Manuel d'utilisation / d'entretien du produit EAP8518 du fabricant Edge-Core
Aller à la page of 261
User Guide www .edge-core .com EAP8518 802.11n Access Point.
U SER G UIDE EAP8518 IEEE 802.11n Access Point EAP8518 E092009-D T -R01 149100000037A.
– 3 – C OMPLIANCES F EDERAL C OMM UNICA TION C OMMISSIO N I NTERF ERENCE S TATEMENT This equipment has been tested and found to compl y with the limits for a Class B digital device, p ursuant to P art 15 of the FCC Rules. These limit s are designed to provi de reasonable protection against harmful interference in a residential install ation.
C OMPLIANCES – 4 – IMPOR T ANT NO TE: FCC R ADIATION E XPOSURE S TATEMENT This equipment complies with FC C radiat ion exposure limits set forth for an uncontrolled environment. This eq uipment should be installed and operated with minimum distance 20 cm bet ween the radiator & y our body .
C OMPLIANCES – 5 – A USTRALI A /N EW Z EALAND AS/NZS 4771 T AIWAN NCC 根據交通部低功率管理辦法規定: 第十二條 經型式認證合格之低功率射頻電機,非經許可,.
C OMPLIANCES – 6 – N OTE : The user must use the configurat ion utility provided wi th this product to ensure the channels of op eration are in conformance with the spectrum usage rules for European Communit y countries as described below .
C OMPLIANCES – 7 – O PERATION U SING 5 GH Z C HANNELS IN THE E UROPEAN C OMM UNITY The user/installer must use the provided configur ation utility to check the current channel of operation and mak.
C OMPLIANCES – 8 – Hungarian Magyar Alulírott, Edgecore nyilatkozom, hogy a Radi o LAN device megfelel a vonatkozó alapvetõ követelményeknek és az 1999/5/EC irányelv egyéb elõírásainak.
– 9 – A BOUT T HIS G UIDE P URPOSE This guide gives s pecific inf ormation o n how to install t he 11n wireless access point and its ph ysical and perf ormance related char acteristics. It also gives information on how t o operat e and use the management functions of the access point.
– 10 – C ONTENTS C OMPLIANCES 3 A BOUT T HIS G UIDE 9 C ONTENTS 10 F IGURES 15 T ABLES 18 I NDEX OF CLI C OMMANDS 21 S ECTION I G ETTING S TARTED 24 1I NTRODUCTION 25 Key Hardware Features 25 Desc.
C ONTENTS – 11 – Location Selection 36 Mounting on a Horizontal Surface 37 Mounting on a Wall 38 Connecting and Powering On 39 4I NITIAL C ONFIGURATION 40 Connecting to the Login Page 40 Home Page.
C ONTENTS – 12 – SNMP Trap Settings 65 View Access Control Model 66 SNMPv3 Users 67 SNMPv3 Targets 68 SNMPv3 Notification Filters 69 7A DVANCED S ETTINGS 71 Local Bridge Filter 71 Link Layer Disco.
C ONTENTS – 13 – AP Wireless Configuration 105 Station Status 105 Event Logs 106 S ECTION III C OMMAND L INE I NTERFACE 108 11 U SING THE C OMMAND L INE I NTERFACE 110 Console Connection 110 Telne.
C ONTENTS – 14 – 22 F ILTERING C OMMANDS 175 23 S PANNING T REE C OMMANDS 18 0 24 WDS B RIDGE C OMMANDS 191 25 E THERNET I NTERFACE C OMMANDS 193 26 W IRELESS I NTERFACE C OMMAND S 198 27 W IRELES.
– 15 – F IGURES Figure 1: To p Panel 27 Figure 2: Rear Panel 27 Figure 3: Por ts 28 Figure 4: External Antenna Connectors 29 Figure 5: Screw-off External Antenna Connector - Close Up 29 Figure 6: .
F IGURES – 16 – Figure 32: SNMPv3 Targets 69 Figure 33: SNMP Notificati on Filter 69 Figure 34: Local Bridge Filter 71 Figure 35: LLDP Settings 72 Figure 36: Source ACLs 74 Figure 37: Destination .
F IGURES – 17 – Figure 68: Strai ght Through Wiring 251 Figure 69: Crossover Wiring 252 Figure 70: RJ-45 Console 254.
– 18 – T ABLES Table 1: Key Hardware Fea tures 25 Table 2: LED Behavior 30 Table 3: Logging Levels 59 Table 4: WMM Access Cate gories 94 Table 5: Command Modes 114 Table 6: Keystroke Commands 115 .
T ABLES – 19 – Table 32: 1000BASE-T MDI and MDI-X Port Pinouts 253 Table 33: Console Port Pi nouts 254.
T ABLES – 20 –.
– 21 – I NDE X OF CLI C OMMANDS N UMERICS 802.1x enable 169 802.1x session-timeout 170 A address filter default 171 address filter delete 172 address filt er entry 172 a-mpdu 199 a-msdu 200 apmgmg.
I NDEX OF CLI C OMMANDS – 22 – M mac-authentication server 173 mac-authentication session-timeout 173 make-radius-effective 167 make-rf-setting-effective 203 make-security-effective 219 management.
I NDEX OF CLI C OMMANDS – 23 –.
– 24 – S ECTION I G ETTING S TAR TED This section provides an overview of the access point, and introduces some basic concepts about wireless networ ki ng.
– 25 – 1 I NTR ODUCTION The EAP8518 is an IEEE 802.11n access point (AP) that meets dr aft 2.0 standards. It is fully interoper able with older 802.11a/b/ g standards, providing a tr ansparent, wireles s high speed data communication between the wired LAN and fixed or mobile devices.
C HAPTER 1 | Introduction Package Contents – 26 – initial configur ation and troubleshoot ing, and support for Simple Network Management tools. The EAP8518 utilises MIMO technology and Spatial Multiplexing to achiev e the highest possible data r ate and throughput on the 802.
C HAPTER 1 | Introduction Hardware Description – 27 – H AR D WARE D ESCRIPTION Figure 1: Top Panel Figure 2: Rear Panel LED Indicators Antennas DC Power Socket RJ-45 PoE Port Reset Button RJ-45 Co.
C HAPTER 1 | Introduction Hardware Description – 28 – Figure 3: Ports A NTENNAS The access point includes three integr ated external MIMO (m ultiple-in put and multiple-output) antennas. MI MO uses mul tiple antennas for transmit ting and receiving radio sign als to improv e data throughput and link r ange.
C HAPTER 1 | Introduction Hardware Description – 29 – Figure 4: External Antenna Conne ctors Figure 5: Screw-off Exte rnal Antenna Connector - Close Up.
C HAPTER 1 | Introduction Hardware Description – 30 – LED I NDICATOR S The access point includes four status LED indicators, as descri bed in the following figure and table. Figure 6: LEDs Table 2: LED Behavior LED Status Description LAN Off Ethernet RJ-45 has no valid link.
C HAPTER 1 | Introduction Hardware Description – 31 – C ONSOLE P ORT This port is used to connect a console device to the access point t hrough a serial cable. The console device can be a PC or workstation running a VT - 100 terminal emulator , or a VT -100 terminal.
– 32 – 2 N ETW O RK T OPOLOGIES Wireless ne tworks sup port a stand alone config uration as well as an integrated configur ation with 10/100/1000 Mbps Ethernet LANs. The EAP8518 also provides bri dging se rvices that can be configured independently on on any of the virtual AP (V AP) interfaces.
C HAPTER 2 | Network Topo logies Infrastructure Wireless LA N for Roaming Wireless PCs – 33 – The infrastructure configur ation extends the accessibilit y of wireless PCs to the wired LAN. A wireless infr astructure can be used for access to a centr al database, or for connection between mobile workers, as shown in the following figure.
C HAPTER 2 | Network Topo logies Infrastructure Wireless Bridge – 34 – wireless network cards and adapters an d wi reless access points within a specific ES S must be configured with the same S SID . Figure 8: Infrastructure Wirel ess LAN for Roaming Wireless PCs I NFRASTRUCTURE W IRELESS B RIDGE The IEEE 802.
C HAPTER 2 | Network Topo logies Infrastructure Wireless Bridge – 35 – Figure 9: Bridging Mode WDS Links Between Access Points VA P 2 AP Mode VA P 1 AP Mode VA P 2 AP Mode VA P 1 AP Mode Network C.
– 36 – 3 I NSTALLING THE A CCESS P OINT This chapter describes how to install the access point. L OCATION S ELECTIO N Choose a proper place for t he access point. In gener al, the best location is at the center of your wirel ess cov era ge area, within line of sight of all wireless devices.
