background image

Professional Access Point 

Administrator Guide

Class and Field Reference - 268

Valid values

Netmask in dotted-decimal notation.

status

Purpose

Controls whether this is on or off.

Valid values

"up" or "down".

type

Purpose

The type of the interface. Used to determine what additional fields are available. Read-only.

Valid values

"service-set", "bridge", "vlan", "wds", "pptp", "pppoe".

description

Purpose

A human-readable description of the interface.

Valid values

an ASCII string.

mac

Purpose

The MAC address of the interface.

Valid values

  6 colon-separated hexadecimal digit pairs.

static-ip

Purpose

The static IP address of this interface. Used when DHCP is not in use.

Valid values

IP address.

static-mask

Purpose

The static netamsk of this interface. Used when DHCP is not in use.

Valid values

Netmask in dotted-decimal notation.

rx-bytes

Purpose

Received bytes.

Valid values

Integer.

rx-packets

Purpose

Received packets.

Valid values

Integer.

rx-errors

Purpose

Received packets with errors.

Valid values

Integer.

Summary of Contents for Instant802 APSDK

Page 1: ...Professional Access Point Administrator Guide R46 1224 00 rev 2 0 07 06...

Page 2: ......

Page 3: ...ou are unable to locate a copy please contact USRobotics and a copy will be provided to you UNITED STATES GOVERNMENT LEGEND If you are a United States government agency then this documentation and the...

Page 4: ...Professional Access Point Administrator Guide iv...

Page 5: ...wer 24 Step 3 Run the Detection Utility to find access points on the network 26 Step 4 Log on to the Web User Interface 30 Step 5 Configure Basic Settings and start the wireless network 31 Wall Mounti...

Page 6: ...Line Interface Class Structure Commands and Examples 177 Comparison of Settings Configurable with the CLI and Web User Interface 178 How to Access the CLI for an Access Point 181 Quick View of Command...

Page 7: ...e 295 U S Robotics Corporation Two 2 Year Limited Warranty 299 1 0 GENERAL TERMS 299 2 0 CUSTOMER OBLIGATIONS 299 3 0 OBTAINING WARRANTY SERVICE 300 4 0 WARRANTY REPLACEMENT 300 5 0 LIMITATIONS 301 6...

Page 8: ...Professional Access Point Administrator Guide viii...

Page 9: ...ll to medium business information technology infrastructure Online Help Features Online Help for the Professional Access Point Web User Interface provides information about all fields and features ava...

Page 10: ...blue and underscored this document contains links to related sections and to glossary terms Whenever your cursor turns into the pointing hand a single click will take you to the referenced topic A Ca...

Page 11: ...and medium sized businesses The Professional Access Point enables zero administration wireless local area network WLAN deployment while providing state of the art wireless networking features The Prof...

Page 12: ...lity of Service QoS for enhanced throughput and better performance of time sensitive wireless traffic like Video Audio Voice over IP VoIP and streaming media The Professional Access Point QoS is Wi Fi...

Page 13: ...not require manual intervention but is under the control of the administrator Single universal view of clustered access points and cluster configuration settings Configuration for all access points in...

Page 14: ...ent associations transmit receive statistics and event log Link integrity monitoring to continually verify connection to the client regardless of network traffic activity levels Reset configuration op...

Page 15: ...e Access Point Does Not Provide Administrator s Computer Wireless Client Computers Understanding Dynamic and Static IP Addressing on the Professional Access Point How Does the Access Point Obtain an I...

Page 16: ...None Time Protocol on page 161 IP Address 192 168 1 10 The default IP address is used if you do not use a Dynamic Host Configuration Protocol DHCP server You can assign a new static IP address through...

Page 17: ...n page 129 Rate Sets Mbps Basic Advertised IEEE 802 1g 11 5 5 2 1 IEEE 802 1b 2 1 Radio on page 129 Broadcast SSID Allow Broadcast SSID Station Isola tion and Security Mode on page 107 in Security on...

Page 18: ...the first access point on your new wireless network you can make subsequent configuration changes through the Web User Interface using a wireless connection to the internal network For wireless conne...

Page 19: ...ion Utility see Step 3 Run the Detec tion Utility to find access points on the network on page 26 under Setting Up and Launching Your Wireless Network CD ROM Drive The administrator s computer must ha...

Page 20: ...ge 26 Dynamic IP Addressing The Professional Access Point generally expects that a DHCP server is running on the network where the access point is deployed Most business networks already have DHCP ser...

Page 21: ...e field and related fields in Configuring Internal Interface Ethernet Settings on page 93 Recovering an IP Address If you experience trouble communicating with the access point you can recover a Stati...

Page 22: ...Professional Access Point Administrator Guide Pre Launch Checklist Default Settings and Supported Administrator Client Platforms 22...

Page 23: ...Connect the access point to network and power Step 3 Run the Detection Utility to find access points on the network Step 4 Log on to the Web User Interface Step 5 Configure Basic Settings and start th...

Page 24: ...vices on the network A standard hub should work fine Some switches however do not allow directed or subnet broadcasts through You may have to configure the switch to allow directed broadcasts For init...

Page 25: ...configure an access point for controlled guest access to the network The same access point can function as a bridge for two different Note to UK Users Replace the plug on the power adapter with the UK...

Page 26: ...ted to the same network as your access points and use it to step through the discovery process as follows 1 Insert the Installation CD ROM into the CD ROM drive on your computer and select Setup from...

Page 27: ...rogram to access your network If network access is blocked the Detection Utility cannot find your access point The Detection Utility Welcome screen is displayed 2 Click Next to search for access point...

Page 28: ...splayed on this screen Verify the MAC addresses shown here against the Professional Access Point s LAN MAC address You can find the LAN MAC on the label on the bottom of the access point This will be...

Page 29: ...ssional Access Point Administrator Guide Setting Up and Launching Your Wireless Network 29 Click Next 4 Go to the Access Point Web User Interface by clicking the link provided on the Detection Utility...

Page 30: ...irst log in the Basic Settings page for Professional Access Point administration is displayed These are global settings for all access points that are members of the cluster and if automatic configura...

Page 31: ...These settings are all available on the Basic Settings page of the Web User Interface and are categorized into steps 1 4 on the Web page For a detailed description of these Basic Settings and how to...

Page 32: ...r access points in the group If you chose to ignore new access points any additional access points will run in standalone mode In standalone mode an access point does not share the cluster configurati...

Page 33: ...rk Once you have tested the basics of your wireless network you can enable more security and fine tune the access point by modifying its advanced configuration features Make Sure the Access Point is C...

Page 34: ...ice See Wireless Client Computers on page 19 in the Pre Launch Checklist Default Settings and Supported Administrator Client Platforms for information on requirements for these clients Secure and Fine...

Page 35: ...ge 35 Cluster on page 43 Status on page 77 Advanced on page 89 Basic Settings The basic configuration tasks are described in the following sections Navigating to Basic Settings Review Describe the Acc...

Page 36: ...6 Navigating to Basic Settings To configure initial settings click Basic Settings If you use the Detection Utility to link to the Web User Interface the Basic Settings page is displayed by default Fil...

Page 37: ...You cannot change the MAC address It is displayed for infor mational purposes as a unique identifier for an interface The address shown here is the MAC address for the bridge br0 This is the address b...

