Avaya AP-5, AP-4, AP-6 User Manual

AP-4, AP-5, and AP-6
Copyrights
Avaya is a registered trademark of Avaya Inc.
Microsoft Windows is a registered trademark of the Microsoft
Corporation.
All trademarks mentioned herein belong to their respective owners.
Publication Information
Part Number: 66221/B
Document Number: 555-301-708, Release 2.4.11
Date: April 2004
Regulatory Information
See the Regulatory Flyer that came with your AP-3 unit or go to the CD­ROM to view the information.
Warranty
Avaya Inc. provides a limited warranty on this product. Refer to your sales agreement to establish the terms of the limited warranty. In addition, Avaya’s standard warranty language as well as information regarding support for this product, while under warranty, is available through the following Web site: www.avaya.com/support
Notice
While reasonable efforts were made to ensure that the information in this book was complete and accurate at the time of printing, Avaya can assume no responsibility for any errors. Changes and corrections to the information contained in this document may be incorporated into future reissues.
How to Get Help
For additional support telephone numbers, go to the Avaya support Web site: http://www.avaya.com/support. If you are:
Within the United States, click the Escalation Management link. Then click the appropriate link for the type of support you need.
Outside the United States, click the Escalation Management link. Then click the International Services link that includes telephone numbers for the international Centers of Excellence.
TCP/IP Facilities
Customers may experience differences in product performance, reliability and security depending upon network configurations/design and topologies, even when the product performs as warranted.
To order copies of this and other documents
For the most current versions of documentation, go to the Avaya support Web site: http://www.avaya.com/support.
AP-4/5/6 User’s Guide Table of Contents
1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-1
In This Chapter . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-1
Document Conventions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-1
Introduction to Wireless Networking . . . . . . . . . . . . . . . . . . . . . . . . . . 1-2
Site Survey . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-3
Guidelines for Roaming . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-4
IEEE 802.11 Specifications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-6
802.11b . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-7
802.11a . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-7
802.11g . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-7
Management and Monitoring Capabilities . . . . . . . . . . . . . . . . . . . . . . 1-8
HTTP/HTTPS Interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-8
Command Line Interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-9
SNMP Management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-10
2 Getting Started . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-1
In This Chapter . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-1
Prerequisites . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-1
Product Package . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-5
MiniPCI Upgrade Kits . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-6
System Requirements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-6
Hardware Installation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-7
Initialization . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-17
ScanTool . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-18
Setup Wizard . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-26
Download the Latest Software . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-45
Setup your TFTP Server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-45
Avaya Wireless AP-4/5/6 User’s Guide 1
Download Updates from a TFTP Server using the Web Interface 2-46
Download Updates from a TFTP Server using the CLI Interface 2-47
Additional Hardware Features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-47
Mounting Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-48
Installing the AP in a Plenum. . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-54
Kensington Security Slot . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-54
Power over Ethernet . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-56
LED Indicators . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-57
Related Topics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-61
3 Status Information . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-1
In This Chapter . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-1
Logging into the HTTP Interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-1
System Status . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-3
4 Advanced Configuration . . . . . . . . . . . . . . . . . . . . . . . 4-1
In This Chapter . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-1
Configuring the AP Using the HTTP/HTTPS Interface. . . . . . . . . . . . . 4-2
System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-5
Dynamic DNS Support . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-6
Network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-9
IP Configuration. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-9
DHCP Server. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-13
Link Integrity . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-18
Interfaces . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-21
Operational Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-22
Wireless (802.11a) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-24
Wireless (802.11b) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-31
Wireless (802.11b/g) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-45
Wireless (802.11a/g) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-51
2 Avaya Wireless AP-4/5/6 User’s Guide
Wireless Distribution System (WDS) . . . . . . . . . . . . . . . . . . . . . . 4-59
Ethernet . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-64
Management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-64
Passwords . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-65
IP Access Table. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-67
Services. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-68
Filtering . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-82
Ethernet Protocol. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-82
Static MAC. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-84
Advanced. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-93
TCP/UDP Port . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-94
Alarms . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-96
Groups. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-97
Alarm Host Table. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-108
Syslog . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-109
Bridge. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-113
Spanning Tree . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-114
Storm Threshold . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-114
Intra BSS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-115
Packet Forwarding. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-116
Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-118
Authentication and Encryption Modes. . . . . . . . . . . . . . . . . . . . 4-118
Authentication Protocol Hierarchy . . . . . . . . . . . . . . . . . . . . . . . 4-130
SSID, VLAN, and Security Modes . . . . . . . . . . . . . . . . . . . . . . . . . . 4-130
VLAN Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-131
VLAN Workgroups and Traffic Management. . . . . . . . . . . . . . . 4-135
Typical User VLAN Configurations . . . . . . . . . . . . . . . . . . . . . . 4-136
Configure Multiple SSID/VLAN/Security Mode Entries . . . . . . . . . . 4-137
Typical VLAN Management Configurations. . . . . . . . . . . . . . . . 4-146
MAC Access . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-147
