Avaya AP-4, AP-5, and AP-6 User Guide

Avaya AP-4, AP-5, and AP-6 User Guide
Avaya AP-4, AP-5, and AP-6
User Guide
For Software Release 2.5.2
Document No. 21-300404
Issue 2
November 2004
Copyright 2004, Avaya Inc.
All Rights Reserved
Notice
Every effort was made to ensure that the information in this document
was complete and accurate at the time of printing. However, information
is subject to change.
Warranty
Avaya Inc. provides a limited warranty on this product. Refer to your
sales agreement to establish the terms of the limited warranty. In
addition, Avaya’s standard warranty language as well as information
regarding support for this product, while under warranty, is available
through the following Web site: http://www.avaya.com/support.
Preventing Toll Fraud
“Toll fraud” is the unauthorized use of your telecommunications system
by an unauthorized party (for example, a person who is not a corporate
employee, agent, subcontractor, or is not working on your company's
behalf). Be aware that there may be a risk of toll fraud associated with
your system and that, if toll fraud occurs, it can result in substantial
additional charges for your telecommunications services.
Avaya Fraud Intervention
If you suspect that you are being victimized by toll fraud and you need
technical assistance or support, in the United States and Canada, call the
Technical Service Center's Toll Fraud Intervention Hotline at
1-800-643-2353.
Disclaimer
Avaya is not responsible for any modifications, additions or deletions to
the original published version of this documentation unless such
modifications, additions or deletions were performed by Avaya. Customer
and/or End User agree to indemnify and hold harmless Avaya, Avaya's
agents, servants and employees against all claims, lawsuits, demands
and judgments arising out of, or in connection with, subsequent
modifications, additions or deletions to this documentation to the extent
made by the Customer or End User.
How to Get Help
For additional support telephone numbers, go to the Avaya support Web
site: http://www.avaya.com/support. If you are:
•
Within the United States, click the Escalation Management
link. Then click the appropriate link for the type of support you
need.
•
Outside the United States, click the Escalation Management
link. Then click the International Services link that includes
telephone numbers for the international Centers of
Excellence.
Providing Telecommunications Security
Telecommunications security (of voice, data, and/or video
communications) is the prevention of any type of intrusion to (that is,
either unauthorized or malicious access to or use of) your company's
telecommunications equipment by some party.
Your company's “telecommunications equipment” includes both this
Avaya product and any other voice/data/video equipment that could be
accessed via this Avaya product (that is, “networked equipment”).
An “outside party” is anyone who is not a corporate employee, agent,
subcontractor, or is not working on your company's behalf. Whereas, a
“malicious party” is anyone (including someone who may be otherwise
authorized) who accesses your telecommunications equipment with
either malicious or mischievous intent.
Such intrusions may be either to/through synchronous (time-multiplexed
and/or circuit-based), or asynchronous (character-, message-, or
packet-based) equipment, or interfaces for reasons of:
•
Utilization (of capabilities special to the accessed equipment)
•
Theft (such as, of intellectual property, financial assets, or toll
facility access)
•
Eavesdropping (privacy invasions to humans)
•
Mischief (troubling, but apparently innocuous, tampering)
•
Harm (such as harmful tampering, data loss or alteration,
regardless of motive or intent)
Be aware that there may be a risk of unauthorized intrusions associated
with your system and/or its networked equipment. Also realize that, if
such an intrusion should occur, it could result in a variety of losses to your
company (including but not limited to, human/data privacy, intellectual
property, material assets, financial resources, labor costs, and/or legal
costs).
Responsibility for Your Company’s Telecommunications Security
The final responsibility for securing both this system and its networked
equipment rests with you - Avaya’s customer system administrator, your
telecommunications peers, and your managers. Base the fulfillment of
your responsibility on acquired knowledge and resources from a variety
of sources including but not limited to:
•
Installation documents
•
System administration documents
•
Security documents
•
Hardware-/software-based security tools
•
Shared information between you and your peers
•
Telecommunications security experts
To prevent intrusions to your telecommunications equipment, you and
your peers should carefully program and configure:
•
Your Avaya-provided telecommunications systems and their
interfaces
•
Your Avaya-provided software applications, as well as their
underlying hardware/software platforms and interfaces
•
Any other equipment networked to your Avaya products
TCP/IP Facilities
Customers may experience differences in product performance, reliability
and security depending upon network configurations/design and
topologies, even when the product performs as warranted.
Standards Compliance
Avaya Inc. is not responsible for any radio or television interference
caused by unauthorized modifications of this equipment or the
substitution or attachment of connecting cables and equipment other
than those specified by Avaya Inc. The correction of interference caused
by such unauthorized modifications, substitution or attachment will be the
responsibility of the user. Pursuant to Part 15 of the Federal
Communications Commission (FCC) Rules, the user is cautioned that
changes or modifications not expressly approved by Avaya Inc. could
void the user’s authority to operate this equipment.
Product Safety Standards
This product complies with and conforms to the following international
Product Safety standards as applicable:
Safety of Information Technology Equipment, IEC 60950, 3rd Edition, or
IEC 60950-1, 1st Edition, including all relevant national deviations as
listed in Compliance with IEC for Electrical Equipment (IECEE) CB-96A.
Safety of Information Technology Equipment, CAN/CSA-C22.2
No. 60950-00 / UL 60950, 3rd Edition, or CAN/CSA-C22.2 No.
60950-1-03 / UL 60950-1.
Safety Requirements for Customer Equipment, ACA Technical Standard
(TS) 001 - 1997.
One or more of the following Mexican national standards, as applicable:
NOM 001 SCFI 1993, NOM SCFI 016 1993, NOM 019 SCFI 1998.
The equipment described in this document may contain Class 1 LASER
Device(s). These devices comply with the following standards:
•
EN 60825-1, Edition 1.1, 1998-01
•
21 CFR 1040.10 and CFR 1040.11.
The LASER devices used in Avaya equipment typically operate within the
following parameters:
Typical Center Wavelength
Maximum Output Power
830 nm - 860 nm
-1.5 dBm
1270 nm - 1360 nm
-3.0 dBm
1540 nm - 1570 nm
5.0 dBm
Luokan 1 Laserlaite
Klass 1 Laser Apparat
Use of controls or adjustments or performance of procedures other than
those specified herein may result in hazardous radiation exposures.
Contact your Avaya representative for more laser product information.
Electromagnetic Compatibility (EMC) Standards
This product complies with and conforms to the following international
EMC standards and all relevant national deviations:
Limits and Methods of Measurement of Radio Interference of Information
Technology Equipment, CISPR 22:1997 and EN55022:1998.
Information Technology Equipment – Immunity Characteristics – Limits
and Methods of Measurement, CISPR 24:1997 and EN55024:1998,
including:
•
Electrostatic Discharge (ESD) IEC 61000-4-2
•
Radiated Immunity IEC 61000-4-3
•
Electrical Fast Transient IEC 61000-4-4
•
Lightning Effects IEC 61000-4-5
•
Conducted Immunity IEC 61000-4-6
•
Mains Frequency Magnetic Field IEC 61000-4-8
•
Voltage Dips and Variations IEC 61000-4-11
Power Line Emissions, IEC 61000-3-2: Electromagnetic compatibility
(EMC) – Part 3-2: Limits – Limits for harmonic current emissions.
Power Line Emissions, IEC 61000-3-3: Electromagnetic compatibility
(EMC) – Part 3-3: Limits – Limitation of voltage changes, voltage
fluctuations and flicker in public low-voltage supply systems.
Means of Connection
Connection of this equipment to the telephone network is shown in the
following tables.
For MCC1, SCC1, CMC1, G600, and G650 Media Gateways:
Manufacturer’s Port
FIC Code
SOC/REN/
Network
Identifier
A.S. Code
Jacks
Off premises station
OL13C
9.0F
RJ2GX,
RJ21X,
RJ11C
DID trunk
02RV2-T
0.0B
RJ2GX,
RJ21X
CO trunk
02GS2
0.3A
RJ21X
02LS2
0.3A
RJ21X
Tie trunk
TL31M
9.0F
RJ2GX
Basic Rate Interface
02IS5
6.0F, 6.0Y
RJ49C
1.544 digital interface
04DU9-BN
6.0F
RJ48C,
RJ48M
04DU9-IKN
6.0F
RJ48C,
RJ48M
04DU9-ISN
6.0F
RJ48C,
RJ48M
04DU9-DN
6.0Y
RJ48C
SOC/REN/
A.S. Code
Network
Jacks
Federal Communications Commission Statement
Part 15:
Note: This equipment has been tested and found to comply with the
limits for a Class A digital device, pursuant to Part 15 of the FCC
Rules. These limits are designed to provide reasonable protection
against harmful interference when the equipment is operated in a
commercial environment. This equipment generates, uses, and can
radiate radio frequency energy and, if not installed and used in
accordance with the instruction manual, may cause harmful
interference to radio communications. Operation of this equipment
in a residential area is likely to cause harmful interference in which
case the user will be required to correct the interference at his own
expense.
Part 68: Answer-Supervision Signaling
Allowing this equipment to be operated in a manner that does not provide
proper answer-supervision signaling is in violation of Part 68 rules. This
equipment returns answer-supervision signals to the public switched
network when:
•
answered by the called station,
•
answered by the attendant, or
•
routed to a recorded announcement that can be administered
by the customer premises equipment (CPE) user.
This equipment returns answer-supervision signals on all direct inward
dialed (DID) calls forwarded back to the public switched telephone
network. Permissible exceptions are:
•
A call is unanswered.
•
A busy tone is received.
•
A reorder tone is received.
Avaya attests that this registered equipment is capable of providing users
access to interstate providers of operator services through the use of
access codes. Modification of this equipment by call aggregators to block
access dialing codes is a violation of the Telephone Operator Consumers
Act of 1990.
REN Number
For MCC1, SCC1, CMC1, G600, and G650 Media Gateways:
This equipment complies with Part 68 of the FCC rules. On either the
rear or inside the front cover of this equipment is a label that contains,
among other information, the FCC registration number, and ringer
equivalence number (REN) for this equipment. If requested, this
information must be provided to the telephone company.
For G350 and G700 Media Gateways:
This equipment complies with Part 68 of the FCC rules and the
requirements adopted by the ACTA. On the rear of this equipment is a
label that contains, among other information, a product identifier in the
format US:AAAEQ##TXXXX. The digits represented by ## are the ringer
equivalence number (REN) without a decimal point (for example, 03 is a
REN of 0.3). If requested, this number must be provided to the telephone
company.
For all media gateways:
The REN is used to determine the quantity of devices that may be
connected to the telephone line. Excessive RENs on the telephone line
may result in devices not ringing in response to an incoming call. In most,
but not all areas, the sum of RENs should not exceed 5.0. To be certain
of the number of devices that may be connected to a line, as determined
by the total RENs, contact the local telephone company.
REN is not required for some types of analog or digital facilities.
120A4 channel service unit
For G350 and G700 Media Gateways:
Manufacturer’s Port
FIC Code
Identifier
Ground Start CO trunk
02GS2
1.0A
RJ11C
DID trunk
02RV2-T
AS.0
RJ11C
Loop Start CO trunk
02LS2
0.5A
RJ11C
1.544 digital interface
04DU9-BN
6.0Y
RJ48C
04DU9-DN
6.0Y
RJ48C
04DU9-IKN
6.0Y
RJ48C
04DU9-ISN
6.0Y
RJ48C
02IS5
6.0F
RJ49C
Basic Rate Interface
For all media gateways:
If the terminal equipment (for example, the media server or media
gateway) causes harm to the telephone network, the telephone company
will notify you in advance that temporary discontinuance of service may
be required. But if advance notice is not practical, the telephone
company will notify the customer as soon as possible. Also, you will be
advised of your right to file a complaint with the FCC if you believe it is
necessary.
The telephone company may make changes in its facilities, equipment,
operations or procedures that could affect the operation of the
equipment. If this happens, the telephone company will provide advance
notice in order for you to make necessary modifications to maintain
uninterrupted service.
If trouble is experienced with this equipment, for repair or warranty
information, please contact the Technical Service Center at
1-800-242- 2121 or contact your local Avaya representative. If the
equipment is causing harm to the telephone network, the telephone
company may request that you disconnect the equipment until the
problem is resolved.
A plug and jack used to connect this equipment to the premises wiring
and telephone network must comply with the applicable FCC Part 68
rules and requirements adopted by the ACTA. A compliant telephone
cord and modular plug is provided with this product. It is designed to be
connected to a compatible modular jack that is also compliant. It is
recommended that repairs be performed by Avaya certified technicians.
The equipment cannot be used on public coin phone service provided by
the telephone company. Connection to party line service is subject to
state tariffs. Contact the state public utility commission, public service
commission or corporation commission for information.
This equipment, if it uses a telephone receiver, is hearing aid compatible.
Canadian Department of Communications (DOC) Interference
Information
This Class A digital apparatus complies with Canadian ICES-003.
Cet appareil numérique de la classe A est conforme à la norme
NMB-003 du Canada.
This equipment meets the applicable Industry Canada Terminal
Equipment Technical Specifications. This is confirmed by the registration
number. The abbreviation, IC, before the registration number signifies
that registration was performed based on a Declaration of Conformity
indicating that Industry Canada technical specifications were met. It does
not imply that Industry Canada approved the equipment.
Installation and Repairs
Before installing this equipment, users should ensure that it is
permissible to be connected to the facilities of the local
telecommunications company. The equipment must also be installed
using an acceptable method of connection. The customer should be
aware that compliance with the above conditions may not prevent
degradation of service in some situations.
Repairs to certified equipment should be coordinated by a representative
designated by the supplier. Any repairs or alterations made by the user to
this equipment, or equipment malfunctions, may give the
telecommunications company cause to request the user to disconnect
the equipment.
Declarations of Conformity
United States FCC Part 68 Supplier’s Declaration of Conformity (SDoC)
Avaya Inc. in the United States of America hereby certifies that the
equipment described in this document and bearing a TIA TSB-168 label
identification number complies with the FCC’s Rules and Regulations 47
CFR Part 68, and the Administrative Council on Terminal Attachments
(ACTA) adopted technical criteria.
Avaya further asserts that Avaya handset-equipped terminal equipment
described in this document complies with Paragraph 68.316 of the FCC
Rules and Regulations defining Hearing Aid Compatibility and is deemed
compatible with hearing aids.
Copies of SDoCs signed by the Responsible Party in the U. S. can be
obtained by contacting your local sales representative and are available
on the following Web site: http://www.avaya.com/support.
All Avaya media servers and media gateways are compliant with FCC
Part 68, but many have been registered with the FCC before the SDoC
process was available. A list of all Avaya registered products may be
found at: http://www.part68.org by conducting a search using “Avaya” as
manufacturer.
European Union Declarations of Conformity
Avaya Inc. declares that the equipment specified in this document
bearing the “CE” (Conformité Europeénne) mark conforms to the
European Union Radio and Telecommunications Terminal Equipment
Directive (1999/5/EC), including the Electromagnetic Compatibility
Directive (89/336/EEC) and Low Voltage Directive (73/23/EEC).
Copies of these Declarations of Conformity (DoCs) can be obtained by
contacting your local sales representative and are available on the
following Web site: http://www.avaya.com/support.
Japan
This is a Class A product based on the standard of the Voluntary Control
Council for Interference by Information Technology Equipment (VCCI). If
this equipment is used in a domestic environment, radio disturbance may
occur, in which case, the user may be required to take corrective actions.
To order copies of this and other documents:
Call: Avaya Publications Center
Voice 1.800.457.1235 or 1.207.866.6701
FAX 1.800.457.1764 or 1.207.626.7269
Write: Globalware Solutions
200 Ward Hill Avenue
Haverhill, MA 01835 USA
Attention: Avaya Account Management
E-mail: [email protected]
For the most current versions of documentation, go to the Avaya support
Web site: http://www.avaya.com/support.
Contents
Chapter 1: Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
13
In This Chapter . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
13
Document Conventions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
13
Introduction to Wireless Networking. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
14
Site Survey . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
14
Guidelines for Roaming . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
15
IEEE 802.11 Specifications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
16
802.11b . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
16
802.11a . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
16
802.11g . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
16
Management and Monitoring Capabilities. . . . . . . . . . . . . . . . . . . . . . . . . . . . .
17
HTTP/HTTPS Interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
17
Command Line Interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
17
SNMP Management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
18
Chapter 2: Getting Started . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
21
In This Chapter . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
21
Prerequisites . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
21
Product Package . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
23
MiniPCI Upgrade Kits . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
23
System Requirements. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
24
Hardware Installation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
24
Initialization . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
29
ScanTool . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
30
Setup Wizard . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
33
Download the Latest Software . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
40
Setup your TFTP Server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
41
Download Updates from a TFTP Server using the Web Interface . . . . . . . . . . . . . .
41
Download Updates from a TFTP Server using the CLI Interface . . . . . . . . . . . . . . .
42
Additional Hardware Features. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
42
Mounting Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
42
Installing the AP in a Plenum . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
46
Kensington Security Slot . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
46
Power over Ethernet . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
47
LED Indicators . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
48
Related Topics. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
50
Chapter 3: Status Information. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
In This Chapter . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
51
51
Issue 2 November 2004
5
Contents
Logging into the HTTP Interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
51
System Status . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
52
Chapter 4: Advanced Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . .
55
In This Chapter . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
55
Configuring the AP Using the HTTP/HTTPS Interface. . . . . . . . . . . . . . . . . . . . . .
55
System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
57
Dynamic DNS Support . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
58
Network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
59
IP Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
59
DHCP Server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
61
Link Integrity . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
63
Interfaces . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
65
Operational Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
65
Wireless (802.11a). . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
67
Wireless (802.11b). . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
69
Wireless (802.11b/g). . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
76
Wireless (802.11a/g). . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
78
Wireless Distribution System (WDS) . . . . . . . . . . . . . . . . . . . . . . . . . . . .
80
Ethernet . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
83
Management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
83
Passwords . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
84
IP Access Table . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
84
Services . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
85
Filtering . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
92
Ethernet Protocol . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
93
Static MAC. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
93
Advanced . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
97
TCP/UDP Port . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
97
Alarms . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
99
Groups . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
99
Alarm Host Table . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
104
Syslog . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
104
Bridge . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
106
Spanning Tree . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
107
Storm Threshold . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
107
Intra BSS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
107
Packet Forwarding. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
108
Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
109
6 AP-4, AP-5, and AP-6 User Guide
Contents
Authentication and Encryption Modes . . . . . . . . . . . . . . . . . . . . . . . . . . . .
109
Authentication Protocol Hierarchy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
115
SSID, VLAN, and Security Modes. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
115
VLAN Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
115
VLAN Workgroups and Traffic Management . . . . . . . . . . . . . . . . . . . . . . . . .
117
Typical User VLAN Configurations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
118
Configure Multiple SSID/VLAN/Security Mode Entries . . . . . . . . . . . . . . . . . . . . . .
119
Enable WEP Encryption . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
121
Enable 802.1x Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
121
Enable Mixed Mode (802.1x and WEP Encryption) . . . . . . . . . . . . . . . . . . . . .
122
Enable WPA Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
122
Enable WPA-PSK Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
122
Typical VLAN Management Configurations . . . . . . . . . . . . . . . . . . . . . . . . . .
123
MAC Access . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
124
Rogue Access Point Detection (RAD) . . . . . . . . . . . . . . . . . . . . . . . . . . . .
125
RADIUS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
127
MAC Access Control by Means of RADIUS Authentication . . . . . . . . . . . . . . . . .
128
RADIUS Authentication with 802.1x . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
130
RADIUS Accounting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
132
Chapter 5: Monitor Information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
135
In This Chapter . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
135
Logging into the HTTP Interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
135
Version . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
137
ICMP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
138
IP/ARP Table . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
139
Learn Table . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
139
IAPP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
140
RADIUS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
141
Interfaces . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
142
Link Test . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
143
Station Statistics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
145
Enabling and Viewing Station Statistics . . . . . . . . . . . . . . . . . . . . . . . . . . . .
145
Refreshing Station Statistics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
146
Chapter 6: Commands. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
149
In This Chapter . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
149
Logging into the HTTP Interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
149
Introduction to File Transfer via TFTP or HTTP . . . . . . . . . . . . . . . . . . . . . . . . . .
151
Issue 2 November 2004
7
Contents
TFTP File Transfer Guidelines. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
151
HTTP File Transfer Guidelines . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
151
Image Error Checking during File Transfer . . . . . . . . . . . . . . . . . . . . . . . . .
151
Update AP by Using TFTP. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
152
Update AP by Using HTTP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
153
Upload File by Using TFTP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
155
Upload File by Using HTTP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
156
Reboot . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
159
Reset. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
159
Help Link . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
160
Chapter 7: Troubleshooting. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
163
In This Chapter . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
163
Troubleshooting Concepts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
163
Symptoms and Solutions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
164
Connectivity Issues . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
164
Basic Software Setup and Configuration Problems . . . . . . . . . . . . . . . . . . . . .
165
Client Connection Problems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
168
VLAN Operation Issues . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
169
Power over Ethernet (PoE) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
170
Recovery Procedures . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
171
Reset to Factory Default Procedure . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
171
Forced Reload Procedure . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
172
Setting IP Address using Serial Port . . . . . . . . . . . . . . . . . . . . . . . . . . . .
176
Related Applications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
179
RADIUS Authentication Server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
179
TFTP Server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
179
Appendix A: The Command Line Interface . . . . . . . . . . . . . . . . . . . . . . .
181
In This Appendix . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
181
General Notes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
182
Prerequisite Skills and Knowledge . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
182
Notation Conventions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
182
Important Terminology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
183
Navigation and Special Keys . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
183
CLI Error Messages . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
184
Bootloader CLI . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
185
CLI Conventions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
187
Command Conventions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
187
8 AP-4, AP-5, and AP-6 User Guide
Contents
Entering Text Strings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
188
CLI Help . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
189
The Question Mark . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
189
The Help Command . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
192
Accessing the AP CLI . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
193
Using HyperTerminal to Log in to the AP . . . . . . . . . . . . . . . . . . . . . . . . . . .
193
Using Telnet to Log in to the AP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
194
CLI Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
194
done. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
195
download . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
195
exit . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
196
help . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
196
history . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
197
passwd . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
198
quit . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
198
reboot . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
198
search. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
198
set. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
199
show . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
201
upload . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
203
Parameter Tables . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
204
Auto Configuration Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
204
Auto Configuration Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
205
Syntax Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
205
DHCP Server Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
206
DHCP Server Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
206
IP Address Pool Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
207
Syntax Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
207
DNS Client Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
208
DNS Client for RADIUS Name Resolution . . . . . . . . . . . . . . . . . . . . . . . . . .
208
Syntax Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
208
Ethernet Interface Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
209
Ethernet Interface Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
209
Syntax Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
210
Filtering Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
211
Ethernet Protocol Filtering Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . .
211
Ethernet Protocol Filtering Table Parameters . . . . . . . . . . . . . . . . . . . . . . . . .
211
Static MAC Address Filter Table . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
212
Proxy ARP Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
213
Issue 2 November 2004
9
Contents
IP ARP Filtering Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
213
Broadcast Filtering Table . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
213
TCP/UDP Port Filtering . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
214
TCP/UDP Port Filtering Table . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
214
HTTP and HTTPS Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
216
HTTP (Web browser) Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
216
Syntax Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
217
IAPP Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
218
IAPP Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
218
Intra BSS Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
219
Intra BSS Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
219
Syntax Example . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
219
Inventory Management Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
220
Inventory Management Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
220
IP Access Table Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
220
IP Access Table Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
220
Syntax Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
221
IP Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
221
IP Configuration Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
221
Syntax Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
222
Link Integrity Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
223
Link Integrity Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
223
IP Target Table Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
223
Syntax Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
224
MAC Access Control Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
224
MAC Access Control Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
224
MAC Access Control Table Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . .
225
Syntax Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
225
Monitoring Parameters. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
226
Packet Forwarding Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
227
Packet Forwarding Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
227
RAD Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
227
Rogue Access Point Detection (RAD) Parameters . . . . . . . . . . . . . . . . . . . . .
228
Syntax Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
228
RADIUS Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
228
General RADIUS Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
229
RADIUS Authentication Parameters. . . . . . . . . . . . . . . . . . . . . . . . . . . . .
230
RADIUS Accounting Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
231
Syntax Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
232
10 AP-4, AP-5, and AP-6 User Guide
Contents
Secure Management Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
235
Secure Management Parameters. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
235
Serial Port Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
235
Serial Port Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
235
Syntax Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
236
SNMP Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
236
SNMP Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
236
SNMP Trap Host Table Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
237
Syntax Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
238
Spanning Tree Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
239
Spanning Tree Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
239
Spanning Tree Priority and Path Cost Table . . . . . . . . . . . . . . . . . . . . . . . . .
239
SpectraLink VoIP Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
240
SpectraLink VoIP Parameters (802.11b and bg Modes Only) . . . . . . . . . . . . . . . .
240
Storm Threshold Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
241
Storm Threshold Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
241
Storm Threshold Table . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
242
Syslog Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
242
Syslog Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
242
Syslog Host Table Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
243
Syntax Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
244
System Information Commands. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
244
System Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
244
Syntax Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
245
Telnet Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
246
Telnet Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
246
Syntax Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
247
TFTP Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
248
TFTP Server Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
248
Syntax Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
248
WDS Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
249
Wireless Distribution System (WDS) Parameters . . . . . . . . . . . . . . . . . . . . . .
249
Wireless Distribution System (WDS) Security Table Parameters . . . . . . . . . . . . . . .
250
802.11a Wireless Interface Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
250
802.11a Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
250
Syntax Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
252
802.11b Wireless Interface Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
253
802.11b Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
254
Syntax Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
256
Issue 2 November 2004
11
Contents
802.11b/g Wireless Interface Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . .
258
802.11b/g Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
258
Wireless Interface SSID/VLAN/Security Commands . . . . . . . . . . . . . . . . . . . . . .
262
Syntax Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
263
VLAN/SSID Pair Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
265
VLAN/SSID Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
265
Syntax Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
266
Appendix B: ASCII Character Chart . . . . . . . . . . . . . . . . . . . . . . . . . . .
267
Description . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
267
Appendix C: Specifications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
269
In This Appendix . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
269
Software Features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
269
Number of Stations per BSS. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
269
Management Functions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
270
Advanced Bridging Functions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
270
Medium Access Control (MAC) Functions. . . . . . . . . . . . . . . . . . . . . . . . . .
271
Security Functions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
272
Network Functions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
272
Advanced Wireless Functions
274
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Hardware Specifications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
274
Physical Specifications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
274
Electrical Specifications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
275
Environmental Specifications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
275
Radio Specifications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
276
802.11a Channel Frequencies. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
276
802.11b Channel Frequencies. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
278
802.11g Channel Frequencies. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
279
Wireless Communication Range . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
280
Appendix D: Technical Support . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
283
Before You Seek Help . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
283
12 AP-4, AP-5, and AP-6 User Guide
Chapter 1: Introduction
In This Chapter
The following topics are covered in this section:
●
Document Conventions on page 13
●
Introduction to Wireless Networking on page 14
●
IEEE 802.11 Specifications on page 16
●
Management and Monitoring Capabilities on page 17
Document Conventions
Note:
●
The term, AP, refers to an Access Point.
●
The term, 802.11, is used to describe features that apply to the 802.11a, 802.11b, and
802.11g wireless standards.
●
A Single-radio AP is an Access Point that supports one IEEE radio standard. The AP-4,
AP-5, and AP-6 are Single-radio APs.
●
An 802.11a AP is an Access Point that supports the IEEE 802.11a standard.
●
An 802.11b AP is an Access Point that supports the IEEE 802.11b standard.
●
An 802.11b/g AP is an Access Point that supports the IEEE 802.11g standard.
●
An 802.11a/g AP is an Access Point that supports the IEEE 802.11a/g standards.
●
Blue underlined text indicates a link to a topic or Web address. If you are viewing this
documentation on your computer, click the blue text to jump to the linked item.
Note:
A Note indicates important information that helps you make better use of your
computer.
! CAUTION:
CAUTION:
A Caution indicates either potential damage to hardware or loss of data and tells
you how to avoid the problem.
Issue 2 November 2004
13
Introduction
Introduction to Wireless Networking
An AP extends the capability of an existing Ethernet network to devices on a wireless network.
Wireless devices can
●
connect to a single Access Point, or
●
move between multiple Access Points located within the same vicinity. As wireless clients
move from one coverage cell to another, the devices maintain network connectivity.
Site Survey
To determine the best location for an Access Point, Avaya recommends conducting a Site
Survey before placing the device in its final location. For information about how to conduct a
Site Survey, contact your local reseller.
Before an Access Point can be configured for your specific networking requirements, it must
first be initialized. See Chapter 2: Getting Started for details.
Figure 1: Typical wireless network access infrastructure
14 AP-4, AP-5, and AP-6 User Guide
Once initialized, the network administrator can configure each unit according to the network’s
requirements. The AP functions as a wireless network access point to data networks. An AP
network provides:
●
Seamless client roaming
●
Easy installation and operation
●
Over-the-air encryption of data
●
High speed network links
Guidelines for Roaming
Wireless Standard Support
An AP can only communicate with client devices that support its wireless standard. For
example, an 802.11a client cannot communicate with an 802.11b AP and an 802.11b client
cannot communicate with an 802.11a AP. However, both 802.11b and 802.11g clients can
communicate with an 802.11b/g AP.
Network Names
●
All Access Points must have the same Network Name to support client roaming.
●
All workstations with an 802.11 client adapter installed must use either a Network Name of
“any” or the same Network Name as the Access Points that they will roam between. If an
AP has Closed System enabled, a client must have the same Network Name as the
Access Point to communicate (see Interface Configuration on page 68).
Security Settings
All Access Points and clients must have the same security settings to communicate.
Cell Coverage
●
The Access Points’ cells must overlap to ensure that there are no gaps in coverage and to
ensure that the roaming client will always have a connection available.
●
The coverage area of an 802.11b or 802.11b/g AP is larger than the coverage area of an
802.11a AP. The 802.11b and 802.11b/g APs operate in the 2.4 GHz frequency band; the
802.11a AP operates in the 5 GHz band. Products that operate in the 2.4 GHz band offer
greater range than products that operate in the 5 GHz band.
Issue 2 November 2004
15
Introduction
Data Rates
An 802.11a or 802.11b/g AP operates at faster data rates than the 802.11b AP. 802.11a and
802.11g products operate at speeds of up to 54 Mbits/sec; 802.11b products operate at speeds
of up to 11 Mbits/sec.
Channels
●
All Access Points in the same vicinity should use a unique, independent Channel. By
default, the AP automatically scans for available Channels during boot-up but you can also
set the Channel manually (see Interface Configuration on page 68 for details).
●
Access Points that use the same Channel should be installed as far away from each other
as possible to reduce potential interference.
IEEE 802.11 Specifications
In 1997, the Institute of Electrical and Electronics Engineers (IEEE) adopted the 802.11
standard for wireless devices operating in the 2.4 GHz frequency band. This standard includes
provisions for three radio technologies: direct sequence spread spectrum, frequency hopping
spread spectrum, and infrared. Devices that comply with the 802.11 standard operate at a data
rate of either 1 or 2 Megabits per second (Mbits/sec).
802.11b
In 1999, the IEEE modified the 802.11 standard to support direct sequence devices that can
operate at speeds of up to 11 Mbits/sec. The IEEE ratified this standard as 802.11b. 802.11b
devices are backwards compatible with 2.4 GHz 802.11 direct sequence devices (that operate
at 1 or 2 Mbits/sec). Available Frequency Channels vary by regulatory domain and/or country.
See 802.11b Channel Frequencies on page 321 for details.
802.11a
Also in 1999, the IEEE modified the 802.11 standard to support devices operating in the 5 GHz
frequency band. This standard is referred to as 802.11a. 802.11a devices are not compatible
with 2.4 GHz 802.11 or 802.11b devices. 802.11a radios use a radio technology called
Orthogonal Frequency Division Multiplexing (OFDM) to achieve data rates of up to 54 Mbits/
sec. Available Frequency Channels vary by regulatory domain and/or country. See 802.11a
Channel Frequencies on page 319 for details.
16 AP-4, AP-5, and AP-6 User Guide
Management and Monitoring Capabilities
802.11g
In 2003, the IEEE introduced the 802.11g standard. 802.11g devices operate in the 2.4 GHz
frequency band using OFDM to achieve data rates of up to 54 Mbits/sec. In addition, 802.11g
devices are backwards compatible with 802.11b devices. Available Frequency Channels vary
by regulatory domain and/or country. See 802.11g Channel Frequencies on page 322 for
details.
Management and Monitoring Capabilities
There are three management and monitoring interfaces available to the network administrator
to configure and manage an AP on the network:
●
HTTP/HTTPS Interface
●
Command Line Interface
●
SNMP Management
HTTP/HTTPS Interface
The HTTP Interface (also known as the Web browser Interface) provides easy access to
configuration settings and network statistics from any computer on the network. You can access
the Web or HTTP Interface:
●
over your LAN (switch, hub, etc.),
●
over the Internet, or
●
with a “crossover” Ethernet cable connected directly to your computer’s Ethernet Port.
HTTPS provides an HTTP connection over a Secure Socket Layer. HTTPS is one of two
available secure management options on the AP; the other secure management option is
SNMPv3. Enabling HTTPS allows you to access the AP in a secure fashion using Secure
Socket Layer (SSL) over port 443. The AP supports SSLv3 with a 128-bit encryption certificate
maintained by the AP for secure communications between the AP and the HTTP client. All
communications are encrypted using the server and the client-side certificate.
The AP comes pre-installed with all required SSL files: default certificate, private key and SSL
Certificate Passphrase installed.
Issue 2 November 2004
17
Introduction
Command Line Interface
The Command Line Interface (CLI) is a text-based configuration utility that supports a set of
keyboard commands and parameters to configure and manage an AP.
Users enter Command Statements, composed of CLI Commands and their associated
parameters. Statements may be issued from the keyboard for real time control, or from scripts
that automate configuration.
For example, when downloading a file, administrators enter the download CLI Command along
with IP Address, file name, and file type parameters.
How To Access the CLI
You access the CLI over a HyperTerminal serial connection or via Telnet.
During initial configuration, you can use the CLI over a serial port connection to configure an
Access Point’s IP address.
When accessing the CLI via Telnet, you can communicate with the Access Point from over your
LAN (switch, hub, etc.), from over the Internet, or with a “crossover” Ethernet cable connected
directly to your computer’s Ethernet Port.
See Appendix A: The Command Line Interface for more information on the CLI and for a list of
CLI commands and parameters.
SNMP Management
You can also manage and configure an AP using the Simple Network Management Protocol
(SNMP).
Note:
This requires an SNMP manager program, like HP Openview or Castlerock’s
SNMPc.
Note:
The AP supports several Management Information Base (MIB) files that describe the
parameters that can be viewed and/or configured over SNMP:
●
MIB-II (RFC 1213)
●
Bridge MIB (RFC 1493)
●
Ethernet-like MIB (RFC 1643)
●
802.11 MIB
●
Avaya Wireless Enterprise MIB
18 AP-4, AP-5, and AP-6 User Guide
Management and Monitoring Capabilities
Avaya provides these MIB files on the CD included with each Access Point. You need to
compile one or more of the above MIBs into your SNMP program’s database before you can
manage an Access Point using SNMP. Refer to the documentation that came with your SNMP
manager for instructions on how to compile MIBs.
The Enterprise MIB defines the read and read-write objects that can be viewed or configured
using SNMP. These objects correspond to most of the settings and statistics that are available
with the other management interfaces. Refer to the Enterprise MIB for more information; the
MIB can be opened with any text editor, such as Microsoft Word, Notepad, or WordPad.
SNMPv3 Secure Management
SNMPv3 is one of two available secure management options on the AP; the other secure
management option is HTTPS (HTTP connection over Secure Socket Layer). SNMPv3 is based
on the existing SNMP framework, but addresses security requirements for device and network
management.
The security threats addressed by Secure Management are:
●
Modification of information: An entity could alter an in-transit message generated by an
authorized entity in such a way as to effect unauthorized management operations,
including the setting of object values. The essence of this threat is that an unauthorized
entity could change any management parameter, including those related to configuration,
operations, and accounting
●
Masquerade: Management operations that are not authorized for some entity may be
attempted by that entity by assuming the identity of an authorized entity.
●
Message stream modification: SNMP is designed to operate over a connectionless
transport protocol. There is a threat that SNMP messages could be reordered, delayed, or
replayed (duplicated) to effect unauthorized management operations. For example, a
message to reboot a device could be copied and replayed later.
●
Disclosure: An entity could observe exchanges between a manager and an agent and
thereby learns the values of managed objects and learn of notifiable events. For example,
the observation of a set command that changes passwords would enable an attacker to
learn the new passwords.
To address the security threats listed above, SNMPv3 provides the following when secure
management is enabled:
●
Authentication: Provides data integrity and data origin authentication.
●
Privacy (a.k.a Encryption): Protects against disclosure of message payload.
●
Access Control: Controls and authorizes access to managed objects
Issue 2 November 2004
19
Introduction
The default SNMPv3 username is administrator, with SHA authentication, and DES privacy
protocol.
Note:
Note:
The remainder of this guide describes how to configure an AP using the HTTP
Web interface or the CLI interface. For information on how to manage devices
using SNMP, refer to the documentation that came with your SNMP program.
Also, refer to the MIB files for information on the parameters available via SNMP.
20 AP-4, AP-5, and AP-6 User Guide
Chapter 2: Getting Started
In This Chapter
●
Prerequisites on page 21
●
Product Package on page 23
●
System Requirements on page 24
●
Hardware Installation on page 24
●
Initialization on page 32
●
Downloading the Latest Software on page 43
●
Additional Hardware Features on page 45
Prerequisites
Before installing an AP, you need to gather certain network information. Table 1 identifies the
information you need.
Note:
Note:
Passwords must be configured with at least 6 characters in length.
Table 1: Required Network Information
Information
Description
Network Name
(SSID of the
wireless cards)
Assign the Access Point a Primary Network Name before wireless users
can communicate with it. The clients also need the same Network
Name. This is not the same as the System Name, which applies only to
the Access Point. The network administrator typically provides the
Network Name.
AP’s IP Address
If you do not have a DHCP server on your network, then you need to
assign the Access Point an IP address that is valid on your network.
HTTP (Web)
Interface Password
Each Access Point requires a read/write password to access the Web
interface. The default password is “public”.
1 of 2
Issue 2 November 2004
21
Getting Started
Table 1: Required Network Information
Information
Description
CLI Interface
Password
Each Access Point requires a read/write password to access the CLI
interface. The default password is “public”.
SNMP Read
Password
Each Access Point requires a password to allow get requests from an
SNMP manager. The default password is “public”.
SNMPv3
Authentication
Password
If Secure Management is enabled, each Access Point requires a
password for sending authenticated SNMPv3 messages. The default
password is “public”.
The default SNMPv3 username is administrator, with SHA
authentication, and DES privacy protocol.
SNMPv3 Privacy
Password
If Secure Management is enabled, each Access Point requires a
password when sending encrypted SNMPv3 data. The default
password is “public”.
SNMP Read-Write
Password
Each Access Point requires a password to allow get and set requests
from an SNMP manager. The default password is “public”. This
password must be at least 6 characters in length.
Security Settings
You need to determine what security features you will enable on the
Access Point.
Authentication
Method
A primary authentication server may be configured; a backup
authentication server is optional. The network administrator typically
provides this information.
Authentication
Server Shared
Secret
This is a password shared between the Access Point and the RADIUS
authentication server (so both passwords must be the same), and is
typically provided by the network administrator.
Authentication
Server
Authentication Port
This is a port number (default is 1812) and is typically provided by the
network administrator.
Client IP Address
Pool Allocation
Scheme
The Access Point can automatically provide IP addresses to clients as
they sign on. The network administrator typically provides the IP Pool
range.
DNS Server IP
Address
The network administrator typically provides this IP Address.
2 of 2
22 AP-4, AP-5, and AP-6 User Guide
Product Package
Product Package
Each Single-radio AP comes with the following:
●
One metal base for ceiling or desktop mounting (includes two screws)
●
Mounting hardware
- Four 3.5 mm x 40 mm screws
- Four 6 mm x 35 mm plugs
●
One power supply
●
One Installation CD-ROM that contains the following:
- Software Installation Wizard
- ScanTool
- Solarwinds TFTP software
- HTML Help
- This user’s guide in PDF format
●
One Access Point Quick Start Guide
If any of these items are missing or damaged, please contact your reseller or Technical Support
(see Appendix D: Technical Support for contact information).
MiniPCI Upgrade Kits
Single-radio APs can be fitted with different radio types. MiniPCI upgrade kits are available for
802.11a /b/g and 802.11b/g wireless cards. Each kit is composed of a single miniPCI board with
an integral antenna attached. The type of radio is indicated on the label on the antenna and
instructions on how to open your AP to replace the radio are provided with the kit.
Issue 2 November 2004
23
Getting Started
System Requirements
The following are the minimum requirements to begin using an AP:
●
A 10Base-T Ethernet or 100Base-TX Fast Ethernet switch or hub
●
At least one of the following IEEE 802.11-compliant devices:
●
You will need an:
If you have an:
802.11a client device
802.11a AP
802.11b or 802.11b/g client device
802.11b AP
802.11b/g client device
802.11b/g AP
802.11a/g client device
802.11a/g AP
A computer that is connected to the same IP network as the AP and has one of the
following Web browsers installed:
- Microsoft Internet Explorer 6 with Service Pack 1 or later and patch Q323308
- Netscape 6.1 or later
(The computer is required to configure the AP using the Web interface.)
Hardware Installation
Follow these steps to install a Single-radio AP:
1. Unpack the Access Point and accessories from the shipping box.
24 AP-4, AP-5, and AP-6 User Guide
Hardware Installation
2. If you intend to install the unit free-standing or if you intend to mount it to the ceiling, use a
Phillips screwdriver to attach the metal base to the underside of the unit. The metal base
and screws are provided. See Mounting Options on page 45 for additional information.
Figure 2: Attach the Metal Base
Issue 2 November 2004
25
Getting Started
3. Press down on the cable-cover lock located in the front-center of the unit to release the
cable cover.
Figure 3: Unlock the Cable Cover
cable-cover lock
26 AP-4, AP-5, and AP-6 User Guide
Hardware Installation
4. Remove the cable cover from the unit.
Figure 4: Remove Cable Cover
Issue 2 November 2004
27
Getting Started
5. Remove the front cover (the side with the LED indicators) from the unit.
Figure 5: Remove the Front Cover
28 AP-4, AP-5, and AP-6 User Guide
Hardware Installation
6. Remove the back cover from the unit.
Figure 6: Remove the Back Cover
7. Connect one end of an Ethernet cable to the Access Point’s Ethernet port. The other end of
the cable should not be connected to another device until after the installation is complete.
●
Use a straight-through Ethernet cable if you intend to connect the Access Point to a hub,
switch, patch panel, or Active Ethernet power injector.
●
Use a cross-over Ethernet cable if you intend to connect the Access Point to a single
computer.
Issue 2 November 2004
29
Getting Started
8. If you are not using Active Ethernet (or you want to connect the Access Point to Active
Ethernet and AC power simultaneously), attach the AC power cable to the Access Point’s
power port.
Figure 7: Attach Ethernet Cable and Power Cable
Power Cable
Ethernet Cable
Note:
Note:
Once attached, the power cable locks into place. To disconnect the power cable,
slide back the black plastic fitting and gently pull the cable from the connector.
9. Connect the free end of the Ethernet cable to a hub, switch, patch panel, Active Ethernet
power injector, or an Ethernet port on a computer.
10. If using AC power, connect the power cord to a power source (such as a wall outlet) to turn
on the unit.
11. Configure and test the unit. See Initialization on page 32 for details.
12. Download the latest software to the unit, if necessary. See Downloading the Latest
Software on page 43 for details.
13. Place the unit in the final installation location. See Mounting Options on page 45 for
mounting options and instructions.
Note:
Note:
Avaya recommends that you perform a Site Survey prior to determine the
installation location for your AP units. For information about how to conduct a Site
Survey, contact your local reseller.
30 AP-4, AP-5, and AP-6 User Guide
Hardware Installation
14. Replace the back cover, front cover, and cable cover. Be careful to avoid trapping the power
and Ethernet cables when replacing the cable cover.
Figure 8: Assembled Unit
15. If desired, you can attach a Kensington lock to secure the cable cover into place. This will
protect the unit from unauthorized tampering. See Kensington Security Slot on page 49 for
details.
Issue 2 November 2004
31
Getting Started
Initialization
Avaya provides two tools to simplify the initialization and configuration of an AP:
●
ScanTool
●
Setup Wizard
ScanTool is included on the Installation CD; the Setup Wizard launches automatically the first
time you access the HTTP interface.
Note:
These initialization instructions describe how to configure an AP over an Ethernet
connection using ScanTool and the HTTP interface. If you want to configure the
unit over the serial port, see Setting IP Address using Serial Port on page 206 for
information on how to access the CLI over a serial connection and Appendix
A: The Command Line Interface for a list of supported commands.
Note:
ScanTool
ScanTool is a software utility that is included on the installation CD-ROM. ScanTool makes it
possible for you to find the IP address of an Access Point by referencing the MAC address in a
Scan List, or to assign an IP address if one has not been assigned.
ScanTool automatically
●
detects the Access Points installed on your network, regardless of IP address,
●
lets you configure each unit’s IP settings, and
●
allows you to download new software to an AP that does not have a valid software image
installed (see Client Connection Problems on page 198).
To access the HTTP interface and configure the AP, the AP must be assigned an IP address
that is valid on its Ethernet network. By default, the AP is configured to obtain an IP address
automatically from a network Dynamic Host Configuration Protocol (DHCP) server during
boot-up. If your network contains a DHCP server, you can run ScanTool to find out what IP
address the AP has been assigned.
Default IP Address
If your network does not contain a DHCP server, the Access Point’s IP address defaults to
169.254.128.132. In this case, you can use ScanTool to assign the AP a static IP address that is
valid on your network.
32 AP-4, AP-5, and AP-6 User Guide
Initialization
ScanTool Instructions
Follow these steps to install ScanTool, initialize the Access Point, and perform initial
configuration:
1. Locate the unit’s Ethernet MAC address and write it down for future reference. The MAC
address is printed on the product label. Each unit has a unique MAC address, which is
assigned at the factory.
2. Confirm that the AP is connected to the same LAN subnet as the computer that you will use
to configure the AP.
3. Power up, reboot, or reset the AP.
Result: The unit requests an IP Address from the network DHCP server.
4. Insert the Installation CD into the CD-ROM drive of the computer that you will use to
configure the AP.
Result: The installation program will launch automatically.
5. Follow the on-screen instructions to install the Access Point software and documentation.
Note:
Note:
The Avaya Wireless Installation program supports the following operating
systems:
- Windows 98SE
- Windows 2000
- Windows NT
- Windows ME
- Windows XP
6. After the software has been installed, double-click the ScanTool icon on the Windows
desktop to launch the program (if the program is not already running).
Result: ScanTool scans the subnet and displays all detected Access Points. The ScanTool’s
Scan List screen appears. See Figure 9.
Note:
Note:
If your computer has more than one network adapter installed, you will be
prompted to select the adapter that you want ScanTool to use before the Scan
List appears. If prompted, select an adapter and click OK. You can change your
adapter setting at any time by clicking the Select Adapter button on the Scan
List screen.
The ScanTool Network Adapter Selection screen will not appear if your computer only
has one network adapter installed.
Issue 2 November 2004
33
Getting Started
Figure 9: Scan List
7. Locate the MAC address of the AP you want to initialize within the Scan List.
Note:
Note:
If your Access Point does not show up in the Scan List, click the Rescan button
to update the display. If the unit still does not appear in the list, see Chapter
7: Troubleshooting the AP for suggestions. Note that after rebooting an
Access Point, it may take up to five minutes for the unit to appear in the Scan
List.
8. Do one of the following:
●
If the AP has been assigned an IP address by a DHCP server on the network, write down
the IP address and click Cancel to close ScanTool. Go to Setup Wizard on page 36 for
information on how to access the HTTP interface using this IP address.
34 AP-4, AP-5, and AP-6 User Guide
Initialization
●
If the AP has not been assigned an IP address (in other words, the unit is using its default
IP address, 169.254.128.132), follow the steps in the table to assign it a static IP address
that is valid on your network:
Step
Action
1.