Page 38: ...ou typed it as you intended Wireless Network Name SSID Enter a name for the wireless network This name will apply to all access points on this network As you add more access points they will share thi...

Page 39: ...cess point use its IP address in a URL as follows http IPAddressOfAc cessPoint Note If you change the policy so that new access points are ignored then any new access points you add to the network wil...

Page 40: ...ply the settings and deploy the access points as a wireless network Summary of Settings When you update the Basic Settings a summary of the new settings is shown along with information about next step...

Page 41: ...settings tabs on the Web User Interface include icons that show current network activity Icon Description When one or more APs on your network are available for service the Wireless Network Available...

Page 42: ...Professional Access Point Administrator Guide Basic Settings 42...

Page 43: ...must discover via the Detection Utility or know the IP address of the access point and by using its IP address in a URL http IPAddressOfAccessPoint The following topics are covered Navigating to Acce...

Page 44: ...ding an Access Point to a Cluster Navigating to the Web User Interface for a Specific Access Point Navigating to Access Points Management To view or edit information on access points in a cluster clic...

Page 45: ...in effect for new access points For related information see Cluster Mode on page 47 Standalone Mode on page 47 and Set Configuration Policy for New Access Points on page 39 What Kinds of APs Can Clust...

Page 46: ...red by the Cluster The few exceptions settings not shared among clustered access points are the following most of these by their nature must be unique IP addresses MAC addresses Location descriptions...

Page 47: ...in order to configure and manage it directly See Navigating to an Access Point by Using its IP Address in a URL on page 50 The Basic Settings tab for a standalone access point indicates that the mode...

Page 48: ...you may encounter a synchronization progress bar after clicking Update on any of the Web User Interface pages The progress bar indicates that the system is busy performing an auto synchronization of...

Page 49: ...C address is assigned by the manufacturer You cannot change the MAC address It is provided here for informational purposes as a unique identifier for the access point The address shown here is the MAC...

Page 50: ...figuration In this case it does not matter which access point you actually connect to for administration There may be situations however when you want to view or manage information on a particular acc...

Page 51: ...o find all APs on the network and you should be able to derive which ones are standalone by comparing the Detection Utility findings with access points listed on the Cluster menu s Access Points page...

Page 52: ...Professional Access Point Administrator Guide Access Points 52...

Page 53: ...ernal RADIUS server you will need to set up and manage user accounts for that server in the Web User Interface On the User Management page you can create edit remove and view user accounts Each user a...

Page 54: ...User Accounts User accounts are shown at the top of the screen under User Accounts User name real name and status enabled or disabled are shown Adding a User To create a new user do the following 1 Un...

Page 55: ...s from accessing the network without having to remove or re create accounts This ability is useful in situations where users have an occasional need to access the network For example contractors who d...

Page 56: ...nts on the access point to the previous configuration Backing Up the User Database To create a backup copy of the user accounts for the access point 1 Click the backup or restore the user database lin...

Page 57: ...utton When the backup restore process is complete a message indicates that the user database has been successfully restored This process is not time consuming the restore should complete almost imme d...

Page 58: ...Professional Access Point Administrator Guide User Management 58...

Page 59: ...int data rates transmit receive statistics signal strength and idle time The following Session Monitoring topics are covered here Navigating to Session Monitoring Understanding Session Monitoring Info...

Page 60: ...con text of the same session A client station can roam between APs and maintain the session For information about monitoring associations and link integrity monitoring see Client Associations on page...

Page 61: ...ted by utilization rate Refreshing Session Information You can force an update of the information displayed on the Session Monitoring page by clicking the Refresh button Signal Indicates the strength...

Page 62: ...Professional Access Point Administrator Guide Sessions 62...

Page 63: ...nel Management How it Works Overview Overlapping Channels Background Information Example A Network before and after Channel Management Configuring and Viewing Channel Management Settings Stopping Star...

Page 64: ...reless network How it Works Overview At a specified interval or on demand Channel Management maps APs to channel use and measures interference levels in the cluster If significant channel interference...

Page 65: ...use interference For example AP1 could be assigned to channel 6 AP2 to channel 6 and AP3 to channel 5 as shown in Figure 3 Figure 3 Without Automatic Channel Management APs Can Broadcast on Overlappin...

Page 66: ...l Assignments and Setting Locks Update Current Channel Assignments Manually Viewing Last Proposed Set of Changes Configuring Advanced Settings Customizing and Scheduling Channel Plans Update Advanced...

Page 67: ...results of the plan Configuring Advanced Settings Customizing and Scheduling Channel Plans If you use channel management without updating Advanced settings channels are automatically fine tuned once...

Page 68: ...he network is not continually disrupted for minimal gains in efficiency For example if channel interference must be reduced by 75 percent and the proposed channel assignments will only reduce interfer...

Page 69: ...taken into account for automated and manual updates Apply channel modifications even when the network is busy Click to enable or disable this setting If you enable this setting channel modifications w...

Page 70: ...Professional Access Point Administrator Guide Channel Management 70...

Page 71: ...a detailed view of neighbouring access points including identifying information such as SSIDs and MAC addresses for each cluster status and statistical information such as the broadcast channel and s...

Page 72: ...members and non members For each neighbour access point the Wireless Neighborhood view shows identifying information SSID or Network Name IP Address MAC address along with radio statistics signal stre...

Page 73: ...f the cluster Not in cluster Shows only neighbour APs that are not cluster members Both Shows all neighbour APs cluster members and non members Cluster The Cluster list at the top of the table shows I...

Page 74: ...P address is shown at the top of the column Lighter Blue Bar A lighter blue bar and a lower signal strength number for example 20 or lower indicates medium or weak signal strength from the neighbour a...

Page 75: ...Administrator Guide Wireless Neighborhood 75 Viewing Details for a Cluster Member To view details on a cluster member AP click the IP address of a cluster member at the top of the table Figure 6 Detai...

Page 76: ...he channel on which the access point is currently broadcasting The Channel defines the portion of the radio spectrum that the radio uses for transmitting and receiving The channel is set on the Advanc...

Page 77: ...e that you are accessing the Web User Interface for the access point that you want to monitor see Navigating to the Web User Interface for a Specific Access Point on page 50 You can use the Status pag...

Page 78: ...Mask The Guest interface includes the MAC Address VLAN ID and Subnet If you want to change any of these settings click the Configure link Wireless Settings The Radio Interface settings include radio...

Page 79: ...mote log relay host to capture all system events and errors in a Kernel Log This requires setting up a remote relay host first See Log Relay Host for Kernel Messages on page 79 Log Relay Host for Kern...

Page 80: ...t configure a remote server to receive the syslog messages This procedure will vary depending on the type of machine you use as the remote log host Following is an example of how to configure a remote...

Page 81: ...nitor a specified kernel log file or other storage depending on how you configured the log relay host If you disabled the log relay host clicking Update will disable remote logging Note The syslog pro...

Page 82: ...ating or being authenticated The real time Events Log is always shown on the Status menu s Events page for the access point you are monitoring Transmit Receive Statistics To view transmit receive stat...

Page 83: ...cified interface The Professional Access Point has a unique MAC address for each interface VLAN ID Virtual LAN VLAN ID A VLAN is a software based logical grouping of devices on a network that allow th...