C HAPTER 3 | Installing the Access Point Mounting on a Horizontal Surface – 37 – M OUNTING ON A H ORIZONTAL S URFACE T o keep the access point from slid ing on the surface, attach the four rubber feet provided in t he accessory kit to the mark ed circles on the bottom of the access point.
C HAPTER 3 | Installing the Access Point Mounting on a Wall – 38 – M OUNTING ON A W ALL T o mount on a wall follow the instructions below . Figure 11: Wall Mounting The access point should be mounted onl y to a wall or wood surface that is at least 1/2-inch plywood or its equi valent.
C HAPTER 3 | Installing the Access Point Connecting and Powering On – 39 – C ONNECTING AND P OW E R I N G O N Connect the power adapter to t he access point, and the power cord to an AC power outlet. Otherwise, the access point can derive its oper ating power directl y from the RJ-45 port when connected to a device that provides IEEE 802.
– 40 – 4 I NITIAL C ONFIGURATION The EAP8518 offers a user-friendly we b-based management interface for the configurati on of all the uni t’s features. Any PC directly attached to the unit can ac cess the ma nagement inte rface using a web browser , such as Internet Explorer (version 6.
C HAPTER 4 | Initial Configuration Home Page and Main Menu – 41 – H OME P AGE AND M AIN M ENU After logging in to the web interfac e, the Home page displays. The Home page shows some basic settings for th e AP , including Coun try Code and the management access password.
C HAPTER 4 | Initial Configuration Common Web Page Buttons – 42 – C AUTION : Y ou must set the country code t o the country of operation. Setting the country code restri cts operation of the access point to the r adio channels and tr ansmit power levels permitted for wireless networks in t he specif ied coun try .
C HAPTER 4 | Initial Configuration Quick Start – 43 – ◆ Logout – Ends the web management session. ◆ Save Config – Saves the current configur ation so that i t is retained after a restart. Q UIC K S TAR T The Quick Start menu is designed to he lp you configure the basic settings required to get the access point up an d running.
C HAPTER 4 | Initial Configuration Quick Start – 44 – ◆ Old Password — If the unit has b een configured with a password already , enter that password, otherwise enter the default password “admin. ” ◆ New Password — The password for management access.
C HAPTER 4 | Initial Configuration Quick Start – 45 – The following items are displa yed on this page: DHCP ◆ DHCP Status — Enables/disables DHCP on the access point. (Default: disabled) ◆ IP Address — Specifies an IP address for management of t he access point.
C HAPTER 4 | Initial Configuration Quick Start – 46 – S TEP 3 The Step 3 page of th e Quick Start configures radio interface settings. Figure 18: Quick Start - Step 3 The following items are displa yed on this page: I NTERFACE S ETTING ◆ WiFi Mode — Sets the mode of oper ation of the radio chip to 802.
C HAPTER 4 | Initial Configuration Main Menu Items – 47 – ■ TKIP: TKIP is used as the multicast enc ryption cipher . ■ AES-CCMP: AES-CCMP is used as the multicast encryption cipher . AES-CCMP is the standard encrypti on cipher required for WP A2.
– 48 – S ECTION II W EB C ONFIGURATION This section provides details on conf iguring the access point using the web browser interface. This section includes these chapters: ◆ “System Settings.
– 49 – 5 S YSTEM S ETTINGS This chapter describes basic system setti ngs on the access point. It includes the following sections: ◆ “ Administration Settings” on page 50 ◆ “IP Address”.
C HAPTER 5 | System Settings Administration Settings – 50 – A DMINISTRATION S ETTINGS The Administration Sett ings page config ures some b asic setti ngs for the AP , such as the system identifi cation name, the management access password, and the wireless operation Country Code.
C HAPTER 5 | System Settings IP Address – 51 – C AUTION : Y ou must set the country code t o the country of operation. Setting the country code restri cts operation of the access point to the r adio channels and tr ansmit power levels permitted for wireless networks in t he specif ied coun try .
C HAPTER 5 | System Settings RADIUS Settings – 52 – ◆ Default Gateway — The default g ateway is the IP address of the router for the access point, which is used if the request ed destination address is not on the local subnet.
C HAPTER 5 | System Settings RADIUS Settings – 53 – Figure 21: RADIUS Settings The following items are displa yed on the RADIUS Setti ngs page: ◆ RADIUS Status — Enables/disables the primary RADIUS server . ◆ IP Address — Specifies the IP addres s or host name of the RADIUS server .
C HAPTER 5 | System Settings System Time – 54 – ◆ Port (1024-6553 5) — The UDP port number used by the RADIUS accounting server for authenti cation messages. (R ange: 1024-65535; Default: 1813) ◆ Key — A shared text st ring used to encrypt messages between t he access point and the RADIUS accounti ng server .
C HAPTER 5 | System Settings System Time – 55 – SNTP S ERVER S ETTINGS Configures the access poin t to oper ate as an SNTP client. When enabled, at least one time server IP address must be specified.
C HAPTER 5 | System Settings SpectraLink Voice Priority – 56 – S PECTRA L INK V OICE P RIORITY SpectraLink V oice Priority (SVP) is a voice priori ty mechanism for WLANs. SVP is an open, str aightforward QoS approach that has been adopted by most leading vendors of WLAN APs.
C HAPTER 5 | System Settings VLAN Configuration – 57 – ◆ When VLAN support is enab led on th e access point, traff ic passed to the wired network is tagged with the appropriate VLAN ID , either a V AP default VLAN ID, or the management VLAN ID .
C HAPTER 5 | System Settings System Logs – 58 – S YSTEM L OGS The access point can be configured to send ev ent and error messages to a System Log Serv er . The system clock can also be synchronized with a time server , so that all the messages sent to the Sy slog server are stamped with the correct time and date.
C HAPTER 5 | System Settings Quick Star t Wizard – 59 – ◆ Logging Level — Sets the minimum severity lev el for event logging. (Default: Debug) The system allows you to l imit the messages that are logg ed by specifying a minimum severity level.
– 60 – 6 M ANA G EMENT S ETTINGS This chapter describes management acce ss settings on the access point. It includes the following sections: ◆ “Remot e Management Settings” on page 60 ◆ .
C HAPTER 6 | Management Settings Remote Management Settings – 61 – ◆ The client and serv er generate session keys for encrypting and decrypting data. ◆ The client and serv er establish a secure encrypted connection. ◆ A padlock icon should appear in th e status bar for Internet Expl orer .
C HAPTER 6 | Management Settings Access Limitation – 62 – ◆ HTTPS Server — Enables/disables management access fr om a HT TPS server . (Default: enabled) ◆ HTTPS Port — Specifies the HT TPS port for secure IP connectivity . (Default: 443; R ange 1024-65535) ◆ SNMP Access — Enables/disables manage ment acc ess from SNMP interfaces.
C HAPTER 6 | Management Settings Simple Network Management Protocol – 63 – ◆ Subnet Mask — Specifies the subnet mask in the form 255.255.255.x R ESTRICT M ANA GEMENT ◆ Enable/Disable — Enables/disables manage ment of the device by a wireless client.
C HAPTER 6 | Management Settings Simple Network Management Protocol – 64 – Figure 28: SNMP Basic Set tings The following items are displa yed on this page: ◆ SNMP — Enables or disables SNMP management access and also enables the access point to s end SNMP traps ( notifications).
C HAPTER 6 | Management Settings Simple Network Management Protocol – 65 – SNMP T RAP S ETTINGS T raps indicating stat us changes are issued by the AP t o specified tr ap managers. Y ou must specify tr ap managers so that ke y events are reported by the AP to your management station (using network management platforms).
C HAPTER 6 | Management Settings Simple Network Management Protocol – 66 – V IEW A CCESS C ONTR OL M ODEL T o configure SNMPv3 management access to the AP , follow these st eps: 1.
C HAPTER 6 | Management Settings Simple Network Management Protocol – 67 – to the subtree “1.3.6.1.2.1.2.2.1.1.2 3, ” the zero corresponds to the 10th subtree ID. When there are more subtree IDs than bits in the mask, the mask is padded with ones.
C HAPTER 6 | Management Settings Simple Network Management Protocol – 68 – The following items are displa yed on this page: ◆ User Name — The SNMPv3 user name. (32 char acters maximu m) ◆ Group — The SNMPv3 group name. ◆ Auth Type — The au thentication type us ed for the SNMP user ; either MD5 or none.