Highlight the entry for the AP you want to configure.
2.
Click the Change button.
Result: The Change screen appears.
Scan Tool Change Screen
3.
Set IP Address Type to Static.
4.
Enter a static IP Address for the AP in the field provided. You must assign
the unit a unique address that is valid on your IP subnet. Contact your
network administrator if you need assistance selecting an IP address for
the unit.
5.
Enter your network’s Subnet Mask in the field provided.
6.
Enter your network’s Gateway IP Address in the field provided.
1 of 2
Issue 2 November 2004
35
Getting Started
Step
Action
7.
Enter the SNMP Read/Write password in the Read/Write Password field
(for new units, the default SNMP Read/Write password is “public”).
Note:
Note:
The TFTP Server IP Address and Image File Name fields
are only available if ScanTool detects that the AP does not
have a valid software image installed. See Client
Connection Problems on page 198.
8.
Click OK to save your changes.
Result: The Access Point will reboot automatically and any changes you
made will take effect.
9.
When prompted, click OK a second time to return to the Scan List screen.
10.
Click Cancel to close the ScanTool.
11.
Proceed to Setup Wizard for information on how to access the HTTP
interface.
2 of 2
Setup Wizard
The first time you connect to an AP’s HTTP interface, the Setup Wizard launches automatically.
The Setup Wizard provides step-by-step instructions for how to configure the Access Point’s
basic operating parameter, such as Network Name, IP parameters, system parameters, and
management passwords.
Setup Wizard Instructions
Follow these steps to access the Access Point’s HTTP interface and launch the Setup Wizard:
1. Open a Web browser on a network computer.
The HTTP interface supports the following Web browser:
●
Microsoft Internet Explorer 6 with Service Pack 1 or later
●
Netscape 6.1 or later
2. If necessary, disable the browser’s Internet proxy settings. For Internet Explorer users,
follow these steps:
a. Select Tools > Internet Options.
b. Click the Connections tab.
c. Click LAN Settings.
36 AP-4, AP-5, and AP-6 User Guide
Initialization
d. If necessary, remove the check mark from the Use a proxy server box.
e. Click OK twice to save your changes and return to Internet Explorer.
3. Enter the Access Point’s IP address in the browser’s Address field and press Enter.
This is either the
●
dynamic IP address assigned by a network DHCP server or
●
the static IP address you manually configured.
See ScanTool on page 32 for information on how to determine the unit’s IP address and
manually configure a new IP address, if necessary.
Result: The Enter Network Password screen appears. See Figure 10.
Figure 10: Enter Network Password
4. Enter the HTTP password in the Password field. Leave the User Name field blank. For
new units, the default HTTP password is “public”.
Result: The Setup Wizard will launch automatically. An example of the Password dialog and
the Setup Wizard page are shown next.
Issue 2 November 2004
37
Getting Started
Figure 11: Setup Wizard
5. Click Setup Wizard to begin. If you want to configure the AP without using the Setup
Wizard, click Exit and see Chapter 4: Performing Advanced Configuration.
The Setup Wizard supports the following navigation options:
●
Save & Next Button: Each Setup Wizard screen has a Save & Next button. Click this
button to submit any changes you made to the unit’s parameters and continue to the next
page. The instructions described next show how to navigate the Setup Wizard using the
Save & Next buttons.
●
Navigation Panel: The Setup Wizard provides a navigation panel on the left-hand side
of the screen. Click the link that corresponds to the parameters you want to configure to
be taken to that particular configuration screen. Note that clicking a link in the navigation
panel will not submit any changes you made to the unit’s configuration on the current
page.
●
Exit: The navigation panel also includes an Exit option. Click this link to close the Setup
Wizard at any time.
! CAUTION:
CAUTION:
If you exit from the Setup Wizard, any changes you submitted (by clicking the
Save & Next button) up to that point will be saved to the unit but will not take
effect until it is rebooted.
6. Configure the System Configuration settings and click Save & Next. See System
Configuration on page 60 for more information.
38 AP-4, AP-5, and AP-6 User Guide
Initialization
7. Configure the Access Point’s Basic IP address settings, if necessary, and click Save &
Next. See IP Configuration on page 62 for more information.
8. Assign the AP new passwords to prevent unauthorized access and click Save & Next. Each
management interface has its own password:
●
SNMP Read Password
●
SNMP Read-Write Password
●
SNMPv3 Authentication Password
●
SNMPv3 Privacy Password
●
CLI Password
●
HTTP (Web) Password
By default, each of these passwords is set to “public”. See Password Configuration on
page 94 for more information.
9. Configure the basic wireless interface settings and click Save & Next.
●
Options that are available for an 802.11a AP are shown in Table 2.
●
Options that are available for an 802.11b AP are shown in Table 3.
●
Options that are available for an 802.11b/g AP are shown in Table 4.
10. Review the configuration summary. If you want to make any additional changes, use the
navigation panel on the left-hand side of the screen to return to an earlier screen. After
making a change, click Save & Next to save the change and proceed to the next screen.
11. When finished, click Reboot on the Summary screen to restart the AP and apply your
changes.
Table 2: 802.11a Wireless Interface Settings
Option
Description
Primary Network
Name (SSID)
Enter a Network Name (between 1 and 32 characters long) for the
wireless network. You must configure each wireless client to use this
name as well.
Additional Network
Names (SSIDs)
The AP supports up to 16 SSIDs and VLANs per wireless interface
(radio). Refer to the Advanced Configuration chapter for information on
the detailed rules on configuring multiple SSIDs, VLANs, and security
modes.
Auto Channel
Select
By default, the AP scans the area for other Access Points and selects
the best available communication channel, either a free channel (if
available) or the channel with the least amount of interference. Remove
the check mark to disable this option. Note that you cannot disable Auto
Channel Select for 802.11a products in Europe (see Dynamic
Frequency Selection (DFS) for details).
1 of 2
Issue 2 November 2004
39
Getting Started
Table 2: 802.11a Wireless Interface Settings
Option
Description
Frequency Channel
When Auto Channel Select is enabled, this field is read-only and
displays the Access Point’s current operating channel. When Auto
Channel Select is disabled, you can specify the Access Point’s channel.
If you decide to manually set the unit’s channel, ensure that nearby
devices do not use the same frequency. Available Channels vary based
on regulatory domain. See 802.11a Channel Frequencies on page 319.
Note that you cannot manually set the channel for 802.11a products in
Europe (see Dynamic Frequency Selection (DFS) on page 75 for
details).
Transmit Rate
Use the drop-down menu to select a specific transmit rate for the AP.
Choose between 6, 9, 12, 18, 24, 36, 48, 54 Mbits/s, and Auto Fallback.
The Auto Fallback feature allows the AP to select the best transmit rate
based on the cell size.
2 of 2
Table 3: 802.11b Wireless Interface Settings
Option
Description
Primary Network
Name (SSID)
Enter a Network Name (between 1 and 32 characters long) for the
wireless network. You must configure each wireless client to use this
name as well.
Additional Network
Names (SSIDs)
The AP supports up to 16 SSIDs and VLANs per wireless interface
(radio). Refer to the Advanced Configuration chapter for information on
the detailed rules on configuring multiple SSIDs, VLANs, and security
modes.
Auto Channel
Select
By default, the AP scans the area for other Access Points and selects the
best available communication channel, either a free channel (if available)
or the channel with the least amount of interference. Remove the check
mark to disable this option. If you are setting up a Wireless Distribution
System (WDS), it must be disabled. See WDS Configuration on page 88
for more information.
Frequency Channel
When Auto Channel Select is enabled, this field is read-only and
displays the Access Point’s current operating channel. When Auto
Channel Select is disabled, you can specify the Access Point’s operating
channel. If you decide to manually set the unit’s channel, ensure that
nearby devices do not use the same frequency (unless you are setting
up a WDS). Available Channels vary based on regulatory domain. See
802.11b Channel Frequencies on page 321.
1 of 2
40 AP-4, AP-5, and AP-6 User Guide
Initialization
Table 3: 802.11b Wireless Interface Settings
Option
Description
Distance Between
APs
Set to Large, Medium, Small, Microcell, or Minicell depending on the
site survey for your system. The distance value is related to the
Multicast Rate (described next). In general, a larger distance between
APs means that your clients operate a slower data rates (on average).
This feature is available only if you are using an Orinoco Classic Gold
client card or Avaya Gold client card. See Distance Between APs on
page 81 for more information.
Multicast Rate
Sets the rate at which Multicast messages are sent. This value is related
to the Distance Between APs parameter (described previously). The
table below displays the possible Multicast Rates based on the Distance
between APs. This feature is available only if you are using an Orinoco
Classic Gold client card or Avaya Gold client card. See Multicast Rate on
page 82 for more information.
Distance
between APs
Multicast Rate
Large
1 and 2 Mbits/sec
Medium
1, 2, and 5.5 Mbits/
sec
Small
1, 2, 5.5 and 11
Mbits/sec
Minicell
1, 2, 5.5 and 11
Mbits/sec
Microcell
1, 2, 5.5 and 11
Mbits/sec
2 of 2
Table 4: 802.11b/g Wireless Interface Settings
Option
Description
Operational Mode
An 802.11b/g wireless interface can be configured to operate in the
following modes:
● 802.11b mode only
● 802.11g mode only
● 802.11g-wifi mode
● 802.11b/g mode (default)
1 of 2
Issue 2 November 2004
41
Getting Started
Table 4: 802.11b/g Wireless Interface Settings
Option
Description
Primary Network
Name (SSID)
Enter a Network Name (between 1 and 32 characters long) for the
wireless network. You must configure each wireless client to use this
name as well.
Additional Network
Names (SSIDs)
The AP supports up to 16 SSIDs and VLANs per wireless interface
(radio). Refer to the Advanced Configuration chapter for information on
the detailed rules on configuring multiple SSIDs, VLANs, and security
modes.
Auto Channel
Select
By default, the AP scans the area for other Access Points and selects
the best available communication channel, either a free channel (if
available) or the channel with the least amount of interference. Remove
the check mark to disable this option.
Frequency Channel
When Auto Channel Select is enabled, this field is read-only and
displays the Access Point’s current operating channel. When Auto
Channel Select is disabled, you can specify the Access Point’s
channel. If you decide to manually set the unit’s channel, ensure that
nearby devices do not use the same frequency. Available Channels
vary based on regulatory domain. See 802.11g Channel
Frequencies on page 322.
Transmit Rate
Select a specific transmit rate for the AP. The values available depend
on the Operational Mode. Auto Fallback is the default setting; it allows
the AP to select the best transmit rate based on the cell size.
Operational Mode
Transmit Rate
For 802.11b only
Auto Fallback, 1, 2, 5.5, 11
Mbits/sec
For 802.11g only
Auto Fallback, 6, 9, 12, 18,
24, 36, 48, 54 Mbits/sec
For 802.11b/g and
802.11g-wifi
Auto Fallback, 1, 2, 5.5, 6,
9, 11, 12, 18, 24, 36, 48, 54
Mbits/sec
2 of 2
42 AP-4, AP-5, and AP-6 User Guide
Downloading the Latest Software
Downloading the Latest Software
Avaya periodically releases updated software for the AP on its Web site at http://
www.avaya.com/support. Avaya recommends that you check the Web site for the latest updates
after you have installed and initialized the unit.
Three types of files can be downloaded to the AP from a TFTP server:
●
image (AP software image or kernel)
●
config (configuration file)
●
UpgradeBSPBL (BSP/Bootloader firmware file)
This section contains the following information:
●
Setting Up your TFTP Server
●
Downloading Updates from a TFTP Server
Setting Up your TFTP Server
A Trivial File Transfer Protocol (TFTP) server allows you to transfer files across a network. You
can
●
upload files from the AP for backup or copying, and
●
download the files for configuration and AP Image upgrades.
The Solarwinds TFTP server software is located on the Avaya Wireless AP Installation
CD-ROM. You can also download the latest TFTP software from Solarwind’s Web site at http://
www.solarwinds.net.
Note:
If a TFTP server is not available in the network, you can perform similar file
transfer operations using the HTTP interface.
Note:
After the TFTP server is installed:
●
Check to see that TFTP is configured to point to the directory containing the AP Image.
●
Make sure you have the proper TFTP server IP address, the proper AP Image file name,
and that the TFTP server is operational.
●
Make sure the TFTP server is configured to both Transmit and Receive files, with no
automatic shutdown or timeout.
Issue 2 November 2004
43
Getting Started
Downloading Updates from a TFTP Server
Web Interface Procedure
To download updates from a TFTP server by using the Web interface:
1. Download the latest software from http://www.avaya.com/support.
2. Copy the latest software updates to your TFTP server.
3. In the Web Interface, click the Commands button and select the Update AP tab.
4. Enter the IP address of your TFTP server in the field provided.
5. Enter the File Name (including the file extension). Enter the full directory path and file
name. If the file is located in the default TFTP directory, you need enter only the file name.
6. Select the File Type from the drop-down menu (use Img for software updates).
7. Select Update AP & Reboot from the File Operation drop-down menu.
8. Click Update.
9. The Access Point will reboot automatically when the download is complete.
CLI Procedure
To download updates from a TFTP server by using the CLI:
1. Download the latest software from http://www.avaya.com/support.
2. Copy the latest software updates to your TFTP server.
3. Open the CLI interface via Telnet or a serial connection.
4. Enter the CLI password when prompted.
5. Enter the command: download <tftpaddr> <filename> img
Result: The download will begin. Be patient while the image is downloaded to the
Access Point.
6. When the download is complete, type reboot 0 and press Enter.
Note:
Note:
See Appendix A: The Command Line Interface for more information.
44 AP-4, AP-5, and AP-6 User Guide
Additional Hardware Features
Additional Hardware Features
●
Mounting Options on page 45
●
Installing the AP in a Plenum on page 48
●
Kensington Security Slot on page 49
●
Active Ethernet on page 50
●
LED Indicators on page 50
Mounting Options
There are three mounting options for the AP, described below.
Desktop Mount
This is the standard installation for the AP. See Hardware Installation on page 24 for
instructions.
Wall Mount
Follow these steps to mount the AP on a wall:
1. Identify the location where you intend to mount the unit.
Note:
Note:
For best results, mount the unit vertically. In other words, the antenna should be
pointing up or down but not sideways.
2. Unplug the Access Point’s power supply, if necessary.
3. Use a Phillips screwdriver to remove the metal base from the underside of the AP, if
necessary.
4. Press down on the cable cover lock to release the cable cover. See Figure 3 for an
illustration.
5. Remove the cable cover from the unit. See Figure 4 for an illustration.
6. Remove the front cover from the unit. See Figure 5 for an illustration.
7. Remove the back cover from the unit. See Figure 6 for an illustration.
8. Place the back cover on the mounting location and mark the center of the three mounting
holes.
Issue 2 November 2004
45
Getting Started
9. Remove the cover from the wall and drill a hole at each of the locations you marked above.
Each hole should be wide enough to hold a mounting plug (which is 6 mm x 35 mm).
10. Insert a plug into each hole. The AP comes with four 6 mm x 35 mm plugs; you only need to
use three of these when wall mounting the unit.
11. Insert a screw into each of the mounting holes molded into the back cover. The AP comes
with four 3.5 mm x 40 mm pan-head screws; you only need to use three of these when wall
mounting the unit.
12. Insert the screws into the wall plugs. Use a screwdriver to tighten the screws and attach the
back cover to the wall. In the following example, the back cover is mounted upside down
(the two holes are at the bottom).
Figure 12: Attach the Back Cover to the Wall
13. Attach Ethernet and power cables to the AP unit, if necessary.
46 AP-4, AP-5, and AP-6 User Guide
Additional Hardware Features
14. Snap the unit into the back cover. In the following example, the unit is mounted upside down
and its antenna is facing down.
Figure 13: AP Mounted on a Wall
15. Replace the front cover.
16. Replace the cable cover.
17. Turn on the AP.
Ceiling Mount
Follow these steps to mount the AP to a ceiling:
1. Unplug the Access Point’s power supply, if necessary.
2. Use a Phillips screwdriver to attach the metal base to the underside of the AP, if necessary.
SeeFigure 2 for an illustration.
3. Feed a mounting screw through each of the four rubber feet. The AP comes with four 3.5
mm x 40 mm pan-head screws.
4. Remove the screws from the rubber feet.
5. Turn the AP upside down position the base against the ceiling where you want to mount the
unit.
6. Mark the center of the four mounting holes in the rubber feet.
Issue 2 November 2004
47
Getting Started
7. Set the AP aside and drill a hole at each of the locations you marked above. Each hole
should be wide enough to hold a mounting plug (which is 6 mm x 35 mm).
8. Insert a plug into each hole. The AP comes with four 6 mm x 35 mm plugs.
9. Insert the screws into the holes you made previously in the rubber feet.
10. Insert the screws into the wall plugs. Use a screwdriver to tighten the screws and attach the
Access Point’s metal base to the ceiling.
Figure 14: Mounting the AP to the Ceiling
Installing the AP in a Plenum
In an office building, plenum is the space between the structural ceiling and the tile ceiling that is
provided to help air circulate. Many companies also use the plenum to house communication
equipment and cables. However, these products and cables must comply with certain safety
requirements, such as Underwriter Labs (UL) Standard 2043: “Standard for Fire Test for Heat
and Visible Smoke Release for Discrete Products and Their Accessories Installed in
Air-Handling Spaces”.
The AP has been certified under UL Standard 2043 and can be installed in the plenum only
when the following conditions apply:
●
The unit uses Active (AE) to receive power over a plenum-rated Category 5 Ethernet cable
(the power cable must not be connected to the unit).
48 AP-4, AP-5, and AP-6 User Guide
Additional Hardware Features
●
The unit’s plastic covers have been removed (this includes the cable cover, the front cover,
and the back cover).
Kensington Security Slot
The AP enclosure includes a Kensington Security Slot for use with a Kensington locking
mechanism. When properly installed, a Kensington lock can prevent unauthorized personnel
from stealing the AP. In addition, the Kensington locks secures the cable cover in place, which
prevents tampering with the Ethernet and power cables.
The Kensington Security Slot is shown in the illustrations below (the figure on the left shows the
slot with the cable cover attached; the figure on the right shows the slot with the cable cover
removed). See http://www.kensington.com for information on Kensington security solutions.
Figure 15: Kensington Security Slot
Issue 2 November 2004
49
Getting Started
Active Ethernet
An Active Ethernet-enabled AP is equipped with an 802.3af-compliant Active Ethernet module.
Active Ethernet (AE) delivers both data and power to the access point over a single Ethernet
cable. If you choose to use Active Ethernet, there is no difference in operation; the only
difference is in the power source.
●
The Active Ethernet (AE) integrated module receives ~48 VDC over a standard Category 5
Ethernet cable.
●
To use Active Ethernet, you must have an AE hub (also known as a power injector)
connected to the network.
●
The cable length between the AE hub and the Access Point should not exceed 100 meters
(approximately 325 feet).
●
The AE hub is not a repeater and does not amplify the Ethernet data signal.
●
If connected to an AE hub and an AC power simultaneously, the Access Point draws
power from Active Ethernet.
●
Maximum power supplied to an Access Point is 11 Watts; the unit typically draws
approximately 10 Watts.
Also see Hardware Specifications on page 317.
Note:
Note:
The AP’s 802.3af-compliant Active Ethernet module is backwards compatible
with all Avaya Wireless Active Ethernet hubs that do not support the IEEE
802.3af standard.
LED Indicators
The AP has four LED indicators, which operate as described inTable 5.
Table 5: LED Operation
Power
Ethernet
Link
Ethernet
Activity
Wireless
Activity
Indication
Solid
Green
Green
when link
exists
Green
flash with
data
activity
Green
flash with
data
activity
Normal Operation
Solid
Amber
Solid
Amber
Solid
Amber
Solid
Amber
Rebooting/Power on Self Test (POST)
1 of 2
50 AP-4, AP-5, and AP-6 User Guide
Additional Hardware Features
Table 5: LED Operation
Power
Ethernet
Link
Ethernet
Activity
Wireless
Activity
Indication
Solid
Green
Solid
Amber
Solid
Amber
Solid
Amber
Reset to Factory Defaults command issued
Solid
Red
Off
Off
Off
SDRAM Test Failure
Solid
Red
Green
Off
Off
If the AP is configured to get an IP address
from a DHCP server, it may take up to two
minutes to obtain the address. The Power
LED will be red and if there is an Ethernet
link the Ethernet Link LED will be green
during the time the AP is trying to obtain an
address. Once an address is obtained, the
Power LED will turn green.
Blinking
Red
Blinking
Red or
Off
Blinking
Red
Off
Hardware Timer Test Failure
Blinking
Red
Off
Off
Blinking
Red
Flash Test Failure
Solid
Red
Blinking
Red or
Off
Solid Red
Off
Ethernet Test Failure
Solid
Red
Off
Off
Solid Red
Wireless Test Failure
Blinking
Amber
Blinking
Amber or
Off
Blinking
Amber or
Off
Off
Missing or bad AP image
Solid
Amber
Solid
Amber
Solid
Amber
Solid
Amber
Missing or bad bootloader image (all LEDs
remain solid amber)
n/a
n/a
n/a
Red
Wireless radio is not working properly
n/a
n/a
Amber
Amber
Indicated interface in administrative down
state
2 of 2
Issue 2 November 2004
51
Getting Started
Figure 16: LED Indicators Illustrated
Power LED
Ethernet Link
LED
Ethernet Activity
LED
Wireless Activity
LED
Related Topics
The Setup Wizard helps you configure the basic AP settings required to get the unit up and
running. The AP supports many other configuration and management options. The remainder of
this user guide describes these options in detail.
●
See Chapter 4: Performing Advanced Configuration for information on configuration
options that are available within the Access Point’s HTTP interface.
●
See Chapter 5: Monitoring the AP for information on the statistics displayed within the
Access Point’s HTTP interface.
●
See Chapter 6: Performing Commands for information on the commands supported by the
Access Point’s HTTP interface.
●
See Chapter 7: Troubleshooting the AP for troubleshooting suggestions.
●
See Appendix A: The Command Line Interface for information on the CLI interface and for
a list of CLI commands.
52 AP-4, AP-5, and AP-6 User Guide
Chapter 3: Viewing Status Information
In This Chapter
●
Logging into the HTTP Interface
●
System Status
Logging into the HTTP Interface
Once the AP has a valid IP Address and an Ethernet connection, you may use your web
browser to monitor the system status.
Follow these steps to monitor an AP’s operating statistics using the HTTP interface:
1. Open a Web browser on a network computer.
Note:
Note:
The HTTP interface supports the following Web browser:
- Microsoft Internet Explorer 6 with Service Pack 1 or later
- Netscape 6.1 or later
2. If necessary, disable the Internet proxy settings. For Internet Explorer users, follow these
steps:
a. Select Tools > Internet Options....
b. Click the Connections tab.
c. Click LAN Settings....
d. If necessary, remove the check mark from the Use a proxy server box.
e. Click OK twice to save your changes and return to Internet Explorer.
3. Enter the Access Point’s IP address in the browser’s Address field and press Enter.
Result: The Enter Network Password screen appears. See Figure 17.
Issue 2 November 2004
53
Viewing Status Information
Figure 17: Enter Network Password Screen
4. Enter the HTTP password in the Password field and click OK. Leave the User Name field
blank. (By default, the HTTP password is “public”).
Result: The System Status screen appears. See Figure 18.
System Status
System Status is the first screen to appear each time you connect to the HTTP interface. See
Figure 18. You can also return to this screen by clicking the Status button.
54 AP-4, AP-5, and AP-6 User Guide
System Status
Figure 18: System Status Screen
Each section of the System Status screen provides the following information:
●
System Status: This area provides system level information, including the unit’s IP
address and contact information. See System Configuration on page 60 for information on
these settings.
●
System Alarms: System traps (if any) appear in this area. Each trap identifies a specific
severity level: Critical, Major, Minor, and Informational. See Alarm Configuration on
page 118 for a list of possible alarms.
Issue 2 November 2004
55
Viewing Status Information
56 AP-4, AP-5, and AP-6 User Guide
Chapter 4: Performing Advanced Configuration
In This Chapter
●
Configuring the AP Using the HTTP/HTTPS Interface on page 58
●
System Configuration on page 60: Describes how to configure specific system information
such as system name.
●
Network Configuration on page 62: Describes how to configure IP settings, DNS client,
DHCP server, and Link Integrity.
●
Interface Configuration on page 68: Describes how to:
- Configure the Access Point’s interfaces: Wireless and Ethernet.
- Configure a Wireless Distribution System (WDS).
●
Management Configuration on page 93: Describes how to:
- Configure the Access Point’s management Passwords, IP Access Table, and Services
such as configuring secure or restricted access to the AP via SNMPv3, HTTPS, or CLI.
- Configure Secure Management, SSL, Secure Shell (SSH), and RADIUS-Based Access
Management.
- Set up Automatic Configuration for Static IP
●
Filtering Configuration on page 111: Describes how to configure Ethernet Protocol filters,
Static MAC Address filters, Advanced filters, and Port filters.
●
Alarm Configuration on page 118: Describes how to configure the Alarm (SNMP Trap)
Groups, the Alarm Host Table, and the Syslog features.
●
Bridge Configuration on page 130: Describes how to configure the Spanning Tree
Protocol, Storm Threshold protection, Intra BSS traffic, and Packet Forwarding.
●
RADIUS Profile Configuration on page 133: Describes how to configure RADIUS features
such as RADIUS Access Control and Accounting.
●
Security Configuration on page 140: Describes how to:
- Configure security features such as MAC Access Control, WPA, WEP Encryption, and
802.1x.
- Configure Rogue Access Point Detection (RAD) and define the Scan Interval.
- Configure up to 16 VLAN and SSID pairs, and assign Security and RADIUS Profiles for
each pair.
Issue 2 November 2004
57
Performing Advanced Configuration
Configuring the AP Using the HTTP/HTTPS Interface
Follow these steps to configure an Access Point’s operating settings using the HTTP/HTTPS
interface:
1. Open a Web browser on a network computer.
Note:
Note:
The HTTP interface supports the following Web browser:
- Microsoft Internet Explorer 6 with Service Pack 1 or later
- Netscape 6.1 or later
2. If necessary, disable the Internet proxy settings. For Internet Explorer users, follow these
steps:
a. Select Tools > Internet Options....
b. Click the Connections tab.
c. Click LAN Settings....
d. If necessary, clear the Use a proxy server box.
e. Click OK twice to save your changes and return to Internet Explorer.
3. Enter the Access Point’s IP address in the browser’s Address field and press Enter.
Result: The Enter Network Password screen appears. See Figure 19.
Figure 19: Enter Network Password Screen
58 AP-4, AP-5, and AP-6 User Guide
Configuring the AP Using the HTTP/HTTPS Interface
4. Enter the HTTP password in the Password field and click OK. Leave the User Name field
blank. (By default, the HTTP password is “public”).
Result: The System Status screen appears.
5. Click the Configure button located on the left-hand side of the screen. See Figure 20.
Figure 20: Configure Main Screen
6. Click the tab that corresponds to the parameters you want to configure. For example, click
Network to configure the Access Point’s TCP/IP settings. The parameters contained in
each of the configuration categories are described later in this chapter.
7. Configure the Access Point’s parameters as necessary. After changing a configuration
value, click OK to save the change.
8. Reboot the Access Point for all of the changes to take effect.
Issue 2 November 2004
59
Performing Advanced Configuration
System Configuration
To configure system parameters, use the System tab. Table 6 describes the parameters that
you can configure and view within this tab.
Table 6: System Configuration Parameters
Parameters
Description
Name
The name assigned to the AP. System name must be between 1-31
characters. See Dynamic DNS Support on page 61 and Access Point
System Naming Convention on page 61 for rules on naming the AP.
Location
The location where the AP is installed. Location must be between 1-255
characters.
Contact Name
The name of the person responsible for the AP. Name must be between
1-255 characters.
Contact Email
The email address of the person responsible for the AP. Email must be
between 1-255 characters.
Contact Phone
The telephone number of the person responsible for the AP. Phone
must be between 1-255 characters.
Object ID
This is a read-only field that displays the Access Point’s MIB definition;
this information is useful if you are managing the AP using SNMP.
Ethernet MAC
Address
This is a read-only field that displays the unique MAC (Media Access
Control) address for the Access Point’s Ethernet interface. The MAC
address is assigned at the factory.
Descriptor
This is a read-only field that reports the Access Point’s name, serial
number, current image software version, and current bootloader
software version.
Up Time
This is a read-only field that displays how long the Access Point has
been running since its last reboot.
60 AP-4, AP-5, and AP-6 User Guide
System Configuration
Dynamic DNS Support
DNS is a distributed database that maps the user-readable names and IP addresses (and
more) of every registered system on the Internet. Dynamic DNS is a lightweight mechanism that
allows for modification of the DNS data of host systems whose IP addresses change
dynamically. Dynamic DNS is usually used in conjunction with DHCP for assigning meaningful
names to host systems whose IP addresses change dynamically.
Access Points provide DDNS support by adding the host name (option 12) in DHCP Client
messages. The DHCP server uses this option to dynamically update the DNS server.
Access Point System Naming Convention
The Access Point's system name is used as its host name. To prevent Access Points that have
default configurations from registering similar host names in DNS, the default system name of
the Access Point is uniquely generated. Access Points generate unique system names by
appending the last 3 bytes of the Access Point's MAC address to the default system name.
The system name must be compliant with the encoding rules for host name per DNS RFC 1123.
The DNS host name encoding rules are:
●
Characters must be alphanumeric or hyphen.
●
The name must not start or end with a hyphen.
●
The name must not start with a digit.
●
The number of characters must be 63 or less. (Currently the system name length is limited
to 32 bytes).
Image upgrades can cause the system to boot with an older system name format that is not
DNS compliant. To prevent problems with dynamic DNS after an image upgrade, the system
name is automatically converted to a DNS-compliant system name.
The rules of conversion of older system names are:
●
If the length is greater than 63 then the string is truncated. (This will not happen since the
system name is anyway limited to 31 bytes)
●
All invalid characters at the beginning or end of the string are replaced with the character
'X'.
●
All other invalid characters are replaced with hyphens.
Issue 2 November 2004
61
Performing Advanced Configuration
Network Configuration
To configure network parameters, use the Network tab.This tab consists of three subtabs:
●
IP Configuration
●
DHCP Server Configuration
●
Link Integrity Configuration
IP Configuration
The IP subtab is used to configure the internet (TCP/IP) settings for the access point.
These settings can be either entered manually (static IP address, subnet mask, and gateway IP
address) or obtained automatically (dynamic).
If you prefer to use host names to identify network servers rather than IP addresses, you can
configure the AP to act as a Domain Name Service (DNS) client. When this feature is enabled,
the Access Point contacts the network’s DNS server to translate a host name to the appropriate
network IP address. You can use this DNS Client functionality to identify RADIUS servers by
host name. See RADIUS Profile Configuration on page 133 for details.
Note that Enable DNS Client must be selected before you can configure the other DNS Client
parameters.
Table 7 describes the parameters that you can configure and view on the IP Configuration
screen:
Note:
Note:
You must reboot the Access Point for any changes to these parameters to take
effect.
Table 7: IP Parameters
Parameter
Description
IP Address
Assignment Type
Set this parameter to Dynamic to configure the Access Point as a
Dynamic Host Configuration Protocol (DHCP) client; the Access Point will
obtain IP settings from a network DHCP server automatically during
boot-up. If you do not have a DHCP server or if you want to manually
configure the Access Point’s IP settings, set this parameter to Static.
IP Address
The Access Point’s IP address. When IP Address Assignment Type is
set to Dynamic, this field is read-only and reports the unit’s current IP
address. The Access Point will default to 169.254.128.132 if it cannot
obtain an address from a DHCP server.
1 of 2
62 AP-4, AP-5, and AP-6 User Guide
Network Configuration
Table 7: IP Parameters
Parameter
Description
Subnet Mask
The Access Point’s subnet mask. When IP Address Assignment Type
is set to Dynamic, this field is read-only and reports the unit’s current
subnet mask. The subnet mask will default to 255.255.0.0 if the unit
cannot obtain one from a DHCP server.
Gateway IP
Address
The IP address of the Access Point’s gateway. When IP Address
Assignment Type is set to Dynamic, this field is read-only and reports
the IP address of the unit’s gateway. The gateway IP address will default
to 169.254.128.133 if the unit cannot obtain an address from a DHCP
server.
Enable DNS
Client
If you prefer to use host names to identify network servers rather than IP
addresses, you can configure the AP to act as a Domain Name Service
(DNS) client. When this feature is enabled, the Access Point contacts
the network’s DNS server to translate a host name to the appropriate
network IP address. You can use this DNS Client functionality to identify
RADIUS servers by host name. See RADIUS Profile Configuration on
page 133 for details.
Place a check mark in this box to enable DNS client functionality. Note
that this option must be enabled before you can configure the other DNS
Client parameters.
DNS Primary
Server IP Address
The IP address of the network’s primary DNS server.
DNS Secondary
Server IP Address
The IP address of a second DNS server on the network. The
Access Point will attempt to contact the secondary server if the primary
server is unavailable.
DNS Client
Default Domain
Name
The default domain name for the Access Point’s network (for example,
avaya.com). Contact your network administrator if you need assistance
setting this parameter.
Default TTL (Time
to Live)
Time to Live (TTL) is a field in an IP packet that specifies how long in
seconds the packet can remain active on the network. The Access Point
uses the default TTL for packets it generates for which the transport layer
protocol does not specify a TTL value. This parameter supports a range
from 0 to 65535. By default, TTL is 64.
2 of 2
Issue 2 November 2004
63
Performing Advanced Configuration
DHCP Server Configuration
If your network does not have a DHCP Server, you can configure the AP as a DHCP server to
assign dynamic IP addresses to Ethernet nodes and wireless clients.
To enable and configure the AP as a DHCP server, use the DHCP Server subtab. See
Figure 21.
! CAUTION:
CAUTION:
Make sure there are no other DHCP servers on the network and do not enable
the DHCP server without checking with your network administrator first, as it
could disrupt normal network operation. Also, the AP must be configured with a
static IP address before enabling this feature.
When the DHCP Server functionality is enabled, you can create one or more IP address pools
from which to assign addresses to network devices.
Table 8 describes the parameters that you can configure and view on the DHCP Server subtab.
Note:
Note:
You must reboot the Access Point before changes to any of these DHCP server
parameters take effect
64 AP-4, AP-5, and AP-6 User Guide
Network Configuration
Figure 21: Network Configuration — DHCP Server Subtab
Table 8: DHCP Server Parameters
Parameter
Description
Enable DHCP
Server
Place a check mark in the box provided to enable DHCP Server
functionality.
Note:
Note:
You cannot enable the DHCP Server functionality unless
there is at least one IP Pool Table Entry configured.
Subnet Mask
This field is read-only and reports the Access Point’s current subnet
mask. DHCP clients that receive dynamic addresses from the AP will be
assigned this same subnet mask.
Gateway IP
Address
The AP will assign the specified address to its DHCP clients.
1 of 2
Issue 2 November 2004
65
Performing Advanced Configuration
Table 8: DHCP Server Parameters
Parameter
Description
Primary DNS IP
Address
The AP will assign the specified address to its DHCP clients.
Secondary DNS
IP Address
The AP will assign the specified address to its DHCP clients.
Number of IP
Pool Table Entries
This is a read-only field that reports the number of IP address pools
currently configured.
IP Pool Table
Entry
This entry specifies a range of IP addresses that the AP can assign to its
wireless clients. The maximum number of entries allowed is 20. Click
Add to create a new entry. Click Edit to change an existing entry. Each
entry contains the following fields:
● Start IP Address
● End IP Address
● Default Lease Time (optional): The default time value for clients
to retain the assigned IP address. DHCP automatically renews IP
Addresses without client notification. This parameter supports a
range between 3600 and 86400 seconds. The default is 86400
seconds.
● Maximum Lease Time (optional): The maximum time value for
clients to retain the assigned IP address. DHCP automatically
renews IP Addresses without client notification. This parameter
supports a range between 3600 and 86400 seconds. The default is
86400 seconds.
● Comment (optional)
● Status: IP Pools are enabled upon entry in the table. You can also
disable or delete entries by changing this field’s value.
2 of 2
Link Integrity Configuration
The Link Integrity feature checks the link between the AP and the nodes on the Ethernet
backbone. These nodes are listed by IP address in the Link Integrity IP Address Table. The AP
periodically pings the nodes listed in the table. If the AP loses network connectivity (that is, the
ping attempts fail), the AP disables its wireless interface until the connection is restored. This
forces the unit’s wireless clients to switch to another Access Point that still has a network
connection. Note that this feature does not affect WDS links (if applicable).
To configure and view Link Integrity parameters, use the Link Integrity tab. See Figure 22.
Table 9 describes the parameters that you can configure and view on the Link Integrity tab.
66 AP-4, AP-5, and AP-6 User Guide
Network Configuration
Figure 22: Network Configuration — Link Integrity Subtab
Issue 2 November 2004
67
Performing Advanced Configuration
Table 9: Link Integrity Parameters
Parameter
Description
Enable Link
Integrity
Place a check mark in the box provided to enable Link Integrity.
Poll Interval
(milliseconds)
The interval between link integrity checks. Range is 500 - 15000 ms in
increments of 500 ms; default is 500 ms.
Poll
Retransmissions
The number of times a poll should be retransmitted before the link is
considered down. Range is 0 to 255; default is 5.
Target IP Address
Entry
This entry specifies the IP address of a host on the network that the AP
will periodically poll to confirm connectivity. The table can hold up to five
entries. By default, all five entries are set to 0.0.0.0. Click Edit to update
one or more entries. Each entry contains the following field:
● Target IP Address
● Comment (optional)
● Status: Set this field to Enable to specify that the Access Point
should poll this device. You can also disable an entry by changing
this field’s value to Disable.
Interface Configuration
The Interfaces tab consists of the following subtabs:
●
Operational Mode Configuration
●
Wireless Interface Configuration
●
Ethernet Interface Configuration
From the subtab, you configure the Access Point’s operational mode, wireless interface settings
and Ethernet settings. You can also configure a Wireless Distribution System (WDS) for
AP-to-AP communications. For information on how to configure a WDS, see WDS
Configuration on page 88.
68 AP-4, AP-5, and AP-6 User Guide
Interface Configuration
For the wireless interface configuration, see the wireless parameters below that correspond to
your radio type.
●
Wireless 802.11a Interface Configuration on page 72
●
Wireless 802.11b Interface Configuration on page 77
●
Wireless 802.11b/g Interface Configuration on page 84
●
Wireless 802.11a/g Interface Configuration on page 86
Operational Mode Configuration
Setting the Operational Mode
You can configure and view the following parameter within the Operational Mode screen. See
Figure 23.
●
Operational Mode: the mode of communication between the wireless clients and the
Access Point:
- 802.11b only
- 802.11g only
- 802.11bg
- 802.11a
- 802.11g-wifi
Issue 2 November 2004
69
Performing Advanced Configuration
Figure 23: Operational Mode Subtab
IEEE 802.11d Support for Additional Regulatory Domains
The IEEE 802.11d specification allows conforming equipment to operate in more than one
regulatory domain over time. IEEE 802.11d support allows the AP to broadcast its radio’s
regulatory domain information in its beacon and probe responses to clients. This allows clients
to passively learn what country they are in and only transmit in the allowable spectrum. When a
client enters a regulatory domain, it passively scans to learn at least one valid channel, i.e., a
channel upon which it detects IEEE Standard 802.11 frames.
The beacon frame contains information on the country code, the maximum allowable transmit
power, and the channels to be used for the regulatory domain.
The same information is transmitted in probe response frames in response to a client’s probe
requests. Once the client has acquired the information required to meet the transmit
requirements of the regulatory domain, it configures itself for operation in the regulatory domain.
The Wireless NIC determines the regulatory domain the AP is operating in. Depending on the
regulatory domain, a default country code is chosen that is transmitted in the beacon and probe
response frames.
70 AP-4, AP-5, and AP-6 User Guide
Interface Configuration
Configuring 802.11d Support
Perform the following procedure to enable 802.11d support, and select the country code:
1. Click Configure > Interfaces > Operational Mode.
2. Select Enable 802.11d.
3. Select the Country Code from the ISO/IEC 3166-1 CountryCode drop-down menu.
4. Click OK.
5. Configure Transmit Power Control and transmit power level if required.
TX Power Control
Transmit Power Control uses standard 802.11d frames to control transmit power within an
infrastructure BSS. This method of power control is considered to be an interim way of
controlling the transmit power of 802.11d enabled clients in lieu of implementation of 802.11h.
The Transmit Power Control feature lets the user configure the transmit power level of the
wireless interface at one of four levels:
●
100% of the maximum transmit power level defined by the regulatory domain
●
50%
●
25%
●
12.5%
When Transmit Power Control is enabled, the transmit power level of the card in the AP is set to
the configured transmit power level. The power level is advertised in Beacon and Probe
Response frames as the 802.11d maximum transmit power level.
When an 802.11d-enabled client learns the regulatory domain related information from Beacon
and Probe Response frames, it learns the power level advertised in Beacon and Probe
response frames as the maximum transmit power of the regulatory domain and configures itself
to operate with that power level.
As a result, the transmit power level of the BSS is configured to the power level set in the AP
(assuming that the BSS has only 802.11d enabled clients and an 802.11d enabled AP).
Configuring TX Power Control
To configure TX Power Control:
1. Click Configure > Interfaces > Operational Mode.
2. Select Enable Transmit Power Control.
3. Select the transmit power level for interface A from the Wireless-A: Transmit Power Level
drop-down menu.
4. Click OK.
Issue 2 November 2004
71
Performing Advanced Configuration
Wireless Interface Configuration
From this tab, you can perform:
●
Wireless 802.11a Interface Configuration
●
Wireless 802.11b Interface Configuration
●
Wireless 802.11b/g Interface Configuration
●
Wireless 802.11a/g Interface Configuration
●
WDS Configuration
The following sections describe how to configure these wireless interfaces.
Wireless 802.11a Interface Configuration
To configure wireless interfaces, use the Wireless subtab of the Interfaces tab. See Figure 24.
Table 10 describes the parameters that you can configure and view within the Wireless
Interface Configuration screen for an 802.11a AP:
Note:
Note:
You must reboot the Access Point before any changes to these parameters take
effect.
72 AP-4, AP-5, and AP-6 User Guide
Interface Configuration
Figure 24: Wireless Interface Configuration Screen
Table 10: Wireless 802.11a Parameters
Parameter
Description
Physical Interface
Type
For an 802.11a AP, this field reports: “802.11a (OFDM 5 GHz).” OFDM
stands for Orthogonal Frequency Division Multiplexing; this is the name
for the radio technology used by 802.11a devices.
MAC Address
This is a read-only field that displays the unique MAC (Media Access
Control) address for the Access Point’s wireless interface. The MAC
address is assigned at the factory.
1 of 3
Issue 2 November 2004
73
Performing Advanced Configuration
Table 10: Wireless 802.11a Parameters
Parameter
Description
Regulatory
Domain
Reports the regulatory domain for which the AP is certified. Not all
features or channels are available in all countries. The available
regulatory domains include:
● FCC - U.S./Canada, Mexico, and Australia
● ETSI - Europe and the United Kingdom
● TELEC: Japan
● SG: Singapore
● ASIA: China and South Korea
● TW: Taiwan and Hong Kong
Network Name
(SSID)
Enter a Network Name (between 1 and 32 characters long) for the
wireless network. You must configure each wireless client to use this
name as well.
Auto Channel
Select
The AP scans the area for other Access Points and selects a free or
relatively unused communication channel. This helps prevent
interference problems and increases network performance. By default
this feature is enabled. See 802.11a Channel Frequencies on page 319
for a list of Channels.
Note:
Note:
You cannot disable Auto Channel Select for 802.11a
products in Europe (see Dynamic Frequency Selection
(DFS) on page 75 for details).
Frequency
Channel
When Auto Channel Select is enabled, this field is read-only and displays
the Access Point’s current operating Channel. When Auto Channel
Select is disabled, you can specify the Access Point’s channel. If you
decide to manually set the unit’s Channel, ensure that nearby devices do
not use the same frequency. Available Channels vary based on
regulatory domain. See 802.11a Channel Frequencies on page 319.
Note that you cannot manually set the channel for 802.11a products in
Europe (see Dynamic Frequency Selection (DFS) on page 75 for
details).
Transmit Rate
Use the drop-down menu to select a specific transmit rate for the AP.
Choose a particular rate available for protocol being used or Auto
Fallback. Auto Fallback is the default setting; it allows the AP unit to
select the best transmit rate based on the cell size.
DTIM Period
The Deferred Traffic Indicator Map (DTIM) is used with clients that have
power management enabled. DTIM should be left at 1, the default value,
if any clients have power management enabled. This parameter supports
a range between 1 and 255.
2 of 3
74 AP-4, AP-5, and AP-6 User Guide
Interface Configuration
Table 10: Wireless 802.11a Parameters
Parameter
Description
RTS/CTS Medium
Reservation
This parameter affects message flow control and should not be changed
under normal circumstances. Range is 0 to 2347. When set to a value
between 0 and 2347, the Access Point uses the RTS/CTS mechanism
for packets that are the specified size or greater. When set to 2347 (the
default setting), RTS/CTS is disabled. See RTS/CTS Medium
Reservation on page 75 for more information.
Closed System
Check this box to allow only clients configured with the Access Point’s
specific Network Name to associate with the Access Point. When
enabled, a client configured with the Network Name “ANY” cannot
connect to the AP. This option is disabled by default. See Broadcast
SSID and Closed System on page 163 for more information.
Wireless Service
Status
Select shutdown to shutdown the wireless service on a wireless
interface, or resume to resume wireless service. See Wireless Service
Status on page 76 for more information.
3 of 3
Dynamic Frequency Selection (DFS)
802.11a APs sold in Europe use a technique called Dynamic Frequency Selection (DFS) to
automatically select an operating channel. During boot-up, the AP scans the available
frequency and selects a channel that is free of interference. If the AP subsequently detects
interference on its channel, it automatically reboots and selects another channel that is free of
interference.
DFS only applies to 802.11a APs used in Europe (i.e., units whose regulatory domain is set to
ETSI). The European Telecommunications Standard Institute (ETSI) requires that 802.11a
devices use DFS to prevent interference with radar systems and other devices that already
occupy the 5 GHz band.
If you are using an 802.11a AP in Europe, keep in mind the following:
●
The DFS parameter cannot be configured. It is always enabled and cannot be disabled.
●
You cannot manually select the device’s operating channel; you must let DFS select the
channel.
●
You cannot configure the Auto Channel Select option. Within the HTTP interface, this
option always appears enabled.
RTS/CTS Medium Reservation
The 802.11 standard supports optional RTS/CTS communication based on packet size. Without
RTS/CTS, a sending radio listens to see if another radio is already using the medium before
transmitting a data packet. If the medium is free, the sending radio transmits its packet.
Issue 2 November 2004
75
Performing Advanced Configuration
However, there is no guarantee that another radio is not transmitting a packet at the same time,
causing a collision. This typically occurs when there are hidden nodes (clients that can
communicate with the Access Point but are out of range of each other) in very large cells.
When RTS/CTS occurs, the following occurs:
1. The sending radio first transmits a Request to Send (RTS) packet to confirm that the
medium is clear.
2. When the receiving radio successfully receives the RTS packet, it transmits back a Clear to
Send (CTS) packet to the sending radio.
3. When the sending radio receives the CTS packet, it sends the data packet to the receiving
radio. The RTS and CTS packets contain a reservation time to notify other radios (including
hidden nodes) that the medium is in use for a specified period. This helps to minimize
collisions.
While RTS/CTS adds overhead to the radio network, it is particularly useful for large packets
that take longer to resend after a collision occurs.
RTS/CTS Medium Reservation is an advanced parameter and supports a range between 0 and
2347 bytes. When set to 2347 (the default setting), the RTS/CTS mechanism is disabled. When
set to 0, the RTS/CTS mechanism is used for all packets. When set to a value between 0 and
2347, the Access Point uses the RTS/CTS mechanism for packets that are the specified size or
greater. You should not need to enable this parameter for most networks unless you suspect
that the wireless cell contains hidden nodes.