Page 84: ...to detect a client s having gone out of range even during periods when no normal traffic is exchanged The client connection is dropped from the list of associated clients within 300 seconds of the cl...

Page 85: ...ring access points provides real time statistics for all access points within range of the access point on which you are viewing the Web User Interface To view information about other access points on...

Page 86: ...without the use of a traditional access point Ad hoc mode is an IEEE 802 11 Wireless Network ing Framework also referred to as peer to peer mode or an Independent Basic Service Set IBSS SSID The Serv...

Page 87: ...ls Db of Beacons Shows the total number of beacons transmitted by this access point since the access point was last booted Last Beacon Shows the date and time of the most recent beacon transmission fr...

Page 88: ...Professional Access Point Administrator Guide Neighboring Access Points 88...

Page 89: ...ings Ethernet Wired Settings describe the configuration of your Ethernet local area network LAN The following sections describe how to configure the wired address and related settings on the Professio...

Page 90: ...bling Guest Access Specifying a Virtual Guest Network Enabling and Disabling Virtual Wireless Networks on the Access Point Configuring Internal Interface Ethernet Settings Configuring Guest Interface...

Page 91: ...nt allows you to configure two different LANs on the same access point one for a secure internal LAN and another for a public guest network with no security and little or no access to internal resourc...

Page 92: ...cess Point ships with Guest Access disabled To enable Guest Access click Enabled To disable Guest Access click Disabled Field Description Guest Access Select Enabled to enable Guest Access If you choo...

Page 93: ...n VLANs using the Advanced menu s Virtual Wireless Networks page as described in Virtual Wireless Networks on page 125 Select Disabled to disable the VLAN for the Internal network and for any addition...

Page 94: ...default address USRobotics recommends assigning a new address so that if later you bring up another Professional Access Point on the same network the IP addresses for the two APs will be unique If yo...

Page 95: ...k Update Field Description MAC Address Shows the MAC address for the Guest interface for the LAN port on this access point This is a read only field VLAN ID If you choose to configure Internal and Gue...

Page 96: ...Professional Access Point Administrator Guide Ethernet Wired Settings 96...

Page 97: ...name also known as SSID The following sections describe how to configure the wireless address and related settings on the Professional Access Point Navigating to Wireless Settings Configuring 802 11d...

Page 98: ...main Support Enabling support for IEEE 802 11d on the access point causes the access point to broadcast which country it is operating in as a part of its beacons To enable 802 11d regulatory domain su...

Page 99: ...nal authorities such as the Federal Communications Commission FCC or the International Telecom munication Union ITU R The default is Auto which picks the least busy channel at startup time Field Descr...

Page 100: ...e network as two or more nodes each with a unique MAC Address This is accomplished by using multiple Basic Service Set Identifiers BSSID for a sin gle access point The MAC address shown for the Guest...

Page 101: ...able or twisted pair A wireless NIC broadcasts radio signals over the air allowing a wireless LAN to be easily tapped without physical access or sophisti cated equipment A hacker equipped with a lapto...

Page 102: ...er a description of each mode offered and when to use each mode Comparison of Security Modes for Key Management Authentication and Encryption Algorithms The major factors that determine the effectiven...

Page 103: ...al of exposing the data on your network SEE ALSO For information on how to configure Static WEP security mode see Static WEP on page 108 under Configuring Security Settings When to Use IEEE 802 1x IEE...

Page 104: ...mechanisms This mode offers the same encryption algorithms as WPA 2 with RADIUS but without the ability to integrate a RADIUS server for user authentication This security mode is backward compatible f...

Page 105: ...DIUS provides the best security available for wireless networks This security mode also provides backward compatibility for wireless clients that support only the original WPA RECOMMENDATIONS WPA WPA2...

Page 106: ...roperable mode with client wireless software security features TKIP is the only encryption algorithm that is being tested in Wi Fi WPA certification SEE ALSO For information on how to configure this s...

Page 107: ...rity modes on the access point Keep in mind that each wireless client that wants to exchange data with the access point must be configured with the same security mode and encryption key settings consi...

Page 108: ...he network name will not be displayed in the List of Available Networks on a client device Instead the client must have the exact network name con figured in the supplicant before the client will be a...

Page 109: ...1x on page 114 WPA WPA2 Enterprise RADIUS on page 117 or WPA WPA2 Personal PSK on page 115 WEP encrypts data moving across the wireless network based on a static key The encryption algorithm is a str...

Page 110: ...The number is updated automatically based on how you set Key Length and Key Type WEP Keys You can specify up to four WEP keys In each text box enter a string of characters for one key If you selected...

Page 111: ...authentication algorithm you want to use by choosing one of the follow ing Open System Shared Key Both Open System authentication allows any client to associate with the access point whether that clie...

Page 112: ...for the access point is set to 3 This means that the WEP key in slot 3 is the key that the access point will use to encrypt the data it sends Figure 7 Setting the Access Point Transfer Key on the Acce...

Page 113: ...re such as like Funk Odyssey lets you configure multiple WEP keys and set a transfer index on the client then you can specify different keys to be used for station to access point transmissions The st...

Page 114: ...of EAP such as the Microsoft Internet Authentication Server or the Professional Access Point internal authentication server To work with Windows clients the authentication server must support Protecte...

Page 115: ...supply the Radius IP and Radius Key of the server you want to use Note The RADIUS server is identified by its IP address and UDP port numbers for the different services it provides The RADIUS server U...

Page 116: ...that the same key will not be reused to encrypt data a weakness of WEP TKIP uses a 128 bit temporal key shared by clients and access points The temporal key is combined with the client s MAC address...

Page 117: ...l Access Point built in RADIUS server supports Protected EAP PEAP and MSCHAP V2 If you select WPA WPA2 Enterprise RADIUS Security Mode you must provide the following Key The Pre shared Key is the shar...

Page 118: ...by greatly improving the security of the network CCMP AES Counter mode CBC MAC Protocol CCMP is an encryption method for IEEE 802 11i that uses the Advanced Encryption Algorithm AES It uses a CCM comb...

Page 119: ...page 53 Radius Key Enter the Radius Key The Radius Key is the shared secret key for the RADIUS server The text you enter will be displayed as characters to prevent others from seeing the RADIUS key as...

Page 120: ...Professional Access Point Administrator Guide Security 120...

Page 121: ...ivity and isolate guest clients from other more sensitive areas of the network No security is provided on the guest network only None is allowed as the security mode Simultaneously you can configure a...

Page 122: ...Guest network implemented via VLAN the dotted red lines indicate dedicated guest connections All access points and all connections including guests are administered from the same Professional Access...

Page 123: ...to see on the captive portal Note that the default captive portal message directs users to www usr com after they click Accept Thank you for using wireless Guest Access as provided by this Profession...

Page 124: ...ed Access Point To configure an access point dedicated to guest access you do not have to set up VLANs All you have to do is configure the Welcome screen as described in Configuring the Welcome Screen...

Page 125: ...how to configure multiple wireless networks on Virtual LANs VLANs Navigating to Virtual Wireless Network Settings Configuring VLANs Updating Settings Navigating to Virtual Wireless Network Settings T...

Page 126: ...down list to identify an additional network to configure One Two Status You can enable or disable a configured network To enable the specified network click On To disable the specified network click O...

Page 127: ...connect Note The Broadcast SSID you set here is specifically for this Virtual Network One or Two Other networks continue to use the security modes already configured your original Internal network co...