C HAPTER 6 | Management Settings Simple Network Management Protocol – 69 – Figure 32: SNMPv3 Targets The following items are displa yed on this page: ◆ Target ID — A user-defined name that identifies a receiver of notifications.
C HAPTER 6 | Management Settings Simple Network Management Protocol – 70 – The following items are displa yed on this page: ◆ Filter ID — A user -defined name that identifies the filter . (Maximum length: 32 characters) ◆ Subtree — Specifies MIB subtree to be fi ltered.
– 71 – 7 A D V ANCED S ETTINGS This chapter describes adv anced settings on the access point. It includes the following sections: ◆ “Local Bridge Filter” on page 71 ◆ “Link Layer Discove.
C HAPTER 7 | Advanced Settings Link Layer Discovery Protocol – 72 – ◆ Prevent Inter and Intra VAP client communication — Whe n enabled, c lients can not estab lish wire less com municatio ns with any other client, either thos e associated to the same V AP interface or any other V AP interface.
C HAPTER 7 | Advanced Setting s Link Layer Discovery Protocol – 73 – ◆ Message Transmission Interval (seconds) — Configures the periodic tr ansmit interv al for LLDP advertisement s.
C HAPTER 7 | Advanced Settings Access Control Lists – 74 – A CCESS C ONTR OL L ISTS Access Control Lists allow you to configure a list of wireless clie nt MAC addresses that are not authorized to access the network. A database of MAC addresses can be conf igured locally on the access point.
C HAPTER 7 | Advanced Setting s Access Control Lists – 75 – D ESTINATION A DDR ES S S ETTINGS The ACL Destination Address Settings page enables tr affic filtering b ased on the destination MAC address i n the data frame.
C HAPTER 7 | Advanced Settings Access Control Lists – 76 – E THERNET T YPE The Ethernet T y pe Filter controls ch ecks on the Ethernet type of all incoming and outgoing Ethernet pack ets against the protocol filtering table.
– 77 – 8 W IRELESS S ETTINGS This chapter describes wireless settings on the access point. It includes the following sections: ◆ “Spanning T ree Protocol (STP)” on page 77 ◆ “ Authentica.
C HAPTER 8 | Wireless Settings Spanning Tree Protocol (STP) – 78 – Figure 39: Spanning Tree Protocol B RIDGE Sets STP bridge link par ameters. The following items are displa yed on the STP page: ◆ Spanning Tree Protcol — Enables/disables STP on the AP .
C HAPTER 8 | Wireless Settings Spanning Tree Protocol (STP) – 79 – from among the device ports attached to t he network. (Default: 20 seconds; R ange: 6-40 seconds) Minimum: The higher of 6 or [2 x ( Hello Time + 1)].
C HAPTER 8 | Wireless Settings Authentication – 80 – ◆ Link Port Priority — Defines the priorit y used for this port in the Spanning T ree Protocol. If the path cost for all ports on a switch are the same, the port with the highest priority (i.
C HAPTER 8 | Wireless Settings Authentication – 81 – Figure 40: Local Authen tication The following items are displa yed on Authentication page: MAC Authentication — Sel ects between, disabled , Local MAC authentication and RA DIUS authentication.
C HAPTER 8 | Wireless Settings Authentication – 82 – ◆ MAC Authentication Table — Displa ys current entries in the local MAC database. RADIUS MA C A UTHENT ICATION The MAC address of the associat ing station is sent to a config ured RADIUS server for authentication.
C HAPTER 8 | Wireless Settings Interface Mode – 83 – I NTERFACE M OD E The access point can operate in tw o modes, IEEE 80 2.11a/n only , or 802.11g/n only . Also note that 802.11g is backw ard compatible with 802.11b, oper ating in the 2.4 GHz b and.
C HAPTER 8 | Wireless Settings Radio Settings – 84 – R ADIO S ETTINGS The IEEE 802.11n interfaces include configur ation options for r adio signal characteristics and wirel ess security features. The access point can oper ate in two modes, mix ed 802.
C HAPTER 8 | Wireless Settings Radio Settings – 85 – The following items are displa yed on this page: ◆ High Throug hput Mode — The access point provides a channel bandwidth of 20 MHz by default giving an 802.11g connection speed of 54 Mbps and a 802.
C HAPTER 8 | Wireless Settings Radio Settings – 86 – ◆ Preamble Length — The r adio preamble (som etimes called a header ) is a section of data at the head of a packet that contains information that the wireles s device and clie nt devi ces need when sending and receiving packets.
C HAPTER 8 | Wireless Settings Virtual Access Points (VAPs) – 87 – ◆ Aggregate MAC Protocol Data Unit (A-MPDU) — Enables / disables the sending of this four fr ame packet header for statistical purposes. (Default: Enabled) ◆ A-MPDU Length Limit (1024-65535) — Defines the A-MPDU length.
C HAPTER 8 | Wireless Settings Virtual Access Points (VAPs) – 88 – The following items are displa yed on this page: ◆ VAP Number — The number associated with the VAP , 0-7. ◆ SSID — The name of the basic service set provid ed by a V AP interface.
C HAPTER 8 | Wireless Settings Virtual Access Points (VAPs) – 89 – ◆ Mode — Selects the mode in wh ich the V AP will function. ■ AP Mode : The V AP provides services to client s as a normal access point. ■ WDS-AP Mode : The V AP oper ates as an access point in WDS mode, which accepts connections from client stations in WDS-ST A mode.
C HAPTER 8 | Wireless Settings Virtual Access Points (VAPs) – 90 – The following items are displa yed in the V AP Basic Settings when WDS-AP mode is selected: ◆ WDS-AP (Parent) SSID — The SSID of the VAP on the connecting access point that is set to WDS- AP mode.
C HAPTER 8 | Wireless Settings Virtual Access Points (VAPs) – 91 – to configure and maintain a RADIUS server , WPA provides a simple operating mode that uses just a pre-shared password for network access.
C HAPTER 8 | Wireless Settings Virtual Access Points (VAPs) – 92 – RADIUS server , the client remains co nnected the network. Only if re- authentication fails is networ k access block ed.
C HAPTER 8 | Wireless Settings Quality of Service (QoS) – 93 – The following items are on this page for WEP configurat ion: ◆ Default WEP Key Index – Selects the key number to use for encryption for the V AP interface.
C HAPTER 8 | Wireless Settings Quality of Service (QoS) – 94 – 802.1D priorities is speci fically intended to facilitate inter oper ability with other wired network QoS policies. Whil e the four ACs are specified for specific ty pes of traff ic, WMM allows th e priority levels to be configured to match any network -wide QoS policy .
C HAPTER 8 | Wireless Settings Quality of Service (QoS) – 95 – Figure 49: WMM Backoff Wait Times For high-priority tr affic, the AIFSN an d CW v alues are smaller . The smaller va lues equate to less bac koff and wa it time, and therefore more t ransmit opportunities.
C HAPTER 8 | Wireless Settings Quality of Service (QoS) – 96 – The following items are displa yed on this page: ◆ WMM — Sets the WMM operational mode on the access point. When enabled, the parameters for each AC queue will be employed on the access point and QoS capabi lities are advertised to WMM-enabled clients.
C HAPTER 8 | Wireless Settings Quality of Service (QoS) – 97 – ■ Admission Control : The admission control mode for the access category . When enabled, clients are blocked from using the access category . (Default: Disabled) ◆ Set WMM — Applies the new parameters and sa ves them to RAM memory .
– 98 – 9 M AINTENANCE S ETTINGS Maintenance settings incl udes the following sections: ◆ “Upgrading Firmw are” on page 98 ◆ “Runni ng Configur ation” on page 101 ◆ “Resetti ng the .
C HAPTER 9 | Maintenance Settings Upgrading Firmware – 99 – Figure 51: Firmware The following items are displa yed on this page: ◆ Firmware Version — Di splays what ve rsion of software is being used as a runtime image - “ Active” , and what version is a backup image - “Backup” .
C HAPTER 9 | Maintenance Settings Upgrading Firmware – 100 – ◆ Remote — Downloads an operation code image file from a specified remote FTP or TF TP server . After filling in the following fields, click Start Upgrade to proc eed. ■ New Firmware File : Specifies the name of the code file on t he server .
C HAPTER 9 | Maintenance Settings Running Config uration – 101 – R UNNING C ONFIGURATION A copy of a previous running configur ation ma y be uploaded to the access point as a sav ed file from a remote location, or the current configur ation saved and stored f or restoration purposes at a later point.
C HAPTER 9 | Maintenance Settings Resetting the Access Point – 102 – ◆ IP Address — IP address or host name of FTP or TFTP server . ◆ Username — The user ID used for login on an FTP server . ◆ Password — The password used for logi n on an FTP server .
– 103 – 10 S TATUS I NF ORMATION The Information menu displays in formation on the current system configurati on, the wireless interface, the st ation status and system logs.
C HAPTER 10 | Status Information AP Status – 104 – The following items are displa yed on this page: ◆ Serial Number — The serial number of the ph ysical access point. ◆ System Up Time — Length of time the management agent has been up. ◆ Ethernet MAC Address — The physical layer address for the Ethernet port.
C HAPTER 10 | Status Information Station Status – 105 – AP W IRELESS C ONFIGURATION The AP Wireless Configur ation displays the V AP interface settings. Figure 55: AP Wir eless Configur ation The following items are displa yed on this page: ◆ VAP — Displays the V AP numb er .
C HAPTER 10 | Status Information Event Logs – 106 – E VENT L OGS The Event Logs wi ndow shows the lo g messages gener ated by the access point and stored in memory . Figure 57: Event Logs The following items are displa yed on this page: ◆ Display Event Log — Selects the log entries to disp lay .
C HAPTER 10 | Status Information Event Logs – 107 –.
– 108 – S ECTION III C OMMAND L INE I NTERFACE This section provides a d etailed description of the Command Line Interface, along with examples for all of the commands.
S ECTION | Command Line Interface – 109 – ◆ “VLAN Commands” on page 226 ◆ “WMM Commands” on page 229.
– 110 – 11 U SING THE C OMMAND L INE I NTERFACE When accessing the management interfac e for the over a direct connection to the console port, or via a T elnet connection, the access point can be managed by enteri ng command ke ywor ds and par ameters at the prompt.
C HAPTER 11 | Using the Command Line Interface Telnet Connection – 111 – T ELNET C ONNECTION T elnet operates over the IP transport protocol. In this en vironment, your management station and any network device y ou want to manage o ver the network must have a valid IP address.
C HAPTER 11 | Using the Command L ine Interface Entering Commands – 112 – E NTERING C OMMANDS This section describes how t o enter CLI commands. K EYWO RDS AND A RGU M E NT S A CLI command is a series of keywords and arguments. K eywords identify a command, and arguments specify configurati on parameters.
C HAPTER 11 | Using the Command Line Interface Entering Commands – 113 – filters Show filters. interface Show interface information. line TTY line information. lldp Show lldp parameters. logging Show the logging buffers. radius Show radius server.
C HAPTER 11 | Using the Command L ine Interface Entering Commands – 114 – list of the commands av ailable for th e current mode. The command classes and associated modes are disp layed in the foll owing table: E XEC C OMMANDS When you open a new console session on an access point, the system enters Exec command mode.
C HAPTER 11 | Using the Command Line Interface Entering Commands – 115 – T o enter Interface mode, you must enter the “ interface ethernet ” while in Global Configur ation mode. The system prompt will change t o “ AP(if-ethernet)#, ” or “ AP(if -wireless 0)” indicating that you hav e access privileges to the associated commands .
– 116 – 12 G ENERAL C OMMANDS This chapter details gener al commands that apply t o the CLI. configure This command activ ates Global Configur ation mode. Y ou must enter this mode to modify most of the settings on the access point. Y ou must also enter Global Configurati on mode prio r to enabling the context modes for Interface Configuration.
C HAPTER 12 | General Commands – 117 – end This command returns to the previous conf iguration mode. D EFAULT S ETTING None C OMMAND M ODE Global Configuration, Interface Configur ation E XAMPLE T.
C HAPTER 12 | General Commands – 118 – C OMMAND M ODE Exec E XAMPLE The following example di sables th e CLI timeout. AP(config)# cli-session-timeout disable AP(config)# ping This command sends ICMP echo request pack ets to another node on t he network.
C HAPTER 12 | General Commands – 119 – reset This command restarts the sys tem or restores the factory default settings. S YNTAX reset < board | configuration > board - Reboots the system. configuration - R esets the configur ation settings to the fac tory defaults, and then reboots the system.
– 120 – 13 S YSTEM M ANA G EMENT C OMMANDS These commands are used to configure the password, system logs, browser management options, clock sett ings, and a variety of other system information.
C HAPTER 13 | System Management Commands – 121 – country This command configures the access point’ s country c ode, which identifies the country of operation and sets the authorized radio channels. S YNTAX country < countr y_code > country_code - A two char acter code that identifies the country of operation.
C HAPTER 13 | System Management Commands – 122 – D EFAULT S ETTING US - for units s old in th e United States 99 (no country set) - for unit s sold in other countries C OMMAND M ODE Exec C OMMAND U SAGE ◆ If you purchased an access point ou tside of the United States, the country code must be s et before radi o functions are enabled.
C HAPTER 13 | System Management Commands – 123 – D EFAULT S ETTING Enterprise AP C OMMAND M ODE Global Configuration E XAMPLE AP(config)#system name AP AP(config)# passw or d After initially logging onto the sy stem, you should set t he password. Remember to record it in a safe place.
C HAPTER 13 | System Management Commands – 124 – ◆ After boot up, the S SH server need s about two minutes to ge nerate host encryption keys. The SSH server is disabled while the keys are being generated. The show sys tem command displays the status of the SSH server .
C HAPTER 13 | System Management Commands – 125 – apmgmtui http port This command specifies the TC P port number used by the web browser interface. Use the no form to use the default port. S YNTAX apmgmtui http port < port-number > no apmgmtui http po rt port-number - The TCP port to be used by the browser interface.
C HAPTER 13 | System Management Commands – 126 – apmgmtui http session-timeout This command sets the web browser timeout limit. S YNTAX apmgmtui http session-timeout < seco nds > seconds - The web session timeout.
C HAPTER 13 | System Management Commands – 127 – E XAMPLE AP(config)# apmgmtui https port 1234 AP(config)# apmgmtui https server Use this co mmand to enab le the se cure hypertext tr ansfer protocol (HT TPS) over the Secure Socket Layer ( SSL), prov iding secure access (that is, an encrypted connecti on) to the access point’ s web interf ace.
C HAPTER 13 | System Management Commands – 128 – apmgmtui snmp This command enables and di sables SNMP management access to the AP . S YNTAX apmgmt ui snmp [ enable | disable ] enable - Enables SNMP management access. disable - Disabl es SNMP mana gement acce ss.
C HAPTER 13 | System Management Commands – 129 – C OMMAND U SAGE ◆ If anyone trie s to access a manageme nt interface on the access point from an inv alid address, the unit w ill reject t he conn ection, enter an event message in the system log, an d send a trap message to the tr ap manager .
C HAPTER 13 | System Management Commands – 130 – System Contact : System Country Code : US - United States MAC Address : 00:22:2d:4d:7b:80 Radio 0 MAC Address : 00:22:2d:4d:7b:81: IP Address : 192.168.1.1 Subnet Mask : 255.255.255.0 Default Gateway : 192.
C HAPTER 13 | System Management Commands – 131 – Address Filtering : ALLOWED System Default : ALLOW addresses not found in filter table. Filter Table ----------------------------------------------------------- No Filter Entries. Bootfile Information =================================== Bootfile : ec-img.
C HAPTER 13 | System Management Commands – 132 – Key 1: EMPTY Key 2: EMPTY Key 3: EMPTY Key 4: EMPTY Key Length : Key 1: ZERO Key 2: ZERO Key 3: ZERO Key 4: ZERO Authentication Type : OPEN Rogue A.
C HAPTER 13 | System Management Commands – 133 – 2: 0.0.0.0, Community: *****, State: Disabled 3: 0.0.0.0, Community: *****, State: Disabled 4: 0.0.
C HAPTER 13 | System Management Commands – 134 – Boot Rom Version : v3.0.7 Software Version : v4.3.2.2 SSH Server : ENABLED SSH Server Port : 22 Telnet Server : ENABLED WEB Redirect : DISABLED DHC.
– 135 – 14 S YSTEM L OG GING C OMMANDS These commands are used to configure sys tem logging on the access point. logging on This command controls logging of e rror messages; i. e. , sending debug or error messages to me mory . The no form disables the logging process.
C HAPTER 14 | System Logging Comman ds – 136 – logging host This command specifies syslog servers host that will receive log ging messages. Use the no form to remove syslog server host.
C HAPTER 14 | System Logging Commands – 137 – logging le vel This command sets the minimum severity level for event logging. S YNTAX logging level < Emerge ncy | Alert | Critical | Error | Warn.
