must enter a value in place of the
brackets and text inside them.
{} curly braces{choice1 |
choice2}
| Vertical barschoice1 |
choice2
[{}] Braces
within square
[{choice1 |
choice2}]
Indicates that you must select a
parameter from the list of choices.
Separates the mutually exclusive
choices.
Indicate a choice within an optional
element.
brackets
AP541N Dual-band Single-radio Access Point Administration Guide4
Page 8
Online Help, Supported Browsers, and Limitations
Online help for the Access Point Configuration Utility pages provides information
about all fields and features available from the Access Point Configuration Utility.
The information in the online help is a subset of the information available in the
AP541N Dual-band Single-radio Access Point Administration Guide.
Online help information corresponds to each page on the Access Point
Configuration Utility.
For information about the settings on the current page, click the Help link on the
right side of a page.
Preface
AP541N Dual-band Single-radio Access Point Administration Guide5
Page 9
Getting Started
The Cisco Access Point provides continuous, high-speed access between
wireless devices and Ethernet devices. It is an advanced, standards-based
solution for wireless networking in businesses of any size. The access point
enables wireless local area network (WLAN) deployment while providing state-ofthe-art wireless networking features.
The access point operates in Standalone Mode. In Standalone Mode, the access
point acts as an individual access point in the network, and you manage it by using
the Access Point Configuration Utility, or SNMP.
1
This document describes how to perform the setup, management, and
maintenance of the access point in Standalone Mode. Before you power on a new
access point, review the following sections to check required hardware and
software components, client configurations, and compatibility issues. Make sure
you have everything you need for a successful launch and test of your new or
extended wireless network.
This chapter contains the following topics:
•Administrator Computer Requirements
•Connecting the Access Point to a PC
•Troubleshooting Your Connection
•Configuring the Access Point by using the Getting Started Page
•Verifying the Installation
•Configuring Security on the Wireless Access Point
To manage the access point by using the Web interface, the access point needs
an IP address. If you use VLANs or IEEE 802.1X Authentication (port security) on
your network, you might need to configure additional settings on the access point
before it can connect to the network.
Cisco AP 541N Dual-band Single-radio Access Point Quick Start Guide6
Page 10
1
NOTE The WLAN AP is not designed to function as a gateway to the Internet. To connect
your WLAN to other LANs or the Internet, you need a gateway device.
Administrator Computer Requirements
Ta bl e 1 describes the minimum requirements for the personal computer for the
initial configuration and administration of the access point through a Access Point
Configuration Utility.
Table 1Requirements for Configuration
Getting Started
Administrator Computer Requirements
Required Software
or Component
Ethernet Connection
to the Access Point
Web Browser and
Operating System
Description
The computer used to configure the access point must
be connected to the access point by an Ethernet cable.
The IP address must be on the same subnet as the
access point. The subnet mask must match the subnet
mask of the access point. The Administration PC IP
Address section describes the procedure for changing
these parameters on a PC running Windows.
The following Web browsers can be used to display
the access point Configuration Utility Web pages:
®
•Microsoft
(with up-to-date patch level for either major
version) and Mozilla Firefox 3.x on Microsoft
Windows
•Mozilla Firefox 3.x on Redhat
or later
The Web browser must have JavaScript™ enabled to
support the interactive features of the Configuration
Utility interface.
Internet Explorer® version 6.x or 7.x
®
XP or Microsoft Windows 2000
®
Linux® version 2.4
Security SettingsEnsure that security is disabled on the wireless client
7Cisco AP 541N Dual-band Single-radio Access Point Quick Start Guide
used initially to configure the access point. Once the
device has been configured, security can be enabled.
Page 11
Getting Started
Connecting the Access Point to a PC
Administration PC IP Address
We recommend that if you are starting from the default configuration or this is the
first time the device will be configured that you configure the device before you
deploy it in the network by using the access point default static IP address
(192.168.10.10). To do so, the PC IP address must be on the same subnet as the
access point.
Verify that your PC IP address is set to an address on the same subnet as the
access point:
STEP 1From the Windows Start menu, choose Settings > Control Panel.
STEP 2On the Control Panel dialog box, click Network.
STEP 3In the Network dialog box select TCP/IP for your PC Ethernet card, then click
Properties.
1
STEP 4In the IP Address window, click Specify an IP address.
STEP 5In the IP Address field, enter an IP address that is in the same subnet as the access
point IP address. (The default access point IP address is 192.168.10.10. The
default subnet mask is 255.255.255.0.) For example, you can set the:
PC IP address to 192.168.10.250
PC IP subnet mask to 255.255.255.0
STEP 6In the Subnet Mask field, type 255.255.255.0.
STEP 7Click OK.
STEP 8If you are prompted to restart your PC, click Yes .
Connecting the Access Point to a PC
To configure the access point, you can connect the access point directly to an
administration PC or through the network to an administration PC.
If you are not using CCA to configure the access point, we recommend that you configure
the device before deploying it in the network by following the instructions in the “Connect
the Access Point to an Administration PC” section. Otherwise, follow the instructions in
the “Connecting the Access Point to the PC through a Network Connection”
Cisco AP 541N Dual-band Single-radio Access Point Quick Start Guide8
Page 12
1
195057
192.168.10.10
255.255.255.0
192.168.10.250
255.255.255.0
Getting Started
Connecting the Access Point to a PC
Connect the Access Point to an Administration PC
You can connect the access point to a administration PC directly or through the
network. We recommend that you connect the access point directly to the PC
unless you are using CCA to configure the access point.
Connecting the Access Point to the PC by using a Direct Cable
Connection
To connect the access point to an administration PC, use a direct-cable
connection:
STEP 1Connect one end of an Ethernet straight-through or crossover cable to the network
port on the access point, as shown in Figure 1.
STEP 2Connect the other end of the cable to the Ethernet port on the PC.