Page 128: ...Professional Access Point Administrator Guide Virtual Wireless Networks 128...

Page 129: ...eraction with the physical medium that is how and what type of electromagnetic waves the access point emits You can specify whether the radio is on or off radio frequency RF broadcast channel beacon i...

Page 130: ...avigating to Radio Settings To specify radio settings click the Advanced menu s Radio tab and update the fields as described below Configuring Radio Settings Field Description Status On Off Specify wh...

Page 131: ...Modes the default is Auto Auto is the recommended mode because it automatically detects the best channel choices based on signal strength traf fic loads and so on Beacon Interval The Beacon Interval v...

Page 132: ...rames by using lower fragmentation threshold may help with some interference problems for example with microwave ovens By default fragmentation is off USRobotics recommends not using fragmen tation un...

Page 133: ...gnals are less likely to propagate outside of the physical location of your network Rate Sets Select the transmission rate sets that you want the access point to support and the basic rate sets you wa...

Page 134: ...Professional Access Point Administrator Guide Radio 134...

Page 135: ...ed by a wireless client has a unique MAC address You can control client access to your wireless network by switching on MAC Filtering and specifying a list of approved MAC addresses When MAC Filtering...

Page 136: ...on Media Access Control MAC addresses You can choose to allow access by listed MAC addresses or prevent access by listed MAC addresses For the Guest interface MAC Filtering settings apply to both BSSe...

Page 137: ...e the 48 bit MAC address into the lower text boxes then click Add The MAC Address is added to the Stations List To remove a MAC Address from the Stations List select its 48 bit MAC address then click...

Page 138: ...Professional Access Point Administrator Guide MAC Filtering 138...

Page 139: ...tently handling a disproportionately large percentage of wireless traffic This can happen when location placement or other factors cause one access point to transmit the strongest signal to a majority...

Page 140: ...mely access to the air waves on a wireless network For more information about configuring your network for QoS see Quality of Service on page 143 Navigating to Load Balancing Settings In the Web User...

Page 141: ...dicate when to stop accepting new client associations When the utilization rate for this access point exceeds the specified limit no new client associations will be allowed on this access point If you...

Page 142: ...Professional Access Point Administrator Guide Load Balancing 142 Updating Settings To apply your changes click Update Settings...

Page 143: ...igher traffic volume competing for bandwidth during a busy time of day The most noticeable degradation in service on a busy overloaded network will be evident in time sensitive applications like video...

Page 144: ...te longer wait times The Professional Access Point implementation of QoS is based on the IEEE Wireless Multimedia WMM standard A Linux based queuing class is used to tag packets and establish multiple...

Page 145: ...ists of a discrete portion of data along with descriptive meta information packaged for transmission on a wireless network Each frame includes a source and destination MAC address a control field with...

Page 146: ...hin a range specified as the Minimum Contention Window increases exponentially up to a specified limit Maximum Contention Window The random delay avoids most of the collisions that would occur if mult...

Page 147: ...nfigurable parameter Transmission Opportunity TXOP Interval for Client Stations The Transmission Opportunity TXOP is an interval of time when a Wi Fi Multimedia WMM client station has the right to ini...

Page 148: ...to the client station Data 0 Voice Highest priority queue minimum delay Time sensitive data such as VoIP and streaming media are automatically sent to this queue Data 1 Video Highest priority queue mi...

Page 149: ...re the data frame is sent a retry counter is incremented and the random backoff value window is dou bled Doubling will continue until the size of the random backoff value reaches the number defined in...

Page 150: ...as VoIP and streaming media are automatically sent to this queue Data 1 Video Highest priority queue minimum delay Time sensitive video data is automatically sent to this queue Data 2 best effort Med...

Page 151: ...ximum Conten tion Windows on page 146 cwMax Maximum Contention Window The value specified here in the Maximum Contention Window is the upper limit in milliseconds for the doubling of the random backof...

Page 152: ...Professional Access Point Administrator Guide Quality of Service 152...

Page 153: ...ing WDS Settings Example of Configuring a WDS Link Updating Settings Understanding the Wireless Distribution System A Wireless Distribution System WDS is an 802 11f technology that wirelessly connects...

Page 154: ...e in this example and bridge the two APs with a WDS link This extends your network wirelessly by providing an extra hop to get to distant stations Backup Links and Unwanted Loops in WDS Bridges Anothe...

Page 155: ...s Both access points in a given WDS link must be configured with the same WDS security settings For static WEP either a static 64 bit 40 bit secret key 24 bit initialization vector IV or 128 bit 104 b...

Page 156: ...essional Access Point Administrator Guide Wireless Distribution System 156 Configuring WDS Settings The following notes summarize critical guidelines regarding WDS configuration Please read all the no...

Page 157: ...er a WDS bridge wireless or an Ethernet connection wired but not both Do not create backup links If you can trace more than one path between any pair of APs going through any combination of Ethernet o...

Page 158: ...cryption protocol for 802 11 wire less networks Both access points on the WDS link must be configured with the same security settings For static WEP a static 64 bit 40 bit secret key 24 bit initializa...

Page 159: ...nts participating in the link MyAP1 and MyAP2 must be set to the same mode and be transmitting on the same channel For this example suppose that you are using IEEE 802 11b mode and broadcasting on Cha...

Page 160: ...Professional Access Point Administrator Guide Wireless Distribution System 160...

Page 161: ...ng the returned time stamp to adjust its clock The timestamp is used to indicate the date and time of each event in log messages See http www ntp org for more general information on NTP The following...

Page 162: ...g and Disabling a Network Time Protocol NTP Server To configure your access point to use a network time protocol NTP server first enable the use of NTP and then select the NTP server you want to use T...

Page 163: ...access point the ability to provide the correct time of day in log messages and session information See http www ntp org for more general information on NTP Choose either to enable or to disable the u...

Page 164: ...Professional Access Point Administrator Guide Time Protocol 164...

Page 165: ...enance Key components of any SNMP managed network are managed devices SNMP agents and a network management system The agents store data about their devices in Management Information Bases MIBs and ret...

Page 166: ...tocol To enable SNMP click the Advanced menu s SNMP tab and update the fields as described below Enabling and Disabling Simple Network Management Protocol SNMP To configure your access point to use Si...

Page 167: ...SNMP SET Requests Choose to either enable or disable the honouring of SNMP SET requests Enable Machines on the network that provide the correct community name can issue SET requests Disable default SE...

Page 168: ...t and upgrade functions built into the Professional Access Points Web User Interface you have the option of performing these functions through SNMP Source hostname or subnet If source designation is e...

Page 169: ...ntax OCTET STRING Description Setting this object to a name of a file causes the device to download the file from the path speci fied Set this object to an FTP or HTTP URL in order to upgrade the acce...

Page 170: ...Professional Access Point Administrator Guide SNMP 170...

Page 171: ...access point changes after the reboot you need to specify the new address in your Web browser in order to access the Web User Interface Reset Configuration If you are experiencing extreme problems wit...

Page 172: ...an reset the access point by using a thin object such as a paper clip to press the Reset button until both the LAN and WLAN LEDs turn off briefly Upgrade As new versions of the Professional Access Poi...

Page 173: ...will be allowed If you are reading this section because you already tried to upgrade the firmware through a wireless client use a wired client to regain access to the access point as follows Create a...