C HAPTER 14 | System Logging Comman ds – 138 – show log ging This command displa ys the logging configur ation. S YNTAX show logging C OMMAND M ODE Exec E XAMPLE AP#show logging Logging Information ===================================================== Syslog State : ENABLE Logging Console State : DISABLE Logging Level : Debug Servers 1: 10.
– 139 – 15 S YSTEM C LOC K C OMMANDS These commands are used to configure SNTP and system clock settings on the access point. sntp-server ip This command sets the IP address of the servers to which SNTP ti me requests are issued. Use the this command with no arguments t o clear all time servers from the current list.
C HAPTER 15 | System Clock Commands – 140 – E XAMPLE AP(config)#sntp-server ip 1 10.1.0.19 AP# R ELATED C OMMANDS sntp-server enabled show sntp sntp-server enabled This comm and enable s SNTP clie nt requests for ti me synchron ization with NTP or SNTP time servers sp ecified by the sntp-server ip command.
C HAPTER 15 | System Clock Commands – 141 – minute - Sets the mi nute. (R ange: 0-59) D EFAULT S ETTING 00:14:00, January 1, 1970 C OMMAND M ODE Global Configuration E XAMPLE This example sets the system clock to 12:10 April 27, 2009.
C HAPTER 15 | System Clock Commands – 142 – E XAMPLE This sets daylig ht savings time to be used from the Sunday in the fourth week of April, to the Sunday in the fourt h week of October .
C HAPTER 15 | System Clock Commands – 143 – Time Zone : (GMT+08) Hong Kong, Perth, Singapore, Taipei Daylight Saving : DISABLED Daylight Saving Time : From MAR, Fourth Week, Wednesday To NOV, Last.
– 144 – 16 DHCP R ELA Y C OMMANDS Dynamic Host Configuration Protocol (D HCP) can dynamically allocate an IP address and other configuration in formation to network clients that broadcast a request. T o receive the broadcast request, the DHCP server would normally have to be on the same subnet as the client.
C HAPTER 16 | DHCP Relay C ommands – 145 – R ELATED C OMMANDS show interface wireless.
– 146 – 17 SNMP C OMMANDS Controls access to this access point from management stations using the Simple Network M anagement Protocol (SNMP), as well as the hosts that will receive tr ap messages.
C HAPTER 17 | SNMP Commands – 147 – snmp-server comm unity This command defines the communit y a ccess string for the Simple Network Management Protocol.
C HAPTER 17 | SNMP Comm ands – 148 – C OMMAND M ODE Global Configuration E XAMPLE AP(config)#snmp-server contact Paul AP(config)# R ELATED C OMMANDS snmp-server location snmp-server location This command sets the system location st ring. Use the no form t o re move the location string.
C HAPTER 17 | SNMP Commands – 149 – C OMMAND U SAGE ◆ This command enables both authenti cation failure notifications and link -up-down notifications. ◆ The snmp-server host command specifies the host device that will receive SNMP notificati ons.
C HAPTER 17 | SNMP Comm ands – 150 – snmp-server trap This command enables the access poin t to send specific SNMP tr aps (i.e. , notifications). Use t he no form to disable specific trap messages.
C HAPTER 17 | SNMP Commands – 151 – sntpServerFail - The access p oint has failed to set the time from the configured SNTP server . sysConfigFileVersionChanged - The access point’s configur ation file has been changed .
C HAPTER 17 | SNMP Comm ands – 152 – C OMMAND M ODE Global Configuration C OMMAND U SAGE ◆ The access point allows multiple noti fi cation filters to b e created.
C HAPTER 17 | SNMP Commands – 153 – password for authentication and a DES key/ password for encryption. read-view - The name of a defined S N MPv3 view for read access.
C HAPTER 17 | SNMP Comm ands – 154 – D EFAULT S ETTING None C OMMAND M ODE Global Configuration C OMMAND U SAGE ◆ Multiple SNMPv3 users can be configured on the access point. ◆ Users must be assigned to groups that have the same securit y levels.
C HAPTER 17 | SNMP Commands – 155 – ◆ The SNMP v3 user name that is spec ified in th e target must firs t be configured using the snmp-server user command. E XAMPLE AP(config)#snmp-server target tarname 192.168.1.33 chris 1234 AP(config)# snmp-server filter This command configures SNMP v3 notification filters.
C HAPTER 17 | SNMP Comm ands – 156 – show snmp user s This command di splays the SNMP v3 users and settings. S YNTAX show snmp users C OMMAND M ODE Exec E XAMPLE AP# show snmp users User List: ===.
C HAPTER 17 | SNMP Commands – 157 – show snmp filter This command displays the S NMP v3 notification filter sett ings. S YNTAX show snmp filter [ filter-id ] filter-id - A user -defined name that ident ifies an SNMP v3 notificat ion filter .
C HAPTER 17 | SNMP Comm ands – 158 – systemUp: Disabled systemDown: Disabled ========================================================================== AP# show snmp v acm vie w This command displa ys the configured SNMP v3 views. S YNTAX show snmp vacm view [ view-nam e ] view-name - The name of a user-defined SNMPv3 view.
C HAPTER 17 | SNMP Commands – 159 – ================================== Group Name : testgroup Security Level : NoAuthNoPriv Read-View : defaultview Write-View : defaultview Group Name : group2 Sec.
– 160 – 18 F LASH /F ILE C OMMANDS These commands are used to manage the system code or configur ation files. dual-image This command specifies the image used to start up the system. S YNTAX dual-image boot image [ a | b ] a - Selects image file A as the startup software.
C HAPTER 18 | Flash/File Commands – 161 – E XAMPLE AP# dual-image boot-image A Change image to A AP# copy This command copies a boot file, code image, or configur ation file between the access point’ s flash memory and a FTP/TF TP server .
C HAPTER 18 | Flash/File Commands – 162 – characters for files on the access point. (V alid char acters: A -Z, a- z, 0-9, “. ” , “-” , “_”) ◆ Due to the size limit of the flash memory , the access point supports only two operation code files.
– 163 – 19 RADIUS C LIENT C OMMANDS Remote A uthentication Dial-in User Service (RADIUS) is a logon authentication protocol that uses soft ware running on a central se rver to control access for RADIUS- aware devic e s to the ne twork.
C HAPTER 19 | RADIUS Client Com mands – 164 – E XAMPLE AP(config)# radius-server primary enable This setting has not been effective ! If want to take effect, please execute make-radius-effective command ! AP(config)# radius-server address This command specifies the primar y and secondary RADIUS serv er address.
C HAPTER 19 | RADI US Client Comm ands – 165 – If want to take effect, please execute make-radius-effective command ! AP(config)# radius-server key This command sets the RADIUS encryption k ey . S YNTAX radius-server { primary | secondary ] key < key_string> key_string - Encryption key used to authenti cate logon access for client.
C HAPTER 19 | RADIUS Client Com mands – 166 – This setting has not been effective ! If want to take effect, please execute make-radius-effective command ! AP(config)# radius-server accounting port This command sets the RADIUS Account ing port.
C HAPTER 19 | RADI US Client Comm ands – 167 – E XAMPLE AP(config)# radius-server accounting key green This setting has not been effective ! If want to take effect, please execute make-radius-effe.
C HAPTER 19 | RADIUS Client Com mands – 168 – Please wait a while... AP(config)# show radius This command displays the c urrent settings for the RADIUS server . D EFAULT S ETTING None C OMMAND M ODE Exec E XAMPLE AP#show radius Radius Accounting Information ============================================== IP : 10.
– 169 – 20 802.1X A UTHENTICATION C OMMANDS The access point supports IEEE 802.1X access control for wireless clients. This control feature prevents unau thorized access t o the network by requiring an 802.1X client application to submit user credentials for authentication.
C HAPTER 20 | 802.1X Authentication Commands – 170 – E XAMPLE AP(if-wireless 0: VAP[0])# 802.1x enable This setting has not been effective ! If want to take effect, please execute make-security-effective command ! AP(if-wireless 0: VAP[0])# R ELATED C OMMANDS show interface wireless 802.
– 171 – 21 MA C A DDRESS A UTHENTICATION C OMMANDS Use these commands to define MAC authen tication on the access point. F or local MAC authentication, first define the default fi ltering policy using the address filter default command. T hen enter the MAC addr esses to be filtered, indicating if they are allowed or denied.
C HAPTER 21 | MAC Address Authentication Commands – 172 – R ELATED C OMMANDS address filter entry address filter entry This command enters a MAC address in the filter tab le. S YNTAX address filter entry < allowed | denied > < mac-address> allowed - Entry is allowed access.
