN1, LAN2 and/or WAN checkboxes to enable access to the access point CLI using the SSH (Secure Shell) protocol. SNMP (port 161) Select the LAN1, LAN2 and/or WAN checkboxes to enable access to the access point configuration settings from an SNMP-capable client.
  • Page 104 Radius-enabled device configured with the same shared secret. Apply the qualifications of a well-chosen password to the generation of a shared secret. Generate a random, case-sensitive string using letters and numbers. The default is motorola. 8. Update the Administrator Access field to change the administrative password used to access the configuration settings.
  • Page 105 System Configuration 4-13 9. Refer to the Login Message field to optionally define a message displayed to the customer as they login into the access point. Message Settings Click the Message Settings button to display a screen used to create a text message. Once displayed, select the Enable Login Message checkbox to allow your customized message to be...
  • Page 106: Defining Trusted Hosts

    4-14 AP-51xx Access Point Product Reference Guide 10. Click Apply to save any changes to the access point Access screen. Navigating away from the screen without clicking the Apply button results in all changes to the screen being lost. 11. Click Undo Changes (if necessary) to undo any changes made.
  • Page 107 System Configuration 4-15 2. Select the Trusted Hosts checkbox. Trusted Host Access field displays. The remaining portion of the Access screen (not related to Trusted Host support) can be accessed using the scroll bar on the right-hand side of the AP-51XX Access screen. 3.
  • Page 108: Managing Certificate Authority (Ca) Certificates

    4-16 AP-51xx Access Point Product Reference Guide 7. Click Undo Changes (if necessary) to undo any changes made. Undo Changes reverts the Trusted Host settings within the Access screen to the last saved configuration. 8. Click Logout to securely exit the access point Access Point applet. A prompt displays confirming the logout before the applet is closed.
  • Page 109 System Configuration 4-17 select the IKE settings to use either RSA or DES certificates. For additional information on configuring VPN tunnels, see Configuring VPN Tunnels on page 6-36. CAUTION Loaded and signed CA certificates will be lost when changing the access point’s firmware version using either the GUI or CLI.
  • Page 110: Creating Self Certificates For Accessing The Vpn

    4-18 AP-51xx Access Point Product Reference Guide 2. Copy the content of the CA Certificate message (using a text editor such as notepad) and click on Paste from Clipboard. The content of the certificate displays in the Import a root CA Certificate field.
  • Page 111 System Configuration 4-19 CAUTION Self certificates can only be generated using the access point GUI and CLI interfaces. No functionality exists for creating a self-certificate using the access point’s SNMP configuration option. To create a self certificate: 1. Select System Configuration ->...
  • Page 112 4-20 AP-51xx Access Point Product Reference Guide Key ID Enter a logical name for the certificate to help distinguish between certificates. The name can be up to 7 characters in length. Subject The required Subject value contains important information about the certificate.
  • Page 113 System Configuration 4-21 The generated certificate request displays in Self Certificates screen text box. 6. Click the Copy to Clipboard button. The content of certificate request is copied to the clipboard. Create an email to your CA, paste the content of the request into the body of the message and send it to the CA.
  • Page 114: Creating A Certificate For Onboard Radius Authentication

    4-22 AP-51xx Access Point Product Reference Guide NOTE If the access point is restarted after a certificate request has been generated but before the signed certificate is imported, the import will not execute properly. Do not restart the access point during this process. 8.
  • Page 115 RSA encryption. • SHA1-RSA - Secure Hash Algorithm 1 in combination with RSA encryption. Key Length Defines the length of the key. Possible values are 512, 1024, and 2048. Motorola recommends setting this value to 1024 to ensure optimum functionality.
  • Page 116 4-24 AP-51xx Access Point Product Reference Guide 4. Complete as many of the optional values within the Certificate Request screen as possible. 5. When the form is completed, click the Generate button from within the Certificate Request screen. The Certificate Request screen disappears and the ID of the generated certificate request displays in the drop-down list of certificates within the Self Certificates screen.
  • Page 117: Apache Certificate Management

    System Configuration 4-25 15. Load the certificates on the access point CAUTION Ensure the CA Certificate is loaded before the Self Certificate, or risk an invalid certificate load. 16. Open the certificate file and copy its contents into the CA Certificates screen by clicking the Paste from Clipboard button.
  • Page 118 4-26 AP-51xx Access Point Product Reference Guide 2. Configure the FTP and TFTP Import/Export field to import/export security certificates for an Apache HTTP server. Certificate Name (no Specify the name of the certificate file to be written to the FTP or extension) TFTP server.
  • Page 119: Configuring Snmp Settings

    System Configuration 4-27 Username Specify a username to be used when logging in to the FTP server. A username is not required for TFTP server logins. Password Define a password allowing access to the FTP server for the import or export operation. Import Certificate and Click the Import Certificate and Key...
  • Page 120 NOTE The Symbol-AP-5131-MIB contains the majority of the information contained within the Symbol-CC-WS2000-MIB-2.0 file. This feature rich information has been validated with the Motorola WS2000 and proven reliable. The remaining portion of the Symbol-AP-5131-MIB contains supplemental information unique to the access point feature set.
  • Page 121 System Configuration 4-29 WNMP Ping Symbol-AP-5131-MIB System Settings Symbol-CC-WS2000-MIB-2.0 Configuration Known AP Stats Symbol-AP-5131-MIB AP 5131 Access Symbol-CC-WS2000-MIB-2.0 Flash LEDs Symbol-AP-5131-MIB Certificate Mgt Symbol-CC-WS2000-MIB-2.0 Automatic Update Symbol-AP-5131-MIB SNMP Access Symbol-CC-WS2000-MIB-2.0 Configuration SNMP Trap Symbol-CC-WS2000-MIB-2.0 Configuration NTP Server Symbol-CC-WS2000-MIB-2.0 Configuration Logging Configuration Symbol-CC-WS2000-MIB-2.0 Firmware Update Symbol-CC-WS2000-MIB-2.0 Wireless Stats...
  • Page 122 A read-only community string allows a remote device to retrieve information, while a read/ write community string allows a remote device to modify settings. Motorola recommends considering adding a community definition using a site-appropriate name and access level. Set up a read/write definition (at a minimum) to facilitate full access by the access point...
  • Page 123 System Configuration 4-31 2. Configure the SNMP v1/v2 Configuration field (if SNMP v1/v2 is used) to add or delete community definitions, name the community, specify the OID and define community access. Click to create a new SNMP v1/v2c community definition. Delete Select Delete...
  • Page 124 4-32 AP-51xx Access Point Product Reference Guide Use the (Object Identifier) area to specify a setting of All or enter a Custom OID. Select to assign the user access to all OIDs in the MIB. The OID field uses numbers expressed in dot notation. Passwords Select Passwords...
  • Page 125: Configuring Snmp Access Control

    System Configuration 4-33 6. Click Apply to save any changes to the SNMP Access screen. Navigating away from the screen without clicking the Apply button results in all changes to the screen being lost. 7. Click Undo Changes (if necessary) to undo any changes made. Undo Changes reverts the settings displayed on the SNMP Access screen to the last saved configuration.
  • Page 126 4-34 AP-51xx Access Point Product Reference Guide 2. Configure the SNMP Access Control screen to add the IP addresses of those users receiving SNMP access. Access Control List Enter Start IP and End IP addresses (numerical addresses only, no DNS names supported) to specify a range of user that can access the access point SNMP interface.
  • Page 127: Enabling Snmp Traps

    System Configuration 4-35 Click to return to the SNMP Access screen. Click Apply within the SNMP Access screen to save any changes made on the SNMP Access Control screen. Cancel Click Cancel to undo any changes made on the SNMP Access Control screen.
  • Page 128 4-36 AP-51xx Access Point Product Reference Guide 2. Configure the SNMP v1/v2c Trap Configuration field (if SNMP v1/v2c Traps are used) to modify the following: Click to create a new SNMP v1/v2c Trap Configuration entry. Delete Click Delete to remove a selected SNMP v1/v2c Trap Configuration entry.
  • Page 129 System Configuration 4-37 Click to create a new SNMP v1/v2c Trap Configuration entry. SNMP Version Use the SNMP Version drop-down menu to specify v1 or v2. Some SNMP clients support only SNMP v1 traps, while others support SNMP v2 traps and possibly both, verify the correct traps are in use with clients that support them.
  • Page 130: Configuring Specific Snmp Traps

    Use the SNMP Traps screen to enable specific traps on the access point. Motorola recommends defining traps to capture unauthorized devices operating within the access point coverage area. Trap configuration depends on the network machine that receives the generated traps. SNMP v1/v2c and v3 trap configurations function independently.
  • Page 131 System Configuration 4-39 MU associated Generates a trap when an MU becomes associated with one of the access point’s WLANs. MU unassociated Generates a trap when an MU becomes unassociated with (or gets dropped from) one of the access point’s WLANs. MU denied Generates a trap when an MU is denied association to a access association...
  • Page 132 4-40 AP-51xx Access Point Product Reference Guide 4. Configure the Network Traps field to generate traps when the access point’s link status changes or when the AP’s firewall detects a DOS attack. Physical port status Generates a trap whenever the status changes on the access point. change The physical port status changes when a link is lost between the access point and a connected device.
  • Page 133: Configuring Snmp Rf Trap Thresholds

    System Configuration 4-41 6. Refer to the Set All Traps field to use a single location to either enable or disable each trap listed within the SNMP Traps screen. Enable All Select this button to enable each trap defined within the SNMP Traps screen.
  • Page 134 4-42 AP-51xx Access Point Product Reference Guide 2. Configure the RF Trap Thresholds field to define device threshold values for SNMP traps. NOTE Average Bit Speed,% of Non-Unicast, Average Signal, Average Retries,% Dropped and % Undecryptable are not access point statistics. Pkts/s Enter a maximum threshold for the total throughput in Pps (Packets per second).
  • Page 135: Configuring Network Time Protocol (Ntp)

    Enter the minimum number of packets that must pass through the packets required for a device before an SNMP rate trap is sent. Motorola recommends trap to fire using the default setting of 1000 as a minimum setting for the field.
  • Page 136 4-44 AP-51xx Access Point Product Reference Guide Time synchronization is recommended for the access point’s network operations. For sites using Kerberos authentication, time synchronization is required. Use the Date and Time Settings screen to enable NTP and specify the IP addresses and ports of available NTP servers. NOTE The current time is not set accurately when initially connecting to the access point.
  • Page 137 System Configuration 4-45 2. From within the Current Time field, click the Refresh button to update the time since the screen was displayed by the user. The Current Time field displays the current time based on the access point system clock. If NTP is disabled or if there are no servers available, the system time displays the access point uptime starting at 1970-01-01 00:00:00, with the time and date advancing.
  • Page 138 4-46 AP-51xx Access Point Product Reference Guide CAUTION If using the Radius time-based authentication feature to authenticate access point user permissions, ensure has been selected from Time Zone field. If UTC is not selected, time based authentication will not work properly. For information on configuring Radius time-based authentication, see Defining User Access Permissions by Group on page...
  • Page 139: Logging Configuration

    System Configuration 4-47 8. Click Logout to securely exit the access point Access Point applet. A prompt displays confirming the logout before the applet is closed. 4.7 Logging Configuration The access point provides the capability for periodically logging system events that prove useful in assessing the throughput and performance of the access point or troubleshooting problems on the access point managed Local Area Network (LAN).
  • Page 140 4-48 AP-51xx Access Point Product Reference Guide View Log Click View to save a log of events retained on the access point. The system displays a prompt requesting the administrator password before saving the log. After the password has been entered, click Get File to display a dialogue with buttons to...
  • Page 141: Importing/Exporting Configurations

    System Configuration 4-49 4. Click Undo Changes (if necessary) to undo any changes made. Undo Changes reverts the settings displayed on the Logging Configuration screen to the last saved configuration. 5. Click Logout to securely exit the access point Access Point applet. A prompt displays confirming the logout before the applet is closed.
  • Page 142 802.1x EAP Radius shared secret password will remain “symbol,” instead of “motorola” (as now required with the 2.0 baseline). If the shared secret password is not changed to “motorola” there will be a shared secret mis-match resulting in MU authentication failures.
  • Page 143 System Configuration 4-51 2. Configure the FTP and TFTP Import/Export field to import/export configuration settings. Filename Specify the name of the configuration file to be written to the FTP or TFTP server. FTP/TFTP Server IP Enter the numerical (non DNS name) IP address of the destination Address FTP or TFTP server where the configuration file is imported or exported.
  • Page 144 4-52 AP-51xx Access Point Product Reference Guide Username Specify a username to be used when logging in to the FTP server. A username is not required for TFTP server logins. Password Define a password allowing access to the FTP server for the import or export operation.
  • Page 145 System Configuration 4-53 4. Refer to the Status field to assess the completion of the import/export operation. Status After executing an operation (by clicking any of the buttons in the window), check the Status field for a progress indicator and messages about the success or errors in executing the Import/ Export operation.
  • Page 146: Updating Device Firmware

    AP-5131 or AP-5181 on page B-20. 4.9 Updating Device Firmware Motorola periodically releases updated versions of the access point device firmware to the Motorola Web site. If the access point firmware version displayed on the System Settings page (see...
  • Page 147 Using Auto Update, the access point will automatically update itself twice when upgrading. Upgrading to a new access point firmware baseline does not retain the configuration of the previous (lower version) firmware. Motorola recommends users export their 1.0 configuration for backup purposes prior to upgrading.
  • Page 148 4-56 AP-51xx Access Point Product Reference Guide CAUTION Loaded and signed CA certificates will be lost when changing the access point’s firmware version using either the GUI or CLI. After a certificate has been successfully loaded, export it to a secure location to ensure its availability after a firmware update.
  • Page 149 DHCP Options checkboxes to enable/disable automatic firmware and/or configuration file updates. DHCP options are used for out-of-the-box rapid deployment for Motorola wireless products. The following are the two options available on the access point: • Enable Automatic Firmware Update • Enable Automatic Configuration Update Both DHCP options are enabled by default.
  • Page 150 4-58 AP-51xx Access Point Product Reference Guide Enable Automatic Enable this checkbox to allow an automatic firmware update when Firmware Update firmware versions are found to be different between what is running on the access point and the firmware that resides on the server.
  • Page 151 •Username - Specify a username for the FTP server login. • Password - Specify a password for FTP server login. Default is motorola. A blank password is not supported. NOTE Click Apply to save the settings before performing the firmware update.
  • Page 152: Upgrade/Downgrade Considerations

    4-60 AP-51xx Access Point Product Reference Guide FAIL: user interrupted FAIL: no valid interface found FAIL: conflict ip address FAIL: command exchange time out FAIL: invalid subnet number 11. Confirm the access point configuration is the same as it was before the firmware update. If they are not, restore the settings.
  • Page 153 Using Auto Update, the access point will automatically update itself twice when upgrading. Upgrading from v1.0 to v1.1/v1.1.1 retains existing settings. Motorola recommends that users export their 1.0 configuration for backup purposes prior to upgrading. When downloading from v1.1.1/v1.1 to v1.0, all configuration settings are lost...
  • Page 154 4-62 AP-51xx Access Point Product Reference Guide...
  • Page 155: Chapter 5. Network Management

    Network Management Refer to the following for network management configuration activities supported by the access point user interface: • Configuring the LAN Interface • Configuring WAN Settings • Enabling Wireless LANs (WLANs) • Configuring WIPS Server Settings • Configuring Router Settings 5.1 Configuring the LAN Interface The access point has one physical LAN port supporting two unique LAN interfaces.
  • Page 156 AP-51xx Access Point Product Reference Guide For information on locating the access point’s MAC addresses, see Viewing WAN Statistics on page Viewing LAN Statistics on page 7-6. Use the LAN Configuration screen to enable one (or both) of the access point’s LAN interfaces, assign them names, define which LAN is currently active on the access point Ethernet port and assign a timeout value to disable the LAN connection if no data traffic is detected within a defined interval.
  • Page 157 Network Management 2. Configure the LAN Settings field to enable the access point LAN1 and/or LAN2 interface, assign a timeout value, enable 802.1q trunking, configure WLAN mapping and enable 802.1x port authentication. Enable Select the LAN1 and/or LAN2 checkbox to allow the forwarding of data traffic over the specified LAN connection.
  • Page 158 802.1x supplicant to authenticate to a server on the network. If using 802.1x authentication, enter the authentication server user name and password. The default password is “motorola.” For information on enabling and configuring authentication schemes on the access point, see Enabling Authentication and Encryption Schemes on page 6-5.
  • Page 159: Configuring Vlan Support

    Network Management 6. Click Apply to save any changes to the LAN Configuration screen. Navigating away from the screen without clicking the Apply button results in all changes to the screen being lost if the prompts are ignored. 7. Click Undo Changes (if necessary) to undo any changes made.
  • Page 160 AP-51xx Access Point Product Reference Guide information) is sent to the access point. The access point sends this MAC address to a host housing a copy of the Dynamic VLAN database. This database houses the records of MAC addresses and VLAN assignments.
  • Page 161 5. Define a 32 ASCII character maximum VLAN Name. Enter a unique name that identifies members of the VLAN. Motorola recommends selecting the name carefully, as the VLAN name should signify a group of clients with a common set of requirements independent of their physical location.
  • Page 162 By default, the access point forwards untagged traffic with the native VLAN configured for the port. The Native VLAN is VLAN 1 by default. Motorola suggests leaving the Native VLAN set to 1 as other layer 2 devices also have their Native VLAN set to 1.
  • Page 163: Configuring Lan1 And Lan2 Settings

    VLAN to map to the WLAN listed on the left-hand side of the screen. Motorola recommends mapping VLANs strategically in order to keep VLANs tied to the discipline they most closely match. For example, If WLAN1 is comprised of MUs supporting the sales area, then WLAN1 should be mapped to sales if a sales VLAN has been already been created.
  • Page 164 2. Configure the DHCP Configuration field to define the DHCP settings used for the LAN. NOTE Motorola recommends the WAN and LAN ports should not both be configured as DHCP clients. This interface is a Select this button to enable DHCP to set network address DHCP Client information via this LAN1 or LAN2 connection.
  • Page 165 Network Management 5-11 This interface is a Select this button to enable BOOTP to set access point network BOOTP Client address information via this LAN1 or LAN2 connection. When selected, only BOOTP responses are accepted by the access point. If both DHCP and BOOTP services are required, do not select BOOTP Client.
  • Page 166: Configuring Advanced Dhcp Server Settings

    5-12 AP-51xx Access Point Product Reference Guide Secondary DNS Motorola recommends entering the numerical IP address of an Server additional DNS server (if available), used if the primary DNS server goes down. A maximum of two DNS servers can be used.
  • Page 167 Network Management 5-13 To generate a list of client MAC address to IP address mappings for the access point: 1. Select Network Configuration -> -> LAN1 (or LAN2) from the access point menu tree. 2. Click the Advanced DHCP Server button from within the LAN1 LAN2...
  • Page 168: Setting The Type Filter Configuration

    5-14 AP-51xx Access Point Product Reference Guide 6. Click to return to the LAN1 or LAN2 page, where the updated settings within the Advanced DHCP Server screen can be saved by clicking the Apply button. 7. Click Cancel to undo any changes made. Undo Changes reverts the settings displayed to the last saved configuration.
  • Page 169 Network Management 5-15 2. Use the all ethernet types, except drop-down menu to designate whether the Ethernet Types defined for the LAN are allowed or denied for use by the access point. 3. To add an Ethernet type, click the button.
  • Page 170: Configuring Wan Settings

    Packet types supported for the type filtering function include 16-bit DIX Ethernet types as well as Motorola proprietary types. Select an Ethernet type from the drop down menu, or enter the Ethernet type’s hexadecimal value. See your System Administrator if unsure of the implication of adding or omitting a type from the list for either LAN1 or LAN2.
  • Page 171 WAN IP Configuration field to enable the WAN interface, and set network address information for the WAN connection. NOTE Motorola recommends that the WAN and LAN ports should not both be configured as DHCP clients. Enable WAN Interface Select the...
  • Page 172 The ISP or a network administrator provides this address. A DNS server translates a domain name (for example, www.motorola.com) into an IP address that networks can use. Secondary DNS Specify the address of a secondary DNS server if one is used. A...
  • Page 173 Network Management 5-19 More IP Addresses Click the More IP Addresses button to specify additional static IP addresses for the access point. Additional IP addresses are required when users within the WAN need dedicated IP addresses, or when servers need to be accessed (addressed) by the outside world.
  • Page 174 5-20 AP-51xx Access Point Product Reference Guide half duplex Select this option to transmit data to and from the access point, but not at the same time. Using a half duplex transmission, the access point can send data over its WAN port then immediately receive data from the same direction in which the data was transmitted.
  • Page 175: Configuring Network Address Translation (Nat) Settings

    Network Management 5-21 Idle Time (seconds) Specify an idle time in seconds to limit how long the access point’s WAN connection remains active after outbound and inbound traffic is not detected. The Idle Time field is grayed out if Keep-Alive enabled.
  • Page 176 5-22 AP-51xx Access Point Product Reference Guide requests, and minimizes the number of WAN IP addresses needed when a range of local IP addresses is mapped to each WAN IP address. NAT can be applied in one of two ways: •...
  • Page 177: Configuring Port Forwarding

    Network Management 5-23 NAT Type Specify the NAT Type as 1 to 1 to map a WAN IP address to a single host (local) IP address. 1 to 1 mapping is useful when users need dedicated addresses, and for public-facing servers connected to the access point.
  • Page 178 5-24 AP-51xx Access Point Product Reference Guide To configure port forwarding for the access point: 1. Select Network Configuration -> -> from the access point menu tree. 2. Select 1 to 1 1 to Many from the NAT Type drop-down menu. 3.
  • Page 179: Configuring Dynamic Dns

    Network Management 5-25 Start Port and End Port Enter the port or ports used by the port forwarding service. To specify a single port, enter the port number in the Start Port area. To specify a range of ports, use both the Start Port End Port options to enter the port numbers.
  • Page 180 5-26 AP-51xx Access Point Product Reference Guide 2. Select the Enable checkbox to allow domain name information to be updated when the IP address associated with that domain changes. A username, password and hostname must be specified for domain name information to be updated.
  • Page 181: Enabling Wireless Lans (Wlans)

    Network Management 5-27 NOTE DynDNS supports devices directly connected to the Internet. Having VPN enabled, and the DynDNS Server on the other side of the VPN is not supported. 7. Once the DynDNS configuration has been updated, click the Show Update Response button to open a sub-screen displaying the hostname, IP address and any messages received during an update from the DynDNS Server.
  • Page 182 5-28 AP-51xx Access Point Product Reference Guide If a WLAN is defined, that WLAN displays within the Wireless Configuration screen. When the access point is first booted, WLAN1 exists as a default WLAN available immediately for connection. 2. Refer to the information within the Wireless Configuration screen to view the name, ESSID, access point radio designation, VLAN ID and security policy of existing WLANs.
  • Page 183 Network Management 5-29 Radio Radio field displays the name of the access point radio the WLAN is mapped to (either the 802.11a radio or the 802.11b/g radio). To change the radio designation for a specific WLAN, see Creating/Editing Individual WLANs on page 5-30.
  • Page 184: Creating/Editing Individual Wlans

    5-30 AP-51xx Access Point Product Reference Guide 5.3.1 Creating/Editing Individual WLANs If the WLANs displayed within the Wireless Configuration screen do not satisfy your network requirements, you can either create a new WLAN or edit the properties of an existing WLAN. NOTE Before editing the properties of an existing WLAN, ensure it is not being used by an access point radio, or is a WLAN that is needed in its current configuration.
  • Page 185 Network Management 5-31 3. Set the parameters in the Configuration field as required for the WLAN. ESSID Enter the Extended Services Set Identification (ESSID) associated with the WLAN. The WLAN name is auto-generated using the ESSID until changed by the user. The maximum number of characters that can be used for the ESSID is 32.
  • Page 186 5-32 AP-51xx Access Point Product Reference Guide Name Define or revise the name for the WLAN. The name should be logical representation of WLAN coverage area (engineering, marketing etc.). The maximum number of characters that can be used for the name is 31. Available On Use the Available On...
  • Page 187 Network Management 5-33 CAUTION A WLAN cannot be enabled for both mesh and hotspot support at the same time. Only one of these two options can be enabled at one time, as the GUI and CLI will prevent both from being enabled. NOTE If 802.11a is selected as the radio used for the WLAN, the WLAN cannot use a Kerberos supported security policy.
  • Page 188: Configuring Wlan Security Policies

    ESSID. If a hacker tries to find an ESSID via an MU, the ESSID does not display since the ESSID is not in the beacon. Motorola recommends keeping the option enabled to reduce the likelihood of hacking into the WLAN.
  • Page 189 Network Management 5-35 security requirements of the WLAN. Once new policies are defined, they are available within the New WLAN Edit WLAN screens and can be mapped to any WLAN. A single security policy can be used by more than one WLAN if its logical to do so. For example, there may be two or more WLANs within close proximity of each other requiring the same data protection scheme.
  • Page 190: Configuring A Wlan Access Control List (Acl)