Page 174: ...hat page Backup Restore You can save a copy of the current settings on the Professional Access Point to a backup configuration file The backup file can be used at a later date to restore the access po...

Page 175: ...logue is displayed 2 Choose the Save option on this first dialogue This brings up a file browser 3 Use the file browser to navigate to the directory where you want to save the file and click Save to s...

Page 176: ...either by clicking again on one of the tabs if the Web User Interface is still displayed or by typing the IP address the Professional Access Point as a URL in the address field of the Web browser Ent...

Page 177: ...on how to set an access point to stand alone or cluster mode from the CLI see Set Configuration Policy for New Access Points on page 39 This part of the Professional Access Point Administrator Guide...

Page 178: ...The command line interface CLI and the Web User Interface to the Professional Access Point are designed to suit the preferences and requirements for different types of users or scenarios Most adminis...

Page 179: ...tabase Backup and Restore You cannot backup or restore a user data base from the CLI To restore a user database use the Web User Interface as described in Backing Up and Restoring a User Database on p...

Page 180: ...igure all Radio settings from the CLI except for turning on off Super G yes MAC Filtering yes yes Load Balancing yes yes Quality of Service yes yes Wireless Distribution System yes yes Time Protocol y...

Page 181: ...o IP addresses via DHCP you can also telnet to the domain name of the access point 3 You will be prompted for an Administrator user name and password for the access point USR5453 AP login Password Ent...

Page 182: ...lnet status get telnet status Enable Telnet acess set telnet status up Disable Telnet access set telnet status down Generate a new pair of SSH keys set ssh gen key yes Note This command may take up to...

Page 183: ...ccess point The login prompt is displayed login as 3 Enter the default Administrator username and password for the Professional Access Point admin admin and press Enter after each The password is mask...

Page 184: ...mand line interface remains in effect for the current session To save your changes across sessions use the save running command Caution Settings updated from the CLI with get set add remove commands w...

Page 185: ...int This command returns information on the log file An example of using the get command on an unnamed class with multiple instances is get log entry There are multiple log entries but they are not na...

Page 186: ...ll with qualifier field qualifier value to field value The first argument is either a named class in the configuration The next argument is the name of the instance to set or the keyword all which ind...

Page 187: ...ion save running Save the running configuration set Set field values of the running configuration Example 2 Type get TAB TAB including a space after get to see a list of all field options for the get...

Page 188: ...Transmission queue parameters wme queue Transmission queue parameters for stations Example 3 Type get system v TAB This will result in completion with the only matching field get sys tem version Hit...

Page 189: ...Login Welcome Page on page 228 Configuring Multiple BSSIDs on Virtual Wireless Networks on page 229 Radio Settings on page 230 MAC Filtering on page 235 Load Balancing on page 238 Quality of Service o...

Page 190: ...SomeNumber if you have VLANs configured wlan0 The IP address of the access point is provided in the output detail for br0 So a useful command is get interface This gives you common information on all...

Page 191: ...y If you do not save the configuration by executing the save running or set config startup running command at the CLI you will lose any changes you submitted via the CLI upon reboot The save running c...

Page 192: ...nter face on an Access Point get interface br0 ip or get interface get interface is a catch all command that shows common information on all interfaces for the access point such as IP addresses MAC ad...

Page 193: ...following command returns both the IP address and the MAC address for an access point USR5453 AP get interface br0 mac ip Field Value ip 10 10 55 216 mac 00 a0 c9 8c c4 7e Get Common Information on A...

Page 194: ...Professional Access Point Administrator Guide Class Structure Commands and Examples 194 wlan0wds1 wds down wlan0wds2 wds down wlan0wds3 wds down USR5453 AP...

Page 195: ...on for an Access Point To set the location for an access point use the set command as follows USR5453 AP set system location hallway USR5453 AP set system location Vicky s Office To check to make sure...

Page 196: ...in stand alone mode USR5453 AP get cluster detail Field Value clustered 0 clusterable 0 kickstarted 0 location not set formation Get MAC Addresses for all Access Points in the Cluster USR5453 AP get...

Page 197: ...ame samantha To set the user s real name set radius user UserName realname RealName For example set radius user samantha realname Elizabeth Montgomery or set radius user samantha realname Elizabeth To...

Page 198: ...some other users endora darren and wally USR5453 AP add radius user endora username endora USR5453 AP set radius user endora realname Agnes Moorhead USR5453 AP set radius user endora password scotch U...

Page 199: ...ed in Understanding Interfaces as Presented in the CLI on page 190 The interface name you reference in a get command deter mines whether the command output shows a wired or wireless interface or the I...

Page 200: ...for the Wired Internal Interface get interface wlan0 ssid Get the Current IEEE 802 11 Radio Mode get radio wlan0 mode Get the Channel the Access Point is Cur rently Using get radio wlan0 channel Get B...

Page 201: ...56 248 mask 255 255 255 0 Get Current Wireless Radio Settings The following examples show how to use the CLI to get wireless radio settings on an access point such as mode channel and so on You can se...

Page 202: ...rx status up beacon interval 100 rts threshold 2347 fragmentation threshold 2346 load balance disassociation utilization 0 load balance disassociation stations 0 load balance no association utilizatio...

Page 203: ...s point system you must first set up a remote server running a syslog process and acting as a syslog log relay host on your network For information on how to set up the remote server see Setting Up th...

Page 204: ...lay host Host_Name_Of_LogRelayHost Where Host_Name_Of_LogRelayHost is the a DNS name for the Log Relay Host For example USR5453 AP set log relay host myserver Specify the Relay Port To specify the Rel...

Page 205: ...st 10 10 56 248 00 50 04 6F 6F 90 152 48032 0 5909 293550 0 wlan0 0 0 0 0 02 0C 41 00 02 00 AAP1000 Trusted 6483 710681 0 0 0 0 wlan0guest 0 0 0 0 02 0C 41 00 02 01 AAP1000 Guest 5963 471228 0 0 0 0 w...

Page 206: ...ess num_beacons Number of beacons received phy type PHY mode detected with privacy WEP or WPA enabled rate Rate signal Signal strength ssid Service Set IDentifier a k a Network Name supported rates Su...

Page 207: ...ternal and Guest Interfaces get bss Get the DNS Name get host id Set the DNS Name set host id HostName For example set host id vicky ap Get Current Settings for the Ethernet Wired Internal Interface g...

Page 208: ...the CLI is a complex task Unless this is your area of expertise you may find it easier to use the Web User Interface to set up Guest Access For information on how to set up Guest Access from the Web...

Page 209: ...1 USR5453 AP add interface vlan2222 type vlan status up vlan id 2222 vlan interface eth0 USR5453 AP add bridge port brguest interface vlan2222 4 Check the current settings USR5453 AP get bss Note Afte...

Page 210: ...Ns are configured for the Internal and Guest interfaces because both interfaces are VLANs brguest is vlan2222 and br0 is vlan1111 USR5453 AP get bridge port brguest Name Interface brguest wlan0 brgues...

Page 211: ...nge the Connection Type DHCP or Static IP To get the connection type USR5453 AP get dhcp client status up You cannot use the CLI to reset the connection type from DHCP to Static IP because you will lo...