C HAPTER 21 | MAC Address Authentication Commands – 173 – D EFAULT None C OMMAND M ODE Global Configuration E XAMPLE AP(config)#address filter delete allowed 00-70-50-cc-99-1b AP(config)# mac-authentication server This command sets address fil tering to be performed wit h local or remote options.
C HAPTER 21 | MAC Address Authentication Commands – 174 – D EFAULT 0 (disabled) C OMMAND M ODE Global Configuration E XAMPLE AP(config)#mac-authentication session-timeout 300 AP(config)# show authentication This command shows all authentication setti ngs, as well as the address filter table.
– 175 – 22 F ILTERING C OMMANDS The commands described in this sec tion are used to filter communications between wireless clients, cont rol acce ss to the management interface from wireless clients, and filter traffi c using specific Ethernet protocol types.
C HAPTER 22 | Filtering Commands – 176 – C OMMAND U SAGE This command can disable wireless-to- wireless communications between clients via the access poi nt. However , it does not affect communi cations between wireless cl ients and the wired network.
C HAPTER 22 | Filtering Commands – 177 – C OMMAND M ODE Global Configuration C OMMAND U SAGE Y ou can add up to 128 MAC addresses to the fi ltering table.
C HAPTER 22 | Filtering Commands – 178 – C OMMAND M ODE Global Configuration C OMMAND U SAGE This command is used in conjunction with the filter ethernet-t ype protocol command to determine which Ethernet protocol types are to be filtered.
C HAPTER 22 | Filtering Commands – 179 – show filter s This command shows the filter options and protocol ent ries in the filter table. S YNTAX show filters [ acl-source-address | acl-destination-.
– 180 – 23 S PANNING T REE C OMMANDS The commands described in this section are used to set the MAC address table aging time and spanning tree p arameters f or both the Ethernet and wireless interfaces.
C HAPTER 23 | Spanning Tree Comman ds – 181 – bridge stp service This command enables the Span ning T ree Pro tocol. Use the no form to disable the Spanning T ree Protocol. S YNTAX [ no ] bridge stp service D EFAULT S ETTING Enabled C OMMAND M ODE Global Configuration E XAMPLE This example globally enables the Spanning T ree Protocol.
C HAPTER 23 | Spanning Tree Commands – 182 – bridge stp br-conf hello-time Use this command to configure the spanning tree brid ge hello time global ly for the wireless bridge. S YNTAX bridge stp br-conf hello-time < time > time - Time in sec onds.
C HAPTER 23 | Spanning Tree Comman ds – 183 – E XAMPLE AP(config)#bridge stp max-age 40 AP(config)# bridge stp br-conf priority Use this command to configure the span ning tree priority globall y for the wireless bridge. S YNTAX bridge stp br-conf priority < priority> priority - Priorit y of the bridge.
C HAPTER 23 | Spanning Tree Commands – 184 – E XAMPLE AP(config)# bridge stp port-conf interface wireless 0 Enter Wireless configuration commands, one per line. AP(stp-if-wireless 0)# bridge-lin k path- cost Use this command to configure the spanning tree path cost for the Ethernet port.
C HAPTER 23 | Spanning Tree Comman ds – 185 – C OMMAND U SAGE ◆ This command defines the priority for the use of a port in the Spanning T ree Protocol. If the path cost for a ll ports on a wi reless bridge are the same, the port with the highest priority (that i s, lowest v alue) will be configured as an active link in the spanning tree.
C HAPTER 23 | Spanning Tree Commands – 186 – E XAMPLE AP(stp-if-wireless 0: VAP[0])# path-cost 512 AP(stp-if-wireless 0: VAP[0])# por t-priority (STP Interface) This command sets the spanning tree path cost for the V AP interface. S YNTAX port-priority < priority > priority - The priority for the V AP interface.
C HAPTER 23 | Spanning Tree Comman ds – 187 – ================================== AP# show bridge br -conf This command displays spanning t ree settings for a specified VLAN. S YNTAX show bridge br-conf < all | vlan-id> all - K eyword to show t he STP configuration for all VLANs.
C HAPTER 23 | Spanning Tree Commands – 188 – Link Port Priority : 32 Link Path Cost : 4 ======================================== ATH0 configuration ======================================== Link Po.
C HAPTER 23 | Spanning Tree Comman ds – 189 – vlan-id - Specifies a VLAN ID. (R ange: 0-4095) C OMMAND M ODE Exec E XAMPLE AP# show bridge status all br0 status ===================================================== Bridge ID : 8000.0012cfa25430 Designated Root ID : 8000.
C HAPTER 23 | Spanning Tree Commands – 190 – C OMMAND M ODE Exec E XAMPLE AP# show bridge forward-addr interface wireless 0 vap 0 MAC ADDRESS INTERFACE VLAN AGE ===================================.
– 191 – 24 WDS B RIDGE C OMMANDS The commands described in this sec tion are used to set the operati on mode for each access poi nt interface and configure Wireless Dis tribution System (WDS) forw arding table settings. wds ap This command enables the brid ge operation mode for the radio interfac e.
C HAPTER 24 | WDS Bridge Commands – 192 – D EFAULT S ETTING None C OMMAND M ODE Interface Configuration (Wireless) V AP C OMMAND U SAGE In WDS-ST A mode, the V AP oper ates as a cli ent station in WDS mode, which connects to an access poi nt in WDS- AP mode.
– 193 – 25 E THERNET I NTERFACE C OMMANDS The commands described in this sec tion configure connection par ameters for the Ethernet port and wireless interface.
C HAPTER 25 | Ethernet Interface Commands – 194 – dns This command specifies the address fo r the primary or second ary domain name server to be used for name-to-address resolution. S YNTAX dns { primary-server | secondary-server } < server-address > primary-server - Primary server used for name resolution.
C HAPTER 25 | Ethernet Interface Commands – 195 – C OMMAND M ODE Interface Configurat ion (Ethernet) C OMMAND U SAGE ◆ DHCP is enabled by default. T o m a nually configure a new IP address, you must f irst disable the DHCP client wit h the no ip dhcp command.
C HAPTER 25 | Ethernet Interface Commands – 196 – E XAMPLE AP(config)#interface ethernet Enter Ethernet configuration commands, one per line. AP(if-ethernet)#ip dhcp AP(if-ethernet)# R ELATED C OMMANDS ip address shutdown This command disables the Ethernet interface.
C HAPTER 25 | Ethernet Interface Commands – 197 – E XAMPLE AP#show interface ethernet Ethernet Interface Information ======================================== IP Address : 192.
– 198 – 26 W IRELESS I NTERFACE C OMMANDS The commands described in this sec tion configure connection par ameters for the wireless interfaces. Table 23: Wireless Int erface Commands Command Funct.
C HAPTER 26 | Wireless Interface Commands – 199 – interface wireless This command enters wireless interface configuration mode. S YNTAX interface wireless < index > index - The index of the wirele ss interfa ce.
C HAPTER 26 | Wireless Interface Commands – 200 – D EFAULT S ETTING Disabled C OMMAND M ODE Interface Configuration (Wireless) E XAMPLE AP(if-wireless 0)#a-mpdu enable AP(if-wireless 0)# a-msdu This command enables and sets the Aggregate MAC Service Data Unit (A -MSDU).
C HAPTER 26 | Wireless Interface Commands – 201 – ht40-channel - The 802.11n 40 MHz channel number: 11ng mode: 01Plus, 02Plus, 03Pl us, 04Plus, 05Plus, 05Minus, 06Plus, 06Minus, 07Plus, 07Minus, 0.
C HAPTER 26 | Wireless Interface Commands – 202 – transmit-po wer This command adjusts the power of the r adio signals tr ansmitted from the access point. S YNTAX transmit-power < signal-stren gth> signal-st rength - Signal strength tr ansmit ted from the access point.
C HAPTER 26 | Wireless Interface Commands – 203 – C OMMAND U SAGE Both the 802.11g and 802.11b stand ards oper ate within the 2.4 GHz band. If you are oper ating in 11ng mode, an y 802.11b devices in t he service area will contribute to the r adio fr equency noise and affect network performance.
C HAPTER 26 | Wireless Interface Commands – 204 – C OMMAND U SAGE ◆ Using a sh ort preamble instead of a lo ng pream ble can incr ease data throughput on the access point, but re quires that all clients can support a short preamble. ◆ Set the preamble to l ong to ensu re t he access point can support all 802.
C HAPTER 26 | Wireless Interface Commands – 205 – beacon-interval Thi s c o mm a nd c on fi gu r es th e rat e a t which beacon signals are tr ansmitted from the access point. S YNTAX beacon-interval < inte rval> interval - The ra te for transmi tting beacon signals.