Wireless Service Status
You can shutdown (or resume) the wireless service on the wireless interface of the AP through
the CLI, HTTP, or SNMP interface. When the wireless service on a wireless interface is
shutdown, the AP will:
Note:
●
Stop the AP services to wireless clients connected on that wireless interface by
disassociating them
●
Disable the associated BSS ports on that interface
●
Disable the transmission and reception of frames on that interface
●
Indicate the wireless service shutdown status of the wireless interface through LED and
traps
●
Enable Ethernet interface so that it can receive a wireless service resume command
through the CLI, HTTP, or SNMP interface
Note:
WSS disables only BSS ports; WDS ports are still operational.
In shutdown state, AP will not transmit and receive frames from the wireless interface and will
stop transmitting periodic beacons. Moreover, none of the frames received from the Ethernet
interface will be forwarded to that wireless interface.
76 AP-4, AP-5, and AP-6 User Guide
Interface Configuration
Wireless service on a wireless interface of the AP can be resumed through the CLI, HTTP, or
SNMP management interface. When wireless service on a wireless interface is resumed, the
AP will:
●
Enable the transmission and reception of frames on that wireless interface
●
Enable the associated BSS port on that interface
●
Start the AP services to wireless clients
●
Indicate the wireless service resume status of the wireless interface through LED and
traps
After wireless service resumes, the AP resumes beaconing, transmitting and receiving frames
to/from the wireless interface and bridging the frames between the Ethernet and the wireless
interface.
Traps Generated During Wireless Service Shutdown (and Resume)
The following traps are generated during wireless service shutdown and resume, and are also
sent to any configured Syslog server.
When the wireless service is shutdown on a wireless interface, the AP generates a trap called
oriTrapWirelessServiceShutdown.
When the wireless service is resumed on a wireless interface, the AP generates a trap called
oriTrapWirelessServiceResumed.
Wireless Interface Activity LED and Wireless Service Shutdown
When the wireless service is shutdown on a wireless interface, the Wireless Interface Activity
LED for that interface changes to an amber color.
When wireless service is resumed on a wireless interface, the Wireless Interface Activity LED
for that interface maintains an OFF state while there is no wireless link activity and changes to
green color when there is wireless link activity.
Wireless 802.11b Interface Configuration
You can configure and view the following parameters within the Wireless Interface Configuration
screen for an 802.11b AP:
Issue 2 November 2004
77
Performing Advanced Configuration
Note:
Note:
You must reboot the Access Point before any changes to these parameters take
effect.
Table 11: Wireless 802.11b Parameters
Parameter
Description
Physical Interface
Type
For 802.11b AP, this field reports: “802.11b (DSSS 2.4 GHz).” DSSS
stands for Direct Sequence Spread Spectrum; this is the name for the
radio technology used by 802.11b devices.
MAC Address
This is a read-only field that displays the unique MAC (Media Access
Control) address for the Access Point’s wireless interface. The MAC
address is assigned at the factory.
Regulatory
Domain
Reports the regulatory domain for which the AP is certified. Not all
features or channels are available in all countries. The available
regulatory domains include:
● FCC - U.S./Canada, Mexico, and Australia
● ETSI - Most of Europe, including the United Kingdom, Ireland,
Singapore, and Hong Kong
● TELEC: Japan
● IL - Israel
Network Name
(SSID)
Enter a Network Name (between 1 and 32 characters long) for the
wireless network. You must configure each wireless client to use this
name as well.
Auto Channel
Select
The AP scans the area for other Access Points and selects a free or
relatively unused communication channel. This helps prevent
interference problems and increases network performance. By default
this feature is enabled; see 802.11b Channel Frequencies on page 321
for a list of Channels. However, if you are setting up a Wireless
Distribution System (WDS), it must be disabled. See WDS
Configuration on page 88 for more information.
Frequency
Channel
When Auto Channel Select is enabled, this field is read-only and displays
the Access Point’s current operating channel. When Auto Channel Select
is disabled, you can specify the Access Point’s operating channel. If you
decide to manually set the unit’s channel, ensure that nearby devices do
not use the same frequency (unless you are setting up a WDS). Available
Channels vary based on regulatory domain. See 802.11b Channel
Frequencies on page 321.
1 of 3
78 AP-4, AP-5, and AP-6 User Guide
Interface Configuration
Table 11: Wireless 802.11b Parameters
Parameter
Description
Distance Between
APs
Set to Large, Medium, Small, Microcell, or Minicell depending on the
site survey for your system. By default, this parameter is set to Large.
The distance value is related to the Multicast Rate (described next). In
general, a larger distance between APs means that your clients operate a
slower data rates (on average). This feature is available only if you are
using an Orinoco Classic Gold client card or Avaya Gold client card. See
Distance Between APs on page 81 for more information.
Multicast Rate
Sets the rate at which Multicast messages are sent. This value is related
to the Distance Between APs parameter (described previously). The table
below displays the possible Multicast Rates based on the Distance
between APs setting. By default, this parameter is set to 2 Mbits/sec. This
feature is available only if you are using an Orinoco Classic Gold client
card or Avaya Gold client card. See Multicast Rate on page 82 for more
information.
Distance between
APs
Multicast Rate
Large
1 and 2 Mbits/sec
Medium
1, 2, and 5.5 Mbits/sec
Small
1, 2, 5.5 and 11 Mbits/
sec
Minicell
1, 2, 5.5 and 11 Mbits/
sec
Microcell
1, 2, 5.5 and 11 Mbits/
sec
DTIM Period
The Deferred Traffic Indicator Map (DTIM) is used with clients that have
power management enabled. DTIM should be left at 1, the default value,
if any clients have power management enabled. This parameter supports
a range between 1 and 255.
RTS/CTS Medium
Reservation
This parameter affects message flow control and should not be changed
under normal circumstances. Range is 0 to 2347. When set to a value
between 0 and 2347, the Access Point uses the RTS/CTS mechanism for
packets that are the specified size or greater. When set to 2347 (the
default setting), RTS/CTS is disabled. See RTS/CTS Medium
Reservation on page 75 for more information.
2 of 3
Issue 2 November 2004
79
Performing Advanced Configuration
Table 11: Wireless 802.11b Parameters
Parameter
Description
Interference
Robustness
Enable this option if other electrical devices in the 2.4 GHz frequency
band (such as a microwave oven or a cordless phone) may be interfering
with the wireless signal. The AP will automatically fragment large packets
into multiple smaller packets when interference is detected to increase
the likelihood that the messages will be received in the presence of
interference. The receiving radio reassembles the original packet once all
fragments have been received. This feature is available only if you are
using an Orinoco Classic Gold client card or Avaya Gold client card. This
option is disabled by default.
Closed System
Check this box to allow only clients configured with the Access Point’s
specific Network Name to associate with the Access Point. When
enabled, a client configured with the Network Name “ANY” cannot
connect to the AP. This option is disabled by default. See Broadcast SSID
and Closed System on page 163 for more information.
Wireless Service
Status
Select shutdown to shutdown the wireless service on a wireless
interface, or resume to resume wireless service. See Wireless Service
Status on page 76 for more information.
Load Balancing
Enable this option so clients can evaluate which Access Point to
associate with, based on current AP loads. This feature is enabled by
default; it helps distribute the wireless load between APs. This feature is
not available if you are using an Avaya 802.11a/b Card or a non-Avaya
Wireless client with the AP.
Medium Density
Distribution
When enabled, the Access Point automatically notifies wireless clients of
its Distance Between APs, Interference Robustness, and RTS/CTS
Medium Reservation settings. This feature is enabled by default and
allows clients to automatically adopt the values used by its current
Access Point (even if these values differ from the client’s default values or
from the values supported by other Access Points).
Note:
Note:
This feature is available only if you are using an
ORiNOCO Orinoco Classic Gold client card or an Avaya
Gold client card. Avaya recommends that you leave this
parameter enabled, particularly if you have Avaya
Wireless clients on your wireless network (leaving this
parameter enabled should not adversely affect the
performance of any Avaya 802.11a/b Cards or non-Avaya
Wireless cards on your network).
3 of 3
80 AP-4, AP-5, and AP-6 User Guide
Interface Configuration
Distance Between APs
Distance Between APs defines how far apart (physically) your AP devices are located, which in
turn determines the size of your cell. Cells of different sizes have different capacities and,
therefore, suit different applications. For instance, a typical office has many stations that require
high bandwidth for complex, high-speed data processing. In contrast, a typical warehouse has a
few forklifts requiring low bandwidth for simple transactions.
Note:
Note:
This feature is available only if you are using an Orinoco Classic Gold client card
or Avaya Gold client card.
Cell capacities are compared in Table 12, which shows that small cells suit most offices and
large cells suit most warehouses:
Table 12: Cell Capacity Comparison
Small Cell
Large Cell
Physically accommodates few stations
Physically accommodates many stations
High cell bandwidth per station
Lower cell bandwidth per station
High transmit rate
Lower transmit rate
Coverage
The number of Access Points in a set area determines the network coverage for that area. A
large number of Access Points covering a small area is a high-density cell. A few Access Points,
or even a single unit, covering the same small area would result in a low-density cell, even
though in both cases the actual area did not change — only the number of Access Points
covering the area changed.
In a typical office, a high density area consists of a number of Access Points installed every 20
feet and each Access Point generates a small radio cell with a diameter of about 10 feet. In
contrast, a typical warehouse might have a low density area consisting of large cells (with a
diameter of about 90 feet) and Access Points installed every 200 feet. See Figure 25.
Issue 2 November 2004
81
Performing Advanced Configuration
Figure 25: Low Density vs. Ultra High Density Network
The Distance Between Cells parameter supports five values: Large, Medium, Small, Minicell,
and Microcell.
! CAUTION:
CAUTION:
The distance between APs should not be approximated. It is calculated by means
of a manual Site Survey, in which an AP is set up and clients are tested
throughout the area to determine signal strength and coverage, and local limits
such as physical interference are investigated. From these measurements the
appropriate cell size and density is determined, and the optimum distance
between APs is calculated to suit your particular business requirements. Contact
your reseller for information on how to conduct a Site Survey.
Multicast Rate
The multicast rate determines the rate at which broadcast and multicast packets are transmitted
by the Access Point to the wireless network. Stations that are closer to the Access Point can
receive multicast packets at a faster data rate than stations that are farther away from the AP.
You should set the Multicast Rate based on the size of the Access Point’s cell.
If the Access Point’s cell is very small (for example, Distance Between APs is set to Microcell),
you can expect that all stations should be able to successfully receive multicast packets at 11
MBits/sec so you can set Multicast Rate to 11 Mbits/sec. However, if the Access Point’s cell is
large, you need to accommodate stations that may not be able to receive multicast packets at
the higher rates; in this case, you should set Multicast Rate to 1 or 2 Mbits/sec. See Figure 26.
82 AP-4, AP-5, and AP-6 User Guide
Interface Configuration
Figure 26: 1 Mbits/s and 11 Mbits/s Multicast Rates
Note:
Note:
There is an interdependent relationship between the Distance between APs and
the Multicast Rate. In general, larger systems operate at a lower average
transmit rate. The variation between Multicast Rate and Distance Between APs is
presented in Table 13.
Table 13: Distance between APs and Multicast Rate Relationship
1.0 Mbit/s
2.0 Mbits/s
5.5 Mbits/s
11 Mbits/s
Large
yes
yes
Medium
yes
yes
yes
Small
yes
yes
yes
yes
Minicell
yes
yes
yes
yes
Microcell
yes
yes
yes
yes
The Distance Between APs must be set before the Multicast Rate, because when you select the
Distance Between APs, the appropriate range of Multicast values automatically populates the
drop-down menu.This feature is not available if you are using an Avaya 802.11a/b Card or a
non-Avaya Wireless client with the AP.
Issue 2 November 2004
83
Performing Advanced Configuration
Wireless 802.11b/g Interface Configuration
You can configure the following radio parameters for an 802.11b/g AP:
Note:
Note:
You must reboot the Access Point before any changes to these parameters take
effect.
Table 14: Wireless 802.11b/g Parameters
Parameter
Description
Operational Mode
An 802.11b/g wireless interface can be configured to operate in the
following modes:
● 802.11b mode only: The radio uses the 802.11b standard only.
● 802.11g mode only: The radio is optimized to communicate with
802.11g devices. This setting will provide the best results if this
radio interface will only communicate with 802.11g devices.
● 802.11b/g mode: This is the default mode. Use this mode if you
want to support a mix of 802.11b and 802.11g devices.
● 802.11g-wifi: This mode was developed for Wi-Fi compliance
testing purposes. It is similar to 802.11g only mode.
In general, you should use either 802.11g only mode (if you want to
support 802.11g devices only) or 802.11b/g mode to support a mix of
802.11b and 802.11g devices.
Physical Interface
Type
Depending on the Operational Mode, this field reports:
MAC Address
This is a read-only field that displays the unique MAC (Media Access
Control) address for the Access Point’s wireless interface. The MAC
address is assigned at the factory.
Regulatory
Domain
Reports the regulatory domain for which the AP is certified. Not all
features or channels are available in all countries. The available
regulatory domains include:
● FCC - U.S./Canada, Mexico, and Australia
● ETSI - Europe, including the United Kingdom
● TELEC - Japan
● IL - Israel
Network Name
(SSID)
Enter a Network Name (between 1 and 32 characters long) for the
wireless network. You must configure each wireless client to use this
name as well.
OFDM stands for Orthogonal Frequency Division Multiplexing; this is the
name for the radio technology used by 802.11a devices. DSSS stands for
Direct Sequence Spread Spectrum; this is the name for the radio
technology used by 802.11b devices.
1 of 2
84 AP-4, AP-5, and AP-6 User Guide
Interface Configuration
Table 14: Wireless 802.11b/g Parameters
Parameter
Description
Auto Channel
Select
The AP scans the area for other Access Points and selects a free or
relatively unused communication channel. This helps prevent interference
problems and increases network performance. By default this feature is
enabled; see 802.11g Channel Frequencies on page 322 for a list of
Channels.
Frequency
Channel
When Auto Channel Select is enabled, this field is read-only and displays
the Access Point’s current operating channel. When Auto Channel Select
is disabled, you can specify the Access Point’s operating channel. If you
decide to manually set the unit’s channel, ensure that nearby devices do
not use the same frequency (unless you are setting up a WDS). Available
Channels vary based on regulatory domain. See 802.11g Channel
Frequencies on page 322.
Transmit Rate
Select a specific transmit rate for the AP. The values available depend on
the Operational Mode. Auto Fallback is the default setting; it allows the
AP to select the best transmit rate based on the cell size.
DTIM Period
The Deferred Traffic Indicator Map (DTIM) is used with clients that have
power management enabled. DTIM should be left at 1, the default value,
if any clients have power management enabled. This parameter supports
a range between 1 and 255.
RTS/CTS Medium
Reservation
This parameter affects message flow control and should not be changed
under normal circumstances. Range is 0 to 2347. When set to a value
between 0 and 2347, the Access Point uses the RTS/CTS mechanism for
packets that are the specified size or greater. When set to 2347 (the
default setting), RTS/CTS is disabled.
See RTS/CTS Medium Reservation on page 75 for more information.
Closed System
Check this box to allow only clients configured with the Access Point’s
specific Network Name to associate with the Access Point. When
enabled, a client configured with the Network Name ANY cannot connect
to the AP. This option is disabled by default. See Broadcast SSID and
Closed System on page 163 for more information.
2 of 2
Issue 2 November 2004
85
Performing Advanced Configuration
Wireless 802.11a/g Interface Configuration
You can configure and view the following parameters within the Wireless Interface Configuration
screen for an 802.11a/g AP:
Note:
Note:
You must reboot the Access Point for any changes to these parameters to take
effect.
Table 15: Wireless 802.11a/g Parameters
Parameter
Description
Operational Mode
An 802.11a/g wireless interface can be configured to operate in the
following modes:
● 802.11b mode only: The radio uses the 802.11b standard only.
● 802.11g mode only: The radio is optimized to communicate with
802.11g devices. This setting will provide the best results if this
radio interface will only communicate with 802.11g devices.
● 802.11a mode only: The radio uses the 802.11a standard only.
● 802.11b/g mode: This is the default mode. Use this mode if you
want to support a mix of 802.11b and 802.11g devices.
● 802.11g-wifi: This mode was developed for Wi-Fi compliance
testing purposes. It is similar to 802.11g only mode.
In general, you should use either 802.11g only mode (if you want to
support 802.11g devices only) or 802.11b/g mode to support a mix of
802.11b and 802.11g devices.
Physical Interface
Type
Depending on the Operational Mode, this field reports:
MAC Address
This is a read-only field that displays the unique MAC (Media Access
Control) address for the Access Point’s wireless interface. The MAC
address is assigned at the factory.
OFDM stands for Orthogonal Frequency Division Multiplexing; this is the
name for the radio technology used by 802.11a devices. DSSS stands for
Direct Sequence Spread Spectrum; this is the name for the radio
technology used by 802.11b devices.
1 of 3
86 AP-4, AP-5, and AP-6 User Guide
Interface Configuration
Table 15: Wireless 802.11a/g Parameters
Parameter
Description
Regulatory
Domain
Reports the regulatory domain for which the AP is certified. Not all
features or channels are available in all countries. The available
regulatory domains include:
●
FCC - U.S./Canada, Mexico, and Australia
●
ETSI - Europe, including the United Kingdom
●
TELEC: Japan
●
SG: Singapore
●
ASIA: China and South Korea
●
TW: Taiwan and Hong Kong
Network Name
(SSID)
Enter a Network Name (between 1 and 32 characters long) for the
wireless network. You must configure each wireless client to use this
name as well.
Auto Channel
Select
The AP scans the area for other Access Points and selects a free or
relatively unused communication channel. This helps prevent
interference problems and increases network performance. By default
this feature is enabled. See 802.11a Channel Frequencies on page 319
and 802.11g Channel Frequencies on page 322 for a list of Channels.
Note:
You cannot disable Auto Channel Select for 802.11a
products in Europe (see Dynamic Frequency Selection
(DFS) on page 75 for details).
Note:
Frequency
Channel
●
When Auto Channel Select is enabled, this field is read-only and
displays the Access Point’s current operating channel.
●
When Auto Channel Select is disabled, you can specify the
Access Point’s channel.
If you decide to manually set the unit’s channel, ensure that nearby
devices do not use the same frequency. Available Channels vary based
on regulatory domain. See 802.11a Channel Frequencies on page 319
and 802.11g Channel Frequencies on page 322.
Note:
Note:
You cannot manually set the channel for 802.11a
products in Europe (see Dynamic Frequency Selection
(DFS) on page 75 for details).
2 of 3
Issue 2 November 2004
87
Performing Advanced Configuration
Table 15: Wireless 802.11a/g Parameters
Parameter
Description
Transmit Rate
Select a specific transmit rate for the AP. The values available depend on
the Operational Mode. Auto Fallback is the default setting; it allows the
AP to select the best transmit rate based on the cell size. Use the
drop-down menu to select a specific transmit rate for the AP.
● For 802.11b only -- Auto Fallback, 1, 2, 5.5, 11 Mbits/sec
● For 802.11g only -- Auto Fallback, 6, 9, 12, 18, 24, 36, 48, 54
Mbits/sec
● For 802.11b/g and 802.11g-wifi -- Auto Fallback, 1, 2, 5.5, 6, 9, 11,
12, 18, 24, 36, 48, 54 Mbits/sec
● For 802.11a only -- Auto Fallback, 6, 9, 12, 18, 24, 36, 48, 54
Mbits/s. Auto Fallback is the default setting; it allows the AP unit to
select the best transmit rate based on the cell size.
DTIM Period
The Deferred Traffic Indicator Map (DTIM) is used with clients that have
power management enabled. DTIM should be left at 1, the default value,
if any clients have power management enabled. This parameter supports
a range between 1 and 255.
RTS/CTS Medium
Reservation
This parameter affects message flow control and should not be changed
under normal circumstances. Range is 0 to 2347. When set to a value
between 0 and 2347, the Access Point uses the RTS/CTS mechanism for
packets that are the specified size or greater. When set to 2347 (the
default setting), RTS/CTS is disabled. See RTS/CTS Medium
Reservation on page 75 for more information.
Closed System
Check this box to allow only clients configured with the Access Point’s
specific Network Name to associate with the Access Point. When
enabled, a client configured with the Network Name ANY cannot connect
to the AP. This option is disabled by default.
3 of 3
WDS Configuration
A Wireless Distribution System (WDS) creates a link between two 802.11a, 802.11b, or
802.11b/g APs over their radio interfaces. This link relays traffic from one AP that does not have
Ethernet connectivity to a second AP that has Ethernet connectivity. WDS allows you to
configure up to six (6) point-to-point links between Access Points.
In the Figure 27, AP 1 and AP 2 communicate over a WDS link (represented by the blue line).
This link provides Client 1 with access to network resources even though AP 1 is not directly
connected to the Ethernet network. Packets destined for or sent by the client are relayed
between the Access Points over the WDS link.
88 AP-4, AP-5, and AP-6 User Guide
Interface Configuration
Figure 27: WDS Example
AP 2
AP 1
Client 1
Client 2
Bridging WDS
Each WDS link is mapped to a logical WDS port on the AP. WDS ports behave like Ethernet
ports rather than like standard wireless interfaces: on a BSS port, an Access Point learns by
association and from frames; on a WDS or Ethernet port, an Access Point learns from frames
only. When setting up a WDS, keep in mind the following:
●
The WDS link shares the communication bandwidth with the clients. Therefore, while the
maximum data rate for the Access Point’s cell is still 11 Mb, client throughput will decrease
when the WDS link is active.
●
If there is no partner MAC address configured in the WDS table, the WDS port remains
disabled.
●
Each WDS port on a single AP should have a unique partner MAC address. Do not enter
the same MAC address twice in an AP’s WDS port list.
●
Each Access Point that is a member of the WDS must have the same Channel setting to
communicate with each other.
●
Each Access Point that is a member of the WDS must have the same network domain.
●
Each Access Point that is a member of the WDS must have the same WEP Encryption
settings. WDS does not use 802.1x. Therefore, if you want to encrypt the WDS link, you
Issue 2 November 2004
89
Performing Advanced Configuration
must configure each Access Point to use WEP encryption, and each Access Point must
have the same Encryption Key(s). See Security Configuration on page 140.
●
If your network does not support spanning tree, be careful to avoid creating network loops
between APs. For example, creating a WDS link between two Access Points connected to
the same Ethernet network will create a network loop (if spanning tree is disabled). For
more information, see Spanning Tree on page 131.
WDS Setup Procedure
Note:
Note:
Note:
You must disable Auto Channel Select to create a WDS. Each Access Point that
is a member of the WDS must have the same Channel setting to communicate
with each other.
Note:
For radio cards that belong to the ETSI regulatory domain, ACS is enabled by
default, and cannot be disabled. Therefore, it is not possible to set up a WDS link.
This only applies to ETSI 802.11a wireless radios.
To setup a wireless backbone follow the steps below for each AP that you want to include in the
Wireless Distribution System:
1. Confirm that Auto Channel Select is disabled.
2. Write down the MAC Address of the radio that you wish to include in the Wireless
Distribution System.
3. Click Interfaces > Wireless.
4. Scroll down to the Wireless Distribution System heading. See Figure 28.
90 AP-4, AP-5, and AP-6 User Guide
Interface Configuration
Figure 28: WDS Configuration
5. Click the Edit button to update the Wireless Distribution System (WDS) Table. The WDS
Configuration screen will be displayed. See Figure 29.
Issue 2 November 2004
91
Performing Advanced Configuration
Figure 29: WDS Configuration Screen
6. If desired, enable security by checking the Enable WDS Security Mode box.
7. If security mode is enabled, enter a value for Encryption Key 0.
8. Click OK.
9. Enter the MAC Address that you wrote down in Step 2 in one of the Partner MAC Address
fields of the Wireless Distribution Setup window.
10. Set the Status of the device to Enable.
11. Click OK.
12. Reboot the AP.
92 AP-4, AP-5, and AP-6 User Guide
Management Configuration
Ethernet Interface Configuration
Select the desired speed and transmission mode from the drop-down menu. Half-duplex means
that only one side can transmit at a time and full-duplex allows both sides to transmit. When set
to auto-duplex, the AP negotiates with its switch or hub to automatically select the highest
throughput option supported by both sides.
For best results, Avaya recommends that you configure the Ethernet setting to match the speed
and transmission mode of the device the Access Point is connected to (such as a hub or
switch). If in doubt, leave this setting at its default, auto-speed-auto-duplex. Choose between:
●
10 Mbit/s - half duplex, full duplex, or auto duplex
●
100 Mbit/s - half duplex or full duplex
●
auto speed - half duplex or auto duplex
Management Configuration
From the Management tab, you can configure the Access Point’s management Passwords, IP
Access Table, and Services such as configuring secure or restricted access to the AP via
SNMPv3, HTTPS, or CLI. The Management tab contains five subtabs.
●
Password Configuration on page 94
●
IP Access Table Configuration on page 95
●
Services Configuration on page 96
●
Automatic Configuration on page 105
●
Hardware Configuration Reset on page 109
Issue 2 November 2004
93
Performing Advanced Configuration
Password Configuration
You can configure the following passwords:
Table 16: System Passwords
Type
Description
SNMP Read
Community
Password
For read access to the AP using SNMP. Enter a password in both the
Password field and the Confirm field. This password must be between
6 and 32 characters. The default password is “public”.
SNMP Read/Write
Community
Password
For read and write access to the AP using SNMP. Enter a password in
both the Password field and the Confirm field. This password must be
between 6 and 32 characters. The default password is “public”.
SNMPv3
Authentication
Password
For sending authenticated SNMPv3 messages. Enter a password in
both the Password field and the Confirm field. This password must be
between 6 and 32 characters, but a length of at least at least 8
characters is recommended. The default password is “public”. Secure
Management (Services tab) must be enabled to configure SNMPv3.
The default SNMPv3 username is administrator, with SHA
authentication, and DES privacy protocol.
SNMPv3 Privacy
Password
For sending encrypted SNMPv3 data. Enter a password in both the
Password field and the Confirm field. This password must be between
6 and 32 characters, but a length of at least at least 8 characters is
recommended. The default password is “public”. Secure Management
(Services tab) must be enabled to configure SNMPv3.
Telnet (CLI)
Password
For the CLI interface (via serial or Telnet). Enter a password in both the
Password field and the Confirm field. This password must be between
6 and 32 characters. The default password is “public”.
HTTP (Web)
Password
For the Web browser HTTP interface. Enter a password in both the
Password field and the Confirm field. This password must be between
6 and 32 characters. The default password is “public”.
Note:
Note:
For security purposes Avaya recommends changing ALL PASSWORDS from
the default “public” immediately, to restrict access to your network devices to
authorized personnel. If you lose or forget your password settings, you can
always perform the Reset to Factory Default Procedure on page 201.
94 AP-4, AP-5, and AP-6 User Guide
Management Configuration
IP Access Table Configuration
The Management IP Access table limits in-band management access to the IP addresses or
range of IP addresses specified in the table. This feature applies to all management options
(SNMP, HTTP, and CLI) except for CLI management over the serial port. To configure this table,
click Add and set the parameters described in Table 17.
Table 17: IP Access Table Parameters
Parameter
Description
IP Address
Enter the IP Address for the management station.
IP Mask
Enter a mask that will act as a filter to limit access to a range of IP Addresses
based on the IP Address you already entered.
The IP mask 255.255.255.255 would authorize the single station defined by
the IP Address to configure the Access Point. The AP would ignore
commands from any other IP address. In contrast, the IP mask
255.255.255.0 would allow any device that shares the first three octets of
the IP address to configure the AP. For example, if you enter an IP address
of 10.20.30.1 with a 255.255.255.0 subnet mask, any IP address between
10.20.30.1 and 10.20.30.254 will have access to the AP’s management
interfaces.
Comment
Enter an optional comment, such as the station name.
To edit or delete an entry, click Edit. Edit the information, or select Enable, Disable, or Delete
from the Status field.
Issue 2 November 2004
95
Performing Advanced Configuration
Services Configuration
You can configure the following management services:
Note:
●
Secure Management on page 98
●
SNMP Access on page 98
●
HTTP Access on page 98
●
HTTPS Access (SSL) on page 99
●
Telnet Access on page 100
●
SSH Access on page 100
●
Serial Port Access on page 103
●
RADIUS-Based Access on page 104
●
Automatic Configuration on page 105
Note:
You must reboot the Access Point if you change the HTTP Port or Telnet Port.
Figure 30 shows the Management Services Configuration Screen.
96 AP-4, AP-5, and AP-6 User Guide
Management Configuration
Figure 30: Management Services Configuration Screen
Issue 2 November 2004
97
Performing Advanced Configuration
Secure Management
Secure Management allows the use of encrypted and authenticated communication protocols
such as SNMPv3, and Secure Socket Link (SSL), to manage the Access Point.
Table 18 describes the Secure Management parameter.
Table 18: Secure Management Parameter
Setting
Description
Secure
Management
Status
Enables the further configuration of HTTPS Access, and SNMPv3.
After enabling Secure Management, you can choose to configure
HTTPS (SSL) access on the Services tab, and configure SNMPv3
passwords on the Passwords tab.
SNMP Access
Table 19 describes the SNMP parameter.
Table 19: SNMP Parameter
Setting
Description
SNMP Interface
Bitmask
Configure the interface or interfaces (Ethernet, Wireless, All
Interfaces) from which you will manage the AP via SNMP. Select
Disabled to prevent a user from accessing the AP via SNMP.
HTTP Access
Table 20 describes the HTTP Access parameters.
Table 20: HTTP Parameters
Setting
Description
HTTP Interface
Bitmask
Configure the interface or interfaces (Ethernet, Wireless, All
Interfaces) from which you will manage the AP via the Web interface.
For example, to allow Web configuration via the Ethernet network only,
set this field to Ethernet. Select Disabled to prevent a user from
accessing the AP from the Web interface.
1 of 2
98 AP-4, AP-5, and AP-6 User Guide
Management Configuration
Table 20: HTTP Parameters
Setting
Description
HTTP Port
Configure the HTTP port from which you will manage the AP via the
Web interface. By default, the HTTP port is 80.
You must reboot the Access Point if you change the HTTP Port.
HTTP Setup
Wizard
The Setup Wizard appears automatically the first time you access the
HTTP interface. If you exited out of the Setup Wizard and want to
relaunch it, enable this option, click OK, and then close your browser or
reboot the AP. The Setup Wizard will appear the next time you access
the HTTP interface.
2 of 2
HTTPS Access (SSL)
You can access the AP in a secure fashion by using Secure Socket Layer (SSL) over port 443.
The AP comes preinstalled with all required SSL files: a default certificate and private key.
The AP supports SSLv3 with a 128-bit encryption certificate maintained by the AP for secure
communications between the AP and the HTTP client. All communications are encrypted using
the server and the client-side certificate.
If you upload a new certificate and private key (by using TFTP or HTTP File Transfer), you must
change the SSL Certificate passphrase for the new SSL files.
Note:
Note:
SSL requires Internet Explorer version 6, 128 bit encryption, Service Pack 1, and
patch Q323308.
Table 21 describes the HTTPS parameters.
Table 21: HTTPS Parameters
Parameter
Description
HTTPS
(Secure
Web)
Check this box to enable SSL on the AP
Note:
SSL
Certificate
Passphrase
Note:
You need to reboot the AP after enabling or disabling SSL for the
changes to take effect.
Specifies the SSL passphrase to use if HTTPS (Secure Web) has been checked.
After enabling Secure Socket Layer (SSL), the only parameter that you can configure
is the SSL passphrase. The default SSL passphrase is proxim.
If you upload a new certificate and private key (by using TFTP or HTTP File Transfer),
you must change the SSL Certificate passphrase for the new SSL files.
Issue 2 November 2004
99
Performing Advanced Configuration
Accessing the AP through the HTTPS interface
You should use an SSL intelligent browser to access the AP through the HTTPS interface. After
configuring SSL, access the AP using https:// followed by the AP’s management IP address.
Telnet Access
Table 22 describes the Telnet parameters.
Table 22: Telnet Parameters
Setting
Description
Telnet Interface
Bitmask
Select the interface (Ethernet, Wireless, All Interfaces) from which
you can manage the AP via telnet. This parameter can also be used to
Disable telnet management.
Telnet Port
The default port number for Telnet applications is 23. However, you can
use this field if you want to change the Telnet port for security reasons
(but your Telnet application also must support the new port number you
select).
You must reboot the Access Point if you change the Telnet Port.
Login Idle Timeout
(seconds)
Enter the number of seconds the system will wait for a login attempt.
The AP terminates the session when it times out. The range is 1 to 300
seconds; the default is 30 seconds.
Session Idle
Timeout (seconds)
Enter the number of seconds the system will wait during a session while
there is no activity. The AP will terminate the session on timeout. The
range is 1 to 36000 seconds; the default is 900 seconds.
SSH Access
The AP supports Secure Shell (SSH) version 2, for secure remote CLI (Telnet) sessions. SSH
provides strong authentication and encryption of session data.
The SSH server (AP) has host keys - a pair of asymmetric keys - a private key that resides on
the AP and a public key that is distributed to clients that need to connect to the AP. As the client
has knowledge of the server host keys, the client can verify that it is communicating with the
correct SSH server. The client authentication can be performed in two ways:
●
Using asymmetric keys. This method requires all the client keys to be installed on the AP.
●
Using a username/password pair to authenticate the user over a secure channel created
using SSH.
100 AP-4, AP-5, and AP-6 User Guide
Management Configuration
SSH Session Setup
An SSH session is setup through the following process:
1. The SSH server public key is transferred to the client using out-of-band or in-band
mechanisms.
2. The SSH client verifies the correctness of the server using the server’s public key.
3. The user/client authenticates to the server.
4. An encrypted data session starts. The maximum number of SSH sessions is limited to two.
If there is no activity for a specified amount of time (the Telnet Session Timeout parameter),
the AP will time out the connection.
SSH Clients
Table 23 lists the SSH clients that have been verified to interoperate with the AP’s server. The
table lists the clients, version number, and the Web site of the client.
Table 23: Supported SSH Clients
Client
Version
Web Site
OpenSSH
V3.4-2
http://www.openssh.com
Putty
Rel 0.53b
http://www.chiark.greenend.org.uk
Zoc
5.00
http://www.emtec.com
Axessh
V2.5
http://www.labf.com
For key generation, OpenSSH client has been verified.
Configuring SSH
Perform the following procedure to enable or disable SSH and set the SSH host key:
1. Click Configure > Management > Services.
2. To enable SSH, select Enable in the SSH (Secure Shell) Status field.
Note:
Note:
When Secure Management is enabled on the AP, SSH will be enabled by default
and cannot be disabled.
3. Select the SSH Host Key Status from the drop-down menu.
Host keys must either be generated externally and uploaded to the AP (see Uploading
Externally Generated Host Keys), generated manually, or auto-generated at the time of SSH
initialization if SSH is enabled and no host keys are present. There is no key present in an AP
that is in a factory default state.
Issue 2 November 2004
101
Performing Advanced Configuration
Manually Generating or Deleting Host Keys
To manually generate or delete host keys on the AP:
●
Select Create to generate a new pair of host keys.
●
Select Delete to remove the host keys from the AP. If no host keys are present, the AP will
not allows connections using SSH. When host keys are created or deleted, the AP
updates the fingerprint information displayed on the Management -> Services page.
! CAUTION:
CAUTION:
SSH Host key creation may take 3 to 4 minutes during which time the AP may not
respond.
Uploading Externally Generated Host Keys
Perform the following procedure to upload externally generated host keys to the AP. You must
upload both the SSH public key and SSH private key for SSH to work.
1. Verify that the host keys have been externally generated. The OpenSSH client has been
verified to interoperate with AP’s SSH server.
2. Click Commands > Update AP > via HTTP (or via TFTP). See Figure 31.
Figure 31: Uploading an Externally Generated SSH Public Key and SSH Private Key
3. Select SSH Public Key from the File Type drop-down menu.
4. Click Browse, select the SSH Public Key file on your local machine.
102 AP-4, AP-5, and AP-6 User Guide
Management Configuration
5. Click Open.
6. To initiate the file transfer, click the Update AP button.
7. Select SSH Private Key from the File Type drop-down menu.
8. Click Browse, select the SSH Private Key on your local machine.
9. Click Open.
10. To initiate the file transfer, click the Update AP button.
The fingerprint of the new SSH public key will be displayed in the Management -> Services
page.
Serial Port Access
The serial port interface on the AP is enabled at all times. See Setting IP Address using Serial
Port on page 206 for information on how to access the CLI interface via the serial port. You can
configure and view the parameters that are described in Table 24.
Table 24: Serial Port Parameters
Parameter
Description
Serial Baud Rate
Select the serial port speed (bits per second). Choose between 2400,
4800, 9600, 19200, 38400, or 57600; the default Baud Rate is 9600.
Serial Flow Control
Select either None (default) or Xon/Xoff (software controlled) data flow
control.
Note:
Note:
To avoid potential problems when communicating with
the AP through the serial port, Avaya recommends that
you leave the Flow Control setting at None (the default
value).
Serial Data Bits
This is a read-only field and displays the number of data bits used in
serial communication (8 data bits by default).
Serial Parity
This is a read-only field and displays the number of parity bits used in
serial communication (no parity bits by default).
Serial Stop Bits
This is a read-only field that displays the number of stop bits used in
serial communication (1 stop bit by default).
Note:
Note:
The serial port bit configuration is commonly referred to
as 8N1.
Issue 2 November 2004
103
Performing Advanced Configuration
RADIUS-Based Access
User management of APs can be centralized by using a RADIUS server to store user
credentials. The AP cross-checks credentials using RADIUS protocol and the RADIUS server
accepts or rejects the user.
HTTP/HTTPS and Telnet/SSH users can be managed with RADIUS. Serial CLI and SNMP
cannot be managed by RADIUS. Two types of users can be supported using centralized
RADIUS management:
●
Super User: The super user has access to all functionality of a management interface. A
super user is configured in the RADIUS server by setting the filter ID attribute (returned in
the RADIUS Accept packet) for the user to a value of super user (not case sensitive). A
user is considered a super user if the value of the filter-id attribute returned in the RADIUS
Accept packet for the user is super user (not case sensitive).
●
Limited User: A limited user has access to only a limited set of functionality on a
management interface. All users who are not super users are considered limited users.
However, a limited user is configured in the RADIUS server by setting the filter-id attribute
(returned in the RADIUS Accept packet) to limited user (not case sensitive). Limited users
do not have access to the following configuration capabilities:
- Update/retrieve files to and from APs
- Reset the AP to factory defaults
- Reboot the AP
- Change management properties related to RADIUS, management modes, and
management passwords.
When RADIUS Based Management is enabled, a local user can be configured to provide
Telnet, SSH, and HTTP(S) access to the AP when RADIUS servers fail. The local user has
super user capabilities. When secure management is enabled, the local user can only login
using secure means (i.e., SSH or SSL). When the local user option is disabled the only access
to the AP when RADIUS servers are down will be through serial CLI or SNMP.
The Radius Based Management Access parameters allows you to enable HTTP or Telnet
Radius Management Access, to configure a RADIUS Profile for management access control,
and to enable or disable local user access, and configure the local user password. You can
configure and view the following parameters:
Table 25: RADIUS Access Parameters
Parameter
Description
HTTP RADIUS Access Control
Status
Enable or disable RADIUS management of HTTP/HTTPS
users.
Telnet RADIUS Access Control
Status
Enable or disable RADIUS management of Telnet/SSH
users.
1 of 2
104 AP-4, AP-5, and AP-6 User Guide
Management Configuration
Table 25: RADIUS Access Parameters
Parameter
Description
RADIUS Profile for Management
Access Control
Specifies the RADIUS Profile to be used for RADIUSBased Management Access.
Local User Status
Enables or disables the local user when RADIUS-Based
Management is enabled. The default local user ID is root.
Local User Password
The default local user password is public. Root cannot be
configured as a valid user for RADIUS based
management access when local user access is enabled.
Confirm Password
Reenter the password that you entered in the Local User
Password field.
2 of 2
Automatic Configuration
The Automatic Configuration feature allows an AP to be automatically configured by
downloading a specific configuration file from a TFTP server during the boot up process.
Automatic Configuration is disabled by default. The configuration process for Automatic
Configuration varies depending on whether the AP is configured for dynamic or static IP.
When an AP is configured for dynamic IP, the Configuration filename and the TFTP server IP
address are contained in the DHCP response when the AP obtains its IP address dynamically
from the DHCP server. When configured for static IP, these parameters are instead configured
in the AP interface.
After setting up automatic configuration you must reboot the AP. When the AP reboots it
receives the new configuration information and must reboot one additional time. If Syslog is
configured, a Syslog message will appear indicating the success or failure of the Automatic
Configuration.
Auto Configuration and the CLI Batch File
The Auto Configuration feature allows download of the TLV (tag, length, value) format
configuration file or the CLI Batch file. The AP detects whether the file uploaded is TLV format or
a CLI Batch file. If the AP detects a CLI Batch file (a file with extension .cli), the AP executes the
file immediately.
The AP will reboot after executing the CLI Batch file. Auto Configuration will not result in
repeated reboots if the CLI Batch file contains rebootable parameters.
For more information, see CLI Batch File on page 305.
Issue 2 November 2004
105
Performing Advanced Configuration
Setting Up Automatic Configuration for Static IP
Perform the following procedure to enable and set up Automatic Configuration when you have a
static IP address for the TFTP server:
1. Click Configure > Management > AutoConfig. The Automatic Configuration Screen
appears. See Figure 32.
2. Check Enable Auto Configuration.
3. Enter the Configuration Filename.
4. Enter the IP address of the TFTP server in the TFTP Server Address field.
Note:
Note:
The default filename is config. The default TFTP IP address is 169.254.128.133
for the AP.
5. Click OK to save the changes.
6. Reboot the AP. When the AP reboots it receives the new configuration information and must
reboot one additional time. If a Syslog server was configured, the following messages can
be observed on the Syslog server:
●
AutoConfig for Static IP
●
TFTP server address and configuration filename
●
AutoConfig Successful
Figure 32: Automatic Configuration Screen
106 AP-4, AP-5, and AP-6 User Guide
Management Configuration
Setting Up Automatic Configuration for Dynamic IP
Perform the following procedure to enable and set up Automatic Configuration when you have a
dynamic IP address for the TFTP server via DHCP:
The Configuration filename and the TFTP server IP address are contained in the DHCP
response when the AP obtains its IP address dynamically from the DHCP server. A Syslog
server address is also contained in the DHCP response, allowing the AP to send Auto
Configuration success and failure messages to a Syslog server.
Note:
Note:
The configuration filename and TFTP server IP address are configured only
when the AP is configured for Static IP. If the AP is configured for Dynamic IP
these parameters are not used and obtained from DHCP.
1. Click Configure > Management > AutoConfig. The Automatic Configuration Screen
appears. See Figure 32.
2. Check Enable Auto Configuration.
When the AP is Configured with Dynamic IP, the DHCP server should be configured with
the TFTP Server IP address (Boot Server Host Name, option 66) and Configuration file
(Bootfile Name, option 67) as follows (note that this example uses a Windows 2000
server):
3. Select DHCP Server > DHCP Option > Scope. The DHCP Options: Scope Screen
appears. See Figure 33.
Figure 33: DHCP Options: Scope Screen — Setting the Boot Server Host Name
Issue 2 November 2004
107
Performing Advanced Configuration
4. Add the Boot Server Host Name and Bootfile Name parameters to the Active Options list.
5. Set the value of the Boot Server Host Name parameter to the host name or IP Address of
the TFTP server. For example: 11.0.0.7. See Figure 33.
6. Set the value of the Bootfile Name parameter to the Configuration filename. For example:
AP-Config. See Figure 34.
Figure 34: DHCP Options: Scope Screen — Setting the Bootfile Name
7. If using Syslog, set the Log server IP address (option 7, Log Servers).
8. Reboot the AP. When the AP reboots it receives the new configuration information and must
reboot one additional time. If a Syslog server was configured, the following messages can
be observed on the Syslog server:
●
AutoConfig for Dynamic IP
●
TFTP server address and configuration filename
●
AutoConfig Successful
108 AP-4, AP-5, and AP-6 User Guide
Management Configuration
Hardware Configuration Reset
Hardware Configuration Reset Status is a parameter that defines the hardware configuration
reset behavior of the AP (i.e., what effect pressing the reload button has on an AP operating in
normal operating mode).
If a user loses or forgets the AP’s HTTP, Telnet, or SNMP password, the reset button on the AP
provides a way to reset the AP to default configuration values to gain access to the AP.
However, in AP deployments where physical access to the AP is not protected, an unauthorized
person could reset the AP to factory defaults and thus gain control of the AP. You can disable
the hardware configuration reset functionality to prevent unauthorized access.
The hardware configuration reset feature operates as follows:
●
When hardware configuration reset is enabled, you can press the hardware reload button
for 10 seconds when the AP is in normal operational mode in order to delete the AP
configuration.
●
When hardware configuration reset is disabled, pressing the reload button when the AP is
in normal operational mode does not have any effect on the AP.
●
The hardware configuration reset parameter does not have any effect on the functionality
of the reload button to delete the AP image during AP boot loaded execution.
●
The default hardware configuration reset status is enabled. When disabling hardware
configuration reset, Avaya recommends that you configure a configuration reset password.
A configuration reset option appears on the serial port during boot up, before the AP reads
its configuration and initializes.
●
Whenever the AP is reset to factory default configuration, hardware configuration reset
status is enabled and the configuration reset password is set to the default, “public”.
●
If secure mode is enabled in the AP, only secure (SSL, SNMPv3, SSH) users can modify
the values of the Hardware Configuration Reset Status and the configuration reset
password.
Configuration Reset via Serial Port During Bootup
If hardware configuration reset is disabled, you are prompted by a configuration reset option to
reset the AP to factory defaults during boot up from the serial interface. By pressing a key
sequence (ctrl-R), you are prompted to enter a configuration reset password before the
configuration is reset.
Note:
Note:
It is important to safely store the configuration reset password. If a user forgets
the configuration reset password, the user will be unable to reset the AP to
factory default configuration if the AP becomes inaccessible and the hardware
configuration reset functionality is disable.
Issue 2 November 2004
109
Performing Advanced Configuration
Configuring Hardware Configuration Reset
Perform the following procedure to configure Hardware Configuration Reset and to set the
Configuration Reset Password.
1. Click Configure > Management > CHRD. See Figure 35.
Figure 35: Hardware Configuration Reset
2. Check (enable) or clear (disable) the Enable Hardware Configuration Reset check box.
3. Change the default Configuration Reset Password in the Configuration Reset Password
and Confirm fields.
Note:
Note:
It is important to safely store the configuration reset password. If a user forgets
the configuration reset password, the user will be unable to reset the AP to
factory default configuration if the AP becomes inaccessible and the hardware
configuration reset functionality is disable.
110 AP-4, AP-5, and AP-6 User Guide
Filtering Configuration
Resetting the Configuration via the Serial Interface
Follow these steps to reset the configuration via the serial interface:
1. During boot up, observe the message output on the serial interface.
The AP prompts you with the message: Press ctrl-R in 3 seconds to choose
configuration reset option.
2. Enter ctrl-R within 3 seconds after being prompted.
The AP prompts you with: Press ctrl-Z to continue with normal boot up or
enter password to reset configuration.
If you press ctrl-Z, the AP continues to boot with the stored configuration.
3. Enter the configuration reset password. The default configuration reset password is public.
When the correct configuration reset password is entered, the AP is reset to factory defaults
and displays the message AP has been reset to Factory Default Settings. The
AP continues to boot up. If an incorrect configuration reset password is entered, the AP shows
an error message and reprompts you. If the incorrect password is entered three times in a row,
the AP proceeds to boot up.
Filtering Configuration
The Access Point’s Packet Filtering features help control the amount of traffic exchanged
between the wired and wireless networks. To configure the Packet Filtering features, use the
Filtering tab.
The following sections describe how to configure packet filters:
●
Ethernet Protocol Filter on page 111
●
Static MAC Filter on page 112
●
Advanced Filters on page 116
●
TCP/UDP Port Filters on page 117
Ethernet Protocol Filter
The Ethernet Protocol Filter blocks or forwards packets based on the Ethernet protocols they
support.