Page 212: ...static ip 10 10 12 81 Set the Static Subnet Mask Address 1 Check to see the current Subnet Mask In this example the current subnet mask is the factory default USR5453 AP get interface br0 static mask...

Page 213: ...addresses assigned by DHCP use the reverse command and check to see the new configuration USR5453 AP set host dns via dhcp up USR5453 AP get host dns via dhcp up Wireless Interface To set up a wirele...

Page 214: ...00 0C 41 16 DF A6 dtim period max stations ignore broadcast ssid off mac acl mode deny list mac acl name wlan0bssInternal radius accounting Security Command Example Get the Current Security Mode get i...

Page 215: ...rohibit USR5453 AP set bss wlan0bssInternal ignore broadcast ssid off Enable Disable Station Isolation USR5453 AP get radio wlan0 station isolation off USR5453 AP set radio wlan0 station isolation off...

Page 216: ...104 bits To set the WEP Key Length type one of the following commands In this example you will set the WEP Key Length to 40 USR5453 AP set interface wlan0 wep key length 40 4 Set the Key Type Valid v...

Page 217: ...rity static wep The following command gets details on how the internal network is configured including details on Note The number of characters required for each WEP key depends on how you set Key Len...

Page 218: ...pen system authentication off shared key authentication on wpa cipher tkip off wpa cipher ccmp off wpa allowed off wpa2 allowed off rsn preauthentication off The following command gets details on the...

Page 219: ...2 Set the Authentication Server You can use the built in authentication server on the access point or an external RADIUS server In this example you will set it to use the built in server USR5453 AP se...

Page 220: ...n to view the updated security configuration and see the results of your new settings The following command gets the security mode in use on the Internal network USR5453 AP get interface wlan0 securit...

Page 221: ...client stations on the network support the original WPA but none support the newer WPA2 then use WPA To support WPA clients set bss wlan0bssInternal wpa allowed on set bss wlan0bssInternal wpa2 allowe...

Page 222: ...wpa personal key SeCret or Ex 2 USR5453 AP set interface wlan0 wpa personal key KeepSecret Cipher Suite Option Example TKIP Temporal Key Integrity Protocol TKIP which is the default To set the cipher...

Page 223: ...off mac acl mode deny list mac acl name wlan0bssInternal radius accounting radius ip 127 0 0 1 radius key secret open system authentication shared key authentication wpa cipher tkip on wpa cipher ccm...

Page 224: ...upport the newer WPA2 then use WPA To support WPA clients set bss wlan0bssInternal wpa allowed on set bss wlan0bssInternal wpa2 allowed off WPA2 If all client stations on the network support WPA2 we s...

Page 225: ...be relayed from the access point the client is currently using to the target access point Enabling this fea ture can help speed up authentication for roaming clients who connect to multiple access po...

Page 226: ...nal radius key KeepSecret 7 Enable RADIUS Accounting External RADIUS Server Only You can enable RADIUS Accounting if you want to track and measure the resources a particular user has Both When the aut...

Page 227: ...mand gets details on how the internal network is configured including details on Security USR5453 AP get bss wlan0bssInternal detail Field Value status up description Internal radio wlan0 beacon inter...

Page 228: ...etwork is not configured to provide any level of wireless security Enable Disable the Guest Welcome Page To enable the Guest welcome page USR5453 AP set portal status up To disable the Guest welcome p...

Page 229: ...ommands for configuring WPA WPA2 Enterprise RADIUS security mode allowing Both WPA and WPA2 clients to authenticate and using a TKIP cipher suite USR5453 AP set bss wlan0bssvwn1 open system authentica...

Page 230: ...s described in Understanding Interfaces as Presented in the CLI on page 190 The interface name you reference in a command determines whether a setting applies to a wired or wireless interface or to th...

Page 231: ...tus up mac channel policy static mode g static channel 6 channel 6 tx rx status up Get All Radio Settings To get all current Radio settings get radio wlan0 detail USR5453 AP get radio wlan0 detail Fie...

Page 232: ...is what the access point will advertise to the network for the purposes of setting up communication with other APs and client stations on the network It is generally more efficient to have an access...

Page 233: ...ecify a DTIM period within a range of 1 255 beacons For example if you set this to 1 clients will check for buffered data on the access point at every beacon If you set this to 2 clients will check on...

Page 234: ...wing command adds 48 as a basic rate to wlan0 the internal wireless interface USR5453 AP add basic rate wlan0 rate 48 To get the basic rates currently configured for this access point USR5453 AP get b...

Page 235: ...u can maintain a MAC address list for each of the Professional Access Point s wireless interfaces Unless you initiate an interface s list with the set command the interface uses the list named default...

Page 236: ...e accept list set bss interface mac acl name list_name Where interface is the wireless network interface for which you want to define a MAC filtering list and list_name is a name that you choose for t...

Page 237: ...C address of a wireless client that you want to remove from the MAC filtering list For example USR5453 AP remove mac acl Guest mac 00 01 02 03 04 04 Get Current MAC Filtering Settings Mode Accept or D...

Page 238: ...0 Quality of Service Quality of Service QoS provides you with the ability to specify parameters on multiple queues for increased throughput and better performance of differentiated wireless traffic li...

Page 239: ...ands on page 240 Get QoS Settings on the Access Point get tx queue Get QoS Settings on the Client Station get wme queue Set Arbirtation Interframe Spaces AIFS On the access point set wme queue wlan0 w...

Page 240: ...ueues for Access Point and Station The same types of queues are defined for different kinds of data transmitted from access point to station and station to access point but they are referenced by diff...

Page 241: ...frame Spaces AIFS Arbitration Inter Frame Spacing AIFS specifies a wait time in milliseconds for data frames Valid values for AIFS are 1 255 Set AIFS on the Access Point To set AIFS on access point to...

Page 242: ...mined For more details see Random Backoff and Minimum Maximum Contention Windows on page 146 Valid values for the cwmin are 1 3 7 15 31 63 127 255 511 or 1023 The value for cwmin must be lower than th...

Page 243: ...3 AP set wme queue wlan0 with queue vi cwmin 7 cwmax 15 View the results of this configuration update bold in the command output highlights the modified values USR5453 AP get wme queue name queue aifs...

Page 244: ...initiate transmissions on the wireless network The txop limit applies only to the client stations station to access point traffic To set the txop limit on station to access point traffic set wme queu...

Page 245: ...mote mac 00 E0 B8 76 1B 14 Getting Details on a WDS Configuration Verify the configuration of the WDS link you just configured by getting details on the WDS interface USR5453 AP get interface wlan0wds...

Page 246: ...to their client systems NTP sends periodic time requests to servers using the returned time stamp to adjust its clock The timestamp will be used to indicate the date and time of each event in log mess...

Page 247: ...or wireless settings The following command resets the access point from the CLI USR5453 AP factory reset Keyboard Shortcuts and Tab Completion Help The CLI provides keyboard shortcuts to help you nav...

Page 248: ...he current line Ctrl h Remove the last word in the current command Clears one word at a time from the current command line always starting with the last word on the line Ctrl W Remove characters start...

Page 249: ...p Detected access point dhcp client DHCP client settings dot11 IEEE 802 11 host Internet host settings interface Network interface ip route IP route entry klog entry Kernel log entry log Log settings...