C HAPTER 26 | Wireless Interface Commands – 206 – the access point will sa ve all broadc ast/multicast frames for the Basic Service Set (BSS) and forward them after every b eacon.
C HAPTER 26 | Wireless Interface Commands – 207 – E XAMPLE AP(if-wireless 0)# rts-threshold 0 This setting has not been effective ! If want to take effect, please execute make-RF-setting-effective command ! AP(if-wireless 0)# ssid This command configures the service set identifier (SSID) of the V AP .
C HAPTER 26 | Wireless Interface Commands – 208 – C OMMAND U SAGE When closed system is enabled, the a ccess point will not include its SSID i n beacon messages. Nor will it resp ond to probe requests from client s that do not include a fixed SSID .
C HAPTER 26 | Wireless Interface Commands – 209 – C OMMAND M ODE Interface Configuration (Wireless- V AP) E XAMPLE AP(if-wireless 0: VAP[0])# auth-timeout-interval 10 This setting has not been eff.
C HAPTER 26 | Wireless Interface Commands – 210 – E XAMPLE AP# show interface wireless 0 vap 0 ----------------------------------Basic Setting---------------------------- SSID : Edgecore_VAP_0 Interface Radio Mode : 11ng Auto Channel Select : DISABLE Channel : 11 High Throughput Mode : HT20 Status : ENABLE VLAN-ID : 1 Dhcp-Relay Server Ip : 0.
C HAPTER 26 | Wireless Interface Commands – 211 – show station This command shows the wireless client s associated with the access point. C OMMAND M ODE Exec E XAMPLE AP#show station Station Table.
– 212 – 27 W IRELESS S ECURITY C OMMANDS The commands described in this sec tion configure parameters f or wireless security on the V AP interfaces.
C HAPTER 27 | Wireless Security Commands – 213 – wpa-wpa2-mixed - Clients using WPA or WP A2 are accepted for authentication. wpa-wpa2-psk-mixed - Clients using WPA or WP A2 with a Pre- shared K e.
C HAPTER 27 | Wireless Security Commands – 214 – encryption cipher suite is set to TKIP , the unicast encryption ci pher (TKIP or AES-CCMP) is negotiated for each client. The access point advertises it’ s supported encrypti on ciphers in beacon frames and probe responses.
C HAPTER 27 | Wireless Security Commands – 215 – E XAMPLE AP(if-wireless 0: VAP[0])# encryption This setting has not been effective ! If want to take effect, please execute make-security-effective command ! AP(if-wireless 0: VAP[0])# R ELATED C OMMANDS key key This command sets the keys us ed for WEP encryption.
C HAPTER 27 | Wireless Security Commands – 216 – E XAMPLE AP(if-wireless 0: VAP[0])# key 1 64 hex 1234512345 This setting has not been effective ! If want to take effect, please execute make-secur.
C HAPTER 27 | Wireless Security Commands – 217 – cipher-suite T his command defines the cipher algori thm used to encrypt the global k ey for broadcast and multicas t traf fic when using WP A or WP A2 security . S YNTAX multicast-cipher < aes-ccmp | tkip > aes-ccmp - Use AES-CCMP encryption for the unicast and multicast cipher .
C HAPTER 27 | Wireless Security Commands – 218 – E XAMPLE AP(if-wireless 0: VAP[0])# cipher-suite tkip This setting has not been effective ! If want to take effect, please execute make-security-effective command ! AP(if-wireless 0: VAP[0])# wpa-pre-shared-key This command defines a Wi-Fi Protect ed Access (WP A/WP A2) Pre-shared- key .
C HAPTER 27 | Wireless Security Commands – 219 – pmksa-lifetime This command sets the time for agin g out cached WP A2 P airwise Master K ey Security Association (PMKSA) informat ion for fast roaming. S YNTAX pmksa-lifetime < minutes> minutes - The time for agi ng out PMKSA information.
C HAPTER 27 | Wireless Security Commands – 220 – E XAMPLE AP(if-wireless 0: VAP[0])# make-security-effective It will take several minutes ! Please wait a while... Args: 1 lo no wireless extensions. eth0 no wireless extensions. br0 no wireless extensions.
C HAPTER 27 | Wireless Security Commands – 221 – lo no wireless extensions. eth0 no wireless extensions. br0 no wireless extensions. wifi0 no wireless extensions. Error for wireless request "Set Fragmentation Threshold" (8B24) : SET failed on device ath0 ; Invalid argument.
– 222 – 28 L INK L AYE R D ISCO VER Y C OMMANDS LLDP allow s devices i n the local br oadcast domain to share information about themselves. LLDP-capable devices periodic ally transmit information in messages called T ype Length V alue ( TL V) fields to neighbor devices.
C HAPTER 28 | Link Layer Discovery C ommands – 223 – lldp-transmit hold- mu l i p l i e r This command configures the time-to-liv e (T TL) v alue sent in LLDP advertisements. S YNTAX lldp transmit hold-multiplier < multip lier > multiplier - The hold multiplier number .
C HAPTER 28 | Link Layer Discovery Commands – 224 – E XAMPLE AP(config)# lldp transmit interval 30 AP(config)# lldp transmit re-init- dela y This command configures the del ay befo re attempti ng to re-initial ize after LLDP ports are disabled or t he link goes down.
C HAPTER 28 | Link Layer Discovery C ommands – 225 – objects, and to increase the probabilit y that multiple, r ather than single changes, are reported in each tr ansmission.
– 226 – 29 VLAN C OMMANDS The access point can enable the support of VLAN-tagged traffic passi ng between wireless cl ients and the wire d network. VLAN IDs can be mapped to specific V AP interfaces, allowing us ers to remain within the same VLAN as they move around a campus site.
C HAPTER 29 | VLAN Commands – 227 – ◆ T raffic enteri ng the Ethernet port mu st be tagged wi th a VLAN ID that matches the access point’ s management VLAN ID , or with a VLAN tag that matches one of th e V AP default VLAN IDs.
C HAPTER 29 | VLAN Commands – 228 – vlan-id This comma nd configur es the defaul t VLAN ID for the VAP interfa ce. S YNTAX vlan-id < vlan-id> vlan-id - Default VLAN ID.
– 229 – 30 WMM C OMMANDS The access point implements QoS using the Wi-Fi Multimedia (WMM) standard. Using WMM, the access point is able to priorit ize traffi c and optimize performance when multiple applications compete for wireless network bandwidth at the same ti me.
C HAPTER 30 | WMM Commands – 230 – wmm-ac knowledge- policy This command allows the acknowledgem ent wait time to be enabled or disabled for each Access Cate gory (AC). S YNTAX wmm-acknowledge-policy < ac_number > < ack | no ack > ac_number - Access c ategorie s.
C HAPTER 30 | WMM Commands – 231 – BSS - Wireless client ac_number - Access categories ( ACs) – voice, video, bes t effort, and background. These categories correspond to traffic priority levels and are mapped to IEEE 802. 1D priority tags as shown in T able 4 on page 94 .
C HAPTER 30 | WMM Commands – 232 – C OMMAND M ODE Interface Configuration (Wireless) E XAMPLE AP(if-wireless 0)# wmmparam ap 0 5 10 3 64 1 This setting has not been effective ! If want to take eff.
C HAPTER 30 | WMM Commands – 233 –.
– 234 – S ECTION IV A PPENDICES This section provi des additional information and includes t hese items: ◆ “T roubleshooting” on page 235 ◆ “WDS Setup Examples” on pag e 238 ◆ “Har.
– 235 – A T R OUBLESHOOTING D IAGNOSING LED I NDICATORS B EF ORE C ONTACTING T ECHNIC AL S UPPOR T Check the following items before you contact local T echnical Support.
A PPENDIX A | Troubleshooting Before Contacting Technical Support – 236 – ■ If authentication is being performed through IEEE 802.1X, be sure the wireless users have installed and properl y configured 802.
A PPENDIX A | Troubleshooting Before Contacting Technical Support – 237 – 5. If all other recov ery measure fail, and the access point is still not functioning properl y , take any of these steps: ■ Re set the access point’s hardw are using the console interface, web interface, or through a power reset.
– 238 – B WDS S ETUP E XA MPLES The EAP8518 can use the IEEE 802.11 Wireless Dist ribution Syst em (WDS) to set up links between APs independen tly on any of the unit’ s eight VAP interfaces. This enables the configuratio n of multiple li nks between multiple APs.