Figure1Connecting the Access Point Using a Direct-Cable Connection
If you use this method, you will need to reconfigure the cabling for subsequent
startup and deployment of the access point so that the access point is no longer
connected directly to the PC but instead is connected to the LAN (either by using a
hub or a switch).
STEP 3Connect the power adapter to the power port on the back of the access point.
STEP 4Plug the other end of the power cord into a power outlet.
STEP 5Configure the access point by following the instructions in the “Display the
Configuration Utility By Using the Default IP Address” section.
9Cisco AP 541N Dual-band Single-radio Access Point Quick Start Guide
Page 13
Getting Started
Connecting the Access Point to a PC
Connecting the Access Point to the PC through a Network Connection
To connect the access point to an administration PC through the network:
STEP 1Connect one end of an Ethernet straight-through or crossover cable to the network
port on the access point, as shown in Figure 2.
STEP 2Connect the other end to the same hub or switch where your PC is connected.
Figure 2Connecting the Access Point Using a LAN Connection
1
The hub or switch you use must permit broadcast signals from the access point to
reach the other devices on the network.
STEP 3If you are not using PoE, connect the power adapter to the power port on the back
of the access point, then plug the other end of the power cord into a power outlet.
Cisco AP 541N Dual-band Single-radio Access Point Quick Start Guide10
Page 14
1
Getting Started
Connecting the Access Point to a PC
Launching the Access Point Configuration Utility
This section contains information for the for launching the Access Point
Configuration Utility:
•Using the default static IP address of the switch. Follow the instructions in the
“Display the Configuration Utility By Using the Default IP Address”
section.
•Using Cisco Configuration Assistant (CCA). Follow the instructions in the
“Display the Configuration Utility by Using Cisco Configuration Assistant
2.1 or higher” section.
•Using the an IP address assigned to the switch through DHCP. Follow the
instructions in the “Display the Configuration Utility by Using Another IP
Address” section.
Display the Configuration Utility By Using the Default IP
Address
To a c ce s s t he Access Point Configuration Utility, enter the default static IP
address of the access point into a Web browser, do the following:
STEP 1Enter the Cisco AP 541N default static IP address in the address bar and press Enter. For
example, http://
The Login window displays, as shown in Figure 3.
192.168.10.10.
11Cisco AP 541N Dual-band Single-radio Access Point Quick Start Guide
Page 15
Getting Started
Connecting the Access Point to a PC
Figure 3Login Window
1
STEP 2Enter the login information:
Username = cisco
Default password cisco. (Passwords are case sensitive.)
When you log in, the Getting Started page for the access point Configuration
Utility is displayed, as shown in Figure 4.
Cisco AP 541N Dual-band Single-radio Access Point Quick Start Guide12
Page 16
1
Getting Started
Connecting the Access Point to a PC
Figure 4Getting Started Page
STEP 3Update the Cisco AP 541N software with the latest version by clicking the Software
Upgrade link,
Next, we recommend that you:
•Change the password by clicking Change Administrator Password.
•Configure the SSID and enable wireless security, by clicking Configure
•Enable the wireless radio, by clicking Enable Wireless Radio.
•Assign a new static IP address to the access point if your network devices
as shown in Figure 4.
Wireless Networks (SSIDs).
are configured with static IP addresses, by clicking Set LAN IP Address.
13Cisco AP 541N Dual-band Single-radio Access Point Quick Start Guide
Page 17
Getting Started
195058
Internet
DHCP client
Connecting the Access Point to a PC
Display the Configuration Utility by Using
Cisco Configuration Assistant 2.1 or higher
Use Cisco Configuration Assistant 2.1 or higher (CCA) to configure the access
point when it is deployed in a Cisco Smart Business Communications System
(SBCS) network with a UC520 or SR520.
1
This procedure assumes you are familiar with CCA. You can find additional
information about CCA at http://www.cisco.com/en/US/products/ps7287/
tsd_products_support_series_home.html
To configure the access point by using CCA:
STEP 1Connect the Ethernet port on the access point to a switch port on a SBCS device.
STEP 2Power on the Cisco AP541N.
STEP 3Connect a PC with CCA installed to any access switch port on the UC520 or
SR520.
STEP 4Create a new CCA site by entering a name and the IP address of the UC520 or
SR520.
STEP 5Connect to the CCA site by using the appropriate login credentials.
STEP 6Click Window > Top olo gy Vi ew.
Cisco AP 541N Dual-band Single-radio Access Point Quick Start Guide14
Page 18
1
Getting Started
Connecting the Access Point to a PC
When you have connected to the CCA site and the devices have been discovered,
the Topology Map includes the Cisco AP541N.
NOTE Non-Cisco devices connected to the switch are not shown in the Topology
map.
STEP 7Right-click the access point to display the options: Configuration Utility,
Properties, and Annotation.
STEP 8Click Configuration Utility.
The Access Point Configuration Utility
Figure 4.
Next, we recommend that you:
•Change the password by clicking Change Administrator Password.
•Configure the SSID and enable wireless security, by clicking Configure
Wireless Networks (SSIDs).
•Enable the wireless radio, by clicking Enable Wireless Radio.
•Assign a new static IP address to the access point if your network devices
are configured with static IP addresses, by clicking Set LAN IP Address.
displays in a new window, as shown in
15Cisco AP 541N Dual-band Single-radio Access Point Quick Start Guide
Page 19
Getting Started
!
Connecting the Access Point to a PC
Display the Configuration Utility by Using Another IP Address
You can display the Access Point Configuration Utility by using an IP address
assigned to the access point during a previous configuration or by a DHCP server.
When you power on the access point, the built-in DHCP client searches for a
DHCP server on the network to obtain an IP address and other network
information. If the access point does not find a DHCP server on the network, the
access point uses its default static IP address (192.168.10.10) unless you have
assigned it a static IP address (and specified a static IP addressing policy) or until
the access point successfully receives network information from a DHCP server.
CAUTION If the acce ss p oint IP addres s is chan ged, eithe r by a DHCP s erver or manually, your
link to the access point will be lost and you must enter the new IP address to use
the Access Point Configuration Utility.