    WLANs based on MU interoperability requirements. Motorola recommends using the New MU ACL Policy or Edit MU ACL Policy screens strategically to name and configure ACL policies meeting the requirements of the particular WLANs they may map to.
  • Page 191 Network Management 5-37 2. Click the Create button to configure a new ACL policy, or select a policy and click the Edit button to modify an existing ACL policy. The access point supports a maximum of 16 MU ACL policies.
  • Page 192 5-38 AP-51xx Access Point Product Reference Guide Either the New MU ACL Policy Edit MU ACL Policy screens display. 3. Assign a name to the new or edited ACL policy that represents an inclusion or exclusion policy specific to a particular type of MU traffic you may want to use with a single or group of WLANs.
  • Page 193: Setting The Wlan Quality Of Service (Qos) Policy

    WLANs based on MU interoperability requirements. Motorola recommends using the New QoS Policy and Edit QoS Policy screens strategically to name and configure QoS policies meeting the requirements of the particular WLANs they may to. However, be careful not to name policies after specific WLANs, as individual QoS policies can be used by more than one WLAN.
  • Page 194 5-40 AP-51xx Access Point Product Reference Guide NOTE When the access point is first launched, a single QoS policy (default) is available and mapped to WLAN 1. It is anticipated additional QoS policies will be created as the list of WLANs grows. 2.
  • Page 195 Network Management 5-41 3. Assign a name to the new or edited QoS policy that makes sense to the access point traffic receiving priority. More than one WLAN can use the same QoS policy. 4. Select the Support Voice prioritization checkbox to allow legacy voice prioritization.
  • Page 196 11b voice Use this setting for “Voice-Over-IP” traffic over the 802.11b radio. CAUTION Motorola recommends using the drop-down menu to define the intended radio traffic within the WLAN. Once an option is selected, you do not need to adjust the values for the Access Categories, unless qualified to do so.
  • Page 197 Network Management 5-43 Background Backgrounds traffic is typically of a low priority (file transfers, print jobs ect.). Background traffic typically does not have strict latency (arrival) and throughput requirements. Best Effort Best Effort traffic includes traffic from legacy devices or applications lacking QoS capabilities.
  • Page 198 5-44 AP-51xx Access Point Product Reference Guide TXOPs Time ms TXOP times range from 0.2 ms (background priority) to 3 ms (video priority) in a 802.11a network, and from 1.2 ms to 6 ms in an 802.11b/g network. The TXOP bursting capability greatly enhances the efficiency for high data rate traffic such as streaming video 9.
  • Page 199: Configuring Wlan Hotspot Support

    Network Management 5-45 5.3.1.4 Configuring WLAN Hotspot Support The access point enables hotspot operators to provide user authentication and accounting without a special client application. The access point uses a traditional Internet browser as a secure authentication device. Rather than rely on built-in 802.11security features to control access point association privileges, configure a WLAN with no WEP (an open network).
  • Page 200 5-46 AP-51xx Access Point Product Reference Guide 3. Refer to the HTTP Redirection field to specify how the Login, Welcome, and Fail pages are maintained for this specific WLAN. The pages can be hosted locally or remotely Use Default Files Select the Use Default Files checkbox if the login, welcome and...
  • Page 201 Network Management 5-47 Use External URL Select the Use External URL checkbox to define a set of external URLs for hotspot users to access the login, welcome and fail pages. To create a redirected page, you need to have a TCP termination locally.
  • Page 202 5-48 AP-51xx Access Point Product Reference Guide NOTE The Enable Hotspot User Timeout option is only available if using the access point’s internal Radius Server for user authentication. 6. Click the White List Entries button (within the WhiteList Configuration field) to create a set of allowed destination IP addresses.
  • Page 203 Network Management 5-49 8. Refer to the Radius Configuration field to define a primary and secondary Radius server port and shared secret password. Select mode Use the Select mode drop-down menu to define whether an Internal or External server is to be used for the primary server. Pri Server IP Define the IP address of the primary Radius server.
  • Page 204 5-50 AP-51xx Access Point Product Reference Guide When a client requests a URL from a Web server, the login handler returns an HTTP redirection status code (for example, 301 Moved Permanently), which indicates to the browser it should look for the page at another URL.
  • Page 205: Setting The Wlan's Radio Configuration

    Network Management 5-51 5.3.2 Setting the WLAN’s Radio Configuration Each access point WLAN can have a separate 802.11a or 802.11b/g radio configured and mapped to that WLAN. The first step is to enable the radio. One of two possible radio configuration pages are available on the access point depending on which model SKU is purchased.
  • Page 206 5-52 AP-51xx Access Point Product Reference Guide 2. Enable the radio(s) using the Enable checkbox(es). Refer to RF Band of Operation parameter to ensure you are enabling the correct 802.11a or 802.11b/g radio. After the settings are applied within this Radio Configuration screen, the Radio Status MUs connected values update.
  • Page 207 WLAN (ESS) the client bridge uses to establish a wireless link. The default setting, is (WLAN1). Motorola recommends creating (and naming) a WLAN specifically for mesh networking support to differentiate the Mesh supported WLAN from non-Mesh supported WLANs.
  • Page 208 5-54 AP-51xx Access Point Product Reference Guide Once the settings within the Radio Configuration screen are applied (for an initial deployment), the current number of base bridges visible to the radio displays within the Visible field, and the number of base bridges currently connected to the radio displays within the BBs Connected field.
  • Page 209: Configuring The 802.11A Or 802.11B/G Radio

    Network Management 5-55 For a detailed overview on mesh networking and how to configure the radio for mesh networking support, see Configuring Mesh Networking Support on page 9-6. 8. Click Apply to save any changes to the Radio Configuration screen. Navigating away from the screen without clicking Apply results in all changes to the screens being lost.
  • Page 210 5-56 AP-51xx Access Point Product Reference Guide 2. Configure the Properties field to assign a name and placement designation for the radio. Placement Use the Placement drop-down menu to specify whether the radio is located outdoors or indoors. Default placement depends on the country of operation selected for the access point.
  • Page 211 Network Management 5-57 ERP Protection Extended Rate PHY (ERP) allows 802.11g MUs to interoperate with 802.11b only MUs. ERP Protection is managed automatically by the access point and informs users when 802.11b MUs are present within the access point’s coverage area. The presence of 802.11b MUs within the 802.11g coverage area negatively impacts network performance, so this feature should looked to as an indicator of why network performance has been degraded.
  • Page 212 Clicking Cancel reverts the Set Rates screen to the last saved configuration. Motorola recommends using the default rates unless qualified to understand the performance risks of changing them. The appearance of the Set Rates screen varies depending on the 802.11a or 802.11b/g used, as the dates rates available to the...
  • Page 213 Motorola recommends decreasing the DTIM interval for that specific BSSID. However, decreasing the DTIM interval decreases the battery life on power save stations. The default is 10 for each BSSID. Motorola recommends using the default value unless qualified to understand the performance risks of changing it.
  • Page 214 5-60 AP-51xx Access Point Product Reference Guide 5. Refer to the QBSS Load Element Setting field to optionally allow the access point to communicate channel usage data to associated devices and define the beacon interval used for channel utilization transmissions. The QBSS load represents the percentage of time the channel is in use by the access point and its station count.
  • Page 215 802.11b/g radio, not the QoS policies configured for the WLAN (as created or edited from the Quality of Service Configuration screen). Motorola recommends only advanced users manually set these values. If the type of data-traffic is known, use the drop-down menu to select a 11g-wifi, 11b-wifi, 11g-default,...
  • Page 216 5-62 AP-51xx Access Point Product Reference Guide Defining Primary WLANs allows an administrator to dedicate BSSIDs (4 BSSIDs are available for mapping) to WLANs. From that initial BSSID assignment, Primary WLANs can be defined from within the WLANs assigned to BSSID groups 1 through 4. Each BSSID beacons only on the primary WLAN.
  • Page 217: Configuring Bandwidth Management Settings

    Network Management 5-63 WLAN Lists the WLAN names available to the 802.11a or 802.11b/g radio that can be assigned to a BSSID. BSSID Assign a BSSID value of 1 through 4 to a WLAN in order to map the WLAN to a specific BSSID. BC/MC Cipher A read only field displaying the downgraded BC/MC (Broadcast/ Multicast) cipher for a WLAN based on the BSSID and VLAN ID to...
  • Page 218 5-64 AP-51xx Access Point Product Reference Guide 1. Select Network Configuration -> Wireless -> Bandwidth Management from the access point menu tree. 2. Select either the Radio 1(802.11b/g) Radio 2(802.11a) tab to display the WLANs enabled for the selected radio and their existing configurations. The WLANs displaying for the selected radio were assigned when the WLAN was created or modified.
  • Page 219 Network Management 5-65 Weighted Round- If selected, a weighting (prioritization) scheme (configured within Robin the QoS Configuration screen) is used to define which WLANs access point receive resources first. 4. Configure the Bandwidth Share for Each WLAN field to set a raw weight (for WLANs using the Weighted Round-Robin option) for each WLAN.
  • Page 220: Configuring Wips Server Settings

    5-66 AP-51xx Access Point Product Reference Guide NOTE Though the Rogue AP and Firewall features appear after the Bandwidth Management features within the access point menu tree, they are described in Chapter 6, Configuring Access Point Security on page 6-1, as both items are data protection functions.
  • Page 221 Network Management 5-67 2. Within the WIPS Status field, define whether the access point’s 802.11a or 802.11b/g radio is servicing its coverage area as a typical access point or as a WIPS sensor. Selecting the WLAN checkbox defines the radio as a typical access point. Selecting the WIPS checkbox defines the radio as a WIPS sensor.
  • Page 222: Configuring Router Settings

    5-68 AP-51xx Access Point Product Reference Guide 5.5 Configuring Router Settings The access point router uses routing tables and protocols to forward data packets from one network to another. The access point router manages traffic within the network, and directs traffic from the WAN to destinations on the access point managed LAN.
  • Page 223: Setting The Rip Configuration

    Network Management 5-69 interfaces are those associated with destination IP addresses. To change any of the network address information within the WAN screen, see Configuring WAN Settings on page 5-16. 3. From the Use Default Gateway drop-down menu, select the WAN or either of the two LANs (if enabled) to server as the default gateway to forward data packets from one network to another.
  • Page 224 5-70 AP-51xx Access Point Product Reference Guide RIP v1 RIP version 1 is a mature, stable, and widely supported protocol. It is well suited for use in stub networks and in small autonomous systems that do not have enough redundant paths to warrant the overhead of a more sophisticated protocol.
  • Page 225 Network Management 5-71 3. If RIP v2 or RIP v2 (v1 compat) is the selected RIP type, the RIP v2 Authentication field becomes active. Select the type of authentication to use from the Authentication Type drop-down menu. Available options include: None This option disables the RIP authentication.
  • Page 226 5-72 AP-51xx Access Point Product Reference Guide 5. If the MD5 authentication method is selected, fill in the Key #1 field (Key #2 is optional). Enter any numeric value between 0 and 256 into the MD5 ID area. Enter a string consisting of up to 16 alphanumeric characters in the MD5 Auth Key area.
  • Page 227: Chapter 6. Configuring Access Point Security

    Configuring Access Point Security Security measures for the access point and its WLANs are critical. Use the available access point security options to protect the access point LAN from wireless vulnerabilities, and safeguard the transmission of RF packets between the access point and its associated MUs. WLAN security can be configured on an ESS by ESS basis on the access point.
  • Page 228: Configuring Security Options

    AP-51xx Access Point Product Reference Guide NOTE Security for the access point can be configured in various locations throughout the access point menu structure. This chapter outlines the security options available to the access point, and the menu locations and steps required to configure specific security measures.
  • Page 229: Setting Passwords

    NOTE DNS names are not supported as a valid IP address for the access point. The user is required to enter a numerical IP address. 4. Log in using the “admin” as the default Username and “motorola” as the default Password.
  • Page 230: Resetting The Access Point Password

    6.2.1 Resetting the Access Point Password The access point Command Line Interface (CLI) enables users who forget their password to reset it to the factory default (motorola). From there, a new password can be defined. To reset the password back to its default setting: 1.
  • Page 231: Enabling Authentication And Encryption Schemes

    When the access point re-boots again, the password will return to its default value of “motorola.” You can now access the access point. 6.3 Enabling Authentication and Encryption Schemes To complement the built-in firewall filters on the WAN side of the access point, the WLAN side of the access point supports authentication and encryption schemes.
  • Page 232 Remember, multiple WLANs can share the same security policy, so be careful not to name security policies after specific WLANs or risk defining a WLAN to single policy. Motorola recommends naming the policy after the attributes of the authentication or encryption type...
  • Page 233 Configuring Access Point Security 4. Enable and configure an Authentication option if necessary for the target security policy. Manually Pre-Shared Select this button to disable authentication. This is the default Key / No value for the Authentication field. Authentication Kerberos Select the Kerberos button to display the...
  • Page 234: Configuring Kerberos Authentication

    Once a client and server use Kerberos to prove their identity, they can encrypt all communications to assure privacy and data integrity. Kerberos can only be used on the access point with Motorola 802.11b clients.
  • Page 235 NTP server. NOTE If 802.11a is selected as the radio used for a specific WLAN, the WLAN cannot use a Kerberos supported security policy, as no Motorola 802.11a clients can support Kerberos. To configure Kerberos on the access point: 1.
  • Page 236 Realm Name Specify a realm name that is case-sensitive, for example, MOTOROLA.COM. The realm name is the name domain/realm name of the KDC Server. A realm name functions similarly to a DNS domain name. In theory, the realm name is arbitrary. However, in practice a Kerberos realm is named by uppercasing the DNS domain name that is associated with hosts in the realm.
  • Page 237: Configuring 802.1X Eap Authentication

    Configuring Access Point Security 6-11 Backup KDC Optionally, specify a numerical (non-DNS) IP address and port for a backup KDC. Backup KDCs are referred to as slave servers. The slave server periodically synchronizes its database with the primary (or master) KDC. Remote KDC Optionally, specify a numerical (non-DNS) IP address and port for a remote KDC.
  • Page 238 6-12 AP-51xx Access Point Product Reference Guide 3. Select the 802.1x EAP radio button. 802.1x EAP Settings field displays within the New Security Policy screen. 4. Ensure the Name of the security policy entered suits the intended configuration or function of the policy.
  • Page 239 Configuring Access Point Security 6-13 Radius Server If using an External Radius Server, specify the numerical (non-DNS) Address IP address of a primary Remote Dial-In User Service (Radius) server. Optionally, specify the IP address of a secondary server. The secondary server acts as a failover server if the primary server cannot be contacted.
  • Page 240 6-14 AP-51xx Access Point Product Reference Guide 7. Select the Accounting tab as required to define a timeout period and retry interval Syslog for MUs interoperating with the access point and EAP authentication server. The items within this tab could be enabled or disabled depending on whether Internal or External has been selected from the Radius Server drop-down menu.
  • Page 241 Configuring Access Point Security 6-15 Max. Retries (1-99) Define the maximum number of MU retries to reauthenticate after retries failing to complete the EAP process. Failure to reauthenticate in the specified number of retries results in a terminated connection. The default is 2 retries.
  • Page 242: Configuring Wep Encryption

    6-16 AP-51xx Access Point Product Reference Guide 6.6 Configuring WEP Encryption Wired Equivalent Privacy (WEP) is a security protocol specified in the IEEE Wireless Fidelity (Wi-Fi) standard. WEP is designed to provide a WLAN with a level of security and privacy comparable to that of a wired LAN.
  • Page 243 The pass key can be any alphanumeric string. The access point, other proprietary routers and Motorola MUs use the algorithm to convert an ASCII string to the same hexadecimal number. MUs without Motorola adapters need to use WEP keys manually...
  • Page 244: Configuring Keyguard Encryption

    6.7 Configuring KeyGuard Encryption KeyGuard is a proprietary encryption method developed by Motorola. KeyGuard is Motorola's enhancement to WEP encryption, and was developed before the finalization of WPA-TKIP. This encryption implementation is based on the IEEE Wireless Fidelity (Wi-Fi) standard, 802.11i.
  • Page 245 Configuring Access Point Security 6-19 1. Select Network Configuration -> Wireless -> Security from the access point menu tree. If security policies supporting KeyGuard exist, they appear within the Security Configuration screen. These existing policies can be used as is, or their properties edited by clicking the Edit button.
  • Page 246 The pass key can be any alphanumeric string. The other proprietary routers, and Motorola MUs use the algorithm to convert an ASCII string to the same hexadecimal number. MUs without Motorola adapters need to use WEP keys manually configured as hexadecimal numbers.
  • Page 247: Configuring Wpa/Wpa2 Using Tkip

    Configuring Access Point Security 6-21 6.8 Configuring WPA/WPA2 Using TKIP Wi-Fi Protected Access (WPA) is a robust encryption scheme specified in the IEEE Wireless Fidelity (Wi-Fi) standard, 802.11i. WPA provides more sophisticated data encryption than WEP. WPA is designed for corporate networks and small-business environments where more wireless traffic allows quicker discovery of encryption keys by an unauthorized person.
  • Page 248 6-22 AP-51xx Access Point Product Reference Guide 5. Configure the Key Rotation Settings area as needed to broadcast encryption key changes to MUs and define the broadcast interval. Broadcast Key Select the Broadcast Key Rotation checkbox to enable or disable Rotation broadcast key rotation.
  • Page 249 Configuring Access Point Security 6-23 6. Configure the Key Settings area as needed to set an ASCII Passphrase and key values. ASCII Passphrase To use an ASCII passphrase (and not a hexadecimal value), select the checkbox and enter an alphanumeric string of 8 to 63 characters.
  • Page 250: Configuring Wpa2-Ccmp (802.11I)

    6-24 AP-51xx Access Point Product Reference Guide 9. Click the Apply button to save any changes made within this New Security Policy screen. 10. Click the Cancel button to undo any changes made within the WPA/TKIP Settings field and return to the WLAN screen.
  • Page 251 Configuring Access Point Security 6-25 5. Configure the Key Rotation Settings field as required to set Broadcast Key Rotation and the update interval. Broadcast Key Select the Broadcast Key Rotation checkbox to enable or disable Rotation broadcast key rotation. When enabled, the key indices used for encrypting/decrypting broadcast traffic will be alternatively rotated on every interval specified in the Broadcast Key Rotation Interval.
  • Page 252 WPA-TKIP and WPA2-TKIP but do not support WPA2-CCMP. Motorola recommends enabling this feature if WPA-TKIP or WPA2-TKIP supported MUs operate within a WLAN populated by WPA2-CCMP enabled clients. 8. Configure the Fast Roaming (802.1x only)
  • Page 253: Configuring Firewall Settings

    Configuring Access Point Security 6-27 NOTE PMK key caching is enabled internally by default when 802.1x EAP authentication is enabled. 9. Click the Apply button to save any changes made within this New Security Policy screen. 10. Click the Cancel button to undo any changes made within the WPA2/CCMP Settings field and return to the WLAN...
  • Page 254 6-28 AP-51xx Access Point Product Reference Guide 2. Refer to the Global Firewall Disable field to enable or disable the access point firewall. Disable Firewall Select the Disable Firewall checkbox to disable all firewall functions on the access point. This includes firewall filters, NAT, VP, content filtering, and subnet access.
  • Page 255 Configuring Access Point Security 6-29 4. Refer to the Configurable Firewall Filters field to set the following firewall filters: SYN Flood Attack A SYN flood attack requests a connection and then fails to Check promptly acknowledge a destination host's response, leaving the destination host vulnerable to a flood of connection requests.
  • Page 256: Configuring Lan To Wan Access

    6-30 AP-51xx Access Point Product Reference Guide 6.10.1 Configuring LAN to WAN Access The access point LAN can be configured to communicate with the WAN side of the access point. Use Subnet Access screen to control access from the LAN1 (or LAN2) interfaces to the WAN interface.
  • Page 257 Configuring Access Point Security 6-31 3. Configure the Rules field as required to allow or deny access to selected (enabled) protocols. Allow or Deny all Use the drop-down menu to select either Allow Deny. protocols, except selected setting applies to all protocols except those with enabled checkboxes and any traffic that is added to the table.
  • Page 258 6-32 AP-51xx Access Point Product Reference Guide Pre configured Rules The following protocols are preconfigured with the access point. To enable a protocol, check the box next to the protocol name. • HTTP - Hypertext Transfer Protocol is the protocol for transferring files on the Web.
  • Page 259: Available Protocols

    Configuring Access Point Security 6-33 End Port Enter the ending port number for a port range. If the protocol uses a single port, leave the field blank. A new entry might use Web Traffic for its name, TCP for its protocol, and 80 for its port number. 4.
  • Page 260: Configuring Advanced Subnet Access

    6-34 AP-51xx Access Point Product Reference Guide between two end points. ESP can also be used in tunnel mode, providing security like that of a Virtual Private Network (VPN). • GRE - General Routing Encapsulation supports VPNs across the Internet. GRE is a mechanism for encapsulating network layer protocols over any other network layer protocol.
  • Page 261 Configuring Access Point Security 6-35 2. Configure the Settings field as needed to override the settings in the Subnet Access screen and import firewall rules into the Advanced Subnet Access screen. Override Subnet Select this checkbox to enable advanced subnet access rules and Access settings disable existing subnet access rules, port forwarding, and 1 to many mappings from the system.
  • Page 262: Configuring Vpn Tunnels

    6-36 AP-51xx Access Point Product Reference Guide Source IP Source IP range defines the origin address or address range for the firewall rule. To configure the Source IP range, click on the field. A new window displays for entering the IP address and range. Destination IP Destination IP range determines the target address or...
  • Page 263 Configuring Access Point Security 6-37 Use the screen to add and remove VPN tunnels. To configure an existing VPN tunnel, select it from the list in the VPN Tunnels field. The selected tunnel’s configuration displays in a VPN Tunnel Config field.
  • Page 264 6-38 AP-51xx Access Point Product Reference Guide Tunnel Name Tunnel Name column lists the name of each VPN tunnel on access point Remote Subnet Remote Subnet column lists the remote subnet for each tunnel. The remote subnet is the subnet the remote network uses for connection.
  • Page 265 Configuring Access Point Security 6-39 Interface name Use the drop-down menu to specify the LAN1, LAN2 or WAN connection used for routing VPN traffic. Remember, only one LAN connection can be active on the access point Ethernet port at a time.
  • Page 266: Configuring Manual Key Settings

    6-40 AP-51xx Access Point Product Reference Guide IKE Settings After selecting Auto (IKE) Key Exchange, click the IKE Settings button to open a screen where IKE specific settings can be configured. For more information, see Configuring IKE Key Settings on page 6-47.
  • Page 267 Configuring Access Point Security 6-41 3. Configure the Manual Key Settings screen to modify the following: NOTE When entering Inbound or Outbound encryption or authentication keys, an error message could display stating the keys provided are “weak”. Some WEP attack tools invoke a dictionary to hack WEP keys based on commonly used words.
  • Page 268 6-42 AP-51xx Access Point Product Reference Guide AH Authentication AH provides data authentication and anti-replay services for the VPN tunnel. Select the required authentication method from the drop-down menu: • None - Disables AH authentication. The rest of the fields are not active.
  • Page 269 Configuring Access Point Security 6-43 ESP Encryption Select the encryption and authentication algorithms for the VPN Algorithm tunnel using the drop-down menu. • DES - Uses the DES encryption algorithm requiring 64-bit (16-character hexadecimal) keys. • 3DES - Uses the 3DES encryption algorithm requiring 192-bit (48-character hexadecimal) keys.
  • Page 270: Configuring Auto Key Settings

    6-44 AP-51xx Access Point Product Reference Guide Inbound SPI (Hex) Define an (up to) six-character (maximum) hexadecimal value to identify the inbound security association created by the encryption algorithm. The value must match the corresponding outbound SPI value configured on the remote security gateway. Outbound SPI (Hex) Enter an (up to) six-character (maximum) hexadecimal value to identify the outbound security association created by the...
  • Page 271 Configuring Access Point Security 6-45 3. Configure the Auto Key Settings screen to modify the following: Use Perfect Forward Forward secrecy is a key-establishment protocol guaranteeing the Secrecy discovery of a session key or long-term private key does not compromise the keys of other sessions. Select to enable Perfect Forward Secrecy.
  • Page 272 6-46 AP-51xx Access Point Product Reference Guide ESP Type ESP provides packet encryption, optional data authentication and anti-replay services for the VPN tunnel. Use the drop-down menu to select the ESP type. • None - Disables ESP. The rest of the fields are not active. •...
  • Page 273: Configuring Ike Key Settings

    Configuring Access Point Security 6-47 6.11.3 Configuring IKE Key Settings The Internet Key Exchange (IKE) is an IPsec standard protocol used to ensure security for VPN negotiation and remote host or network access. IKE provides an automatic means of negotiation and authentication for communication between two or more parties.
  • Page 274 • FQDN - Select FQDN if the remote ID type is a fully qualified domain name (such as sj.motorola.com). The setting for this field does not have to be fully qualified, however it must match the setting for the Certificate Authority.
  • Page 275 Configuring Access Point Security 6-49 IKE Authentication Select the appropriate IKE authentication mode: Mode • Pre-Shared Key (PSK) - Specify an authenticating algorithm and passcode used during authentication. • RSA Certificates - Select this option to use RSA certificates for authentication purposes. See the CA Certificates and Self certificates screens to create and import certificates into the system.
  • Page 276: Viewing Vpn Status

    6-50 AP-51xx Access Point Product Reference Guide Diffie Hellman Group Select a Diffie-Hellman Group to use. The Diffie-Hellman key agreement protocol allows two users to exchange a secret key over an insecure medium without any prior secrets. Two algorithms exist, 768-bit and 1024-bit. Select one of the following options: •...
  • Page 277 Configuring Access Point Security 6-51 2. Reference the Security Associations field to view the following: Tunnel Name Tunnel Name column lists the names of all the tunnels configured on the access point. For information on configuring a tunnel, see Configuring VPN Tunnels on page 6-36.
  • Page 278: Configuring Content Filtering Settings

    6-52 AP-51xx Access Point Product Reference Guide Life Time Use the Life Time column to view the lifetime associated with a particular Security Association (SA). Each SA has a finite lifetime defined. When the lifetime expires, the SA can no longer be used to protect data traffic.
  • Page 279 Configuring Access Point Security 6-53 To configure content filtering for the access point: 1. Select Network Configuration -> -> Content Filtering from the access point menu tree. 2. Configure the HTTP field to configure block Web proxies and URL extensions. Block Outbound HTTP HyperText Transport Protocol (HTTP) is the protocol used to transfer information to and from Web sites.
  • Page 280 6-54 AP-51xx Access Point Product Reference Guide Block Outbound URL Enter a URL extension or file name per line in the format of Extensions filename.ext. An asterisk (*) can be used as a wildcard in place of the filename to block all files with a specific extension. 3.
  • Page 281: Configuring Rogue Ap Detection

    It is possible that not all of the devices identified by the access point are operating legitimately within the access point’s radio coverage area. A rogue AP is a device located nearby an authorized Motorola access point but recognized as having properties rendering its operation illegal and threatening to the access point and the LAN.
  • Page 282 6-56 AP-51xx Access Point Product Reference Guide The rogue detection interval is used in conjunction with Motorola MUs that identify themselves as rogue detection capable to the access point. The detection interval defines how often the access point requests these MUs to scan for a rogue AP. A shorter interval can affect the performance of the MU, but it will also decrease the time it takes for the access point to scan for a rogue AP.
  • Page 283 3. Use the field to restrict Motorola AP’s from Rogue AP detection and create Allowed AP List a list of device MAC addresses and ESSID’s approved for interoperability with the access point.
  • Page 284 6-58 AP-51xx Access Point Product Reference Guide Click to display a single set of editable MAC address and ESS address values. Del (Delete) Click the Delete button to remove the highlighted line from the Rule Management field. The MAC and ESS address information previously defined is no longer applicable unless the previous configuration is restored.
  • Page 285: Moving Rogue Aps To The Allowed Ap List

    Configuring Access Point Security 6-59 6.13.1 Moving Rogue APs to the Allowed AP List Active APs screen enables the user to view the list of detected rogue APs and, if necessary, select and move an AP into a list of allowed devices. This is helpful when the settings defined within Rogue AP Detection screen inadvertently detect and define a device as a rogue AP.
  • Page 286: Displaying Rogue Ap Details

    7. To remove the Rogue AP entries displayed within the e Rogue APs field, click the Clear Rogue AP List button. Motorola only recommends clearing the list of Rogue APs when the devices displaying within the list do not represent a threat to the access point managed network. 8. Click Apply to save any changes to the Active APs screen.
  • Page 287 BSSID/MAC Displays the MAC address of the rogue AP. This information could be useful if the MAC address is determined to be a Motorola MAC address and the device is interpreted as non-hostile and the device should be defined as an allowed AP.
  • Page 288: Using Mus To Detect Rogue Devices

    6-62 AP-51xx Access Point Product Reference Guide Detection Method Displays the RF Scan by RF On-Channel Detection Scan by Detector Radio method selected from the Rogue AP screen to detect rogue devices. For information on detection methods, see Configuring Rogue AP Detection on page 6-55.
  • Page 289 Configuring Access Point Security 6-63 2. Highlight an MU from within the Rogue AP enabled MUs field and click the scan button. The target MU begins scanning for rogue devices using the detection parameters defined within the Rogue AP Detection screen. To modify the detection parameters, see Configuring Rogue AP Detection on page 6-55.
  • Page 290: Configuring User Authentication

    6-64 AP-51xx Access Point Product Reference Guide 5. Highlight a different MU from the Rogue AP enabled MUs field as needed to scan for additional rogue APs. 6. Click Logout to return to the Rogue AP Detection screen. 6.14 Configuring User Authentication The access point can work with external Radius and LDAP Servers (AAA Servers) to provide user database information and user authentication.
  • Page 291 Configuring Access Point Security 6-65 2. From within the Data Source Configuration field, use the Data Source drop-down menu to select the data source for the Radius server. Local An internal user database serves as the data source. Use the User Database screen to enter the user data.
  • Page 292 6-66 AP-51xx Access Point Product Reference Guide Default Specify a PEAP and/or TTLS Authentication Type for EAP to use Authentication Type from the drop-down menu to the right of each checkbox item. PEAP options include: • GTC - EAP Generic Token Card (GTC) is a challenge handshake authentication protocol using a hardware token card to provide the response string.
  • Page 293: Configuring Ldap Authentication

    Configuring Access Point Security 6-67 WARNING! If you have imported a Server or CA certificate, the certificate will not be saved when updating the access point’s firmware. Export your certificates before upgrading the access point’s firmware. From the access point CLI, use the command to admin(system.cmgr)>...
  • Page 294 Time Based Rule restriction feature. NOTE The LDAP screen displays with unfamiliar alphanumeric characters (if new to LDAP configuration). Motorola recommends only qualified administrators change the default values within the LDAP screen. 2. Enter the appropriate information within the LDAP Configuration field to allow the access point to interoperate with the LDAP server.
  • Page 295 Configuring Access Point Security 6-69 LDAP Server IP Enter the IP address of the external LDAP server acting as the data source for the Radius server. The LDAP server must be accessible from the WAN port or from the access point’s active subnet. Port Enter the TCP/IP port number for the LDAP server acting as a data source for the Radius.
  • Page 296: Configuring A Proxy Radius Server

    6-70 AP-51xx Access Point Product Reference Guide 6.14.3 Configuring a Proxy Radius Server The access point has the capability to proxy authentication requests to a remote Radius server based on the suffix of the user ID (such as myisp.com or company.com). The access point supports up to 10 proxy servers.
  • Page 297 Configuring Access Point Security 6-71 2. Refer to the Proxy Configuration field to define the proxy server’s retry count and timeout values. Retry Count Enter a value between 3 and 6 to indicate the number of times the access point attempts to reach a proxy server before giving up. Timeout Enter a value between 5 and 10 to indicate the number of elapsed seconds causing the access point to time out on a request to a...
  • Page 298: Managing The Local User Database

    6-72 AP-51xx Access Point Product Reference Guide Port Enter the TCP/IP port number for the Radius server acting as a proxy server. The default port is 1812. Shared Secret Set a shared secret used for each suffix used for authentication with the Radius proxy server.
  • Page 299 Configuring Access Point Security 6-73 Refer to the Groups field for a list of all groups in the local Radius database. The groups are listed in the order added. Although groups can be added and deleted, there is no capability to edit a group name.
  • Page 300: Mapping Users To Groups

    6-74 AP-51xx Access Point Product Reference Guide 7. Click the List of Groups cell. A new screen displays enabling you to associate groups with the user. For more information on mapping groups with a user, see Mapping Users to Groups on page 6-74.
  • Page 301 Configuring Access Point Security 6-75 3. To add the user to a group, select the group in the Available list (on the right) and click the <-Add button. Assigned users will display within the Assigned table. Map one or more groups as needed for group authentication access for this particular user.
  • Page 302: Defining User Access Permissions By Group

    6-76 AP-51xx Access Point Product Reference Guide 6.14.5 Defining User Access Permissions by Group An external AAA server maintains the users and groups database used by the access point for access permissions. Various kinds of access policies can be applied to each group. With this latest 2.0 version access point firmware, individual groups can be associated with their own time-based access policy.
  • Page 303 Configuring Access Point Security 6-77 The Access Policy screen displays the following fields: Groups Groups field displays the names of those existing groups that can have access intervals applied to them. Click the Edit button to display a screen designed to create access intervals for specific days and hours.
  • Page 304: Editing Group Access Permissions

    6-78 AP-51xx Access Point Product Reference Guide Timeline Displays a bar graph of the selected group’s access privileges. Access times are displayed in a grid format with the the days of the week and hours users access is available displayed in green. Revise the selected group’s privileges as needed.
  • Page 305 Configuring Access Point Security 6-79 4. Define up to 10 access policies for the selected group within the Time Based Access Policy field. Use the drop-down menus on the left-hand side of the screen to define the day of the week for which each policy applies.
  • Page 306 6-80 AP-51xx Access Point Product Reference Guide NOTE Groups have a strict start and end time (as defined using the Edit Access Policy screen). Only during this period of time can authentication requests from users be honored (with no overlaps). Any authentication request outside of this defined interval is denied regardless of whether a user’s credentials match or not.
  • Page 307: Chapter 7. Monitoring Statistics

    Monitoring Statistics The access point has functionality to display robust transmit and receive statistics for its WAN and LAN port. Wireless Local Area Network (WLAN) stats can also be displayed collectively for each enabled WLAN as well as individually for up to 16 specific WLANs. Transmit and receive statistics can also be displayed for the access point’s 802.11a and 802.11b/g radios.
  • Page 308: Viewing Wan Statistics

    AP-51xx Access Point Product Reference Guide See the following sections for more details on viewing statistics for the access point: • Viewing WAN Statistics • Viewing LAN Statistics • Viewing Wireless Statistics • Viewing Radio Statistics Summary • Viewing MU Statistics Summary •...
  • Page 309 Monitoring Statistics 2. Refer to the Information field to reference the following access point WAN data: Status Status field displays Enabled if the WAN interface is enabled on the screen. If the WAN interface is disabled on the WAN screen, the WAN Stats screen displays no connection information and statistics.
  • Page 310 AP-51xx Access Point Product Reference Guide Mask Mask field displays the subnet mask number for the access point’s WAN connection. This value is set on the screen. Refer to Configuring WAN Settings on page 5-16 to change the subnet mask. Link Link parameter displays...
  • Page 311 Monitoring Statistics RX Frame RX Frame field displays the number of TCP/IP data frame errors received. 4. Refer to the Transmitted field to reference data received over the access point WAN port. TX Packets TX packets are data packets sent over the WAN connection. The displayed number is a cumulative total since the WAN was last enabled or the access point was last restarted.
  • Page 312: Viewing Lan Statistics

    AP-51xx Access Point Product Reference Guide 7.2 Viewing LAN Statistics Use the LAN Stats screen to monitor the activity of the access point’s LAN1 or LAN2 connection. The Information field of the LAN Stats screen displays network traffic information as monitored over the access point LAN1 or LAN2 port.
  • Page 313 Monitoring Statistics Status Displays whether this particular LAN has been enabled as viable subnet from within the LAN Configuration screen. IP Address The Internet Protocol (IP) addresses for the access point LAN port. Network Mask The first two sets of numbers specify the network domain, the next set specifies the subset of hosts within a larger network.
  • Page 314 AP-51xx Access Point Product Reference Guide RX Errors RX errors include dropped data packets, buffer overruns, and frame errors on inbound traffic. The number of RX errors is a total of RX Dropped, RX Overruns and RX Carrier errors. Use this information to determine performance quality of the current LAN connection.
  • Page 315: Viewing A Lan's Stp Statistics

    Monitoring Statistics TX Carrier TX Carrier field displays the number of TCP/IP data carrier errors. 5. Click the Clear LAN Stats button to reset each of the data collection counters to zero in order to begin new data collections. The RX/TX Packets and RX/TX Bytes totals remain at their present values and are not cleared.
  • Page 316 7-10 AP-51xx Access Point Product Reference Guide 2. Refer to the Spanning Tree Info field to for details on spanning tree state, and root access point designation. Spanning Tree State Displays whether the spanning tree state is currently enabled or disabled.
  • Page 317 Monitoring Statistics 7-11 Root Path Cost Bridge message traffic contains information identifying the root bridge and the sending bridge. The root path cost represents the distance (cost) from the sending bridge to the root bridge. Bridge Max Msg. Age The Max Msg Age measures the age of received protocol information recorded for a port, and to ensure the information is discarded when it exceeds the value set for the Maximum Message age timer.
  • Page 318: Viewing Wireless Statistics

    7-12 AP-51xx Access Point Product Reference Guide Designated Bridge There is only one root bridge within each mesh network. All other bridges are designated bridges that look to the root bridge for several mesh network timeout values. For information on root and bridge designations, see Setting the LAN Configuration for Mesh Networking Support on page...
  • Page 319 Monitoring Statistics 7-13 2. Refer to the WLAN Summary field to reference high-level data for each enabled WLAN. Name Displays the names of all the enabled WLANs on the access point. For information on enabling a WLAN, see Enabling Wireless LANs (WLANs) on page 5-27.
  • Page 320 7-14 AP-51xx Access Point Product Reference Guide % NU Displays a percentage of the total packets for each active WLAN that are non-unicast. Non-unicast packets include broadcast and multicast packets. Retries Displays the average number of retries per packet. An excessive number could indicate possible network or hardware problems.
  • Page 321: Viewing Wlan Statistics

    Monitoring Statistics 7-15 7.3.1 Viewing WLAN Statistics Use the WLAN Stats screen to view detailed statistics for individual WLANs.The WLAN Stats screen is separated into four fields; Information, Traffic, RF Status, and Errors. The Information field displays basic information such as number of associated Mobile Units, ESSID and security information.
  • Page 322 7-16 AP-51xx Access Point Product Reference Guide ESSID Displays the Extended Service Set ID (ESSID) for the target WLAN. Radio/s Displays the name of the 802.11a or 802.11b/g radio the target WLAN is using for access point transmissions. Authentication Type Displays the authentication type (802.1x EAP or Kerberos) defined for the WLAN.
  • Page 323 Monitoring Statistics 7-17 Avg. Bit Speed Total column displays the average bit speed in Mbps for a given time period on the selected WLAN.This includes all packets that are sent and received. The number in black represents statistics for the last 30 seconds and the number in blue represents statistics for the last hour.
  • Page 324: Viewing Radio Statistics Summary

    7-18 AP-51xx Access Point Product Reference Guide Dropped Packets Displays the percentage of packets which the AP gave up on for all MUs associated with the selected WLAN. The number in black represents this statistic for the last 30 seconds and the number in blue represents this statistic for the last hour.
  • Page 325 Monitoring Statistics 7-19 2. Refer to the Radio Summary field to reference access point radio information. Type Displays the type of radio (either 802.11a or 802.11b/g) currently deployed by the access point. To configure the radio type, see Setting the WLAN’s Radio Configuration on page 5-51.
  • Page 326: Viewing Radio Statistics

    7-20 AP-51xx Access Point Product Reference Guide % NU Displays the percentage of the total packets that are non-unicast. Non-unicast packets include broadcast and multicast packets. Retries Displays the average number of retries per packet on each radio. A high number could indicate network or hardware problems. 3.
  • Page 327 Monitoring Statistics 7-21 2. Refer to the Information field to view the access point 802.11a or 802.11b/g radio’s MAC address, placement and transmission information. HW Address The Media Access Control (MAC) address of the access point housing the 802.11a radio. The MAC address is set at the factory and can be found on the bottom of the access point.
  • Page 328 7-22 AP-51xx Access Point Product Reference Guide Placement Lists whether the access point radio is indoors or outdoors. To change the placement setting, see Configuring the 802.11a or 802.11b/g Radio on page 5-55. Current Channel Indicates the channel for communications between the access point radio and its associated MUs.
  • Page 329 Monitoring Statistics 7-23 4. Refer to the RF Status field to view the following MU signal, noise and performance information for the target access point 802.11a or 802.11b/g radio. Avg MU Signal Displays the average RF signal strength in dBm for all MUs associated with the radio.
  • Page 330: Retry Histogram

    7-24 AP-51xx Access Point Product Reference Guide 7. Click the Logout button to securely exit the Access Point applet. 7.4.1.1 Retry Histogram Refer to the Retry Histrogram screen for an overview of the retries transmitted by an access point radio and whether those retries contained any data packets. Use this information in combination with the error fields within a Radio Stats screen to assess overall radio performance.
  • Page 331: Viewing Mu Statistics Summary

    Monitoring Statistics 7-25 number of packets requiring 1 retry, 2 retries etc. Use this information to assess whether an abundance of retries warrants reconfiguring the access point radio to achieve better performance. 2. Click Apply to save any changes to the Radio Histogram screen. Navigating away from the screen without clicking Apply results in changes to the screens being lost.
  • Page 332 7-26 AP-51xx Access Point Product Reference Guide 2. Refer to the MU List field to reference associated MU address, throughput and retry information. IP Address Displays the IP address of each of the associated MU. MAC Address Displays the MAC address of each of the associated MU. WLAN Displays the WLAN name each MU is interoperating with.
  • Page 333: Viewing Mu Details

    7-30 NOTE An echo test initiated from the access point MU Stats Summary screen uses WNMP pings. Therefore, target clients that are not Motorola MUs are unable to respond to the echo test. 5. Click the MU Authentication Statistics button to display a screen with detailed authentication statistics for the an MU.
  • Page 334 Save Protocol mode. In PSP, the MU runs enough power to check for beacons and is otherwise inactive. CAM indicates the MU is continuously aware of all radio traffic. Motorola recommends CAM for those MUs transmitting with the AP frequently and for periods of time of two hours.
  • Page 335 Monitoring Statistics 7-29 Throughput Total column displays the average total packets per second crossing the selected MU. The column displays the average total packets per second received on the MU. The column displays the average total packets per second sent on the MU. The number in black represents throughput for the last 30 seconds, the number in blue represents throughput for the last hour.
  • Page 336: Pinging Individual Mus

    NOTE An echo test initiated from the access point MU Stats Summary screen uses WNMP pings. Therefore, target clients that are not Motorola MUs are unable to respond to the echo test. To ping a specific MU to assess its connection with an access point: 1.
  • Page 337: Mu Authentication Statistics

    Monitoring Statistics 7-31 4. Click the Ping button to begin transmitting ping packets to the station address specified. Refer to the Number of Responses parameter to assess the number of responses from the target MU versus the number of pings transmitted by the access point. Use the ratio of packets sent versus packets received to assess the link quality between MU and the access point Click the...
  • Page 338: Viewing The Mesh Statistics Summary

    7-32 AP-51xx Access Point Product Reference Guide 7.6 Viewing the Mesh Statistics Summary The access point has the capability of detecting and displaying the properties of other access points in mesh network (either base bridges or client bridges) mode. This information is used to create a list of known wireless bridges.
  • Page 339: Viewing Known Access Point Statistics

    7.7 Viewing Known Access Point Statistics The access point has the capability of detecting and displaying the properties of other Motorola access points located within its coverage area. Detected access point’s transmit a WNMP message indicating their channel, IP address, firmware version, etc.
  • Page 340 7-34 AP-51xx Access Point Product Reference Guide Known AP Statistics screen displays the following information: IP Address The network-assigned Internet Protocol address of the located AP. MAC Address The unique 48-bit, hard-coded Media Access Control address, known as the devices station identifier. This value is hard coded at the factory by the manufacturer and cannot be changed.
  • Page 341 Monitoring Statistics 7-35 The Known AP Details screen displays the target AP’s MAC address, IP address, radio channel, number of associated MUs, packet throughput per second, radio type(s), model, firmware version, ESS and client bridges currently connected to the AP radio. Use this information to determine whether this AP provides better MU association support than the locating access point or warrants consideration as a member of a different mesh network.
  • Page 342 NOTE A ping test initiated from the access point Known AP Statistics screen uses WNMP pings. Therefore, target devices that are not Motorola access points are unable to respond to the ping test. 5. Click the Send Cfg to APs button to send the your access point’s configuration to other...
  • Page 343: Chapter 8. Cli Reference

    CLI Reference The access point Command Line Interface (CLI) is accessed through the serial port or a Telnet session. The access point CLI follows the same conventions as the Web-based user interface. The CLI does, however, provide an “escape sequence” to provide diagnostics for problem identification and resolution.
  • Page 344: Connecting To The Cli

    If this is your first time logging into the access point, you are unable to access any of the access point’s commands until the country code is set. A new password will also need to be created.
  • Page 345: Admin And Common Commands

    8.2 Admin and Common Commands AP51xx>admin> Description: Displays admin configuration options. The items available under this command are shown below. Syntax: help Displays general user interface help. passwd Changes the admin password. summary Shows a system summary. network Goes to the network submenu system Goes to the system submenu.
  • Page 346 AP-51xx Access Point Product Reference Guide AP51xx>admin>help Description: Displays general CLI user interface help. Syntax: help Displays command line help using combinations of function keys for navigation. Example: admin>help : display command help - Eg. ?, show ?, s? * Restriction of “?”: : “?”...
  • Page 347 AP51xx>admin>passwd Description: Changes the password for the admin login. Syntax: passwd Changes the admin password for access point access. This requires typing the old admin password and entering a new password and confirming it. Passwords can be up to 11 characters. The access point CLI treats the following as invalid characters: "...
  • Page 348 AP-51xx Access Point Product Reference Guide AP51xx>admin>summary Description: Displays the access point’s system summary. Syntax: summary Displays a summary of high-level characteristics and settings for the WAN, LAN and WLAN. Example: admin>summary AP-51xx firmware version 2.1.0.0-xxx country code serial number 00A0F8716A74 WLAN 1: WLAN Name...
  • Page 349 AP51xx>admin>.. Description: Displays the parent menu of the current menu. This command appears in all of the submenus under admin. In each case, it has the same function, to move up one level in the directory structure. Example: admin(network.lan)>.. admin(network)>...
  • Page 350 AP-51xx Access Point Product Reference Guide AP51xx>admin> / Description: Displays the root menu, that is, the top-level CLI menu. This command appears in all of the submenus under admin. In each case, it has the same function, to move up to the top level in the directory structure.
  • Page 351 AP51xx>admin>save Description: Saves the configuration to system flash. The save command appears in all of the submenus under admin. In each case, it has the same function, to save the current configuration. Syntax: save Saves configuration settings. The save command works at all levels of the CLI. The save command must be issued before leaving the CLI for updated settings to be retained.
  • Page 352 8-10 AP-51xx Access Point Product Reference Guide AP51xx>admin>quit Description: Exits the command line interface session and terminates the session. The quit command appears in all of the submenus under admin. In each case, it has the same function, to exit out of the CLI. Once the quit command is executed, the login prompt displays again.
  • Page 353: Network Commands

    8-11 8.3 Network Commands AP51xx>admin(network)> Description: Displays the network submenu. The items available under this command are shown below. Goes to the LAN submenu. Goes to the WAN submenu. wireless Goes to the Wireless Configuration submenu. firewall Goes to the firewall submenu. router Goes to the router submenu.
  • Page 354: Network Lan Commands

    8-12 AP-51xx Access Point Product Reference Guide 8.3.1 Network LAN Commands AP51xx>admin(network.lan)> Description: Displays the LAN submenu. The items available under this command are shown below. show Shows current access point LAN parameters. Sets LAN parameters. bridge Goes to the mesh configuration submenu. wlan-mapping Goes to the WLAN/Lan/Vlan Mapping submenu.
  • Page 355 8-13 AP51xx>admin(network.lan)> show Description: Displays the access point LAN settings. Syntax: show Shows the settings for the access point LAN1 and LAN2 interfaces. Example: admin(network.lan)>show LAN On Ethernet Port : LAN1 LAN Ethernet Timeout : disable 802.1x Port Authentication: Username : admin Password : ********...
  • Page 356 8-14 AP-51xx Access Point Product Reference Guide Network Mask : 255.255.255.255 Default Gateway : 192.168.1.1 Domain Name Primary DNS Server : 192.168.0.2 Secondary DNS Server : 192.168.0.3 WINS Server : 192.168.0.255 admin(network.lan)> For information on displaying LAN information using the applet (GUI), see Configuring the LAN Interface on page 5-1.
  • Page 357 8-15 AP51xx>admin(network.lan)> set Description: Sets the LAN parameters for the LAN port. Syntax: <mode> Enables or disables the access point LAN interface. name <idx-name > Defines the LAN name by index. ethernet-port-lan <idx> Defines which LAN (LAN1 or LAN2) is active on the Ethernet port. timeout <seconds>...
  • Page 358 8-16 AP-51xx Access Point Product Reference Guide Related Commands: show Shows the current settings for the access point LAN port. For information on configuring the LAN using the applet (GUI), see Configuring the LAN Interface on page 5-1.
  • Page 359: Network Lan, Bridge Commands

    8-17 8.3.1.1 Network LAN, Bridge Commands AP51xx>admin(network.lan.bridge)> Description: Displays the access point Bridge submenu. show Displays the mesh configuration parameters for the access point’s LANs. Sets the mesh configuration parameters for the access point’s LANs.. Moves to the parent menu. Goes to the root menu.
  • Page 360 8-18 AP-51xx Access Point Product Reference Guide AP51xx>admin(network.lan.bridge)> show Description: Displays the mesh bridge configuration parameters for the access point’s LANs. Syntax: show Displays the mesh bridge configuration parameters for the access point’s LANs. Example: admin(network.lan.bridge)>show ** LAN1 Bridge Configuration ** Bridge Priority :32768 Hello Time (seconds)
  • Page 361 8-19 AP51xx>admin(network.lan.bridge)> set Description: Sets the mesh configuration parameters for the access point’s LANs. Syntax: set priority <LAN-idx> <seconds> Sets bridge priority time in seconds (0-65535) for specified LAN. hello <LAN-idx> <seconds> Sets bridge hello time in seconds (0-10) for specified LAN. msgage <LAN-idx>...
  • Page 362: Network Lan, Wlan-Mapping Commands

    8-20 AP-51xx Access Point Product Reference Guide 8.3.1.2 Network LAN, WLAN-Mapping Commands AP51xx>admin(network.lan.wlan-mapping)> Description: Displays the WLAN/Lan/Vlan Mapping submenu. show Displays the VLAN list currently defined for the access point. Sets the access point VLAN configuration. create Creates a new access point VLAN. edit Edits the properties of an existing access point VLAN.
  • Page 363 8-21 AP51xx>admin(network.lan.wlan-mapping)> show Description: Displays the VLAN list currently defined for the access point.. These parameters are defined with the set command. Syntax: show name Displays the existing list of VLAN names. vlan-cfg Shows WLAN-VLAN mapping and VLAN configuration. lan-wlan Displays a WLAN-LAN mapping summary.
  • Page 364 8-22 AP-51xx Access Point Product Reference Guide admin(network.lan.wlan-mapping)>show wlan WLAN1: WLAN Name :WLAN1 ESSID :101 Radio VLAN Security Policy :Default QoS Policy :Default For information on displaying the VLAN screens using the applet (GUI), see Configuring VLAN Support on page 5-5.
  • Page 365 8-23 AP51xx>admin(network.lan.wlan-mapping)> set Description: Sets VLAN parameters for the access point. Syntax: set mgmt- tag <id> Defines the Management VLAN tag (1-4095). native-tag <id> Sets the Native VLAN tag (1-4095). mode <wlan-idx> Sets WLAN VLAN mode (WLAN 1-16) to either dynamic or static. Example: admin(network.lan.wlan-mapping)>set mgmt-tag 1 admin(network.lan.wlan-mapping)>set native-tag 2...
  • Page 366 8-24 AP-51xx Access Point Product Reference Guide AP51xx>admin(network.lan.wlan-mapping)> create Description: Creates a VLAN for the access point. Syntax: create vlan-id <id> Defines the VLAN ID (1-4095). vlan-name <name> Specifies the name of the VLAN (1-31 characters in length). Example: admin(network.lan.wlan-mapping)> admin(network.lan.wlan-mapping)>create 5 vlan-5 For information on creating VLANs using the applet (GUI), see Configuring VLAN Support on page...
  • Page 367 8-25 AP51xx>admin(network.lan.wlan-mapping)> edit Description: Modifies a VLAN’s name and ID. Syntax: edit name <name> Modifies an exisiting VLAN name (1-31 characters in length) <id> Modifies an existing VLAN ID (1-4095) characters in length). For information on editing VLANs using the applet (GUI), see Configuring VLAN Support on page 5-5.
  • Page 368 8-26 AP-51xx Access Point Product Reference Guide AP51xx>admin(network.lan.wlan-mapping)> delete Description: Deletes a specific VLAN or all VLANs. Syntax: delete < VLAN id> Deletes a specific VLAN ID (1-16). Deletes all defined VLANs. For information on deleting VLANs using the applet (GUI), see Configuring VLAN Support on page 5-5.
  • Page 369 8-27 AP51xx>admin(network.lan.wlan-mapping)> lan-map Description: Maps an access point VLAN to a WLAN. Syntax: lan-map <wlan name Maps an existing WLAN to an enabled LAN. All names and IDs are case-sensitive. <lan name> Defines enabled LAN name. All names and IDs are case-sensitive. admin(network.lan.wlan-mapping)>lan-map wlan1 lan1 For information on mapping VLANs using the applet (GUI), see Configuring VLAN Support on page...
  • Page 370 8-28 AP-51xx Access Point Product Reference Guide AP51xx>admin(network.lan.wlan-mapping)> vlan-map Description: Maps an access point VLAN to a WLAN. Syntax: vlan-map <wlan name> Maps an existing WLAN to an enabled LAN. All names and IDs are case-sensitive. <vlan name> Defines the existing VLAN name. All names and IDs are case-sensitive. admin(network.lan.wlan-mapping)>vlan-map wlan1 vlan1 For information on mapping VLANs using the applet (GUI), see Configuring VLAN Support on page...
  • Page 371: Network Lan, Dhcp Commands

    8-29 8.3.1.3 Network LAN, DHCP Commands AP51xx>admin(network.lan.dhcp)> Description: Displays the access point DHCP submenu. The items available are displayed below. show Displays DHCP parameters. Sets DHCP parameters. Adds static DHCP address assignments. delete Deletes static DHCP address assignments. list Lists static DHCP address assignments. Goes to the parent menu.
  • Page 372 8-30 AP-51xx Access Point Product Reference Guide AP51xx>admin(network.lan.dhcp)> show Description: Shows DHCP parameter settings. Syntax: show Displays DHCP parameter settings for the access point. These parameters are defined with the set command. Example: admin(network.lan.dhcp)>show **LAN1 DHCP Information** DHCP Address Assignment Range: Starting IP Address : 192.168.0.100 Ending IP Address...
  • Page 373 8-31 AP51xx>admin(network.lan.dhcp)> set Description: Sets DHCP parameters for the LAN port. Syntax: set range <LAN-idx> <ip1> <ip2> Sets the DHCP assignment range from IP address <ip1> to IP address <ip2> for the specified LAN. lease <LAN-idx> <lease> Sets the DHCP lease time <lease> in seconds (1-999999) for the specified LAN. Example: admin(network.lan.dhcp)>set range 1 192.168.0.100 192.168.0.254 admin(network.lan.dhcp)>set lease 1 86400...
  • Page 374 8-32 AP-51xx Access Point Product Reference Guide AP51xx>admin(network.lan.dhcp)> add Description: Adds static DHCP address assignments. Syntax: <LAN-idx> <mac> <ip> Adds a reserved static IP address to a MAC address for the specified LAN Example: admin(network.lan.dhcp)>add 1 00A0F8112233 192.160.24.6 admin(network.lan.dhcp)>add 1 00A0F1112234 192.169.24.7 admin(network.lan.dhcp)>list 1 ----------------------------------------------------------------------------- Index...
  • Page 375 8-33 AP51xx>admin(network.lan.dhcp)> delete Description: Deletes static DHCP address assignments. Syntax: delete <LAN-idx> <entry> Deletes the static DHCP address entry for the specified LAN. <LAN-idx> Deletes all static DHCP addresses. Example: admin(network.lan.dhcp)>list 1 ----------------------------------------------------------------------------- Index MAC Address IP Address ----------------------------------------------------------------------------- 00A0F8112233 10.1.2.4 00A0F8102030 10.10.1.2...
  • Page 376 8-34 AP-51xx Access Point Product Reference Guide AP51xx>admin(network.lan.dhcp)> list Description: Lists static DHCP address assignments. Syntax: list <LAN-idx> <cr> Lists the static DHCP address assignments for the specified LAN (1-LAN1, 2 LAN2). Example: admin(network.lan.dhcp)>list 1 ----------------------------------------------------------------------------- Index MAC Address IP Address ----------------------------------------------------------------------------- 00A0F8112233 10.1.2.4...
  • Page 377: Network Type Filter Commands

    8-35 8.3.1.4 Network Type Filter Commands AP51xx>admin(network.lan.type-filter)> Description: Displays the access point Type Filter submenu. The items available under this command include: show Displays the current Ethernet Type exception list. Defines Ethernet Type Filter parameters. Adds an Ethernet Type Filter entry. delete Removes an Ethernet Type Filter entry.
  • Page 378 8-36 AP-51xx Access Point Product Reference Guide AP51xx>admin(network.lan.type-filter)> show Description: Displays the access point’s current Ethernet Type Filter configuration. Syntax: show <LAN-idx> Displays the existing Type-Filter configuration for the specified LAN. Example: admin(network.lan.type-filter)>show 1 Ethernet Type Filter mode : allow ----------------------------------------------------------------------------- index ethernet type...
  • Page 379 8-37 AP51xx>admin(network.lan.type-filter)> set Description: Defines the access point Ethernet Type Filter configuration. Syntax: set mode <LAN-idx> allow deny Allows or denies the access point from processing a specified Ethernet data type for the specified LAN. Example: admin(network.lan.type-filter)>set mode 1 allow For information on configuring the type filter settings using the applet (GUI), see Setting the Type Filter Configuration on page 5-14.
  • Page 380 8-38 AP-51xx Access Point Product Reference Guide AP51xx>admin(network.lan.type-filter)> add Description: Adds an Ethernet Type Filter entry. Syntax: <LAN-idx> <type> Adds entered Ethernet Type to list of data types either allowed or denied access point processing permissions for the specified LAN (either LAN1 or LAN2). Example: admin(network.lan.type-filter)>...
  • Page 381 8-39 AP51xx>admin(network.lan.type-filter)> delete Description: Removes an Ethernet Type Filter entry individually or the entire Type Filter list. Syntax: delete <LAN-idx> <index> Deletes the specified Ethernet Type index entry (1 through 16). <LAN-idx> Deletes all Ethernet entries currently in list. Example: admin(network.lan.type-filter)>delete 1 1 admin(network.lan.type-filter)>show 1 Ethernet Type Filter mode...
  • Page 382: Network Wan Commands

    8-40 AP-51xx Access Point Product Reference Guide 8.3.2 Network WAN Commands AP51xx>admin(network.wan)> Description: Displays the WAN submenu. The items available under this command are shown below. show Displays the access point WAN configuration and the access point’s current PPPoE configuration. Defines the access point’s WAN and PPPoE configuration.
  • Page 383 8-41 AP51xx>admin(network.wan)> show Description: Displays the access point WAN port parameters. Syntax: show Shows the general IP parameters for the WAN port along with settings for the WAN interface.. Example: admin(network.wan)>show Status : enable Primary DNS Server : 0.0.0.0 Secondary DNS Server : 0.0.0.0 Auto-negotiation : disable...
  • Page 384 8-42 AP-51xx Access Point Product Reference Guide AP51xx>admin(network.wan)> set Description: Defines the configuration of the access point WAN port. Syntax: set wan enable/disable Enables or disables the access point WAN port. dhcp enable/disable Enables or disables WAN DHCP Client mode. ipadr <idx>...
  • Page 385: Network Wan Nat Commands

    8-43 8.3.2.1 Network WAN NAT Commands AP51xx>admin(network.wan.nat)> Description: Displays the NAT submenu. The items available under this command are shown below. show Displays the access point’s current NAT parameters for the specified index. Defines the access point NAT settings. Adds NAT entries. delete Deletes NAT entries.
  • Page 386 8-44 AP-51xx Access Point Product Reference Guide AP51xx>admin(network.wan.nat)> show Description: Displays access point NAT parameters. Syntax: show <idx> <cr> Displays access point NAT parameters for the specified NAT index. Example: admin(network.wan.nat)>show 2 WAN IP Mode : enable WAN IP Address : 157.235.91.2 NAT Type : 1-to-many...
  • Page 387 8-45 AP51xx>admin(network.wan.nat)> set Description: Sets NAT inbound and outbound parameters. Syntax: set type <index> <type> Sets the type of NAT translation for WAN address index <idx> (1-8) to <type> (none, 1-to-1, or 1-to-many). <index> <ip> Sets NAT IP mapping associated with WAN address <idx> to the specified IP address <ip>.
  • Page 388 8-46 AP-51xx Access Point Product Reference Guide AP51xx>admin(network.wan.nat)> add Description: Adds NAT entries. Syntax: <idx> <name> <tran> <port1> <port2> <ip> <dst_port> Sets an inbound network address translation (NAT) for WAN address <idx>, where <name> is the name of the entry (1 to 7 characters), <tran>...
  • Page 389 8-47 AP51xx>admin(network.wan.nat)> delete Description: Deletes NAT entries. Syntax: delete <idx> <entry> Deletes a specified NAT index entry <entry> associated with the WAN. <idx> Deletes all NAT entries associated with the WAN. Example: admin(network.wan.nat)>list 1 ----------------------------------------------------------------------------- index name prot start port end port internal ip translation port...
  • Page 390 8-48 AP-51xx Access Point Product Reference Guide AP51xx>admin(network.wan.nat)> list Description: Lists access point NAT entries for the specified index. Syntax: list <idx> Lists the inbound NAT entries associated with the WAN index (1-8). Example: admin(network.wan.nat)>list 1 ----------------------------------------------------------------------------- index name Transport start port end port internal ip...
  • Page 391: Network Wan, Vpn Commands

    8-49 8.3.2.2 Network WAN, VPN Commands AP51xx>admin(network.wan.vpn)> Description: Displays the VPN submenu. The items available under this command include: Adds VPN tunnel entries. Sets key exchange parameters. delete Deletes VPN tunnel entries. list Lists VPN tunnel entries reset Resets all VPN tunnels. stats Lists security association status for the VPN tunnels.
  • Page 392 8-50 AP-51xx Access Point Product Reference Guide AP51xx>admin(network.wan.vpn)> add Description: Adds a VPN tunnel entry. Syntax: <name> <idx> <LWanIP> <RSubnetIP> <RSubnetMask <RGatewayIP> Creates a tunnel <name> (1 to 13 characters) to gain access through local WAN IP <LWanIP> from the remote subnet with address <RSubnetIP>...
  • Page 393 8-51 AP51xx>admin(network.wan.vpn)> set Description: Sets VPN entry parameters. Syntax: set type <name> <tunnel type> Sets the tunnel type <name> to Auto Manual for the specified tunnel name. authalgo <name> <authalgo> Sets the authentication algorithm for <name> to (None, MD5, or SHA1). authkey <name>...
  • Page 394 8-52 AP-51xx Access Point Product Reference Guide salife <name> <lifetime> Defines the name of the tunnnel <name> the Security Association Life Time <300-65535> applies to in seconds. opmode <name> <opmode> Sets the Operation Mode of IKE for <name> to Main or Aggr(essive).
  • Page 395 8-53 AP51xx>admin(network.wan.vpn)> delete Description: Deletes VPN tunnel entries. Syntax: delete Deletes all VPN entries. <name> Deletes VPN entries <name>. Example: admin(network.wan.vpn)>list -------------------------------------------------------------------------- Tunnel Name Type Remote IP/Mask Remote Gateway Local WAN IP -------------------------------------------------------------------------- Eng2EngAnnex Manual 192.168.32.2/24 192.168.33.1 192.168.24.198 SJSharkey Manual 206.107.22.45/27 206.107.22.2 209.235.12.55...
  • Page 396 8-54 AP-51xx Access Point Product Reference Guide AP51xx>admin(network.wan.vpn)> list Description: Lists VPN tunnel entries. Syntax: list <cr> Lists all tunnel entries. <name> Lists detailed information about tunnel named <name>. Note that the <name> must match case with the name of the VPN tunnel entry Example: admin(network.wan.vpn)>list...
  • Page 397 8-55 AP51xx>admin(network.wan.vpn)> reset Description: Resets all of the access point’s VPN tunnels. Syntax: reset Resets all VPN tunnel states. Example: admin(network.wan.vpn)>reset VPN tunnels reset. admin(network.wan.vpn)> For information on configuring VPN using the applet (GUI), see Configuring VPN Tunnels on page 6-36.
  • Page 398 8-56 AP-51xx Access Point Product Reference Guide AP51xx>admin(network.wan.vpn)> stats Description: Lists statistics for all active tunnels. Syntax: stats Display statistics for all VPN tunnels. Example: admin(network.wan.vpn)>stats ----------------------------------------------------------------------------- Tunnel Name Status SPI(OUT/IN) Life Time Bytes(Tx/Rx) ----------------------------------------------------------------------------- Eng2EngAnnex Not Active SJSharkey Not Active For information on displaying VPN information using the applet (GUI), see Viewing VPN Status on page 6-50.
  • Page 399 8-57 AP51xx>admin(network.wan.vpn)> ikestate Description: Displays statistics for all active tunnels using Internet Key Exchange (IKE). Syntax: ikestate Displays status about Internet Key Exchange (IKE) for all tunnels. In particular, the table indicates whether IKE is connected for any of the tunnels, it provides the destination IP address, and the remaining lifetime of the IKE key. Example: admin(network.wan.vpn)>ikestate ----------------------------------------------------------------------...
  • Page 400 8-58 AP-51xx Access Point Product Reference Guide 8.3.2.3 AP51xx>admin(network.wan.content)> Description: Displays the Outbound Content Filtering menu. The items available under this command include: addcmd Adds control commands to block outbound traffic. delcmd Deletes control commands to block outbound traffic. list Lists application control commands.
  • Page 401 8-59 AP51xx>admin(network.wan.content)> addcmd Description: Adds control commands to block outbound traffic. Syntax: addcmd Adds WEB commands to block outbound traffic. proxy Adds a Web proxy command. activex Adds activex files. file Adds Web URL extensions (10 files maximum) smtp Adds SMTP commands to block outbound traffic. helo helo command mail...
  • Page 402 8-60 AP-51xx Access Point Product Reference Guide AP51xx>admin(network.wan.content)> delcmd Description: Deletes control commands to block outbound traffic. Syntax: delcmd Deletes WEB commands to block outbound traffic. proxy Deletes a Web proxy command. activex Deletes activex files. file Deletes Web URL extensions (10 files maximum) smtp Deletes SMTP commands to block outbound traffic.
  • Page 403 8-61 AP51xx>admin(network.wan.content)> list Description: Lists application control commands. Syntax: list Lists WEB application control record. smtp Lists SMTP application control record. Lists FTP application control record. Example: admin(network.wan.content)>list web HTTP Files/Commands Web Proxy : deny ActiveX : allow filename admin(network.wan.content)>list smtp SMTP Commands HELO : deny...
  • Page 404: Network Wan, Dynamic Dns Commands

    8-62 AP-51xx Access Point Product Reference Guide 8.3.2.4 Network WAN, Dynamic DNS Commands AP51xx>admin(network.wan.dyndns)> Description: Displays the Dynamic DNS submenu. The items available under this command include: Sets Dynamic DNS parameters. update Sets key exchange parameters. show Shows the Dynamic DNS configuration. Goes to the parent menu.
  • Page 405 8-63 AP51xx>admin(network.wan.dyndns)> set Description: Sets the access point’s Dynamic DNS configuration. Syntax: mode enable/disable Enables or disbales the Dynamic DNS service for the access point. username <name> Enter a 1 - 32 character username for the account used for the access point. password <password>...
  • Page 406 8-64 AP-51xx Access Point Product Reference Guide AP51xx>admin(network.wan.dyndns)> update Description: Updates the access point’s current WAN IP address with the DynDNS service. Syntax: update Updates the access point’s current WAN IP address with the DynDNS service. Example: admin(network.wan.dyndns)>update IP Address : 157.235.91.231 Hostname : greengiant...
  • Page 407 8-65 AP51xx>admin(network.wan.dyndns)> show Description: Shows the current Dynamic DNS configuration. Syntax: show Shows the access point’s current Dynamic DNS configuration. Example: admin(network.wan.dyndns)>show DynDNS Configuration Mode : enable Username : percival Password : ******** Hostname : greengiant DynDNS Update Response IP Address : 157.235.91.231 Hostname : greengiant...
  • Page 408: Network Wireless Commands

    8-66 AP-51xx Access Point Product Reference Guide 8.3.3 Network Wireless Commands AP51xx>admin(network.wireless) Description: Displays the access point wireless submenu. The items available under this command include: wips wlan Displays the WLAN submenu used to create and configure up to 16 WLANs per access point. security Displays the security submenu used to create encryption and authentication based security policies for use with...
  • Page 409: Network Wlan Commands

    8-67 8.3.3.1 Network WLAN Commands AP51xx>admin(network.wireless.wlan)> Description: Displays the access point wireless LAN (WLAN) submenu. The items available under this command include: show Displays the access point’s current WLAN configuration. create Defines the parameters of a new WLAN. edit Modifies the properties of an existing WLAN. delete Deletes an existing WLAN.
  • Page 410 8-68 AP-51xx Access Point Product Reference Guide AP51xx>admin(network.wireless.wlan)> show Description: Displays the access point’s current WLAN configuration. Syntax: show summary Displays the current configuration for existing WLANs. wlan <number> Displays the configuration for the requested WLAN (WLAN 1 through 16). Example: admin(network.wireless.wlan)>show summary WLAN1...
  • Page 411 8-69 AP51xx>admin(network.wireless.wlan)> create Description: Defines the parameters of a new WLAN. Syntax: create show wlan <number> Displays newly created WLAN and policy number. <essid> Defines the ESSID for a target WLAN. <name> Determines the name of this particlular WLAN (1-32). wlan-name <mode>...
  • Page 412 8-70 AP-51xx Access Point Product Reference Guide QoS Policy : Default admin(network.wireless.wlan.create)>show security ---------------------------------------------------------------------- Secu Policy Name Authen Encryption Associated WLANs ---------------------------------------------------------------------- 1 Default Manual no encrypt Front Lobby 2 WEP Demo Manual WEP 64 2nd Floor 3 Open Manual no encrypt 1st Floor WPA Countermeasure...
  • Page 413 8-71 AP51xx>admin(network.wireless.wlan)> edit Description: Edits the properties of an existing WLAN policy. Syntax: edit <index> Edits the properties of an existing (and specified) WLAN policy. show Displays the WLANs pamaters and summary. Edits the same WLAN parameters that can be modified using the create command. change Completes the WLAN edits and exits the CLI session.
  • Page 414 8-72 AP-51xx Access Point Product Reference Guide AP51xx>admin(network.wireless.wlan)> delete Description: Deletes an existing WLAN. Syntax: delete <wlan-name> Deletes a target WLAN by name supplied. Deletes all WLANs defined. For information on deleting a WLAN using the applet (GUI), see Creating/Editing Individual WLANs on page 5-30.
  • Page 415 8-73 AP51xx>admin(network.wireless.wlan.hotspot)> Description: Displays the Hotspot submenu. The items available under this command include: show Show hotspot parameters. redirection Goes to the hotspot redirection menu. radius Goes to the hotspot Radius menu. white-list Goes to the hotspot white-list menu. save Saves the configuration to system flash.
  • Page 416 8-74 AP-51xx Access Point Product Reference Guide AP51xx>admin(network.wireless.wlan.hotspot)> show Description: Displays the current access point Rogue AP detection configuration. Syntax: show hotspot <idx> Shows hotspot parameters per wlan index (1-16). Example: admin(network.wireless.wlan.hotspot)>show hotspot 1 WLAN1 Hotspot Mode : enable Hotspot Page Location : default External Login URL : www.sjsharkey.com...
  • Page 417 8-75 AP51xx>admin(network.wireless.wlan.hotspot)> redirection Description: Goes to the hotspot redirection menu. Syntax: redirection set <page-loc> Sets the hotspot http-re-direction by index (1-16) for the specified URL. <exturl> Shows hotspot http-redirection details for specifiec index (1-16) for specified page (login, welcome, fail) and target URL.. show Shows hotspot http-redirection details.
  • Page 418 8-76 AP-51xx Access Point Product Reference Guide AP51xx>admin(network.wireless.wlan.hotspot)> radius Description: Goes to the hotspot Radius menu. Syntax: Sets the Radius hotspot configuration. show Shows Radius hotspot server details. save Saves the configuration to system flash. quit Quits the CLI. Goes to the parent menu. Goes to the root menu.
  • Page 419 8-77 AP51xx>admin(network.wireless.wlan.hotspot.radius)> set Description: Sets the Radius hotspot configuration. Syntax: server <idx> <srvr_type> <ipadr> Sets the Radius hotpost server IP address per wlan index (1-16) port <idx> <srvr_type> <port> Sets the Radius hotpost server port per wlan index (1-16) secret <idx>...
  • Page 420 8-78 AP-51xx Access Point Product Reference Guide AP51xx>admin(network.wireless.wlan.hotspot.radius)> show Description: Shows Radius hotspot server details. Syntax: show radius <idx> Displays Radius hotspot server details per index (1-16) Example: admin(network.wireless.wlan.hotspot.radius)>show radius 1 WLAN 1 Hotspot Mode : enable Primary Server Ip adr : 157.235.12.12 Primary Server Port : 1812...
  • Page 421 8-79 AP51xx>admin(network.wireless.wlan.hotspot)> white-list Description: Goes to the hotspot white-list menu. Syntax: white-list add <rule> Adds hotspot whitelist rules by index (1-16) for specified IP address. clear Clears hotspot whitelist rules for specified index (1-16). show Shows hotspot whitelist rules for specified index (1-16). save Saves the updated hotspot configuration to flash memory.
  • Page 422: Network Security Commands

    8-80 AP-51xx Access Point Product Reference Guide 8.3.3.2 Network Security Commands AP51xx>admin(network.wireless.security)> Description: Displays the access point wireless security submenu. The items available under this command include: show Displays the access point’s current security configuration. create Defines the parameters of a security policy. edit Edits the properties of an existing security policy.
  • Page 423 8-81 AP51xx>admin(network.wireless.security)> show Description: Displays the access point’s current security configuration. Syntax: show summary Displays list of existing security policies (1-16). policy <id> Displays the specified security policy <id>. Example: admin(network.wireless.security)>show summary ---------------------------------------------------------------------- Secu Policy Name Authen Encryption Associated WLANs ---------------------------------------------------------------------- 1 Default Manual...
  • Page 424 8-82 AP-51xx Access Point Product Reference Guide AP51xx>admin(network.wireless.security)> create Description: Defines the parameter of access point security policies. Syntax: create Defines the parameters of a security policy. show Displays new or existing security policy parameters. sec-name <name> Sets the name of the security policy. auth <authtype>...
  • Page 425 “symbol.” Be cognizant of this when importing a configuration from 1.1 to 2.1, as this shared secret will have to be changed to motorola (after the import) to avoid MU authentication failures. This change can only be made using the access point CLI.
  • Page 426 8-84 AP-51xx Access Point Product Reference Guide mu-retry <count> Sets the EAP maximum number of MU retries to <count> (1-10). svr-timeout <time> Sets the server timeout <time> in seconds (1- 255). svr-retry <count> Sets the maximum number of server retries to <count>...
  • Page 427 “symbol,” instead of “motorola” (as now required with the 2.0 or later baseline). If the shared secret password is not changed to “motorola” there will be a shared secret mis-match resulting in MU authentication failures. This password cannot be set using the access point Web UI, and must be changed using the CLI.
  • Page 428 8-86 AP-51xx Access Point Product Reference Guide AP51xx>admin(network.wireless.security.edit)> Description: Edits the properties of a specific security policy. Syntax: show Displays the new or modified security policy parameters. <index> Edits security policy parameters. change Completes policy changes and exits the session. Cancels the changes made and exits the session.
  • Page 429 8-87 AP51xx>admin(network.wireless.security)> delete Description: Deletes a specific security policy. Syntax: delete <sec-name> Removes the specified security policy from the list of supported policies. <all> Removes all security policies except the default policy. For information on configuring the encryption and authentication options available to the access point using the applet (GUI), see Configuring Security Options on page 6-2.
  • Page 430: Network Acl Commands

    8-88 AP-51xx Access Point Product Reference Guide 8.3.3.3 Network ACL Commands AP51xx>admin(network.wireless.acl)> Description: Displays the access point Mobile Unit Access Control List (ACL) submenu. The items available under this command include: show Displays the access point’s current ACL configuration. create Creates an MU ACL policy.
  • Page 431 8-89 AP51xx>admin(network.wireless.acl)> show Description: Displays the access point’s current ACL configuration. Syntax: show summary Displays the list of existing MU ACL policies. policy <index> Displays the requested MU ACL index policy. Example: admin(network.wireless.acl)>show summary ---------------------------------------------------------------------- ACL Policy Name Associated WLANs ---------------------------------------------------------------------- 1 Default Front Lobby, WLAN1...
  • Page 432 8-90 AP-51xx Access Point Product Reference Guide AP51xx>admin(network.wireless.acl)> create Description: Creates an MU ACL policy. Syntax: create show <acl-name> Displays the parameters of a new ACL policy. acl-name <index> Sets the MU ACL policy name. mode <acl-mode> Sets the ACL mode for the defined index (1-16). Allowed MUs can access the access point managed LAN.
  • Page 433 8-91 AP51xx>admin(network.wireless.acl.edit)> Description: Edits the properties of an existing MU ACL policy. Syntax: show Displays MU ACL policy and its parameters. Modifies the properties of an existing MU ACL policy. add-addr Adds an MU ACL table entry. delete Deletes an MU ACL table entry, including starting and ending MAC address ranges. change Completes the changes made and exits the session.
  • Page 434 8-92 AP-51xx Access Point Product Reference Guide AP51xx>admin(network.wireless.acl)> delete Description: Removes an MU ACL policy. Syntax: delete <acl name> Deletes a partilcular MU ACL policy. Deletes all MU ACL policies. For information on configuring the ACL options available to the access point using the applet (GUI), see Configuring a WLAN Access Control List (ACL) on page 5-36.
  • Page 435: Network Radio Configuration Commands

    8-93 8.3.3.4 Network Radio Configuration Commands AP51xx>admin(network.wireless.radio)> Description: Displays the access point Radio submenu. The items available under this command include: show Summarizes access point radio parameters at a high-level. Defines the access point radio configuration. radio1 Displays the 802.11b/g radio submenu. radio2 Displays the 802.11a radio submenu.
  • Page 436 8-94 AP-51xx Access Point Product Reference Guide AP51xx>admin(network.wireless.radio)> show Description: Displays the access point’s current radio configuration. Syntax: show Displays the access point’s current radio configuration. Example: admin(network.wireless.radio)>show Radio Configuration Radio 1 Name : Radio 1 Radio Mode : enable RF Band of Operation : 802.11b/g (2.4 GHz) Wireless AP Configuration:...
  • Page 437 8-95 AP51xx>admin(network.wireless.radio)> set Description: Enables an access point Radio and defines the RF band of operation. Syntax: set 11a <mode> Enables or disables the access point’s 802.11a radio. 11bg <mode> Enables or disables the access point’s 802.11b/g radio. mesh-base <mode> Enables or disables base bridge mode.
  • Page 438 8-96 AP-51xx Access Point Product Reference Guide AP51xx>admin(network.wireless.radio.radio1)> Description: Displays a specific 802.11b/g radio submenu. The items available under this command include: Syntax: show Displays 802.11b/g radio settings. Defines specific 802.11b/g radio parameters. advanced Displays the Adavanced radio settings submenu. mesh Goes to the Wireless AP Connections submenu.
  • Page 439 8-97 AP51xx>admin(network.wireless.radio.radio1)> show Description: Displays specific 802.11b/g radio settings. Syntax: show radio Displays specific 802.11b/g radio settings. Displays specific 802.11b/g radio WMM QoS settings. Example: admin(network.wireless.radio.radio1)>show radio Radio Setting Information Placement : indoor MAC Address : 00A0F8715920 Radio Type : 802.11b/g ERP Protection : Off Channel Setting...
  • Page 440 8-98 AP-51xx Access Point Product Reference Guide admin(network.wireless.radio.radio1)>show qos Radio QOS Parameter Set 11g-default ----------------------------------------------------------------------------- Access Category CWMin CWMax AIFSN TXOPs (32 usec) TXOPs ms ----------------------------------------------------------------------------- Background 1023 0.000 Best Effort 0.992 Video 3.008 Voice 1.504 CAUTION If you do NOT include the index number (for example, "set dtim 50"), the DTIMs for all four BSSIDs will be changed to 50.
  • Page 441 8-99 AP51xx>admin(network.wireless.radio.802-11bg)> set Description: Defines specific 802.11b/g radio parameters. Syntax: set placement Defines the access point radio placement as indoors or outdoors. ch-mode Determines how the radio channel is selected. channel Defines the actual channel used by the radio. antenna Sets the radio antenna power power Defines the radio antenna power transmit level.
  • Page 442 8-100 AP-51xx Access Point Product Reference Guide AP51xx>admin(network.wireless.radio.802-11bg.advanced)> Description: Displays the advanced submenu for the 802.11b/g radio. The items available under this command include: Syntax: show Displays advanced radio settings for the 802.11b/g radio. Defines advanced parameters for the 802.11b/g radio. Goes to the parent menu.
  • Page 443 8-101 AP51xx>admin(network.wireless.radio.802-11bg.advanced)> show Description: Displays the BSSID to WLAN mapping for the 802.11b/g radio. Syntax: show advanced Displays advanced settings for the 802.11b/g radio. wlan Displays WLAN summary list for the 802.11b/g radio. Example: admin(network.wireless.radio.802-11bg.advanced)>show advanced ----------------------------------------------------------------------------- WLAN BSS ID BC/MC Cipher Status Message...
  • Page 444 8-102 AP-51xx Access Point Product Reference Guide AP51xx>admin(network.wireless.radio.802-11bg.advanced)> set Description: Defines advanced parameters for the target 802.11b/g radio. Syntax: <wlan-name> <bssid> set wlan Defines advanced WLAN to BSSID mapping for the target radio. <bss-id> <wlan name> Sets the BSSID to primary WLAN definition. Example: admin(network.wireless.radio.802-11bg.advanced)>set wlan demoroom 1 admin(network.wireless.radio.802-11bg.advanced)>set bss 1 demoroom...
  • Page 445 8-103 AP51xx>admin(network.wireless.radio.radio2)> Description: Displays a specific 802.11a radio submenu. The items available under this command include: Syntax: show Displays 802.11a radio settings Defines specific 802.11a radio parameters. advanced Displays the Advanced radio settings submenu. mesh Goes to the Wireless AP Connections submenu. Goes to the parent menu.
  • Page 446 8-104 AP-51xx Access Point Product Reference Guide AP51xx>admin(network.wireless.radio.802-11a)> show Description: Displays specific 802.11a radio settings. Syntax: show radio Displays specific 802.11a radio settings. Displays specific 802.11a radio WMM QoS settings. Example: admin(network.wireless.radio.802-11a)>show radio Radio Setting Information Placement : indoor MAC Address : 00A0F8715920 Radio Type : 802.11a...
  • Page 447 8-105 admin(network.wireless.radio.802-11a)>show qos Radio QOS Parameter Set: 11a default ----------------------------------------------------------------------------- Access Category CWMin CWMax AIFSN TXOPs (32 sec) TXOPs ms ----------------------------------------------------------------------------- Background 1023 0.000 Best Effort 0.992 Video 3.008 Voice 1.504 For information on configuring Radio 2 Configuration options available to the access point using the applet (GUI), see Configuring the 802.11a or 802.11b/g Radio on page 5-55.
  • Page 448 8-106 AP-51xx Access Point Product Reference Guide AP51xx>admin(network.wireless.radio.802-11a)> set Description: Defines specific 802.11a radio parameters. Syntax: set placement Defines the access point radio placement as indoors or outdoors. ch-mode Determines how the radio channel is selected. channel Defines the actual channel used by the radio. antenna Sets the radio antenna power.
  • Page 449 8-107 AP51xx>admin(network.wireless.radio.802-11a.advanced)> Description: Displays the advanced submenu for the 802-11a radio. The items available under this command include: Syntax: show Displays advanced radio settings for the 802-11a radio. Defines advanced parameters for the 802-11a radio. Goes to the parent menu. Goes to the root menu.
  • Page 450 8-108 AP-51xx Access Point Product Reference Guide AP51xx>admin(network.wireless.radio.802-11a.advanced)> show Description: Displays the BSSID to WLAN mapping for the 802.11a radio. Syntax: show advanced Displays advanced settings for the 802.11a radio. wlan Displays WLAN summary list for 802.11a radio. Example: admin(network.wireless.radio.802-11a.advanced)>show advanced ----------------------------------------------------------------------------- WLAN BSS ID...
  • Page 451 8-109 AP51xx>admin(network.wireless.radio.802-11a.advanced)> set Description: Defines advanced parameters for the target 802..11a radio. Syntax: <wlan-name> <bssid> set wlan Defines advanced WLAN to BSSID mapping for the target radio. <bss-id> <wlan name> Sets the BSSID to primary WLAN definition. Example: admin(network.wireless.radio.802-11a.advanced)>set wlan demoroom 1 admin(network.wireless.radio.802-11a.advanced)>set bss 1 demoroom For information on configuring Radio 2 Configuration options available to the access point using the applet (GUI), see Configuring the...
  • Page 452: Network Quality Of Service (Qos) Commands

    8-110 AP-51xx Access Point Product Reference Guide 8.3.3.5 Network Quality of Service (QoS) Commands AP51xx>admin(network.wireless.qos)> Description: Displays the access point Quality of Service (QoS) submenu. The items available under this command include: show Displays access point QoS policy information. create Defines the parameters of the QoS policy.
  • Page 453 8-111 AP51xx>admin(network.wireless.qos)> show Description: Displays the access point’s current QoS policy by summary or individual policy. Syntax: show summary Displays all exisiting QoS policies that have been defined. policy <index> Displays the configuration for the requested QoS policy. Example: admin(network.wireless.qos)>show summary ---------------------------------------------------------------------- QOS Policy Name Associated WLANs...
  • Page 454 8-112 AP-51xx Access Point Product Reference Guide AP51xx>admin(network.wireless.qos.create)> Description: Defines an access point QoS policy. Syntax: show Displays QoS policy parameters. qos-name <index> Sets the QoS name for the specified index entry. <index> Enables or disables support (by index) for legacy VOIP devices. mcast <mac>...
  • Page 455 8-113 AP51xx>admin(network.wireless.qos.edit)> Descripton: Edits the properties of an existing QoS policy. Syntax: show Displays QoS policy parameters. qos-name <index> Sets the QoS name for the specified index entry. <index> Enables or disables support (by index) for legacy VOIP devices. mcast <mac>...
  • Page 456 8-114 AP-51xx Access Point Product Reference Guide AP51xx>admin(network.wireless.qos)> delete Description: Removes a QoS policy. Syntax: delete <qos-name> Deletes the specified QoS polciy index, or all of the policies (except default policy). <all> For information on configuring the WLAN QoS options available to the access point using the applet (GUI), see Setting the WLAN Quality of Service (QoS) Policy on page 5-39.
  • Page 457: Network Bandwith Management Commands

    8-115 8.3.3.6 Network Bandwith Management Commands AP51xx>admin(network.wireless.bandwidth)> Description: Displays the access point Bandwidth Management submenu. The items available under this command include: show Displays Bandwidth Management information for how data is processed by the access point. Defines Bandwidth Management parameters for the access point. Goes to the parent menu.
  • Page 458 8-116 AP-51xx Access Point Product Reference Guide AP51xx>admin(network.wireless.bandwidth)> show Description: Displays the access point’s current Bandwidth Management configuration. Syntax: show Displays the current Bandwidth Management configuration for defined WLANs and how they are weighted. Example: admin(network.wireless.bandwidth)>show Bandwidth Share Mode : First In First Out For information on configuring the Bandwidth Management options available to the access point using the applet (GUI), see Configuring Bandwidth Management Settings on page 5-63.
  • Page 459 8-117 AP51xx>admin(network.wireless.bandwidth)> set Description: Defines the access point Bandwidth Management configuration. Syntax: set mode <bw-mode> Defines bandwidth share mode of First In First Out <fifo>, Round Robin <rr> or Weighted Round Robin <wrr> weight <num> Assigns a bandwidth share allocation for the WLAN <index 1- 16 >...
  • Page 460: Network Rogue-Ap Commands

    8-118 AP-51xx Access Point Product Reference Guide 8.3.3.7 Network Rogue-AP Commands AP51xx>admin(network.wireless.rogue-ap)> Description: Displays the Rogue AP submenu. The items available under this command include: show Displays the current access point Rogue AP detection configuration. Defines the Rogue AP detection method. mu-scan Goes to the Rogue AP mu-uscan submenu.
  • Page 461 MU Scan Interval : 60 minutes On-Channel : disable Detector Radio Scan : enable Auto Authorize Motorola APs : disable Approved APs age out : 0 minutes Rogue APs age out : 0 minutes For information on configuring the Rogue AP options available to the access point using the applet (GUI), see...
  • Page 462 Enables or disables AP detector scan (dual-radio model only). ABG-scan <mode> Enables or disables A/BG Detector Scan Mode. motorola-ap <mode> Enables or disables the Authorize Any AP with a Motorola MAC address option. applst-ageout <minutes> Sets the approved AP age out time. roglst-ageout <minutes>...
  • Page 463 8-121 AP51xx>admin(network.wireless.rogue-ap.mu-scan)> Description: Displays the Rogue-AP mu-scan submenu. Syntax: Add all or just one scan result to Allowed AP list. show Displays all APs located by the MU scan. start Initiates scan immediately by the MU. Goes to the parent menu. Goes to the root menu.
  • Page 464 8-122 AP-51xx Access Point Product Reference Guide AP51xx>admin(network.wireless.rogue-ap.mu-scan)> start Description: Initiates an MU scan from a user provided MAC address. Syntax: start <mu-mac> Initiates MU scan from user provided MAC address. For information on configuring the Rogue AP options available to the access point using the applet (GUI), see Configuring Rogue AP Detection on page 6-55.
  • Page 465 8-123 AP51xx>admin(network.wireless.rogue-ap.mu-scan)> show Description: Displays the results of an MU scan. Syntax: show Displays all APs located by the MU scan. For information on configuring the Rogue AP options available to the access point using the applet (GUI), see Configuring Rogue AP Detection on page 6-55.
  • Page 466 8-124 AP-51xx Access Point Product Reference Guide AP51xx>admin(network.wireless.rogue-ap.allowed-list)> Description: Displays the Rogue-AP allowed-list submenu. show Displays the rogue AP allowed list Adds an AP MAC address and ESSID to the allowed list. delete Deletes an entry or all entries from the allowed list. Goes to the parent menu.
  • Page 467 8-125 AP51xx>admin(network.wireless.rogue-ap.allowed-list)> show Description: Displays the Rogue AP allowed List. Syntax: show Displays the rogue-AP allowed list. Example: admin(network.wireless.rogue-ap.allowed-list)>show Allowed AP List ----------------------------------------------------------------------------- index ap mac essid ----------------------------------------------------------------------------- 00:A0:F8:71:59:20 00:A0:F8:33:44:55 00:A0:F8:40:20:01 Marketing For information on configuring the Rogue AP options available to the access point using the applet (GUI), see Configuring Rogue AP Detection on page 6-55.
  • Page 468 8-126 AP-51xx Access Point Product Reference Guide AP51xx>admin(network.wireless.rogue-ap.allowed-list)> add Description: Adds an AP MAC address and ESSID to existing allowed list. Syntax: <mac-addr> Adds an AP MAC address and ESSID to existing allowed list. “fffffffffffffffff” means any MAC <ess-id> Use a “*” for any ESSID. Example: admin(network.wireless.rogue-ap.allowed-list)>add 00A0F83161BB 103 admin(network.wireless.rogue-ap.allowed-list)>show...
  • Page 469 8-127 AP51xx>admin(network.wireless.rogue-ap.allowed-list)> delete Description: Deletes an AP MAC address and ESSID to existing allowed list. Syntax: delete <idx> Deletes an AP MAC address and ESSID (or all addresses) from the allowed list. <all> For information on configuring the Rogue AP options available to the access point using the applet (GUI), see Configuring Rogue AP Detection on page 6-55.
  • Page 470: Wips Commands

    8-128 AP-51xx Access Point Product Reference Guide 8.3.3.8 WIPS Commands AP51xx>admin(network.wireless.wips> Description: Displays the wips Locationing submenu. The items available under this command include: show Displays the current WLAN Intrusion Prevention configuration. Sets WLAN Intrusion Prevention parameters. Goes to the parent menu. Goes to the root menu.
  • Page 471 8-129 AP51xx>admin(network.wireless.wips> show Description: Shows the WLAN Intrusion Prevention configuration. Syntax: show Displays the WLAN Intrusion Prevention configuration. Example: admin(network.wireless.wips)>show WIPS Server #1 IP Address : 192.168.0.21 WIPS Server #2 IP Address : 10.10.1.1 admin(network.wireless.wips)>...
  • Page 472 8-130 AP-51xx Access Point Product Reference Guide AP51xx>admin(network.wireless.wips> set Description: Sets the WLAN Intrusion Prevention configuration. Syntax: <idx 1 and 2> <ip> Defines the WLAN Intrusion Prevention Server IP Address for (server IPs 1 and 2) Example: admin(network.wireless.wips)>set server 1 192.168.0.21 admin(network.wireless.wips>...
  • Page 473: Network Mu Locationing Commands

    8-131 8.3.3.9 Network MU Locationing Commands AP51xx>admin(network.wireless.mu-locationing)> Description: Displays the MU Locationing submenu. The items available under this command include: show Displays the current MU Locationing configuration. Defines MU Locationing parameters. Goes to the parent menu. Goes to the root menu. save Saves the configuration to system flash.
  • Page 474 8-132 AP-51xx Access Point Product Reference Guide AP51xx>admin(network.wireless.mu-locationing> show Description: Displays the MU probe table configuration Syntax: show Displays the MU probe table configuration. Example: admin(network.wireless.mu-locationing)>show MU Probe Table Mode : disable MU Probe Table Size : 200 admin(network.wireless.mu-locationing)>...
  • Page 475 8-133 AP51xx>admin(network.wireless.mu-locationing> set Description: Defines the MU probe table configuration used for locating MUs. Syntax: Defines the MU probe table configuration. mode Enables/disables a mu probe scan. size Defines the number of MUs in the table (the maximum allowed is 200). Example: admin(network.wireless.mu-locationing)>set admin(network.wireless.mu-locationing)>set mode enable...
  • Page 476: Network Firewall Commands

    8-134 AP-51xx Access Point Product Reference Guide 8.3.4 Network Firewall Commands AP51xx>admin(network.firewall)> Description: Displays the access point firewall submenu. The items available under this command include: show Displays the access point’s current firewall configuration. Defines the access point’s firewall parameters. access Enables/disables firewall permissions through the LAN and WAN ports.
  • Page 477 8-135 AP51xx>admin(network.firewall)> show Description: Displays the access point firewall parameters. Syntax: show Shows all access point’s firewall settings. Example: admin(network.firewall)>show Firewall Status : disable NAT Timeout : 10 minutes Configurable Firewall Filters: ftp bounce attack filter : enable syn flood attack filter : enable unaligned ip timestamp filter : enable...
  • Page 478 8-136 AP-51xx Access Point Product Reference Guide AP51xx>admin(network.firewall)> set Description: Defines the access point firewall parameters. Syntax: set mode <mode> Enables or disables the firewall. nat-timeout <interval> Defines the NAT timeout value. <mode> Enables or disables SYN flood attack check. <mode>...
  • Page 479 8-137 AP51xx>admin(network.firewall)> access Description: Enables or disables firewall permissions through LAN to WAN ports. Syntax: show Displays LAN to WAN access rules. Sets LAN to WAN access rules. Adds LAN to WAN exception rules. delete Deletes LAN to WAN access exception rules. list Displays LAN to WAN access exception rules.
  • Page 480 8-138 AP-51xx Access Point Product Reference Guide AP51xx>admin(network.firewall)> advanced Description: Displays whether an access point firewall rule is intended for inbound traffic to an interface or outbound traffic from that interface.. Syntax: show Shows advanced subnet access parameters. Sets advanced subnet access parameters. import Imports rules from subnet access.
  • Page 481: Network Router Commands

    8-139 8.3.5 Network Router Commands AP51xx>admin(network.router)> Description: Displays the router submenu. The items available under this command are: show Displays the existing access point router configuration. Sets the RIP parameters. Adds user-defined routes. delete Deletes user-defined routes. list Lists user-defined routes. Goes to the parent menu.
  • Page 482 8-140 AP-51xx Access Point Product Reference Guide AP51xx>admin(network.router)> show Description: Shows the access point route table. Syntax: show Shows the access point route table. Example: admin(network.router)>show routes ---------------------------------------------------------------------------- index destination netmask gateway interface metric ---------------------------------------------------------------------------- 192.168.2.0 255.255.255.0 0.0.0.0 lan1 192.168.1.0 255.255.255.0 0.0.0.0 lan2...
  • Page 483 8-141 AP51xx>admin(network.router)> set Description: Shows the access point route table. Syntax: set auth Sets the RIP authentication type. Sets RIP direction. Sets MD5 authetication ID. Sets MD5 authetication key. passwd Sets the password for simple authentication. type Defines the RIP type. dgw-iface Sets the default gateway interface.
  • Page 484 8-142 AP-51xx Access Point Product Reference Guide AP51xx>admin(network.router)> add Description: Adds user-defined routes. Syntax: <dest> <netmask> <gw> <iface> <metric> Adds a route with destination IP address <dest>, IP netmask <netmask>, destination gateway IP address <gw>, interface LAN1, LAN2 or WAN <iface>, and metric set to <metric> (1-65536).
  • Page 485 8-143 AP51xx>admin(network.router)> delete Description: Deletes user-defined routes. Syntax: delete <idx> Deletes the user-defined route <idx> (1-20) from list. Deletes all user-defined routes. Example: admin(network.router)>list ---------------------------------------------------------------------------- index destination netmask gateway interface metric ---------------------------------------------------------------------------- 192.168.2.0 255.255.255.0 192.168.0.1 lan1 192.168.1.0 255.255.255.0 0.0.0.0 lan2 192.168.0.0 255.255.255.0 0.0.0.0...
  • Page 486 8-144 AP-51xx Access Point Product Reference Guide AP51xx>admin(network.router)> list Description: Lists user-defined routes. Syntax: list Displays a list of user-defined routes. Example: admin(network.router)>list ---------------------------------------------------------------------------- index destination netmask gateway interface metric ---------------------------------------------------------------------------- 192.168.2.0 255.255.255.0 192.168.0.1 lan1 192.168.1.0 255.255.255.0 0.0.0.0 lan2 192.168.0.0 255.255.255.0 0.0.0.0 lan1...
  • Page 487: System Commands

    8-145 8.4 System Commands AP51xx>admin(system)> Description: Displays the System submenu. The items available under this command are shown below. restart Restarts the access point. show Shows access point system parameter settings. Defines access point system parameter settings. lastpw Displays last debug password. exec Goes to a Linux command menu.
  • Page 488 ** Please be sure to save changes before resetting. ************************************************************************** Are you sure you want to restart the AP-51xx?? (yes/no): AP-51xx Boot Firmware Version 2.1.0.0-xxx Copyright(c) Motorola 2007. All rights reserved. Press escape key to run boot firmware ..Power On Self Test testing ram...
  • Page 489 8-147 AP51xx>admin(system)>show Description: Displays high-level system information helpful to differentiate this access point. Syntax: show Displays access point system information. Example: admin(system)>show system name : BldgC system location : Atlanta Field Office admin email address : johndoe@mycompany.com system uptime : 0 days 4 hours 41 minutes AP-51xx firmware version : 2.1.0.0-026D country code...
  • Page 490 8-148 AP-51xx Access Point Product Reference Guide AP51xx>admin(system)>set Description: Sets access point system parameters. Syntax: set name <name> Sets the access point system name to <name> (1 to 59 characters). The access point does not allow intermediate space characters between characters within the system name.
  • Page 491 8-149 AP51xx>admin(system)>lastpw Description: Displays last expired debug password. Example: admin(system)>lastpw AP-51xx MAC Address is 00:15:70:02:7A:66 Last debug password was motorola Current debug password used 0 times, valid 4 more time(s) admin(system)>...
  • Page 492 8-150 AP-51xx Access Point Product Reference Guide AP51xx>admin(system)>arp Description: Dispalys the access point’s arp table. Example: admin(system)>arp Address HWtype HWaddress Flags Mask Iface 157.235.92.210 ether 00:11:25:14:61:A8 ixp1 157.235.92.179 ether 00:14:22:F3:D7:39 ixp1 157.235.92.248 ether 00:11:25:B2:09:60 ixp1 157.235.92.180 ether 00:0D:60:D0:06:90 ixp1 157.235.92.3 ether 00:D0:2B:A0:D4:FC ixp1...
  • Page 493: Adaptive Ap Setup Commands

    8-151 8.4.1 Adaptive AP Setup Commands AP51xx>admin(system)>aap-setup Description: Displays the Adaptive AP submenu. show Displays Adaptive AP information. Defines the Adaptive AP configuration. delete Deletes static switch address assignments. Goes to the parent menu. Goes to the root menu. save Saves the current configuration to the access point system flash.
  • Page 494 8-152 AP-51xx Access Point Product Reference Guide AP51xx>admin(system.aap-setup)>show Description: Displays the access point’s Adaptive AP configuration. Syntax: show Displays the access point’s Adaptive AP configuration. Example: admin(system.aap-setup)>show Auto Discovery Mode : disable Switch Interface : lan1 Switch Name : greg Static IP Port : 24576 Static IP Address...
  • Page 495 8-153 AP51xx>admin(system.aap-setup)>set Description: Sets access point’s Adaptive AP configuration. Syntax: set auto-discovery Sets the switch auto-discovery mode (enable/disable). interface Defines the tunnel interface. ipadr Defines the switch IP address used. name Defines the switch name for DNS lookups. port Sets the port. passphrase Defines the pass phrase or key for switch connection.
  • Page 496 8-154 AP-51xx Access Point Product Reference Guide AP51xx>admin(system.aap-setup)>delete Description: Deletes static switch address assignments. Syntax: delete <idx> Deletes static switch address assignments by selecte index. <all> Deletes all assignments. Example: admin(system.aap-setup)>delete 1 admin(system.aap-setup)> For information on configuring Adaptive AP using the applet (GUI), see Adaptive AP Setup on page 4-6.
  • Page 497: System Access Commands

    8-155 8.4.2 System Access Commands AP51xx>admin(system)>access Description: Displays the access point access submenu. show Displays access point system access capabilities. Goes to the access point system access submenu. Goes to the parent menu. Goes to the root menu. save Saves the current configuration to the access point system flash. quit Quits the CLI and exits the current session.
  • Page 498 8-156 AP-51xx Access Point Product Reference Guide AP51xx>admin(system.access)>set Description: Defines the permissions to access the access point applet, CLI, SNMP as well as defining their timeout values. Syntax: set applet Defines the applet HTTP/HTTPS access parameters. app-timeout <minutes> Sets the applet timeout. Default is 300 Mins. Defines CLI Telnet access parameters.
  • Page 499 8-157 AP51xx>admin(system.access)>show Description: Displays the current access point access permissions and timeout values. Syntax: show Shows all of the current system access settings for the access point.. Example: admin(system.access)>set trusted-host mode enable admin(system.access)>set trusted-host range 1 10.1.1.1 10.1.1.10 Warning: Only trusted hosts can access the AP through snmp, http, https, telnet, admin(system.access)>show trusted host access mode : enable...
  • Page 500: System Certificate Management Commands

    8-158 AP-51xx Access Point Product Reference Guide 8.4.3 System Certificate Management Commands AP51xx>admin(system)>cmgr Description: Displays the Certificate Manager submenu. The items available under this command include: genreq Generates a Certificate Request. delself Deletes a Self Certificate. loadself Loads a Self Certificate signed by CA. listself Lists the self certificate loaded.
  • Page 501 8-159 AP51xx>admin(system.cmgr)> genreq Description: Generates a certificate request. Syntax: genreq <IDname> <Subject> [-ou <OrgUnit>] [-on <OrgName>] [-cn <City>] [-st <State>] ..[-p <PostCode>] [-cc <CCode>] [-e <Email>] [-d <Domain>] [-i <IP>] [-sa <SAlgo>] Generates a self-certificate request for a Certification Authority (CA), where: <IDname>...
  • Page 502 8-160 AP-51xx Access Point Product Reference Guide AP51xx>admin(system.cmgr)> delself Description: ) Deletes a self certificate. Syntax: delself <IDname> Deletes the self certificate named <IDname>. Example: admin(system.cmgr)>delself MyCert2 For information on configuring self certificate settings using the applet (GUI), see Creating Self Certificates for Accessing the VPN on page 4-18.
  • Page 503 8-161 AP51xx>admin(system.cmgr)> loadself Description: Loads a self certificate signed by the Certificate Authority. Syntax: loadself <IDname> Load the self certificate signed by the CA with name <IDname>. For information on configuring self certificate settings using the applet (GUI), see Creating Self Certificates for Accessing the VPN on page 4-18.
  • Page 504 8-162 AP-51xx Access Point Product Reference Guide AP51xx>admin(system.cmgr)> listself Description: Lists the loaded self certificates. Syntax: listself Lists all self certificates that are loaded. For information on configuring self certificate settings using the applet (GUI), see Creating Self Certificates for Accessing the VPN on page 4-18.
  • Page 505 8-163 AP51xx>admin(system.cmgr)> loadca Description: Loads a trusted certificate from the Certificate Authority. Syntax: loadca Loads the trusted certificate (in PEM format) that is pasted into the command line. For information on configuring certificate settings using the applet (GUI), see Importing a CA Certificate on page 4-16.
  • Page 506 8-164 AP-51xx Access Point Product Reference Guide AP51xx>admin(system.cmgr)> delca Description: Deletes a trusted certificate. Syntax: delca <IDname> Deletes the trusted certificate. For information on configuring certificate settings using the applet (GUI), see Importing a CA Certificate on page 4-16.
  • Page 507 8-165 AP51xx>admin(system.cmgr)> listca Description: Lists the loaded trusted certificate. Syntax: listca Lists the loaded trusted certificates. For information on configuring certificate settings using the applet (GUI), see Importing a CA Certificate on page 4-16.
  • Page 508 8-166 AP-51xx Access Point Product Reference Guide AP51xx>admin(system.cmgr)> showreq Description: Displays a certificate request in PEM format. Syntax: showreq <IDname> Displays a certificate request named <IDname> generated from the genreq command. For information on configuring certificate settings using the applet (GUI), see Importing a CA Certificate on page 4-16.
  • Page 509 8-167 AP51xx>admin(system.cmgr)> delprivkey Description: Deletes a private key. Syntax: delprivkey <IDname> Deletes private key named <IDname>. For information on configuring certificate settings using the applet (GUI), see Creating Self Certificates for Accessing the VPN on page 4-18.
  • Page 510 8-168 AP-51xx Access Point Product Reference Guide AP51xx>admin(system.cmgr)> listprivkey Description: Lists the names of private keys. Syntax: listprivkey Lists all private keys. For information on configuring certificate settings using the applet (GUI), see Importing a CA Certificate on page 4-16.
  • Page 511 8-169 AP51xx>admin(system.cmgr)> expcert Description: Exports the certificate file to a user defined location. Syntax: expcert Exports the access point’s CA or Self certificate file. To export certificate information from an AP-5131 or AP-5181 model access point: admin(system.cmgr)>expcert ? <type> <file name> <cr> : type: ftp/tftp : file name: Certificate file name : Server options for this file are the same...
  • Page 512 8-170 AP-51xx Access Point Product Reference Guide AP51xx>admin(system.cmgr)> impcert Description: Imports the target certificate file. Syntax: impcert Imports the target certificate file. To import certificate information from an AP-5131 or AP-5181 model access point: admin(system.cmgr)>impcert ? <type> <file name> <cr> : type: ftp/tftp : file name: Certificate file name : Server options for this file are the same...
  • Page 513: System Snmp Commands

    8-171 8.4.4 System SNMP Commands AP51xx>admin(system)> snmp Description: Displays the SNMP submenu. The items available under this command are shown below. access Goes to the SNMP access submenu. traps Goes to the SNMP traps submenu. Goes to the parent menu. Goes to the root menu.
  • Page 514: System Snmp Access Commands

    8-172 AP-51xx Access Point Product Reference Guide 8.4.4.1 System SNMP Access Commands AP51xx>admin(system.snmp.access) Description: Displays the SNMP Access menu. The items available under this command are shown below. show Shows SNMP v3 engine ID. Adds SNMP access entries. delete Deletes SNMP access entries. list Lists SNMP access entries.
  • Page 515 8-173 AP51xx>admin(system.snmp.access)> show Description: Shows the SNMP v3 engine ID. Syntax: show Shows the SNMP v3 Engine ID. Example: admin(system.snmp.access)>show eid access point snmp v3 engine id : 000001846B8B4567F871AC68 admin(system.snmp.access)> For information on configuring SNMP access settings using the applet (GUI), see Configuring SNMP Access Control on page 4-33.
  • Page 516 8-174 AP-51xx Access Point Product Reference Guide AP51xx>admin(system.snmp.access)> add Description: Adds SNMP access entries for specific v1v2 and v3 user definitions. Syntax: add acl <ip1> <ip2> Adds an entry to the SNMP access control list with <ip1> as the starting IP address and <ip2> and as the ending IP address.
  • Page 517 8-175 AP51xx>admin(system.snmp.access)> delete Description: Deletes SNMP access entries for specific v1v2 and v3 user definitions. Syntax: delete acl <idx> Deletes entry <idx> (1-10) from the access control list. Deletes all entries from the access control list. v1v2c <idx> Deletes entry <idx> (1-10) from the v1/v2 configuration list. Deletes all entries from the v1/v2 configuration list.
  • Page 518 8-176 AP-51xx Access Point Product Reference Guide AP51xx>admin(system.snmp.access)> list Description: Lists SNMP access entries. Syntax: list acl Lists SNMP access control list entries. v1v2c Lists SNMP v1/v2c configuration. <idx> Lists SNMP v3 user definition with index <idx>. Lists all SNMP v3 user definitions. Example: admin(system.snmp.access)>list acl ----------------------------------------------------------------...
  • Page 519: System Snmp Traps Commands

    8-177 8.4.4.2 System SNMP Traps Commands AP51xx>admin(system.snmp.traps) Description: Displays the SNMP traps submenu. The items available under this command are shown below. show Shows SNMP trap parameters. Sets SNMP trap parameters. Adds SNMP trap entries. delete Deletes SNMP trap entries. list Lists SNMP trap entries.
  • Page 520 8-178 AP-51xx Access Point Product Reference Guide AP51xx>admin(system.snmp.traps)> show Description: Shows SNMP trap parameters. Syntax: show trap Shows SNMP trap parameter settings. rate-trap Shows SNMP rate-trap parameter settings. Example: admin(system.snmp.traps)>show trap SNMP MU Traps mu associated : enable mu unassociated : disable mu denied association : disable...
  • Page 521 8-179 AP51xx>admin(system.snmp.traps)> set Description: Sets SNMP trap parameters. Syntax: set mu-assoc enable/disable Enables/disables the MU associated trap. mu-unassoc enable/disable Enables/disables the MU unassociated trap. mu-deny-assoc enable/disable Enables/disables the MU association denied trap. mu-deny-auth enable/disable Enables/disables the MU authentication denied trap. snmp-auth enable/disable Enables/disables the authentication failure trap.
  • Page 522 8-180 AP-51xx Access Point Product Reference Guide AP51xx>admin(system.snmp.traps)> add Description: Adds SNMP trap entries. Syntax: add v1v2 <ip> <port> <comm> <ver> Adds an entry to the SNMP v1/v2 access list with the destination IP address set to <ip>, the destination UDP port set to <port>, the community string set to <comm>...
  • Page 523 8-181 AP51xx>admin(system.snmp.traps)> delete Description: Deletes SNMP trap entries. Syntax: delete v1v2c <idx> Deletes entry <idx> from the v1v2c access control list. Deletes all entries from the v1v2c access control list. <idx> Deletes entry <idx> from the v3 access control list. Deletes all entries from the v3 access control list.
  • Page 524 8-182 AP-51xx Access Point Product Reference Guide AP51xx>admin(system.snmp.traps)> list Description: Lists SNMP trap entries. Syntax: list v1v2c Lists SNMP v1/v2c access entries. <idx> Lists SNMP v3 access entry <idx>. Lists all SNMP v3 access entries. Example: admin(system.snmp.traps)>add v1v2 203.223.24.2 162 mycomm v1 admin(system.snmp.traps)>list v1v2c ---------------------------------------------------------------------- index...
  • Page 525: System User Database Commands

    8-183 8.4.5 System User Database Commands AP51xx>admin(system)> userdb Description: Goes to the user database submenu. Syntax: user Goes to the user submenu. group Goes to the group submenu. save Saves the configuration to system flash. Goes to the parent menu. Goes to the root menu.
  • Page 526 8-184 AP-51xx Access Point Product Reference Guide 8.4.5.1 Adding and Removing Users from the User Databse AP51xx>admin(system.userdb)> user Description: Adds and remvoves users from the user database and defines user passwords. Syntax: Adds a new user. delete Deletes a new user. clearall Removes all existing user IDs from the system.
  • Page 527 8-185 AP51xx>admin(system.userdb.user)> add Description: Adds a new user to the user database. Syntax: Adds a new user to the user database. Example: admin(system.userdb.user>add george password admin(system.userdb.user> For information on configuring User Database permissions using the applet (GUI), see Defining User Access Permissions by Group on page 6-76.
  • Page 528 8-186 AP-51xx Access Point Product Reference Guide AP51xx>admin(system.userdb.user)> delete Description: Removes a new user to the user database. Syntax: delete Removes a new user to the user database. Example: admin(system.userdb.user>delete george admin(system.userdb.user> For information on configuring User Database permissions using the applet (GUI), see Defining User Access Permissions by Group on page 6-76.
  • Page 529 8-187 AP51xx>admin(system.userdb.user)>clearall Description: Removes all existing user IDs from the system. Syntax: clearall Removes all existing user IDs from the system. Example: admin(system.userdb.user>clearall admin(system.userdb.user> For information on configuring User Database permissions using the applet (GUI), see Defining User Access Permissions by Group on page 6-76.
  • Page 530 8-188 AP-51xx Access Point Product Reference Guide AP51xx>admin(system.userdb.user)>set Description: Sets a password for a user.. Syntax: <user> <pw> Sets a password for a specific user. Example: admin(system.userdb.user>set george password admin(system.userdb.user> For information on configuring User Database permissions using the applet (GUI), see Defining User Access Permissions by Group on page 6-76.
  • Page 531 8-189 8.4.5.2 Adding and Removing Groups from the User Databse AP51xx>admin(system.userdb)> group Description: Adds and remvoves groups from the user database. Syntax: create Creates a group name. delete Deletes a group name. clearall Removes all existing group names from the system. Adds a user to an existing group.
  • Page 532 8-190 AP-51xx Access Point Product Reference Guide AP51xx>admin(system.userdb.group> create Description: Creates a group name. Once defined, users can be added to the group. Syntax: create Creates a group name. Once defined, users can be added to the group. Example: admin(system.userdb.group>create 2 admin(system.userdb.group>...
  • Page 533 8-191 AP51xx>admin(system.userdb.group> delete Description: Deletes an existing group. Syntax: delete Deletes an existing group. Example: admin(system.userdb.group>delete 2 admin(system.userdb.group> For information on configuring User Database permissions using the applet (GUI), see Defining User Access Permissions by Group on page 6-76.
  • Page 534 8-192 AP-51xx Access Point Product Reference Guide AP51xx>admin(system.userdb.group> clearall Description: Removes all existing group names from the system. Syntax: clearall Removes all existing group names from the system. Example: admin(system.userdb.group>clearall admin(system.userdb.group> For information on configuring User Database permissions using the applet (GUI), see Defining User Access Permissions by Group on page 6-76.
  • Page 535 8-193 AP51xx>admin(system.userdb.group> add Description: Adds a user to an existing group. Syntax: <userid> <group> Adds a user <userid> to an existing group <group>. Example: admin(system.userdb.group>add lucy group x admin(system.userdb.group> For information on configuring User Database permissions using the applet (GUI), see Defining User Access Permissions by Group on page 6-76.
  • Page 536 8-194 AP-51xx Access Point Product Reference Guide AP51xx>admin(system.userdb.group> remove Description: Removes a user from an existing group. Syntax: remove <userid> <group> Removes a user <userid> from an existing group<group> . Example: admin(system.userdb.group>remove lucy group x admin(system.userdb.group> For information on configuring User Database permissions using the applet (GUI), see Defining User Access Permissions by Group on page 6-76...
  • Page 537 8-195 AP51xx>admin(system.userdb.group> show Description: Displays existing groups. Syntax: show Displays existing groups and users, users Displays configured user IDs for a group. groups Displays configured groups. Example: admin(system.userdb.group>show groups List of Group Names : engineering : marketing : demo room admin(system.userdb.group>...
  • Page 538: System Radius Commands

    8-196 AP-51xx Access Point Product Reference Guide 8.4.6 System Radius Commands AP51xx>admin(system)> radius Description: Goes to the Radius system submenu. Syntax: Goes to the EAP submenu. policy Goes to the access policy submenu. ldap Goes to the LDAP submenu. proxy Goes to the proxy submenu.
  • Page 539 8-197 AP51xx>admin(system.radius)> set/show Description: Sets or displays the Radius user database. Syntax: Sets the Radius user database. show all Displays the Radius user database. Example: admin(system.radius)>set database local admin(system.radius)>show all Database : local admin(system.radius)> For information on configuring Radius using the applet (GUI), see Configuring User Authentication on page 6-64.
  • Page 540 8-198 AP-51xx Access Point Product Reference Guide 8.4.6.1 AP51xx>admin(system.radius)> eap Description: Goes to the EAP submenu. Syntax: peap Goes to the Peap submenu. ttls Goes to the TTLS submenu. import Imports the requested EAP certificates. Defines EAP parameters. show Displays the EAP configuration. save Saves the configuration to system flash.
  • Page 541 8-199 AP51xx>admin(system.radius.eap)> peap Description: Goes to the Peap submenu. Syntax: Defines Peap parameters. show Displays the Peap configuration. save Saves the configuration to system flash. quit Quits the CLI. Goes to the parent menu. Goes to the root menu. For information on configuring PEAP Radius using the applet (GUI), see Configuring User Authentication on page 6-64.
  • Page 542 8-200 AP-51xx Access Point Product Reference Guide AP51xx>admin(system.radius.eap.peap> set/show Description: Defines and displays Peap parameters Syntax: Sets the Peap authentication <type>. show Displays the Peap authentication type. Example: admin(system.radius.eap.peap)>set auth gtc admin(system.radius.eap.peap)>show PEAP Auth Type : gtc For information on configuring EAP PEAP Radius values using the applet (GUI), see Configuring User Authentication on page 6-64.
  • Page 543 8-201 AP51xx>admin(system.radius.eap)> ttls Description: Goes to the TTLS submenu. Syntax: Defines TTLS parameters. show Displays the TTLS configuration. save Saves the configuration to system flash. quit Quits the CLI. Goes to the parent menu. Goes to the root menu. For information on configuring EAP TTLS Radius values using the applet (GUI), see Configuring User Authentication on page 6-64.
  • Page 544 8-202 AP-51xx Access Point Product Reference Guide AP51xx>admin(system.radius.eap.ttls> set/show Description: Defines and displays TTLS parameters Syntax: Sets the TTLS authentication <type>. show Displays the TTLS authentication type. Example: admin(system.radius.eap.ttls)>set auth pap admin(system.radius.eap.ttls)>show TTLS Auth Type : gtc For information on configuring EAP TTLS Radius values using the applet (GUI), see Configuring User Authentication on page 6-64.
  • Page 545 8-203 8.4.6.2 AP51xx>admin(system.radius)> policy Description: Goes to the access policy submenu. Syntax: Sets a group’s WLAN access policy. access-time Goes to the time based login submenu. show Displays the group’s access policy. save Saves the configuration to system flash. quit Quits the CLI.
  • Page 546 8-204 AP-51xx Access Point Product Reference Guide AP51xx>admin(system.radius.policy> set Description: Defines the group’s WLAN access policy. Syntax: <group name> Defines the group’s <group name> WLAN access policy (defined as a string). <wlan name> Example: admin(system.radius.policy)>set engineering 16 admin(system.radius.policy)> For information on configuring Radius WLAN policy values using the applet (GUI), see Configuring User Authentication on page 6-64.
  • Page 547 8-205 AP51xx>admin(system.radius.policy> access-time Description: set Goes to the time-based login submenu. Syntax: <group> Defines a target group’s access time permissions. Access time is in DayDDDD-DDDD format. <access-time> show Displays the group’s access time rule. save Saves the configuration to system flash. quit Quits the CLI.
  • Page 548 8-206 AP-51xx Access Point Product Reference Guide AP51xx>admin(system.radius.policy> show Description: Displays a group’s access policy. Syntax: show Displays a group’s access policy. Example: admin(system.radius.policy)>show List of Access Policies engineering : 16 marketing : 10 demo room test demo : No Wlans admin(system.radius.policy)>...
  • Page 549 8-207 8.4.6.3 AP51xx>admin(system.radius)> ldap Description: Goes to the LDAP submenu. Syntax: Defines the LDAP parameters. show all Displays existing LDAP parameters. save Saves the configuration to system flash. quit Quits the CLI. Goes to the parent menu. Goes to the root menu. For information on configuring a Radius LDAP server using the applet (GUI), see Configuring LDAP Authentication on page 6-67.
  • Page 550 8-208 AP-51xx Access Point Product Reference Guide AP51xx>admin(system.radius.ldap)> set Description: Defines the LDAP parameters. Syntax: Defines the LDAP parameters. ipadr Sets LDAP IP address. port Sets LDAP server port. binddn Sets LDAP bind distinguished name. basedn Sets LDAP base distinguished name. passwd Sets LDAP server password.
  • Page 551 8-209 AP51xx>admin(system.radius.ldap)> show all Description: Displays existing LDAP parameters. Syntax: show all Displays existing LDAP parameters. Example: admin(system.radius.ldap)>show all LDAP Server IP 0.0.0.0 LDAP Server Port LDAP Bind DN cn=manager, o=trion LDAP Base DN 0=trion LDAP Login Attribute (uid=%{Stripped-User-Name:-%{User-Name}}) LDAP Password attribute userPassword LDAP Group Name Attribue LDAP Group Membership Filter...
  • Page 552 8-210 AP-51xx Access Point Product Reference Guide 8.4.6.4 AP51xx>admin(system.radius)> proxy Description: Goes to the Radius proxy server submenu. Syntax: Adds a proxy realm. delete Deletes a proxy realm. clearall Removes all proxy server records. Sets proxy server parameters. show Displays current Radius proxy server parameters. save Saves the configuration to system flash.
  • Page 553 8-211 AP51xx>admin(system.radius.proxy)> add Description: Adds a proxy. Syntax: Adds a proxy realm. name <name> Realm name. <ip1> Authentication server IP address. port <port> Authentication server port. <sec> Shared secret password. Example: admin(system.radius.proxy)>add lancelot 157.235.241.22 1812 muddy admin(system.radius.proxy)> For information on configuring Radius proxy server values using the applet (GUI), see Configuring a Proxy Radius Server on page 6-70.
  • Page 554 8-212 AP-51xx Access Point Product Reference Guide AP51xx>admin(system.radius.proxy)> delete Description: Adds a proxy. Syntax: delete <name> Deletes a realm name. Example: admin(system.radius.proxy)>delete lancelot admin(system.radius.proxy)> For information on configuring Radius proxy server values using the applet (GUI), see Configuring a Proxy Radius Server on page 6-70.
  • Page 555 8-213 AP51xx>admin(system.radius.proxy)> clearall Description: Removes all proxy server records from the system. Syntax: clearall Removes all proxy server records from the system. Example: admin(system.radius.proxy)>clearall admin(system.radius.proxy)> For information on configuring Radius proxy server values using the applet (GUI), see Configuring a Proxy Radius Server on page 6-70.
  • Page 556 8-214 AP-51xx Access Point Product Reference Guide AP51xx>admin(system.radius.proxy)> set Description: Sets Radius proxy server parameters. Syntax: Sets Radius proxy server parameters. delay Defines retry delay time (in seconds) for the proxy server. count Defines retry count value for the proxy server. Example: admin(system.radius.proxy)>set delay 10 admin(system.radius.proxy)>set count 5...
  • Page 557 8-215 8.4.6.5 AP51xx>admin(system.radius)> client Description: Goes to the Radius client submenu. Syntax: Adds a Radius client to list of available clients. delete Deletes a Radius client from list of available clients. show Displays a list of configured clients. save Saves the configuration to system flash. quit Quits the CLI.
  • Page 558 8-216 AP-51xx Access Point Product Reference Guide AP51xx>admin(system.radius.client> add Description: Adds a Radius client to those available to the Radius server. Syntax: Adds a proxy. <ip> Client’s IP address. mask <ip1> Network mask address of the client. secret <sec> Shared secret password. Example: admin(system.radius.client)>add 157.235.132.11 255.255.255.225 muddy admin(system.radius.client)>...
  • Page 559 8-217 AP51xx>admin(system.radius.client> delete Description: Removes a specified Radius client from those available to the Radius server. Syntax: delete Removes a specified Radius client from those available to the Radius server Example: admin(system.radius.client)>delete 157.235.132.11 admin(system.radius.client)> For information on configuring Radius client values using the applet (GUI), see Configuring the Radius Server on page 6-64.
  • Page 560 8-218 AP-51xx Access Point Product Reference Guide AP51xx>admin(system.radius.client> show Description: Displays a list of configured Radius clients. Syntax: show Removes a specified Radius client from those available to the Radius server. Example: admin(system.radius.client)>show ---------------------------------------------------------------------------- Subnet/Host Netmask SharedSecret ---------------------------------------------------------------------------- 157.235.132.11 255.255.255.225 ***** admin(system.radius.client)>...
  • Page 561: System Network Time Protocol (Ntp) Commands