A PPENDIX B | WDS Setup Examples Basic WDS Link Between Two APs – 239 – B ASIC WDS L INK B ETWEEN T WO AP S Consider the example illustr ated in Figure 58 . In this example, an EAP8518 connected to the main wired LAN n eeds to connect to another EAP8518 using a WDS link on V AP interface 0.
A PPENDIX B | WDS Setup Examples Basic WDS Link Between Two APs – 240 – Figure 59: WDS Exampl e — Access Point A VAP Setting 2. In the V AP Basic Settings, select WDS- AP for the Mode. 3. For s ecurity on the WDS lin k, select WP A -PSK or WP A2-PSK, set the encryption type, then enter the security key .
A PPENDIX B | WDS Setup Examples Basic WDS Link Between Two APs – 241 – Figure 61: WDS Example — Acce ss Point A WDS-AP VAP Setting 6. Click the Save Config button to reta in the configuration set up when the AP is restarted. A CCESS P OINT B C ONFIG URATION 1.
A PPENDIX B | WDS Setup Examples Basic WDS Link Between Two APs – 242 – 5. Click Set t o confirm th e new setting s. Figure 63: WDS Example — Access Point B VAP Details 6. On the V AP Settings page, enabl e V A P 0 (if not already enabled) and then clic k Set t o implemen t the ne w settin gs.
A PPENDIX B | WDS Setup Examples Basic WDS Link Between Two APs – 243 – C HEC KING THE WDS L INK S TATUS When you have configured both access point VAPs, you can check the status of the link from Acc ess P oint A. Go to the Information>Station Status page.
A PPENDIX B | WDS Setup Examples WDS Links Between Three or More APs – 244 – WDS L INKS B ETWEEN T HREE OR M ORE AP S Consider the example illustr ated in Figure 66 . In this example, an EAP8518 connected to the main wired LAN conn ects to two other units using a WDS links.
A PPENDIX B | WDS Setup Examples WDS Links Between Three or More APs – 245 – A CCESS P OINT A C ONFIG URATION 1. Configure V AP 0 settings: a. Set VA P 0 to WDS- AP mode. b. Set security to WP A-PSK or WP A2-PSK and configure a k ey . c. Set the SSID and enable the V AP .
A PPENDIX B | WDS Setup Examples WDS Links Between Three or More APs – 246 – 2. Configure V AP 1 settings: a. Set V AP 1 to AP Mode. b. Set the required security for wireless clients. c. Set the SSID and enable the V AP . A CCESS P OINT D C ONFIG URATION 1.
– 247 – C H AR D WARE S PECIFICATIONS W IRELESS T RANSMIT P OWER (M AXI MUM ) 802.11b/g/n : 802.11b: 21 dBm (typ ical) 802.11g: 16 dBm 802.11n HT20 (20MHz, MCS): 20.5 dBm 802.11n HT40 (40MHz, MCS): 21 dBm 802.11a/n : 802.11a: 16 dBm 802.11n HT20 (20MHz, MCS): 18 dBm 802.
A PPENDIX C | Hardware Specifications – 248 – D ATA R ATE 802.11b : 1, 2, 5.5, 11 Mbps per channel 802.11g : 6, 9, 12, 18, 24, 36, 48, 54 Mbps per channel 802.
A PPENDIX C | Hardware Specifications – 249 – T EMPERATURE Oper ating: 0 to 40 °C (32 to 104 °F) Stor age: -20 to 70 °C (32 to 158 °F) H UMIDITY 15% to 95% (non-condensing) C OMPLIANCES FCC P art 15B Class B EN 55022B EN 55024 EN 61000-3-2 EN 61000-3-3 R ADIO S IGNAL C ERTIFICATION FCC P art 15C 15.
– 250 – D C ABLES AND P INOUTS T WISTED -P AIR C ABLE A SSIGNMENTS For 1 0/100BASE- TX connections, a twisted-pair cable must hav e two pairs of wires. F o r 1000BASE- T connections the twisted-pair cable must ha ve four pairs of wires. Each wire pai r is identified by two di fferent colors.
A PPENDIX D | Cables and Pinouts Twisted-Pair Cable Assignments – 251 – S TRAIGHT -T HR OUGH W IRING If the twisted-pair cable is to join two ports and only one of the ports has an internal crossover ( MDI- X), the two pairs of wires must be straig ht- through.
A PPENDIX D | Cables and Pinouts Twisted-Pair Cable Assignments – 252 – C RO S SO VE R W IRING If the twisted-pair cable is to join two ports and either both ports are labeled wit h an “X” (MDI- X) or neither port is labeled wit h an “X” (MDI), a crossover must be implemented in th e wiring.
A PPENDIX D | Cables and Pinouts Twisted-Pair Cable Assignments – 253 – C ABLE T ESTING FOR E XIST ING C ATEGORY 5 C ABLE Installed Category 5 cabling must pass tests for A ttenuation, Near-End Crosstalk (NEXT), and F ar-End Crosstalk (FEXT) . This cable testing information is specifi ed in the ANSI/TIA/EIA - TSB-67 standard.
A PPENDIX D | Cables and Pinouts Console Port Pin Assignments – 254 – C ONSOLE P OR T P IN A SSIGNMENTS The RJ-45 console port on the front pa nel of the access point is used to connect to the access point for out -of -band console configur ation to a DB-9 connector on a PC.
– 255 – G LOSSARY 10B ASE-T IEEE 802.3-2005 specification for 10 Mbps Ethernet ov er two pairs of Category 3 or better UTP cable. 100B ASE-TX IEEE 802.3-2005 speci fication for 100 Mbps F ast Ethernet over two pairs of Category 5 or better UTP cable.
G LOSSARY – 256 – D YNAMIC H OST C ONFIGURATION P ROT O C O L (DHCP) Provides a framework for passing conf iguration information to hosts on a TCP/IP network. DHCP is based on th e Bootstrap Protocol (BOO TP), adding the capability of automatic allocation of reusable network addresses and additional configur ation options.
G LOSSARY – 257 – MA C A DDRE SS The physical l ayer address used to uniquely i dentify network nodes. N ETW ORK T IME P ROT O C O L (NTP) NTP provides the mechanisms to synchroniz e time across the network.
G LOSSARY – 258 – V IRTUAL A CCESS P OINT (V AP) Virtual AP technology mult iplies the nu mber of Access P oints present wi thin the RF footprint of a si ngle physical access device.
– 259 – I NDE X A antennas 28 authentication cipher suite 214 closed system 208 MAC address 171 , 172 type 208 B beacon interval 205 rate 205 BOOTP 194 , 195 bridge 34 C channel 200 closed system .
I NDEX – 260 – location selection 36 log messages 136 server 136 M MAC address, authentication 171 , 172 mounting on a horizontal surface 37 mounting on a wall 38 N network configuration 32 O open.
EAP8518 E092009-D T -R01 149100000037A.
Un point important après l'achat de l'appareil (ou même avant l'achat) est de lire le manuel d'utilisation. Nous devons le faire pour quelques raisons simples:
Si vous n'avez pas encore acheté Edge-Core EAP8518 c'est un bon moment pour vous familiariser avec les données de base sur le produit. Consulter d'abord les pages initiales du manuel d'utilisation, que vous trouverez ci-dessus. Vous devriez y trouver les données techniques les plus importants du Edge-Core EAP8518 - de cette manière, vous pouvez vérifier si l'équipement répond à vos besoins. Explorant les pages suivantes du manuel d'utilisation Edge-Core EAP8518, vous apprendrez toutes les caractéristiques du produit et des informations sur son fonctionnement. Les informations sur le Edge-Core EAP8518 va certainement vous aider à prendre une décision concernant l'achat.
Dans une situation où vous avez déjà le Edge-Core EAP8518, mais vous avez pas encore lu le manuel d'utilisation, vous devez le faire pour les raisons décrites ci-dessus,. Vous saurez alors si vous avez correctement utilisé les fonctions disponibles, et si vous avez commis des erreurs qui peuvent réduire la durée de vie du Edge-Core EAP8518.
Cependant, l'un des rôles les plus importants pour l'utilisateur joués par les manuels d'utilisateur est d'aider à résoudre les problèmes concernant le Edge-Core EAP8518. Presque toujours, vous y trouverez Troubleshooting, soit les pannes et les défaillances les plus fréquentes de l'apparei Edge-Core EAP8518 ainsi que les instructions sur la façon de les résoudre. Même si vous ne parvenez pas à résoudre le problème, le manuel d‘utilisation va vous montrer le chemin d'une nouvelle procédure – le contact avec le centre de service à la clientèle ou le service le plus proche.