1
To configure the access point by using an IP address other than the default static
IP address:
STEP 1Power on the Cisco AP541N.
STEP 2If you used a DHCP server on your network to automatically configure network
information for the access point, enter the IP address assigned to the access point
by the DHCP server into the Web browser.
If you have access to the DHCP server on your network and know the MAC
address of your access point, you can view the new IP address associated with
the MAC address of the access point. Otherwise, we recommend that you
disconnect the access point from the network, reset it to the default configuration
by using the procedure in the “Resetting the Device by using the Reset Button”
section, and configuring the device by using the procedure in the “Display the
Configuration Utility By Using the Default IP Address” section.
If you replaced the default static IP address with a new static IP address, enter the
new IP address of the access point into the Web browser
The Login window displays, as shown in Figure 3.
STEP 3Enter the login information:
Username is cisco
Default password is cisco (passwords are case sensitive)
Cisco AP 541N Dual-band Single-radio Access Point Quick Start Guide16
Page 20
1
Getting Started
Connecting the Access Point to a PC
When you log in, the Getting Started page for the access point Configuration
Utility is displayed, as shown in Figure 4.
STEP 4Update the Cisco AP 541N software with the latest version by clicking the Software
Upgrade link,
Next, we recommend that you:
•Change the password by clicking Change Administrator Password.
•Configure the SSID and enable wireless security, by clicking Configure
•Enable the wireless radio, by clicking Enable Wireless Radio.
•Assign a new static IP address to the access point if your network devices
as shown in Figure 4.
Wireless Networks (SSIDs).
are configured with static IP addresses, by clicking Set LAN IP Address.
!
CAUTION If you do not have a DHCP server on your internal network, and do not plan to use
one, we recommend assigning a new static IP address so that if you bring up
another WLAN Cisco AP541N on the same network, the IP address for each access
point is unique. If the IP address is not unique, a conflict results causing
unpredictable results.
To change the connection type and assign a static IP address by using the Access Point Configuration Utility, see LAN Settings, page 40.
17Cisco AP 541N Dual-band Single-radio Access Point Quick Start Guide
Page 21
Getting Started
Troubleshooting Your Connection
Troubleshooting Your Connection
If you cannot display the login window, you can test the IP address by using the
ping command. If you do not know the IP address, you can configure the device by
resetting the device to the factory defaults and accessing the Access Point Configuration Utility by using the factory default static IP address.
Using the Ping Command to Test the Connection
If you cannot display the configuration utility, you can test the ability of the PC to
communicate with the access point by using ping. To use ping on a PC running
Windows:
STEP 1Verify that the Cisco AP 541N is powered on and the LEDs indicate the
appropriate links.
1
STEP 2Open a command window by using Start > Run and enter cmd.
STEP 3At the Command window prompt enter ping and the access point IP
address. For example ping 192.168.10.10 (the default static IP address of the
access point).
If successful, you should get a reply similar to the following:
Pinging 192.168.10.10 with 32 bytes of data:
Reply from 192.168.10.10: bytes=32 time<1ms TTL=128
Reply from 192.168.10.10: bytes=32 time<1ms TTL=128
Reply from 192.168.10.10: bytes=32 time<1ms TTL=128
If it fails, likely you are using the wrong access point IP address and you will get a
reply similar to the following:
Pinging 192.168.10.10 with 32 bytes of data:
Request timed out.
Possible Cause of Failure
The most likely cause of connectivity failure is an incorrect IP address.
The Web browser is pointed to the wrong IP address. Or, your PC might be
configured with an IP address that is not in the same subnet as the access point.
Cisco AP 541N Dual-band Single-radio Access Point Quick Start Guide18
Page 22
1
Getting Started
Troubleshooting Your Connection
DHCP is enabled on the Cisco AP 541N by default. When a DHCP server is
enabled on your network and the access point is connected to the network, the
DHCP server replaces the default static IP address with a DHCP server–assigned
IP address. If this happens before you display the Access Point Configuration Utility window, you must use the assigned IP address to display the utility. If this
happens during configuration, the Access Point Configuration Utility will lose
connectivity.
You can query the DHCP server for the new IP address or disconnect the access
point from the network and reset the device to use the static default access point
IP address by using the Resetting the Access Point to the Factory Default
Configuration, page 121 procedure.
Resetting the Device by using the Reset Button
To use the Reset button to reboot or reset the access point, do the following:
•To reboot the access point, press the Reset button. Do not hold it for more
than 10 seconds.
•To restore the access point to the factory default settings:
1. Disconnect the access point from the network or disable all DHCP
servers on your network.
2. With the power on, press-and-hold the Reset button for more than 10
seconds.
19Cisco AP 541N Dual-band Single-radio Access Point Quick Start Guide
Page 23
Getting Started
Configuring the Access Point by using the Getting Started Page
Configuring the Access Point by using the Getting Started
Page
From the Getting Started page, you can use the following links to quickly configure
your access point:
•Access Point Configuration
•Access Point Management Page
•Wireless Configuration Page
Access Point Configuration
To change the access point IP address, password, and VLAN configuration, do the
following:
1
STEP 1Click Change Administrator Password to provide a new administration password
for the access point. (The username is cisco and it cannot be changed. The default
password is cisco.)
STEP 2If you do not have a DHCP server on the network and do not plan to use one, click
Change IP Address to change the connection type from DHCP to static IP and set
a static IP address and subnet mask.
NOTE We recommend that you assign a new static IP address. Otherwise, if you
bring up another Cisco AP 541N on the same network, the IP address for
each access point will not be unique; duplicating an IP address on a network
will create a conflict.
Also, if you change the static IP address, you will lose connectivity. To
reestablish connectivity, enter the new IP address into your Web browser
and log into the Configuration Utility.
To change the connection type and assign a static IP address, see LAN
Settings, page 40.
Cisco AP 541N Dual-band Single-radio Access Point Quick Start Guide20
Page 24
1
Getting Started
Wireless Client Requirements
STEP 3If your network uses VLANs, you might need to configure the management VLAN
ID or untagged VLAN ID on the access point for it to work with your network.
For information about how to configure VLAN information, see LAN Settings, page
40.
STEP 4If your network uses Dynamic WEP port security for network access control, you
must configure the 802.1X supplicant information on the access point. For
information about how to configure the 802.1X user name and password, see
Configuring 802.1X Authentication, page 43.
Access Point Management Page
Click System Information to view the device information. For more information, see
Device Information, page 27.
As new versions of the Access Point software become available, you can upgrade
the software on your devices to take advantage of new features and
enhancements. For more information, see Software Upgrade, page 124.
For information on how to backup and restore the configuration, go to Access
Point Configuration, page 120.
Wireless Configuration Page
For information about the wireless radio settings, see Configuring Wireless Radio
Settings, page 160.
To configure the SSID, Guest Access, and Security Configuration, see Modifying
Virtual Access Point Settings, page 55.
Wireless Client Requirements
The access point provides wireless access to any client with a properly
configured Wi-Fi client adapter for the 802.11 mode in which the access point is
running. The access point supports multiple client operating systems. Clients can
be laptop or desktop computers, personal digital assistants (PDAs), or any other
hand-held, portable or stationary device equipped with a Wi-Fi adapter and
supporting drivers.
21Cisco AP 541N Dual-band Single-radio Access Point Quick Start Guide
Page 25
Getting Started
Wireless Client Requirements
1
To connect to the access point, wireless clients need the software and hardware
described in Ta b le 2 .
Table 2Requirements for Wireless Clients
Required ComponentDescription
Wi-Fi Client AdapterPortable or built-in Wi-Fi client adapter that supports
one or more of the IEEE 802.11 modes in which you
plan to run the access point. (IEEE 802.11a, 802.11b,
802.11g, and 802.11n modes are supported.)
Wireless Client
Software
Client Security
Settings
Client software, such as Microsoft Windows
Supplicant, configured to associate with the access
point.
Security should be disabled on the client used to do
initial configuration of the access point.
If the Security mode on the access point is set to
anything other than plain text, wireless clients must
have a profile set to the same authentication mode
used by the access point and provide a valid username
and password, certificate, or user identity required by
the authentication server. Security modes are Static
WEP, IEEE 802.1X, WPA with RADIUS server, and WPA-
PSK.
For information about configuring security on the
access point, see Configuring the Wireless
Distribution System, page 91.
Cisco AP 541N Dual-band Single-radio Access Point Quick Start Guide22
Page 26
1
Verifying the Installation
Make sure the access point is connected to the LAN and associating with wireless
clients on the network. Once you have tested the basics of your wireless network,
you can enable more security and fine-tune the access point by modifying the
advanced configuration features.
STEP 1Connect the access point to the LAN.
If you configured the access point by using a direct cable connection from your
computer to the access point, do the following:
a. Disconnect the cable from the computer and the access point.
b. Mount the access point in the desired location.
Getting Started
Verifying the Installation
c. Connect an Ethernet cable from the access point to the LAN.
d. Power on the access point.
e. Connect your computer to the LAN by using an Ethernet cable or a wireless
card.
If you configured the access point and an administrator PC by connecting both to
a network hub or switch, your access point is already connected to the LAN. The
next step is to test some wireless clients.
STEP 2Test the access point by trying to detect it and associate with it from a wireless
client. For information about requirements for the client devices, see Wireless
Client Requirements, page 21.
NOTE The access point is not designed for multiple, simultaneous configuration
changes. If more than one administrator is logged onto the Configuration
Utility and is making changes to the configuration, there is no guarantee that
all configuration changes specified by multiple users will be applied.
23Cisco AP 541N Dual-band Single-radio Access Point Quick Start Guide
Page 27
Getting Started
!
Configuring Security on the Wireless Access Point
CAUTION By default, no security is in place on the access point, so any wireless client can
associate with it and access your LAN, including unauthorized devices. An
important next step is to configure security. Continue with Configuring Security on
the Wireless Access Point, page 24 for more information.
Configuring Security on the Wireless Access Point
You configure secure wireless client access by configuring security for each
virtual access point (VAP) that you enable. You can configure up to 16 VAPs per
wireless radio that simulate multiple access points in one physical access point.
For each VAP, you can configure a unique security mode to control wireless client
access.
1
Ea ch w irel es s r adi o h as 1 6 VA Ps , wi t h VA P I D s f ro m 0-15 . VA P 0, VAP 1, a nd VA P 2
have di f fer en t d e fa ul t s e t ti ng s th an VA Ps 3-15 . B y d e fa ul t , VAP 0 , VA P 1, a nd VA P 2
are enabled.
VAP0 has the following default settings:
•VLAN ID: 1
•SSID: cisco-data
•Broadcast SSID: Enabled
•Security: None
•MAC Authentication Type: Disabled
•Station Isolation: Disabled
•HTTP Redirect: Disable
VAP1 has the following default settings:
•VLAN ID: 100
•SSID: cisco-voice
•Broadcast SSID: Enabled
•Security: None
•MAC Authentication Type: Disabled
Cisco AP 541N Dual-band Single-radio Access Point Quick Start Guide24
Page 28
1
Getting Started
Configuring Security on the Wireless Access Point
•Station Isolation: Disabled
•HTTP Redirect: Disable
VAP2 has the following default settings:
•VLAN ID: 1
•SSID: cisco-scan
•Broadcast SSID: Enabled
•Security: WPA Personal
•WPA Versions: WPA2
•Cipher Suites: CCMP (AES)
•Key: intermec
•MAC Authentication Type: Disabled
•Station Isolation: Disabled
•HTTP Redirect: Disable
VAP3-15 are disabeld by default, but when they are enabled they will have the
following default settings:
•VLAN ID: 1
•SSID: Virtual Access Point x ( where x is the VAP ID)
•Broadcast SSID: Enabled
•Security: None
•MAC Authentication Type: Disabled
•Station Isolation: Disabled
•HTTP Redirect: Disable
To prevent unauthorized access to the access point, we recommend that you
select and configure a security option other than None for the default VAP and for
each VAP that you enable.