Avaya Wireless AP-4/5/6 User’s Guide 3
Rogue Access Point Detection (RAD) . . . . . . . . . . . . . . . . . . . . 4-149
RADIUS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-155
MAC Access Control by Means of RADIUS Authentication . . . 4-156
RADIUS Authentication with 802.1x . . . . . . . . . . . . . . . . . . . . . 4-161
RADIUS Accounting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-164
5 Monitor Information . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-1
In This Chapter . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-1
Logging into the HTTP Interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-2
Version. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-6
ICMP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-8
IP/ARP Table . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-9
Learn Table . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-10
IAPP. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-11
RADIUS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-12
Interfaces . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-13
Link Test . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-15
Station Statistics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-20
Enabling and Viewing Station Statistics . . . . . . . . . . . . . . . . . . . 5-20
Refreshing Station Statistics . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-20
6 Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-1
In This Chapter . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-1
Logging into the HTTP Interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-2
Introduction to File Transfer via TFTP or HTTP. . . . . . . . . . . . . . . . . . 6-5
TFTP File Transfer Guidelines . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-6
HTTP File Transfer Guidelines . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-6
Image Error Checking during File Transfer . . . . . . . . . . . . . . . . . . 6-7
Update AP by Using TFTP. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-8
Update AP by Using HTTP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-11
4 Avaya Wireless AP-4/5/6 User’s Guide
Upload File by Using TFTP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-14
Upload File by Using HTTP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-16
Reboot . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-19
Reset . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-21
Help Link . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-22
7 Troubleshooting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-1
In This Chapter . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-1
Troubleshooting Concepts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-2
Symptoms and Solutions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-3
Connectivity Issues . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-3
Basic Software Setup and Configuration Problems. . . . . . . . . . . . 7-5
Client Connection Problems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-9
VLAN Operation Issues . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-11
Power over Ethernet (PoE) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-13
Recovery Procedures . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-14
Reset to Factory Default Procedure . . . . . . . . . . . . . . . . . . . . . . 7-15
Forced Reload Procedure . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-17
Setting IP Address using Serial Port . . . . . . . . . . . . . . . . . . . . . . 7-24
Related Applications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-28
RADIUS Authentication Server . . . . . . . . . . . . . . . . . . . . . . . . . . 7-28
TFTP Server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-28
A . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .A-1
A The Command Line Interface . . . . . . . . . . . . . . . . . . .A-1
In This Appendix . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . A-1
General Notes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . A-3
Prerequisite Skills and Knowledge . . . . . . . . . . . . . . . . . . . . . . . . A-3
Notation Conventions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . A-3
Avaya Wireless AP-4/5/6 User’s Guide 5
Important Terminology. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . A-4
Navigation and Special Keys. . . . . . . . . . . . . . . . . . . . . . . . . . . . . A-6
CLI Error Messages. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . A-7
Bootloader CLI . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . A-8
CLI Conventions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . A-11
Command Conventions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . A-11
Entering Text Strings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . A-13
CLI Help . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . A-14
The Question Mark . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . A-14
The Help Command . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . A-19
Accessing the AP CLI . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . A-21
Using HyperTerminal to Log in to the AP . . . . . . . . . . . . . . . . . . A-21
Using Telnet to Log in to the AP . . . . . . . . . . . . . . . . . . . . . . . . . A-22
CLI Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . A-24
done. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . A-25
download . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . A-25
exit . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . A-26
help . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . A-26
history . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . A-29
passwd . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . A-29
quit. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . A-30
reboot . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . A-30
search . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . A-31
set . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . A-32
show . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . A-36
upload . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . A-39
Parameter Tables . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . A-40
Auto Configuration Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . A-41
Auto Configuration Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . A-42
Syntax Examples. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . A-42
6 Avaya Wireless AP-4/5/6 User’s Guide
DHCP Server Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . A-43
DHCP Server Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . A-43
IP Address Pool Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . A-44
Syntax Examples. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . A-45
DNS Client Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . A-46
DNS Client for RADIUS Name Resolution . . . . . . . . . . . . . . . . . A-46
Syntax Examples. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . A-46
Ethernet Interface Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . A-48
Ethernet Interface Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . A-48
Syntax Examples. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . A-48
Filtering Commands. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . A-50
Ethernet Protocol Filtering Parameters . . . . . . . . . . . . . . . . . . . . A-50
Ethernet Protocol Filtering Table Parameters . . . . . . . . . . . . . . . A-50
Static MAC Address Filter Table . . . . . . . . . . . . . . . . . . . . . . . . . A-51
Proxy ARP Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . A-52
IP ARP Filtering Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . A-53
Broadcast Filtering Table. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . A-53
TCP/UDP Port Filtering . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . A-54
TCP/UDP Port Filtering Table . . . . . . . . . . . . . . . . . . . . . . . . . . . A-54
HTTP and HTTPS Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . A-57
HTTP (Web browser) Parameters . . . . . . . . . . . . . . . . . . . . . . . . A-57
Syntax Examples. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . A-58
IAPP Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . A-60
IAPP Parameters. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . A-60
Intra BSS Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . A-61
Intra BSS Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . A-61
Syntax Example. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . A-61
Inventory Management Commands. . . . . . . . . . . . . . . . . . . . . . . . . . A-62
Inventory Management Parameters . . . . . . . . . . . . . . . . . . . . . . A-62
IP Access Table Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . A-62
Avaya Wireless AP-4/5/6 User’s Guide 7
IP Access Table Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . A-62
Syntax Examples. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . A-63
IP Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . A-64
IP Configuration Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . A-64
Syntax Examples. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . A-65
Link Integrity Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . A-65
Link Integrity Parameters. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . A-65
IP Target Table Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . A-66
Syntax Examples. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . A-67
MAC Access Control Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . A-68
MAC Access Control Parameters . . . . . . . . . . . . . . . . . . . . . . . . A-68
MAC Access Control Table Parameters . . . . . . . . . . . . . . . . . . . A-68
Syntax Examples. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . A-69
Monitoring Parameters. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . A-70
Packet Forwarding Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . A-71
Packet Forwarding Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . A-71
RAD Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . A-72
Rogue Access Point Detection (RAD) Parameters . . . . . . . . . . . A-73
Syntax Examples. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . A-73
RADIUS Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . A-74
General RADIUS Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . A-74
RADIUS Authentication Parameters . . . . . . . . . . . . . . . . . . . . . . A-75
RADIUS Accounting Parameters. . . . . . . . . . . . . . . . . . . . . . . . . A-77
Syntax Examples. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . A-78
Secure Management Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . A-82
Secure Management Parameters . . . . . . . . . . . . . . . . . . . . . . . . A-82
Serial Port Commands. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . A-83
Serial Port Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . A-83
Syntax Examples. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . A-84
SNMP Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . A-84
8 Avaya Wireless AP-4/5/6 User’s Guide
SNMP Parameters. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . A-84
SNMP Trap Host Table Parameters . . . . . . . . . . . . . . . . . . . . . . A-86
Syntax Examples. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . A-87
Spanning Tree Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . A-88
Spanning Tree Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . A-88
Spanning Tree Priority and Path Cost Table. . . . . . . . . . . . . . . . A-89
SpectraLink VoIP Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . A-90
SpectraLink VoIP Parameters (802.11b and bg Modes Only). . . A-90
Storm Threshold Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . A-91
Storm Threshold Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . A-91
Storm Threshold Table . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . A-91
Syslog Commands. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . A-92
Syslog Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . A-92
Syslog Host Table Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . A-94
Syntax Examples. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . A-94
System Information Commands. . . . . . . . . . . . . . . . . . . . . . . . . . . . . A-95
System Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . A-95
Syntax Examples. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . A-96
Telnet Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . A-97
Telnet Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . A-97
Syntax Examples. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . A-98
TFTP Commands. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . A-99
TFTP Server Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . A-99
Syntax Examples. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . A-100
WDS Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . A-102
Wireless Distribution System (WDS) Parameters . . . . . . . . . . . A-102
Wireless Distribution System (WDS) Security Table Parameters . . A-
102
802.11a Wireless Interface Commands. . . . . . . . . . . . . . . . . . . . . . A-103
802.11a Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . A-103
Avaya Wireless AP-4/5/6 User’s Guide 9
Syntax Examples. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . A-105
802.11b Wireless Interface Commands. . . . . . . . . . . . . . . . . . . . . . A-107
802.11b Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . A-108
Syntax Examples. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . A-111
802.11b/g Wireless Interface Commands . . . . . . . . . . . . . . . . . . . . A-115
802.11b/g Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . A-115
Wireless Interface SSID/VLAN/Security Commands . . . . . . . . . . . . A-121
Wireless Interface SSID Table Parameters. . . . . . . . . . . . . . . . A-121
Syntax Examples. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . A-123
VLAN/SSID Pair Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . A-125
VLAN/SSID Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . A-125
VLAN ID Table. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . A-126
Syntax Examples. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . A-127
B ASCII Character Chart . . . . . . . . . . . . . . . . . . . . . . . . . B-1
Description . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . B-1
C Specifications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .C-1
In This Appendix . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . C-1
Software Features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . C-1
Number of Stations per BSS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . C-2
Management Functions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . C-2
Advanced Bridging Functions . . . . . . . . . . . . . . . . . . . . . . . . . . . . C-3
Medium Access Control (MAC) Functions. . . . . . . . . . . . . . . . . . . C-4
Security Functions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . C-5
Network Functions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . C-7
Advanced Wireless Functions . . . . . . . . . . . . . . . . . . . . . . . . . . . C-8
Hardware Specifications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . C-9
Physical Specifications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . C-9
Electrical Specifications. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . C-9
10 Avaya Wireless AP-4/5/6 User’s Guide
Environmental Specifications . . . . . . . . . . . . . . . . . . . . . . . . . . . C-10
Radio Specifications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . C-11
802.11a Channel Frequencies . . . . . . . . . . . . . . . . . . . . . . . . . . C-12
802.11b Channel Frequencies . . . . . . . . . . . . . . . . . . . . . . . . . . C-14
802.11g Channel Frequencies . . . . . . . . . . . . . . . . . . . . . . . . . . C-16
Wireless Communication Range . . . . . . . . . . . . . . . . . . . . . . . . . C-18
D Technical Support . . . . . . . . . . . . . . . . . . . . . . . . . . . .D-1
Before You Seek Help . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . D-1
Avaya Wireless AP-4/5/6 User’s Guide 11
12 Avaya Wireless AP-4/5/6 User’s Guide

Introduction

In This Chapter

The following topics are covered in this section:
Document Conventions
Introduction to Wireless Networking
IEEE 802.11 Specifications
Management and Monitoring Capabilities

Document Conventions

The term, AP, refers to an Access Point.
The term, 802.11, is used to describe features that apply to the
802.11a, 802.11b, and 802.11g wireless standards.
A Single-radio AP is an Access Point that supports one IEEE radio standard. The AP-4, AP-5, and AP-6 are Single-radio APs.
An 802.11a AP is an Access Point that supports the IEEE 802.11a standard.
An 802.11b AP is an Access Point that supports the IEEE 802.11b standard.
1
Avaya Wireless AP-4/5/6 User’s Guide 1-1

Introduction to Wireless Networking

An 802.11b/g AP is an Access Point that supports the IEEE 802.11g standard.
An 802.11a/g AP is an Access Point that supports the IEEE
802.11a/g standards.
Blue text indicates a link to a topic or Web address. If you are
viewing this documentation on your computer, click the blue text to jump to the linked item.
NOTE:
A Note indicates important information that helps you make better use of your computer.
!
CAUTION:
A Caution indicates either potential damage to hardware or loss of data and tells you how to avoid the problem.
Introduction to Wireless Networking
An AP extends the capability of an existing Ethernet network to devices on a wireless network. Wireless devices can
connect to a single Access Point, or
move between multiple Access Points located within the same
vicinity. As wireless clients move from one coverage cell to another, the devices maintain network connectivity.
1-2 Avaya Wireless AP-4/5/6 User’s Guide
Introduction to Wireless Networking

Site Survey

To determine the best location for an Access Point, Avaya recommends conducting a Site Survey before placing the device in its final location. For information about how to conduct a Site Survey, contact your local reseller.
Before an Access Point can be configured for your specific networking requirements, it must first be initialized. See Getting Started for details.
Figure 1-1. Typical wireless network access infrastructure
Avaya Wireless AP-4/5/6 User’s Guide 1-3
Introduction to Wireless Networking
Once initialized, the network administrator can configure each unit according to the network’s requirements. The AP functions as a wireless network access point to data networks. An AP network provides:
Seamless client roaming
Easy installation and operation
Over-the-air encryption of data
High speed network links
To be fully operational, the AP-3 needs at least one wireless card installed.

Guidelines for Roaming

Wireless Standard Support
An AP can only communicate with client devices that support its wireless standard. For example, an 802.11a client cannot communicate with an
802.11b AP and an 802.11b client cannot communicate with an 802.11a AP. However, both 802.11b and 802.11g clients can communicate with an
802.11b/g AP.
1-4 Avaya Wireless AP-4/5/6 User’s Guide
Introduction to Wireless Networking
Network Names
All Access Points must have the same Network Name to support client roaming.
All workstations with an 802.11 client adapter installed must use either a Network Name of “any” or the same Network Name as the Access Points that they will roam between. If an AP has Closed System enabled, a client must have the same Network Name as the Access Point to communicate (see Interfaces).
Security Settings
All Access Points and clients must have the same security settings to communicate.
Cell Coverage
The Access Points’ cells must overlap to ensure that there are no gaps in coverage and to ensure that the roaming client will always have a connection available.
The coverage area of an 802.11b or 802.11b/g AP is larger than the coverage area of an 802.11a AP. The 802.11b and 802.11b/g APs operate in the 2.4 GHz frequency band; the 802.11a AP operates in the 5 GHz band. Products that operate in the 2.4 GHz band offer greater range than products that operate in the 5 GHz band.
Avaya Wireless AP-4/5/6 User’s Guide 1-5

IEEE 802.11 Specifications

Data Rates
An 802.11a or 802.11b/g AP operates at faster data rates than the
802.11b AP. 802.11a and 802.11g products operate at speeds of up to 54 Mbits/sec; 802.11b products operate at speeds of up to 11 Mbits/sec.
Channels
All Access Points in the same vicinity should use a unique, independent Channel. By default, the AP automatically scans for available Channels during boot-up but you can also set the Channel manually (see Interfaces for details).
Access Points that use the same Channel should be installed as far away from each other as possible to reduce potential interference.
IEEE 802.11 Specifications
In 1997, the Institute of Electrical and Electronics Engineers (IEEE) adopted the 802.11 standard for wireless devices operating in the 2.4 GHz frequency band. This standard includes provisions for three radio technologies: direct sequence spread spectrum, frequency hopping spread spectrum, and infrared. Devices that comply with the 802.11 standard operate at a data rate of either 1 or 2 Megabits per second (Mbits/sec).
1-6 Avaya Wireless AP-4/5/6 User’s Guide
IEEE 802.11 Specifications

802.11b

In 1999, the IEEE modified the 802.11 standard to support direct sequence devices that can operate at speeds of up to 11 Mbits/sec. The IEEE ratified this standard as 802.11b. 802.11b devices are backwards compatible with 2.4 GHz 802.11 direct sequence devices (that operate at 1 or 2 Mbits/sec). Available Frequency Channels vary by regulatory domain and/or country. See 802.11b Channel Frequencies for details.

802.11a

Also in 1999, the IEEE modified the 802.11 standard to support devices operating in the 5 GHz frequency band. This standard is referred to as
802.11a. 802.11a devices are not compatible with 2.4 GHz 802.11 or
802.11b devices. 802.11a radios use a radio technology called Orthogonal Frequency Division Multiplexing (OFDM) to achieve data rates of up to 54 Mbits/sec. Available Frequency Channels vary by regulatory domain and/or country. See 802.11a Channel Frequencies for details.

802.11g

In 2003, the IEEE introduced the 802.11g standard. 802.11g devices operate in the 2.4 GHz frequency band using OFDM to achieve data rates of up to 54 Mbits/sec. In addition, 802.11g devices are backwards compatible with 802.11b devices. Available Frequency Channels vary by regulatory domain and/or country. See 802.11g Channel Frequencies for details.
Avaya Wireless AP-4/5/6 User’s Guide 1-7

Management and Monitoring Capabilities

Management and Monitoring Capabilities
There are three management and monitoring interfaces available to the network administrator to configure and manage an AP on the network:
HTTP/HTTPS Interface
Command Line Interface
SNMP Management

HTTP/HTTPS Interface

The HTTP Interface (also known as the Web browser Interface) provides easy access to configuration settings and network statistics from any computer on the network. You can access the Web or HTTP Interface:
over your LAN (switch, hub, etc.),
over the Internet, or
with a “crossover” Ethernet cable connected directly to your
computer’s Ethernet Port.
HTTPS provides an HTTP connection over a Secure Socket Layer. HTTPS is one of two available secure management options on the AP; the other secure management option is SNMPv3. Enabling HTTPS allows you to access the AP in a secure fashion using Secure Socket Layer (SSL) over port 443. The AP supports SSLv3 with a 128-bit encryption certificate maintained by the AP for secure communications between the AP and the HTTP client. All communications are encrypted using the server and the client-side certificate.
1-8 Avaya Wireless AP-4/5/6 User’s Guide
Management and Monitoring Capabilities
The AP comes pre-installed with all required SSL files: default certificate, private key and SSL Certificate Passphrase installed.

Command Line Interface

The Command Line Interface (CLI) is a text-based configuration utility that supports a set of keyboard commands and parameters to configure and manage an AP.
Users enter Command Statements, composed of CLI Commands and their associated parameters. Statements may be issued from the keyboard for real time control, or from scripts that automate configuration.
For example, when downloading a file, administrators enter the download CLI Command along with IP Address, file name, and file type parameters.
How To Access the CLI
You access the CLI over a HyperTerminal serial connection or via Telnet.
During initial configuration, you can use the CLI over a serial port connection to configure an Access Point’s IP address.
When accessing the CLI via Telnet, you can communicate with the Access Point from over your LAN (switch, hub, etc.), from over the Internet, or with a “crossover” Ethernet cable connected directly to your computer’s Ethernet Port.
Avaya Wireless AP-4/5/6 User’s Guide 1-9
Management and Monitoring Capabilities
See The Command Line Interface for more information on the CLI and for a list of CLI commands and parameters.

SNMP Management

You can also manage and configure an AP using the Simple Network Management Protocol (SNMP).
NOTE:
This requires an SNMP manager program, like HP Openview or Castlerock’s SNMPc.
The AP supports several Management Information Base (MIB) files that describe the parameters that can be viewed and/or configured over SNMP:
MIB-II (RFC 1213)
Bridge MIB (RFC 1493)
Ethernet-like MIB (RFC 1643)
802.11 MIB
Avaya Wireless Enterprise MIB
Avaya provides these MIB files on the CD included with each Access Point. You need to compile one or more of the above MIBs into your SNMP program’s database before you can manage an Access Point using SNMP. Refer to the documentation that came with your SNMP manager for instructions on how to compile MIBs.
1-10 Avaya Wireless AP-4/5/6 User ’s Guide
Management and Monitoring Capabilities
The Enterprise MIB defines the read and read-write objects that can be viewed or configured using SNMP. These objects correspond to most of the settings and statistics that are available with the other management interfaces. Refer to the Enterprise MIB for more information; the MIB can be opened with any text editor, such as Microsoft Word, Notepad, or WordPad.
SNMPv3 Secure Management
SNMPv3 is one of two available secure management options on the AP; the other secure management option is HTTPS (HTTP connection over Secure Socket Layer). SNMPv3 is based on the existing SNMP framework, but addresses security requirements for device and network management.
The security threats addressed by Secure Management are:
Modification of information: An entity could alter an in-transit message generated by an authorized entity in such a way as to effect unauthorized management operations, including the setting of object values. The essence of this threat is that an unauthorized entity could change any management parameter, including those related to configuration, operations, and accounting
Masquerade: Management operations that are not authorized for some entity may be attempted by that entity by assuming the identity of an authorized entity.
Avaya Wireless AP-4/5/6 User’s Guide 1-11
Management and Monitoring Capabilities
Message stream modification: SNMP is designed to operate over a connectionless transport protocol. There is a threat that SNMP messages could be reordered, delayed, or replayed (duplicated) to effect unauthorized management operations. For example, a message to reboot a device could be copied and replayed later.
Disclosure: An entity could observe exchanges between a manager and an agent and thereby learns the values of managed objects and learn of notifiable events. For example, the observation of a set command that changes passwords would enable an attacker to learn the new passwords.
To address the security threats listed above, SNMPv3 provides the following when secure management is enabled:
Authentication: Provides data integrity and data origin authentication.
Privacy (a.k.a Encryption): Protects against disclosure of message payload.
Access Control: Controls and authorizes access to managed objects
NOTE:
The remainder of this guide describes how to configure an AP using the HTTP Web interface or the CLI interface. For information on how to manage devices using SNMP, refer to the documentation that came with your SNMP program. Also, refer to the MIB files for information on the parameters available via SNMP.
1-12 Avaya Wireless AP-4/5/6 User ’s Guide
Loading...
+ 472 hidden pages