Page 250: ...ased configuration settings cluster member Member of a cluster of like configured access points Example 7 Type add TAB TAB including a space after add to get a list of all field options for the add co...

Page 251: ...t it is an Ethernet interface while another interface could have a name of wlan0 to indicate it is a wireless LAN WLAN interface Instances of singleton classes do not have names since they only have a...

Page 252: ...Professional Access Point Administrator Guide Class Structure Commands and Examples 252 Figure 10 CLI Class Relationships...

Page 253: ...ettings interface A network interface ip route An IP route jvm Java Virtual Machine kickstartd The handler for the kickstartd class log Access point log settings log entry An entry in the log mac acl...

Page 254: ...ackets Purpose The number of packets received from the station Valid values Positive integer tx packets Purpose The number of packets transmitted by the station Valid values Positive integer Field Des...

Page 255: ...te Valid values A rate in 100 kbps listen interval Purpose The listen interval Valid values A time in ms basic rate Persistent Yes Purpose A radio rate Description Used to set the rate sets of radios...

Page 256: ...rpose The path cost Used only when STP is on Valid values 1 65535 priority Purpose The port priority Used only when STP is on Valid values 0 255 bss Persistent Yes Purpose A BSS of a radio Description...

Page 257: ...ce radio The radio this is part of beacon interface The service set interface to send beacons for mac The MAC address of the interface dtim period Delivery Traffic Information Map period max stations...

Page 258: ...rpose Do not send SSID in beacons and ignore probe requests Valid values on or off mac acl mode Purpose MAC address Access Control List mode Valid values deny list deny only stations in list accept li...

Page 259: ...lues on or off wpa cipher tkip Purpose Whether TKIP is permitted as a WPA cipher Valid values on or off wpa cipher ccmp Purpose Whether CCMP is permitted as a WPA cipher Valid values on or off channel...

Page 260: ...s rescue Reset to rescue running Save running configuration default Purpose Configuration after factory reset Write only Valid values rescue Reset to rescue running Save running configuration no exter...

Page 261: ...Orchestrator debugging information Valid values 0 7 ologhost Purpose Host for Orchestrator to send syslogs to Valid values IP address detected ap Persistent No Purpose A detected access point Descript...

Page 262: ...iption mac The MAC address of the AP radio The radio that detected the AP beacon interval The beacon interval of the AP in kus 1 capability The capabilities of the AP type The type of device detected...

Page 263: ...String of up to 32 octets wpa Purpose Whether WPA security is enabled Valid values On or Off phy type Purpose The mode your radio was in when the AP was detected Valid values 4 IEEE 802 11b 7 IEEE 802...

Page 264: ...e in Unix time format supported rates Purpose The supported rates of the AP Valid values Bracketed list of hexadecimal rate codes dhcp client Persistent Yes Purpose The handler for the DHCP client cla...

Page 265: ...ex status Purpose Controls whether 802 11 is in use Valid values up or down debug Purpose The debugging level for 802 11 Valid values 0 3 dot11d Purpose Whether AP should enable 802 11d Valid values u...

Page 266: ...tained through DHCP Valid values IP address static domain Purpose Domain name to use when not obtained through DHCP Valid values DNS domain name dns via dhcp Purpose Whether DNS parameters are obtaine...

Page 267: ...ss of the interface static ip The static IP address of this interface static mask The static netamsk of this interface rx bytes Received bytes rx packets Received packets rx errors Received packets wi...

Page 268: ...able description of the interface Valid values an ASCII string mac Purpose The MAC address of the interface Valid values 6 colon separated hexadecimal digit pairs static ip Purpose The static IP addre...

Page 269: ...es Integer rx compressed Purpose Received packets with compression Valid values Integer rx multicast Purpose Received packets that were multicast Valid values Integer tx bytes Purpose Transmitted byte...

Page 270: ...nteger ip route Persistent Yes Purpose An IP route Description An IP route Field Index in use Purpose Whether the route is currently in use Read only Valid values up or down destination Purpose The de...

Page 271: ...rpose Java Virtual Machine Description Represents a JVM Field Index status Purpose Controls whether this is on or off Valid values up or down kickstartd Persistent No Purpose The handler for the kicks...

Page 272: ...Valid values A non zero integer priority Purpose The priority of the log entry Valid values A non zero integer time Purpose The time of the message Valid values A Unix format time daemon Purpose The d...

Page 273: ...list This list can be used by BSSes Field Index mac Purpose A MAC address Valid values 6 colon separated hexadecimal digit pairs ntp Persistent Yes Purpose Network Time Protocol client settings Field...

Page 274: ...een before access is given Field Index status Purpose Controls whether this is on or off Valid values up or down welcome screen Purpose Whether the welcome screen is shown to guest users Valid values...

Page 275: ...static channel The static channel of this radio tx power The transmit power of this radio tx rx status Whether the radio transmits and receives data beacon interval The beacon interval for this radio...

Page 276: ...best channel mode Purpose The wireless mode of this radio Valid values The Valid values depend on the capabilities of the radio b IEEE 802 11b g IEEE 802 11g super g Purpose Whether Super G is enable...

Page 277: ...tation to be disassociated The condition for load balance disassociation utilization must also be satisfied if it is non zero Valid values 1 2007 or 0 to disable load balance no association utilizatio...

Page 278: ...ption Represents the serial access to the CLI snmp Persistent Yes Purpose SNMP server Description Represents a SNMP server Field Index status Purpose Controls whether this is on or off Valid values up...

Page 279: ...o listen on Valid values IP address engine id Purpose The engine identifier Valid values A string ssh Persistent Yes Purpose The handler for the ssh class Description Represents the SSH supported rate...

Page 280: ...k reboot Purpose Reboot the system Write only Valid values yes to reboot telnet Persistent Yes Purpose The handler for the telnet class Description Represents Telnet access to the CLI traphost Persist...

Page 281: ...ransmission queue Description Represents transmission queue parameters of a radio The name of the instance must be the same as the name of the radio it represents Field Index queue Purpose The queue V...

Page 282: ...urpose Maximum burst length Valid values 0 0 999 9 web ui Persistent No Purpose Web user interface settings Description Represents the web user interface of the AP Field Index status Purpose Controls...

Page 283: ...the access point with an operating system other than Windows My wireless device cannot find the wireless network I changed the access point settings and now my wireless device does not establish a wi...

Page 284: ...rator machine may not be connected to the same subnet Bypass your local area network by connecting the access point directly to the administrator computer then start the Detection Utility again If the...

Page 285: ...re the access point through its Web User Interface as follows 1 Find the access point s IP address 1 Using the configuration program for the networking device to which the access point is connected vi...

Page 286: ...Interface of the access point 2 From the Advanced menu select Security 3 Verify that Broadcast SSID is set to Allow 4 Click Update to save any change Possible Solution 4 If you use MAC filtering on t...

Page 287: ...r the wireless device so that environmental factors such as lead based paint or concrete walls do not interfere with your wireless signal Possible Solution 2 Create a wireless connection on a differen...

Page 288: ...er every Notes The only security mode available on the WDS link is Static WEP which is not particularly secure Therefore USRobotics recommends using WDS to bridge the Guest network only Do not use WDS...

Page 289: ...ss Points page for any of the clustered access points USRobotics recommends making a note of all IP addresses at this point The Stop Clustering page for this access point is displayed Click Stop Clust...