For information about how to configure the security settings on each VAP, see
Configuring the Wireless Distribution System, page 91.
25Cisco AP 541N Dual-band Single-radio Access Point Quick Start Guide
Page 29
Status
2
The Status page provides information on the following:
•Device Information
•Network Interfaces
•Traffic Statistics
•Associated Clients
•Rogue AP Detection
Cisco AP 541N Dual-band Single-radio Access Point Quick Start Guide26
Page 30
2
Device Information
From the Device Information page, you can view hardware and product
information.
Figure 5Device Information
Status
Device Information
Ta bl e 3 describes the fields shown on the Device Information page.
Tab le 3D e vi ce In fo rm ati on Pa ge
Field Description
Product Identifier
Hardware Version
Software Version
Serial Number
Device Name
Device Description
27Cisco AP 541N Dual-band Single-radio Access Point Quick Start Guide
Identifies the AP hardware model.
Identifies the AP hardware version.
Shows version information for the software installed on the
AP. As new versions of the WLAN AP software become
available, you can upgrade the software.
Shows the AP serial number.
Generic name to identify the type of hardware.
Provides information about the product hardware.
Page 31
Tab le 3D e vi ce In for m ati on Pa ge
Field Description
2
System Uptime
Network Interfaces
The Network Interface Status window displays the current Wired Settings and
the Wireless Settings of the access point. Click Refresh to refresh the page.
Figure 6Interface Status
The amount of time that the AP has been operational since
its last power-up/reboot.
Cisco AP 541N Dual-band Single-radio Access Point Quick Start Guide28
Page 32
2
Status
Traffic Statistics
Wired Settings
The Wired Settings include the MAC address, management VLAN ID, IP address,
subnet mask, and DNS information. To change any of these settings, click Edit to
be redirected to the Setup > LAN Settings page.
For information about configuring these settings, see LAN Settings, page 40.
Wireless Settings
The Wireless Settings section indicates the status of the wireless radio, and
includes the Radio Mode and Channel. The Wireless Settings section also shows
the MAC address (read-only) associated with each wireless radio interface.
To change the Radio Mode or Channel settings, click Edit. You are redirected to the
Wireless > Radio Settings page.
For information about configuring these settings, see Modifying Wireless Radio
Settings, page 52 and Modifying Advanced Settings, page 79.
Traffic Statistics
The Traffic Statistics page provides basic information about the access point, a
real-time display of the transmit and receive statistics for the Ethernet interface,
and VAP (Virtual Access Point) statistics. The transmit and receive statistics are
totals since the access point was last started. If you reboot the access point, these
figures indicate transmit and receive totals since the reboot.
To view transmit and receive statistics for the access point, click the Traffic
Statistics tab. Click Refresh to refresh the page.
29Cisco AP 541N Dual-band Single-radio Access Point Quick Start Guide
Page 33
Status
Traffic Statistics
2
Figure 7Viewing Traffic Statistics
Cisco AP 541N Dual-band Single-radio Access Point Quick Start Guide30
Page 34
2
Status
Traffic Statistics
Table 4Traffic Statistics Description
FieldDescription
Network Interfaces
Status
MAC Address
The name of the Ethernet or VAP interfaces.
Shows whether the interface is up or down.
MAC address for the specified interface. Each VAP
interface has a unique MAC address.
VLAN ID
A virtual LAN (VLAN) ID is used to establish multiple
networks on the same access point. The VLAN ID is
configured on the Wireless > VAP tab. (See Bandwidth
Utilization, page 96.)
Name (SSID)
The network name, also known as the SSID, is an
alphanumeric key that uniquely identifies a VAP. The
name (SSID) is configured on the VAP tab. (See
Bandwidth Utilization, page 96.) NA means either that
the entry is not applicable or is not supported.
Transmit and Receive Information
Total Packets
Indicates total packets sent (in Transmit table) or
received (in Received table) on that interface.
Total Bytes
Indicates total bytes sent (in Transmit table) or
received (in Received table) on that interface.
Total Dropped Packets
Indicates total number of packets sent (in Transmit
table) or received (in Received table) on that interface
that were dropped. NA means that the drop and error
counters for the VAP interfaces and the WDS
interfaces are not supported.
Total Dropped Bytes
Indicates total number of bytes sent (in Transmit table)
or received (in Received table) on that interface that
were dropped. NA means that the drop and error
counters for the VAP interfaces and the WDS
interfaces are not supported.
Errors
Displays the total number of transmit and receive
errors detected by the AP. NA means that the drop and
error counters for the VAP interfaces and the WDS
interfaces are not supported.
31Cisco AP 541N Dual-band Single-radio Access Point Quick Start Guide
Page 35
Status
Associated Clients
Associated Clients
To view the client stations associated with the access point, click the Associated
Clients tab.
Figure 8Viewing Client Association Information
2
The associated stations are displayed along with information about packet traffic
transmitted and received for each station. Click Refresh to refresh the page.
Ta bl e 5 describes the fields on the Associated Clients page.
Table 5Associated Clients Field Descriptions
FieldDescription
Network
Station
Shows which VAP the client is associated with. For
example, an entry of wlan0vap2 means the client is
associated with Wireless Radio 1, VAP 2.
Shows the MAC address of the associated wireless
client.
Cisco AP 541N Dual-band Single-radio Access Point Quick Start Guide32
Page 36
2
Status
Associated Clients
Table 5Associated Clients Field Descriptions
FieldDescription
Status
The Authenticated and Associated Status shows the
underlying IEEE 802.11 authentication and association
status that is present no matter which type of security the
client uses to connect to the access point. This status
does not show the IEEE 802.1X authentication or
association status.
Some points to keep in mind with regard to this field are:
•If the AP security mode is None or Static WEP, the
authentication and association status of clients
showing on the Client Associations tab will be in
line with what is expected; that is, if a client shows
as authenticated to the access point, it will be able
to transmit and receive data. (This is because
Static WEP uses only IEEE 802.11 authentication.)
•If the access point uses IEEE 802.1X or WPA
security, however, it is possible for a client
association to show on this tab as authenticated
(by using IEEE 802.11 security) but actually not be
authenticated to the access point by using the
second layer of security.
From Station
To Station
33Cisco AP 541N Dual-band Single-radio Access Point Quick Start Guide
Shows the number of packets and bytes received from
the wireless client and the number of packets and bytes
that were dropped after being received.
Shows the number of packets and bytes transmitted
from the access point to the wireless client and the
number of packets and bytes that were dropped upon
transmission.
Page 37
Status
Rogue AP Detection
Link Integrity Monitoring
The access point provides link integrity monitoring to continually verify its
connection to each associated client. To do this, the access point sends data
packets to clients every few seconds when no other traffic is passing. This allows
the access point to detect when a client goes out of range, even during periods
when no normal traffic is exchanged. The client connection drops off the list within
300 seconds if these data packets are not acknowledged, even if no
disassociation message is received.
Rogue AP Detection
A Rogue AP is an access point that has been installed on a secure network without
authorization from a system administrator. Rogue access points pose a security
threat because anyone with access to the premises can ignorantly or maliciously
install a wireless access point that might allow unauthorized parties to access the
network.
2
The Rogue AP Detection page displays information about all access points
detected by the Cisco AP 541N in the vicinity of the network. If the access point
listed as a rogue is actually a legitimate access point, you can add it to the Known
AP List. Click Refresh to refresh the page.
NOTE The Detected Rouge AP List and Known AP List provide information. The Cisco
AP 541N does not have any control over the access points on the lists and cannot
apply any security policies to access points detected through the RF scan.
Cisco AP 541N Dual-band Single-radio Access Point Quick Start Guide34
Page 38
2
Status
Rogue AP Detection
Figure 9Viewing Neighboring Access Points
You must enable the access point detection to collect information about other
access points within range. Ta b le 6 describes the information provided on
neighboring access points.
Table 6Neighboring Access Point Information
FieldDescription
AP Detection
To enable neighbor access point detection and collect
information about neighbor access points, click Enabled.
(default)
To disable neighbor access point detection, click Disabled.
To save the setting, click Apply.
35Cisco AP 541N Dual-band Single-radio Access Point Quick Start Guide
Page 39
Status
Rogue AP Detection
2
Table 6Neighboring Access Point Information
FieldDescription
Action
MAC
Beacon Int.
If an access point is in the Detected Rogue AP List, you can
click Grant to move the access point from the Detected
Rogue AP List to the Known AP List.
If an access point is in the Known AP List, click the Delete
button to move the access point from the Known AP List to
the Detected Rogue AP List.
NOTE: The Detected Rouge AP List and Known AP List
provide information only; the Cisco AP 541N does not have
any control over the access points on the list and cannot
apply any security policies to access points detected
through the RF scan.
Shows the MAC address of the detected access point.
Shows the Beacon interval of another access point.
Beacon frames are transmitted by an access point at regular
intervals to announce their existence on the wireless
network. The default behavior is to send a beacon frame
once every 100 milliseconds (or 10 per second).
The Beacon Interval for your access point is set on the
Wireless > Advanced Settings page. (See Modifying
Advanced Settings, page 79.)
Type
Cisco AP 541N Dual-band Single-radio Access Point Quick Start Guide36
Indicates the type of device:
•AP indicates the detected device is an access point
that supports the IEEE 802.11 Wireless Networking
Framework in Infrastructure Mode.
•Ad hoc designation indicates a neighboring station
running in ad hoc mode. Stations set to ad hoc mode
communicate with each other directly, without the use
of a traditional access point. Ad-hoc mode is an IEEE
802.11 Wireless Networking Framework also referred
to as peer-to-peer mode or an Independent Basic Service Set (IBSS).
Page 40
2
Status
Rogue AP Detection
Table 6Neighboring Access Point Information
FieldDescription
SSID
Privacy
WPA
The Service Set Identifier (SSID) for another, detected
access point.
The SSID is an alphanumeric string of up to 32 characters
that uniquely identifies a wireless local area network. It is
also referred to as the Network Name.
The SSID is set on the Virtual Access Point tab. (See
Bandwidth Utilization, page 96.)
Indicates whether there is any security on the neighboring
access point.
•Off indicates that the Security mode on the
neighboring access point is set to None (no security).
•On indicates that the neighboring access point has
some security in place.
Security is configured on the access point from the Virtual
Access Point page.
Indicates whether WPA security is on or off for the detected
access point.
Band
37Cisco AP 541N Dual-band Single-radio Access Point Quick Start Guide
This indicates the IEEE 802.11 mode being used on the
detected access point. (For example, IEEE 802.11a, IEEE
802.11b, IEEE 802.11g.)
The number shown indicates the mode according to the
following map:
•2.4 indicates IEEE 802.11b, 802.11g, or 802.11n mode
(or a combination of the modes)
•5 indicates IEEE 802.11a mode, 802.11n mode, or a
combination of modes.
Page 41
Status
Rogue AP Detection
2
Table 6Neighboring Access Point Information
FieldDescription
Channel
Rate
Signal
Beacons
Shows the Channel on which the detected access point is
broadcasting.
The channel defines the portion of the wireless radio
spectrum that the wireless radio uses for transmitting and
receiving.
The channel for your access point is set in Wireless >
Advanced Settings. (See Modifying Advanced Settings,
page 79.)
Shows the rate (in megabits per second) at which the
detected access point is currently transmitting.
The current rate is always one of the rates shown in
Supported Rates.
Indicates the strength of the wireless radio signal emitting
from the detected access point. If you hover the mouse
pointer over the bars, a number appears and shows the
strength in decibels (dB).
Shows the total number of beacons received from the
detected access point since it was first discovered.
Last Beacon
Rates
Cisco AP 541N Dual-band Single-radio Access Point Quick Start Guide38
Shows the date and time of the last beacon received from
the detected access point.
Shows supported and basic (advertised) rate sets for the
detected access point. Rates are shown in megabits per
second (Mbps).
All Supported Rates are listed, with Basic Rates shown in
bold.
Rate sets are configured on the Wireless > Advanced
Settings page. (See Modifying Advanced Settings, page
79.)
Page 42
2
Status
Rogue AP Detection
Save or Import a List of Known Access Points
To save the Known AP List to a file, click Save. The list contains the MAC
addresses of all access points that have been added to the Known AP List. By
default, the filename is Rogue2.cfg. You can use a text editor or Web browser to
open the file and view its contents.
Use the Import feature to import a list of known access points from a saved list.
The list might be from another Cisco access point or created from a text file. If the
MAC address of an access point appears in the Known AP List, it will not be
shown as a rogue.
The file you import must be a plain-text file with a .txt or .cfg extension. Entries in
the file are MAC addresses in hexadecimal format with each octet separated by
colons, for example 00:11:22:33:44:55. Separate the entries with a single space.
For the access point to accept the file, it must contain only MAC addresses.
To import an access point list from a file, do the following:
STEP 1Choose whether to replace the existing Known AP List or add the entries in the
imported file to the Known AP List.
•Select the Replace radio button to import the list and replace the entire
contents of the Known AP List.
•Select the Merge radio button to import the list and add the access points
in the imported file to the access points currently displayed in the Known
AP List.
STEP 2Click Browse and choose the file to import.
STEP 3Click Import.
Once the import is complete, the screen refreshes and the MAC addresses of
the access points listed in the imported file appear in the Known AP List.
39Cisco AP 541N Dual-band Single-radio Access Point Quick Start Guide
Page 43
Setup
LAN Settings
3
The default wired LAN interface settings, including the default DHCP and VLAN
parameters, might not work correctly for your network.
By default, the DHCP client on the access point broadcasts requests for network
information. To use a static IP address, you must disable the DHCP client and
manually configure the IP address and other network information.
The access point default management VLAN is VLAN 1. This VLAN is also the
default untagged VLAN. If you have configured the management VLAN on your
network with a different VLAN ID, you must change the VLAN ID of the access
point management VLAN.
To configure the LAN interface settings, click the LAN Settings tab.
Cisco AP 541N Dual-band Single-radio Access Point Quick Start Guide40
Page 44
3
Setup
LAN Settings
Figure10LAN Settings
41Cisco AP 541N Dual-band Single-radio Access Point Quick Start Guide
Page 45
3
Ta bl e 7 describes the fields to view or configure on the LAN Settings page.
Table 7LAN Settings Field Descriptions
Field Description
Hostname
MAC Address
Management
VLAN ID
Untagged VLAN
DNS name (host name) for the access point.
The DNS name has the following requirements:
•Maximum of 20 characters
•Only letters, numbers and dashes. Double quote (") is
not a valid character.
•Must start with a letter and end with either a letter or a
number
MAC address for the Ethernet port on this access point. This
is a read-only field that you cannot change.
Enter a number between 1 and 4094 for the management
VLAN ID used on your network.
The default management VLAN ID is 1.
Enable or disable VLAN tagging. If you enable the untagged
VLAN, all traffic is tagged with a VLAN ID.
By default all traffic on the access point uses VLAN 1, the
default untagged VLAN. This means that all traffic is
untagged until you disable the untagged VLAN, change the
untagged traffic VLAN ID, or change the VLAN ID for a VAP or
client using RADIUS.
Untagged VLAN
ID
Connection
Ty pe
Cisco AP 541N Dual-band Single-radio Access Point Quick Start Guide42
Provide a number between 1 and 4094 for the untagged
VLAN ID. Traffic on the VLAN that you specify in this field is
not tagged with a VLAN ID.
If you select DHCP, the access point acquires its IP address,
subnet mask, DNS, and gateway information from a DHCP
server.
If you select Static IP, you must enter information in the Static
IP Address, Subnet Mask, and Default Gateway fields.
Page 46
3
Setup
Configuring 802.1X Authentication
Table 7LAN Settings Field Descriptions
Field Description
Static IP
Address
Subnet Mask
Default
Gateway
DNS
Nameservers
NOTE After you configure the wired settings, you must click Apply to apply the changes
and to save the settings. Changing some settings might cause the access point to
stop and restart system processes. If this happens, wireless clients temporarily
lose connectivity. We recommend that you change AP settings when WLAN traffic
is low.
The static IP address of the access point. This field is
disabled if you use DHCP as the connection type.
Subnet Mask of the access point.
Default Gateway of the access point.
DNS mode.
In Dynamic mode, the IP addresses for the DNS servers are
assigned automatically by using DHCP. This option is only
available if you specified DHCP for the Connection Type.
In Manual mode, you must assign the IP addresses of the
DNS Nameservers that resolve domain names.
Configuring 802.1X Authentication
On networks that use IEEE 802.1X, port-based network access control, a
supplicant (client) cannot gain access to the network until the 802.1X
authentication server grants access. If your network uses 802.1X, you must
configure the 802.1X authentication information that the access point can supply to
the authentication server.
To configure the access point 802.1X supplicant user name and password, click
the 802.1X Authentication tab and configure the fields shown in Ta bl e 8 .
43Cisco AP 541N Dual-band Single-radio Access Point Quick Start Guide
Page 47
Setup
Configuring 802.1X Authentication
Figure11IEEE 802.1X Authentication
3
Table 8IEEE 802.1X Authentication Field Descriptions
Field Description
802.1X Supplicant
Cisco AP 541N Dual-band Single-radio Access Point Quick Start Guide44
Click Enabled to enable the Administrative status of the
802.1X Supplicant.
Click Disabled to disable the Administrative status of the
802.1X Supplicant.