Follow these steps to configure the Ethernet Protocol Filter:
1. Select the interface or interfaces that will implement the filter from the Ethernet Protocol
Filtering drop-down menu.
Issue 2 November 2004
111
Performing Advanced Configuration
●
Ethernet: Packets are examined at the Ethernet interface
●
Wireless: Packets are examined at the Wireless A interface
●
All Interfaces: Packets are examined at both interfaces
●
Disabled: The filter is not used
2. Select the Filter Operation Type.
●
If set to Passthru, only the enabled Ethernet Protocols listed in the Filter Table will pass
through the bridge.
●
If set to Block, the bridge will block enabled Ethernet Protocols listed in the Filter Table.
3. Configure the Ethernet Protocol Filter Table. This table is pre-populated with existing
Ethernet Protocol Filters, however, you may enter additional filters by specifying the
appropriate parameters.
●
To add an entry, click Add, and then specify the Protocol Number and a Protocol
Name.
- Protocol Number: Enter the protocol number. See http://www.iana.org/assignments/
ethernet-numbers for a list of protocol numbers.
- Protocol Name: Enter related information, typically the protocol name.
●
To edit or delete an entry, click Edit and change the information, or select Enable,
Disable, or Delete from the Status drop-down menu.
●
An entry’s status must be enabled in order for the protocol to be subject to the filter.
4. Reboot the AP for any changes to the Ethernet Protocol Filter Table to take effect.
Static MAC Filter
The Static MAC Address filter optimizes the performance of a wireless (and wired) network.
When this feature is properly configured, the AP can block traffic between wired devices and
wireless devices based on MAC address.
For example, you can set up a Static MAC filter to prevent wireless clients from communicating
with a specific server on the Ethernet network. You can also use this filter to block unnecessary
multicast packets from being forwarded to the wireless network.
Note:
The Static MAC Filter is an advanced feature. You may find it easier to control
wireless traffic via other filtering options, such as Ethernet Protocol Filtering.
Note:
Each static MAC entry contains the following fields:
●
Wired MAC Address
●
Wired Mask
●
Wireless MAC Address
112 AP-4, AP-5, and AP-6 User Guide
Filtering Configuration
●
Wireless Mask
●
Comment: This field is optional.
●
Status
Each MAC Address or Mask is comprised of 12 hexadecimal digits (0-9, A-F) that correspond to
a 48-bit identifier. (Each hexadecimal digit represents 4 bits (0 or 1).)
Taken together, a MAC Address/Mask pair specifies an address or a range of MAC addresses
that the AP will look for when examining packets. The AP uses Boolean logic to perform an
“AND” operation between the MAC Address and the Mask at the bit level. However, for most
users, you do not need to think in terms of bits. It should be sufficient to create a filter using only
the hexadecimal digits 0 and F in the Mask (where 0 is any value and F is the value specified in
the MAC address). A Mask of 00:00:00:00:00:00 corresponds to all MAC addresses, and a
Mask of FF:FF:FF:FF:FF:FF applies only to the specified MAC Address.
Example
For example, if the MAC Address is 00:20:A6:12:54:C3 and the Mask is FF:FF:FF:00:00:00, the
AP will examine the source and destination addresses of each packet looking for any MAC
address starting with 00:20:A6. If the Mask is FF:FF:FF:FF:FF:FF, the AP will only look for the
specific MAC address (in this case, 00:20:A6:12:54:C3).
When creating a filter, you can configure the Wired parameters only, the Wireless parameters
only, or both sets of parameters. Which parameters to configure depends upon the traffic that
you want block. See Table 26.
Table 26: Static MAC Filter Parameters
To block all traffic...
Configure...
from a specific wired MAC address from
being forwarded to the wireless network
only the Wired MAC Address and Wired
Mask (leave the Wireless MAC Address and
Wireless Mask set to all zeros).
from a specific wireless MAC address from
being forwarded to the wired network
only the Wireless MAC address and Wireless
Mask (leave the Wired MAC Address and
Wired Mask set to all zeros).
between a specific wired MAC address and a
specific wireless MAC address
all four parameters.
Configuring Static MAC Filter Entries
To create an entry, click Add and enter the appropriate MAC addresses and Masks to setup a
filter. The entry is enabled automatically when saved. See Figure 36.
To edit an entry, click Edit.
Issue 2 November 2004
113
Performing Advanced Configuration
To disable or remove an entry, click Edit and change the Status field from Enable to Disable or
Delete.
Figure 36: Static MAC Configuration Screen
Static MAC Filter Examples
Consider a network that contains a wired server and three wireless clients. The MAC address
for each unit is as follows:
●
Wired Server: 00:40:F4:1C:DB:6A
●
Wireless Client 1: 00:02:2D:51:94:E4
●
Wireless Client 2: 00:02:2D:51:32:12
●
Wireless Client 3: 00:20:A6:12:4E:38
Prevent Two Specific Devices from Communicating
Configure the following settings to prevent the Wired Server and Wireless Client 1 from
communicating:
●
Wired MAC Address: 00:40:F4:1C:DB:6A
●
Wired Mask: FF:FF:FF:FF:FF:FF
114 AP-4, AP-5, and AP-6 User Guide
Filtering Configuration
●
Wireless MAC Address: 00:02:2D:51:94:E4
●
Wireless Mask: FF:FF:FF:FF:FF:FF
Result: Traffic between the Wired Server and Wireless Client 1 is blocked. Wireless Clients 2
and 3 can still communicate with the Wired Server.
Prevent Multiple Wireless Devices From Communicating With a Single Wired
Device
Configure the following settings to prevent Wireless Clients 1 and 2 from communicating with
the Wired Server.
●
Wired MAC Address: 00:40:F4:1C:DB:6A
●
Wired Mask: FF:FF:FF:FF:FF:FF
●
Wireless MAC Address: 00:02:2D:51:94:E4
●
Wireless Mask: FF:FF:FF:00:00:00
Result: When a logical “AND” is performed on the Wireless MAC Address and Wireless Mask,
the result corresponds to any MAC address beginning with the 00:20:2D prefix. Since Wireless
Client 1 and Wireless Client 2 share the same prefix (00:02:2D), traffic between the Wired
Server and Wireless Clients 1 and 2 is blocked. Wireless Client 3 can still communicate with the
Wired Server since it has a different prefix (00:20:A6).
Prevent All Wireless Devices From Communicating With a Single Wired Device
Configure the following settings to prevent all three Wireless Clients from communicating with
Wired Server 1.
●
Wired MAC Address: 00:40:F4:1C:DB:6A
●
Wired Mask: FF:FF:FF:FF:FF:FF
●
Wireless MAC Address: 00:00:00:00:00:00
●
Wireless Mask: 00:00:00:00:00:00
Result: The Access Point blocks all traffic between Wired Server 1 and all wireless clients.
Prevent A Wireless Device From Communicating With the Wired Network
Configure the following settings to prevent Wireless Client 3 from communicating with any
device on the Ethernet.
●
Wired MAC Address: 00:00:00:00:00:00
●
Wired Mask: 00:00:00:00:00:00
●
Wireless MAC Address: 00:20:A6:12:4E:38
●
Wireless Mask: FF:FF:FF:FF:FF:FF
Result: The Access Point blocks all traffic between Wireless Client 3 and the Ethernet network.
Issue 2 November 2004
115
Performing Advanced Configuration
Prevent Messages Destined for a Specific Multicast Group from Being Forwarded
to the Wireless LAN
If devices on your Ethernet network use multicast packets to communicate and these packets
are not required by your wireless clients, you can set up a Static MAC filter to preserve wireless
bandwidth. For example, if routers on your network use a specific multicast address (such as
01:00:5E:00:32:4B) to exchange information, you can set up a filter to prevent these multicast
packets from being forwarded to the wireless network:
●
Wired MAC Address: 01:00:5E:00:32:4B
●
Wired Mask: FF:FF:FF:FF:FF:FF
●
Wireless MAC Address: 00:00:00:00:00:00
●
Wireless Mask: 00:00:00:00:00:00
Result: The Access Point does not forward any packets that have a destination address of
01:00:5E:00:32:4B to the wireless network.
Advanced Filters
You can configure the following advanced filtering options:
●
Enable Proxy ARP: Place a check mark in the box provided to allow the Access Point to
respond to Address Resolution Protocol (ARP) requests for wireless clients. When
enabled, the AP answers ARP requests for wireless stations without actually forwarding
them to the wireless network. If disabled, the Access Point will bridge ARP requests for
wireless clients to the wireless LAN.
●
Enable IP/ARP Filtering: Place a check mark in the box provided to allow IP/ARP filtering
based on the IP/ARP Filtering Address and IP Mask. Leave the box unchecked to prevent
filtering. If enabled, you should also configure the IP/ARP Filtering Address and IP/ARP IP
Mask.
- IP/ARP Filtering Address: Enter the Network filtering IP Address.
- IP/ARP IP Mask: Enter the Network Mask IP Address.
The following protocols are listed in the Advanced Filter Table:
●
Deny IPX RIP
●
Deny IPX SAP
●
Deny IPX LSP
●
Deny IP Broadcasts
●
Deny IP Multicasts
The AP can filter these protocols in the wireless-to-Ethernet direction, the Ethernet-to-wireless
direction, or in both directions. Click Edit and use the Status field to Enable or Disable the filter.
116 AP-4, AP-5, and AP-6 User Guide
Filtering Configuration
TCP/UDP Port Filters
Port-based filtering enables you to control wireless user access to network services by
selectively blocking TCP/UDP protocols through the AP. You specify a Protocol Name, Port
Number, Port Type (TCP, UDP, or TCP/UDP), and filtering interfaces (Only Ethernet, Only
Wireless, All Interfaces)) to block access to services, such as Telnet and FTP, and traffic, such
as NETBIOS and HTTP.
For example, an AP with the configuration shown in Table 27 would discard frames received on
its Ethernet interface with a UDP destination port number of 137, effectively blocking NETBIOS
Name Service packets.
Table 27: Example: UDP Port-Based Filtering
Protocol Type
(TCP/UDP)
Destination
Port Number
Protocol Name
Interface
Status
(Enable/Disable)
UDP
137
NETBIOS
Name Service
Ethernet
Enable
Adding TCP/UDP Port Filters
To add a TCP/UDP port filter:
1. Place a check mark in the box labeled Enable TCP/UDP Port Filtering.
2. Click Add under the TCP/UDP Port Filter Table heading.
3. In the TCP/UDP Port Filter Table, enter the Protocol Names to filter.
4. Set the destination Port Number (a value between 1 and 65535) to filter. See the IANA Web
site at http://www.iana.org/assignments/port-numbers for a list of assigned port numbers
and their descriptions.
5. Set the Port Type for the protocol: TCP, UDP, or both (TCP/UDP).
6. Set the Interface to filter:
●
Only Ethernet
●
Only Wireless
●
All interfaces
7. Click OK.
Editing TCP/UDP Port Filters
To edit a TCP/UDP port filter:
1. Click Edit under the TCP/UDP Port Filter Table heading.
Issue 2 November 2004
117
Performing Advanced Configuration
2. Make any changes to the Protocol Name or Port Number for a specific entry, if necessary.
3. Modify the Port Type, Interface, and Status using the drop down menus, as appropriate.
4. Select OK.
Alarm Configuration
The Alarms tab consists of four subtabs:
●
Alarm Groups
●
Alarm Host Table
●
Syslog
●
RAD
Alarm Groups
The AP can be configured to generate and send alarms, notifications, or traps as version 1 or a
version 2c. Use the SNMP alarm type drop-down menu to select a version.
There are seven alarm groups that can be enabled or disabled via the Web interface. Place a
check mark in the box provided to enable a specific group. Remove the check mark from the
box to disable the alarms. See Figure 37. Alarm Severity Levels vary. For more information on
alarm severity levels, see Severity Levels on page 124.
118 AP-4, AP-5, and AP-6 User Guide
Alarm Configuration
Figure 37: Alarm Groups Configuration
The following tables list and describe the alarms included in each of these seven alarm groups.
●
Configuration alarm. See Table 28.
●
Security alarms. See Table 29.
●
Wireless alarms. See Table 30.
●
Operational alarms. See Table 31.
●
FLASH memory alarms. See Table 32.
●
TFTP alarms. See Table 33.
●
Image alarms. See Table 34.
All these alarm groups correspond to System Alarms that are displayed in the System Status
screen (Figure 18), including the traps that are sent by the AP to the SNMP managers specified
Issue 2 November 2004
119
Performing Advanced Configuration
in the Alarm Host Table. For information on how to manage entries in the Alarm Host Table. See
Alarm Host Table on page 125.
Table 28: Configuration Alarms
Trap Name
Description
oriTrapDNSIPNotConfigured
The DNS IP Address is not configured.
Severity Level: Major
oriTrapRADIUSAuthenticationNotConfigured
RADIUS Authentication not Configured
oriTrapRADIUSAccountingNotConfigured
RADIUS Accounting not Configured
oriTrapDuplicateIPAddressEncountered
Duplicate IP Address Encountered
oriTrapVLANIDInvalidConfiguration
VLAN ID Invalid Configuration
oriTrapAutoConfigFailure
Auto Configuration Failure
oriTrapBatchExecFailure
CLI Configuration Execution Failure
oriTrapBatchFileExecStart
CLI Configuration Execution Start
oriTrapBatchFileExecEnd
CLI Configuration Execution End
Table 29: Security Alarms
Trap Name
Description
oriTrapAuthenticationFailure
A client authentication failure. The authentication failures can range from:
● MAC Access Control Table
●
RADIUS MAC Authentication
●
802.1x Authentication specifying the EAP-Type
Severity Level: Major
oriTrapUnauthorizedManagerDetected
An unauthorized manager has attempted to view or modify parameters.
Severity Level: Major
oriTrapRADScanComplete
RAD Scan Complete
oriTrapRADScanResults
RAD Scan Results
120 AP-4, AP-5, and AP-6 User Guide
Alarm Configuration
Table 30: Wireless Interface or Card Alarms
Trap Name
Description
oriTrapWLCNotPresent
Wireless interface/card is not present in the AP.
Severity Level: Informational
oriTrapWLCFailure
General failure with the wireless interface/card.
Severity Level: Critical
oriTrapWLCRemoval
The wireless interface/card has been removed from the device.
Severity Level: Critical
oriTrapWLCIncompatibleFirmware
The firmware of the wireless interface/card is incompatible with the AP.
Severity Level: Critical
oriTrapWLCIncompatibleVendor
An incompatible wireless vendor card is inserted or present in the AP.
Severity Level: Critical
oriTrapWLCFirmwareDownloadFailure
Failure during the firmware download process of the wireless interface/
card. (Classic card only)
Severity Level: Critical
oriTrapWLCFirmwareFailure
Firmware Failure.
oriTrapWLCRadarInterferenceDetected
Radar Interference Detected.
Table 31: Operational Alarms 1 of 2
Trap Name
Description
oriTrapUnrecoverableSoftwareErrorDetected
Unrecoverable Software Error Detected
oriTrapRADIUSServerNotResponding
No response from the RADIUS servers for authentication
requests sent from the RADIUS client in the AP.
Trap Severity Level: Major
oriTrapModuleNotInitialized
A certain software or hardware module is not initialized or fails
to initialize.
Trap Severity Level: Major
oriTrapDeviceRebooting
The AP is rebooting.
Trap Severity Level: Informational
oriTrapTaskSuspended
A software task in the AP is suspended.
Trap Severity Level: Critical
oriTrapBootPFailed
When in bootloader mode, the AP does not receive a response
from the BootP server. The result is that the Access Point
reverts to its static IP configuration and you will need to set
reset configuration options.
Trap Severity Level: Major
1 of 2
Issue 2 November 2004
121
Performing Advanced Configuration
Table 31: Operational Alarms 2 of 2
Trap Name
Description
oriTrapDHCPFailed
When in operational mode, the AP does not receive a
response from the DHCP server. The result is that the Access
Point reverts to its static IP configuration and you will need to
set reset configuration options.
Trap Severity Level: Major
oriTrapDNSClientLookupFailure
DNS Client Lookup Failure.
oriTrapSSLInitializationFailure
SSL Initialization Failure.
oriTrapSSHInitializationStatus
SSH Initialization Status.
oriTrapVLANIDUserAssignment
Assigned User VLAN ID.
oriTrapDHCPLeaseRenewal
DHCP Lease Renewal.
2 of 2
Table 32: FLASH Memory Alarms
Trap Name
Description
oriTrapFlashMemoryEmpty
An error while downloading a file to the AP and no data is
present in the flash memory.
Severity Level: Informational
oriTrapFlashMemoryCorrupted
An error while downloading a file to the AP and the data in the
flash memory is invalid or corrupted.
Severity Level: Critical
oriTrapFlashMemoryRestoringLastKnown
GoodConfiguration
Restoring Last Known Good Configuration File
122 AP-4, AP-5, and AP-6 User Guide
Alarm Configuration
Table 33: TFTP Alarms
Trap Name
Description
oriTrapTFTPFailedOperation
A failure during a TFTP upload or download operation.
Severity Level: Major
oriTrapTFTPOperationInitiated
A TFTP upload or download operation is started.
Severity Level: Informational
oriTrapTFTPOperationCompleted
A TFTP operation is complete (upload or download).
Severity Level: Informational
Table 34: Image Alarms
Trap Name
Description
oriTrapZeroSizeImage
A zero size image is loaded on the AP.
Trap Severity Level: Major
oriTrapInvalidImage
An invalid image is loaded in the Access Point.
Trap Severity Level: Major
oriTrapImageTooLarge
The image loaded in the AP exceeds the size limitation of the flash
memory.
Trap Severity Level: Major
oriTrapIncompatibleImage
An incompatible image is loaded in the AP.
Trap Severity Level: Major
oriTrapInvalidImageDigitalSignature
Invalid Image Digital Signature
In addition, the AP supports the following two standard traps, which are always enabled:
●
RFC 1215 Trap. See Table 35.
●
Bridge MIB (RFC 1493) Alarms. See Table 36.
Issue 2 November 2004
123
Performing Advanced Configuration
Table 35: RFC 1215-Trap
Trap Name
Description
coldStart
The AP has been turned on or rebooted.
Trap Severity Level: Informational
linkUp
The AP's Ethernet interface link is up (working).
Trap Severity Level: Informational
linkDown
The AP's Ethernet interface link is down (not working).
Trap Severity Level: Informational
Table 36: Bridge MIB (RFC 1493) Alarms
Trap Name
Description
newRoot
The AP has become the new root in the Spanning Tree network.
Trap Severity Level: Informational
topologyChange
A configured AP port changes from the Learning state to the Forwarding state,
or from the Forwarding state to the Blocking state.
This trap is not sent if a newRoot trap is sent for the same transition.
Trap Severity Level: Informational
Severity Levels
There are three severity levels for system alarms:
●
Critical
●
Major
●
Informational
Critical alarms will often result in severe disruption in network activity or an automatic reboot of
the AP
Major alarms are usually activated due to a breach in the security of the system. Clients cannot
be authenticated or an attempt at unauthorized access into the AP has been detected.
Informational alarms are there to provide the network administrator with some general
information about the activities the AP is performing.
124 AP-4, AP-5, and AP-6 User Guide
Alarm Configuration
Alarm Host Table
Adding an Entry or Enabling the AP to Send Traps
To add an entry and enable the AP to send SNMP trap messages to a Trap Host, click Add, and
then specify the IP Address and Password for the Trap Host.
Note:
Up to 10 entries are possible in the Alarm Host table.
Note:
●
IP Address: Enter the Trap Host IP Address.
●
Password: Enter the password in the Password field and the Confirm field.
●
Comment: Enter an optional comment, such as the alarm (trap) host station name.
Editing or Deleting an Entry
To edit or delete an entry, click Edit. Edit the information, or select Enable, Disable, or Delete
from the Status drop-down menu.
Syslog
The Syslog messaging system enables the AP to transmit event messages to a central server
for monitoring and troubleshooting. The AP can send messages to multiple Syslog servers.The
access point logs “Session Start (Log-in)” and “Session Stop (Log-out)” events for each wireless
client as an alternative to RADIUS accounting.
See RFC 3164 at http://www.rfc-editor.org for more information on the Syslog standard.
Setting Syslog Event Notifications
Syslog Events are logged according to the level of detail specified by the administrator. Logging
only urgent system messages will create a far smaller, more easily read log then a log of every
Issue 2 November 2004
125
Performing Advanced Configuration
event the system encounters. Determine which events to log by selecting a priority defined by
the scale shown in Table 37.
Table 37: Syslog Priority Scale
Event
Priority
Description
LOG_EMERG
0
system is unusable
LOG_ALERT
1
action must be taken immediately
LOG_CRIT
2
critical conditions
LOG_ERR
3
error conditions
LOG_WARNING
4
warning conditions
LOG_NOTICE
5
normal but significant condition
LOG_INFO
6
informational
LOG_DEBUG
7
debug-level messages
Configuring Syslog Event Notifications
You can configure the following Syslog settings from the HTTP interface:
Table 38: Syslog Parameters 1 of 2
Parameter
Description
Enable Syslog
Place a check mark in the box provided to enable system logging.
Syslog Port
Number
This field is read-only and displays the port number (514) assigned for
system logging.
Syslog Lowest
Priority Logged
The AP will send event messages to the Syslog server that correspond to
the selected priority and above. For example, if set to 6, the AP will
transmit event messages labeled priority 0 to 6 to the Syslog server(s).
This parameter supports a range between 1 and 7; 6 is the default.
Syslog
Heartbeat Status
Enables or disables the sending of heartbeat messages from the AP to
the configured Syslog servers.
126 AP-4, AP-5, and AP-6 User Guide
Alarm Configuration
Table 38: Syslog Parameters 2 of 2
Parameter
Description
Syslog
Heartbeat
Interval
Specifies the interval (in seconds) at which Syslog Heartbeat messages
are sent to the configured Syslog servers.
Syslog Host
Table
This table specifies the IP addresses of a network servers that the AP will
send Syslog messages to. Click Add to create a new entry. Click Edit to
change an existing entry. Each entry contains the following fields:
●
IP Address: Enter the IP Address for the management host.
●
Comment: Enter an optional comment such as the host name.
●
Status: The entry is enabled automatically when saved (so the
Status field is only visible when editing an entry). Disable or delete
entries by changing this field’s value.
Syslog Messages
Table 39 shows the Syslog messages that are supported in the AP:
Table 39: Syslog Messages
Message
Severity
Auto Configuration via DHCP
Informational
Auto Configuration for static IP
Informational
TFTP server IP/Config filename missing in DHCP response
Minor
AutoConfig TFTP server IP address used is <IP address>
Informational
AutoConfig filename used is <filename>
Informational
AutoConfig TFTP download failed
Minor
Image Error check, invalid image
Minor
AP Heartbeat status
Minor
Client Authentication State
Informational
Accounting
Informational
RADIUS Responses
Informational
Issue 2 November 2004
127
Performing Advanced Configuration
RAD
The Rogue AP Detection (RAD) feature provides an additional security level for wireless LAN
deployments. Rogue AP detection provides a mechanism for detecting Rogue Access Points by
utilizing the coverage of the trusted Access Point deployment.
The Rogue AP Scan employs background scanning using low-level 802.11 scanning functions
for effective wireless detection of Access Points in its coverage area with minimal impact on the
normal operation of the Access Point.
This RAD feature can be enabled on an Access Point via its HTTP, CLI, or SNMP Interfaces.
The scan repetition duration can be configured. The Access Point will periodically scan the
wireless network and report all the available Access Points within its coverage area using
SNMP traps. For additional reliability the results are stored in the Access Point in a table, which
can be queried via SNMP. The BSSID and Channel number of the detected Access Points are
provided in the scan results.
The RAD scan is done on a channel list initialized based on the regulatory domain of the device.
The RAD Scan then performs background scanning on all the channels in this channel list using
802.11 MAC scanning functions. It will either actively scan the network by sending probe
requests or passively scan by only listening for beacons. The access point information is then
gathered from the probe responses and beacons.
To minimize traffic disruption and maximize the scanning efficiency, the RAD feature employs
an enhanced background-scanning algorithm and uses the CTS to Self mechanism to keep the
clients silent. The scanning algorithm allows traffic to be serviced between each channel scan.
Before start of every scan (except scan on the working channel) the CTS to self-mechanism is
used to set the NAV values of clients to keep them silent during the scanning period. In addition,
the scan repetition duration can also be configured to reduce the frequency of RAD scan cycles
to maximize Access Point performance.
RAD Configuration Requirements
The RAD feature can be configured/monitored via the HTTP, CLI, or SNMP management
interfaces.
The following management options are provided:
●
The RAD feature can be enabled or disabled.
●
The repetition interval of RAD can be configured.
●
SNMP Traps are sent after completion of a RAD scan cycle and also whenever a new
Access Point is detected.
●
Additionally, the RAD scan results are maintained in a table that can be queried via SNMP.
The system administrator has to enable RAD on the Access Points in the wireless network
and also configure the Trap Host on all these Access Points to the IP address of the
management station. The Access Points on detecting a new Access Point sends a RAD
Scan Result Trap to the management station.
128 AP-4, AP-5, and AP-6 User Guide
Alarm Configuration
Figure 38 shows an example network deployment. The Trusted AP has Rogue Access
Detection enabled and the trap host is configured to be the management station. The Trusted
AP on detecting the Rogue AP will send a trap to the management station with the Channel and
BSSID of the Rogue Access Point.
Figure 38: Example Rogue AP Detection Deployment
Configuring RAD
Perform this procedure to enable RAD and define the Scan Interval.
The RAD screen also displays the time of the last scan and the number of new access points
detected in the last scan.
1. Enable the Security Alarm Group. Select the Security Alarm Group link from the RAD
screen. Configure a Trap Host to receive the list of access points detected during the scan.
2. Click Configure > Alarms > RAD.
3. Enable RAD by checking Enable Rogue AP Detection.
4. Enter the Scan Interval.
The Scan Interval specifies the time period in minutes between scans and can be set to any
value between 15 and 1440 minutes.
5. Click OK.
The results of the RAD scan be viewed in the Status page in the HTTP interface.
Issue 2 November 2004
129
Performing Advanced Configuration
Figure 39: Rogue Access Point Detection Screen
Bridge Configuration
The AP is a bridge between your wired and wireless networking devices. As a bridge, the
functions performed by the AP include:
●
MAC address learning
●
Forward and filtering decision making
●
Spanning Tree protocol used for loop avoidance
Once the AP is connected to your network, it learns which devices are connected to it and
records their MAC addresses in the Learn Table. The table can hold up to 10,000 entries. To
view the Learn Table, click on the Monitor tab and select the Learn Table tab. See Learn
Table on page 171.
To configure the AP’s bridge parameters, use the Bridge tab. This tab has four subtabs.
●
Spanning Tree
●
Storm Threshold
●
Intra BSS
130 AP-4, AP-5, and AP-6 User Guide
Bridge Configuration
●
Packet Forwarding
Spanning Tree
A Spanning Tree is used to avoid redundant communication loops in networks with multiple
bridging devices. Bridges do not have any inherent mechanism to avoid loops, because having
redundant systems is a necessity in certain networks. However, redundant systems can cause
Broadcast Storms, multiple frame copies, and MAC address table instability problems.
Complex network structures can create multiple loops within a network. The Spanning Tree
configuration blocks certain ports on AP devices to control the path of communication within the
network, avoiding loops and following a spanning tree structure.
For more information on Spanning Tree protocol, see Section 8.0 of the IEEE 802.1d standard.
The Spanning Tree configuration options are advanced settings. Avaya recommends that you
leave these parameters at their default values unless you are familiar with the Spanning Tree
protocol.
Storm Threshold
Storm Threshold is an advanced Bridge setup option that you can use to protect the network
against data overload by:
●
Specifying a maximum number of frames per second as received from a single network
device (identified by its MAC address).
●
Specifying an absolute maximum number of messages per port.
The Storm Threshold parameters allow you to specify a set of thresholds for each port of the AP,
identifying separate values for the number of broadcast messages/second and Multicast
messages/second.
When the number of frames for a port or identified station exceeds the maximum value per
second, the AP will ignore all subsequent messages issued by the particular network device, or
ignore all messages of that type.
●
Address Threshold: Enter the maximum allowed number of packets per second.
●
Ethernet Threshold: Enter the maximum allowed number of packets per second.
●
Wireless Threshold: Enter the maximum allowed number of packets per second.
Intra BSS
The wireless clients (or subscribers) that associate with a certain AP form the Basic Service Set
(BSS) of a network infrastructure. By default, wireless subscribers in the same BSS can
Issue 2 November 2004
131
Performing Advanced Configuration
communicate with each other. However, some administrators (such as wireless public spaces)
may wish to block traffic between wireless subscribers that are associated with the same AP to
prevent unauthorized communication and to conserve bandwidth. This feature enables you to
prevent wireless subscribers within a BSS from exchanging traffic.
Although this feature is generally enabled in public access environments, Enterprise LAN
administrators use it to conserve wireless bandwidth by limiting communication between
wireless clients. For example, this feature prevents peer-to-peer file sharing or gaming over the
wireless network.
●
To block Intra BSS traffic, set Intra BSS Traffic Operation to Block.
●
To allow Intra BSS traffic, set Intra BSS Traffic Operation to Passthru.
Packet Forwarding
The Packet Forwarding feature enables you to redirect traffic generated by wireless clients that
are all associated to the same AP to a single MAC address. This filters wireless traffic without
burdening the AP and provides additional security by limiting potential destinations or by routing
the traffic directly to a firewall. You can redirect to a specific port (Ethernet or WDS) or allow the
bridge’s learning process (and the forwarding table entry for the selected MAC address) to
determine the optimal port.
Note:
Note:
The gateway to which traffic will be redirected should be node on the Ethernet
network. It should not be a wireless client.
Configuring Interfaces for Packet Forwarding
To configure interfaces for packet forwarding, specifying interface port(s) to which packets are
redirected and a destination MAC address, as follows:
1. Within the Packet Forwarding Configuration screen, check the box labeled Enable Packet
Forwarding.
2. Specify a destination Packet Forwarding MAC Address. The AP will redirect all unicast,
multicast, and broadcast packets received from wireless clients to the address you specify.
3. Select a Packet Forwarding Interface Port from the drop-down menu. You can redirect
traffic to:
●
Any (traffic is redirected to a port based on the bridge learning process)
●
Ethernet
●
A WDS connection (see WDS Configuration on page 88 for details)
4. Click OK to save your changes.
132 AP-4, AP-5, and AP-6 User Guide
QoS (Quality of Service)
QoS (Quality of Service)
This feature is not supported in the AP. Clicking on this tab displays the following message: The
Quality of Service (QoS) feature is not implemented on the AP-4/5/6 and AP-3.
RADIUS Profile Configuration
RADIUS Profiles on the AP define a profile for RADIUS Servers used by the system or by a
VLAN. The network administrator can define RADIUS Servers per Authentication Mode and per
VLAN. For more information, see Configuring RADIUS Profiles on page 135 and RADIUS
Servers per Authentication Mode and per VLAN on page 134.
The AP communicates with the RADIUS server defined in a profile to provide the following
features:
●
MAC Access Control by Means of RADIUS Authentication
●
802.1x Authentication using RADIUS
●
RADIUS Accounting
Also, RADIUS-Based Access allows centralized user management. For information on
RADIUS-based access, see RADIUS-Based Access on page 104.
The network administrator can configure default RADIUS authentication servers to be used on a
system-wide basis, or in networks with VLANs enabled the administrator can also configure
separate authentication servers to be used for MAC authentication, EAP authentication, or
Accounting in each VLAN. You can configure the AP to communicate with up to six different
RADIUS servers per VLAN/SSID:
●
Primary Authentication Server (MAC-based authentication)
●
Back-up Authentication Server (MAC-based authentication)
●
Primary Authentication Server (EAP/802.1x authentication)
●
Back-up Authentication Server (EAP/802.1x authentication)
●
Primary Accounting Server
●
Back-up Accounting Server
The back-up servers are optional, but when configured, the AP will communicate with the
back-up server if the primary server is off-line. After the AP has switched to the backup server, it
will periodically check the status of the primary RADIUS server every five (5) minutes. Once the
primary RADIUS server is again online, the AP automatically reverts from the backup RADIUS
server back to the primary RADIUS server. All subsequent requests are then sent to the primary
RADIUS server.
Issue 2 November 2004
133
Performing Advanced Configuration
You can view monitoring statistics for each of the configured RADIUS servers.
RADIUS Servers per Authentication Mode and per VLAN
You can configure separate RADIUS authentication servers for each authentication mode and
for each SSID (VLAN). For example, you can configure separate RADIUS servers for:
●
RADIUS MAC authentication and 802.1x authentication
●
Each VLAN: the Sales VLAN could support only WEP clients, whereas the Marketing
VLAN could support 802.1x and WEP clients.
Figure 40: RADIUS Servers per VLAN
AP
Figure 40 shows a network with separate authentication servers for each authentication type
and for each VLAN. The clients in VLAN 1 are authenticated using the authentication servers
configured for VLAN 1. The type of authentication server used depends on whether the
authentication is done for an 802.1x client or non-802.1x client. The clients in VLAN 2 are
authenticated using a different set of authentication servers configured for authenticating users
in VLAN 2.
Authentication servers for each VLAN are configured as part of the configuration options for that
VLAN. You can also configure authentication servers on a system-wide basis; these servers are
called the default authentication servers. For each VLAN, you can opt to use the default
134 AP-4, AP-5, and AP-6 User Guide
RADIUS Profile Configuration
authentication servers, or to configure separate authentication servers to be used for a
particular authentication type in that VLAN.
RADIUS-based VLAN Assignment
The AP currently supports two methods of assigning a VLAN ID to a wireless client. The
wireless client can be assigned either:
●
The static VLAN ID configured for the SSID that the wireless client is associated with
OR
●
The VLAN ID that is returned by the RADIUS server during authentication
A RADIUS server can assign a VLAN ID to a wireless client only if both the server and client are
associated with an SSID that is configured to use a RADIUS-based authentication security
mode (802.1X, WPA, 802.11i/WPA2, and RADIUS based MAC Address Authentication). If the
wireless client is associated with an SSID that does not provide RADIUS-based authentication
(such as None, WEP, WPA-PSK, and 802.11i/WPA2-PSK), then the wireless client will be
assigned the static VLAN ID that is configured for the respective SSID. See Security
Configuration on page 140 for more information.
RADIUS Servers Enforcing VLAN Access Control
A RADIUS server can be used to enforce VLAN access control in two ways:
●
Authorize the SSID the client uses to connect to the AP. The SSID determines the VLAN
that the client is assigned to.
●
Assign the user to a VLAN by specifying the VLAN membership information of the user.
Configuring RADIUS Profiles
A RADIUS server Profile consists of a Primary and a Secondary RADIUS server that are
assigned to act as either MAC Authentication servers, 802.1x/EAP Authentication servers, or
Accounting Servers in the VLAN Configuration. See Wireless on page 155.
Use the RADIUS Profiles subtab to add new RADIUS profiles or modify or delete existing
profiles. Figure 41 shows the RADIUS Server Profiles subtab.
Issue 2 November 2004
135
Performing Advanced Configuration
Figure 41: RADIUS Server Profiles
Configuring a RADIUS Server Profile
To add, modify, or delete a RADIUS server profile:
1. Click Add to create a new profile. Figure 42 shows the Add RADIUS Server Profile screen.
To modify an existing profile, select the profile and click Edit.
To delete an existing profile, select the profile and click Delete. You cannot delete a
RADIUS server profile if you are using it in an SSID. Also, the four default RADIUS server
profiles cannot be deleted.
136 AP-4, AP-5, and AP-6 User Guide
RADIUS Profile Configuration
Figure 42: Add RADIUS Server Profile Screen
2. Configure the parameters for the RADIUS Server profile. Table 40 describes the parameters
that you can configure and view on this page.
Note:
Note:
This page configures only the Primary RADIUS Server associated with the
profile. After configuring these parameters, save them by clicking OK. Then, to
configure the Secondary RADIUS Server, edit the profile from the main page.
3. Click OK.
4. Select the Profile and click Edit to configure the Secondary RADIUS Server, if required.
Issue 2 November 2004
137
Performing Advanced Configuration
5. Reboot the AP.
Table 40: RADIUS Server Profile Parameters
Parameter
Description
Server Profile Name
The profile name. This is the name used to associated a VLAN to the
profile. See Wireless on page 155.
MAC Address Format
Type
This parameter should correspond to the format in which the clients’
12-digit MAC addresses are listed within the RADIUS server.
Available options are:
● Dash delimited: dash between each pair of digits:
xx-yy-zz-aa-bb-cc
● Colon delimited: colon between each pair of digits:
xx:yy:zz:aa:bb:cc
● Single dash delimited: dash between the sixth and seventh
digits: xxyyzz-aabbcc
● No delimiters: No characters or spaces between pairs of
hexidecimal digits: xxyyzzaabbcc
Accounting Inactivity
Timer
Enter the accounting inactivity timer. This parameter supports a
value from 1-60 minutes. The default is 5 minutes.
Authorization Lifetime
Enter the time, in seconds, each client session may be active before
being automatically re-authenticated. This parameter supports a
value between 900 and 43200 seconds. The default is 900 sec.
Server Addressing
Format
Select IP Address or Name. If you want to identify RADIUS servers
by name, you must configure the AP as a DNS Client. See IP
Configuration on page 62 for details.
Server Name/IP
Address
Enter the server’s name or IP address.
Destination Port
Enter the port number which the AP and the server will use to
communicate. By default, RADIUS servers communicate on port
1812.
Server VLAN ID
Indicates the VLAN that uses this RADIUS server profile. If VLAN is
disabled, the text “VLAN is disabled” will appear.
Shared Secret and
Confirm Shared Secret
Enter the password shared by the RADIUS server and the AP. The
same password must also be configured on the RADIUS server.
Response Time
(seconds)
Enter the maximum time, in seconds, that the AP should wait for the
RADIUS server to respond to a request. The range is 1-10 seconds;
the default is 3 seconds.
1 of 2
138 AP-4, AP-5, and AP-6 User Guide
RADIUS Profile Configuration
Table 40: RADIUS Server Profile Parameters
Parameter
Description
Maximum
Retransmissions (0-4)
Enter the maximum number of times an authentication request may
be transmitted. The range is 0 to 4, the default is 3.
Server Status
Select Enable from the drop-down box to enable the RADIUS
Server Profile.
2 of 2
MAC Access Control by Means of RADIUS Authentication
If you want to control wireless access to the network and if your network includes a RADIUS
Server, you can store the list of MAC addresses on the RADIUS server rather than configure
each AP individually. You can define a RADIUS Profile that specifies the IP Address of the
server that contains a central list of MAC Address values identifying the authorized stations that
may access the wireless network. You must specify information for at least the primary RADIUS
server. The back-up RADIUS server is optional.
Note:
Note:
Note:
Each VLAN can be configured to use a separate RADIUS server (and backup
server) for MAC authentication.
Note:
Contact your RADIUS server manufacturer if you have problems configuring the
server or have problems using RADIUS authentication.
802.1x Authentication using RADIUS
You must configure a primary EAP/802.1x Authentication server to use 802.1x security. A
back-up server is optional.
Note:
Note:
Each VLAN can be configured to use a separate RADIUS server (and backup
server) for 802.1x authentication. 802.1x authentication (“EAP authentication”)
can be separately enabled for each VLAN.
Issue 2 November 2004
139
Performing Advanced Configuration
RADIUS Accounting
Using an external RADIUS server, the AP can track and record the length of client sessions on
the access point by sending RADIUS accounting messages per RFC2866. When a wireless
client is successfully authenticated, RADIUS accounting is initiated by sending an “Accounting
Start” request to the RADIUS server. When the wireless client session ends, an “Accounting
Stop” request is sent to the RADIUS server.
Session Length
Accounting sessions continue when a client reauthenticates to the same AP. Sessions are
terminated when:
●
A client disassociates.
●
A client does not transmit any data to the AP for a fixed amount of time.
●
A client is detected on a different interface.
If the client roams from one AP to another, one session is terminated and a new session is
begun.
Note:
This feature requires RADIUS authentication using MAC Access Control or
802.1x. Wireless clients configured in the Access Point’s static MAC Access
Control list are not tracked.
Note:
Security Configuration
The AP provides several security features to protect your network from unauthorized access.
Virtual Local Area Networks (VLANs) are logical groupings of network hosts. Defined by
software settings, other VLAN members or resources appear (to clients) to be on the same
physical segment, no matter where they are attached on the logical LAN or WAN segment.
They simplify traffic flow between clients and their frequently-used or restricted resources.
The AP uses Security Profiles to define allowed wireless clients, and authentication and
encryption types and RADIUS Profiles to define RADIUS Servers used by the system or by a
VLAN.
To configure the AP security features, use the SSID/VLAN/Security tab. This tab contains the
following subtabs:
●
Management VLAN
●
MAC Access
140 AP-4, AP-5, and AP-6 User Guide
Security Configuration
●
Wireless on page 155
●
Security Profiles on page 146
Management VLAN
VLAN Overview
Virtual Local Area Networks (VLANs) are logical groupings of network hosts. Defined by
software settings, other VLAN members or resources appear (to clients) to be on the same
physical segment, no matter where they are attached on the logical LAN or WAN segment.
They simplify traffic flow between clients and their frequently-used or restricted resources.
VLANs now extend as far as the reach of the access point signal. Clients can be segmented
into wireless sub-networks via SSID and VLAN assignment. A Client can access the network by
connecting to an AP configured to support its assigned SSID/VLAN.
AP devices are fully VLAN-ready; however, by default VLAN support is disabled. Before
enabling VLAN support, certain network settings should be configured, and network resources
such as a VLAN-aware switch, a RADIUS server, and possibly a DHCP server should be
available.
Once enabled, VLANs are used to conveniently, efficiently, and easily manage your network in
the following ways:
●
Manage adds, moves, and changes from a single point of contact
●
Define and monitor groups
●
Reduce broadcast and multicast traffic to unnecessary destinations
- Improve network performance and reduce latency
●
Increase security
- Secure network restricts members to resources on their own VLAN
- Clients roam without compromising security
VLAN tagged data is collected and distributed through an AP's wireless interface(s) based on
Network Name (SSID). An Ethernet port on the access point connects a wireless cell or network
to a wired backbone. The access points communicate across a VLAN-capable switch that
analyzes VLAN-tagged packet headers and directs traffic to the appropriate ports. On the wired
network, a RADIUS server authenticates traffic and a DHCP server manages IP addresses for
the VLAN(s). Resources like servers and printers may be present, and a hub may include
multiple APs, extending the network over a larger area.
In Figure 43, the numbered items correspond to the following components:
1. VLAN-enabled access point
2. VLAN-aware switch (IEEE 802.1Q uplink)
Issue 2 November 2004
141
Performing Advanced Configuration
3. AP management via wired host (SNMP, Web interface or CLI)
4. DHCP Server
5. RADIUS Server
6. VLAN 1
7. VLAN 2
Figure 43: Components of a typical VLAN
VLAN Workgroups and Traffic Management
Access Points that are not VLAN-capable typically transmit broadcast and multicast traffic to all
wireless Network Interface Cards (NICs). This process wastes wireless bandwidth and
degrades throughput performance. In comparison, VLAN-capable AP is designed to efficiently
manage delivery of broadcast, multicast, and unicast traffic to wireless clients.
The AP assigns clients to a VLAN based on a Network Name (SSID). The AP can support up to
16 VLAN/SSID pairs per radio (based on model type).
Note:
Note:
The ability to configure up to 16 VLAN/SSID pairs and to configure a security
profile per SSID is available only for the AP-6, and APs that have an 802.11a/b/g
or 802.11b/g Upgrade Kit installed.
142 AP-4, AP-5, and AP-6 User Guide
Security Configuration
The AP matches packets transmitted or received to a network name with the associated VLAN.
Traffic received by a VLAN is only sent on the wireless interface associated with that same
VLAN. This eliminates unnecessary traffic on the wireless LAN, conserving bandwidth and
maximizing throughput.
In addition to enhancing wireless traffic management, the VLAN-capable AP supports easy
assignment of wireless users to workgroups. In a typical scenario, each user VLAN represents a
workgroup; for example, one VLAN could be used for an EMPLOYEE workgroup and the other,
for a GUEST workgroup.
In this scenario, the AP would assign every packet it accepted to a VLAN. Each packet would
then be identified as EMPLOYEE or GUEST, depending on which wireless NIC received it. The
AP would insert VLAN headers or “tags” with identifiers into the packets transmitted on the
wired backbone to a network switch.
Finally, the switch would be configured to route packets from the EMPLOYEE workgroup to the
appropriate corporate resources such as printers and servers. Packets from the GUEST
workgroup could be restricted to a gateway that allowed access to only the Internet. A member
of the GUEST workgroup could send and receive e-mail and access the Internet, but would be
prevented from accessing servers or hosts on the local corporate network.
Typical User VLAN Configurations
VLANs segment network traffic into workgroups, which enable you to limit broadcast and
multicast traffic. Workgroups enable clients from different VLANs to access different resources
using the same network infrastructure. Clients using the same physical network are limited to
those resources available to their workgroup.
The AP can segment users into a maximum of 16 different workgroups (32 if using two cards in
a Dual-radio AP) based on an SSID/VLAN pair (also referred as a VLAN Workgroup or a
Sub-network).
Note:
Note:
The ability to configure up to 16 VLAN/SSID pairs and to configure a security
profile per SSID is available only for the AP-6, and APs that have an 802.11a/b/g
or 802.11b/g Upgrade Kit installed.
The three primary scenarios for using VLAN workgroups are as follows:
1. VLAN disabled: Your network does not use VLANs, and you cannot configure the AP to use
multiple SSIDs.
2. VLAN enabled, each VLAN workgroup uses a different VLAN ID Tag
3. VLAN enabled, a mixture of Tagged and Untagged workgroups
Issue 2 November 2004
143
Performing Advanced Configuration
Enabling or Disabling the VLAN Protocol
Control Access to the AP
Management access to the AP can easily be secured by making management stations or hosts
and the AP itself members of a common VLAN. Simply configure a non-zero management
VLAN ID and enable VLAN to restrict management of the AP to members of the same VLAN.
! CAUTION:
CAUTION:
If a non-zero management VLAN ID is configured then management access to
the AP is restricted to wired or wireless hosts that are members of the same
VLAN. Ensure your management platform or host is a member of the same VLAN
before attempting to manage the AP.
1. Click Configure > SSID/VLAN/Security.
2. Set the VLAN Management ID to a value between -1 and 4094 (a value of 0 disables VLAN
management).
3. Place a check mark in the Enable VLAN Protocol box.
Provide Access to a Wireless Host in the Same Workgroup
The VLAN feature can allow wireless clients to manage the AP. If the VLAN Management ID
matches a VLAN User ID, then those wireless clients who are members of that VLAN will have
AP management access.
! CAUTION:
CAUTION:
Once a VLAN Management ID is configured and is equivalent to one of the VLAN
User IDs on the AP, all members of that User VLAN will have management
access to the AP. Be careful to restrict VLAN membership to those with legitimate
access to the AP.
1. Click Configure > SSID/VLAN/Security.
2. Set the VLAN Management ID to use the same VLAN ID as one of the configured SSID/
VLAN pairs. See Typical User VLAN Configurations on page 143 for details.
3. Place a check mark in the Enable VLAN Protocol box.
Disable VLAN Management
To disable VLAN Management:
1. Click Configure > SSID/VLAN/Security.
2. Remove the check mark from the Enable VLAN Protocol box to disable all VLAN
functionality.
144 AP-4, AP-5, and AP-6 User Guide
Security Configuration
MAC Access
The MAC Access subtab allows you to build a list of stations, identified by their MAC addresses,
authorized to access the network through the AP. The list is stored inside each AP within your
network. Note that you must reboot the AP for any changes to the MAC Access Control Table to
take effect.
The MAC ACL Status parameter (on the SSID/VLAN > Wireless subtab) is per VLAN if VLAN
Management is enabled. All other parameters besides MAC ACL Status are configured per AP,
even if VLAN is enabled.
Configuring MAC Access Control
Note:
Note:
MAC Access Control status is enabled or disabled when configuring each
Security Profile.
Figure 44 shows the MAC Access subtab. Table 41 describes the parameters that you can
configure and view on this tab.
Figure 44: MAC Access Configuration Screen
Issue 2 November 2004
145
Performing Advanced Configuration
Table 41: MAC Access Control Parameters
Note:
Parameter
Description
Operation Type
Choose between Passthru and Block. This determines how the
stations identified in the MAC Access Control Table are filtered.
● If set to Passthru, only the addresses listed in the Control
Table will pass through the bridge.
● If set to Block, the bridge will block traffic to or from the
addresses listed in the Control Table.
MAC Access Control
Table
Click Add to create a new entry. Click Edit to change an existing
entry. Each entry contains the following field:
● MAC Address: Enter the wireless client’s MAC address.
● Comment: Enter an optional comment such as the client’s
name.
● Status: The entry is enabled automatically when saved (so
the Status field is only visible when editing an entry). You can
also disable or delete entries by changing this field’s value.
Note:
For larger networks that include multiple Access Points, you may prefer to
centralize this list on a RADIUS server. For more information, see MAC Access
Control by Means of RADIUS Authentication on page 139.
Security Profiles
The AP supports the Security features listed in Table 42.
Table 42: AP-Supported Security Features
Type
Description
WEP Encryption
The original encryption technique specified by the IEEE 802.11
standard.
802.1x Authentication
An IEEE standard for client authentication.
Wi-Fi Protected Access
(WPA)
A new standard that provides improved encryption security over
WEP.
146 AP-4, AP-5, and AP-6 User Guide
Security Configuration
WEP Encryption
The IEEE 802.11 standards specify an optional encryption feature, known as Wired Equivalent
Privacy or WEP, that is designed to provide a wireless LAN with a security level equal to what is
found on a wired Ethernet network. WEP encrypts the data portion of each packet exchanged
on an 802.11 network using an Encryption Key (also known as a WEP Key).
When Encryption is enabled, two 802.11 devices must have the same Encryption Keys and
both devices must be configured to use Encryption in order to communicate. If one device is
configured to use Encryption but a second device is not, then the two devices will not
communicate, even if both devices have the same Encryption Keys.
●
An 802.11b AP supports 64-bit and 128-bit encryption:
- For 64-bit encryption, an encryption key is 10 hexadecimal characters (0-9 and A-F) or 5
ASCII characters (see Appendix B: ASCII Character Chart).
- For 128-bit encryption, an encryption key is 26 hexadecimal characters or 13 ASCII
characters.
●
An 802.11a or 802.11b/g AP supports 64-bit, 128-bit, and 152-bit encryption:
- For 64-bit encryption, an encryption key is 10 hexadecimal characters (0-9 and A-F) or 5
ASCII characters (see Appendix B: ASCII Character Chart).
- For 128-bit encryption, an encryption key is 26 hexadecimal characters or 13 ASCII
characters.
- For 152-bit encryption, an encryption key is 32 hexadecimal characters or 16 ASCII
characters.
802.1x Authentication
IEEE 802.1x is a standard that provides a means to authenticate and authorize network devices
attached to a LAN port. A port in the context of IEEE 802.1x is a point of attachment to the LAN,
either a physical Ethernet connection or a wireless link to an Access Point. 802.1x requires a
RADIUS server and uses the Extensible Authentication Protocol (EAP) as a standards-based
authentication framework, and supports automatic key distribution for enhanced security. The
EAP-based authentication framework can easily be upgraded to keep pace with future EAP
types.
Issue 2 November 2004
147
Performing Advanced Configuration
Popular EAP types are listed in Table 43.
Table 43: Popular EAP Types
Type
Description
EAP-Message Digest 5
(MD5)
Username/Password-based authentication; does not support
automatic key distribution
EAP-Transport Layer
Security (TLS)
Certificate-based authentication (a certificate is required on the
server and each client); supports automatic key distribution
EAP-Tunneled Transport
Layer Security (TTLS)
Certificate-based authentication (a certificate is required on the
server; a client’s username/password is tunneled to the server
over a secure connection); supports automatic key distribution
PEAP - Protected EAP
with MS-CHAP v2
Secure username/password-based authentication; supports
automatic key distribution
Different servers support different EAP types and each EAP type provides different features.
See the documentation that came with your RADIUS server to determine which EAP types it
supports.
Note:
Note:
The AP supports the following EAP types when Authentication Mode is set to
802.1x, WPA, or 802.11i (WPA2): EAP-TLS, PEAP, and EAP-TTLS. When
Authentication Mode is set to Mixed, the AP supports the following EAP types:
EAP-TLS, PEAP, EAP-TLLS, and EAP-MD5 (MD5 does not support automatic
key distribution; therefore, if you choose this method you need to manually
configure each client with the network's encryption key).
Authentication Process
There are three main components in the authentication process. The standard refers to them
as:
1. supplicant (client PC)
2. authenticator (Access Point)
3. authentication server (RADIUS server)
When Authentication Mode is set to 802.1x, WPA, Mixed mode (802.1x and WEP), or 802.11i,
you need to configure your RADIUS server for authentication purposes.
Prior to successful authentication, an unauthenticated client PC cannot send any data traffic
through the AP device to other systems on the LAN. The AP inhibits all data traffic from a
particular client PC until the client PC is authenticated. Regardless of its authentication status, a
client PC can always exchange 802.1x messages in the clear with the AP (the client begins
encrypting data after it has been authenticated).
148 AP-4, AP-5, and AP-6 User Guide
Security Configuration
Figure 45: RADIUS Authentication Illustrated
The AP acts as a pass-through device to facilitate communications between the client PC and
the RADIUS server. The AP (2) and the client (1) exchange 802.1x messages using an EAPOL
(EAP Over LAN) protocol (A). Messages sent from the client station are encapsulated by the AP
and transmitted to the RADIUS (3) server using EAP extensions (B).
Upon receiving a reply EAP packet from the RADIUS, the message is typically forwarded to the
client, after translating it back to the EAPOL format. Negotiations take place between the client
and the RADIUS server. After the client has been successfully authenticated, the client receives
an Encryption Key from the AP (if the EAP type supports automatic key distribution). The client
uses this key to encrypt data after it has been authenticated.
For 802.11a and 802.11b/g clients that communicate with an AP, each client receives its own
unique encryption key; this is known as Per User Per Session Encryption Keys.
Wi-Fi Protected Access (WPA)
Wi-Fi Protected Access (WPA) is a security standard designed by the Wi-Fi Alliance in
conjunction with the Institute of Electrical and Electronics Engineers (IEEE). The AP supports
WPA2, based on the IEEE 802.11i security standard.
Note:
For Single-radio APs: WPA is available for the AP-6 (or APs that have an
802.11a/b/g or 802.11b/g upgrade kit). WPA is NOT available for the AP-5 or
AP-4. Note that while you can select WPA on AP-5 units, WPA is not supported
for the AP-5 unless you have installed an 802.11a/b/g upgrade kit.
Note:
WPA is a replacement for Wired Equivalent Privacy (WEP), the encryption technique specified
by the original 802.11 standard. WEP has several vulnerabilities that have been widely
publicized. WPA addresses these weaknesses and provides a stronger security system to
protect wireless networks.
WPA provides the following new security measures not available with WEP:
●
Improved packet encryption using the Temporal Key Integrity Protocol (TKIP) and the
Michael Message Integrity Check (MIC).
Issue 2 November 2004
149
Performing Advanced Configuration
●
Per-user, per-session dynamic encryption keys:
- Each client uses a different key to encrypt and decrypt unicast packets exchanged with
the AP
- A client's key is different for every session; it changes each time the client associates
with an AP
- The AP uses a single global key to encrypt broadcast packets that are sent to all clients
simultaneously
- Encryption keys change periodically based on the Re-keying Interval parameter
- WPA uses 128-bit encryption keys
●
Dynamic Key distribution
- The AP generates and maintains the keys for its clients
- The AP securely delivers the appropriate keys to its clients
●
Client/server mutual authentication
- 802.1x
- Pre-shared key (for networks that do not have an 802.1x solution implemented)
Note:
For more information on WPA, see the Wi-Fi Alliance Web site at http://
www.wi-fi.org.
Note:
The AP supports the following WPA authentication modes:
●
WPA: The AP uses 802.1x to authenticate clients. You should only use an EAP that
supports mutual authentication and session key generation, such as EAP-TLS,
EAP-TTLS, and PEAP. See 802.1x Authentication on page 147 for details.
●
WPA-PSK (Pre-Shared Key): For networks that do not have 802.1x implemented, you
can configure the AP to authenticate clients based on a Pre-Shared Key. This is a shared
secret that is manually configured on the AP and each of its clients. The Pre-Shared Key
must be 256 bits long, which is 64 hexadecimal digits. The AP also supports a PSK Pass
Phrase option to facilitate the creation of the Pre-Shared Key (so a user can enter an
easy-to-remember phrase rather than a string of characters).
●
802.11i (also known as WPA2): The AP authenticates clients according to the 802.11i draft
standard, using 802.1x authentication, an AES cipher, and re-keying.
●
802.11i-PSK (also known as WPA2 PSK): The AP uses an AES cipher, and authenticates
clients based on a Pre-Shared Key. The Pre-Shared Key must be 256 bits long, which is
either 64 hexadecimal digits. The AP also supports a PSK Pass Phrase option to facilitate
the creation of the Pre-Shared Key (so a user can enter an easy-to-remember phrase
rather than a string of characters).
150 AP-4, AP-5, and AP-6 User Guide
Security Configuration
Authentication Protocol Hierarchy
There is a hierarchy of authentication protocols defined for the AP.
The hierarchy is as follows, from Highest to lowest:
●
802.1x authentication
●
MAC Access Control via RADIUS Authentication
●
MAC Access Control through individual APs' MAC Access Control Lists
If both 802.1x and MAC authentication are enabled, the 802.1x results will take effect. This is
required in order to propagate the WEP keys to the clients in such cases. Once you disable
802.1x on the AP, you will see the effects of MAC authentication.
VLANs and Security Profiles
The AP allows you to segment wireless networks into multiple subnetworks based on Network
Name (SSID) and VLAN membership. A Network Name (SSID) identifies a wireless network.
Clients associate with Access Points that share an SSID. During installation, the Setup Wizard
prompts you to configure a Primary Network Name for each wireless interface.
After initial setup and once VLAN is enabled, the AP can be configured to support up to 16
SSIDs per wireless interface to segment wireless networks based on VLAN membership.
Each VLAN can be associated with a Security Profile and RADIUS Server Profiles. A Security
Profile defines the allowed wireless clients, and authentication and encryption types. See
VLANs and Security Profiles on page 151 for configuration details.
Note:
The ability to configure up to 16 VLAN/SSID pairs and to configure a security
profile per SSID is available only for the AP-6, and APs that have an 802.11a/b/g
or 802.11b/g Upgrade Kit installed.
Note:
Configuring Security Profiles
Security policies can be configured and applied on the AP as a whole, or on a per VLAN basis.
When VLAN is disabled on the AP, you can configure a security profile for each interface of the
AP. When VLANs are enabled and Security per SSID is enabled, you can configure a security
profile for each VLAN.
You define a security policy by specifying one or more values for the following parameters:
●
Wireless STA types (WPA station, 802.11i station, 802.1x station, WEP station) that can
associate to the AP.
●
Authentication mechanisms (802.1x, RADIUS MAC authentication) that are used to
authenticate clients for each type of station.
●
Cipher Suites (CCMP, TKIP, WEP) used for encapsulating the wireless data for each type
of station.
Issue 2 November 2004
151
Performing Advanced Configuration
Configuring Security Profiles
Up to 16 security profiles can be configured per wireless interface.
To configure a security profile:
1. Click Configure > SSID/VLAN/Security > Security Profile. See Figure 46.
Figure 46: Security Profiles Screen
2. Click Add in the Security Profile Table to create a new entry. To modify an existing profile,
select the profile and click Edit. To delete an existing profile, select the profile and click
Delete. You cannot delete a Security Profile used in an SSID. Also, the first Security Profile
(index 1.1 to 1.7) cannot be deleted.
Figure 47 shows the Security Profile Table - Add Entries screen.
152 AP-4, AP-5, and AP-6 User Guide
Security Configuration
Figure 47: Security Profile Table - Add Entries
Issue 2 November 2004
153
Performing Advanced Configuration
3. Configure one or more types of wireless stations (security modes) that are allowed access
to the AP under the security profile. The WEP/PSK parameters can be configured
separately for each security mode. To enable a security mode in the profile (Non Secure
Station, WEP Station, 802.1x Station, WPA Station, WPA-PSK Station, 802.11i Station,
802.11i-PSK Station), check the box next to the mode.
If the security mode selected in a profile is WEP, WPA-PSK, or 802.11i-PSK, then you must
configure the WEP or Pre-Shared Keys.
4. Configure the parameters as follows for each enabled security mode:
●
Non Secure Station:
- Authentication Mode: None. The AP allows access to Stations without authentication.
Non secure station should be used only with WEP or 802.1x security mode.
- Cipher: None
●
WEP Station:
- Authentication Mode: None.
- Cipher: WEP
- Encryption Key 0, Encryption Key 1, Encryption Key 2, Encryption Key 3
- Encryption Transmit Key: select Key 0, Key 1, Key 2, or Key 3
●
802.1x Station:
- Authentication Mode: 802.1x
- Cipher: WEP
- Encryption Key Length: 64 or 128 Bits.
If 802.1x is enabled simultaneously with WEP, the 802.1x Station’s encryption key length
is determined by the WEP encryption key.
●
WPA Station:
- Authentication Mode: 802.1x
- Cipher: TKIP
●
WPA-PSK Station:
- Authentication Mode: PSK
- Cipher: TKIP
- PSK Passphrase: a user-defined phrase, consisting of 8 to 63 characters.
Avaya recommends that you use a passphrase of at least 13 characters, including both
letters and numbers, and upper and lower case characters to ensure that the generated
key cannot be easily deciphered by network infiltrators.
154 AP-4, AP-5, and AP-6 User Guide
Security Configuration
●
802.11i Station:
- Authentication Mode: 802.1x
- Cipher: AES
●
802.11i-PSK Station:
- Authentication Mode: PSK
- Cipher: AES
- PSK Passphrase: an 8-63 character user-defined phrase. Avaya recommends a
passphrase of at least 13 characters, including both letters and numbers, and upper and
lower case characters to ensure that the generated key cannot be easily deciphered by
network infiltrators.
5. When finished configuring all parameters, click OK.
6. If you selected a Security Mode of 802.1x Station, WPA Station, or 802.11i Station, you must
configure a RADIUS 802.1x/EAP server. See Configuring RADIUS Profiles on page 135.
Security Profile 1 will be used by default for all wireless interfaces.
7. For advanced VLAN configuration options, see Adding or Modifying an SSID/VLAN with
VLAN Protocol Disabled on page 155 and Adding or Modifying an SSID/VLAN with VLAN
Protocol Enabled on page 159.
8. Reboot the AP.
Wireless
Each SSID/VLAN can have its own Security Profile that defines its security mode,
authentication mechanism, and encryption, so that customers can have multiple types of clients
(non-WEP, WEP, 802.1x, WPA) on the same system, but separated per VLAN. See Security
Profiles on page 146 section for more information. These parameters can be configured from
the Wireless subtab.
Adding or Modifying an SSID/VLAN with VLAN Protocol Disabled
To add or modify an SSID/VLAN that has VLAN protocol disabled:
1. Click on SSID/VLAN/Security > Wireless.
This tab allows you to select the index of the SSID/VLAN to be added or edited. It also
allows you to configure the RADIUS Accounting and Authentication Status, the MAC ACL
Status, the Rekeying Interval, the Security Profile, and the RADIUS Server Profiles for the
VLAN.
2. Scroll down to the SSID and VLAN Data Table. See Figure 48.
Issue 2 November 2004
155
Performing Advanced Configuration
Figure 48: SSID and VLAN Data Table
3. Click Add to configure additional SSIDs, VLANs, and their associated security profiles and
RADIUS server profiles, or click Edit to modify an existing VLAN/SSID.
The Add Entry or Edit Entry screen appears. See Figure 49 and Figure 50.
Figure 49: SSID and VLAN Table - Add Entries Screen (VLAN Protocol Disabled)
156 AP-4, AP-5, and AP-6 User Guide
Security Configuration
Figure 50: SSID/VLAN Edit Entries Screen (VLAN Protocol Disabled)
4. Enter a unique Network Name (SSID), between 1 and 32 characters. This parameter is
mandatory.
5. Enter a unique VLAN ID. This parameter is mandatory.
●
You must specify a unique VLAN ID for each SSID on the interface. A VLAN ID is a
number from -1 to 4094. A value of -1 means that an entry is untagged.
●
You can set the VLAN ID to -1, or untagged, if you do not want clients that are using a
specific SSID to be members of a VLAN workgroup. Only one untagged VLAN ID is
allowed per interface.
●
The VLAN ID must match an ID used by your network; contact your network
administrator if you need assistance defining the VLAN IDs.
6. If editing an entry, enable or disable the VLAN using the Status drop-down menu. If adding
an entry, this field will not appear.
7. Click OK to return to the SSID, VLAN, and Security Data Configuration subtab. See
Figure 51.
Issue 2 November 2004
157
Performing Advanced Configuration
Figure 51: SSID, VLAN, and Security Data Configuration Subtab (VLAN Protocol Disabled)
8. Enable or disable RADIUS accounting in the Accounting Status drop-down menu.
9. Enable or disable RADIUS MAC authentication status in the RADIUS Authentication
Status drop-down menu.
158 AP-4, AP-5, and AP-6 User Guide
Security Configuration
10. Enable or disable MAC Access Control List status in the MAC ACL Status drop-down
menu.
11. Enter the Rekeying Interval in seconds. The default interval is 900 seconds.
12. Enter the Security Profile used by the VLAN in the Security Profile field. See Security
Profiles on page 146 for more information.
Note:
Note:
If you have two or more SSIDs per interface using a security Profile with a
security mode of Non Secure, be aware that security being applied in the VLAN is
not being applied in the wireless network.
13. Use the following fields to define the RADIUS Server Profile Configuration for the VLAN/
SSID:
●
RADIUS MAC Authentication Profile
●
RADIUS EAP Authentication Profile
●
RADIUS Accounting Profile
If 802.1x, WPA, or 802.11i security mode is used, the RADIUS EAP Authentication Profile
must have a value.
A RADIUS Server Profile for authentication for each VLAN must be configured as part of the
configuration options for that VLAN. RADIUS profiles are independent of VLANs. The user
can define any profile to be the default and associate all VLANs to that profile. Four profiles
are created by default: MAC Authentication, EAP Authentication, Accounting, and
Management.
14. Reboot the AP.
Adding or Modifying an SSID/VLAN with VLAN Protocol Enabled
To add or modify an SSID/VLAN that has VLAN protocol enabled:
1.Click on SSID/VLAN/Security > Wireless.
This tab allows you to select the index of the SSID/VLAN to be added or edited. It also
allows you to enable Security Per SSID, and configure the RADIUS Accounting and
Authentication Status, the MAC ACL Status, the Rekeying Interval, the Security Profile, and
the RADIUS Server Profiles for the VLAN.
2. Select the Enable Security Per SSID option. The screen will refresh as shown in Figure 52.
Issue 2 November 2004
159
Performing Advanced Configuration
Figure 52: SSID, VLAN, and Security Data Configuration Subtab (VLAN Protocol Enabled)
3. Click Add to configure additional SSIDs, VLANs, and their associated security profiles and
RADIUS server profiles, or click Edit to modify an existing VLAN/SSID.
The Add Entry or Edit Entry screen appears. See Figure 53 and Figure 54.
160 AP-4, AP-5, and AP-6 User Guide
Security Configuration
Figure 53: SSID, VLAN, and Security Table - Add Entries Screen (VLAN Protocol Enabled)
Issue 2 November 2004
161
Performing Advanced Configuration
Figure 54: SSID, VLAN, and Security Table - Edit Entries Screen (VLAN Protocol Enabled)
4. Enter a unique Network Name (SSID), between 1 and 32 characters. This parameter is
mandatory.
5. Enter a unique VLAN ID. This parameter is mandatory.
●
You must specify a unique VLAN ID for each SSID on the interface. A VLAN ID is a
number from -1 to 4094. A value of -1 means that an entry is untagged.
●
You can set the VLAN ID to -1, or, untagged, if you do not want clients that are using a
specific SSID to be members of a VLAN workgroup. Only one untagged VLAN ID is
allowed per interface.
●
The VLAN ID must match an ID used by your network; contact your network
administrator if you need assistance defining the VLAN IDs.
162 AP-4, AP-5, and AP-6 User Guide
Security Configuration
6. If editing an entry, enable or disable the VLAN using the VLAN Status drop-down menu. If
adding, this drop-down menu will not appear.
7. Enable or disable the SSID Authorization status from the drop-down menu.
SSID Authorization is the RADIUS based authorization of the SSID for a particular client.
The authorized SSIDs are sent as the tunnel attributes.
8. Enable or disable RADIUS accounting on the VLAN/SSID under the Accounting Status
drop-down menu.
9. Enable or disable RADIUS MAC authentication status on the VLAN/SSID under the
RADIUS Authentication Status drop-down menu.
10. Enable or disable MAC Access Control List status on the VLAN/SSID under the MAC ACL
Status drop-down menu.
11. Enter the Rekeying Interval in seconds. The default interval is 900 seconds.
12. Enter the Security Profile used by the VLAN in the Security Profile field.
Note:
Note:
If you have two or more SSIDs per interface using a security Profile with a
security mode of Non Secure, be aware that security being applied in the VLAN is
not being applied in the wireless network.
13. Use the following fields to define the RADIUS Server Profile Configuration for the VLAN/
SSID:
●
RADIUS MAC Authentication Profile
●
RADIUS EAP Authentication Profile
●
RADIUS Accounting Profile
If 802.1x, WPA, or 802.11i security mode is used, the RADIUS EAP Authentication Profile
must have a value.
A RADIUS Server Profile for authentication for each VLAN must be configured as part of the
configuration options for that VLAN. RADIUS profiles are independent of VLANs. The user
can define any profile to be the default and associate all VLANs to that profile. Four profiles
are created by default: MAC Authentication, EAP Authentication, Accounting, and
Management.
14. Reboot the AP.
Broadcast SSID and Closed System
Broadcast SSID allows the broadcast of a single SSID when the AP is configured for multiple
SSIDs. Broadcast SSID may only be enabled for a single SSID. This object can only be
configured using the CLI and SNMP using a MIB browser or network management application.
Closed System manages the way probe requests are handled. If enabled, the AP will respond
to probe requests with an SSID only if the client has specified the SSID in the probe request. If
the client sends a probe request with a null or “ANY” SSID, the AP will respond with a null SSID.
Issue 2 November 2004
163
Performing Advanced Configuration
If disabled, the AP will respond with each configured SSID, whether or not an SSID has been
specified in the probe request. This option is disabled by default.
To enable Closed System, click on Interfaces > Wireless-A or Wireless-B and check the
Enable Closed System box.
For more information, on Broadcast SSID and Closed System, see Technical Bulletin 69680 at
http://support.proxim.com.
164 AP-4, AP-5, and AP-6 User Guide
Chapter 5: Monitoring the AP
In This Chapter
●
Logging into the HTTP Interface on page 165
●
Version on page 168: Provides version information for the Access Point’s system
components.
●
ICMP on page 169: Displays statistics for Internet Control Message Protocol packets sent
and received by the AP.
●
IP/ARP Table on page 170: Displays the AP’s IP Address Resolution table.
●
Learn Table on page 171: Displays the list of nodes that the AP has learned are on the
network.
●
IAPP on page 172: Provides statistics for the Inter-Access Point Protocol messages sent
and received by the AP.
●
RADIUS on page 173: Provides statistics for the configured primary and backup RADIUS
server(s).
●
Interfaces on page 174: Displays the Access Point’s interface statistics (Wireless and
Ethernet).
●
Station Statistics on page 175: Displays statistics for stations and Wireless Distribution
System links.
Logging into the HTTP Interface
Once the AP has a valid IP Address and an Ethernet connection, you may use your web
browser to monitor network statistics.
The Command Line Interface (CLI) also provides a method for viewing network statistics using
Telnet or a serial connection. This section covers only use of the HTTP interface. For more
information about viewing network statistics with the CLI, see Appendix A: The Command Line
Interface.
Follow these steps to monitor an AP’s operating statistics using the HTTP interface:
1. Open a Web browser on a network computer.
Note:
Note:
The HTTP interface supports the following Web browser:
Issue 2 November 2004
165
Monitoring the AP
- Microsoft Internet Explorer 6 with Service Pack 1 or later
- Netscape 6.1 or later
2. If necessary, disable the Internet proxy settings. For Internet Explorer users, follow these
steps:
a. Select Tools > Internet Options....
b. Click the Connections tab.
c. Click LAN Settings....
d. If necessary, remove the check mark from the Use a proxy server box.
e. Click OK twice to save your changes and return to Internet Explorer.
3. Enter the Access Point’s IP address in the browser’s Address field and press Enter.
Result: The AP Enter Network Password screen appears. See Figure 55.
Figure 55: Enter Network Password Screen
4. Enter the HTTP password in the Password field and click OK. Leave the User Name field
blank. (By default, the HTTP password is “public”).
Result: The Monitor screen appears. See Figure 56.
166 AP-4, AP-5, and AP-6 User Guide
Logging into the HTTP Interface
Figure 56: Monitor Main Screen
5. Click the Monitor button located on the left-hand side of the screen.
6. Click the tab that corresponds to the statistics you want to review. For example, click Learn
Table to see the list of nodes that the AP has discovered on the network.
7. If applicable, click the Refresh button to update the statistics.
Issue 2 November 2004
167
Monitoring the AP
Version
From the HTTP interface, click the Monitor button and select the Version tab. See Figure 57.
The list displayed provides you with information that may be pertinent when calling Technical
Support. With this information, your Technical Support representative can verify compatibility
issues and make sure the latest software are loaded. This screen displays the following
information for each Access Point component:
●
Serial Number: The component’s serial number, if applicable.
●
Component Name
●
ID: The AP identifies a system component based on its ID. Each component has a unique
identifier.
●
Variant: Several variants may exist of the same component (for example, a hardware
component may have two variants, one with more memory than the other).
●
Version: Specifies the component’s version or build number. The Software Image version
is the most useful information on this screen for the typical end user.
Figure 57: Version Information Screen
168 AP-4, AP-5, and AP-6 User Guide
ICMP
ICMP
This tab provides statistical information for both received and transmitted messages directed to
the AP. See Figure 58. Not all ICMP traffic on the network is counted in the ICMP (Internet
Control Message Protocol) statistics.
Figure 58: ICMP Monitoring Screen
Issue 2 November 2004
169
Monitoring the AP
IP/ARP Table
This tab provides information based on the Address Resolution Protocol (ARP), which relates
MAC Address and IP Addresses. See Figure 59.
Figure 59: IP/ARP Table
170 AP-4, AP-5, and AP-6 User Guide
Learn Table
Learn Table
This tab displays information relating to network bridging. See Figure 60.It reports the MAC
address for each node that the device has learned is on the network and the interface on which
the node was detected. There can be up 10,000 entries in the Learn Table.
Figure 60: Learn Table
Issue 2 November 2004
171
Monitoring the AP
IAPP
This tab displays statistics relating to client handovers and communications between Avaya
Wireless Access Points. See Figure 61.
Figure 61: IAPP Screen
172 AP-4, AP-5, and AP-6 User Guide
RADIUS
RADIUS
This tab provides RADIUS authentication, EAP/802.1x authentication, and accounting
information for both the Primary and Backup RADIUS servers. See Figure 62.
Note:
Note:
RADIUS authentication and accounting must be enabled for this information to be
valid.
Figure 62: RADIUS Monitoring Screen
Issue 2 November 2004
173
Monitoring the AP
Interfaces
This tab displays statistics for the Ethernet and wireless interfaces. See Figure 63. The
Operational Status can be up, down, or testing.
Figure 63: Wireless Interface Monitoring
174 AP-4, AP-5, and AP-6 User Guide
Station Statistics
Station Statistics
This tab displays information on wireless clients attached to the AP and on Wireless Distribution
System links. See Figure 64.
Enabling and Viewing Station Statistics
To enable the monitoring of Stations Statistics, perform the following procedure:
1. Click on the Monitor tab on the left on the web page.
2. Click on the Station Statistics tab on the Monitor screen. See Figure 64.
Figure 64: Station Statistics Screen
3. Enable the Monitoring Station Statistics feature (Station Statistics are disabled by default) by
checking Enable Monitoring Station Statistics and click OK.
You do not need to reboot the AP for the changes to take effect. If clients are connected to the
device or WDS links are configured for the device, the statistics will now be shown on the
screen.
Issue 2 November 2004
175
Monitoring the AP
Refreshing Station Statistics
Click on the Refresh button in the browser window to view the latest statistics. If any new clients
associate to the AP, you can see the statistics of the new clients after you click the refresh
button.
Description of Station Statistics
The following stations statistics are displayed:
●
MAC Address: The MAC address of the wireless client for which the statistics are
gathered. For WDS links, this is the partner MAC address of the link.
●
IP Address: The IP address of the associated wireless station for which the Statistics are
gathered. (0.0.0.0 for WDS links)
●
Interface to which the Station is connected: The interface number on which the client is
connected with the AP. For WDS links this is the interface on which the link is configured.
●
Station Type: The type of wireless client (STA or WDS).
●
MAC Protocol: The MAC protocol for this wireless client (or WDS link partner). The
possible values are 802.11a, 802.11b, 802.11g
●
Signal / Noise: The Signal /Noise Level measured at the AP when frames are received
from the associated wireless station (or WDS link partner)
●
Time since Last Packet Received: The time elapsed since the last frame from the
associated wireless station (or WDS link partner) was received.
●
Number of Clients: The number of stations and WDS links monitored.
The following stations statistics are not displayed in the Graphical User Interface, but can be
viewed from a MIB browser:
●
Octets Received: The number of octets received from the associated wireless station (or
WDS link partner) by the AP.
●
Unicast Frames Received: The number of Unicast frames received from the associated
wireless station (or WDS link partner) by the AP.
●
Non-Unicast Frames Received: The number of Non-Unicast frames received (i.e.
broadcast or multicast) from the associated wireless station (or WDS link partner) by the
AP.
●
Octets Transmitted: The number of octets sent to the associated wireless station (or
WDS link partner) from the AP.
●
Unicast Frames Transmitted: The number of Unicast frames transmitted to the
associated wireless station (or WDS link partner) from the AP.
176 AP-4, AP-5, and AP-6 User Guide
Chapter 6: Performing Commands
In This Chapter
●
Logging into the HTTP Interface on page 177
●
Introduction to File Transfer by TFTP or HTTP on page 179: Describes the available file
transfer methods.
●
Updating the AP by Using TFTP on page 181: Describes how to download files from a
TFTP server to the AP.
●
Updating the AP by Using HTTP on page 182: Describes how to download files to the AP
by using HTTP.
●
Uploading AP Files by Using TFTP on page 184: Describes how to upload files from the
AP to a TFTP server.
●
Uploading AP Files by Using HTTP on page 186: Describes how to upload files from the
AP by using HTTP.
●
Rebooting the AP on page 188: Describes how to reboot the AP in the specified number of
seconds.
●
Resetting the AP on page 189: Describes how to reset all of the Access Point’s
configuration settings to factory defaults.
●
Help Link on page 190: Describes how to configure the location where the AP Help files
can be found.
Logging into the HTTP Interface
Once the AP has a valid IP Address and an Ethernet connection, you may use your web
browser to issue commands.
The Command Line Interface (CLI) also provides a method for issuing commands using Telnet
or a serial connection. This section covers only use of the HTTP Interface. For more information
about issuing commands with the CLI, see Appendix A: The Command Line Interface.
Follow these steps to view the available commands supported by the AP’s HTTP interface:
1. Open a Web browser on a network computer.
Note:
Note:
The HTTP interface supports the following Web browser:
Issue 2 November 2004
177
Performing Commands
- Microsoft Internet Explorer 6 with Service Pack 1 or later
- Netscape 6.1 or later
2. If necessary, disable the Internet proxy settings. For Internet Explorer users, follow these
steps:
a. Select Tools > Internet Options....
b. Click the Connections tab.
c. Click LAN Settings....
d. If necessary, remove the check mark from the Use a proxy server box.
e. Click OK twice to save your changes and return to Internet Explorer.
3. Enter the Access Point’s IP address in the browser’s Address field and press Enter.
Result: The Enter Network Password screen appears. See Figure 65.
Figure 65: Enter Network Password Screen
4. Enter the HTTP password in the Password field and click OK. Leave the User Name field
blank. (By default, the HTTP password is “public”).
Result: The System Status screen appears. See Figure 66.
178 AP-4, AP-5, and AP-6 User Guide
Introduction to File Transfer by TFTP or HTTP
Figure 66: Commands Main Screen
5. Click the Commands button located on the left-hand side of the screen.
6. Click the tab that corresponds to the command you want to issue. For example, click
Reboot to restart the unit.
Introduction to File Transfer by TFTP or HTTP
There are two methods of transferring files to or from the AP, TFTP or HTTP (or HTTPS if
enabled).
The following procedures describe downloading Configuration, AP Image, Bootloader, Private
Key, and Certificate files to the AP:
●
Updating the AP by Using TFTP on page 181
●
Updating the AP by Using HTTP on page 182
The following procedures describe uploading files from the AP:
●
Uploading AP Files by Using TFTP on page 184
●
Uploading AP Files by Using HTTP on page 186
Issue 2 November 2004
179
Performing Commands
TFTP File Transfer Guidelines
A TFTP server must be running and configured to point to the directory containing the file.
If you do not have a TFTP server installed on your system, install the TFTP server from the
Avaya Wireless CD.
HTTP File Transfer Guidelines
HTTP file transfer can be performed either with or without SSL enabled.
HTTP file transfers with SSL require enabling Secure Management and Secure Socket Layer.
HTTP transfers that use SSL may take additional time.
Note:
SSL requires Internet Explorer version 6, 128 bit encryption, Service Pack 1, and
patch Q323308.
Note:
Image Error Checking during File Transfer
The Access Point performs checks to verify that an image downloaded through HTTP or TFTP
is valid. The following checks are performed on the downloaded image:
●
Zero Image size
●
Large image size
●
Non VxWorks image
●
AP image
●
Digital signature verification
If any of the above checks fail on the downloaded image, the Access Point deletes the
downloaded image and retains the old image. Otherwise, if all checks pass successfully, the AP
deletes the old image and retains the downloaded image.
These checks ensure that the AP does not enter an invalid image state. The storage of the two
images is only temporary to ensure the proper verification; the two images are not stored in the
AP permanently.
Image error checking functions automatically in the background. No user configuration is
required.
180 AP-4, AP-5, and AP-6 User Guide
Updating the AP by Using TFTP
Updating the AP by Using TFTP
Use the Update AP via TFTP tab to download Configuration, AP Image, Bootloader files, and
Certificate and Private Key files to the AP. A TFTP server must be running and configured to
point to the directory containing the file.
If you do not have a TFTP server installed on your system, install the TFTP server from the
Avaya Wireless CD. You can either install the TFTP server from the CD Wizard or run
OEM-TFTP-Server.exe found in the CD’s Xtras/SolarWinds sub-directory.
1. Once on the Update AP screen, click on the via TFTP tab. See Figure 67.
The Update AP via TFTP tab shows version information and allows you to enter TFTP
information as described in the following steps.
Figure 67: Update AP via TFTP Command Screen
2. In the Server IP Address field, enter the TFTP server IP Address.
To locate the IP address assigned to the TFTP server, double-click the TFTP server icon on
your desktop.
Note:
Note:
This is the IP address that will be used to point the Access Point to the AP Image
file.
Issue 2 November 2004
181
Performing Commands
3. In the File Name field, enter the name of the file to be downloaded (including the file
extension).
Copy the updated AP Image file to the TFTP server’s root folder. The default AP Image is
located at C:/Program Files/Avaya_Wireless/AP600/.
4. In the File Type field, select the proper file type. Choices include:
●
Config: Configuration information, such as System Name, Contact Name, and so on.
●
Image: The AP Image (executable program).
●
UpgradeBSPBL: The Bootloader software.
●
SSL Certificate: The digital certificate for authentication in SSL communications.
●
SSL Private Key: The private key for encryption in SSL communications.
●
SSH Public Key: The public key in SSH communications. See Secure Shell (SSH) for
more information.
●
SSH Private Key: The private key in SSH communications. See Secure Shell (SSH) for
more information.
●
CLI Batch File: A CLI Batch file that contains CLI commands to configure the AP. This
file will be executed by the AP immediately after being uploaded. See CLI Batch File for
more information.
5. In the File Operation field, select either Update AP or Update AP & Reboot. You should
reboot the AP after downloading files.
Updating the AP by Using HTTP
Use the Update AP via HTTP tab to download Configuration, AP Image, Bootloader files, and
Certificate and Private Key files to the AP.
1. Once on the Update AP screen, click on the via HTTP tab.
The Update AP via HTTP tab shows version information and allows you to enter HTTP
information as described in the following steps.
182 AP-4, AP-5, and AP-6 User Guide
Updating the AP by Using HTTP
Figure 68: Update AP via HTTP Command Screen
2. Select the File Type that needs to be updated from the drop-down box. Choices include:
●
Config: Configuration information, such as System Name, Contact Name, and so on.
●
Image: The AP Image (executable program).
●
Upgrade BSPBL: The Bootloader software.
●
SSL Certificate: The digital certificate for authentication in SSL communications.
●
SSL Private Key: The private key for encryption in SSL communications.
●
SSH Public Key: The public key in SSH communications. See Secure Shell (SSH) for
more information.
●
SSH Private Key: The private key in SSH communications. See Secure Shell (SSH) for
more information.
●
CLI Batch File: A CLI Batch file that contains CLI commands to configure the AP. This
file will be executed by the AP immediately after being uploaded. See CLI Batch File for
more information.
Use the Browse button or manually type in the name of the file to be downloaded (including
the file extension) in the File Name field. If typing the file name, you must include the full
path and the file extension in the file name text box.
3. To initiate the HTTP Update operation, click the Update AP button.
The following message is displayed: You are updating Image file to the AP. You will need
to reboot the device for changes to take effect. Do you want to proceed?
Issue 2 November 2004
183
Performing Commands
4. Click OK to continue with the operation or Cancel to abort the operation.
Note:
Note:
An HTTP file transfer using SSL may take extra time.
If the operation completes successfully the following message is displayed: HTTP Update was
Successful.
If the operation does not complete successfully the following message appears, and the reason
for the failure is displayed: HTTP Update Error.
Uploading AP Files by Using TFTP
Use the Retrieve File via TFTP tab to upload configuration files, CLI Batch Files, or CLI Batch
Logs from the AP to a TFTP server. The TFTP server must be running and configured to point
to the directory to which you want to copy the uploaded file. We suggest you assign the file a
meaningful name, which may include version or location information.
If you do not have a TFTP server installed on your system, install the TFTP server from the
Avaya Wireless CD. You can either install the TFTP server from the CD Wizard or run
OEM-TFTP-Server.exe found in the CD’s Xtras/SolarWinds sub-directory.
To upload a file from the AP to a TFTP server:
1. Once on the Retrieve File screen, click on the via TFTP tab. See Figure 69.
The Retrieve AP via TFTP tab shows version information and allows you to enter TFTP
information as described in the following steps.
184 AP-4, AP-5, and AP-6 User Guide
Uploading AP Files by Using TFTP
Figure 69: Retrieve File via TFTP Command Screen
2. In the Server IP Address field, enter the TFTP server IP Address.
To locate the IP address assigned to the TFTP server, double-click the TFTP server icon on
your desktop.
3. In the File Name field, enter the name of the file to be uploaded.
4. In the File Type field, select the type of file to be uploaded: Config file, CLI Batch File, or
CLI Batch (Error) Log.
5. Click the Retrieve File button to initiate the upload of the file from the AP to the TFTP
server.
6. If you retrieved a Configuration file, update the file as necessary.
7. If you retrieved a CLI Batch File or CLI Batch Log, you can examine the file using a standard
text editor. For more information on CLI Batch Files, see CLI Batch File.
Note:
Note:
For information on how to download the file from the TFTP server to the AP, see
Updating the AP by Using TFTP on page 181.
Issue 2 November 2004
185
Performing Commands
Uploading AP Files by Using HTTP
Use the Retrieve File via HTTP tab to upload configuration files, CLI Batch Files, or CLI Batch
Logs from the AP to a destination on the network. For more information on CLI Batch Files and
CLI Batch Logs, see CLI Batch File.
1. Once on the Retrieve File screen, click the via HTTP tab. The Retrieve File via HTTP tab
shows version information. See Figure 70.
Figure 70: Retrieve File via HTTP Command Screen
2. In the File Type field, select the type of file (Config, CLI Batch File, or CLI Batch Log).
3. Click on the Retrieve File button to initiate this operation.
The AP displays the following message: You are retrieving Configuration file from the
AP. Do you want to proceed?
4. Click OK to continue with the operation or Cancel to abort the operation. The File Download
dialog box is displayed. See Figure 71.
186 AP-4, AP-5, and AP-6 User Guide
Uploading AP Files by Using HTTP
Figure 71: File Download Dialog Box
5. On clicking the Save button the following Save As window displays, where you are
prompted to choose the filename and location where the file is to be downloaded. See
Figure 72.
Issue 2 November 2004
187
Performing Commands
Figure 72: Retrieve File Save As Dialog
6. Select an appropriate filename and location and click OK.
Rebooting the AP
Use the Reboot tab to save configuration changes (if any) and reset the AP. See Figure 73.
Entering a value of 0 (zero) seconds causes an immediate reboot. Note that the Reset feature,
unlike the Reboot feature, does not save configuration changes. For information on the Reset
feature, see Resetting the AP on page 189.
! CAUTION:
CAUTION:
Rebooting the AP will cause all users who are currently connected to lose their
connection to the network until the AP has completed the restart process and
resumed operation.
188 AP-4, AP-5, and AP-6 User Guide
Resetting the AP
Figure 73: Reboot Command Screen
Resetting the AP
Use the Reset tab to restore the AP to factory default conditions. See Figure 74. The AP may
also be reset from the RESET button located on the side of the unit. Since this will reset the
Access Point’s current IP address, a new IP address must be assigned. See Recovery
Procedures on page 201 for more information.
! CAUTION:
CAUTION:
Resetting the AP to its factory default configuration will permanently overwrite all
changes that you have made to the unit. The AP will reboot automatically after
this command has been issued.
Issue 2 November 2004
189
Performing Commands
Figure 74: Reset to Factory Defaults Command Screen
Help Link
To open Help, click the Help button on any display screen. See Figure 75.
During initialization, the AP on-line help files are downloaded to the default location: C:/
Program Files/Avaya_Wireless/AP/HTML/index.htm.
Note:
Note:
Note:
Use the forward slash character (/) rather than the back slash character (\) when
configuring the Help Link location.
Note:
Add the AP’s management IP address to the Internet Explorer list of Trusted
Sites.
The Avaya Wireless AP Help information is available in English, French, German, Italian,
Spanish, and Japanese. The Help files are copied to your computer in one language only.
If you want to place these files on a shared drive, copy the Help Folder to the new location, and
then specify the new path in the Help Link box.
190 AP-4, AP-5, and AP-6 User Guide
Help Link
Figure 75: Help Link Configuration Screen
Issue 2 November 2004
191
Performing Commands
192 AP-4, AP-5, and AP-6 User Guide
Chapter 7: Troubleshooting the AP
In This Chapter
●
Troubleshooting Concepts on page 193
●
Symptoms and Solutions on page 194
●
Recovery Procedures on page 201
●
Related Applications on page 209
Note:
This section helps you locate problems related to the AP device setup. For details
about RADIUS, TFTP, serial communication programs (such as HyperTerminal),
Telnet applications, or web browsers, please refer to the documentation that
came with the application for assistance.
Note:
Troubleshooting Concepts
The following list identifies important troubleshooting concepts and topics. The most common
initialization and installation problems relate to IP addressing. For example, you must have valid
IP addresses for both the AP and the management computer to access the unit’s HTTP
interface.
●
IP Address management is fundamental.
●
Factory default units are set for “Dynamic” (DHCP) IP Address assignment. The
default IP address for the AP is 169.254.128.132 if your network does not have a DHCP
server. If you connect the AP to a network with an active DHCP server, then use ScanTool
to locate the IP address of your unit. If a DHCP server is not active on your subnet, then
use ScanTool to assign a static IP address to the unit.
●
The Trivial File Transfer Protocol (TFTP) provides a means to download and upload
files. These files include the AP Image (executable program) and configuration files.
●
If the AP password is lost or forgotten, you will need to reset to default values. The
Reset to Factory Default Procedure resets configuration, but does not change the current
AP Image.
●
If all else fails… Use the Forced Reload Procedure to erase the current AP Image and
then download a new image. Once the new image is loaded, use the Reset to Factory
Default Procedure to set the unit to factory default values and reconfigure the unit.
Issue 2 November 2004
193
Troubleshooting the AP
●
The AP Supports a Command Line Interface (CLI). If you are having trouble locating
your AP on the network, connect to the unit directly using the serial interface and refer to
Appendix A: The Command Line Interface for CLI command syntax and parameter names.
Symptoms and Solutions
Connectivity Issues
Connectivity issues include any problem that prevents you from powering up or connecting to
the AP:
●
AP Unit Will Not Boot - No LED Activity
●
Serial Link Does Not Work
●
Ethernet Link Does Not Work
AP Unit Will Not Boot - No LED Activity
If the AP unit will not boot:
1. Make sure your power source is operating.
2. Make sure all cables are connected to the AP correctly.
3. If you are using Active Ethernet, make sure you are using a Category 5, foiled, twisted pair
cable to power the AP.
Serial Link Does Not Work
If the serial link does not work:
1. Make sure you are using a standard, straight-through, 9-pin serial cable.
2. Double-check the physical network connections.
3. Make sure your PC terminal program (such as HyperTerminal) is active and configured to
the following values:
●
Com Port: (COM1, COM2, etc. depending on your computer);
●
Baud rate: 9600; Data bits: 8; Stop bits: 1; Flow Control: None; Parity: None;
●
Line Feeds with Carriage Returns, (In HyperTerminal select:
File -> Properties -> Settings -> ASCII Setup -> Send Line Ends with Line Feeds)
194 AP-4, AP-5, and AP-6 User Guide
Symptoms and Solutions
Ethernet Link Does Not Work
If the ethernet link does not work:
1. Double-check the physical network connections. Use a known-good unit to make sure the
network connection is present. Once you have the AP IP address, you can use the “Ping”
command over Ethernet to test the IP Address. If the AP responds to the Ping, then the
Ethernet Interface is working properly.
2. By default, the Access Point will attempt to automatically detect the Ethernet settings.
However, if you are having problems with the Ethernet link, manually configure the
Access Point’s Ethernet settings. For example, if your switch operates at 100 Mbits/sec/Full
Duplex, manually configure the Access Point to use these settings (see Ethernet Interface
Configuration on page 93). If you cannot access the unit over Ethernet, then use the CLI
interface over the serial port to configure the Ethernet port (see Appendix A: The Command
Line Interface).
3. Perform network infrastructure troubleshooting (check switches, routers, etc.).
Basic Software Setup and Configuration Problems
●
Lost AP, Telnet, or SNMP Password
●
Client Computer Cannot Connect
●
AP Has Incorrect IP Address
●
HTTP (browser) or Telnet Interface Does Not Work
●
HTML Help Files Do Not Appear
●
Telnet CLI Does Not Work
●
TFTP Server Does Not Work
Lost AP, Telnet, or SNMP Password
Perform the Reset to Factory Default Procedure on page 201. This procedure resets system
and network parameters, but does not affect the AP Image.
The default AP HTTP password is “public”, and the default Telnet password is also “public”.
Client Computer Cannot Connect
If a client computer cannot connect to the AP:
1. Client computers should have the same Network Name and security settings as the AP.
2. Network Names should be allocated and maintained by the Network Administrator.
Issue 2 November 2004
195
Troubleshooting the AP
3. Refer to the documentation that came with your client card for additional troubleshooting
suggestions.
AP Has Incorrect IP Address
If the AP has an incorrect IP address:
1. Default IP Address Assignment mode is dynamic (DHCP). If you do not have a DHCP
server on your network, the default IP Address is 169.254.128.132. If you have more than
one uninitialized AP connected to the network, they will all have the same default IP
address and you will not be able to communicate with them (due to an IP address conflict).
In this case, assign each AP a static IP address via the serial cable or turn off all units but
one and change the IP address using ScanTool one at a time.
2. The AP only contacts a DHCP server during boot-up. If your network’s DHCP server is not
available while the AP is booting, the device will retain the last IP Address it had. Reboot the
AP once your DHCP server is on-line again or use the ScanTool to find the Access Point’s
current IP address.
3. To find the unit’s current IP address if using DHCP, open the IP Client Table in the DHCP
Server and match the Access Point’s IP address to its MAC address (found on the product
label). Alternatively, use ScanTool to identify an Access Point’s current IP address.
4. Once you have the current IP address, use the HTTP or CLI Interface to change the unit’s
IP settings, if necessary.
5. If you use static IP Address assignments, and cannot access the unit over Ethernet, use the
Initializing the IP Address using CLI procedure. Once the IP Address is set, you can use the
Ethernet Interface to complete configuration.
6. Perform the Reset to Factory Default Procedure in this guide. This will reset the unit to
“DHCP” mode. If there is a DHCP Server on the network, the DHCP Server will assign an IP
Address to the AP.
HTTP (browser) or Telnet Interface Does Not Work
If a Web browser or Telnet interface does not work:
1. Make sure you are using a compatible browser:
●
Microsoft Internet Explorer 6 with Service Pack 1 or later
●
Netscape 6.1 or later
2. Make sure you have the proper IP address. Enter your Access Point’s IP Address in the
browser address bar, similar to this example:
http://192.168.1.100
When the Enter Network Password window appears, leave the User Name field empty and
enter the HTTP password in the Password field. The default HTTP password is “public”.
196 AP-4, AP-5, and AP-6 User Guide
Symptoms and Solutions
3. Use the CLI over the serial port to check the IP Access Table, which can be restricting
access to Telnet and HTTP.
HTML Help Files Do Not Appear
If the AP’s HTML Help files are not displayed:
1. Verify that the HTML Help files are installed in the default directory:
C:\Program Files\Avaya_Wireless\AP\HTML\
2. If the Help files are not located in this folder, contact your network administrator to find out
where the Help files are located on your server.
3. Perform the following steps to verify the location or to enter the path name for the Help files:
a. Click the Commands button in the HTTP interface.
b. Select the Help tab located at the top of the screen.
c. Enter the path name where the Help files are located in the Help Link box.
d. Click OK when finished.
Telnet CLI Does Not Work
If you cannot establish a Telnet CLI session:
1. Make sure you have the proper IP Address. Enter your AP IP address in the Telnet
connection dialog, from a DOS prompt, type:
C:\> telnet <AP IP Address>
2. Confirm that your computer has an IP address in the same IP subnet as your Access Point.
3. Use the CLI over the serial port to check the IP Access Table, which can be restricting
access to Telnet and HTTP.
TFTP Server Does Not Work
If a TFTP server does not work:
1. Make sure the TFTP Server has been started.
2. Verify the IP address of the TFTP Server. The server may be local or remote, so long as it
has a valid IP address.
3. Configure the TFTP Server to “point” to the folder containing the file to be downloaded (or to
the folder in which the file is to be uploaded).
4. Verify that you have entered the proper AP Image file name (including the file extension)
and directory path.
5. If you have a problem uploading a file, verify that the TFTP server is configured to allow
uploads (typically the default setting is to allow only downloads).
Issue 2 November 2004
197
Troubleshooting the AP
Client Connection Problems
●
Client Software Finds No Connection
●
Client PC Card Does Not Work
●
Intermittent Loss of Connection
●
Client Does Not Receive an IP Address - Cannot Connect to Internet
Client Software Finds No Connection
Make sure you have configured your client software with the proper Network Name and
Security settings. Network Names and WEP Keys are typically allocated and maintained by
your network administrator.
Client PC Card Does Not Work
If a client PC Card does not work:
1. Make sure you are using the latest PC Card driver software.
2. Download and install the latest Avaya Wireless client software from http://www.avaya.com/
support.
Intermittent Loss of Connection
If a client has an intermittent loss of connection:
1. Make sure you are within range of an active AP.
2. You can check the signal strength using the signal strength gauge on your client software.
Client Does Not Receive an IP Address - Cannot Connect to Internet
If a client does not receive an IP address:
1. If the AP is configured as a DHCP server, open the Web-browser Interface and select the
Configure button and then the Network tab to make sure the proper DHCP settings are
being used.
2. If you are not using the DHCP server feature on the AP, then make sure that your local
DHCP server is accessible from the Access Point’s subnet.
3. From the client computer, use the “ping” network command to test the connection with the
AP. If the AP responds, but you still cannot connect to the Internet, there may be a physical
network configuration problem (contact your network support staff).
198 AP-4, AP-5, and AP-6 User Guide
Symptoms and Solutions
4. If using Active Ethernet, make sure you are not using a crossover Ethernet cable between
the AP and the hub.
VLAN Operation Issues
●
Verifying Proper Operation of the VLAN Feature
●
VLAN Workgroups
Verifying Proper Operation of the VLAN Feature
The correct VLAN configuration can be verified by “pinging” both wired and wireless hosts from
both sides of the AP device and the network switch. Traffic can be “sniffed” on both the wired
(Ethernet) and wireless (WDS) backbones (if configured). Bridge frames generated by wireless
clients and viewed on one of the backbones should contain IEEE 802.1Q compliant VLAN
headers or tags. The VLAN ID in the headers should correspond to one of the VLAN User IDs
configured for the AP.
Note:
Sixteen VLAN/SSID pairs are available for the AP-6, and APs that have an
802.11a/b/g or 802.11b/g Upgrade Kit installed. The AP-5 and AP-4 support only
one VLAN/SSID pair.
Note:
VLAN Workgroups
The correct VLAN assignment can be verified by pinging the AP to ensure connectivity, by
pinging the switch to ensure VLAN properties, and by pinging hosts past the switch to confirm
the switch is functional. Ultimately, traffic can be “sniffed” on the Ethernet or WDS interfaces (if
configured) using third-party packages. Most problems can be avoided by ensuring that 802.1Q
compliant VLAN tags containing the proper VLAN ID have been inserted in the bridged frames.
The VLAN ID in the header should correspond to the user’s assigned network name.
What if network traffic is being directed to a nonexistent host?
●
All sessions are disconnected, traffic is lost, and a manual override is necessary
●
Workaround: you can configure the switch to mimic the nonexistent host
I have just configured the Management ID and now I can't manage the AP?
Check to ensure your password is correct. If your password is incorrect or all inbound packets
do NOT have the correct tag, then a manual override is necessary.
! CAUTION:
CAUTION:
The manual override process disconnects all users and resets all values to
factory defaults.
Issue 2 November 2004
199
Troubleshooting the AP
Active Ethernet (AE)
●
The AP Does Not Work
●
There Is No Data Link
●
“Overload” Indications
The AP Does Not Work
If the AP does not work:
1. Verify that you are using a standard UTP Category 5 cable.
2. Try a different port on the same AE hub (remember to move the input port accordingly) – if it
works, there is probably a faulty port or bad RJ-45 port connection.
3. If possible, try to connect the AP to a different AE hub.
4. Try using a different Ethernet cable – if it works, there is probably a faulty connection over
the long cable, or a bad RJ-45 connection.
5. Check power plug and hub.
6. If the Ethernet link goes down, check the cable, cable type, switch, and hub.
There Is No Data Link
If there is no data link:
1. Verify that the indicator for the port is “on.”
2. Verify that the AE hub is connected to the Ethernet network with a good connection.
3. Verify that the Ethernet cable is Category 5 or better and is less than 100 meters
(approximately 325 feet) in length from the Ethernet source to the AP.
4. Try to connect a different device to the same port on the AE hub – if it works and a link is
established, there is probably a faulty data link in the AP.
5. Try to re-connect the AP to a different output port (remember to move the input port
accordingly) – if it works, there is probably a faulty output or input port in the AE hub or a
bad RJ-45 connection.
“Overload” Indications
If you observe indications of overload:
1. Verify that you are not using a cross-over cable between the AE output port and the AP.
2. Verify that there is no short over any of the twisted pair cables.
200 AP-4, AP-5, and AP-6 User Guide
Recovery Procedures
3. Move the device into a different output port – if it works, there is probably a faulty port or bad
RJ-45 connection.
Recovery Procedures
The most common installation problems relate to IP addressing. For example, without the TFTP
server IP Address, you will not be able to download a new AP Image to the AP. IP Address
management is fundamental. We suggest you create a chart to document and validate the IP
addresses for your system.
If the password is lost or forgotten, you will need to reset the AP to default values. The Reset to
Factory Default Procedure resets configuration settings, but does not change the current AP
Image.
If the AP has a corrupted software image, follow the Forced Reload Procedure to erase the
current AP Image and download a new image.
Reset to Factory Default Procedure
Use this procedure to reset the network configuration values, including the Access Point’s IP
address and subnet mask. The current AP Image is not deleted. Follow this procedure if you
forget the Access Point’s password:
1. Press and hold the RELOAD button for 10 seconds.
Note:
Note:
See RELOAD and RESET Buttons to identify the buttons. You need to use a pin
or the end of a paperclip to press a button.
Result: The AP reboots, and the factory default network values are restored.
2. If not using DHCP, use the ScanTool or CLI over a serial connection to set the IP address,
subnet mask, and other IP parameters. See Appendix A: The Command Line Interface for
CLI information.
Issue 2 November 2004
201
Troubleshooting the AP
Figure 76: RELOAD and RESET Buttons
RESET
RELOAD
Forced Reload Procedure
Use this procedure to erase the current AP Image and download a new AP Image. In some
cases, specifically when a missing or corrupted AP Image prevents successful booting, you
may need to use ScanTool or the Bootloader CLI to download a new executable AP Image.
Note:
Note:
This does not delete the AP’s configuration (in other words, the Forced Reload
Procedure does not reset to device to factory defaults). If you need to force the
AP to the factory default state after loading a new AP image, use the Reset to
Factory Default Procedure above.
For this procedure, you will first erase the AP Image currently installed on the unit and then use
either ScanTool or the Bootloader CLI (over the serial port) to set the IP address and download
a new AP Image. Follow these steps:
1. While the unit is running, press the RESET button.
202 AP-4, AP-5, and AP-6 User Guide
Recovery Procedures
Note:
Note:
See RELOAD and RESET Buttons to identify the buttons. You need to use a pin
or the end of a paperclip to press a button.
Result: The AP reboots and the indicators begin to flash.
! CAUTION:
CAUTION:
By completing Step 2, the firmware in the AP will be erased. You will need an
Ethernet connection, a TFTP server, and a serial cable (if using the Bootloader
CLI) to reload firmware.
2. Press and hold the RELOAD button for about 20 seconds until the POWER LED turns
amber.
Result: The AP deletes the current AP Image.
3. Follow one of the procedures below to load a new AP Image to the Access Point:
— Download a New Image Using ScanTool
— Download a New Image Using the Bootloader CLI
Download a New Image Using ScanTool
To download the AP Image, you will need an Ethernet connection to the computer on which the
TFTP server resides and to a computer that is running ScanTool (this is either two separate
computers connected to the same network or a single computer running both programs).
ScanTool detects if an Access Point does not have a valid software image installed. In this case,
the TFTP Server and Image File Name parameters are enabled in the ScanTool’s Change
screen so you can download a new image to the unit. (These fields are grayed out if ScanTool
does not detect a software image problem.)
Preparing to Download the AP Image
Before starting, you need to know the Access Point’s IP address, subnet mask, the TFTP
Server IP Address, and the AP Image file name. Make sure the TFTP server is running and
configured to point to the folder containing the image to be downloaded.
Download Procedure
Follow these steps to use ScanTool to download a software image to an Access Point with a
missing image:
1. Download the latest software from http://www.avaya.com/support.
2. Copy the latest software updates to your TFTP server.
3. Launch ScanTool.
4. Highlight the entry for the AP you want to update and click Change.
5. Set IP Address Type to Static.
Issue 2 November 2004
203
Troubleshooting the AP
Note:
Note:
You need to assign static IP information temporarily to the Access Point since its
DHCP client functionality is not available when no image is installed on the
device.
6. Enter an unused IP address that is valid on your network in the IP Address field. You may
need to contact your network administrator to get this address.
7. Enter the network’s Subnet Mask in the field provided.
8. Enter the network’s Gateway IP Address, if necessary. You may need to contact your
network administrator to get this address. You should only need to enter the default
gateway address if the Access Point and the TFTP server are separated by a router.
9. Enter the IP address of your TFTP server in the field provided.
10. Enter the Image File Name (including the file extension). Enter the full directory path and
file name. If the file is located in the default TFTP directory, you need enter only the file
name.
11. Click OK.
Result: The Access Point will reboot and the download will begin automatically. You should
see downloading activity begin after a few seconds within the TFTP server’s status screen.
12. Click OK when prompted that the device has been updated successfully to return to the
Scan List screen.
13. Click Cancel to close the ScanTool.
14. When the download process is complete, configure the AP as described in Chapter
2: Getting Started and Chapter 4: Performing Advanced Configuration.
Download a New Image Using the Bootloader CLI
To download the AP Image, you will need an Ethernet connection to the computer on which the
TFTP server resides. This can be any computer on the LAN or connected to the AP with a
cross-over Ethernet cable.
You must also connect the AP to a computer with a standard serial cable and use a terminal
client, such as HyperTerminal. From the terminal, enter CLI Commands to set the IP address
and download an AP Image.
Preparing to Download the AP Image
Before starting, you need to know the Access Point’s IP address, subnet mask, the TFTP
Server IP Address, and the AP Image file name. Make sure the TFTP server is running and
configured to point to the folder containing the image to be downloaded.
204 AP-4, AP-5, and AP-6 User Guide
Recovery Procedures
Download Procedure
1. Download the latest software from http://www.avaya.com/support.
2. Copy the latest software updates to your TFTP server’s default directory.
3. Use a straight-through serial cable to connect the Access Point’s serial port to your
computer’s serial port.
4. You must remove the Access Point’s cable cover and front cover to access the serial port.
5. Open your terminal emulation program (like HyperTerminal) and set the following
connection properties:
●
Com Port: <COM1, COM2, etc., depending on your computer>
●
Baud rate: 9600
●
Data Bits: 8
●
Stop bits: 1
●
Flow Control: None
●
Parity: None
6. Under File -> Properties -> Settings -> ASCII Setup, enable the Send line ends with line
feeds option.
Result: HyperTerminal sends a line return at the end of each line of code.
7. Press the RESET button on the AP.
Result: The terminal display shows Power On Self Tests (POST) activity. After
approximately 30 seconds, a message indicates: Sending Traps to SNMP manager
periodically. After this message appears, press the ENTER key repeatedly until the
following prompt appears:
[Device-Name]>
Issue 2 November 2004
205
Troubleshooting the AP
8. Enter only the following statements:
[Device-Name]> set ipaddrtype static
[Device-Name]> set ipaddr <Access Point IP Address>
[Device-Name]> set ipsubmask <IP Mask>
[Device-Name]> set tftpipaddr <TFTP Server IP Address>
[Device-Name]> set tftpfilename <AP Image File Name, including file extension>
[Device-Name]> set ipgw <Gateway IP Address>
[Device-Name]> show ip (to confirm your new settings)
[Device-Name]> show tftp (to confirm your new settings)
[Device-Name]> reboot 0
Example:
[Device-Name]> set ipaddrtype static
[Device-Name]> set ipaddr 10.0.0.12
[Device-Name]> set ipsubmask 255.255.255.0
[Device-Name]> set tftpipaddr 10.0.0.20
[Device-Name]> set tftpfilename MyImage.bin
[Device-Name]> set ipgw 10.0.0.30
[Device-Name]> show ip
[Device-Name]> show tftp
[Device-Name]> reboot 0
Result: The AP will reboot and then download the image file. You should see downloading
activity begin after a few seconds within the TFTP server’s status screen.
9. When the download process is complete, configure the AP as described in Chapter
2: Getting Started and Chapter 4: Performing Advanced Configuration.
Setting IP Address using Serial Port
Use the following procedure to set an IP address over the serial port using the CLI. The network
administrator typically provides the AP IP address.
Hardware and Software Requirements
●
Standard straight-through serial data (RS-232) cable with a one male DB-9 connector and
one female DB-9 connector. The AP comes with a female 9-pin serial port.
206 AP-4, AP-5, and AP-6 User Guide
Recovery Procedures
●
ASCII Terminal software, such as HyperTerminal.
Attaching the Serial Port Cable
To attach the serial port cable:
1. Unlock and remove the cable cover from the AP.
2. Remove the front cover from the AP to reveal the serial port.
3. Connect one end of the serial cable to the AP and the other end to a serial port on your
computer.
4. Power on the computer and AP, if necessary.
Initializing the IP Address using CLI
After installing the serial port cable, you may use the CLI to communicate with the AP. CLI
supports most generic terminal emulation programs, such as HyperTerminal (which is included
with the Windows operating systems). In addition, many web sites offer shareware or
commercial terminal programs you can download. Once the IP address has been assigned, you
can use the HTTP interface or the CLI over Telnet to complete configuration.
Follow these steps to assign the AP an IP address:
1. Open your terminal emulation program (like HyperTerminal) and set the following
connection properties:
●
Com Port: <COM1, COM2, etc., depending on your computer>
●
Baud rate: 9600
●
Data Bits: 8
●
Stop bits: 1
●
Flow Control: None
●
Parity: None
2. Under File -> Properties -> Settings -> ASCII Setup, enable the Send line ends with line
feeds option.
Result: HyperTerminal sends a line return at the end of each line of code.
3. Press the RESET button on the AP (see RELOAD and RESET Buttons to identify the
location of the RESET button).
Result: The terminal display shows Power On Self Tests (POST) activity, and then displays
a CLI prompt, similar to the example below. This process may take up to 90 seconds.
[Device-Name]> Please enter password:
Issue 2 November 2004
207
Troubleshooting the AP
4. Enter the CLI password (default is public).
Result: The terminal displays a welcome message and then the CLI Prompt:
[Device-Name]>
5. Enter show ip. Result: Network parameters appear:
Figure 77: Result of “show ip” CLI Command
6. Change the IP address and other network values using set and reboot CLI commands,
similar to the example below (use your own IP address and subnet mask). Note that IP
Address Type is set to Dynamic by default. If you have a DHCP server on your network, you
should not need to manually configure the Access Point’s IP address; the Access Point will
obtain an IP address from the network’s DHCP server during boot-up.
Result: After each entry the CLI reminds you to reboot; however wait to reboot until all
commands have been entered.
[Device-Name]> set ipaddrtype static
[Device-Name]> set ipaddr <IP Address>
[Device-Name]> set ipsubmask <IP Subnet Mask>
[Device-Name]> set ipgw <Default Gateway IP Address>
[Device-Name]> show ip (to confirm your new settings)
[Device-Name]> reboot 0
7. After the AP reboots, verify the new IP address by reconnecting to the CLI and enter a
show ip command. Alternatively, you can ping the AP from a network computer to confirm
that the new IP address has taken effect.
8. When the proper IP address is set, use the HTTP interface or CLI over Telnet to configure
the rest of the unit’s operating parameters.
208 AP-4, AP-5, and AP-6 User Guide
Related Applications
Related Applications
RADIUS Authentication Server
If you enabled RADIUS Authentication on the AP, make sure that your network’s RADIUS
servers are operational. Otherwise, clients will not be able to log in. There are several reasons
the authentication server services might be unavailable, here are two typical things to check:
●
Make sure you have the proper RADIUS authentication server information setup
configured in the AP. Check the RADIUS Authentication Server’s Shared Secret and
Destination Port number (default is 1812; for RADIUS Accounting, the default is 1813).
●
Make sure the RADIUS authentication server RAS setup matches the AP.
TFTP Server
The “Trivial File Transfer Protocol” (TFTP) server allows you to transfer files across a network.
You can upload configuration files from the AP for backup or copying, and you can download
configuration files or new software images. The TFTP software is located on the Avaya Wireless
AP Installation CD-ROM.
If a TFTP server is not configured and running, you will not be able to download and upload
images and configuration files to/from the AP. Remember that the TFTP server does not have to
be local, so long as you have a valid TFTP IP address. Note that you do not need a TFTP
server running unless you want to transfer files to or from the AP.
After the TFTP server is installed:
●
Check to see that TFTP is configured to point to the directory containing the AP Image.
●
Make sure you have the proper TFTP server IP Address, the proper AP Image file name,
and that the TFTP server is connected.
●
Make sure the TFTP server is configured to both send and receive, with no time-out.
Issue 2 November 2004
209
Troubleshooting the AP
210 AP-4, AP-5, and AP-6 User Guide
Appendix A: The Command Line Interface
In This Appendix
This section describes the AP’s Command Line (CLI) Interface. CLI commands can be used to
initialize, configure, and manage the Access Point.
CLI commands may be entered in real time through a keyboard or submitted with CLI scripts.
After entering commands, press the Enter key to execute the command.
A CLI Batch file is a user-editable configuration file that provides a user-friendly way to change
the AP configuration through a file upload. The CLI Batch file is an ASCII file that facilitates Auto
Configuration because it does not require the user to access one of the AP’s management
interfaces to make configuration changes as is required with the proprietary TLV format
configuration file.
The CLI is available through both the Serial Port interface and over the Ethernet interface using
Telnet.
Note:
All CLI commands and parameters are case-sensitive.
Note:
This appendix contains the following sections:
●
General Notes on page 213
●
Bootloader CLI on page 216
●
CLI Conventions on page 218
●
CLI Help on page 220
●
Accessing the AP CLI on page 224
●
CLI Commands on page 226
●
Parameter Tables on page 236
●
Auto Configuration Commands on page 236
●
DHCP Server Commands on page 238
●
DNS Client Commands on page 240
●
Ethernet Interface Commands on page 241
●
Filtering Commands on page 243
●
Hardware Configuration Reset Commands on page 248
●
HTTP and HTTPS Commands on page 249
●
IAPP Commands on page 251
Issue 2 November 2004
211
The Command Line Interface
●
Intra BSS Commands on page 252
●
Inventory Management Commands on page 253
●
IP Access Table Commands on page 253
●
IP Commands on page 255
●
Link Integrity Commands on page 256
●
MAC Access Control Commands on page 258
●
Monitoring Parameters on page 259
●
Packet Forwarding Commands on page 260
●
RAD Commands on page 261
●
RADIUS Commands on page 262
●
RADIUS-Based Management Access Commands on page 266
●
Secure Management Commands on page 267
●
Security Profile Commands on page 268
●
Serial Port Commands on page 271
●
SNMP Commands on page 272
●
Spanning Tree Commands on page 275
●
SpectraLink VoIP Commands on page 276
●
SSH Commands on page 278
●
Storm Threshold Commands on page 279
●
Syslog Commands on page 280
●
System Information Commands on page 282
●
Telnet Commands on page 284
●
TFTP Commands on page 286
●
WDS Commands on page 287
●
802.11a Wireless Interface Commands on page 288
●
802.11b Wireless Interface Commands on page 292
●
802.11b/g Wireless Interface Commands on page 297
●
Wireless Interface SSID/VLAN/Profile Commands on page 302
●
VLAN/SSID Pair Commands on page 304
●
CLI Batch File on page 305
212 AP-4, AP-5, and AP-6 User Guide
General Notes
General Notes
Prerequisite Skills and Knowledge
To use this document effectively, you should have a working knowledge of Local Area
Networking (LAN) concepts, network access infrastructures, and client-server relationships. In
addition, you should be familiar with software setup procedures for typical network operating
systems and servers.
Notation Conventions
●
Computer prompts are shown as constant width type. For example: [Device-Name]>
●
Information that you input as shown is displayed in bold type. For example:
[Device-Name]> set ipaddr 10.0.0.12
●
The names of keyboard keys, software buttons, and field names are displayed in bold
type. For example: Click the Configure button.
●
Screen names have initial capital letters. For example, the System Status screen.
Important Terminology
Table 1 contains important terminology that is used in this appendix.
Table 1: Important Terminology
Term
Description
Configuration Files
Database files containing the current Access Point configuration.
Configuration items include the IP Address and other network-specific
values. Config files may be downloaded to the Access Point or uploaded for
backup or troubleshooting.
Download vs. Upload
Downloads transfer files to the Access Point. Uploads transfer files from the
Access Point. The TFTP server performs file transfers in both directions.
Group
A logical collection of network parameter information. For example, the
System Group is composed of several related parameters.
1 of 2
Issue 2 November 2004
213
The Command Line Interface
Table 1: Important Terminology
Term
Description
Groups can also
contain Tables.
All items for a given Group can be displayed with a show <Group> CLI
Command.
Image File
The Access Point software executed from RAM. To update an Access Point
you typically download a new Image File. This file is often referred to as the
“AP Image”.
Parameter
A fundamental network value that can be displayed and may be changeable.
For example, the Access Point must have a unique IP Address and the
Wireless interface must be assigned an SSID. Change parameters with the
CLI set Command, and view them with the CLI show Command.
Table
Tables hold parameters for several related items. For example, you can add
several potential managers to the SNMP Table. All items for a given Table
can be displayed with a show <Table> CLI Command.
TFTP
Refers to the TFTP Server, used for file transfers.
2 of 2
Navigation and Special Keys
Table 2 lists the supported navigation and special key functions to move the cursor along the
prompt line.
Table 2: Navigation and Special Keys
Key Combination
Operation
Delete or Backspace
Delete previous character
Ctrl-A
Move cursor to beginning of line
Ctrl-E
Move cursor to end of line
Ctrl-F
Move cursor forward one character
Ctrl-B
Move cursor back one character
Ctrl-D
Delete the character the cursor is on
Ctrl-U
Delete all text to left of cursor
Ctrl-P
Go to the previous line in the history buffer
Ctrl-N
Go to the next line in the history buffer
1 of 2
214 AP-4, AP-5, and AP-6 User Guide
General Notes
Table 2: Navigation and Special Keys
Key Combination
Operation
Tab
Complete the command line
?
List available commands
2 of 2
CLI Error Messages
Table 3 describes the error messages associated with improper inputs or expected CLI
behavior.
Table 3: Error Message Descriptions
Error Message
Description
Syntax Error
Invalid syntax entered at the command prompt.
Invalid Command
A non-existent command has been entered at the command prompt.
Invalid Parameter
Name
An invalid parameter name has been entered at the command prompt.
Invalid Parameter
Value
An invalid parameter value has been entered at the command prompt.
Invalid Table Index
An invalid table index has been entered at the command prompt.
Invalid Table
Parameter
An invalid table parameter has been entered at the command prompt.
Invalid Table
Parameter Value
An invalid table parameter value has been entered at the command
prompt.
Read Only
Parameter
User is attempting to configure a read-only parameter.
Incorrect Password
An incorrect password has been entered in the CLI login prompt.
Download
Unsuccessful
The download operation has failed due to incorrect TFTP server IP
Address or file name.
Upload
Unsuccessful
The upload operation has failed due to incorrect TFTP server IP
Address or file name.
Issue 2 November 2004
215
The Command Line Interface
Bootloader CLI
Administrators use the CLI to control Access Point operation and monitor network statistics. The
AP supports two types of CLI: the Bootloader CLI and the normal CLI. The Bootloader CLI
provides a limited command set, and is used to perform initial configuration of the AP when the
current AP image is bad or missing. The Bootloader CLI allows you to assign an IP Address and
download a new image. Once the image is downloaded and running, the Access Point uses the
normal CLI. This guide covers the normal CLI unless otherwise specified.
The Bootloader CLI is accessible via the serial interface only if the AP does not contain a
software image or a download image command over TFTP has failed.
The Bootloader CLI provides you with the ability to configure the initial setup parameters as well
as download a software image to the device.
The following functions are supported by the Bootloader CLI:
●
set command to configure the device’s initial parameters
●
show command to view the device’s configuration parameters
●
help command to provide additional information on all commands supported by the
Bootloader CLI
●
reboot command to reboot the device
●
The parameters supported by the Bootloader CLI (for viewing and modifying) are:
●
System Name
●
IP Address Assignment Type
●
IP Address
●
IP Mask
●
Gateway IP Address
●
TFTP Server IP Address
●
Image File Name (including the file extension)
Figure 1 shows the results of using the help command in the Bootloader CLI:
216 AP-4, AP-5, and AP-6 User Guide
Bootloader CLI
Figure 1: Results of “help” bootloader CLI command
Figure 2 shows the results of using the show command in the Bootloader CLI:
Figure 2: Results of “show” bootloader CLI command
Issue 2 November 2004
217
The Command Line Interface
CLI Conventions
This section contains the following topics:
●
Command Conventions on page 218
●
Entering Text Strings on page 219
Command Conventions
Each table element (or parameter) must be specified, as in the following example.
[Device-Name]> set mgmtipaccesstbl 0 ipaddr 10.0.0.10 ipmask 255.255.0.0
Below are the rules for creating, modifying, enabling and disabling, and deleting table entries.
●
Creation
- The table name is required.
- The table index is required. For table entry or instance creation, the index is always zero
(0).
- The order in which the table arguments or objects are entered is not important.
- Parameters that are not required can be omitted, in which case they will be assigned the
default value.
●
Modification
- The table name is required.
- The table index is required. To modify the table, “index” must be the index of the entry to
be modified.
- Only the table objects that are to be modified need to be specified. Not all the table
objects are required.
- If multiple table objects are to be modified, the order in which they are entered is not
important.
- If the entire table entry is to be modified, all the table objects have to be specified.
●
Enabling/Disabling
- The table name is required.
- The table index is required. For table enabling/disabling the index should be the index of
the entry to be enabled/disabled.
- The entry’s new state (either “enable” or “disable”) is required.
218 AP-4, AP-5, and AP-6 User Guide
CLI Conventions
●
Deletion
- The table name is required.
- The table index is required. For table deletion the index should be the index of the entry
to be deleted.
- The word “delete” is required.
Entering Text Strings
When you enter a text string that contains spaces for a parameter, you must use a string
delimiter for the AP to correctly interpret the text string. For this CLI implementation, the single
quote or double quote character can be used at the beginning and at the end of the string.
For example:
[Device-Name]> set sysname Lobby — Does not need quote marks
[Device-Name]> set sysname “Front Lobby” — Requires quote marks.
The scenarios supported by this CLI are shown in Table 4.
Table 4: Quotation Marks in CLI Commands
“My Desk in the office”
Double Quotes
‘My Desk in the office’
Single Quotes
“My ‘Desk’ in the office”
Single Quotes within Double Quotes
‘My “Desk” in the office’
Double Quotes within Single Quotes
“Daniel’s Desk in the office”
One Single Quote within Double Quotes
‘Daniel”s Desk in the office’
One Double Quote within Single Quotes
The string delimiter does not have to be used for every string object. You must use the single
quote or double quote only for text strings that contain blank spaces. If the text string does not
contain blank spaces, then the string delimiters, single or double quotes, mentioned in this
section are not required.
Issue 2 November 2004
219
The Command Line Interface
CLI Help
This section contains the following topics:
●
The Question Mark on page 220
●
The Help Command on page 223
The Question Mark
This command can be used in a number of ways to display available commands and
parameters.
Table 5 lists each operation and provides a basic example. Detailed examples and display
results for each operation follow the table.
Table 5: ? Command
Operation
Basic Example
Display the command list (see Example 1.
Displaying the command list)
[Device-Name]> ?
Display commands that start with specified
letters (see Example 2. Displaying specific
commands)
[Device-Name]> s?
Display parameters for set and show
commands (see Example 3. Displaying
parameters for set and show commands)
[Device-Name]> set ?
[Device-Name]> show ipa?
Prompt to enter successive parameters for
commands (see Example 4. Displaying
prompts for successive parameters)
[Device-Name]> download ?
Example 1. Displaying the command list
To display the command list, enter ?.
[Device-Name]>?
220 AP-4, AP-5, and AP-6 User Guide
CLI Help
Figure 3: Result of “?” CLI command
Example 2. Displaying specific commands
To show all commands that start with specified letters, enter one or more letters, then ? with no
space between letters and ?.
[Device-Name]> s?
Figure 4: Result of “s?” CLI command
Example 3. Displaying parameters for set and show commands
Example 3a allows you to see every possible parameter for the set (or show) commands. Notice
from example 3a that the list is very long. Example 3b shows how to display a subset of the
parameters based on initial parameter letters.
Example 3a. Displaying every parameter that can be changed
[Device-Name]> set ?
Issue 2 November 2004
221
The Command Line Interface
Figure 5: Result of “set ?” CLI command
.
.
.
.
.
.
.
Example 3b. Displaying parameters based on letter sequence
This example shows entries for parameters that start with the letter “i”. The more letters you
enter, the fewer the results returned. Notice that there is no space between the letters and the
question mark.
[Device-Name]> show ipa?
Figure 6: Result of “show ipa?” CLI command
[Device-Name]> show iparp?
222 AP-4, AP-5, and AP-6 User Guide
CLI Help
Figure 7: Result of “show iparp?” CLI command
Example 4. Displaying prompts for successive parameters
Enter the command, a space, and then ?. Then, when the parameter prompt appears, enter the
parameter value. Result: The parameter is changed and a new CLI line is echoed with the new
value (in the first part of the following example, the value is the IP Address of the TFTP server).
After entering one parameter, you may add another ? to the new CLI line to see the next
parameter prompt, and so on until you have entered all of the required parameters. The
following example shows how this is used for the download Command. The last part of the
example shows the completed download command ready for execution.
[Device-Name]> download ?
<TFTP IP Address>
[Device-Name]> download 192.168.0.101 ?
<File Name>
[Device-Name]> download 192.168.0.101 apimage ?
<file type (config/img/bootloader)>
[Device-Name]> download 192.168.0.101 apimage img <CR>
The Help Command
The help command displays instructions on using control-key sequences for navigating a
command line and displays command information and examples.
●
Using help as the only argument:
[Device-Name]> help
Issue 2 November 2004
223
The Command Line Interface
Figure 8: Results of “help” CLI command
●
Complete command description and command usage can be provided by:
- [Device-Name]> help <command name>
- [Device-Name]> <command name> help
Accessing the AP CLI
You can use HyperTerminal or Telnet to access the AP CLI:
●
Using HyperTerminal to Log in to the AP on page 225
●
Using Telnet to Log in to the AP on page 225
224 AP-4, AP-5, and AP-6 User Guide
Accessing the AP CLI
Using HyperTerminal to Log in to the AP
Follow these steps to log in to the AP using Hyper Terminal:
1. Open your terminal emulation program (like HyperTerminal) and set the following
connection properties:
●
Com Port: <COM1, COM2, etc., depending on your computer>
●
Baud rate: 9600
●
Data Bits: 8
●
Stop bits: 1
●
Flow Control: None
●
Parity: None
2. Under File -> Properties -> Settings -> ASCII Setup, enable the Send line ends with line
feeds option.
Result: HyperTerminal sends a line return at the end of each line of code.
3. Enter the CLI password (default is public).
Note:
Note:
Avaya recommends changing all default passwords immediately. See the
following sections for information on how to change the default passwords:
- CLI password, see passwd on page 229.
- SNMP passwords (read, read-write, and SNMPv3 authentication and privacy), see
SNMP Commands on page 272.
- HTTP password, see HTTP and HTTPS Commands on page 249.
Using Telnet to Log in to the AP
The CLI commands can be used to access, configure, and manage the AP using Telnet. Follow
these steps:
1. Confirm that your computer’s IP address is in the same IP subnet as the AP.
Note:
Note:
If you have not previously configured the Access Point’s IP address and do not
have a DHCP server on the network, the Access Point will default to an IP
address of 169.254.128.132.
2. Go to the DOS command prompt on your computer.
3. Type telnet <IP Address of the unit>.
Issue 2 November 2004
225
The Command Line Interface
4. Enter the CLI password (default is public).
Note:
Avaya recommends changing all default passwords immediately. See the
following sections for information on how to change the default passwords:
Note:
- CLI password, see passwd on page 229.
- SNMP passwords (read, read-write, and SNMPv3 authentication and privacy), see
SNMP Commands on page 272.
- HTTP password, see HTTP and HTTPS Commands on page 249.
CLI Commands
●
done: Terminates the CLI session
●
download: Uses a TFTP server to download image files, configuration files, bootloader
upgrade files, SSL certificates, SSL private keys, SSH public keys, SSH private keys, or
CLI Batch Files to the Access Point
●
exit: Terminates the CLI session
●
help: Displays general CLI help information or command help information, such as
command usage and syntax
●
history: Remembers commands to help avoid re-entering complex statements
●
passwd: Sets the Access Point’s CLI password
●
quit: Terminates the CLI session
●
reboot: Reboots the Access Point in the specified time
●
search: Lists the parameters in a specified Table
●
set: Configures the value of the specified parameter.
●
show: Displays the value of the specified parameter, or displays all parameter values of a
specified group (parameter table).
●
upload: Uses TFTP server to upload configuration files from Access Point to TFTP default
directory or specified path
done
Ends a CLI session.
[Device-Name]> done
226 AP-4, AP-5, and AP-6 User Guide
CLI Commands
The exit and quit commands perform the same action.
download
Downloads the specified file from a TFTP server to the Access Point.
Executing download in combination with the asterisk character (*) will make use of the
previously set TFTP parameters. Executing download without parameters will display
command help and usage information.
Syntax
Table 6: download Command Syntax
Action
Syntax
Downloads a file
[Device-Name]> download <tftp server address>
<path and filename> <file type>
Displays help and usage
information
[Device-Name]> download
Executes the download
command using previously set
(stored) TFTP parameters
[Device-Name]> download *
Example
[Device-Name]> download 192.168.1.100 APImage2 img
exit
Ends a CLI session:
[Device-Name]> exit
The done and quit commands perform the same action.
Issue 2 November 2004
227
The Command Line Interface
help
Displays instructions on using control-key sequences for navigating a command line and
displays command information and examples.
Syntax
Table 7: help Command Syntax
Action
Syntax
Use help as the only
argument. See the following
example.
[Device-Name]> help
Display complete command
description and command
usage
[Device-Name]> help <command name>
[Device-Name]> <command name> help
228 AP-4, AP-5, and AP-6 User Guide
CLI Commands
Example
Figure 9: Results of “help” CLI command
history
Shows contents of Command History Buffer. The Command History Buffer stores command
statements entered in the current session. To avoid re-entering long command statements, use
the keyboard Up Arrow (Ctrl-P) and Down Arrow (Ctrl-N) keys to recall previous statements
from the Command History Buffer. When the desired statement is displayed, press the Enter
key to execute, or you may edit the statement before executing it.
[Device-Name]> history
passwd
Changes the CLI Password.
[Device-Name]> passwd <oldpassword> <newpassword> <newpassword>
Issue 2 November 2004
229
The Command Line Interface
! CAUTION:
CAUTION:
Avaya strongly urges you to change the default passwords to restrict access to
your network devices to authorized personnel. If you lose or forget your password
settings, you can always perform the Reset to Factory Default Procedure on
page 201.
quit
Ends a CLI session:
[Device-Name]> quit
The done and exit commands perform the same action.
reboot
Reboots the Access Point after specified number of seconds. Specify a value of 0 (zero) for
immediate reboot.
[Device-Name]> reboot 0
[Device-Name]> reboot 30
search
Lists the parameters supported by the specified table. This list corresponds to the table
information displayed in the HTTP interface. In the following example, the CLI returns the list of
parameters that make up an entry in the IP Access Table.
Example
[Device-Name]> search mgmtipaccesstbl
Figure 10: Results of “search mgmtipaccesstbl” CLI command
230 AP-4, AP-5, and AP-6 User Guide
CLI Commands
set
Configures the value of the specified parameter. To see a definition and syntax example, type
only set and then press the Enter key. To see a list of available parameters, enter a space, then
a question mark (?) after set (example: set?).
As shown in the following examples, parameters may be set individually or all parameters for a
given table can be set with a single statement.
Syntax
[Device-Name]> set <parameter> <value>
[Device-Name]> set <table> <index> <argument 1> <value 1> ...
<argument N> <value N>
Configuring Objects that Require Reboot
Certain objects supported by the Access Point require a device reboot for the changes to take
effect. To inform you of this behavior, the CLI provides informational messages when you have
configured an object that requires a reboot. The following messages are displayed as a result of
the configuring such object or objects.
The following message is displayed every time you configure an object that requires the device
to be rebooted.
[Device-Name]> set ipaddr 135.114.73.10
The following elements require reboot
ipaddr
In addition to the above informational message, the CLI also provides a message as a result of
the exit, quit, or done command if changes have been made to objects that require reboot. If
you make changes to objects that require reboot and execute the exit command the following
message is displayed:
[Device-Name]> exit<CR> OR quit<CR> OR done<CR>
Modifications have been made to parameters that require the device to
be rebooted. These changes will only take effect after the next reboot.
Examples
[Device-Name]> set sysloc “Main Lobby”
[Device-Name]> set mgmtipaccesstbl 0 ipaddr 10.0.0.10 ipmask 255.255.0.0
Issue 2 November 2004
231
The Command Line Interface
Set the Access Point IP Address Parameter
Syntax:
[Device-Name]> set <parameter name> <parameter value>
Example:
[Device-Name]> set ipaddr 10.0.0.12
Result:
IP Address will be changed when you reboot the Access Point. The CLI
reminds you when rebooting is required for a change to take effect. To reboot
immediately, enter reboot 0 (zero) at the CLI prompt.
Create a table entry or row
Use 0 (zero) as the table index when you create an entry. When creating a table row, only the
mandatory table elements are required (comment is usually an optional table element). For
optional table elements, the default value is generally applied if you do not specify a value.
Syntax:
[Device-Name]> set <table name> <table index> <element 1> <value 1>
… <element n> <value n>
Example:
[Device-Name]> set mgmtipaccesstbl 0 ipaddr 10.0.0.10 ipmask
255.255.0.0
Result:
A new table entry is created for IP address 10.0.0.10 with a 255.255.0.0 subnet
mask.
Modify a table entry or row
Use the index to be modified and the table elements you would like to modify. For example,
suppose the IP Access Table has one entry and you wanted to modify the IP address:
[Device-Name]> set mgmtipaccesstbl 1 ipaddr 10.0.0.11
You can also modify several elements in the table entry. Enter the index number and specific
table elements you would like to modify. (Hint: Use the search command to see the elements
that belong to the table.)
[Device-Name]> set mgmtipaccesstbl 1 ipaddr 10.0.0.12 ipmask 255.255.255.248 cmt
“First Row”
232 AP-4, AP-5, and AP-6 User Guide
CLI Commands
Enable, Disable, or Delete a table entry or row
The following example shows how to manage the second entry in a table.
Syntax:
[Device-Name]> set <Table> index status <enable, disable, delete>
[Device-Name]> set <Table> index status <1=enable, 2=disable,
3=delete>
Example:
[Device-Name]> set mgmtipaccesstbl 2 status enable
[Device-Name]> set mgmtipaccesstbl 2 status disable
[Device-Name]> set mgmtipaccesstbl 2 status delete
[Device-Name]> set mgmtipaccesstbl 2 status 2
Note:
Note:
You may need to enable a disabled table entry before you can change the entry’s
elements.
show
Displays the value of the specified parameter, or displays all parameter values of a specified
group (parameter table). Groups contain Parameters and Tables. Tables contain parameters for
a series of similar entities.
To see a definition and syntax example, type only show and then press the Enter key. To see a
list of available parameters, enter a question mark (?) after show (example: show ?).
Syntax
[Device-Name]> show <parameter>
[Device-Name]> show <group>
[Device-Name]> show <table>
Examples
[Device-Name]> show ipaddr
[Device-Name]> show network
[Device-Name]> show mgmtipaccesstbl
Issue 2 November 2004
233
The Command Line Interface
Show Group Parameters
To view all elements of a group or table:
Syntax:
[Device-Name]> show <group name>
Example:
[Device-Name]> show network
Result:
The CLI displays network group parameters. Note show network and show ip
return the same data.
Figure 11: Results of “show network” and “show ip” CLI Commands
Show Individual and Table Parameters
To view a single parameter:
Syntax:
[Device-Name]> show <parameter name>
Example:
[Device-Name]> show ipaddr
Result:
Displays the Access Point IP address.
234 AP-4, AP-5, and AP-6 User Guide
CLI Commands
Figure 12: Result of “show ipaddr” CLI Command
To view all parameters in a table:
Syntax:
[Device-Name]> show <table name>
Example:
[Device-Name]> show mgmtipaccesstbl
Result:
Displays the IP Access Table and its entries.
upload
Uploads a text-based configuration file from the AP to the TFTP Server. Executing upload with
the asterisk character (*) will make use of the previously set/stored TFTP parameters.
Executing upload without parameters will display command help and usage information.
Syntax
Table 8: upload Command Syntax
Action
Syntax
Upload a file:
[Device-Name]> upload <tftp server
address> <path and filename> <filetype>
Display help and usage information:
[Device-Name]> help upload
Execute the upload command using
previously set (stored) TFTP Parameters:
[Device-Name]> upload *
Example
[Device-Name]> upload 192.168.1.100 APconfig.sys config
Issue 2 November 2004
235
The Command Line Interface
Parameter Tables
Objects contain groups that contain both parameters and parameter tables. Use the parameter
tables in the following sections to configure the Access Point. Columns used in the tables
include:
●
Name - Parameter, Group, or Table Name
●
Type - Data type
●
Values - Value range, and default value, if any
●
Access = access type, R = Read Only (show), RW = Read-Write (can be “set”), W = Write
Only
●
CLI Parameter - Parameter name as used in the Access Point
Access Point network objects are associated with Groups. The network objects and their
associated parameters are described in the following sections.
Auto Configuration Commands
The Auto Configuration feature automatically configures an AP by downloading a specific
configuration file from a TFTP server during the boot up process.
Perform the following commands to enable and set up automatic configuration:
Note:
Note:
The configuration filename and TFTP server IP address are configured only
when the AP is configured for Static IP. If the AP is configured for Dynamic IP,
these parameters are not used and obtained from DHCP. The default filename is
config. The default TFTP IP address is 169.254.128.133 for the AP.
236 AP-4, AP-5, and AP-6 User Guide
Auto Configuration Commands
Auto Configuration Parameters
These parameters relate to the Auto Configuration feature which allows an AP to be
automatically configured by downloading a specific configuration file from a TFTP server during
the boot up process.
Table 9: Auto Configuration Parameters
Name
Type
Values
Access
CLI Parameter
Auto
Configuration
Group
N/A
R
autoconfig
Auto
Configuration
Status
Integer
enable (default)
disable
RW
autoconfigstatus
Auto Config File
Name
DisplayString
User Defined
RW
autoconfigfilename
Auto Config
TFTP Server IP
Address
IpAddress
User Defined
RW
autoconfigTFTPaddr
Syntax Examples
[Device-Name]> set autoconfigstatus <enable/disable>
[Device-Name]> set autoconfigfilename <filename>
Enter the filename of the configuration file that is used if the AP is
configured for Static IP.
[Device-Name]> set autoconfigTFTPaddr <IP address>
Enter the TFTP server address that is used if the AP is configured for
Static IP.
Issue 2 November 2004
237
The Command Line Interface
DHCP Server Commands
! CAUTION:
Before enabling DHCP server on the AP, confirm that the IP address pools you
have configured are valid addresses on the network and do not overlap the
addresses assigned by any other DHCP server on the network. Enabling this
feature with incorrect address pools will cause problems on your network.
CAUTION:
DHCP Server Parameters
Table 10: DHCP Server Parameters
Note:
Name
Type
Values
Access
CLI Parameter
DHCP Server
Group
N/A
R
dhcp
DHCP Server
Status
Integer
enable (1)
(default)
disable (2)
delete (3)
RW
dhcpstatus
Gateway IP
Address
IpAddress
User Defined
RW
dhcpgw
Primary DNS IP
Address
IpAddress
User Defined
RW
dhcppridnsipaddr
Secondary DNS
IP Address
IpAddress
User Defined
RW
dhcpsecdnsipaddr
Number of IP
Pool Table
Entries
Integer32
N/A
R
dhcpippooltblent
Note:
You must have at least one entry in the DHCP Server IP Address Pool Table
before you can set the DHCP Server Status (dhcpstatus) to Enable.
238 AP-4, AP-5, and AP-6 User Guide
DHCP Server Commands
IP Address Pool Parameters
Table 11: IP Address Pool Parameters
Note:
Name
Type
Values
Access
CLI Parameter
DHCP Server IP
Address Pool Table
Table
N/A
R
dhcpippooltbl
Table Index
Integer
User Defined
N/A
index
Start IP Address
IpAddress
User Defined
RW
startipaddr
End IP Address
IpAddress
User Defined
RW
endipaddr
Width
Integer
User Defined
RW
width
Default Lease Time
(optional)
Integer32
3600–86400 sec
(default)
RW
defleasetm
Maximum Lease Time
(optional)
Integer32
3600–86400 sec
(default)
RW
maxleasetm
Comment (optional)
DisplayString
User Defined
RW
cmt
Status (optional)
Integer
enable (1)
disable (2)
delete (3)
RW
status
Note:
Set either End IP Address or Width (but not both) when creating an IP address
pool.
Syntax Examples
[Device-Name]> set dhcpstatus disable
[Device-Name]> set dhcpippooltbl 0 startipaddr <start ip address> endipaddr <end ip
address>
[Device-Name]> set dhcpgw <gateway ip address>
[Device-Name]> set dhcppridnsipaddr <primary dns ip address>
[Device-Name]> set dhcpsecdnsipaddr <secondary dns ip address>
[Device-Name]> set dhcpstatus enable
Issue 2 November 2004
239
The Command Line Interface
[Device-Name]> reboot 0
DNS Client Commands
DNS Client for RADIUS Name Resolution Parameters
Table 12: DNS Client Parameters
Name
Type
Values
Access
CLI Parameter
DNS Client
Group
N/A
R
dns
DNS Client status
Integer
enable
disable (default)
RW
dnsstatus
Primary DNS Server IP
Address
IpAddress
User Defined
RW
dnspridnsipaddr
Secondary DNS Server
IP Address
IpAddress
User Defined
RW
dnssecdnsipadd
r
Default Domain Name
Integer32
User Defined
(up to 254
characters)
RW
dnsdomainname
Syntax Examples
[Device-Name]> set dnsstatus enable
[Device-Name]> set dnsprisvripaddr <IP address of primary DNS server>
[Device-Name]> set dnssecsvripaddr <IP address of secondary DNS server>
[Device-Name]> set dnsdomainname <default domain name>
[Device-Name]> show dns
240 AP-4, AP-5, and AP-6 User Guide
Ethernet Interface Commands
Figure 13: Results of “show dns” CLI command
Ethernet Interface Commands
Ethernet Interface Parameters
Table 13: Ethernet Interface Parameters
Name
Type
Values
Access
CLI Parameter
Ethernet Interface
Group
N/A
R
ethernet
Speed
Integer
10halfduplex
10fullduplex
10autoduplex
100halfduplex
100fullduplex
autohalfduplex
autoautoduplex
(default)
RW
etherspeed
MAC Address
PhyAddress
N/A
R
ethermacaddr
Issue 2 November 2004
241
The Command Line Interface
Syntax Examples
[Device-Name]> set etherspeed <value> (See Table 14.)
[Device-Name]> reboot 0
Table 14: Ethernet Speed and Transmission Mode
Ethernet Speed and Transmission Mode
Value
10 Mbits/sec - half duplex
10halfduplex
10 Mbits/sec - full duplex
10fullduplex
10 Mbits/sec - auto duplex
10autoduplex
100 Mbits/sec - half duplex
100halfduplex
100 Mbits/sec - full duplex
100fullduplex
Auto Speed - half duplex
autohalfduplex
Auto Speed - auto duplex
autoautoduplex (default)
242 AP-4, AP-5, and AP-6 User Guide
Filtering Commands
Filtering Commands
Ethernet Protocol Filtering Parameters
Table 15: Ethernet Protocol Filtering Parameters
Name
Type
Values
Access
CLI Parameter
Ethernet Filtering
Group
N/A
R
etherflt
Filtering Interface
Bitmask
Interface
Bitmask
0 or 2 - no interfaces (disable)
1 or 3 - Ethernet
4 or 6 - Wireless
5 or 7 - all interfaces (default is 7)
RW
etherfltifbitmask
passthru
block
RW
etherfltoptype
Operation Type
Ethernet Protocol Filtering Table Parameters
Identify the different filters by using the table index.
Table 16: Ethernet Protocol Filtering Table Parameters
Name
Type
Values
Access
CLI Parameter
Ethernet Protocol Filtering Table
Table
N/A
R
etherflttbl
Table Index
N/A
N/A
R
index
Protocol Number
Octet String
N/A
RW
protonumber
Protocol Name (optional)
DisplayString
RW
protoname
Status (optional)
Integer
RW
status
enable (1)
disable (2)
delete (3)
Issue 2 November 2004
243
The Command Line Interface
Note:
Note:
Note:
The filter Operation Type (passthru or block) applies only to the protocol filters
that are enabled in this table.
Note:
The AP requires a reboot for changes to the Ethernet Protocol Filtering Table to
take effect.
Static MAC Address Filter Table
Table 17: Static MAC Address Filter Table Parameters
Name
Type
Values
Access
CLI Parameter
Static MAC Address
Filter Table
Table
N/A
R
staticmactbl
Table Index
N/A
N/A
R
index
Static MAC Address on
Wired Network
PhysAddress
User Defined
RW
wiredmacaddr
Static MAC Address
Mask on Wired Network
PhysAddress
User Defined
RW
wiredmask
Static MAC Address on
Wireless Network
PhysAddress
User Defined
RW
wirelessmacaddr
Static MAC Address
Mask on Wireless
Network
PhysAddress
User Defined
RW
wirelessmask
Comment (optional)
DisplayString
max 255
characters
RW
cmt
Status (optional)
Integer
enable (default)
disable
delete
RW
status
244 AP-4, AP-5, and AP-6 User Guide
Filtering Commands
Proxy ARP Parameters
Table 18: Proxy ARP Parameters
Name
Type
Values
Access
CLI Parameter
Proxy ARP
Group
N/A
R
parp
Status
Integer
enable
disable (default)
RW
parpstatus
IP ARP Filtering Parameters
Table 19: IP ARP Filtering Parameters
Name
Type
Values
Access
CLI Parameter
IP ARP Filtering
Group
N/A
R
iparp
Status
Integer
enable
disable (default)
RW
iparpfltstatus
IP Address
IpAddress
User Defined
RW
iparpfltipaddr
Subnet Mask
IpAddress
User Defined
RW
iparpfltsubmask
Broadcast Filtering Table
Table 20: Broadcast Filtering Table Parameters
Name
Type
Values
Access
CLI Parameter
Broadcast Filtering Table
Table
N/A
R
broadcastflttbl
Index
Integer
1-5
N/A
index
Protocol Name
DisplayString
N/A
R
protoname
1 of 2
Issue 2 November 2004
245
The Command Line Interface
Table 20: Broadcast Filtering Table Parameters
Name
Type
Values
Access
CLI Parameter
Direction
Integer
ethertowireless
wirelesstoether
both (default)
RW
direction
Status
Integer
enable
disable (default)
RW
status
2 of 2
TCP/UDP Port Filtering
The following parameters are used to enable or disable the Port filter feature.
Table 21: TCP/UDP Port Filtering Parameters
Name
Type
Values
Access
CLI Parameter
Port Filtering
Group
N/A
R
portflt
Port Filter Status
Integer
enable (default)
disable
RW
portfltstatus
TCP/UDP Port Filtering Table
The following parameters are used to configure TCP/UDP Port filters.
Table 22: TCP/UDP Port Filtering Table Parameters
Name
Type
Values
Access
CLI Parameter
Port Filtering
Table
Table
N/A
R
portflttbl
Table Index
N/A
User Defined
(There are also 4
predefined indices, see
Port Number in this table
for more information)
R
index
1 of 2
246 AP-4, AP-5, and AP-6 User Guide
Filtering Commands
Table 22: TCP/UDP Port Filtering Table Parameters
Name
Type
Values
Access
CLI Parameter
Port Type
Octet String
tcp
udp
tcp/udp
RW
porttype
Port Number
Octet String
User Defined
There are also 4
predefined protocols:
● Index 1: NetBios
Name Service –
137
● Index 2: NetBios
Datagram Service
– 138
● Index 3: NetBios
Session Service –
139
● Index 4: SNMP
Service – 161
RW
portnum
Protocol Name
DisplayString
User Defined
(There are also 4
predefined protocols, see
Port Number above)
RW
protoname
Interface
Bitmask
Integer32
0 or 2 - no interfaces
(disable)
1 or 3 - Ethernet
4 or 6 - Wireless
5 or 7 - all interfaces
(default is 7)
RW
ifbitmask
Status (optional)
Integer
enable (default for new
entries)
disable (default for
pre-defined entries)
delete
RW
status
2 of 2
Issue 2 November 2004
247
The Command Line Interface
Hardware Configuration Reset Commands
The Hardware Configuration Reset commands allow you to enable or disable the hardware
reset functionality and to change the password to be used for configuration reset during boot up.
Hardware Configuration Reset Parameters
The Hardware Configuration Reset commands allows you to enable or disable the feature and
to change the password to be used for configuration reset during boot up.
Table 23: Hardware Configuration Reset Parameters
Name
Type
Values
Access
CLI Parameter
Hardware Configuration
Reset Status
Integer
Enable (1)
Disable (2)
R
hwconfigresetstatus
Configuration Reset
Password
DisplayString
User Defined
RW
configresetpasswd
Syntax Examples
Table 24: Hardware Configuration Reset Syntax
Note:
Action
Syntax
Disable hardware configuration reset
[Device-Name]> set hwconfigresetstatus disable
Enable hardware configuration reset
[Device-Name]> set hwconfigresetstatus enable
Define the Configuration Reset
Password to be used for
configuration reset during boot up
[Device-Name]> set configresetpasswd
<password>]
Note:
It is important to safely store the configuration reset password. If a user forgets
the configuration reset password, the user will be unable to reset the AP to
factory default configuration if the AP becomes inaccessible and the hardware
configuration reset functionality is disable.
248 AP-4, AP-5, and AP-6 User Guide
HTTP and HTTPS Commands
HTTP and HTTPS Commands
HTTP (Web browser) Parameters
! CAUTION:
Avaya strongly urges you to change the default passwords to restrict access to
your network devices to authorized personnel. If you lose or forget your password
settings, you can always perform the Reset to Factory Default Procedure on
page 201.
CAUTION:
Table 25: HTTP Parameters
Note:
Name
Type
Values
Access
CLI Parameter
HTTP
Group
N/A
R
http
HTTP
Management
Interface
Bitmask
Interface
Bitmask
0 or 2 - no
interfaces
(disable)
1 or 3 - Ethernet
4 or 6 - Wireless
5 or 7 - all
interfaces
(default is 7)
RW
httpifbitmask
HTTP Password
DisplayString
User Defined
max 64
characters
W
httppasswd
HTTP Port
Integer
User Defined
Default = 80
RW
httpport
Help Link
DisplayString
User Defined
RW
httphelplink
SSL Status
Integer
Enable/Disable
RW
sslstatus
SSL Certificate
Passphrase
DisplayString
User Defined
Write-only
sslpassphrase
Note:
The default path for the Help files is C:/Program Files/Avaya_Wireless/AP/
HTML/index.htm. (Use the forward slash character (/) rather than the back slash
character (\) when configuring the Help Link location.) The AP Help information
is available in English, French, German, Italian, Spanish, and Japanese.
Issue 2 November 2004
249
The Command Line Interface
Syntax Examples
Change HTTP Interface Password
[Device-Name]> set httppasswd <New Password> (HTTP interface password)
Configure Management Interfaces
[Device-Name]> set httpifbitmask <value> (see Table 26)
Choose from the following values:
Table 26: Interface Bitmask Values
Interface Bitmask
Description
0 or 2 = disable (all interfaces)
All management channels disabled
1 or 3 = Ethernet only
Ethernet only enabled
4 or 6 = Wireless only
Wireless only enabled
5 or 7 = all interfaces
All management channels enabled
Set TCP Port
[Device-Name]> set httpport <HTTP port number> (default is 80)
Configure Secure Socket Layer (HTTPS)
Enabling SSL and configuring a passphrase allows encrypted Secure Socket Layer
communications to the AP through the HTTPS interface.
[Device-Name]> set sslstatus <enable/disable>
You must change the SSL passphrase when uploading a new certificate/private key pair, which
will have a corresponding passphrase.
[Device-Name]> set sslpassphrase <SSL certificate passphrase>
To view all HTTP configuration information including SSL:
[Device-Name]> show http
HTTP Group Parameters
=====================
httpifbitmask
httppasswd
:
:
250 AP-4, AP-5, and AP-6 User Guide
15
********
IAPP Commands
httpport
httphelplink
httpsetupwiz
sslstatus
sslpassphrase
:
:
:
:
:
80
file:///C:/Program Files/ORiNOCO/AP2000/HTML/home.htm
disable
enable
********
IAPP Commands
Note:
Note:
These parameters configure the Inter Access Point Protocol (IAPP) for roaming.
Leave these settings at their default value unless a technical representative asks
you to change them.
IAPP Parameters
Table 27: IAPP Parameters
Name
Type
Values
Access
CLI Parameter
IAPP
Group
N/A
R
iapp
IAPP Status
Integer
enable (default)
disable
RW
iappstatus
Periodic Announce
Interval (seconds)
Integer
80
120 (default)
160
200
RW
iappannint
Announce Response
Time
Integer
2 seconds
R
iappannresp
Handover Time-out
Integer
410 ms
512 ms (default)
614 ms
717 ms
819 ms
RW
iapphandtout
1 of 2
Issue 2 November 2004
251
The Command Line Interface
Table 27: IAPP Parameters
Name
Type
Values
Access
CLI Parameter
Max. Handover
Retransmissions
Integer
1 - 4 (default 4)
RW
iapphandretx
Send Announce
Request on Startup
Integer
enable (default)
disable
RW
iappannreqstart
2 of 2
Intra BSS Commands
Intra BSS Parameters
The following parameters control the Intra Basic Service Set (BSS) traffic feature, which
prevents wireless clients that are associated with the same AP from communicating with each
other.
Table 28: Intra BSS Parameters
Name
Type
Values
Access
CLI Parameter
Intra BSS Traffic
Group
N/A
R
intrabss
Intra BSS Traffic Operation
Integer
passthru (default)
block
RW
intrabssoptype
Syntax Example
[Device-Name]> set intrabssoptype <passthru/block>
252 AP-4, AP-5, and AP-6 User Guide
Inventory Management Commands
Inventory Management Commands
Inventory Management Parameters
Table 29: Inventory Management Parameters
Note:
Name
Type
Values
Access
CLI Parameter
System Inventory
Management
Subgroup
N/A
R
sysinvmgmt
Component Table
Subgroup
N/A
R
sysinvmgmtcmptbl
Component Interface Table
Subgroup
N/A
R
sysinvmgmtcmpiftbl
Note:
The inventory management commands display advanced information about the
AP’s installed components. You may be asked to report this information to a
representative if you contact customer support.
IP Access Table Commands
IP Access Table Parameters
When creating table entries, you may either specify the argument name followed by argument
value or simply entering the argument value. When only the argument value is specified, then
enter the values in the order depicted by the following table. CLI applies default values to the
Issue 2 November 2004
253
The Command Line Interface
omitted arguments. Due to the nature of the information, the only argument that can be omitted
is the “comment” argument.
Table 30: IP Access Table Parameters
Name
Type
Values
Access
CLI Parameter
IP Access Table
Table
N/A
R
mgmtipaccesstbl
Table Index
Integer
User Defined
N/A
index
IP Address
IpAddress
User Defined
RW
ipaddr
IP Mask
IpAddress
User Defined
RW
ipmask
Comment (optional)
DisplayString
User Defined
RW
cmt
Status (optional)
Integer
enable (default)
disable
delete
RW
status
Syntax Examples
Edit Management IP Access Table
[Device-Name]> set mgmtipaccesstbl <index> ipaddr <IP address>
ipmask <subnet mask>
254 AP-4, AP-5, and AP-6 User Guide
IP Commands
IP Commands
IP Configuration Parameters
Table 31: IP Configuration Parameters
Note:
Note:
Name
Type
Values
Access
CLI Parameter
Network
Group
N/A
R
network
IP Configuration
Group
N/A
R
ip
Note: The network and ip
parameters display the
same information
IP Address
IpAddress
User Defined
RW
ipaddr
IP Mask
IpAddress
User Defined
RW
ipmask
Default Router
IP Address
IpAddress
User Defined
RW
ipgw
Default TTL
Integer
User Defined
(seconds)
64 (default)
RW
ipttl
Address Type
Integer
static
dynamic (default)
RW
ipaddrtype
Note:
The IP Address Assignment Type (ipaddrtype) must be set to static before the IP
Address (ipaddr), IP Mask (ipmask) or Default Gateway IP Address (ipgw) values
can be entered.
Note:
The IP Subnet Mask of the AP must match your network’s Subnet Mask.
Syntax Examples
[Device-Name]> set ipaddrtype static
[Device-Name]> set ipaddr <fixed IP address of unit>
Issue 2 November 2004
255
The Command Line Interface
[Device-Name]> set ipsubmask <IP Mask>
[Device-Name]> set ipgw <gateway IP address>
[Device-Name]> show network
Link Integrity Commands
Link Integrity Parameters
Table 32: Link Integrity Parameters
Name
Type
Values
Access
CLI Parameter
Link Integrity
Group
N/A
R
linkint
Link Integrity Status
Integer
enable
disable (default)
RW
linkintstatus
Link Integrity Poll
Interval
Integer
500 - 15000 ms
(in increments of 500ms)
500 ms (default)
RW
linkintpollint
Link Integrity Poll
Retransmissions
Integer
0 - 255
5 (default)
RW
linkintpollretx
IP Target Table Parameters
Table 33: IP Target Table Parameters
Name
Type
Values
Access
CLI Parameter
Link Integrity IP
Target Table
Table
N/A
R
linkinttbl
Table Index
Integer
1-5
N/A
index
Target IP Address
IpAddress
User Defined
RW
ipaddr
1 of 2
256 AP-4, AP-5, and AP-6 User Guide
Link Integrity Commands
Table 33: IP Target Table Parameters
Name
Type
Values
Access
CLI Parameter
Comment (optional)
DisplayString
User Defined (up to
254 characters)
RW
cmt
Status (optional)
Integer
enable
disable (default)
delete
RW
status
2 of 2
Syntax Examples
[Device-Name]> show linkinttbl (this shows the current links)
[Device-Name]> set linkinttbl <1-5> (depending on what table row you wish to address)
ipaddr <ip address of the host computer you want to check>
[Device-Name]> set linkintpollint <the interval between link integrity checks>
[Device-Name]> set linkintpollretx <number of times to retransmit before considering
the link down>
[Device-Name]> set linkintstatus enable
[Device-Name]> show linkinttbl (confirm new settings)
[Device-Name]> reboot 0
Issue 2 November 2004
257
The Command Line Interface
MAC Access Control Commands
MAC Access Control Parameters
Table 34: MAC Access Control Parameters
Name
Type
Values
Access
CLI Parameter
MAC Address Control
Group
N/A
R
macacl
Status
Integer
enable
disable (default)
RW
macaclstatus
Operation Type
Integer
passthru (default)
block
RW
macacloptype
MAC Access Control Table Parameters
Table 35: MAC Access Control Table Parameters
Name
Type
Values
Access
CLI Parameter
MAC Address
Control Table
Table
N/A
R
macacltbl
Table Index
N/A
N/A
R
index
MAC Address
PhysAddress
User Defined
RW
macaddr
Comment
(optional)
DisplayString
User Defined
max 254
characters
RW
cmt
Status (optional)
Integer
enable (default)
disable
delete
RW
status
258 AP-4, AP-5, and AP-6 User Guide
Monitoring Parameters
Syntax Examples
Setup MAC (Address) Access Control
[Device-Name]> set macaclstatus enable
[Device-Name]> set macacloptype <passthru, block>
[Device-Name]> reboot 0
Add an Entry to the MAC Access Control Table
[Device-Name]> set macacltbl <index> macaddr <MAC Address> status enable
[Device-Name]> show macacltbl
Disable or Delete an Entry in the MAC Access Control Table
[Device-Name]> set macacltbl <index> status <disable/delete>
[Device-Name]> show macacltbl
Note:
For larger networks that include multiple Access Points, you may prefer to
maintain this list on a centralized location using the RADIUS parameters (see
RADIUS Commands on page 262).
Note:
Monitoring Parameters
Using the show command with the following parameters will display operating statistics for the
AP (these are the same statistics that are described in Chapter 5: Monitoring the AP for the
HTTP Web interface).
●
staticmp: Displays the ICMP Statistics.
●
statarptbl: Displays the IP ARP Table Statistics.
●
statbridgetbl: Displays the Learn Table.
●
statiapp: Displays the IAPP Statistics.
●
statradius: Displays the RADIUS Authentication Statistics.
●
statif: Displays information and statistics about the Ethernet and wireless interfaces.
●
stat802.11: Displays additional statistics for the wireless interfaces.
Issue 2 November 2004
259
The Command Line Interface
●
statethernet: Displays additional statistics for the Ethernet interface.
●
statmss: Displays station statistics and Wireless Distribution System links.
Packet Forwarding Commands
Packet Forwarding Parameters
The following parameters control the Packet Forwarding feature, which redirects wireless traffic
to a specific MAC address:
Table 36: Packet Forwarding Parameters
Note:
Name
Type
Values
Access
CLI Parameter
Packet Forwarding MAC
Address
Group
N/A
R
pktfwd
Packet Forwarding MAC
Address
MacAddress
User Defined
RW
pktfwdmacaddr
Packet Forwarding Status
Integer
enable
disable (default)
RW
pktfwdstatus
Packet Forwarding
Interface Port
Integer
0 (any) (default)
1 (Ethernet)
2 (WDS 1)
3 (WDS 2)
4 (WDS 3)
5 (WDS 4)
6 (WDS 5)
7 (WDS 6)
RW
pktfwdif
Note:
The Wireless Distribution System (WDS) feature is not available for 802.11a or
802.11b/g APs at this time.
260 AP-4, AP-5, and AP-6 User Guide
RAD Commands
RAD Commands
The Rogue AP Detection (RAD) feature enables an additional security level for wireless LAN
deployments. The RAD feature provides a mechanism for detecting Rogue Access Points by
utilizing the coverage of the trusted Access Point deployment.
The Rogue AP Scan employs background scanning using low-level 802.11 scanning functions
for effective wireless detection of Access Points in its coverage area with minimal impact on the
normal operation of the Access Point.
The set radstatus command enables Rogue Access Point Detection. The scan repetition
duration (radscanint) can also be configured.
RAD Parameters
Table 37: RAD Parameters
Name
Type
Values
Access
CLI Parameter
Rogue Access Point
Detection (RAD)
Group
N/A
R
rad
Status
Integer
enable
disable (default)
RW
radstatus
Scan Interval
Integer
15-1440 (minutes)
RW
radscanint
Syntax Examples
[Device-Name]> set radstatus enable
[Device-Name]> set radscanint <15-1440>
[Device-Name]> show rad
Issue 2 November 2004
261
The Command Line Interface
Figure 14: Results of “show rad” CLI command
RADIUS Commands
General RADIUS Parameters
Table 38: General RADIUS Parameters
Name
Type
Values
Access
CLI Parameter
RADIUS
Group
N/A
R
radius
Client Invalid Server Address
Counter32
N/A
R
radcliinvsvradd
RADIUS Server Configuration Parameters
Note:
Note:
Use a server name only if you have enabled the DNS Client functionality. See
DNS Client Commands on page 240.
Table 39: RADIUS Server Configuration Parameters 1 of 2
Name
Type
Values
Access
CLI Parameter
RADIUS Authentication
Table
N/A
R
radiustbl
Table Index (Profile
Index)
Integer
N/A
R
index
1 of 2
262 AP-4, AP-5, and AP-6 User Guide
RADIUS Commands
Table 39: RADIUS Server Configuration Parameters 2 of 2
Name
Type
Values
Access
CLI Parameter
Primary/Secondary
Index
Integer
Primary (1)
Secondary (2)
R
subindex
Status
Integer
Enable
Disable
RW
status
Server Address Format
Integer
Ipaddr
Name
RW
seraddrfmt
Server IP Address or
Name
IpAddress
DisplayString
User defined (enter
an IP address if
seraddrfmt is ipaddr
or a name if set to
name; up to 254
characters if using a
name)
RW
ipaddr
Port (optional)
Integer
User Defined
1812 (default)
RW
port
Shared Secret
DisplayString
User Defined
6-32 characters
W
ssecret
Response Time
(optional)
Integer
1 – 10 seconds
3 (default)
RW
responsetm
Maximum
Retransmissions
(optional)
Integer
0–4
3 (default)
RW
maxretx
RADIUS MAC Address
Format
Integer
dashdelimited
colondelimited
singledashdelimited
nodelimiter
RW
radmacaddrformat
RADIUS Accounting
Inactivity Timer
Integer32
1-60 minutes
RW
radaccinactivetmr
Authorization Lifetime
Integer32
900-43200 seconds
W
radauthlifetm
RADIUS Accounting
Update Interval
Integer32
10-3600 minutes
RW
radacctupdinterval
VLAN ID
vlanID
RW
radvlanid
2 of 2
Issue 2 November 2004
263
The Command Line Interface
Syntax Examples
Configure RADIUS Authentication servers
Use the following command to configure a RADIUS Server and assign it to a VLAN. The
RADIUS Server Profile index is specified by the index parameter and the subindex parameter
specifies whether you are configuring a primary or secondary RADIUS server.
[Device-Name]> set radiustbl <Index> profname <Profile Name> seraddrfmt <1 - IP
Address 2 - Name> sernameorip <IP Address or Name> port <value> ssecret <value>
responsetm <value> maxretx <value> acctupdtintrvl <value> macaddrfmt <value>
authlifetm <value> radaccinactivetmr <value> vlanid <vlan id -1 to 4094> status enable
Examples of Configuring Primary and Secondary RADIUS Servers and Displaying the RADIUS
Configuration
Primary server configuration:
[Device-Name]> set radiustbl 1.1 profname "MAC Authentication" seraddrfmt 1
sernameorip 20.0.0.20 port 1812 ssecret public responsetm 3 maxretx 3 acctupdtintrvl 0
macaddrfmt 1 authlifetm 900 radaccinactivetmr 5 vlanid 22 status enable
Secondary server configuration:
[Device-Name]> set radiustbl 1.2 profname "MAC Authentication" seraddrfmt 1
sernameorip 20.0.0.30 port 1812 ssecret public responsetm 3 maxretx 3 acctupdtintrvl 0
macaddrfmt 1 authlifetm 900 radaccinactivetmr 5 vlanid 33 status enable
[Device-Name]> show radiustbl
Index
Primary/Backup
Profile Name
Server Status
Server Addressing Format
IP Address/Host Name
Destination Port
VLAN Identifier
MAC Address Format
Response Time
Maximum Retransmission
Authorization Lifetime
Accounting Update Interval
Accounting Inactivity Timer
:
:
:
:
:
:
:
:
:
:
:
:
:
:
1
Primary
MAC Authentication
notReady
ipaddr
0.0.0.0
1812
-1
dashdelimited
3
3
0
0
5
Index
Primary/Backup
Profile Name
Server Status
Server Addressing Format
IP Address/Host Name
:
:
:
:
:
:
1
Backup
MAC Authentication
notReady
ipaddr
0.0.0.0
264 AP-4, AP-5, and AP-6 User Guide
RADIUS Commands
Destination Port
VLAN Identifier
MAC Address Format
Response Time
Maximum Retransmission
Authorization Lifetime
Accounting Update Interval
Accounting Inactivity Timer
:
:
:
:
:
:
:
:
1812
-1
dashdelimited
3
3
0
0
5
Index
Primary/Backup
Profile Name
Server Status
Server Addressing Format
IP Address/Host Name
Destination Port
VLAN Identifier
MAC Address Format
Response Time
Maximum Retransmission
Authorization Lifetime
Accounting Update Interval
Accounting Inactivity Timer
:
:
:
:
:
:
:
:
:
:
:
:
:
:
2
Primary
EAP Authentication
notReady
ipaddr
0.0.0.0
0
-1
dashdelimited
3
3
0
0
5
Index
Primary/Backup
Profile Name
Server Status
Server Addressing Format
IP Address/Host Name
Destination Port
VLAN Identifier
MAC Address Format
Response Time
Maximum Retransmission
Authorization Lifetime
Accounting Update Interval
Accounting Inactivity Timer
:
:
:
:
:
:
:
:
:
:
:
:
:
:
2
Backup
EAP Authentication
notReady
ipaddr
0.0.0.0
0
-1
dashdelimited
3
3
0
0
5
Index
Primary/Backup
Profile Name
Server Status
Server Addressing Format
IP Address/Host Name
Destination Port
VLAN Identifier
MAC Address Format
Response Time
Maximum Retransmission
Authorization Lifetime
Accounting Update Interval
Accounting Inactivity Timer
:
:
:
:
:
:
:
:
:
:
:
:
:
:
3
Primary
Accounting
notReady
ipaddr
0.0.0.0
1813
-1
dashdelimited
3
3
0
0
5
Index
: 3
Issue 2 November 2004
265
The Command Line Interface
Primary/Backup
Profile Name
Server Status
Server Addressing Format
IP Address/Host Name
Destination Port
VLAN Identifier
MAC Address Format
Response Time
Maximum Retransmission
Authorization Lifetime
Accounting Update Interval
Accounting Inactivity Timer
:
:
:
:
:
:
:
:
:
:
:
:
:
Backup
Accounting
notReady
ipaddr
0.0.0.0
1813
-1
dashdelimited
3
3
0
0
5
Index
Primary/Backup
Profile Name
Server Status
Server Addressing Format
IP Address/Host Name
Destination Port
VLAN Identifier
MAC Address Format
Response Time
Maximum Retransmission
Authorization Lifetime
Accounting Update Interval
Accounting Inactivity Timer
:
:
:
:
:
:
:
:
:
:
:
:
:
:
4
Primary
Management Access
notReady
ipaddr
0.0.0.0
1812
-1
dashdelimited
3
3
0
0
5
Index
Primary/Backup
Profile Name
Server Status
Server Addressing Format
IP Address/Host Name
Destination Port
VLAN Identifier
MAC Address Format
Response Time
Maximum Retransmission
Authorization Lifetime
Accounting Update Interval
Accounting Inactivity Timer
:
:
:
:
:
:
:
:
:
:
:
:
:
:
4
Backup
Management Access
notReady
ipaddr
0.0.0.0
1812
-1
dashdelimited
3
3
0
0
5
RADIUS-Based Management Access Commands
The RADIUS-Based Management Access parameters allow you to enable HTTP or Telnet
Radius-Management Access, enable or disable local user access, and configure the local user
password.
266 AP-4, AP-5, and AP-6 User Guide
Secure Management Commands
The default local user ID is root and the default local user password is public. “Root” cannot be
configured as a valid user for RADIUS-based management access when local user access is
enabled.
RADIUS-Based Management Access Parameters
Table 40: RADIUS-Based Management Access Parameters
Name
Type
Values
Access
CLI Parameter
Radius Local User Status
Integer
Enable
Disable
RW
radlocaluserstatus
Radius Local User
Password
DisplayString
User
Defined
RW
radlocaluserpasswd
HTTP Radius
Management Access
Integer
Enable
Disable
RW
httpradiusmgmtaccess
Telnet Radius
Management Access
Integer
Enable
Disable
RW
telradiusmgmtaccess
Secure Management Commands
Secure Management Parameters
Table 41: Secure Management Parameter
Name
Type
Values
Access
CLI Parameter
Secure Management
Integer
Enable/Disable
RW
securemgmtstatus
Issue 2 November 2004
267
The Command Line Interface
Security Profile Commands
Security Profile Table
The Security Profile Table allows you to configure security profiles. A maximum of 16 security
profiles are supported per wireless interface.
Each security profile can enable and configure one or more security modes (None Secure
Station, WEP Station, 802.1x Station, WPA Station, WPA-PSK Station). The WEP/PSK
parameters can be configured separately for each security mode.
Table 42: Security Profile Parameters
Name
Type
Values
Access
CLI Parameter
Security Profile Table
Table
N/A
R
secprofiletbl
Table Index
Integer
1.1 to 5.5
R
index
Security Mode
Integer
nonsecsta
wepsta
802.1xsta
wpasta
wpapsksta
R
secmode
Authentication Mode
Integer
none
802.1x
radius
acl
psk
RW
authmode
Cipher
Integer
none
wep
tkip
aes
R
ciphersuite
Encryption Key 1
Integer
User defined
RW
secprofileencryptkey1
Encryption Key 2
Integer
User defined
RW
secprofileencryptkey2
Encryption Key 3
Integer
User defined
RW
secprofileencryptkey3
Encryption Key 4
Integer
User defined
RW
secprofileencryptkey4
Encryption Transmit Key
Integer
1-4
RW
encryptkeytx
Encryption Key Length
Integer
RW
encryptkeylength
1 of 2
268 AP-4, AP-5, and AP-6 User Guide
Security Profile Commands
Table 42: Security Profile Parameters
Name
Type
Rekey Interval
Values
Access
CLI Parameter
Integer
RW
rekeyint
WPA PSK Value
Integer
RW
pskkey
WPA PSK Pass Phrase
Integer
RW
passphrase
RADIUS EAP Profile
Integer
RW
radeapprofile
2 of 2
Syntax Examples
Configure a Security Profile with Non Secure Security Mode
Syntax:
set secprofiletbl <index> secmode nonsecure status enable
Example:
set secprofiletbl 2 secmode nonsecure status enable
Configure a Security Profile with WEP Security Mode
Syntax:
set secprofiletbl <index> secmode wep encryptkey0 <value> encryptkeylength
<vakue> encryptkeytx <value> status enable
Example:
set secprofiletbl 3 secmode wep encryptkey0 12345 encryptkeylength 1
encryptkeytx 0 status enable
Configure a Security Profile with 802.1x Security Mode
Syntax:
set secprofiletbl <index> secmode 802.1x rekeyint 900 status enable
Example:
set secprofiletbl 4 secmode 802.1x rekeyint 900 status enable
Issue 2 November 2004
269
The Command Line Interface
Configure a Security Profile with WPA Security Mode
Syntax:
set secprofiletbl <index> secmode wpa rekeyint 900 status enable
Example:
set secprofiletbl 5 secmode wpa rekeyint 900 status enable
Configure a Security Profile with WPA-PSK Security Mode
Syntax:
set secprofiletbl <index> secmode wpa-psk passphrase <value> status enable
Example:
set secprofiletbl 6 secmode wpa-psk passphrase 12345678 status enable
Configure a Security Profile with 802.11i Security Mode
Syntax:
set secprofiletbl <index> secmode 802.11i rekeyint <value> status enable
Example:
set secprofiletbl 7 secmode 802.11i rekeyint 900 status enable
Configuring a Security Profile with 802.11i-PSK Security Mode
Syntax:
set secprofiletbl <index> secmode 802.11i-psk passphrase <value> status enable
Example:
set secprofiletbl 8 secmode 802.11i-psk passphrase 12345678 status enable
270 AP-4, AP-5, and AP-6 User Guide
Serial Port Commands
Serial Port Commands
Serial Port Parameters
Table 43: Serial Port Parameters
Note:
Name
Type
Values
Access
CLI Parameter
Serial
Group
N/A
R
serial
Baud Rate
Integer
2400, 4800,
9600 (default),
19200, 38400, 57600
RW
serbaudrate
Data Bits
Integer
8
R
serdatabits
Parity
Integer
none
R
serparity
Stop Bits
Integer
1
R
serstopbits
Flow Control
Value
none (default)
xonxoff
RW
serflowctrl
Note:
To avoid unexpected performance issues, leave Flow Control at the default
setting (none) unless you are sure what this setting should be.
Syntax Examples
[Device-Name]> set serbaudrate <2400, 4800, 9600, 19200, 38400, 57600>
[Device-Name]> set serflowctrl <none, xonxoff>
[Device-Name]> show serial
Issue 2 November 2004
271
The Command Line Interface
Figure 15: Result of “show serial” CLI Command
SNMP Commands
SNMP Parameters
! CAUTION:
CAUTION:
Avaya strongly urges you to change the default passwords to restrict access to
your network devices to authorized personnel. If you lose or forget your password
settings, you can always perform the Reset to Factory Default Procedure on
page 201.
Table 44: SNMP Parameters
Name
Type
Values
Access
CLI Parameter
SNMP
Group
N/A
R
snmp
SNMP Management
Interface Bitmask
Interface
Bitmask
0 or 2 - no interfaces
(disable)
1 or 3 - Ethernet
4 or 6 - Wireless
5 or 7 - all interfaces
(default is 7)
RW
snmpifbitmask
Read Password
DisplayString
User Defined
public (default)
max 63 characters
W
snmprpasswd
1 of 2
272 AP-4, AP-5, and AP-6 User Guide
SNMP Commands
Table 44: SNMP Parameters
Name
Type
Values
Access
CLI Parameter
Read/Write
Password
DisplayString
User Defined
public (default)
max 63 characters
W
snmprwpasswd
SNMPv3
Authentication
Password
DisplayString
User Defined
public (default)
max 63 characters
W
snmpv3authpasswd
SNMPv3 Privacy
Password
DisplayString
User Defined
public (default)
max 63 characters
W
snmpv3privpasswd
2 of 2
SNMP Trap Host Table Parameters
When creating table entries, you specify the argument name followed by an argument value.
The CLI applies default values to the omitted arguments. Due to the nature of the information,
the only argument that can be omitted is the “comment” argument.
Note:
Note:
Up to 10 entries can be added to the SNMP Trap Host Table.
Table 45: SNMP Trap Host Table Parameters
Name
Type
Values
Access
CLI Parameter
SNMP Trap Host Table
Table
N/A
R
snmptraphosttbl
Table Index
Integer
User Defined
N/A
index
IP Address
IpAddress
User Defined
RW
ipaddr
Password
DisplayString
User Defined (up to
64 characters)
W
passwd
Comment (optional)
DisplayString
User Defined (up to
254 characters)
RW
cmt
Status (optional)
Integer
enable (default)
disable
delete
RW
status
Issue 2 November 2004
273
The Command Line Interface
Syntax Examples
Change SNMP Passwords
[Device-Name]> set snmprpasswd <New Password> (SNMP read password)
[Device-Name]> set snmprwpasswd <New Password> (SNMP read/write)
[Device-Name]> set snmpv3authpasswd <New Password> (SNMPv3 authentication
password)
[Device-Name]> set snmpv3privpasswd <New Password> (SNMPv3 privacy password)
Configure Management Interfaces
[Device-Name]> set snmpifbitmask <value> (see Table 46)
Choose from the values in Table 46.
Table 46: Interface Bitmask Values
Interface Bitmask
Description
0 or 2 = disable (all interfaces)
All management channels disabled
1 or 3 = Ethernet only
Ethernet only enabled
4 or 6 = Wireless only
Wireless only enabled
5 or 7 = all interfaces
All management channels enabled
274 AP-4, AP-5, and AP-6 User Guide
Spanning Tree Commands
Spanning Tree Commands
Spanning Tree Parameters
Table 47: Spanning Tree Parameters
Name
Type
Values
Access
CLI Parameter
Spanning Tree
Group
N/A
R
stp
Spanning Tree Status
Integer
enable (default)
disable
RW
stpstatus
Bridge Priority
Integer
0 – 65535
32768 (default)
RW
stppriority
Maximum Age
Integer
600 – 4000
(in 0.01 sec intervals; for
example, 6 to 40
seconds)
2000 (default)
RW
stpmaxage
Hello Time
Integer
100 – 1000
(in 0.01 sec intervals; for
example, 1 to 10
seconds)
200 (default)
RW
stphellotime
Forward Delay
Integer
400 – 3000
(in 0.01 sec intervals; for
example, 4 to 30
seconds)
1500 (default)
RW
stpfwddelay
Issue 2 November 2004
275
The Command Line Interface
Spanning Tree Priority and Path Cost Table
Table 48: Spanning Tree Priority and Path Cost Table Parameters
Name
Type
Values
Access
CLI Parameter
Spanning Tree Table
Table
N/A
R
stpbl
Table Index (Port)
N/A
1 – 15
R
index
Priority
Integer
0 – 255
128 (default)
RW
priority
Path Cost
Integer
1 – 65535
100 (default)
RW
pathcost
State
Integer
disable
blocking
listening
learning
forwarding
broken
R
state
Status
Integer
enable
disable
RW
status
SpectraLink VoIP Commands
SpectraLink VoIP Parameters (802.11b and b/g Modes Only)
These parameters enable or disable the SpectraLink Voice over IP feature.
The Spectralink Legacy Support parameter should be enabled if the AP is operating in 802.11bg
mode and legacy 802.11 Spectralink telephones are used. This parameter will set the basic
276 AP-4, AP-5, and AP-6 User Guide
SpectraLink VoIP Commands
rates of the AP to be 1 and 2 Mbps in 802.11bg mode and will allow old telephones that operate
only at the 1 and 2 Mbps basic rate to connect to the AP.
Table 49: SpectraLink VoIP Parameters
Name
Type
Values
Access
CLI Parameter
Spectralink VoIP
Group
N/A
R
spectralink
Spectralink VoIP Status
Integer
enable
disable (default)
RW
speclinkstatus
Spectralink Legacy Support
Integer
enable
disable (default)
RW
speclinklegacysupport
Issue 2 November 2004
277
The Command Line Interface
SSH Commands
SSH Parameters
The following commands enable or disable SSH and set the SSH host key.
Table 50: SSH Parameters
Name
Type
Values
Access
CLI Parameter
SSH Status
Integer
Enable
Disable
RW
sshstatus
SSH Public Host Key
Fingerprint
DisplayString
User
Defined
RW
sshkeyfprint
SSH Host Key Status
Integer
Create
Delete
RW
sshkeystatus
The AP SSH feature, open-SSH, confirms to the SSH protocol, and supports SSH version 2.
Table 51 lists the SSH clients that have been verified to interoperate with the AP’s server. The
table lists the clients, version number, and the Web site of the client.
Table 51: Supported SSH Clients
Clients
Version
Web Site
OpenSSH
V3.4-2
http://www.openssh.com
Putty
Rel 0.53b
http://www.chiark.greenend.org.uk
Zoc
5.00
http://www.emtec.com
Axessh
V2.5
http://www.labf.com
For key generation, OpenSSH client has been verified.
278 AP-4, AP-5, and AP-6 User Guide
Storm Threshold Commands
Storm Threshold Commands
Storm Threshold Parameters
Table 52: Storm Threshold Parameters
Name
Type
Values
Access
CLI Parameter
Storm Threshold
Group
N/A
N/A
stmthres
Broadcast Threshold
Integer
0 – 255 packets/sec
(default is 0)
RW
stmbrdthres
Multicast Threshold
Integer
0 – 255 packets/sec
(default is 0)
RW
stmmultithres
Storm Threshold Table
Table 53: Storm Threshold Table Parameters
Name
Type
Values
Access
CLI Parameter
Storm Threshold Table
Table
N/A
R
stmthrestbl
Table Index
Integer
1 = Ethernet
3 = Wireless
R
index
Broadcast Threshold
Integer
0 – 255 packets/sec
(default is 0)
RW
bcast
Multicast Threshold
Integer
0 – 255 packets/sec
(default is 0)
RW
mcast
Issue 2 November 2004
279
The Command Line Interface
Syslog Commands
Syslog Parameters
The following parameters configure the Syslog settings.
Table 54: Syslog Parameters
Note:
Name
Type
Values
Access
CLI Parameter
Syslog
Group
N/A
R
syslog
Syslog Status
Integer
enable
disable (default)
RW
syslogstatus
Syslog Port
Octet String
514
R
syslogport
Syslog Lowest Priority
Logged
Integer
1–7
1 = LOG_ALERT
2 = LOG_CRIT
3 = LOG_ERR
4 = LOG_WARNING
5 = LOG_NOTICE
6 = LOG_INFO (default)
7 = LOG_DEBUG
RW
syslogpritolog
Heartbeat Status
Integer
enable (1)
disable (2) (default)
RW
sysloghbstatus
Heartbeat Interval
(seconds)
Integer
1 – 604800 seconds
900 sec. (default)
RW
sysloghbinterval
Note:
The Heartbeat parameters are advanced settings not available via the HTTP
interface. When Heartbeat is enabled, the AP periodically sends a message to
the Syslog server to indicate that it is active. The frequency with which the
heartbeat message is sent depends upon the setting of the Heartbeat Interval.
280 AP-4, AP-5, and AP-6 User Guide
Syslog Commands
Syslog Host Table Parameters
The Syslog Host Table configures the Syslog hosts that will receive message from the AP. You
can configure up to ten Syslog hosts.
Table 55: Syslog Host Table Parameters
Name
Type
Values
Access
CLI Parameter
Syslog Host Table
Table
N/A
R
sysloghosttbl
Table Index
Integer
1 – 10
N/A
index
IP Address
IpAddress
User Defined
RW
ipaddr
Comment (optional)
DisplayString
User Defined
RW
cmt
Status (optional)
Integer
enable
disable
delete
RW
status
Syntax Examples
[Device-Name]> set syslogpriority <1-7> (default is 6)
[Device-Name]> set syslogstatus <enable/disable>
[Device-Name]> set sysloghbstatus <enable/disable> (default is disable)
[Device-Name]> set sysloghbinterval <1 - 604800> (default is 900 seconds)
[Device-Name]> set sysloghosttbl <index> ipaddr <ipaddress> cmt <comment> status
<enable/disable>
Issue 2 November 2004
281
The Command Line Interface
System Information Commands
System Parameters
Table 56: System Parameters
Name
Type
Values
Access
CLI Parameter
System
Group
N/A
R
system
Name
DisplayString
User Defined
RW
sysname
Location
DisplayString
User Defined
RW
sysloc
Contact Name
DisplayString
User Defined
RW
sysctname
Contact E-mail
DisplayString
User Defined
RW
sysctemail
Contact Phone
DisplayString
User Defined
Maximum 254
characters
RW
sysctphone
FLASH Backup
Interval
Integer
0 - 65535 seconds
RW
sysflashbckint
0
1
RW
sysflashupdate
Flash Update
System OID
DisplayString
N/A
R
sysoid
Descriptor
DisplayString
System Name, flash
version, S/N,
bootloader version
R
sysdescr
Up Time
Integer
dd:hh:mm:ss
dd – days
hh – hours
mm – minutes
ss – seconds
R
sysuptime
Resets all
parameters to
default factory
values
RW
sysresettodefaults
Note: You must enter the
following command twice
to reset to defaults:
set sysresettodefaults 1
Emergency
Restore to
defaults
1 of 2
282 AP-4, AP-5, and AP-6 User Guide
System Information Commands
Table 56: System Parameters
Name
Type
Values
Access
CLI Parameter
802.11d
Support
Integer
enable
disable
RW
11d
Country code
DisplayString
The country code as
defined by ISO/IEC
3166-1. For a list of
these country
codes, see http://
www.iso.org/iso/en/
prods-services/
iso3166ma/
index.html.
RW
country
2 of 2
Syntax Examples
[Device-Name]> set sysname <system name> sysloc <Unit Location>
[Device-Name]> set sysctname <Contact Name> (person responsible for system)
[Device-Name]> set sysctphone <Contact Phone Number> sysctemail <Contact E-mail
address>
[Device-Name]> show system
Figure 16: Result of “show system” CLI Command
Issue 2 November 2004
283
The Command Line Interface
Enable 802.11d Support and Set the Country Code
Use the following command to enable 802.11d support for additional regulatory domains and
set the country code:
[Device-Name]> set sys 11d enable country <country code>
Telnet Commands
Telnet Parameters
Table 57: Telnet Parameters
Name
Type
Values
Access
CLI Parameter
Telnet
Group
N/A
R
telnet
Telnet Management
Interface Bitmask
Interface
Bitmask
0 or 2 - no interfaces
(disable)
1 or 3 - Ethernet
4 or 6 - Wireless
5 or 7 - all interfaces
(default is 7)
RW
telifbitmask
Telnet Port
Integer
User Defined
23 (default)
RW
telport
Telnet Login Inactivity
Time-out
Integer
1 – 300 seconds
30 sec (default)
RW
tellogintout
Telnet Session Idle
Time-out
Integer
1 - 900 seconds
900 sec (default)
RW
telsessiontout
Syntax Examples
Configure Management Interfaces
[Device-Name]> set telifbitmask <value> (see Table 58)
284 AP-4, AP-5, and AP-6 User Guide
Telnet Commands
Choose from the values in Table 58.
Table 58: Interface Bitmask Values
Interface Bitmask
Description
0 or 2 = disable (all interfaces)
All management channels disabled
1 or 3 = Ethernet only
Ethernet only enabled
4 or 6 = Wireless only
Wireless only enabled
5 or 7 = all interfaces
All management channels enabled
Set TCP Port
[Device-Name]> set telport <Telnet port number> (default is 23)
Set Telnet Session Timeouts
[Device-Name]> set tellogintout <time in seconds between 1 and 300> (default is 30)
[Device-Name]> set telsessiontout <time in seconds between 1 and 36000> (default is
900)
Issue 2 November 2004
285
The Command Line Interface
TFTP Commands
TFTP Server Parameters
These parameters relate to upload and download commands.
When a user executes an upload or download command, the specified arguments are stored in
TFTP parameters for future use. If nothing is specified in the command line when issuing
subsequent upload or download commands, the stored arguments are used.
Table 59: TFTP Server Parameters
Name
Type
Values
Access
CLI Parameter
TFTP
Group
N/A
R
tftp
TFTP Server IP
Address
IpAddress
User Defined
RW
tftpipaddr
TFTP File Name
DisplayString
User Defined
RW
tftpfilename
TFTP File Type
Integer
img
config
bootloader
sslcertificate
sslprivatekey
sshprivatekey
sshpublickey
clibatchfile (CLI Batch File)
cbflog (CLI Batch Error Log)
RW
tftpfiletype
Syntax Examples
Download an AP Configuration File from a TFTP Server
First start your TFTP program. It must be running and configured to transmit and receive.
[Device-Name]> set tftpfilename <file name> tftpfiletype config tftpipaddr <IP address
of your TFTP server>
[Device-Name]> show tftp (to ensure the filename, file type, and the IP address are correct)
286 AP-4, AP-5, and AP-6 User Guide
WDS Commands
[Device-Name]> download *
[Device-Name]> reboot 0
After following the complete process (above) once, you can download a file of the same name
(as long as all the other parameters are the same), with the following command:
[Device-Name]> download *
Backup your AP Configuration File to a TFTP Server
First start your TFTP program. It must be running and configured to transmit and receive.
[Device-Name]> upload <TFTP Server IP address> <tftpfilename (such as “config.sys”)>
config
[Device-Name]> show tftp (to ensure the filename, file type, and the IP address are correct)
After setting the TFTP parameters, you can back up your current file (as long as all the other
parameters are the same), with the following command:
[Device-Name]> upload *
WDS Commands
Wireless Distribution System (WDS) Parameters
Table 60: WDS Parameters
Name
Type
Values
Access
CLI Parameter
WDS Table
Table
N/A
R
wdstbl
Port Index
Integer
3.1 - 3.6 (Wireless)
R
portindex
Status
Integer
enable, disable
RW
status
Partner MAC Address
PhysAddress
User Defined
RW
partnermacaddr
Issue 2 November 2004
287
The Command Line Interface
Wireless Distribution System (WDS) Security Table Parameters
The WDS Security Table manages WDS related security objects.
Table 61: WDS Security Table Parameters
Name
Type
Values
Access
CLI Parameter
WDS Security Table
Table
N/A
R
wdssectbl
Table Index
Integer
Primary Wireless
Interface = 3
Secondary Wireless
Interface = 4
R
index
Security Mode
Integer
none, wep
RW
secmode
Encryption Key 0
WEPKeyType
N/A
WO
encryptkey0
802.11a Wireless Interface Commands
The wireless interface group parameter is wif. For Single-radio APs, the wireless interface uses
table index 3.
See Interface Configuration on page 68 for information on these parameters.
802.11a Parameters
Table 62: 802.11a Wireless Interface Parameters
Name
Type
Values
Access
CLI Parameter
Wireless Interfaces
Group
N/A
R
wif
Table Index
Integer
3 or 4 (Dual-radio
APs)
R
index
Network Name
(SSID)
DisplayString
2 – 31 characters
My Wireless Network
(default)
RW
netname
1 of 3
288 AP-4, AP-5, and AP-6 User Guide
802.11a Wireless Interface Commands
Table 62: 802.11a Wireless Interface Parameters
Name
Type
Values
Access
CLI Parameter
Auto Channel Select
(ACS)1
Integer
enable (default)
disable
RW
autochannel
DTIM Period
Integer
1 – 255
1 = default
RW
dtimperiod
RTS/CTS Medium
Reservation
Integer
0 – 2347
Default is 2347 (off)
RW
medres
MAC Address
PhyAddress
12 hex digits
R
macaddr
Closed System
Integer
enable
disable (default)
RW
closedsys
Wireless Service
Status
Integer
1 = resume
2= shutdown
RW
wssstatus
Supported Frequency
Channels
Octet String
Depends on
Regulatory Domain
R
suppchannels
Transmit Power Level
Integer
1=100%
2=50%
3=25%
4=12.5%
RW
currenttxpowerlevel
Load Balancing
Integer
enable (default)
disable
RW
ldbalance
Operating Frequency
Channel
Integer
Varies by regulatory
domain and country.
See 802.11a
Channel
Frequencies on
page 319
RW
channel
Supported Data
Rates
Octet String
See Transmit Rate,
below
R
suppdatarates
Transmit Rate
Integer32
0 - Auto Fallback
(default)
6 Mbits/sec
9 Mbits/sec
12 Mbits/sec
18 Mbits/sec
24 Mbits/sec
36 Mbits/sec
48 Mbits/sec
54 Mbits/sec
RW
txrate
2 of 3
Issue 2 November 2004
289
The Command Line Interface
Table 62: 802.11a Wireless Interface Parameters
Name
Type
Values
Access
CLI Parameter
Physical Layer Type
Integer
ofdm (orthogonal
frequency division
multiplexing) for
802.11a
R
phytype
Note 1: For 802.11a APs in Europe, Auto Channel Select is a read-only parameter; it is always
enabled.
3 of 3
Syntax Examples
Network Name (SSID)
[Device-Name]> set wif <index 3> netname <Network Name (SSID) for wireless
interface>
[Device-Name]> show wif
Figure 17: Results of “show wif” CLI command for an AP
290 AP-4, AP-5, and AP-6 User Guide
802.11a Wireless Interface Commands
Operational Mode
[Device-Name]> set wif <index> mode <value> (see Table 63)
Table 63: WIF Operational Modes
Mode
Operational Mode
1
dot11b-only
2
dot11g-only
3
dot11bg
4
dot11a-only
5
dot11g-wifi
TX Power Control
The TX Power Control feature lets the user configure the transmit power level of the card in the
AP at one of four levels:
●
100% of the maximum transmit power level of the card
●
50%
●
25%
●
12.5%
Perform the following commands to enable TX Power Control and set the transmit power level:
[Device-Name]> set txpowercontrol enable
[Device-Name]> set wif <interface number> currenttxpowerlevel <value>
Allowed values are: 1 (100%), 2 (50%), 3 (25%), 4 (12.5%)
Autochannel Select (ACS)
ACS is enabled by default. Reboot after disabling or enabling ACS.
[Device-Name]> set wif <index> autochannel <enable/disable>
[Device-Name]> reboot 0
Enable/Disable Closed System
[Device-Name]> set wif <index> closedsys <enable/disable>
Issue 2 November 2004
291
The Command Line Interface
Shutdown/Resume Wireless Service
[Device-Name]> set wif <index> wssstatus <1 (resume)/2 (shutdown)>
802.11b Wireless Interface Commands
The wireless interface group parameter is wif. For Single-radio APs, the wireless interface uses
table index 3.
See Interface Configuration on page 68 for information on these parameters.
802.11b Parameters
Table 64: 802.11b Wireless Interface Parameters
Name
Type
Values
Access
CLI Parameter
Wireless
Interfaces
Group
N/A
R
wif
Table Index
Integer
3 or 4 (Dual-radio APs)
R
index
Network Name
(SSID)
DisplayString
2 – 31 characters
My Wireless Network
(default)
RW
netname
Auto Channel
Select (ACS)1
Integer
enable (default)
disable
RW
autochannel
DTIM Period
Integer
1 – 255
1 = default
RW
dtimperiod
RTS/CTS Medium
Reservation
Integer
0 – 2347
Default is 2347 (off)
RW
medres
MAC Address
PhyAddress
12 hex digits
R
macaddr
Closed System
Integer
enable
disable (default)
RW
closedsys
Wireless Service
Status
Integer
1 = resume
2= shutdown
RW
wssstatus
1 of 3
292 AP-4, AP-5, and AP-6 User Guide
802.11b Wireless Interface Commands
Table 64: 802.11b Wireless Interface Parameters
Name
Type
Values
Access
CLI Parameter
Supported
Frequency
Channels
Octet String
Depends on Regulatory
Domain
R
suppchannels
Transmit Power
Level
Integer
1=100%
2=50%
3=25%
4=12.5%
RW
currenttxpowerlevel
Load Balancing
Integer
enable (default)
disable
RW
ldbalance
Distance between
APs
Integer
large (default)
medium
small
minicell
microcell
RW
distaps
Interference
Robustness
Integer
enable (default)
disable
RW
interrobust
Operating
Frequency
Channel
Integer
1 - 14
Available channels vary
by regulatory domain/
country; see 802.11b
Channel
Frequencies on
page 321
RW
channel
Multicast Rate
Integer
1 Mbits/sec (1)
2 Mbits/sec (2) (default)
5.5 Mbits/sec (3)
11 Mbits/sec (4)
RW
multrate
Medium
Distribution
Integer
enable (default)
disable
RW
meddendistrib
Supported Data
Rates
Octet String
1 Mbits/sec
2 Mbits/sec
5.5 Mbits/sec
11 Mbits/sec
R
suppdatarates
2 of 3
Issue 2 November 2004
293
The Command Line Interface
Table 64: 802.11b Wireless Interface Parameters
Name
Type
Values
Access
CLI Parameter
Transmit Rate
Integer32
0 (auto fallback default)
1 Mbits/sec
2 Mbits/sec
5.5 Mbits/sec
11 Mbits/sec
RW
txrate
Physical Layer
Type
Integer
dsss (direct sequence
spread spectrum) for
802.11b
R
phytype
Regulatory
Domain List
DisplayString
U.S./Canada -- FCC
Europe -- ETSI
Japan -- MKK
R
regdomain
Note 1: For 802.11a APs in Europe, Auto Channel Select is a read-only parameter; it is always
enabled.
3 of 3
Syntax Examples
Network Name (SSID)
[Device-Name]> set wif <index 3> netname <Network Name (SSID) for wireless
interface>
[Device-Name]> show wif
For results of the show wif command, see Figure 17.
Operational Mode
[Device-Name]> set wif <index> mode <value> (see Table 65)
Table 65: WIF Operational Modes
Mode
Operational Mode
1
dot11b-only
2
dot11g-only
3
dot11bg
294 AP-4, AP-5, and AP-6 User Guide
802.11b Wireless Interface Commands
Table 65: WIF Operational Modes
Mode
Operational Mode
4
dot11a-only
5
dot11g-wifi
TX Power Control
The TX Power Control feature lets the user configure the transmit power level of the card in the
AP at one of four levels:
●
100% of the maximum transmit power level of the card
●
50%
●
25%
●
12.5%
Perform the following commands to enable TX Power Control and set the transmit power level:
[Device-Name]> set txpowercontrol enable
[Device-Name]> set wif <interface number> currenttxpowerlevel <value>
Allowed values are: 1 (100%), 2 (50%), 3 (25%), 4 (12.5%)
Autochannel Select (ACS)
ACS is enabled by default. Reboot after disabling or enabling ACS.
[Device-Name]> set wif <index> autochannel <enable/disable>
[Device-Name]> reboot 0
Enable/Disable Closed System
[Device-Name]> set wif <index> closedsys <enable/disable>
Shutdown/Resume Wireless Service
[Device-Name]> set wif <index> wssstatus <1 (resume)/2 (shutdown)>
Enable/Disable Interference Robustness (802.11b Only)
[Device-Name]> set wif <index> interrobust <enable/disable>
Issue 2 November 2004
295
The Command Line Interface
Enable/Disable Load Balancing (802.11b Only)
[Device-Name]> set wif <index> ldbalance <enable/disable>
Enable/Disable Medium Density Distribution (802.11b Only)
[Device-Name]> set wif <index> meddendistrib <enable/disable>
Set the Distance Between APs (802.11b Only)
[Device-Name]> set wif <index> distaps <large, medium, small, minicell, microcell>
[Device-Name]> reboot
Note:
Note:
The distance between APs should not be approximated. It is calculated by means
of a manual Site Survey, in which an AP is set up and clients are tested
throughout the area to determine signal strength and coverage, and local limits
such as physical interference are investigated. From these measurements the
appropriate cell size and density is determined, and the optimum distance
between APs is calculated to suit your particular business requirements.
Set the Multicast Rate (802.11b Only)
[Device-Name]> set wif <index> multrate <1,2,5.5,11 (Mbits/sec)>
Note:
Note:
Note:
The Distance Between APs must be set before the Multicast Rate.
Note:
There is an inter-dependent relationship between the Distance between APs and
the Multicast Rate. In general, larger systems operate at lower average transmit
rates.
Table 66: Distance between APs and Multicast Rates
Distance between APs
Multicast Rate
Large
1 and 2 Mbits/sec
Medium
1, 2, and 5.5 Mbits/sec
Small
1, 2, 5.5 and 11 Mbits/sec
296 AP-4, AP-5, and AP-6 User Guide
802.11b/g Wireless Interface Commands
Table 66: Distance between APs and Multicast Rates
Distance between APs
Multicast Rate
Minicell
1, 2, 5.5 and 11 Mbits/sec
Microcell
1, 2, 5.5 and 11 Mbits/sec
802.11b/g Wireless Interface Commands
The wireless interface group parameter is wif. For Single-radio APs, the wireless interface uses
table index 3.
See Interface Configuration on page 68 for information on these parameters.
802.11b/g Parameters
Table 67: 802.11b/g Wireless Interface Parameters
Name
Type
Values
Access
CLI Parameter
Wireless Interfaces
Group
N/A
R
wif
Table Index
Integer
3 or 4 (Dual-radio APs)
R
index
Network Name
(SSID)
DisplayString
2 – 31 characters
My Wireless Network
(default)
RW
netname
Auto Channel
Select (ACS)1
Integer
enable (default)
disable
RW
autochannel
DTIM Period
Integer
1 – 255
1 = default
RW
dtimperiod
RTS/CTS Medium
Reservation
Integer
0 – 2347
Default is 2347 (off)
RW
medres
MAC Address
PhyAddress
12 hex digits
R
macaddr
1 of 3
Issue 2 November 2004
297
The Command Line Interface
Table 67: 802.11b/g Wireless Interface Parameters
Name
Type
Values
Access
CLI Parameter
Closed System
Integer
enable
disable (default)
RW
closedsys
Wireless Service
Status
Integer
1 = resume
2= shutdown
RW
wssstatus
Supported
Frequency
Channels
Octet String
Depends on
Regulatory Domain
R
suppchannels
Transmit Power
Level
Integer
1=100%
2=50%
3=25%
4=12.5%
RW
currenttxpowerlevel
Load Balancing
Integer
enable (default)
disable
RW
ldbalance
Wireless
Operational Mode
Integer
dot11b-only
dot11g-only
dot11bg (default)
dot11g-wifi
RW
mode
Operating
Frequency Channel
Integer
1 - 14; available
channels vary by
regulatory domain/
country; see 802.11g
Channel
Frequencies on
page 322
RW
channel
Supported Data
Rates
Octet String
See Transmit Rate,
next.
R
suppdatarates
2 of 3
298 AP-4, AP-5, and AP-6 User Guide
802.11b/g Wireless Interface Commands
Table 67: 802.11b/g Wireless Interface Parameters
Name
Type
Values
Access
CLI Parameter
Transmit Rate
Integer32
For 802.11b-only
mode:
0 (auto fallback default)
1 Mbits/sec
2 Mbits/sec
5.5 Mbits/sec
11 Mbits/sec
RW
txrate
R
phytype
For 802.11g-only
mode:
0 (auto fallback default)
6 Mbits/sec
9 Mbits/sec
12 Mbits/sec
18 Mbits/sec
24 Mbits/sec
36 Mbits/sec
48 Mbits/sec
54 Mbits/sec
36 Mbits/sec
48 Mbits/sec
54 Mbits/sec
For 802.11g-wifi and
802.11bg modes:
0 (auto fallback default)
1 Mbits/sec
2 Mbits/sec
5.5 Mbits/sec
11 Mbits/sec
6 Mbits/sec
9 Mbits/sec
12 Mbits/sec
18 Mbits/sec
24 Mbits/sec
Physical Layer
Type
Integer
ERP (Extended Rate
Protocol)
Note 1: For 802.11a APs in Europe, Auto Channel Select is a read-only parameter; it is always
enabled.
3 of 3
Issue 2 November 2004
299
The Command Line Interface
Network Name (SSID)
[Device-Name]> set wif <index 3> netname <Network Name (SSID) for wireless
interface>
[Device-Name]> show wif
For results of the show wif command, see Figure 17.
Operational Mode
[Device-Name]> set wif <index> mode <value> (see Table 68)
Table 68: WIF Operational Modes
Mode
Operational Mode
1
dot11b-only
2
dot11g-only
3
dot11bg
4
dot11a-only
5
dot11g-wifi
TX Power Control
The TX Power Control feature lets the user configure the transmit power level of the card in the
AP at one of four levels:
●
100% of the maximum transmit power level of the card
●
50%
●
25%
●
12.5%
Perform the following commands to enable TX Power Control and set the transmit power level:
[Device-Name]> set txpowercontrol enable
[Device-Name]> set wif <interface number> currenttxpowerlevel <value>
Allowed values are: 1 (100%), 2 (50%), 3 (25%), 4 (12.5%)
Autochannel Select (ACS)
ACS is enabled by default. Reboot after disabling or enabling ACS.
300 AP-4, AP-5, and AP-6 User Guide
802.11b/g Wireless Interface Commands
[Device-Name]> set wif <index> autochannel <enable/disable>
[Device-Name]> reboot 0
Enable/Disable Closed System
[Device-Name]> set wif <index> closedsys <enable/disable>
Shutdown/Resume Wireless Service
[Device-Name]> set wif <index> wssstatus <1 (resume)/2 (shutdown)>
Issue 2 November 2004
301
The Command Line Interface
Wireless Interface SSID/VLAN/Profile Commands
Wireless Interface SSID Table Parameters
The Wireless Interface SSID table manages the SSID/VLAN pairs, and the Security Profile and
RADIUS Profiles associated to the VLAN
Note:
Note:
The ability to configure up to 16 VLAN/SSID pairs and to configure security and
RADIUS profiles per SSID is available only for 802.11b/g APs and 802.11a
Upgrade Kit APs. 802.11b APs do not support multiple VLAN/SSID pairs. APs
with the 802.11a card support multiple VLAN/SSID pairs, but do not support the
security profile per SSID capability.
Table 69: Wireless Interface SSID Table Parameters 1 of 2
Name
Type
Values
Access
CLI Parameter
Wireless Interface
SSID Table
Table
N/A
R
wifssidtbl
Table Index
Integer
Primary
Wireless
Interface = 3
Secondary
Wireless
Interface = 4
R
index
Table Index
Integer
1 - 16 (SSID
index)
R
ssidindex
SSID
DisplayString
0 - 32
characters
RW
ssid
VLAN ID
VlanId
-1 - 4094
RW
vlanid
Table Row Status
RowStatus
enable
disable
RW
status
SSID Authorization
Status per VLAN
Integer
Enable
Disable
RW
ssidauth
RADIUS Accounting
Status per VLAN
Integer
Enable
Disable
RW
acctstatus
1 of 2
302 AP-4, AP-5, and AP-6 User Guide
Wireless Interface SSID/VLAN/Profile Commands
Table 69: Wireless Interface SSID Table Parameters 2 of 2
Name
Type
Values
Access
CLI Parameter
MAC ACL Status per
VLAN
Integer
Enable
Disable
RW
macaclstatus
Security Profile
Integer
1-32
RW
secprofile
RADIUS MAC Profile
Integer
RW
radmacprofile
RADIUS EAP Profile
Integer
RW
radeapprofile
RADIUS Accounting
Profile
Integer
RW
radacctprofile
Deny Non Encrypted
Data
Integer
R/W
denynonencrypted
Enable
Disable
2 of 2
Syntax Examples
To configure an SSID/VLAN pair, and to assign a Security Profile and RADIUS Profiles to it, use
the following command:
Syntax:
[Device-Name]> set wifssidtbl <Index.subindex> ssid <Network Name>
vlanid <-1 to 1094> ssidauth <enable/disable> acctstatus <enable/disable>
secprofile <Security Profile Number> radmacprofile <MAC Authentication
Profile Name> radeapprofile <EAP Authentication Profile Name>
radacctprofile <Accounting Profile Name> radmacauthstatus <enable/
disable> aclstatus <enable/disable> denynonencrypted <enable/disable>
Example:
[Device-Name]> set wifssidtbl 3.1 ssid accesspt1 vlanid 22 ssidauth enable
acctstatus enable secprofile 1 radmacprofile "MAC Authentication"
radeapprofile "EAP Authentication" radacctprofile "Accounting"
radmacauthstatus enable aclstatus enable
Example:
[Device-Name]> set wifssidtbl 4.1 ssid accesspt1 vlanid 22 ssidauth enable
acctstatus enable secprofile 1 radmacprofile "MAC Authentication"
radeapprofile "EAP Authentication" radacctprofile "Accounting"
radmacauthstatus enable aclstatus enable
Issue 2 November 2004
303
The Command Line Interface
VLAN/SSID Pair Commands
VLAN/SSID Parameters
Table 70: VLAN/SSID Parameters
Name
Type
Values
Access
CLI Parameter
VLAN
Group
N/A
R
vlan
Status
Integer
enable
disable (default)
RW
vlanstatus
Management ID
VlanId
-1 (untagged)
or 1-4094
RW
vlanmgmtid
Syntax Examples
Enable VLAN Management
[Device-Name]> set vlanstatus enable
[Device-Name]> set vlanmgmtid <-1-4094>
[Device-Name]> show wifssidtbl (to review your settings)
[Device-Name]> reboot 0
Disable VLAN Management
[Device-Name]> set vlanstatus disable or 2
[Device-Name]> set vlanmgmtid 0
[Device-Name]> reboot 0
304 AP-4, AP-5, and AP-6 User Guide
CLI Batch File
CLI Batch File
A CLI Batch file is a user-editable configuration file that provides a user-friendly way to change
the AP configuration through a file upload. The CLI Batch file is an ASCII file that facilitates Auto
Configuration because it does not require the user to access one of the AP’s management
interfaces to make configuration changes as is required with the proprietary TLV format
configuration file.
The CLI Batch file does not replace the existing TLV format configuration file, which continues to
define the configuration of the AP.
The CLI Batch file contains a list of CLI commands that the AP will execute. The AP performs
the commands in the file immediately after the file is uploaded to the AP manually or during
Auto Configuration.
The AP parses the file and executes the CLI commands. Commands that do not require a
reboot take effect immediately, while commands that require a reboot (typically commands
affecting a wireless interface) will take effect after reboot.
Auto Configuration and the CLI Batch File
The Auto Configuration feature allows download of the TLV format configuration file or the CLI
Batch file. The AP detects whether the file uploaded is TLV format or a CLI Batch file. If the AP
detects a CLI Batch file (a file with extension .cli), the AP executes the file immediately.
The AP will reboot after executing the CLI Batch file. Auto Configuration will not result in
repeated reboots if the CLI Batch file contains rebootable parameters.
CLI Batch File Format and Syntax
The CLI Batch file must be named with a .cli extension to be recognized by the AP. The
maximum file size allowed is 100 Kbytes, and files with larger sizes cannot be uploaded to the
AP. The CLI commands supported in the CLI Batch File are a subset of the legal AP CLI
commands.
The follow commands are supported:
●
Set commands
●
Reboot command (the reboot command ignores the argument (time))
●
Passwd command
Each command must be separated by a new line. Refer to Appendix A, CLI Command
Reference for detailed command syntax.
Issue 2 November 2004
305
The Command Line Interface
Note:
The following commands are not supported: Show command, Debug command,
Undebug command, Upload command, Download command, Kill command, and
the Exit, Quit, and Done commands.
Note:
Sample CLI Batch File
The following is a sample CLI Batch File:
set sysname system1
set sysloc sunnyvale
set sysctname contact1
set sysctphone 1234567890
set sysctemail [email protected]
set ipaddr 11.0.0.66
set ipaddrtype static
set ipsubmask 255.255.255.0
set ipgw 11.0.0.1
set wif 4 autochannel disable
set wif 4 mode 1
set syslogstatus enable
set sysloghbstatus enable
set sysloghbinterval 5
set wif 4 netname london
reboot
Reboot Behavior
When a CLI Batch file contains a reboot command, the reboot will occur only after the entire CLI
Batch file has been executed.
There are two methods of uploading the CLI Batch File:
●
Upload
●
Upload and reboot (this option is to be used for a CLI Batch file containing the
configuration parameters that require a reboot)
CLI Batch File Error Log
If there is any error during the execution of the CLI Batch file, the AP will stop executing the file.
The AP generates traps for all errors and each trap contains the following information:
●
Start of execution
●
Original filename of the uploaded file
●
End of execution (along with the status of execution)
306 AP-4, AP-5, and AP-6 User Guide
CLI Batch File
●
Line number and description of failures that occurred during execution
The AP logs all the errors during execution and stores them in the Flash memory in a CLI Batch
File Error Log named “CBFERR.LOG”. The CLI Batch File Error Log can be downloaded though
TFTP, HTTP, or CLI file transfer to a specified host.
Issue 2 November 2004
307
The Command Line Interface
308 AP-4, AP-5, and AP-6 User Guide
Appendix B: ASCII Character Chart
Description
You can configure WEP Encryption Keys in either Hexadecimal or ASCII format. Hexadecimal
digits are 0-9 and A-F (not case sensitive). ASCII characters are 0-9, A-F, a-f (case sensitive),
and punctuation marks. Each ASCII character corresponds to two hexadecimal digits.
The table below lists the ASCII characters that you can use to configure WEP Encryption Keys.
It also lists the Hexadecimal equivalent for each ASCII character.
Table 71:
ASCII
Character
Hex
Equivalent
ASCII
Character
Hex
Equivalent
ASCII
Character
Hex
Equivalent
ASCII
Character
Hex
Equivalent
!
21
9
39
Q
51
i
69
"
22
:
3A
R
52
j
6A
#
23
;
3B
S
53
k
6B
$
24
<
3C
T
54
l
6C
%
25
=
3D
U
55
m
6D
&
26
>
3E
V
56
n
6E
'
27
?
3F
W
57
o
6F
(
28
@
40
X
58
p
70
)
29
A
41
Y
59
q
71
*
2A
B
42
Z
5A
r
72
+
2B
C
43
[
5B
s
73
,
2C
D
44
\
5C
t
74
-
2D
E
45
]
5D
u
75
.
2E
F
46
^
5E
v
76
/
2F
G
47
_
5F
w
77
0
30
H
48
`
60
x
78
1
31
I
49
a
61
y
79
2
32
J
4A
b
62
z
7A
1 of 2
Issue 2 November 2004
309
ASCII Character Chart
Table 71:
ASCII
Character
Hex
Equivalent
ASCII
Character
Hex
Equivalent
ASCII
Character
Hex
Equivalent
ASCII
Character
Hex
Equivalent
3
33
K
4B
c
63
{
7B
4
34
L
4C
d
64
|
7C
5
35
M
4D
e
65
}
7D
6
36
N
4E
f
66
~
7E
7
37
O
4F
g
67
8
38
P
50
h
68
2 of 2
310 AP-4, AP-5, and AP-6 User Guide
Appendix C: Specifications
In This Appendix
●
Software Features
●
Hardware Specifications
●
Radio Specifications
Software Features
The tables below compare the software features available depending on the card type in the
Access Point:
●
Number of Stations per BSS
●
Management Functions
●
Advanced Bridging Functions
●
Medium Access Control (MAC) Functions
●
Security Functions
●
Network Functions
●
Advanced Wireless Functions
Issue 2 November 2004
311
Specifications
Number of Stations per BSS
Table 72: Number of Stations per BSS
Feature
AP-4
AP-5
AP-6 & 11b/g Kit
AP-6 & 11a/b/g Kit
Without
encryption
up to 250
up to 250
up to 250
up to 250
With WEP
encryption
up to 120
up to 120
up to 120
up to 120
With 802.1x
Authentication
up to 88
up to 88
up to 88
up to 88
With WPA
N/A
N/A
up to 27
up to 27
Management Functions
Table 73: Management Functions
Feature
802.11b
802.11a
802.11b/g
Web User Interface
yes
yes
yes
Telnet / CLI
yes
yes
yes
SNMP Agent
yes
yes
yes
TFTP
yes
yes
yes
Advanced Bridging Functions
Table 74: Advanced Bridging Functions
Feature
802.11b
802.11a
802.11b/g
IEEE 802.1d Bridging
yes
yes
yes
WDS Relay
yes
yes
yes
Roaming
yes
yes
yes
1 of 2
312 AP-4, AP-5, and AP-6 User Guide
Software Features
Table 74: Advanced Bridging Functions
Feature
802.11b
802.11a
802.11b/g
Protocol Filtering
yes
yes
yes
Multicast/Broadcast Storm Filtering
yes
yes
yes
Proxy ARP
yes
yes
yes
TCP/UDP Port Filtering
yes
yes
yes
Blocking Intra BSS Clients
yes
yes
yes
Packet Forwarding
yes
yes
yes
2 of 2
Medium Access Control (MAC) Functions
Table 75: MAC Functions
Feature
802.11b
802.11a
802.11b/g
Automatic Channel Selection (ACS)
yes
yes
yes
Dynamic Frequency Selection (DFS) 1
N/A
yes
N/A
Closed System Feature
yes
yes
yes
Wireless Service Shutdown
yes
yes
yes
802.11d Support
yes
yes
yes
TX Power Control
N/A
Available with
802.11a
upgrade kit.
Not available
with 5Ghz
upgrade kit.
yes
Note 1: A user cannot manually select a channel for products sold in Europe; these products
require automatic channel selection using Dynamic Frequency Selection (DFS) on page 75.
Issue 2 November 2004
313
Specifications
Security Functions
Table 76: Security Functions
Feature
802.11b
802.11a
802.11b/g
Security Profiles per VLAN
yes
yes
yes
RADIUS Profiles per VLAN
yes
yes
yes
IEEE 802.11 WEP 1
yes
yes
yes
MAC Access Control
yes
yes
yes
RADIUS-Based
Management Access Control
yes
yes
yes
RADIUS MAC-based Access
Control
yes
yes
yes
IEEE 802.1x Authentication 2
yes
yes
yes
Multiple Authentication
Server Support per VLAN4
yes
yes
yes
Rogue Access Point
Detection
no
yes
yes
Per User Per Session
(PUPS) Encryption 3
N/A
yes
yes
Wi-Fi Protected Access
(WPA)
N/A
Available with AP-6a/
b/g or 802.11a/b/g
Upgrade Kit
Not available with
AP-5.
yes
Note 1: Key lengths supported by 802.11a: 64-bit, 128-bit, and 152-bit.
Key lengths supported by 802.11b: 64-bit and 128-bit.
Key lengths supported by 802.11b/g: 64-bit, 128-bit, and 152-bit.
Note 2: EAP-MD5, EAP-TLS, EAP-TTLS, and PEAP client supplicant supported.
Note 3: Use in conjunction with WPA or 802.1x Authentication.
Note 4: Support is provided for a primary and backup RADIUS authentication server for both
MAC-based authentication and 802.1x authentication.
314 AP-4, AP-5, and AP-6 User Guide
Software Features
Network Functions
Table 77: Network Functions
Feature
802.11b
802.11a
802.11b/g
DHCP Client
yes
yes
yes
DHCP Server
yes
yes
yes
Inter Access Point Protocol
(IAPP)
yes
yes
yes
Link Integrity
yes
yes
yes
System Logging (Syslog)
yes
yes
yes
RADIUS Accounting Support 1
yes
yes
yes
DNS Client
yes
yes
yes
TCP/IP Protocol Support
yes
yes
yes
Virtual LAN Support
One VLAN ID per
wireless interface
AP-5: One VLAN per
wireless interface
AP-5 with 802.11a/b/g
upgrade kit: Up to 16
VLAN IDs per
wireless interface
Up to 16 VLAN IDs
per wireless
interface
Note 1: Includes Fallback to Primary RADIUS Server, RADIUS Session Timeout, RADIUS Multiple
MAC Address Formats, RADIUS DNS Host Name Support, RADIUS Start/Stop Accounting.
Issue 2 November 2004
315
Specifications
Advanced Wireless Functions
Table 78: Advanced Wireless Functions
Feature
802.11b
802.11a
802.11b/g
WEP Plus
(Weak Key Avoidance)
yes
—
—
Remote Link Test
yes
—
—
Link Test Responder2
yes
yes
—
Load Balancing2
yes
yes
—
AP List2
yes
—
—
Medium Density Distribution3
yes
—
—
Distance between APs3
yes
—
—
Interference Robustness
yes
—
yes
SpectraLink VoIP Support
yes
—
—
Note 1: Available only one way (AP to client) if using an Avaya 802.11a/b Card or a non-Avaya
Wireless client.
Note 2: No client support in 802.11a or 802.11b/g.
Note 3: This feature is not available if you are using an Avaya 802.11a/b Card or a non-Avaya
Wireless client with an 802.11b AP.
316 AP-4, AP-5, and AP-6 User Guide
Hardware Specifications
Hardware Specifications
Physical Specifications
AP (without metal base)
Dimensions (H x W x L) = 3.5 x 17 x 21.5 cm (1.5 x 6.75 x 8.5 in.)
Weight = 0.68 kg (1.50 lb.)
Electrical Specifications
Using the Power Adapter
Voltage (Input) = 100 to 240 VAC (50-60 Hz) @ 0.4 A
Voltage (Output) = 12 VDC
Power Consumption = 10 Watts
Using Active Ethernet
Input Voltage = 42 to 60 VDC
Output Current = 200mA at 48V
Power Consumption = 10 Watts
Issue 2 November 2004
317
Specifications
Environmental Specifications
AP Unit
●
Operating Temperature = 0° to +55°C ambient temperature (without plastic cabinet)
●
Operating Humidity = 95% maximum (non condensing)
●
Storage Temperature = -20 to +75°C ambient temperature
●
Storage Humidity = 95% maximum (non condensing)
Note:
For AP-6 units operating at temperatures above 50°C (122°F), we recommend
that the plastic enclosure be removed.
Note:
Ethernet Interface
10/100 Base-TX, RJ-45 female socket
Serial Port Interface
Standard RS-232C interface with DB-9, female connector
Active Ethernet Interface
Category 5, foiled, twisted pair cables must be used to ensure compliance with FCC Part 15,
subpart B, Class B requirements
Standard 802.3af pin assignments
HTTP Interface
●
Microsoft Internet Explorer 6 with Service Pack 1 or later
●
Netscape 6.1 or later
318 AP-4, AP-5, and AP-6 User Guide
Radio Specifications
Radio Specifications
●
802.11a Channel Frequencies
●
802.11b Channel Frequencies
●
802.11g Channel Frequencies
●
Wireless Communication Range
Note:
Refer to the Regulatory Flyer included with the AP for the latest regulatory
information.
Note:
802.11a Channel Frequencies
The available 802.11a Channels varies by regulatory domain and/or country. 802.11a radio
certification is available in the following regions:
●
FCC: U.S., Canada, and Australia
●
ETSI: Europe and the United Kingdom
●
TELEC: Japan
●
SG: Singapore
●
ASIA: China, Hong Kong, and South Korea
●
TW: Taiwan
There are five sets of frequency bands that determine the available channels depending on the
regulatory domain.
Some countries restrict 802.11a operation to specific frequency bands. The Web interface and
CLI display the available channels for a radio's particular regulatory domain. In the CLI, any
channels that are not available are labeled “Not Supported”.
Issue 2 November 2004
319
Specifications
Table 79: 802.11a Channel Frequencies
Frequency Band
Channel ID
FCC (GHz)
ETSI (GHz)
TELEC (GHz)
SG (GHz)
ASIA (GHz)
TW (GHz)
Lower Band
(36 = default)
34
—
—
5.170 1
—
—
—
36
5.180
5.180
—
5.180
—
—
38
—
—
5.190
—
—
—
40
5.200
5.200
—
5.200
—
—
42
—
—
5.210
—
—
—
44
5.220
5.220
—
5.220
—
—
46
—
—
5.230
—
—
—
48
5.240
5.240
—
5.240
—
—
52
5.260
5.260
—
—
—
5.260
56
5.280
5.280
—
—
—
5.280
58
5.300
5.300
—
—
—
5.300
60
5.320
5.320
—
—
—
5.320
100
—
5.500
—
—
—
—
104
—
5.520
—
—
—
—
108
—
5.540
—
—
—
—
112
—
5.560
—
—
—
—
116
—
5.580
—
—
—
—
120
—
5.600
—
—
—
—
124
—
5.620
—
—
—
—
128
—
5.640
—
—
—
—
132
—
5.660
—
—
—
—
136
—
5.680
—
—
—
—
140
—
5.700
—
—
—
—
149
5.745
—
—
5.745
5.745
5.745
153
5.675
—
—
5.675
5.675
5.675
157
5.785
—
—
5.785
5.785
5.785
161
5.805
—
—
5.805
5.805
5.805
165
5.825
—
—
5.825
—
5.825
Middle Band
(52 = default)
H Band
Upper Band
(149 = default)
ISM Band
Note 1: Channel 34 is the default channel for Japan
320 AP-4, AP-5, and AP-6 User Guide
Radio Specifications
802.11b Channel Frequencies
The available 802.11b channels vary by regulatory domain and/or country. 802.11b radio
certification is available in the following regions:
●
FCC - U.S./Canada, Mexico, South America, India, Korea, Australia, and South Africa
●
ETSI - Most of Europe, including the United Kingdom, Ireland, Singapore, and Hong Kong
●
TELEC - Japan
●
IL - Israel
Some countries restrict 802.11b operation to specific frequency bands. The web interface will
always display the available channels depending in the cards regulatory domain. In the CLI, any
channels that are not available are labeled “Not Supported”.
Table 80: 802.11b Channel Frequencies
Channel ID
FCC (GHz)
ETSI (GHz)
TELEC (GHz)
IL (GHz)
1
2.412
2.412
2.412
-
2
2.417
2.417
2.417
-
3
2.422
2.422
2.422
-
4
2.427
2.427
2.427
2.427
5
2.432
2.432
2.432
2.432
6
2.437
2.437
2.437
2.437
7
2.442
2.442
2.442
2.442
8
2.447
2.447
2.447
2.447
9
2.452
2.452
2.452
-
10
2.457
2.4571
2.457
-
11
2.462
2.4621
2.462
-
12
-
2.4671
2.467
-
13
-
2.4721
2.472
-
14
-
-
2.484
-
Note 1: France is restricted to these four channels.
Issue 2 November 2004
321
Specifications
802.11g Channel Frequencies
The available 802.11g channels vary by regulatory domain and/or country. 802.11g radio
certification is available in the following regions:
●
FCC - U.S./Canada, Mexico, and Australia
●
ETSI - Europe and the United Kingdom
●
ETSI - Europe, including the United Kingdom, China, and South Korea
●
TELEC - Japan
●
IL - Israel
Some countries restrict 802.11g operation to specific frequency bands. The web interface will
always display the available channels depending in the cards regulatory domain. In the CLI, any
channels that are not available are labeled “Not Supported”.
Table 81: 802.11g Channel Frequencies
Channel ID
FCC (GHz)
ETSI (GHz)
TELEC (GHz)
IL (GHz)
1
2.412
2.412
2.412
-
2
2.417
2.417
2.417
-
3
2.422
2.422
2.422
-
4
2.427
2.427
2.427
2.427
5
2.432
2.432
2.432
2.432
6
2.437
2.437
2.437
2.437
7
2.442
2.442
2.442
2.442
8
2.447
2.447
2.447
2.447
9
2.452
2.452
2.452
-
10
2.457
2.4571
2.457
-
11
2.462
2.4621
2.462
-
12
-
2.4671
2.467
-
13
-
2.4721
2.472
-
14
-
-
2.4842
-
Note 1: France is restricted to these channels.
Note 2: Channel 14 is only available when using 802.11b only mode.
322 AP-4, AP-5, and AP-6 User Guide
Radio Specifications
Wireless Communication Range
The range of the wireless signal is related to the composition of objects in the radio wave path
and the transmit rate of the wireless communication. Communications at a lower transmit range
may travel longer distances. The range values listed in the Communications Range Chart are
typical distances as calculated by Avaya’s development team for FCC-certified products. These
values provide a rule of thumb and may vary according to the actual radio conditions at the
location where the product is used.
The range of your wireless devices can be affected when the antennas are placed near metal
surfaces and solid high-density materials. Range is also impacted due to “obstacles” in the
signal path of the radio that may either absorb or reflect the radio signal.
In Open Office environments, antennas can “see” each other (no physical obstructions between
them). In Semi-open Office environments, work space is divided by shoulder-height, hollow wall
elements; antennas are at desktop level. In a Closed Office environment, solid walls and other
obstructions may affect signal strength.
The following tables show typical range values for various environments for FCC-certified
products (range may differ for products certified in other regulatory domains).
AP-4 802.11b Wireless Communication Ranges
Table 82: AP-4 802.11b Wireless Communication Ranges
Range
11 Mbits/s
5.5 Mbits/s
2 Mbits/s
1 Mbits/s
Open Office
177 m
(581 ft.)
219 m
(718 ft.)
272 m
(892 ft.)
338 m
(1109 ft.)
Semi-Open
Office
122 m
(400 ft.)
151 m
(495 ft.)
187 m
(614 ft.)
232 m
(761 ft.)
Closed Office
84 m
(276 ft.)
104 m
(341 ft.)
129 m
(423 ft.)
160 m
(525 ft.)
Tx Power (dBm)
15
15
15
15
Receiver
Sensitivity
(dBm)
-82
-85
-88
-91
Antenna Gain
3 dBi (integrated diversity antenna module; 2.4-2.5 GHz)
AP-5 802.11a Wireless Communication Ranges
Issue 2 November 2004
323
Specifications
Table 83: AP-5 802.11a Wireless Communication Ranges
Range
54 Mbits/s
48 Mbits/s
36 Mbits/s
24 Mbits/s
18 Mbits/s
12 Mbits/s
9 Mbits/s
6 Mbits/s
Open
Office
37 m
(121 ft.)
57 m
(187 ft.)
82 m
(269 ft.)
118 m
(387 ft.)
146 m
(479 ft.)
169 m
(554 ft.)
181 m
(594 ft.)
195 m
(640 ft.)
SemiOpen
Office
26 m
(85 ft.)
39 m
(128 ft.)
57 m
(187 ft.)
81 m
(266 ft.)
101 m
(331 ft.)
116 m
(381 ft.)
125 m
(410 ft.)
134 m
(440 ft.)
Closed
Office
18 m
(59 ft.)
27 m
(89 ft.)
39 m
(128 ft.)
56 m
(184 ft.)
69 m
(226 ft.)
80 m
(262 ft.)
86 m
(282 ft.)
92 m
(302 ft.)
Tx Power
(dBm)
12
14
15
16
16
16
16
16
Receiver
Sensitivity
(dBm)
-69
-73
-77
-81
-84
-86
-87
-88
Antenna
Gain
4 dBi (integrated diversity antenna module; 5.15-5.85 GHz)
324 AP-4, AP-5, and AP-6 User Guide
Radio Specifications
AP-6 802.11 b/g Wireless Communication Ranges
Table 84: AP-6 802.11 b/g Wireless Communication Ranges
Range
54 Mbits/s
48 Mbits/s
36 Mbits/s
24 Mbits/s
18 Mbits/s
12 Mbits/s
Open Office
60 m
(197 ft.)
75 m
(246 ft.)
123 m
(404 ft.)
164 m
(538 ft.)
204 m
(669 ft.)
253 m
(830 ft.)
Semi-Open
Office
41 m
(135 ft.)
51 m
(167 ft.)
85 m
(279 ft.)
113 m
(371 ft.)
140 m
(459 ft.)
174 m
(571 ft.)
Closed
Office
28 m
(92 ft.)
35 m
(115 ft.)
58 m
(190 ft.)
78 m
(256 ft.)
97 m
(318 ft.)
120 m
(394 ft.)
Tx Power
(dBm)
12
13
14
15
15
15
Receiver
Sensitivity
(dBm)
-70
-72
-78
-81
-84
-87
Antenna
Gain
3 dBi (integrated diversity antenna module; 2.4-2.5 GHz)
Range
9 Mbits/s
6 Mbits/s
11 Mbits/s
5.5 Mbits/s
2 Mbits/s
1 Mbits/s
Open Office
272 m
(892 ft.)
292 m
(258 ft.)
190m
(623 ft.)
219 m
(718 ft.)
236 m
(774 ft.)
314 m
(1030 ft.)
Semi-Open
Office
187 m
(614 ft.)
201 m
(659 ft.)
131 m
(430 ft.)
151 m
(495 ft.)
162 m
(531 ft.)
216 m
(709 ft.)
Closed
Office
129 m
(423 ft.)
138 m
(453 ft.)
90 m
(295 ft.)
104 m
(341 ft.)
111 m
(364 ft.)
149 m
(489 ft.)
Tx Power
(dBm)
15
15
15
15
15
15
Receiver
Sensitivity
(dBm)
-88
-89
-83
-85
-86
-90
Antenna
Gain
3 dBi (integrated diversity antenna module; 2.4-2.5 GHz)
Issue 2 November 2004
325
Specifications
326 AP-4, AP-5, and AP-6 User Guide
Appendix D: Technical Support
Before You Seek Help
If you are having a problem using an AP and cannot resolve it with the information in Chapter
7: Troubleshooting the AP, gather the following information and contact your local authorized
reseller or visit http://www.avaya.com/support for contact information:
●
List of Avaya Wireless products installed on your network; include the following:
- Product names and quantity
- Part numbers (P/N)
- Serial numbers (S/N)
●
List of Avaya Wireless software versions installed
- Check the HTTP interface’s Version screen. See Version on page 168
- Include the source of the software version (e.g., pre-loaded on unit, installed from CD,
downloaded from Avaya Web site, etc.)
●
Information about your network
- Network operating system (e.g., Microsoft Networking); include version information
- Protocols used by network (e.g., TCP/IP, NetBEUI, IPX/SPX, AppleTalk)
- Ethernet frame type (e.g., 802.3, Ethernet II), if known
- IP addressing scheme (include address range and whether static or DHCP)
- Network speed and duplex (10 or 100 Mbits/sec; full or half duplex)
- Type of Ethernet device that the Access Points are connected to (e.g., Power over
Ethernet power injector, hub, switch, etc.)
- Type of Security enabled on the wireless network (None, WEP Encryption, 802.1x,
Mixed)
●
A description of the problem you are experiencing
- What were you doing when the error occurred?
- What error message did you see?
- Can you reproduce the problem?
- For each Avaya Wireless product, describe the behavior of the device’s LEDs when the
problem occurs
Issue 2 November 2004
327
Technical Support
328 AP-4, AP-5, and AP-6 User Guide
Was this manual useful for you? yes no
Thank you for your participation!

* Your assessment is very important for improving the work of artificial intelligence, which forms the content of this project

Download PDF

advertisement