Page 290: ...Professional Access Point Administrator Guide Configuration Troubleshooting 290...

Page 291: ...0 Austria www usr com emailsupport de 07110 900 116 Belgium Flemish www usr com emailsupport bn 070 23 35 45 Belgium French www usr com emailsupport be 070 23 35 46 Czech Republic www usr com emailsup...

Page 292: ...pport Information 292 For current support contact information go to www usr com support Turkey www usr com emailsupport tk 0212 444 4 877 UAE www usr com emailsupport me 0800 877 63 UK www usr com ema...

Page 293: ...e coupling to the intentional radiator shall be considered sufficient to comply with the provisions of this section The manufacturer may design the unit so that a broken antenna can be replaced by the...

Page 294: ...Management and Telecommunications policy RSS 210 standard Low Power License Exempt Radio Communication Devices Operation is subject to the following two conditions 1 This device may cause interference...

Page 295: ...th the European recommendation 1999 519 ECC governing the exposure to the electromagnetic radiation These products can be used in the following countries UK Ireland Spain Portugal Germany France Luxem...

Page 296: ...easure The maximum SAR value of this wireless device measured in the conformity test is 0 52 W Kg EU Detachable Antenna Information This USRobotics wireless device has been designed to operate with th...

Page 297: ...Professional Access Point Administrator Guide Regulatory Information 297 Go to www usr com to see the most recent channel restriction information...

Page 298: ...Professional Access Point Administrator Guide Regulatory Information 298...

Page 299: ...defective product or part with new or reconditioned parts or to exchange the defective product or part with a new or reconditioned product or part that is the same or similar or if neither of the two...

Page 300: ...r com 3 4 CUSTOMER should have the following information items readily available when contacting U S ROBOTICS Technical Support Product Model Number Product Serial Number Dated Proof of Purchase CUSTO...

Page 301: ...SE NEGLECT NON COMPLIANCE IMPROPER INSTALLATION AND OR ENVIRONMENTAL FACTORS To the extent permitted by applicable law this U S ROBOTICS Limited Warranty does not apply to normal wear and tear damage...

Page 302: ...E PAID AT U S ROBOTICS OPTION THIS DISCLAIMER OF LIABILITY FOR DAMAGES WILL NOT BE AFFECTED IF ANY REMEDY PROVIDED HEREIN SHALL FAIL OF ITS ESSENTIAL PURPOSE 6 0 DISCLAIMER Some countries states terri...

Page 303: ...ork that supports multiple authentication methods IEEE 802 1x authenticates users not machines 802 2 IEEE 802 2 IEEE Std 802 2 1998 defines the LLC layer for the 802 family of standards 802 3 IEEE 802...

Page 304: ...nterframe Space a minimum and maximum Contention Window size and the maximum length in k sec of a burst of data IEEE 802 11e is still a draft IEEE standard most recent version is D5 0 July 2003 A curr...

Page 305: ...information into Ethernet frames A Access Point An access point acts as a communication hub for the devices on a WLAN providing a connection or bridge between wireless and wired network devices It su...

Page 306: ...supports The optional Parameter Sets indicates features of the specific signaling methods in use such as fre quency hopping spread spectrum direct sequence spread spectrum etc The optional Traffic Ind...

Page 307: ...n how the spectrum is licensed by national and transnational authorities such as the Federal Communications Commission FCC the European Telecommunications Standards Institute ETSI the Korean Communica...

Page 308: ...translates the domain name www usr com to an IP address for example 66 93 138 219 A domain name identifies one or more IP addresses Conversely an IP address may map to more than one domain name A doma...

Page 309: ...rs It uses the CSMA CA access method to handle simultaneous demands Ethernet supports data rates of 10 Mbps Fast Ethernet supports 100 Mbps and Gigabit Ethernet supports 1 Gbps Its cables are classifi...

Page 310: ...host on a LAN can access the Internet it needs to know the address of its default gateway H HTML The Hypertext Markup Language HTML defines the structure of a document on the World Wide Web It uses ta...

Page 311: ...n Detection System IDS inspects all inbound network activity and reports suspicious patterns that may indicate a network or system attack from someone attempting to break into the system It reports ac...

Page 312: ...cure Tunnel mode encrypts both the header and the payload ISP An Internet Service Provider ISP is a company that provides access to the Internet to individuals and companies It may provide related ser...

Page 313: ...anner LLC The Logical Link Control LLC layer controls frame synchronization flow control and error checking It is a higher level protocol over the PHY layer working in conjunction with the MAC layer M...

Page 314: ...NAT serves three main purposes it provides security by obscurity by hiding internal IP addresses enables the use of a wide range of internal IP addresses without fear of conflict with the addresses us...

Page 315: ...about how to encrypt decrypt and compress decompress the data JPEG and TIFF file formats are examples of protocols at this layer Layer 7 the Application layer includes protocols like hypertext transfe...

Page 316: ...Point to Point Protocol PPP It is used to ensure that data transmitted from one VPN node to another are secure Proxy A proxy is server located between a client application and a real server It interc...

Page 317: ...router uses the content of headers and its tables to determine the best path for forwarding a packet It uses protocols such as the Internet Control Message Protocol ICMP Routing Information Protocol R...

Page 318: ...tic IP Address See IP Address STP The Spanning Tree Protocol STP an IEEE 802 1 standard protocol related to network management for MAC bridges that manages path redundancy and prevents undesirable loo...

Page 319: ...IP the de facto standard protocols TCP IP was originally developed by Defense Advanced Research Projects Agency DARPA also known as ARPA an agency of the US Department of Defense Although TCP and IP a...

Page 320: ...newsgroup URLs are used extensively in HTML documents to specify the target of a hyperlink which is often another HTML document possibly stored on another computer The first part of the URL indicates...

Page 321: ...secret key 24 bit IV Shared Key for data encryption It uses a RC4 stream cipher to encrypt the frame body and CRC of each 802 11 frame before transmission Wi Fi A test and certification of interoperab...

Page 322: ...x mechanisms WPA2 Wi Fi Protected Access WPA2 is an enhanced security standard described in IEEE 802 11i that uses Advanced Encryption Standard AES for data encryption The original WPA uses Temporal K...

Page 323: ...links WDS 154 basic settings viewing 30 basic settings commands 192 beacon interval configuring 130 bridges WDS 153 broadcast SSID configuring 107 bss commands 229 C captive portal 123 channel automa...

Page 324: ...8 D DCF as related to QoS 145 default settings defined 16 resetting to 171 Detection Utility running 26 troubleshooting 284 DHCP understanding in relation to self managed APs 20 DTIM period configurin...

Page 325: ...urity 102 keyboard shortcuts 247 L link integrity monitoring 84 load balancing configuring 140 load balancing commands 238 location describing 49 loops WDS 154 M MAC filtering configuring 136 MAC filt...

Page 326: ...191 saving configuration changes 191 security comparison of modes 102 configuring on the access point 107 features overview 12 IEEE 802 1x 114 None 108 pros and cons of different modes 101 static WEP...

Page 327: ...terface 122 Voice over IP improved service with QoS 143 W wait time for cluster auto synch 48 WDS configuring 156 example 158 explanation 153 rules 157 288 WDS configuration 245 WEP security mode conf...

Page 328: ...Professional Access Point Administrator Guide Index 328...

Reviews: