Manuel d'utilisation / d'entretien du produit SMC2555W-AG du fabricant SMC Networks
Aller à la page of 260
SMC2555W-A G.
.
38 T esla Irvine, CA 92618 Phone: (949) 679 -8000 EliteConnect ™ Univer sal 2.4GHz/5GHz Wireless Access P oint User Guide The easy w a y to mak e all y our netwo rk connections April 2004 Revision Number: R02, F3.
Copyright Inf ormation furnished by SMC Networks, Inc. (S MC) is believ ed to be accurate and reliab le. Howe ver , no responsibility is assumed b y SMC for its use , nor f or any infringements of patents or other rights of third parties which ma y result from it s use.
i L IMITED W ARRANTY Limited Warranty Statement: SMC Networks, Inc. (“SMC”) w arrants its products to be free from defects in w orkmanship and mater ials, under normal use and ser vice, f or the applicable w arranty term. All SMC products carr y a standard 90-day limited warr anty from the date of purchase from SMC or its Authorized Reseller .
L IMITED W ARRANTY ii Customers are responsible f or all shipping charges from their f a cility to SMC. SMC is responsible f or return shippi ng charge s from SMC to customer .
iii C OMPLIANCES Federal Comm unication Co mmission Interference Statement This equipment has been tested and found to co mply with the limits f or a Class B digital device , pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable protection against ha rmful interference in a residential installation.
C OMPLIANCES iv High power radars are allocated as primar y users (meaning they ha v e prior ity) of the 5250-5350 MHz and 56 50-5850 MHz bands. These radars could cause interference and/or damage to the access point when used in Canada.
C OMPLIANCES v EC Conf ormance Declaration SMC contact for these products in Europe is: SMC Networks Europe, Edificio Conata II, Calle F ructuós Gelaber t 6-8, 2 o , 4 a , 08970 - Sant Joan Despí, Barcelona, Spain.
C OMPLIANCES vi European Community country. The pr esence of nearby radar operatio n may result in temporary i nterruption of operation of this device. The radar detection feature wil l automatica lly restart operati on on a channel free of ra dar. • The 5 GHz Turbo Mode feature is not allowed for operatio n in any European Community country.
C OMPLIANCES vii Operation Using 5 GHz Channels in the Eur opean Community The user/installer must use the provid ed config uration utility to check the current channel of operation and ma ke necessar.
C OMPLIANCES viii Community English Hereby, SMC Networks, declares that this Radio LAN device is in compliance with the essential requirements and other relevant provisions of Directive 1999/5/EC.
C OMPLIANCES ix Safety Compliance P ower Cord Safety Please read the following safety informati on carefully before installing the switch: W ARNING: Insta llation and removal of the unit m ust be carried out by qualified personnel only . • The unit must be connected to an earth ed (grounded) outlet to co mply with international safety standards.
C OMPLIANCES x Importan t! Bef ore making connections, mak e sure you ha v e the correct cord set. Check it (read the label on the cable) against the f ollowing: Power Cord Set U.S.A. and Canada The cord set must be UL-approved and CSA certified. The minimum specifications for the flexible cord are: - No.
C OMPLIANCES xi Veuillez lire à fond l 'information de la sécurité suivan te avant d'installer le Switch: A VERTISSEMENT : L ’installation et la dépose de ce groupe doiv ent être confiés à un personnel qualifié.
C OMPLIANCES xii Bitte unbeding t vor dem Einbau en des Switches die folgenden Sicherheitsanweisunge n durc hlesen (Germany) : W ARNUNG: Die Installation und der Ausbau des Geräts darf nur durch F ach personal erfolgen. • Das Gerät sollte nicht an eine ungeerdet e Wechselstromsteckdose angeschlossen werden.
C OMPLIANCES xiii gegeben, wenn auch die an das Gerät angeschlossenen Geräte unter SELV-Bedingungen betrieben werden. • Stromkabel . Dies muss von dem Land, in dem es benutzt wird geprüft werden: U.S.A und Kanada Der Cord muß das UL gepruft und war das CSA beglaubigt.
C OMPLIANCES xiv.
T ABLE OF C ONTENTS xv T ABLE OF C ONTENTS 1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-1 Package Che cklist . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-2 Hardware Desc ription . . . . . . . . . . .
T AB LE OF C ONTENTS xvi Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-50 Wi-Fi Protected Access (WPA) . . . . . . . . . . . . . . . . . . 5-57 Status Infor mation . . . . . . . . . . . . . . . . . . . . . . . . . .
T ABLE OF C ONTENTS xvii password . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-22 ip http por t . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-22 ip http serv er . . . . . . . . . . . . . . . . . . . . .
T AB LE OF C ONTENTS xviii 802.1x broa dcast-key-re fresh-rate . . . . . . . . . . . . . . . . 6-52 802.1x sess ion-key-refr esh-rate . . . . . . . . . . . . . . . . . . 6-53 802.1x sess ion-timeout . . . . . . . . . . . . . . . . . . . . . . . . 6-54 address filter default .
T ABLE OF C ONTENTS xix transmit-pow er . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-87 max-associatio n . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-88 multicast-ci pher . . . . . . . . . . . . . . . . . . . . . . . . .
T AB LE OF C ONTENTS xx.
1-1 Chapter 1 Introduction SMC’ s EliteConnect Universal 2. 4GHz/5GHz Wireless Access P oint (SMC2555W -A G) is an IEEE 802.11a/g access point that provides t ranspar ent, wireless high-speed d ata communica tions between t he wired LAN and fix ed, por table or mobile de vices equipped with a n 802.
Introduction 1-2 The access point also suppor ts a 54 Mbps half-duple x connection to Ethernet networks f or each active chan nel (up to 108 Mbps in turbo mode on th e 802.
Hardware Description 1-3 Hardware Description Front P anel Rear Pa nel Antennas Indicator Panel Security Slot Console Port RJ-45 Port, PoE Connector Reset Button 5 VDC Power Socke t.
Introduction 1-4 Component Description Antennas The access point includes two antennas f or wireless communication s. The sign al transmitted f rom both antennas is identical, b ut only the best signal receiv ed on one of the antennas is used.
Hardware Description 1-5 Security Slot The access point includes a K ensington security slot on the rear panel. Y ou can pre vent unauthorized remo v al of the access p oint by wrapping the K ensington security cabl e (not pro vided) around an unmov able object, inserting the lock into the slot, and turning the ke y .
Introduction 1-6 Console Port This por t is us ed to connect a co nsole device to the access point through a serial cab le. This connection is described unde r “Console P or t Pin Assignments” on p age B-4. The co nsole de vice can be a PC or workstation running a VT -100 terminal emulator , or a VT -1 00 ter minal.
F eatures and Benefits 1-7 changes y ou ma y ha v e made are remo ved, and the f actor y default configuration is r estored to th e access poin t. Power Connector The access point does not ha ve a po wer s witch. It is po wered on when connected to the A C power adapt er , and the po wer adapter is connected to a power sourc e.
Introduction 1-8 • Scans all a v ailab le channels and se lects the best channe l f or each client based on the sign al-to-noise rati o Applications The Wireless products of f er a high speed, re li.
System Def aults 1-9 System Defaults The f ollowing table lists some o f the access point’ s basic system def aults. To reset th e access poin t defaults, use the CLI command “reset conf iguration” fro m the Exec level prompt.
Introduction 1-10 MAC Authentication MAC Local MAC A uthentication Session Timeout 0 seconds (disab led) Local MA C System Def ault Allow ed Local MA C P er mission Allow ed 802.
System Def aults 1-11 System Logging Syslog Disab led Logging Host Disab led Logging Conso le Disab led IP Address / Host Name 0.0.0.0 Logging Le vel Inf ormational Logging F acility T ype 16 Ethernet.
Introduction 1-12 Wireless Interface 802.11a IAPP Enabled SSID SMC Status Enable d Turbo Mode Disabled Radio Channel Default to first channel Auto Channel Select Enabled SSID Broadcast Enabled Transmi.
System Def aults 1-13 Wireless Interface 802.11b/g IAPP Enabled SSID SMC Status Enable d Channel Default to first channel Auto Channel Select Enabled SSID Broadcast Enabled Antenna Mode Diversity Radi.
Introduction 1-14.
2-1 Chapter 2 Hardware Installation 1. Select a Site – Choose a proper pl ace f or the access point. In general, the best location is at the center of y our wireless cov erage area, within line of sight of all wirel ess de vices . T r y to place the access point in a posit ion that can best cov er its Basic Ser vice Set.
Hardware Installation 2-2 brac ket, slide it into position so t hat the two r etaining latches slip into place ov er the back of the ac cess point . Attachin g the Mount ing Brac ket 4.
Hardware Installation 2-3 Otherwise, the access point can der ive its operating pow er directly from the RJ-45 por t when connected to a de vice that provides I EEE 802.3af compliant P o wer o v er Ethernet (P oE). Note: If the access point is connected to both a PoE source device and an AC power source, PoE will be disabled.
Hardware Installation 2-4 The access point also compares the stren gth of an incoming signal on both ante nnas, and uses the antenn a receiving the stronger signal to commu nicate with a wireless client. 9. Connect the Console P ort – Connect the console cab le (included) to the RS-232 co nsole por t f or accessing the command-line interf ace.
3-1 Chapter 3 Network Configuration The wireless solution su ppor ts a stand-alone wireless netwo rk configuration as w ell as an integrated configur ation with 10/100 Mbps Ethernet LANs.
Network Configuration 3-2 Network Topologies Ad Hoc Wireless LAN (no AP or Bridge) An ad hoc wireless LAN consists of a g roup of compu ters , each equipped with a wireless adapter , connected via r adio signals as an independent wirele ss LAN. Computers in a specific ad hoc wireless LAN must therefore be configured to the same radio channel.
Network T opologies 3-3 Infrastructure Wireless LAN The access point also pro vides access to a wir ed LAN f or wireless workstations. An integr ated wired/wireless LAN is called an Infrastructure configuratio n. A Basic Ser vice Set (BSS) consists of a group of wireless PC users, and an access point that is direc tly connected t o the wired LAN.
Network Configuration 3-4 Infrastructure Wireless L AN for Roaming Wireless PCs The Basic Ser vice Set (BSS) defi nes the communications domain f or each access point and its a ssociated wireless clients.
Network T opologies 3-5 A wireless infra structure can also suppor t roaming f or mobile worker s. Mo re than one a ccess point can be configu red to crea te an Extended Ser vice Set (ESS). By placing the access points so that a continuous co verage area is cre ated, wireless users within this ESS can roam freely .
Network Configuration 3-6.
4-1 Chapter 4 Initial Configuration The EliteConnect Univ ersal 2.4GHz/5GHz Wireless Access P oint SMC2555W -AG off ers a v ariety of management opti ons, including a web-based interface , a direct c onnection to the console por t, or using SNMP softw are such as SMC’ s EliteVie w .
Initial Configuration 4-2 T o conne ct to the console por t, complete the f ollowing steps: 1. Connect the console cable to the serial por t on a ter minal, or a PC running terminal emulat ion softw are, and tigh ten the captiv e retaining scre ws on the DB-9 connector .
Initial Setup through the CLI 4-3 Initial Configuration Steps Loggin g In – Enter “admin” f or the user name and “smcadmin” f or the pass word.
Initial Configuration 4-4 accessed us ing T elnet from any comp uter attach ed to the network. Setting the Country Co de – Units sold in the United States are configured b y def ault to use only radio channels 1-11 as defined by FCC regulations. Units sold in other countries are configured by def ault withou t a country code (i.
Using the W eb-based Management Setup Wizard 4-5 Loggin g In – Enter the username “admin, ” the pass word “smcadmi n, ” and click LOGIN. F o r inf ormation on configuring a user name and pa ss word, ref er to page 5-27. The home page di spla ys the Main Men u.
Initial Configuration 4-6 Launching the Setup Wizar d – T o perform initial configuration, click Setu p Wizard on the home page , then click on the [Ne xt] but ton to start the process. 1. Serv ice Set ID – Enter the service set identifier in the SSID bo x which all wireless clients mu st use to associate with the access point.
Using the W eb-based Management Setup Wizard 4-7 2. Radio Channel – Y ou must enab le rad io commun ications f or 802.11a and 802 .11b/g, and set the oper ating radio channel. • 802.11a T urbo Mode – If you select Enable, the access point will operate in turbo mode with a data r ate of up to 108 Mbp s.
Initial Configuration 4-8 • 802.11b/g 802.11g Radio Channel: Set the o perat ing radio channel number . (Range: 1-11; Default: 11) Note: Available channe l settings are limited by local regulations which determine which chan nels are available. (See “Maximum Cha nnels” on page C-1.
Using the W eb-based Management Setup Wizard 4-9 assigned to the access po int by the networ k DHCP ser ver . (Def ault: Enable) Note: If there is no DHCP server on your network, then the access point will automatically start u p with its default IP address, 192.
Initial Configuration 4-10.
5-1 Chapter 5 System Configuration Bef ore contin uing with adv anced configuration, first complete th e initial configur ation steps described in Chapter 4 to set up an IP address f or the SMC2555W -AG. The SMC2555W -A G can be managed b y any co mputer using a web br owse r .
System Configuration 5-2 The inf or mation in this chapter is organiz ed to refle ct the structure of the web scr eens f or easy ref erence. How e ver , we recommend that y ou configur e a user name an d pass word as the first st ep under adv anced configuration to cont rol management access to this de vice (page 5-29).
Adv anced Configuration 5-3 Radio Interface 1 Configures the IEEE 802.11a interface 5-40 Radio Settings Configures ra dio signal parameters, such as radio channel, transmission rate, and beacon settin.
System Configuration 5-4 System Identification The system inf or mation parameters f or the SMC2555W -AG can be left at their def ault settings . How e v er , modifying these parameter s can help y ou to more easily distinguish diff erent devices in y our network .
Adv anced Configuration 5-5 CLI Commands f or System Identificatio n – Enter the glob al configuratio n mode, a nd use the system na me command t o specify a new system name. Enter the wireless configuration mode (eithe r 11a or 11g), and use the ssid command to set the service set identifier .
System Configuration 5-6 TCP / IP Settings Configuring the SMC2555W -A G with an IP address e xpands your ability to manage the access point. A number of acces s point f eature s depend on IP addre ssing to oper ate .
Adv anced Configuration 5-7 DHCP Client (Enable) – Select this option to obtain the IP settings for the access poi nt from a DHCP (Dynamic Host Configuratio n Protocol) server . The IP address , subnet mask, def ault gatew a y , and Domain Name Server (DNS) ad dress are dynamically assigned to the access point by th e network DHCP ser v er .
System Configuration 5-8 If yo u ha v e management stat ions, DNS , RADIUS, or other network ser v ers located on anot her subnet, t ype the IP address of the d ef ault gate wa y router in the te xt field provided. Otherwise, leav e the address as all zeros (0.
Adv anced Configuration 5-9 CLI Commands for TCP/IP Settings – F rom the global configuration m ode, enter the int erface configuration mode wit h the interface ethernet comman d. Use the ip dhcp command to enable the DHCP client, or no ip dhcp to disab le it.
System Configuration 5-10 Radius Remote Authentication D ial-in User Ser vice (RADIUS) is an authentica tion protocol that uses softw are running on a centr al ser v er to control access to RAD IUS-a ware de vices on the network. An authent ication server contains a dat abase of user credentials f or each user that requires access to t he network.
Adv anced Configuration 5-11 Primar y Radius Ser ver Setup – Config ure the following settings to use RADIUS authenti cation on the acce ss point. • IP Address: Specifies the I P address of the RADIUS server . • P or t: The UDP por t number used by the RADIUS ser ver f or authentication messag es.
System Configuration 5-12 authentication f ails. (Range: 1-30; Def ault: 3) Note: For the Timeout and Retransmit attempts fields, accep t the default values unless you experience problems con necting to the RADIUS server over the network.
Adv anced Configuration 5-13 CLI Commands f or RADIUS – F rom the global configurat ion mode, use th e radius-s erver ad dress command to sp ecify the address of the primar y or secondary RADIUS ser ver s. ( The f ollowing e xample configures the se ttings f or the pr imar y RADIUS server .
System Configuration 5-14 Authentication Wireless clients can be authenticated f or network access by chec king their MA C address against the local database configured on the access poin t, or by using the IEEE 802.1x network access authentication pr otocol to look up their MA C addresses on a RADIUS server .
Adv anced Configuration 5-15 point. The Lo cal MA C Authen ticati on section enables the local database t o be set up . • Radius MA C: The MAC addr ess of the associating station is sent to a co nfigured RADIUS server f or authentication .
System Configuration 5-16 • MA C A uthentication T a bl e: Displa ys current entries in the local MA C database . 802.1x Setup – IEEE 8 02.1x is a standard f rame work f or network access contr ol that uses a central RADIUS se r ver f or user authentica tion.
Adv anced Configuration 5-17 all associated wireless clie nts. If 802.1x auth entication is not initiated by a client, the access poi nt will initiate authentication. Only those clients successfully authenticated with 802.1x are allowed to access the network.
System Configuration 5-18 remov e an entry from the table , use the address filt er delete command. T o display the current settings, u se the show authenti cation command fro m the Exec mode.
Adv anced Configuration 5-19 connection settin gs f or the RADIUS ser ver (not shown in the f ollowing e xample). T o display t he current settings , use the show authenti cation command fro m the Exec mode.
System Configuration 5-20 CLI Commands f or 802.1x A uthenti cation – Use the 802.1x supported command from the globa l configurat ion mode to enab le 802.1x authentication . Set the session and broadca st ke y refresh r ate , and the re-authe ntication ti meout.
Adv anced Configuration 5-21 Filter Control The access point can empl o y VLAN ID and network traf fic frame filtering to control access to network resources a nd increase security . Nativ e VLAN ID – The VLAN ID assigned to wireless clients that are not assigned to a specific VLAN by RADIUS server configuration.
System Configuration 5-22 A VLAN ID (1-4095) is assigned to a client aft er successful authentication using IEEE 802.1x and a central RADIUS server . The user VLAN IDs must be configured on the RADIUS server f or each user authorized to access the netw ork.
Adv anced Configuration 5-23 When VLAN filtering is enab led, the access p oint must also ha v e 802.1x authenticat ion enab led and a RADIUS server configure d. Wireless clients must also support 802.1x client software t o be assigned to a specific VLAN.
System Configuration 5-24 CLI Commands f or VLAN Suppor t – F rom the global configuration mod e use the native-v lanid command to s et the def ault VLAN ID f or the Ether net interf ace, then enab le VLANs using the vlan enabl e command.
Adv anced Configuration 5-25 CLI Commands f or Bridge Filter ing – Use th e filter local-bridge command from the global configur ation mode to pre v ent wireless-to-wireless communicati ons through the access poin t. Use the filter ap-manage command to restrict management access from wireless clients .
System Configuration 5-26 SNMP Y ou can use a network manageme nt application such as SM C’ s EliteVie w to manage the SMC2555W -A G via the Simple Network Management Protocol ( SNMP) from a netwo rk management station.
Adv anced Configuration 5-27 SNMP – Enab les or disab les SNMP management acce ss and also enab les the access point to send SNMP tr aps (notifications) . SNMP management is enab led b y default. Location – A text string that d escrib es the syste m location.
System Configuration 5-28 CLI Commands f or SNMP – Use the snmp-serve r enabl e server command fr om the global configur ation mode. T o set read/write and re ad-only comm unity name s, u se the snmp-server community command.
Adv anced Configuration 5-29 Administration Changing the Password Management access t o the web an d CLI interf ace on the SMC2555W -AG i s controlled th rough a single user name and passw ord. Y ou can als o gain addi tional access secur ity by using control filters .
System Configuration 5-30 CLI Commands f or the User Name and P ass word – Use the username and pass word commands f rom the CLI configur ation mode.
Adv anced Configuration 5-31 Upgrading Firmware Y ou can upgr ade ne w SMC2555W -AG so ftware from a local file on the managem ent workstation, or f rom an FTP or TFTP serve r . New sof tware ma y be provided periodically on SMC’ s web site (http://www .
System Configuration 5-32 • Obtain the IP add ress of the FTP or TFTP server wh ere the access point softwa re is stored. • If upgr ading from an FTP server , be sure th at y ou ha v e an account configur ed on the server with a user name and passw o rd.
Adv anced Configuration 5-33 Firmware Upgrade Remote – Do wnloads an operation code image file from a specified re mote FTP or TFTP ser ver . After filling in the follo w ing fields, clic k Star t Upgrade to proceed. • New firmware file: Specifies the name of the code file on the ser v er .
System Configuration 5-34 CLI Commands f or Downloading Soft w are fr om a TFTP Server – Use the copy tftp file command from th e Ex ec mode and t hen specify the file type , name , and IP addr ess of the TFTP server .
Adv anced Configuration 5-35 System Log The SMC25 55W - A G can be c onfigured t o send ev ent and error messages to a System Log Server . The system cloc k can also be synchroniz ed with a time server , so that all the messages sent t o the Syslog server a re stamped with the corr ect time a nd date .
System Configuration 5-36 Logging Console – Enables the logging of error messages to the console. Logging Lev el – Sets the minimum se verity le vel f or ev ent logging. The system allo ws you to limit the messages that are logged by specifying a minimum se ve rity lev el.
Adv anced Configuration 5-37 number t o use on the Syslog server . T o vie w the current logging settings , use the sho w logging command. Configuring SNTP Simple Network Time Protocol (SNTP) allo ws the SMC2555W -AG to set its internal clock based on pe riodic updates from a time server (SNTP or NTP).
System Configuration 5-38 SNTP Ser ver – Configures the access po int to operate as an SNTP client. When enab led, at least one time server IP add ress must be specified. • Primar y Server : The IP addres s of an SNTP or NTP tim e ser v er that the access point atte mpts to poll f or a time update.
Adv anced Configuration 5-39 da ylight sa vings . T o view the current SNTP setti ngs, u se the show sntp command. CLI Comman ds f or the System Clock – The f ollowing exa mple shows how to manually set the sys tem time when SNTP ser ver suppor t is disable d on the access point.
System Configuration 5-40 Radio Interface The IEEE 802.11a and 802.11g interf aces include configurat ion options f or radio signal chara cteristics and wireless security f eatures . The configur ation options are nearly identical, and are theref ore both cov ered in this section of the manual.
Radio Interf ace 5-41 Radio Settings (802.11a) The IEEE 802.11a inter f ace oper ates within the 5 GHz band , at up to 54 Mb ps in nor mal mode or up to 108 Mbps in T urbo mode. Enable – Enab les radio communications on the SMC2555 W -AG. (Def ault: Enabled) T urbo Mode – The normal 802.
System Configuration 5-42 40 MHz to support the increase d data rate. However, this redu ces the number of channels supported (e.g., 5 channels for the United States). Radio Channel – The r adio channel tha t the access point uses to c ommunicate with wireless clients.
Radio Interf ace 5-43 Maximum Supported Rate – The maximum data r ate at which a client can co nnect to the access point. The maximum transmission dist ance is affected by the data rate. The lower the data rate, the longer the transmission distance.
System Configuration 5-44 If the RTS threshold is set to 0, the access point nev er sends RTS signals. If set to 2347, the access point alw a ys sends RTS signals. If set to an y other v alue, and the pac k et size e quals or e xceeds the R TS threshold, the R TS/CTS (Request to Send / Clear to Send) mechanism will be enabled.
Radio Interf ace 5-45 SMC-AP#show interface wireless a 6-95 Wireless Interface 802.11a Information ========================================================== ----------------Identification---------------------------- Description : Enterprise 802.11a Access Point SSID : r&d Turbo Mode : ON Channel : 42 (AUTO) Status : Enable ----------------802.
System Configuration 5-46 Radio Settings (802.11g) The IEEE 802.11g standard operates within the 2.4 GHz band at up to 54 Mbps. Also note that because th e IEEE 802.11g standard is an e xtension of the IEEE 802.11b standa rd, it allows clients with 802.
Radio Interf ace 5-47 set to the same as that used by the access point to which it is link ed. (Range: 1-11 ; Def ault: 1) A uto Channel Select – Enables the access point to automatically select an unoccupied r adio channel.
System Configuration 5-48 CLI Commands f or the 802.11a Wireless Inter f ace – F rom the global configur ation mode, enter the interfa ce wireless g command to access the 802.1 1g radio inter f ace . Set the interf ace SSID using the ssid command and, if req uired, configure a name f or the interf ace using the desc ription command.
Radio Interf ace 5-49 SMC-AP#show interface wireless g 6-95 Wireless Interface Information =========================================================== ----------------Identification----------------------------- Description : Enterprise 802.11g Access Point SSID : r&d Turbo Mode : OFF Channel : 11 (AUTO) Status : Enable ----------------802.
System Configuration 5-50 Security The SMC2555W -A G is configured b y default as an “open system, ” which broadcasts a beacon signal including the configured SSID . Wireless clients can read the SSID from the beacon, and automat ically reset the ir SSID to allo w immediate connection to t he nearest access point.
Radio Interf ace 5-51 The security mechanisms that ma y be emplo yed depend on the le v el of security required, the net work and management resources a v ailab le , and the softw are support provided on wireless clients. A summa ry of wireless secu rity co nsiderations is listed in the f ollowing tab le.
System Configuration 5-52 Wired Equivalent Privacy (WEP) WEP provides a basic le vel of security , pre venting unaut horized access to the netwo rk and encrypting data transmitted be tween wireless clients and the access point.
Radio Interf ace 5-53 Setting up shared k eys enab les the basic I EEE 802.11 Wired Equiv alent Priv acy (WEP) on t he access point to pr e v ent unauthorized access to t he network. If y ou choose to u se WEP shared k e ys instead of an ope n system, be sure to define at least one static WEP ke y for user authentica tion and data encryption.
System Configuration 5-54 Shared Ke y S etup – Selec t 64 Bit, 128 Bit, o r 152 Bit key length. Note that the same size of encr yption ke y must be suppor ted on all wireless clients .
Radio Interf ace 5-55 encr yption command to enab le WEP encryption. Use the m ulticast-cipher command to select WEP cipher type . T o enter WEP k e ys, use the key command, and th en set one k ey as the transmit key using the transmit-ke y comman d. Then disab le 802.
System Configuration 5-56 Note: The index and length values used in the key command must be the same values used in the encryption and transmit-key commands. CLI Commands f or WEP ov er 802.1x Security – F rom the 802.11a or 802.1 1g interf ace configuration mode , use the authenti cation command to select open system authentication.
Radio Interf ace 5-57 Wi-Fi Protected Access (WPA) WP A emplo ys a combination of sev eral technologies to pro vide an enhanced se curity solution f or 802.11 wireless networks. The SMC2555W -AG sup por ts the f ollowin g WP A components and f eatures: IEEE 802.
System Configuration 5-58 Note: To implement WPA on wireless clients requi res a WPA-enabled network card driver and 802.1x c lient software that supports the EAP authentication type that you want to use. Windows XP provides native WPA support, other systems require additional software.
Radio Interf ace 5-59 multicast and broa dcast traffic must be the same for all clients, therefore it restri cts encr yption to a WEP key . When access is opened to both WP A and WEP clients, no authenti cation is pro vided f or the WEP clients through sh ared ke ys.
System Configuration 5-60 WP A Ke y Management – WP A can be configured to work in an enter prise environment using I EEE 802.1x and a RADIUS ser v er f or user authenti cation. For smaller networks, WP A can be enab led using a common pre- shared k ey f or client authentication with the access point.
Radio Interf ace 5-61 WP A Pre-Shared K ey T ype – If the WP A pre-shared-k e y mode is used, all wireless clients must be configured with the same k e y to communicate with the access point. • Hexadecimal: Enter a key as a strin g of 64 hexadecimal numb er s.
System Configuration 5-62 authentica tion. T o view the current 802 .11g security settings , use the show interfa ce wireless a or show interface wirel ess g command (not sho wn in e xample). CLI Commands f or WP A ov er 802.1x Security – F rom the 802.
Status Inf ormation 5-63 Status Information The Status page includes in f ormation on the follo wing items: Access Point Status The AP Status window displa ys basic system configuration settings, as well as th e settings for the wirele ss interface.
System Configuration 5-64 AP System Configura tio n – The AP System Configuration t able displays the basic system configur ation settings: • System Up Time: Len gth of time the man agement agent h as been up . • MA C Address: The ph ysical lay er address f or this de vice.
Status Inf ormation 5-65 CLI Commands f or Displaying System Set tings – T o view the current acces s point system settin gs, use the show syst em command from the Ex ec mode. T o view the current ra dio interf ace settings , use the sho w interface w ireless a or sh ow int erface wireless g command (see page 6- 95).
System Configuration 5-66 Station Status The Station St atus window sho ws the wireless clients currently associated w ith the SMC25 55W -A G. The Station Configur ation page displa ys basic connection inf ormation f or all associated stations as described belo w .
Status Inf ormation 5-67 associated w ith the ac cess point. O nce authentic ation is completed, stations can associat e with the current access point, or reas sociate with a new access point .
System Configuration 5-68 Event Logs The Ev ent Logs windo w shows the log messages generated b y the acces s point and stored in m emor y . The Ev ent Logs tab le displa ys the f ollowing inf or mation: • Log Time: The time the log message was gen erated.
Status Inf ormation 5-69 • Access point was set to “Shared Ke y A uthentication, ” but a client sent a n authentic ation frame for “Open System .
System Configuration 5-70.
6-1 Chapter 6 Command Line Interface Using the Command Line Interface Accessing the CLI When accessing the manageme nt interf ace for the SMC2555W-A G ov er a direct conn ection to th e console p or t, or via a T elnet connection, the access point can be managed b y entering command k eywor ds and para meters at the p rompt.
Command Line Interf ace 6-2 After connecti ng to the system th rough the con sole por t, the login screen displa ys: Note: Command examples show n later in this chapter abbreviate the console prompt to “SMC-AP” for simplicity. Telnet Connection T elnet operates over the IP transpor t protocol.
Entering Commands 6-3 After y ou configure t he access point with an IP address , y ou can open a T elnet session by perf or ming these step s. 1. F rom the remote host, ent er the T elnet command and t he IP address of the de vice you want to access.
Command Line Interf ace 6-4 Y ou can enter commands a s f ollo ws: • T o enter a simple comm and, enter the command k eyw ord. • T o enter commands that requir e parame ters , enter the required par ameters after t he command k eyw ord.
Entering Commands 6-5 list of valid ke ywords f or a specific c ommand. For e xample, the command “ show ? ” displa ys a list of possible sho w commands: The command “ sho w int erface ? ” wil.
Command Line Interf ace 6-6 Negating the Effe ct of Commands F or man y configur ation commands y ou can enter the prefix ke yword “ no ” to cancel t he eff ect of a command or reset the configuratio n to the def ault value . F or example , the logging command will log system messages to a host ser ver .
Entering Commands 6-7 Exec Commands When you open a new console session on the access p oint, the system enters Ex ec command mode. Only a limited number of the commands are a vailab le in th is mode. Y ou can access all other comm ands only f rom the co nfiguration mode.
Command Line Interf ace 6-8 T o enter the Glob al Configur ation mode , enter the comm and configure in Ex ec mode. The system prompt will change to “SMC Enter prise AP(config)#” which gives yo u access privilege to all Global Configur ation commands .
Entering Commands 6-9 Ctrl-N Enters the next command l ine in the history buffer. Ctrl-P Shows the last command. Ctrl-R Repeats current command l ine on a new line . Ctrl-U Deletes the en tire line. Ctrl-W Deletes the last word typed. Esc-B Moves the cursor backward one word.
Command Line Interf ace 6-10 Command Groups The system commands can be brok en down into the functi onal groups sho wn below . The access mode shown in the f o llowing tab les is indicated b y these abbreviations: Exec (Ex ecutiv e mode ), GC (Global Configuratio n), and IC (Interface Configuration).
General Commands 6-11 General Commands configure This command activ ates Gl obal Configur ation mode . Y ou must enter this m ode to modif y most of the settings o n the acces s point. Y ou must also ent er Global Configur ation mode prior to enab ling the cont e xt modes f or Interf ace Configuration.
Command Line Interf ace 6-12 end This command returns to the pre vious configuration mode . Default Setting None Command Mode Global Configur ation, Inter f ace Configuration Example This e xample sho.
General Commands 6-13 ping This command sends ICMP echo re quest pac kets to another node on the netw ork. Syntax ping < host_name | ip_ad dress > • host_name - Alias of the host.
Command Line Interf ace 6-14 reset This command r estar ts th e system or restor es the factory def ault settings. Syntax reset < boar d | configuration > • board - Reboots the system. • configurat ion - Resets the co nfiguration se ttings to the factory default s, and then reb oots the system.
General Commands 6-15 Command Usage • The history bu ffer size is fixed at 10 comma nds. • Use the up or do wn arrow keys to scr oll through the commands in the histo ry buffer.
Command Line Interf ace 6-16 System Management Commands These commands are use d to configure the use r name, pass word, system logs, bro wser management options, cloc k settings , and a v ar iety of other system inf or mation.
System Management Commands 6-17 logging console I nitiates logging of error messages to the console GC 6-25 logging l evel Defines the minimum severi ty level for event logging GC 6-26 logging facilit.
Command Line Interf ace 6-18 country This command configures the access point’ s countr y code, which identifies the co untry of operation and sets t he authorized r adio channels. Syntax country < country_code > country_code - A two character code that identifies the country of operatio n.
System Management Commands 6-19 Default Setting US - f or units sold in the United States 99 (no countr y set) - f o r units sold in other co untrie s Command Mode Ex ec Command Usage • If you purchased an access point outside of the United States, the coun try code must be set before radio func tions are enabled.
Command Line Interf ace 6-20 prompt This command customiz es the CLI prompt. Use the no f orm to restore the def ault prompt. Syntax prompt string no pr ompt string - Any alphanum eric string to use f or the CLI pro mpt.
System Management Commands 6-21 Command Mode Global Configuration Example username This command configu res the user name f or management access. Syntax username name name - The name of t he user .
Command Line Interf ace 6-22 password After initially loggin g onto the system, y ou should set the passw ord. Remem ber to record it in a safe place. Use the no f orm to reset the def ault pass word. Syntax passw ord password no pass w ord passw ord - P ass word f or manageme nt access .
System Management Commands 6-23 Command Mode Global Configuration Example Related Commands ip http server (page 6- 23) ip http server This command allows t his de vice to be monitored or configured from a bro wser . Use the no form to disa ble this function.
Command Line Interf ace 6-24 logging on This command controls lo gging of error messages; i.e., sendin g debug or error me ssages to m emor y . The no form disables th e logging process .
System Management Commands 6-25 Default Setting None Command Mode Global Configuration Example logging console This command initiat es logging of error messages to the console .
Command Line Interf ace 6-26 logging level This command sets the minim um se verity le v el f or e vent logging. Syntax logging level < Alert | Critical | Er ro r | War n i n g | Notice | Informati.
System Management Commands 6-27 logging facility-type This command sets the facility type f or remote logging of s yslog messages . Syntax logging facil ity-type < type> type - A number that indicates th e f acility used by the syslog ser v er to dispatch log messages to a n appropriate ser vice.
Command Line Interf ace 6-28 Example sntp-server ip This command sets the IP add ress of the servers to which SNTP time requests ar e issued. Use th e this command with no arguments to clear all t ime ser vers from the cu rrent list. Syntax sntp-ser ver ip < 1 | 2 > < ip> • 1 - First time server.
System Management Commands 6-29 Command Usage When SNTP client m ode is enab led using the sntp-server enable command, the sntp-server ip comm and specifies the time ser vers from which the access point polls f or time updates. The access point will poll the time ser vers in the order specified until a resp onse is receiv ed.
Command Line Interf ace 6-30 Example Related Commands sntp-server ip (page 6-28) show sntp (page 6-32) sntp-server date-time This command sets the system cloc k. Default Setting 00:14:00, J anuary 1, 1970 Command Mode Global Configuration Example This e xample sets the system cloc k to 17:37 June 19, 2004 .
System Management Commands 6-31 sntp-server daylight-saving This command sets the sta r t and end dates f or daylight sa vings time. Use the no f o rm to disable daylight sa vings time.
Command Line Interf ace 6-32 sntp-server timezone This command sets the t ime zone f or the access point’ s internal clock. Syntax sntp-ser ver timezone < hours> hours - Number of hours bef ore/after UTC .
System Management Commands 6-33 Example show system This command displays basic system configuration settings. Default Setting None Command Mode Ex ec SMC-AP#show sntp SNTP Information ========================================================= Service State : Enabled SNTP (server 1) IP : 137.
Command Line Interf ace 6-34 Example show version This command displa ys the software v ersion for th e system. Default Setting None Command Mode Ex ec Example SMC-AP#show system System Information ==.
SNMP Commands 6-35 SNMP Commands Controls access to th is access point from management stat ions using the Simple Network Management Prot ocol (SNMP), as well as the hosts that will receive trap messages . snmp-server community This command def ines the com munity a ccess string f or the Simple Network Management Protocol.
Command Line Interf ace 6-36 • ro - Specifies read-only access. Author ized management stations are only able t o retrieve MIB objects. • rw - Specifies read/write access. Authorized management stations are able to bot h retrieve and modify MIB obje cts.
SNMP Commands 6-37 Command Mode Global Configuration Example Related Commands snmp-ser ver location (page 6-39) snmp-server enable server This command ena ble s SNMP management access and al so enables this de vice to send SNMP traps (i.e., notifications).
Command Line Interf ace 6-38 Related Commands snmp-ser ver host (page 6-38) snmp-server host This command specif ies the recipient of an SNMP noti fication.
SNMP Commands 6-39 Example Related Commands snmp-ser ver enable ser ver (page 6-37) snmp-server location This command sets the system loca tion string. Use the no for m to remove the location str ing. Syntax snmp-server loca tion te xt no snmp-server location te xt - String that describes the system location.
Command Line Interf ace 6-40 show snmp This command displa ys the SNMP configuration settings . Command Mode Ex ec Example Flash/File Commands These commands are use d to manage the syste m code or configuration files.
Flash/File Commands 6-41 bootfile This command specifies the image used to star t up the system. Syntax bootfile < filename > filename - Name of the ima ge file. Default Setting None Command Mode Ex ec Command Usage • The file name shou ld not contain slashes ( or /), the lea ding letter of the file name should not b e a perio d (.
Command Line Interf ace 6-42 copy This command copies a boot file , code image , or conf iguration file between t he access point’ s flash memory and a FTP/TFTP server . When you sa ve the configur ation setting s to a file on a FTP/TFTP server , that file can later be do wnloaded to the access point to restore system operation.
Flash/File Commands 6-43 server is 255 characters or 32 chara cters for files on the access point. (V alid characters : A-Z, a-z, 0-9, “.”, “-”, “_”) • Due to the size limit of the flash m emory, the access po int supports only two opera tion code files.
Command Line Interf ace 6-44 Command Mode Ex ec Caution: Beware of deleting application imag es from flash memory. At least one application image is required in ord er to boot the access point.
RADIUS Client 6-45 Example The f ollowing exa mple shows ho w to displa y all file information: RADIUS Client Remote Authentication D ial-in Us er Ser vice (RADIUS) is a logon authentica tion protocol that uses softw are running on a centr al ser v er to control a ccess for RADIUS-aw are devices to the network.
Command Line Interf ace 6-46 radius-server address This command specif ies the pr imar y and secondar y RADIUS ser v ers. Syntax radius-server address [ secondary ] < host _ip_address | host_name > • secondary - Secondary server. • host_ip_add ress - IP address of server.
RADIUS Client 6-47 Example radius-server key This command sets the RADIUS encryption ke y . Syntax radius-server [ secondary ] key < k e y_string> • secondary - Secondary server. • key_string - Encryption key used to authent icate logon access for c lient.
Command Line Interf ace 6-48 Default Setting 3 Command Mode Global Configuration Example radius-server timeout This command sets the int erval betwee n transmitt ing authenti cation reque sts to the RADI US ser v er . Syntax radius-server [ secondary ] timeout number_of_seconds • secondary - Secondary server.
RADIUS Client 6-49 show radius This command displa ys the current settings f or the RADIUS ser v er . Default Setting None Command Mode Ex ec Example SMC-AP#show radius Radius Server Information ======================================== IP : 192.168.1.
Command Line Interf ace 6-50 802.1x Port Authentication The access point supports IEEE 802.1x access control f or wireless clients. Th is control f eature prev ents unauthorized access to the networ k by requirin g a 802.1x client applica tion to submit user credentials f or authentication.
802.1x P or t A uthentication 6-51 802.1x This command co nfigures 802.1x a s optionally sup por ted or as required f or wireless clients. Use the no f orm to disable 802.1x suppor t. Syntax 802.1x < supported | required > no 802.1x • supported - Authen ticates clients that init iate the 802.
Command Line Interf ace 6-52 initiate 802.1x authentication). For stations init iating 802.1x, only those stations successfully au thenticated ar e allowed to access the networ k. For those stations not initiatin g 802.1x, access to the network is allowed af ter successful 802.
802.1x P or t A uthentication 6-53 broadcast-key -refresh-ra te command specif ies the interval after which the broadcast keys are chan ged. The 802.1x ses sion-key-r efresh-rate command specif ies the interval after which unic ast session keys are changed.
Command Line Interf ace 6-54 802.1x session-timeout This command sets the time perio d after which a connecte d client must be re-auth enticated. Use th e no f orm to disable 802.1x re-authenticat ion. Syntax 802.1x sess ion-timeout < seconds> no 802.
802.1x P or t A uthentication 6-55 Command Mode Global Configuration Example Related Commands address filter entry (page 6-55) show a uthentica tion (page 6- 59) address filter entry This command enter s a MA C address in the f ilter tab le .
Command Line Interf ace 6-56 Example Related Commands address filter de f ault (pag e 6-54) show a uthentica tion (page 6- 59) address filter delete This command deletes a MA C address from the filter tab le. Syntax addres s filter del ete < mac-addres s> mac-address - Ph ysical address of cli ent.
802.1x P or t A uthentication 6-57 mac-authentication server This command sets add ress filtering to be pe rf ormed with local or remote opt ions . Use the no f or m to disab le M A C addr ess authenti cation.
Command Line Interf ace 6-58 mac-authenticati on session-timeout This command sets the inter val at which associated clients will be re-authenticat ed with the RADIUS server authenticatio n database. Use th e no form to disable re authentication . Syntax mac-authen tication sess ion-timeout < seconds> seconds - Re-authentica tion interval.
802.1x P or t A uthentication 6-59 show authentication This command sho ws all 802.1x authenticat ion settings, as well as the address filter tab le. Command Mode Ex ec Example SMC-AP#show authenticat.
Command Line Interf ace 6-60 Filtering Commands The commands described in this se ction are used to filte r communication s between wire less clients, control access to th e management int erf ace from wireless clien ts, and filter tr affic using specific Eth er net protocol t ypes.
Filtering Commands 6-61 Command Usage This command can disab le wireless-to-wireless communication s between client s via the access point. Howe ver , it does n ot aff ect communications between wireless clients and the wired network .
Command Line Interf ace 6-62 filter ethern et-type enable This command chec ks the Ethernet type on all incoming and outgoing Ethernet pac ket s against the protocol filt ering table .
Filtering Commands 6-63 filter ethern et-type protocol This command sets a filter f or a specific Ethernet type. Use the no f orm to disable filterin g f or a specific Et her net type. Syntax filter ethernet-t ype pr otocol < protocol> no filter ethernet-ty pe pr otocol < protocol> protocol - An Ether net protocol typ e.
Command Line Interf ace 6-64 show filters This command sho ws the filter op tions and protocol entries in the filter table . Command Mode Ex ec Example Interface Commands The commands described in this se ction configu re connection parameters for the Ether net por t and wireless interface.
Interf ace Commands 6-65 Ethernet Interface dns primary-server Specifies the primary name server IC-E 6-68 dns secondary-server Specifies the secondary name se rver IC-E 6-68 ip address Sets the IP ad.
Command Line Interf ace 6-66 ssid Configures the service set identifier IC-W 6-79 beacon-interval Configures the rate at which beacon signals are transmitted from the access point IC-W 6-79 dtim-perio.
Interf ace Commands 6-67 transmit-power Adjusts the power of the radio signals transmitted from the access point IC-W 6-87 max-association Configures the maximum number of clients that can be associat.
Command Line Interf ace 6-68 interface This command configures an interf ace type and enters interf ace configuration m ode. Syntax interface < ethernet | wireless < a | g >> • ethernet - Inte rface for w ired netwo rk. • wireless - Interface for wireless clients.
Interf ace Commands 6-69 Default Setting None Command Mode Global Configuration Command Usage The primar y and secondar y name servers are queried in sequence.
Command Line Interf ace 6-70 Default Setting IP address: 19 2.168.2.2 Netmask: 255.255. 255.0 Command Mode Interf ace Configuration (Ethe rnet) Command Usage • DHCP is enable d by defaul t. To manua lly configure a new IP address, you must first disable the DHCP client with the no ip dhcp comma nd.
Interf ace Commands 6-71 ip dhcp This command sets the IP addr ess f or the currently select ed VLAN interface. Use the no form to restore the d ef ault IP address .
Command Line Interf ace 6-72 Related Commands ip address (p age 6-69) shutdown This command disab les the Ethernet interf ace. T o restar t a disab led interf ace, use the no for m .
Interf ace Commands 6-73 Default Setting Ether net interface Command Mode Ex ec Example radio-mode This command sets the wo rking mode f or the wireless interf ace. Syntax radio-mode < b | g | b+g > • b - b-only mode: Both 802.11b and 80 2.11g clients can communicate with th e access point, but 802.
Command Line Interf ace 6-74 Command Mode Interf ace Configuration (Wireless g) Example select-antenna-mode This command selects the b uilt-in antennas or an optional high-gain an tenna attach ed to the soc ket on the right antenna . Syntax select-antenna -mode < diver sity | right antenna > • diversity - Selects t he built-in antennas.
Interf ace Commands 6-75 description This command adds a description to a the wireless interf ace. Use the no form to remove the description. Syntax description < string > no description string - Comment or a description f or this interf ace.
Command Line Interf ace 6-76 Command Usage When SSID broadcast is disa bled, the access point will not include its SSID in beacon messages. No r will it respond to probe request s from clients that do not include a fix ed SSID . Example speed This command configures t he maximu m data rate at which a station can connect to the access point.
Interf ace Commands 6-77 Example channel This command configures the r adio channe l through which the access point communicates with wireless clients. Syntax channel < channel | auto > • channel - Manuall y sets the radio ch annel used for communications with wireless clien ts.
Command Line Interf ace 6-78 • For most wireless adapter s, the channel for wir eless clients is automatica lly set to the s ame as that used by the a ccess point to which it is linked. Example turbo This command sets the access point to an enhanced mode (not regulated in IEEE 802.
Interf ace Commands 6-79 ssid This command configures the service set identifier (SSID). Syntax ssid string string - The name of a basic service set suppor ted by the access point.
Command Line Interf ace 6-80 Command Mode Interf ace Configuration (Wireless) Command Usage The beacon signal s allow wireless clients to mainta in contact with the access point.
Interf ace Commands 6-81 indicates that the access point will save all broadcast/ multicast fram es for the Basic Service Set (BSS) and forward th em after every seco nd beacon.
Command Line Interf ace 6-82 collisions due to high network utilization, try setting the fragment size to send smaller fragments. This will speed up the retransmission of smaller frames.
Interf ace Commands 6-83 RTS frame, the station sends a CT S frame to notify the sending station that it can start se nding data. • Access point s contending for the wirele ss medium may not be aware of each other. The RTS/CTS mechanism can solve this “Hidden Node” problem.
Command Line Interf ace 6-84 Example Related Commands encr yption (page 6-84) ke y (page 6-85) encryption This command def ines whether or not WEP encryption is used to provide p rivacy f or wireless communications. Use the no f orm to disable encr yption.
Interf ace Commands 6-85 • Note that WEP pro tects data tran smitted between wireless nodes, but does not protect any transmissions over your wired network or over the I nternet. • Although WEP keys ar e not needed for WPA, you must enable WEP encrypti on in order to enable all types of encryption in the acce ss point.
Command Line Interf ace 6-86 Command Usage • To enable Wired Equi valent Privacy (WEP), use th e authenti cation command to select the “shared key” authenti cation type, us e the encryption comma nd to specify the key lengt h, and use the key co mmand to configure at l east one key.
Interf ace Commands 6-87 Command Mode Interf ace Configuration (Wireless) Command Usage • If you use WEP key encryptio n, the access point uses the transmit key to en crypt multicas t and broadcas t data signals that it sends to client device s. Other keys can be used for decryption of data from clients.
Command Line Interf ace 6-88 Command Usage • The “min” ke yword indicates minimum powe r. • The longer th e transmissio n distance, the higher the transmission power require d. But to support t he maximum number of users in an are a, you must k eep the power as low as possible.
Interf ace Commands 6-89 multicast-cipher This command def ines the cipher algorithm used f or broadcasting and multicasting when using Wi -Fi Protected Access (WP A) security .
Command Line Interf ace 6-90 • TKIP defends against a ttacks on WEP in which the unencrypted initialization vect or in encr ypted packets is used to calculate t he WEP key. TKIP changes the encryption key on each packet , and rotates not just the unicast keys, but the broadcas t keys as well.
Interf ace Commands 6-91 Command Usage Wi-Fi Protected Access (WP A) provides improv ed data encr yption, which w as weak in WEP , and user authentication, which was largely missing in WEP . WP A uses the f ollowing security mechanisms. Enhanced D a ta Encr yption throug h TKIP WP A uses T emporal K ey Integr ity Protocol (TKIP).
Command Line Interf ace 6-92 wpa-mode This command specifies whethe r Wi-Fi Protected Access (W P A) is to use 80 2.1x dynam ic ke ys or a pre-sh ared key . Syntax wpa-mode < dyn ami c | pre- shared-key > • dynamic - WPA with 802.1x dynamic keys.
Interf ace Commands 6-93 wpa-preshared-key This command define s a Wi-Fi Pr otected Access (WP A) preshar ed-ke y . Syntax wpa-preshared-ke y < ty pe> < val u e > • type - Inpu t format. (Op tions: ASCII, HEX ) • value - The key string.
Command Line Interf ace 6-94 wpa-psk-type This command define s the Wi-Fi Protect ed Access (WP A) preshar ed-ke y type. Syntax wpa-psk-ty pe < ty pe> type - Input format.
Interf ace Commands 6-95 Example show interface wireless This command displa ys the status f or the wireless interfa ce. Syntax show i nterface wi reless < a | g > • a - 802.
Command Line Interf ace 6-96 Example SMC-AP#show interface wireless g Wireless Interface Information ========================================================= ----------------Identification--------------------------- Description : Enterprise 802.1 1g Access Point SSID : SMC Turbo Mode : OFF Channel : 0 (AUTO) Status : Enable ----------------802.
Interf ace Commands 6-97 show station This command sho ws the wireless clients associ ated with the access point. Command Mode Ex ec Example SMC-AP#show station 802.
Command Line Interf ace 6-98 IAPP Commands The command described in this section enab les the protocol signaling required to ensu re the successful han dov er of wireless clients roaming between different 802.11f-co mpliant access points . In other w ords, the 802.
VLAN Commands 6-99 VLAN Commands The access point can en able th e suppor t of VLAN-tagged tr affic passing betwee n wireless clients and the wired network. Up to 64 VLAN IDs can be mapped to spec ific wireless c lients, allowing users to remain within t he same VLAN as the y mo v e around a campus site.
Command Line Interf ace 6-100 vlan This command enab les VLANs f or all traffic. Use the no f or m to disable VLANs. Syntax vlan enable no vlan Default Disabled Command Mode Global Configuration Comma.
VLAN Commands 6-101 native-vlanid This command configures t he nativ e VLAN ID f or the access point. Syntax native-vlanid < vlan-id> vlan-id - Native VLAN ID .
Command Line Interf ace 6-102.
A-1 Appendix A Troubleshooting Check the f ollowing items before you contact technica l suppor t. 1. If wireless clients cannot access the ne twork, check the f ollowing: • Be sure the access point and th e wireless clients are configured with the sa me Service Set ID (SSID).
T roub leshooting A-2 2. If the access point cannot be configured u sing T elnet, a web browser , or SN MP software: • Be sure to have configur ed the access point with a valid IP address, subn et mask and default gateway.
T roubleshooting A-3 4. If yo u f orgot or lost the pass word: • Set the access point to its def ault configuration by pressing the reset button on the back panel for 5 seconds or more. Then use the def ault user name “ admin” with the password “smcadmin ” to access the manag ement interface.
T roub leshooting A-4 Maximum Distance Table Important Notice Maximum distances post ed below are actual tested distance thresholds . Ho we ver , there are many v ariables su ch as barrier composition.
B-1 Appendix B Cables and Pinouts Twisted-Pair Cable Assignments Caution: DO NOT plug a phone jack connector into the RJ-45 port. Use only twisted-pair cables with RJ-45 connectors that conform with FCC standards. F or 10/100BASE-TX conn ections , a twisted-pair cab le must ha v e two pairs of wires.
Cables and Pinouts B-2 10/100BASE-TX Pin Assignments Use unshielded twiste d-pair (UTP) or shielded twisted-pair (STP) cabl e f or RJ-45 conn ections: 100-ohm Ca tegory 3 or better cable f or 10 Mbps connec tions, or 100-ohm Cate gor y 5 or better cable f or 100 Mbps conne ctions.
T wisted-P air Cable Assignments B-3 Straight-Through Wiring Because the 10/100 Mb ps por t on the access point uses an MDI pin configur ation, y ou must use “straight -through” cab le for network connections to hub s or s witches that only ha ve MDI-X por ts.
Cables and Pinouts B-4 Console Port Pin Assignments The DB-9 DCE serial por t on the front panel of the SMC2555W -AG i s used to connect to t he access point f or out-of-ba nd console configur ation. Th e on-board men u-driv en configuratio n progr am can be accessed from a terminal, or a PC running a term inal emulatio n progr am.
Console P or t Pin Assignments B-5 Serial Cable Signal Dir ections for DB-9 Ports Serial Cable Signal Dir ections for DB-25 Ports DB-9 to DB-9 AP Terminal or PC 1 2 3 4 5 6 7 8 9 1 2 3 4 5 6 7 8 9 DB-.
Cables and Pinouts B-6.
C-1 Appendix C Specifications General Specifications Maxim um Channels 802.11a: US & Canada: 13 (normal mode), 5 (tur bo mode) Ja pan: 4 ( normal mode), 1 (t urbo mode ) ETSI: 11 cha nnels (nor mal m ode), 4 (t urbo mode) 802.
Specifications C-2 Operating Frequenc y 802.11a: 5.15 ~ 5.25 GHz ( low er band) US/Canada, J apan 5.25 ~ 5.35 GHz ( middle band) US/Canada 5.725 ~ 5.825 GHz (u pper band) US/Can ada 5.50~ 5.70 GHz Eur ope 802.11b/g: 2.4 ~ 2.4835 GHz (US , Canada, ETSI) 2.
General Specifications C-3 Humidity 15% to 95% (non-condensin g) Compliances IEC 61000-4- 2/3/4/6/11 EMC Compliance (Cla ss B) FCC Class B (US) ICES-003 (Canad a) VCCI (Japan) RCR STD-33A Radio Signal Certification FCC P a r t 15.247 (2.4GHz) FCC par t 15 15.
Specifications C-4 Sensitivity IEEE 802.11a Sensitivity (GHz - dBm) Modulation/Rates 5.15-5.250 5. 25-5.350 5.50-5.700 5.725-5 .825 BPSK (6 Mbps) -88 -88 -88 -88 BPSK (9 Mbps) -87 -87 -87 -87 QPSK (12.
General Specifications C-5 Transmit Power IEEE 802.11a Maximu m Output Power (GHz - dBm) Data Rate 5.15-5.2 50 5.2 5-5 .350 5.50 -5.700 5.725-5.825 6 Mbps 17 1 7 17 17 9 Mbps 17 1 7 17 17 12 Mbps 17 17 17 17 8 Mbps 17 1 7 17 17 24 Mbps 17 17 17 17 36 Mbps 17 17 17 17 48 Mbps 17 17 17 17 54 Mbps 12 17 17 16 IEEE 802.
Specifications C-6.
Glossary-1 Glossary 10BASE-T IEEE 802.3 specification for 10 Mbps Ethernet ov er two pairs of Category 3 or better UTP cable . 100BASE-TX IEEE 802.3u specificat ion fo r 100 Mbps F ast Ether net ov er two pairs of Cate gory 5 or better UTP cable . Access Poin t An internetworking de vice that seamlessly connect s wired and wireless networ ks.
Glossar y Glossary-2 Backbone The core infr astructure of a network. The portion of the network that tran spor ts inf or mation from one central locat ion to another central location where it is unloa ded onto a local system. Basic Service Set (BSS) A set of 802.
Glossar y Glossary-3 Extended Service Set (ESS) More than one wi reless cell can be configur ed with the same Service Set Identifier to allo w mobile users can roam between diff erent cells with the Extended Service Set. Extensible Au thentication Protocol (EAP) An authentication pr otocol used to authenticat e networ k clients.
Glossar y Glossary-4 IEEE 802.11b A wireless standard that supports wireless communications in the 2.4 GHz band using Direct Seque nce Spread Spectr um (DSSS). The standard pro vides for data rat es of 1, 2, 5.5 , and 11 Mbps . IEEE 802.11g A wireless standard that supports wireless communications in the 2.
Glossar y Glossary-5 Network Time Protocol (NTP) NTP provides the mecha nisms to synchronize tim e across the network. The time server s operate in a hierar chical-maste r-sla v e configuration in or der to synchroniz e local clocks wit hin the subnet and to nat ional time sta ndards via wi re or radi o .
Glossar y Glossary-6 Prob lem. ” If the pac ket size is smal ler than the pr eset R TS Threshold size, the R TS/CTS mechanism will NO T be enabled. Service Set Iden ti fie r (SSID) An identifier that is atta ched to pac kets sent ov er the wireless LAN and functions as a pass word f or joining a particular radio cell; i.
Glossar y Glossary-7 Trivial File Transf er Protocol (TFTP) A TCP/IP protocol commonly us ed f or softw are do wnloads . Virtual LAN (VLAN) A Vir tual LAN is a collection of network nodes that share the same collision domain regardless of their ph y sical location or connection point in the net work.
Glossar y Glossary-8.
Index-1 A Advanced Encrypti on Standard See AES AES 5-59 antennas, positioning 2-3 authentication 5-14, 6-83 configuring 5-14, 6-83 MAC address 5-14, 6-54, 6-55 type 5-50, 6-76 B Basic Service Set See.
Index Index-2 filter 5-21, 6-54 address 5-14, 6-54 between wireless clients 5-23, 6-60 local bridge 5-23, 6-60 local or remote 5-14, 6- 57 management access 5-23, 6-61 protocol types 5-23, 6-62 VLANs .
Index Index-3 O OFDM 1-1 open system 5-50 operating frequency C-2 P package checklist 1-2 password configuring 5-29, 6-22 management 5-29, 6-22 pin assignments console port B-4 DB-9 port B -4 PoE 1-6 specifications C-2 power connection 2-2 Power over Ethernet See PoE power supply, specification s C -2 PSK 5-58, 6-92 R radio channel 802.
Index Index-4 T Telnet for managenet access 6-2 Temporal Key Integrity Protocol See TKIP time zone 5-38, 6-32 TKIP 5-58 , 6-89 transmit power, configuring 5-42, 6-87 trap destination 5-27, 6-38 trap m.
.
38 T esla Irvine, CA 92618 Phone: (949) 679-8000 FOR TECH NICAL SUPPOR T , CALL : From U.S.A. and Canada (24 hours a day , 7 days a week) (800) SMC-4-YOU; Phn: (949) 679-8000; Fax: (949) 679-1481 From Europe: C ontact details can be found on www .smc-europe .
Un point important après l'achat de l'appareil (ou même avant l'achat) est de lire le manuel d'utilisation. Nous devons le faire pour quelques raisons simples:
Si vous n'avez pas encore acheté SMC Networks SMC2555W-AG c'est un bon moment pour vous familiariser avec les données de base sur le produit. Consulter d'abord les pages initiales du manuel d'utilisation, que vous trouverez ci-dessus. Vous devriez y trouver les données techniques les plus importants du SMC Networks SMC2555W-AG - de cette manière, vous pouvez vérifier si l'équipement répond à vos besoins. Explorant les pages suivantes du manuel d'utilisation SMC Networks SMC2555W-AG, vous apprendrez toutes les caractéristiques du produit et des informations sur son fonctionnement. Les informations sur le SMC Networks SMC2555W-AG va certainement vous aider à prendre une décision concernant l'achat.
Dans une situation où vous avez déjà le SMC Networks SMC2555W-AG, mais vous avez pas encore lu le manuel d'utilisation, vous devez le faire pour les raisons décrites ci-dessus,. Vous saurez alors si vous avez correctement utilisé les fonctions disponibles, et si vous avez commis des erreurs qui peuvent réduire la durée de vie du SMC Networks SMC2555W-AG.
Cependant, l'un des rôles les plus importants pour l'utilisateur joués par les manuels d'utilisateur est d'aider à résoudre les problèmes concernant le SMC Networks SMC2555W-AG. Presque toujours, vous y trouverez Troubleshooting, soit les pannes et les défaillances les plus fréquentes de l'apparei SMC Networks SMC2555W-AG ainsi que les instructions sur la façon de les résoudre. Même si vous ne parvenez pas à résoudre le problème, le manuel d‘utilisation va vous montrer le chemin d'une nouvelle procédure – le contact avec le centre de service à la clientèle ou le service le plus proche.