    8-219 8.4.7 System Network Time Protocol (NTP) Commands AP51xx>admin(system)> ntp Description: Displays the NTP menu. The correct network time is required for numerous functions to be configured accurately on the access point. Syntax: show Shows NTP parameters settings. date-zone Show date, time and time zone. zone-list Displays list of time zones.
  • Page 562 8-220 AP-51xx Access Point Product Reference Guide AP51xx>admin(system.ntp)> show Description: Displays the NTP server configuration. Syntax: show Shows all NTP server settings. Example: admin(system.ntp)>show current time (UTC) : 2006-07-31 14:35:20 Time Zone: ntp mode : enable preferred Time server ip : 203.21.37.18 preferred Time server port : 123...
  • Page 563 8-221 AP51xx>admin(system.ntp)> date-zone Description: Show date, time and time zone. Syntax: date-zone Show date, time and time zone. Example: date-zone admin(system.ntp)> Date/Time : Sat 1970-Jan-03 20:06:22 +0000 UTC Time Zone For information on configuring NTP using the applet (GUI), see Configuring Network Time Protocol (NTP) on page 4-43.
  • Page 564 8-222 AP-51xx Access Point Product Reference Guide AP51xx>admin(system.ntp)> zone-list Description: Displays an extensive list of time zones for countries around the world. Syntax: zone-list Displays list of time zone indexes for every known zone. Example: zone-list admin(system.ntp)> For information on configuring NTP using the applet (GUI), see Configuring Network Time Protocol (NTP) on page 4-43.
  • Page 565 8-223 AP51xx>admin(system.ntp)> set Description: Sets NTP parameters for access point clock synchronization. Syntax: set mode <ntp-mode> Enables or disables NTP. server <idx> <ip> Sets the NTP sever IP address. port <idx> <port> Defines the port number. intrvl <period> Defines the clock synchronization interval used between the access point and the NTP server in minutes (15 - 65535).
  • Page 566: System Log Commands

    8-224 AP-51xx Access Point Product Reference Guide 8.4.8 System Log Commands AP51xx>admin(system)> logs Description: Displays the access point log submenu. Logging options include: Syntax: show Shows logging options. Sets log options and parameters. view Views system log. delete Deletes the system log. send Sends log to the designated FTP Server.
  • Page 567 8-225 AP51xx>admin(system.logs)> show Description: Displays the current access point logging settings. Syntax: show Displays the current access point logging configuration. Example: admin(system.logs)>show log level : L6 Info syslog server logging : enable syslog server ip address : 192.168.0.102 For information on configuring logging settings using the applet (GUI), see Logging Configuration on page 4-47.
  • Page 568 8-226 AP-51xx Access Point Product Reference Guide AP51xx>admin(system.logs)> set Description: Sets log options and parameters. Syntax: level <level> Sets the level of the events that will be logged. All events with a level at or above <level> (L0-L7) will be saved to the system log. L0:Emergency L1:Alert L2:Critical...
  • Page 569 8-227 AP51xx>admin(system.logs)> view Description: Displays the access point system log file. Syntax: view Displays the entire access point system log file. Example: admin(system.logs)>view 7 16:14:00 (none) syslogd 1.4.1: restart (remote reception). 7 16:14:10 (none) klogd: :ps log:fc: queue maintenance 7 16:14:41 (none) klogd: :ps log:fc: queue maintenance 7 16:15:43 (none) last message repeated 2 times 7 16:16:01 (none) CC: 4:16pm...
  • Page 570 8-228 AP-51xx Access Point Product Reference Guide AP51xx>admin(system.logs)> delete Description: Deletes the log files. Syntax: delete Deletes the access point system log file. Example: admin(system.logs)>delete For information on configuring logging settings using the applet (GUI), see Logging Configuration on page 4-47.
  • Page 571 8-229 AP51xx>admin(system.logs)> send Description: Sends log and core file to an FTP Server. Syntax: send Sends the system log file via FTP to a location specified with the set command. Refer to the command set under the AP51xx>admin(config) command for information on setting up an FTP server and login information. Example: admin(system.logs)>send File transfer...
  • Page 572: System Configuration-Update Commands

    8-230 AP-51xx Access Point Product Reference Guide 8.4.9 System Configuration-Update Commands AP51xx>admin(system.config)> Description: Displays the access point configuration update submenu. Syntax: default Restores the default access point configuration. partial Restores a partial default access point configuration. show Shows import/export parameters. Sets import/export access point configuration parameters.
  • Page 573 8-231 AP51xx>admin(system.config)> default Description: Restores the full access point factory default configuration. Syntax: default Restores the access point to the original (factory) configuration. Example: admin(system.config)>default Are you sure you want to default the configuration? <yes/no>: For information on importing/exporting access point configurations using the applet (GUI), see Importing/Exporting Configurations on page 4-49.
  • Page 574 8-232 AP-51xx Access Point Product Reference Guide AP51xx>admin(system.config)> partial Description: Restores a partial factory default configuration. The access point’s LAN, WAN and SNMP settings are uneffected by the partial restore. Syntax: default Restores a partial access point configuration. Example: admin(system.config)>partial Are you sure you want to partially default AP-51xx? <yes/no>: For information on importing/exporting access point configurations using the applet (GUI), see Importing/Exporting Configurations on...
  • Page 575 8-233 AP51xx>admin(system.config)> show Description: Displays import/export parameters for the access point configuration file. Syntax: show Shows all import/export parameters. Example: admin(system.config)>show cfg filename : cfg.txt cfg filepath ftp/tftp server ip address : 192.168.0.101 ftp user name : myadmin ftp password : ******** For information on importing/exporting access point configurations using the applet (GUI), see Importing/Exporting Configurations on page...
  • Page 576 8-234 AP-51xx Access Point Product Reference Guide AP51xx>admin(system.config)> set Description: Sets the import/export parameters. Syntax: file <filename> Sets the configuration file name (1 to 39 characters in length). path <path> Defines the path used for the configuration file upload. server <ipaddress>...
  • Page 577 8-235 AP51xx>admin(system.config)> export Description: Exports the configuration from the system. Syntax: export Exports the access point configuration to the FTP server. Use the set command to set the server, user, password, and file name before using this command. tftp Exports the access point configuration to the TFTP server. Use the set command to set the IP address for the TFTP server before using the command.
  • Page 578 In turn, a dual-radio model access point cannot import/export its configuration to a single-radio access point. CAUTION Motorola discourages importing a 1.0 baseline configuration file to a 1.1 version access point. Similarly, a 1.1 baseline configuration file should not be imported to a 1.0 version access point.
  • Page 579: Firmware Update Commands

    8-237 8.4.10 Firmware Update Commands AP51xx>admin(system)>fw-update Description: Displays the firmware update submenu. The items available under this command are shown below. NOTE The access point must complete the reboot process to successfully update the device firmware, regardless of whether the reboot is conducted uing the GUI or CLI interfaces. show Displays the current access point firmware update settings.
  • Page 580 8-238 AP-51xx Access Point Product Reference Guide AP51xx>admin(system.fw-update)>show Description: Displays the current access point firmware update settings. Syntax: show Shows the current system firmware update settings for the access point. Example: admin(system.fw-update)>show automatic firmware upgrade : enable automatic config upgrade : enable firmware filename : APFW.bin...
  • Page 581 <name> Specifies a username for FTP server login (1 to 39 characters).. passwd <password> Specifies a password for FTP server login (1 to 39 characters).. Default is motorola. admin(system.fw-update)>set fw-auto enable admin(system.fw-update)>set cfg-auto enable admin(system.fw-update)>set file 2.0.0.0-29D admin(system.fw-update)>set path c:/fw admin(system.fw-update)>set server 157.235.111.22...
  • Page 582 8-240 AP-51xx Access Point Product Reference Guide AP51xx>admin(system.fw-update)>update Description: Executes the access point firmware update over the WAN or LAN port using either ftp or tftp. Syntax: update <mode><iface> Defines the ftp ot tftp mode used to conduct the firmware update. Specifies whether the update is executed over the access point’s WAN, LAN1 or LAN2 interface <iface>.
  • Page 583: Statistics Commands

    8-241 8.5 Statistics Commands AP51xx>admin(stats) Description: Displays the access point statistics submenu. The items available under this command are: show Displays access point WLAN, MU, LAN and WAN statistics. send-cfg-ap Sends a config file to another access point within the known AP table. send-cfg-all Sends a config file to all access points within the known AP table.
  • Page 584 8-242 AP-51xx Access Point Product Reference Guide AP51xx>admin(stats)> show Description: Displays access point system information. Syntax: show Displays stats for the access point WAN port. Displays stats for the access point LAN port Displays LAN Spanning Tree Status wlan Displays WLAN status and statistics summary. s-wlan Displays status and statistics for an individual WLAN radio...
  • Page 585 8-243 AP51xx>admin(stats)> send-cfg-ap Description: Copies the access point’s configuration to another access point within the known AP table. Syntax: send-cfg-ap <index> Copies the access point’s configuration to the access points within the known AP table. Mesh configuration attributes do not get copied using this command and must be configured manually. Example: admin(stats)>send-cfg-ap 2 admin(stats)>...
  • Page 586 8-244 AP-51xx Access Point Product Reference Guide AP51xx>admin(stats)> send-cfg-all Description: Copies the access point’s configuration to all of the access points within the known AP table. Syntax: send-cfg-all Copies the access point’s configuration to all of the access points within the known AP table. Example: admin(stats)>send-cfg-all admin(stats)>...
  • Page 587 8-245 AP51xx>admin(stats)> clear Description: Clears the specified statistics counters to zero to begin new data calculations. Syntax: clear Clears WAN statistics counters. Clears LAN statistics counters for specified LAN index (either clear lan 1 or clear lan 2). all-rf Clears all RF data. all-wlan Clears all WLAN summary information.
  • Page 588 8-246 AP-51xx Access Point Product Reference Guide AP51xx>admin(stats)> flash-all-leds Description: Starts and stops the illumination of a specified access point’s LEDs. Syntax: flash-all-leds <index> Defines the Known AP index number of the target AP to flash. <stop/start> Begins or terminates the flash activity. Example: admin(stats)>...
  • Page 589 8-247 AP51xx>admin(stats)> echo Description: Defines the echo test values used to conduct a ping test to an associated MU. Syntax: show Shows the Mobile Unit Statistics Summary. list Defines echo test parameters and result. Determines echo test packet data. start Begins echoing the defined station.
  • Page 590 8-248 AP-51xx Access Point Product Reference Guide AP51xx>admin.stats.echo)> show Description: Shows Mobile Unit Statistics Summary. Syntax: show Shows Mobile Unit Statistics Summary. Example: admin(stats.echo)>show ---------------------------------------------------------------------------- IP Address MAC Address WLAN Radio T-put Retries ---------------------------------------------------------------------------- 192.168.2.0 00:A0F8:72:57:83 demo For information on MU Echo and Ping tests using the applet (GUI), see Pinging Individual MUs on page 7-30.
  • Page 591 8-249 AP51xx>admin.stats.echo)> list Description: Lists echo test parameters and results. Syntax: list Lists echo test parameters and results. Example: admin(stats.echo)>list Station Address : 00A0F8213434 Number of Pings : 10 Packet Length : 10 Packet Data (in HEX) : 55 admin(stats.echo)> For information on MU Echo and Ping tests using the applet (GUI), see Pinging Individual MUs on page 7-30.
  • Page 592 8-250 AP-51xx Access Point Product Reference Guide AP51xx>admin.stats.echo)>set Description: Defines the parameters of the echo test. Syntax: station <mac> Defines MU target MAC address. request <num> Sets number of echo packets to transmit (1-539). length <num> Determines echo packet length in bytes (1-539). data <hex>...
  • Page 593 8-251 AP51xx>admin.stats.echo)> start Description: Initiates the echo test. Syntax: start Initiates the echo test. Example: admin(stats.echo)>start admin(stats.echo)>list Station Address : 00A0F843AABB Number of Pings : 10 Packet Length : 100 Packet Data (in HEX) Number of MU Responses For information on MU Echo and Ping tests using the applet (GUI), see Pinging Individual MUs on page 7-30.
  • Page 594 8-252 AP-51xx Access Point Product Reference Guide AP51xx>admin(stats)> ping Description: Defines the ping test values used to conduct a ping test to an AP with the same ESSID. Syntax: ping show Shows Known AP Summary details. list Defines ping test packet length. Determines ping test packet data.
  • Page 595 8-253 AP51xx>admin.stats.ping)> show Description: Shows Known AP Summary Details. Syntax: show Shows Known AP Summary Details. Example: admin(stats.ping)>show ---------------------------------------------------------------------------- IP Address MAC Address KBIOS Unit Name ---------------------------------------------------------------------------- 192.168.2.0 00:A0F8:72:57:83 access point...
  • Page 596 8-254 AP-51xx Access Point Product Reference Guide AP51xx>admin.stats.ping)> list Description: Lists ping test parameters and results. Syntax: list Lists ping test parameters and results. Example: admin(stats.ping)>list Station Address : 00A0F8213434 Number of Pings : 10 Packet Length : 10 Packet Data (in HEX) : 55 admin(stats.ping)>...
  • Page 597 8-255 AP51xx>admin.stats.ping)> set Description: Defines the parameters of the ping test. Syntax: station Defines the AP target MAC address. request Sets number of ping packets to transmit (1-539). length Determines ping packet length in bytes (1-539). data Defines the particular packet data. Example: admin(stats.ping)>set station 00A0F843AABB admin(stats.ping)>set request 10...
  • Page 598 8-256 AP-51xx Access Point Product Reference Guide AP51xx>admin.stats.echo)> start Description: Initiates the ping test. Syntax: start Initiates the ping test. Example: admin(stats.ping)>start admin(stats.ping)>list Station Address : 00A0F843AABB Number of Pings : 10 Packet Length : 100 Packet Data (in HEX) Number of AP Responses For information on Known AP tests using the applet (GUI), see Pinging Individual MUs on page...
  • Page 599: Chapter 9. Configuring Mesh Networking

    Configuring Mesh Networking 9.1 Mesh Networking Overview An AP-51xx can be configured in two modes to support the new mesh networking functionality. The access point can be set to a client bridge mode and/or a base bridge mode (which accepts connections from client bridges).
  • Page 600 A mesh network must use one of the two access point LANs. If intending to use the access point for mesh networking support, Motorola recommends configuring at least one WLAN (of the 16 WLANs available) specifically for mesh networking support.
  • Page 601: The Ap-51Xx Client Bridge Association Process

    MU traffic with its associated devices. CAUTION Only Motorola AP-5131 or AP-5181 model access points can be used as base bridges, client bridges or repeaters within an access point supported mesh network. If utilizing a mesh network, Motorola recommends considering a dual-radio model to optimize channel utilization and throughput.
  • Page 602: Client Bridge Configuration Process Example

    9.1.2 Spanning Tree Protocol (STP) The access point performs mesh networking using STP as defined in the 802.1d standard. NOTE The Motorola AP-4131 access point uses a non-standard form of 802.1d STP, and is therefore not compatible as a base bridge or client bridge within an access point managed network.
  • Page 603: Defining The Mesh Topology

    The user must be able to define one node as the root. Assigning a base bridge the lowest bridge priority defines it as the root. NOTE Motorola recommends using the Mesh STP Configuration screen to define a base bridge as a root.
  • Page 604: Normal Operation

    AP-51xx Access Point Product Reference Guide 9.1.5 Normal Operation Once the mesh network is defined, all normal access point operations are still allowed. MUs are still allowed to associate with the access point as usual. The user can create WLANs, security polices and VLANs as with any other access point.
  • Page 605 The user does not necessarily have to change these settings, as the default settings will work. However, Motorola encourages the user to define an access point as a base bridge and root (using the base bridge priority settings within the Bridge STP Configuration screen). Members of the mesh network can be configured as client bridges or additional base bridges with a higher priority value.
  • Page 606 (commonly referred to as the root). Motorola recommends assigning a Base Bridge AP with the lowest bridge priority so it becomes the root in the STP. If a root already exists, set the Bridge Priorities of new APs accordingly so the root of the STP doesn't get altered.
  • Page 607: Configuring A Wlan For Mesh Networking Support

    WLAN in order to share the same ESSID, radio designation, security policy, MU ACL and Quality of Service policy. If intending to use the access point for mesh networking support, Motorola recommends configuring at least one WLAN (of the 16 WLANs available) specifically for mesh networking support.
  • Page 608 WLAN that each access point will share when using this WLAN within their mesh network. Motorola recommends assigning a unique name to a WLAN supporting a mesh network to differentiate it from WLANs defined for non mesh support. The name assigned to the...
  • Page 609 Motorola also discourages user-based authentication schemes such as Kerberos and 802.1x EAP, as these authentication schemes are not supported within a...
  • Page 610 9-12 AP-51xx Access Point Product Reference Guide If none of the existing policies are suitable, select the Create button to the right of the Security Policy drop-down menu and configure a policy suitable for the mesh network. For information on configuring a security using the authentication and encryption techniques available to the access point, see Enabling Authentication and Encryption Schemes on page...
  • Page 611: Configuring The Access Point Radio For Mesh Support

    If a hacker tries to find an ESSID via an MU, the access point’s ESSID does not display since the ESSID is not in the beacon. Motorola recommends keeping the option enabled to reduce the likelihood of hacking into the WLAN.
  • Page 612 9-14 AP-51xx Access Point Product Reference Guide To configure the access point radio for mesh networking support: NOTE The dual-radio model access point affords users better optimization of the mesh network feature by allowing the access point to transmit to other access points (in base or client bridge mode) using one independent radio and transmit with its associated devices using the second independent radio.
  • Page 613 Configuring Mesh Networking 9-15 Radio Status MUs connected values update. If this is an existing radio within a mesh network, these values update in real-time. CAUTION If a radio is disabled, be careful not to accidentally configure a new WLAN, expecting the radio to be operating when you have forgotten it was disabled.
  • Page 614 WLAN (ESS) the client bridge uses to establish a wireless link. The default setting, is (WLAN1). Motorola recommends creating (and naming) a WLAN specifically for mesh networking support to differentiate the Mesh supported WLAN from non-Mesh supported WLANs.
  • Page 615 NOTE Auto link selection is based on the RSSI and load. The client bridge will select the best available link when the Automatic Link Selection checkbox is selected. Motorola recommends you do not disable this option, as (when enabled) the access point will select the best base bridge for connection.
  • Page 616 9-18 AP-51xx Access Point Product Reference Guide 12. Highlight a MAC address from the Preferred Base Bridge List and click the button to assign that device’s MAC address a higher priority and a greater likelihood of joining the mesh network if an association with another device is lost. If a MAC address is not desirable as others but still worthy of being on the preferred list, select it, and click the Down...
  • Page 617 Configuring Mesh Networking 9-19 Enabled If the mesh connection is down on one radio (radio 1), the other radio (radio 2) is brought down and stops beaconing after the timeout period (45 seconds). This allows the client bridge (radio 1) to roam without dropping the MU's associated to radio 2.
  • Page 618: Mesh Network Deployment - Quick Setup

    9-20 AP-51xx Access Point Product Reference Guide 9.3 Mesh Network Deployment - Quick Setup This section provides instructions on how to quickly setup and demonstrate mesh functionality using three access points. Two following two deployment scenarios will be addressed: • Scenario 1 - Two base bridges (redundant) and one client bridge •...
  • Page 619 Configuring Mesh Networking 9-21 AP#1 and AP#2 will be configured somewhat the same. However there are some important (yet subtle) differences. Therefore, the configuration of each access point will be described separately. 9.3.1.1 Configuring AP#1: 1. Provide a known IP address for the LAN1 interface. NOTE Enable the LAN1 Interface of AP#1 as a DHCP Server if you intend to associate MUs and require them to obtain an IP address via DHCP.
  • Page 620 9-22 AP-51xx Access Point Product Reference Guide 3. Define a mesh supported WLAN.
  • Page 621 Configuring Mesh Networking 9-23 4. Enable base bridge functionality on the 802.11a radio (Radio 2).
  • Page 622 9-24 AP-51xx Access Point Product Reference Guide 5. Define a channel of operation for the 802.11a radio.
  • Page 623 Configuring Mesh Networking 9-25 6. If needed, create another WLAN mapped to the 802.11bg radio if 802.11bg support is required for MUs on that 802.11 band.
  • Page 624 9-26 AP-51xx Access Point Product Reference Guide 9.3.1.2 Configuring AP#2 AP#2 can be configured the same as AP#1 with the following exceptions: • Assign an IP Address to the LAN1 Interface different than that of AP#1 • Assign a higher Mesh STP Priority 50000 to the AP#2 LAN1 Interface. NOTE In a typical deployment, each base bridge can be configured for a Mesh STP Priority of 50000.
  • Page 625: Configuring Ap#3

    Configuring Mesh Networking 9-27 9.3.1.3 Configuring AP#3 To define the configuration for AP#3 (a client bridge connecting to both AP#1 and AP#2 simultaneously): 1. Provide a known IP address for the LAN1 interface. 2. Assign the maximum value (65535) for the Mesh STP Priority.
  • Page 626 9-28 AP-51xx Access Point Product Reference Guide 3. Create a mesh supported WLAN with the Enable Client Bridge Backhaul option selected. NOTE This WLAN should not be mapped to any radio. Therefore, leave both of the “Available On” radio options unselected...
  • Page 627 Configuring Mesh Networking 9-29 4. Select the Client Bridge checkbox to enable client bridge functionality on the 802.11a radio. Use the Mesh Network Name drop-down menu to select the name of the WLAN created in step 3. NOTE You don't need to configure channel settings on the client bridge (AP#3). It automatically finds the base bridges (AP#1 and AP#2) and uses the channel assigned to them.
  • Page 628 9-30 AP-51xx Access Point Product Reference Guide 5. If needed, create another WLAN mapped to the 802.11bg radio if 802.11bg support is required for MUs on that 802.11 band. 9.3.1.4 Verifying Mesh Network Functionality for Scenario #1 You now have a three AP mesh network ready to demonstrate. Associate a single MU on each AP WLAN configured for 802.11bg radio support.
  • Page 629 Configuring Mesh Networking 9-31 9.3.2 Scenario 2 - Two Hop Mesh Network with a Base Bridge Repeater and a Client Bridge A conceptual illustration of scenario two is as follows: By default, the mesh algorithm runs an automatic link selection algorithm to determine the best possible active and redundant links.
  • Page 630: Configuring Ap#1

    9-32 AP-51xx Access Point Product Reference Guide 9.3.2.1 Configuring AP#1 The setup of AP#1 within this usage scenario is exactly the same as the AP#1 configuration within Scenario 1 - Two Base Bridges and One Client Bridge for step by step instructions for configuring AP#1, see Configuring AP#1: on page 9-21.
  • Page 631: Configuring Ap#3

    Configuring Mesh Networking 9-33 2. Enable client and base bridge functionality on the 802.11a radio 9.3.2.3 Configuring AP#3 To define AP #3’s configuration: 1. The only change needed on AP#3 (with respect to the configuration used in scenario #1), is to disable the Auto Link Selection option.
  • Page 632 9-34 AP-51xx Access Point Product Reference Guide 2. Add the 802.11a Radio MAC Address. In scenario #2, the mesh WLAN is mapped to BSS1 on the 802.11a radio if each AP. The Radio MAC Address (the BSSID#1 MAC Address) is used for the AP#2 Preferred Base Bridge List.
  • Page 633 Configuring Mesh Networking 9-35 3. Determine the Radio MAC Address and BSSID MAC Addresses.
  • Page 634: Verifying Mesh Network Functionality For Scenario #2

    9-36 AP-51xx Access Point Product Reference Guide 9.3.2.4 Verifying Mesh Network Functionality for Scenario #2 You now have a three AP demo multi-hop mesh network ready to demonstrate. Associate an MU on the WLANs configured on the 802.11bg radio for each AP and pass traffic among the members of the mesh network.
  • Page 635: Mesh Networking Frequently Asked Questions

    Configuring Mesh Networking 9-37 9.4 Mesh Networking Frequently Asked Questions The following scenarios represent issues that could be encountered and resolved when defining an AP-5131 or AP-5181 mesh configuration: Mesh Deployment Issue 1 - Client Bridge can only connect to one of two Base Bridges You have two access points configured as base bridges (AP1, AP2) and one access point defined as a as a client bridge (AP3).
  • Page 636 Can I use secure beacons on the mesh backhaul supported WLAN? Resolution Yes, you can enable a secure beacon on a mesh backhaul supported WLAN. In fact, it is a Motorola recommended practice. Mesh Deployment Issue 6 - Is my mesh topology complete?
  • Page 637 Configuring Mesh Networking 9-39 Resolution Yes, both the AP-5131 and AP-5181 model access points are identical from a software deployment standpoint. so it is a supported configuration for AP-5131s and AP-5181s to exist in a single topology. Mesh Deployment Issue 9 - Can I mesh between and an access point and an AP300? Can you mesh between a AP-5131, AP-5181 and an AP300 model access port? Resolution No, an AP300 does not support mesh networking.
  • Page 638 9-40 AP-51xx Access Point Product Reference Guide each one of them. If you don’t, the base bridge configuration file could get applied on a client bridge or repeater and you will loose connectivity to that AP. Mesh Deployment Issue 13 - Why do I lose connectivity when updating configurations? When I make a configuration change and apply the changes on a client bridge or repeater, I momentarily loose connectivity to that AP, why?
  • Page 639: Chapter 10. Adaptive Ap

    An adaptive AP (AAP) is an AP-51XX access point that can adopt like an AP300 (L3). The management of an AAP is conducted by the switch, once the access point connects to a Motorola WS5100, RFS6000 or RFS7000 model switch and receives its AAP configuration.
  • Page 640: Where To Go From Here

    10-2 AP-51xx Access Point Product Reference Guide The benefits of an AAP deployment include: • Centralized Configuration Management & Compliance - Wireless configurations across distributed sites can be centrally managed by the wireless switch or cluster. • WAN Survivability - Local WLAN services at a remote sites are unaffected in the case of a WAN outage.
  • Page 641: Adaptive Ap Management

    Adaptive AP 10-3 10.1.2 Adaptive AP Management An AAP can be adopted, configured and managed like a thin access port from the wireless switch. NOTE To support AAP functionality, a WS5100 model switch must be running firmware version 3.1 or higher, whereas a RFS6000 or RFS7000 model switch must be running firmware version 1.1 or higher.
  • Page 642: Licensing

    10-4 AP-51xx Access Point Product Reference Guide 10.1.4 Licensing An AAP uses the same licensing scheme as a thin access port. This implies an existing license purchased with a switch can be used for an AAP deployment. Regardless of how many AP300 and/or AAPs are deployed, you must ensure the license used by the switch supports the number of radio ports (both AP300s and AAPs) you intend to adopt.
  • Page 643: Manual Adoption Configuration

    Adaptive AP 10-5 ** The AP-51xx uses an encryption key to hash passphrases and security keys. To obtain the encryption passphrase, configure an AP-51xx with the passphrase and export the configuration file. 10.1.5.2 Manual Adoption Configuration A manual switch adoption of an AAP can be conducted using: •...
  • Page 644: Securing A Configuration Channel Between Switch And Ap

    10-6 AP-51xx Access Point Product Reference Guide 10.1.6 Securing a Configuration Channel Between Switch and AP Once an access point obtains a list of available switches, it begins connecting to each. The switch can be either on the LAN or WAN side of the access point to provide flexibility in the deployment of the network.
  • Page 645: Adaptive Ap Switch Failure

    Adaptive AP 10-7 To review a sample AAP configuration, see Sample Switch Configuration File for IPSec and Independent WLAN on page 10-20. 10.1.10 Adaptive AP Switch Failure In the event of a switch failure, an AAP's independent WLAN continues to operate without disruption. The AAP attempts to connect to other switches (if available) in background.
  • Page 646 10-8 AP-51xx Access Point Product Reference Guide before MUs can pass traffic. This typically takes about 90 to 180 seconds depending on the size of the mesh topology. NOTE When mesh is used with AAPs, the "ap-timeout" value needs to be set to a higher value (for example, 180 seconds) so Mesh AAPs remain adopted to the switch during the period when the configuration is applied and mesh links are re-established.
  • Page 647: Supported Adaptive Ap Topologies

    LAN1. If the WAN Interface is used, explicitly configure WAN as the default gateway interface. • Motorola recommends using the LAN1 interface for adoption in multi-cell deployments. • If you have multiple independent WLANs mapped to different VLANs, the AAP's LAN1 interface requires trunking be enabled with the correct management and native VLAN IDs configured.
  • Page 648: Extended Wlans Only

    10-10 AP-51xx Access Point Product Reference Guide 10.2.2 Extended WLANs Only An extended WLAN configuration forces all MU traffic through the switch. No wireless traffic is locally bridged by the AAP. Each extended WLAN is mapped to the access point's virtual LAN2 subnet. By default, the access point's LAN2 is not enabled and the default configuration is set to static with IP addresses defined as all zeros.
  • Page 649: Extended Wlan With Mesh Networking

    Converting an AP-5131 or AP-5181 model access point into an AAP requires: • A version 2.0 or higher firmware running on the access point. • A Motorola WS5100 (running firmware version 3.1 or later) or a RFS6000/RFS7000 (running firmware version 1.1 or later) switch.
  • Page 650 Adaptive AP Configuration on page 10-13. Configuring the Switch for Adaptive AP Adoption The tasks described below are configured on a Motorola WS5100 or a RFS6000/RFS7000 model switch. For information on configuring the switch for AAP support, see http://support.symbol.com/support/product/manuals.do. To adopt an AAP on a switch: 1.
  • Page 651: Establishing Basic Adaptive Ap Connectivity

    Adaptive AP 10-13 10.4 Establishing Basic Adaptive AP Connectivity This section defines the activities required to configure basic AAP connectivity with a WS5100, RFS6000 or RFS7000 model switch. In establishing a basic AAP connection, both the access point and switch require modifications to their respective default configurations. For more information, see: •...
  • Page 652 10-14 AP-51xx Access Point Product Reference Guide 2. Select the Auto Discovery Enable checkbox. Enabling auto discovery will allow the AAP to be detected by a switch once its connectivity medium has been configured (by completing steps 3-6) 3. Enter up to 12 Switch IP Addresses constituting the target switches available for AAP connection.
  • Page 653: Adopting An Adaptive Ap Using A Configuration File

    Adaptive AP 10-15 7. Click Apply to save the changes to the AAP setup. NOTE The manual AAP adoption described above can also be conducted using the access point’s CLI interface using the admin(system.aapsetup)> command. 10.4.1.2 Adopting an Adaptive AP Using a Configuration File To adopt an AAP using a configuration file: 1.
  • Page 654: Switch Configuration

    10-16 AP-51xx Access Point Product Reference Guide 10.4.2 Switch Configuration Both a WS5100 (running firmware version 3.1 or later) or a RFS6000/RFS7000 (running firmware version 1.1 or later) require an explicit adaptive configuration to adopt an access point (if IPSec is not used for adoption).
  • Page 655 Adaptive AP 10-17 5. Select the target WLAN you would like to use for AAP support from those displayed and click Edit button. 6. Select the Independent Mode (AAP Only) checkbox. Selecting the checkbox designates the WLAN as independent and prevents traffic from being forwarded to the switch.
  • Page 656 10-18 AP-51xx Access Point Product Reference Guide Once an AAP is adopted by the switch, it displays within the switch Access Port Radios screen (under the Network parent menu item) as an AP-5131 or AP-5181 within the AP Type column.
  • Page 657: Adaptive Ap Deployment Considerations

    Adaptive AP 10-19 10.4.3 Adaptive AP Deployment Considerations Before deploying your switch/AAP configuration, refer to the following usage caveats to optimize its effectiveness: • If deploying the access point as an AAP with a remote layer 3 configuration and the AAP is set for switch auto discovery (primary/standby), the access point will un-adopt from its switch after a few moments.
  • Page 658: Sample Switch Configuration File For Ipsec And Independent Wlan

    10-20 AP-51xx Access Point Product Reference Guide 10.4.4 Sample Switch Configuration File for IPSec and Independent WLAN The following constitutes a sample RFS7000 switch configuration file supporting an AAP IPSec with Independent WLAN configuration. Please note new AAP specific CLI commands in and relevant comments in blue.
  • Page 659 Adaptive AP 10-21 snmp-server manager v2 snmp-server manager v3 snmp-server user snmptrap v3 encrypted auth md5 0x7be2cb56f6060226f15974c936e2739b snmp-server user snmpmanager v3 encrypted auth md5 0x7be2cb56f6060226f15974c936e2739b snmp-server user snmpoperator v3 encrypted auth md5 0x49c451c7c6893ffcede0491bbd0a12c4 To configure the passkey for a Remote VPN Peer - 255.255.255.255 denotes all AAPs. 12345678 is the default passkey.
  • Page 660 10-22 AP-51xx Access Point Product Reference Guide wlan 4 enable wlan 4 ssid qs5-open wlan 4 vlan 230 wlan 5 enable wlan 5 ssid Mesh wlan 5 vlan 111 wlan 5 encryption-type ccmp wlan 5 dot11i phrase 0 Symbol123 To configure a WLAN as an independent WLAN wlan 5 independent wlan 5 client-bridge-backhaul enable wlan 6 enable...
  • Page 661 Adaptive AP 10-23 radio 4 bss 2 6 radio 4 channel-power indoor 48 4 radio 4 rss enable radio 4 client-bridge bridge-select-mode auto radio 4 client-bridge ssid Mesh radio 4 client-bridge mesh-timeout 0 radio 4 client-bridge enable radio default-11a rss enable radio default-11bg rss enable radio default-11b rss enable no ap-ip default-ap switch-ip...
  • Page 662 10-24 AP-51xx Access Point Product Reference Guide interface ge3 switchport mode trunk switchport trunk native vlan 1 switchport trunk allowed vlan none switchport trunk allowed vlan add 1-9,100,110,120,130,140,150,160,170, switchport trunk allowed vlan add 180,190,200,210,220,230,240,250, static-channel-group 1 interface ge4 switchport access vlan 1 interface me1 ip address dhcp interface sa1...
  • Page 663 Adaptive AP 10-25 line con 0 line vty 0 24...
  • Page 664 10-26 AP-51xx Access Point Product Reference Guide...
  • Page 665: Appendix A. Technical Specifications

    Technical Specifications This appendix provides technical specifications in the following areas: • Physical Characteristics • Electrical Characteristics • Radio Characteristics • Antenna Specifications • Country Codes A.1 Physical Characteristics For more information, see: • AP-5131 Physical Characteristics • AP-5181 Physical Characteristics...
  • Page 666: Ap-5131 Physical Characteristics

    AP-51xx Access Point Product Reference Guide A.1.1 AP-5131 Physical Characteristics The AP-5131 has the following physical characteristics: Dimensions 5.32 inches long x 9.45 inches wide x 1.77 inches thick. 135 mm long x 240 mm wide x 45 mm thick. Housing Metal, Plenum Housing (UL2043) Weight...
  • Page 667: Ap-5181 Physical Characteristics

    Technical Specifications A.1.2 AP-5181 Physical Characteristics The AP-5181 has the following physical characteristics: Dimensions 12 inches long x 8.25 inches wide x 3.5 inches thick. Housing Aluminum Weight 4 lbs. Operating -30 to 55° Celsius Temperature Storage Temperature -40 to 85° Celsius Altitude 8,000 feet/2438 m @ 28°...
  • Page 668: Electrical Characteristics

    Both the AP-5131 and the AP-5181 access points have the following electrical characteristics: CAUTION An AP-5181 model access point cannot use the AP-5131 recommended Motorola 48-Volt Power Supply (Part No. 50-14000- 243R). However, Motorola does recommend the AP-PSBIAS-5181-01R model power supply for use the AP-5181.
  • Page 669: Antenna Specifications

    AP-5181 model access point. CAUTION Using an antenna other than the Dual-Band Antenna (Part No. ML-2452-APA2-01) could render the AP-5131’s Rogue AP Detector Mode feature inoperable. Contact your Motorola sales associate for specific information. A.4.1.1 2.4 GHz Antenna Matrix The following table describes each 2.4 GHz antenna approved for use with the AP-5131.
  • Page 670: Ghz Antenna Matrix

    Antenna ML-2452-APA2-01 Dual-Band A.4.1.3 AP-5131 Additional Antenna Components The following table lists the Motorola part number for various antenna accessories. This table also includes the loss for each accessory at both 2.4 and 5 GHz. Loss (db) Loss (db) Item...
  • Page 671: Ap-5181 Antenna Specifications

    Technical Specifications Item Connector1 Connector2 Length (meters) Cable Type LAK1 RPBNC-F 0.305 RG-58 LAK2 10JK 3.05 RG-8 25JK 7.62 RG-8 50JK 15.24 RG-8 100JK 30.48 RG-8 A.4.2 AP-5181 Antenna Specifications The AP-5181 2.4 GHz antenna suite includes the following models: Nominal Net Gain Part Number Antenna Type...
  • Page 672 AP-51xx Access Point Product Reference Guide The AP-5181 5 GHz antenna suite includes the following models: Nominal Net Gain Part Number Antenna Type (dBi) Description ML-5299-FHPA6-01R Omni-Directional Antenna 4.900-5.850 GHz, Type N connector, no pigtail ML-5299-FHPA10-01R Omni-Directional Antenna 10.0 5.8 GHz, Type N connector, no pigtail...
  • Page 673: Country Codes

    Technical Specifications A.5 Country Codes The following list of countries and their country codes is useful when using the access point configuration file, CLI or the MIB to configure the access point: Country Code Country Code Argentina Mexico Australia Montenegro Austria Morocco Bahamas...
  • Page 674 A-10 AP-51xx Access Point Product Reference Guide Cypress Serbia Czech Rep. Singapore Denmark Slovak Republic Dominican Republic Slovenia Ecuador South Africa El Salvador South Korea Estonia Spain Egypt Sri Lanka Falkland Islands Sweden Finland Switzerland France Taiwan Germany Thailand Greece Trinidad and Tobago Guam Turkey...
  • Page 675 Technical Specifications A-11 Japan Jordan Kazakhstan Kuwait Latvia Lebanon Liechtenstein Lithuania Luxembourg Macedonia Malaysia Malta Martinique...
  • Page 676 A-12 AP-51xx Access Point Product Reference Guide...
  • Page 677: Appendix B. Usage Scenarios

    Usage Scenarios This appendix provides practical usage scenarios for many of the access point’s key features. This information should be referenced as a supplement to the information contained within this Product Reference Guide. The following scenarios are described: • Configuring Automatic Updates using a DHCP or Linux BootP Server •...
  • Page 678: Windows - Dhcp Server Configuration

    (01) when making a comparison. Change the last two characters to update the configuration. The two characters can be alpha-numeric. NOTE A Motorola AP-5181 model access point does not support firmware prior to version 1.1.1.x.
  • Page 679 To configure the DHCP Server for automatic updates: 1. Set the Windows DHCP Server and access point on the same Ethernet segment. 2. Configure the Windows based DHCP Server as follows: a. Highlight the Server Domain Name (for example, apfw.motorola.com). From the Action menu, select Define Vendor Classes.
  • Page 680: Global Options - Using Extended/Standard Options

    To configure Global options using extended/standard options: 1. Set the Windows DHCP Server and access point on the same Ethernet segment. 2. Configure the Windows based DHCP Server as follows: a. Highlight the Server Domain Name (for example, apfw.motorola.com). From the Action menu, select Set Predefined Options.
  • Page 681: Dhcp Priorities

    Usage Scenarios Standard Options Code Data type Access point Firmware File Name String NOTE If using Standard Options and the configuration of the access point needs to be changed, use option 129 or 188 as specified in the Extended Options table.
  • Page 682: Linux - Bootp Server Configuration

    AP-51xx Access Point Product Reference Guide -------------------------------------------------------------------------------------------- If the DHCP Server is configured for options 186 and 66 (to assign TFTP Server IP addresses) the access point uses the IP address configured for option 186. Similarly, if the DHCP Server is configured for options 187 and 67 (for the firmware file) the access point uses the file name configured for option 187.
  • Page 683 Usage Scenarios B.1.2.1 BootP Options This section contains instructions for the automatic update of the access point firmware and configuration file using a BootP Server. The setup example described in this section includes: • 1 AP-5131 or AP-5181 model access point •...
  • Page 684 AP-51xx Access Point Product Reference Guide Using options sa, bf and 136: AP-5131:ha=00a0f88aa6d8\ < LAN M AC Address> :sm =255.255.255.0\ <Subnet M ask> :ip=157.235.93.128\ <IP A ddress> :gw =157.235.93.2\ <gatew ay> :sa=157.235.93.250\ <TFTP Server IP> :bf=/tftpboot/cfg.txt\ <Configuration file> :T136=”/tftpboot/”: <TFTP root directory> NOTE The bf option prefixes a forward slash (/) to the configuration file name.
  • Page 685: Bootp Priorities

    Usage Scenarios NOTE If the firmware files are the same, the firmware will not get updated. If the configuration file name matches the last used configuration file on the access point or if the configuration file versions are the same, the access point configuration will not get updated.
  • Page 686: Configuring A Vpn Tunnel Between Two Access Points

    B-10 AP-51xx Access Point Product Reference Guide • Frequently Asked VPN Questions B.2.1 Configuring a VPN Tunnel Between Two Access Points The access point can connect to a non-AP device supporting IPSec, such as a Cisco VPN device - labeled as "Device #2". For this usage scenario, the following components are required: •...
  • Page 687 Usage Scenarios B-11 5. Enter the WAN port IP address of AP #1 for the Local WAN 6. Within the Remote Subnet Remote Subnet Mask fields, enter the LAN IP subnet and mask of AP #2 /Device #2. 7. Enter the WAN port IP address of AP #2/ Device #2 for a Remote Gateway.
  • Page 688 B-12 AP-51xx Access Point Product Reference Guide 13. Select Pre Shared Key (PSK) from the IKE Authentication Mode drop-down menu. 14. Enter a Passphrase. Passphrases must match on both VPN devices. NOTE Ensure the IKE authentication Passphrase is the same as the Pre-shared key on the Cisco PIX device.
  • Page 689: Configuring A Cisco Vpn Device

    Usage Scenarios B-13 B.2.2 Configuring a Cisco VPN Device This section includes general instructions for configuring a Cisco PIX Firewall 506 series device. For the usage scenario described in this section, you will require the following: • 1 Cisco VPN device •...
  • Page 690: Frequently Asked Vpn Questions

    B-14 AP-51xx Access Point Product Reference Guide B.2.3 Frequently Asked VPN Questions The following are common questions that arise when configuring a VPN tunnel. • Question 1: Does the access point IPSec tunnel support multiple subnets on the other end of a VPN concentrator? Yes.
  • Page 691 Usage Scenarios B-15 • Question 3: Can the AP be accessed via its LAN interface of AP#1 from the local subnet of AP#2 and vice versa? Yes. • Question 4: Will the default "Manual Key Exchange" settings work without making any changes? No.
  • Page 692 B-16 AP-51xx Access Point Product Reference Guide Yes. Only packets that match the VPN Tunnel Settings will be sent through the VPN tunnel. All other packets will be handled by whatever firewall rules are set. • Question 8: How do I specify which certificates to use for an IKE policy from the access point certificate manager? When generating a certificate to use with IKE, use one of the following fields: address,...
  • Page 693 Usage Scenarios B-17 • Question 9: I am using a direct cable connection between my two VPN gateways for testing and cannot get a tunnel established, yet it works when I set them up across another network or router. Why? The packet processing architecture of the access point VPN solution requires the WAN default gateway to work properly.
  • Page 694 B-18 AP-51xx Access Point Product Reference Guide • Verify you can ping each of the remote Gateway IP addresses from clients on either side. Failed pings can indicate general network connection problems. • Pinging the internal gateway address of the remote subnet should run the ping through the tunnel as well.
  • Page 695 Usage Scenarios B-19 <WAN IP address> Transport Scr port 1:65535 Dst port Rev NAT None These three rules should be configured above all other rules (default or user defined). When Advanced LAN Access is used, certain inbound/outbound rules need to be configured to control incoming/outgoing packet flow for IPSec to work properly (with Advanced LAN Access).
  • Page 696: Replacing An Ap-4131 With An Ap-5131 Or Ap-5181

    B-20 AP-51xx Access Point Product Reference Guide B.3 Replacing an AP-4131 with an AP-5131 or AP-5181 The access point’s modified default configuration enables an AP-5131or AP-5181 to not only operate in a single-cell environment, but also function as a replacement for legacy AP-4131 model access points.
  • Page 697: Appendix C. Customer Support

    Support Central provides our customers with a wealth of information and online assistance including developer tools, software downloads, product manuals and online repair requests. When contacting the Motorola Support Center, please provide the following information: • serial number of unit • model number or product name...
  • Page 698 North American Contacts Support (for warranty and service information): telephone: 1-800-653-5350 fax: (631) 738-5410 Email: emb.support@motorola.com International Contacts Outside North America: Motorola, inc. Symbol Place Winnersh Triangle, Berkshire, RG41 5TP United Kingdom 0800-328-2424 (Inside UK) +44 118 945 7529 (Outside UK)
  • Page 699 Customer Support Web Support Sites Product Downloads http://support.symbol.com/support/product/softwaredownloads.do Manuals http://support.symbol.com/support/product/manuals.do Additional Information Obtain additional information by contacting Motorola at: 1-800-722-6234, inside North America +1-516-738-5200, in/outside North America http://www.motorola.com/...
  • Page 700 AP-51xx Access Point Product Reference Guide...
  • Page 701: Index

    Index AP-5131-13041-WW ......2-2 AP-5131-13042-WW ......2-2 access options .
  • Page 702 IN-6 AP-51xx Access Point Product Reference Guide Command Line Interface (CLI) configuration ......1-21 bandwidth management .
  • Page 703 IN-7 MIB......... 3-3 ML-2499-11PNA2-01 .
  • Page 704 IN-8 AP-51xx Access Point Product Reference Guide SNMP, v3 user definitions ..... .4-27 statistics, AP-5131 ......7-33 QoS support .
  • Page 705 IN-9 WLAN, editing ....... 5-30 WLAN, enabling......5-27 wall mounting .
  • Page 706 IN-10 AP-51xx Access Point Product Reference Guide...
  • Page 708 MOTOROLA INC. 1303 E. ALGONQUIN ROAD SCHAUMBURG, IL 60196 http://www.motorola.com 72E-113664-01 Revision A July 2008...

Table of Contents