Page 48
3
Setup
Configuring 802.1X Authentication
Table 8IEEE 802.1X Authentication Field Descriptions
Field Description
Username
Password
NOTE After you configure the settings on the Authentication page, you must click Apply
to apply the changes and to save the settings. Changing some settings might cause
the access point to stop and restart system processes. If this happens, wireless
clients will temporarily lose connectivity. We recommend that you change access
point settings when WLAN traffic is low.
Enter the MD5 username for the access point to use when
responding to requests from an 802.1X authentication server.
The username can be 1 to 64 characters in length. ASCII
printable characters are allowed, which includes upper and
lower case letters, numbers, and special symbols such as @
and #. Double quote (") is not a valid character.
NOTE: If the 802.1X Supplicant is Disabled, the Username
field is not editable.
Enter the MD5 password for the access point to use when
responding to requests from an 802.1X authentication server.
The password can be 1 to 64 characters in length. ASCII
printable characters are allowed, which includes upper and
lower case letters, numbers, and special symbols such as @
and #. Double quote (") is not a valid character.
NOTE: If the 802.1X Supplicant is Disabled, the Password
field is not editable.
45Cisco AP 541N Dual-band Single-radio Access Point Quick Start Guide
Page 49
Setup
Enabling the Network Time Protocol
Enabling the Network Time Protocol
The Network Time Protocol (NTP) is an Internet standard protocol that
synchronizes computer clock times on your network. NTP servers transmit
Coordinated Universal Time (UTC, also known as Greenwich Mean Time) to their
client systems. NTP sends periodic time requests to servers, using the returned
time stamp to adjust its clock. The timestamp is used to indicate the date and time
of each event in log messages.
By using NTP, the AP can obtain and maintain its time from a server on the network.
Using an NTP server gives your AP the ability to provide the correct time of day in
log messages and session information.
Seehttp://www.ntp.org for more information about NTP.
To configure the NTP that the access point uses manually as shown in Figure 12
on page 47 or by using a server as shown in Figure 13 on page 48, click the Time
tab and update the fields as described in Ta bl e 9 .
3
Cisco AP 541N Dual-band Single-radio Access Point Quick Start Guide46
Page 50
3
Setup
Enabling the Network Time Protocol
Figure12Manually Enabling Network Time Protocol
47Cisco AP 541N Dual-band Single-radio Access Point Quick Start Guide
Page 51
Setup
Enabling the Network Time Protocol
Figure13Enabling Network Time Protocol Server
3
Cisco AP 541N Dual-band Single-radio Access Point Quick Start Guide48
Page 52
3
Setup
Enabling the Network Time Protocol
Table 9TIme Settings (NTP)
FieldDescription
System TimeShows the current system time.
Set System TimeTo permit the AP to poll an NTP server, click Using
Network Time Protocol (NTP).
To set the system time manually, click Manually.
NTP ServerThis field appears when you select Using Network
Time Protocol (NTP) in the Set System Time field.
If using NTP, specify the server by host name or IP
address.
Using the IP address is not recommended as the IP
address is more likely to change.
Time ZoneSelect the international time zone in which the AP is
operating, for example USA (Eastern).
System DateThis field appears when you select Manually in the
Set System Time field. Use the System Date list to
select month, day, and year.
System Time (24 HR)This field appears when you select Manually in the
Set System Time field. Use the System Time list to
select hours and minutes. All times are relative to the
local time zone.
49Cisco AP 541N Dual-band Single-radio Access Point Quick Start Guide
Page 53
Setup
Enabling the Network Time Protocol
Table 9TIme Settings (NTP)
FieldDescription
3
Adjust Time for Daylight
Savings
DST Start (24 HR)Use this field to configure Daylight Savings Time to
DST End (24 HR)Use this field to configure Daylight Savings Time to
Select the Daylight Savings option to adjust the
system time for Daylight Savings Time (DST). Fields
appear in order to select the date and time to start
and end DST.
start. The start time is relative to standard time. If the
starting month is after the ending month, the system
assumes that you are in the southern hemisphere.
From the week list, select the week of the month
(First, Second, ..., Last).
From the day list, select the day of the week
(Sunday, Monday...).
From the month list, select the month (January,
February...).
Specify the time (24-hour format) by selecting the
hours and minutes.
end. The end time is relative to Daylight Savings
Time .
From the week list, select the week of the month
(First, Second, ..., Last).
From the day list, select the day of the week
(Sunday, Monday...).
From the month list, select the month (January,
February...).
Specify the time (24-hour format) by selecting the
hours and minutes.
DST Offset (minutes)From the DST Offset list, select the number of
minutes to add during Daylight Savings Time (15 to
120 in 15-minute increments).
Cisco AP 541N Dual-band Single-radio Access Point Quick Start Guide50
Page 54
3
Setup
Enabling the Network Time Protocol
NOTE After you configure the Time settings, you must click Apply to apply the changes
and to save the settings. Changing some settings might cause the access point to
stop and restart system processes. If this happens, wireless clients will temporarily
lose connectivity. We recommend that you change access point settings when
WLAN traffic is low.
51Cisco AP 541N Dual-band Single-radio Access Point Quick Start Guide
Page 55
Wireless
Modifying Wireless Radio Settings
Wireless settings configure the wireless radio in the access point (802.11 mode
and channel) and to the network interface to the access point (AP MAC address).
To configure the wireless interface, click the Wireless Radio Settings tab.
4
Figure14Wireless Interface Configuration
Ta bl e 10 describes the fields and configuration options available on the Radio
Settings page.
Cisco AP 541N Dual-band Single-radio Access Point Quick Start Guide52
Page 56
4
Wireless
Modifying Wireless Radio Settings
Table 10Radio Settings Field Descriptions
FieldDescription
Country
802.11d
Regulatory
Domain
Support
The country in which the access point is operating.
Wireless regulations vary from country to country. Make sure
you select the correct country code so that the access point
complies with the regulations in your country. The country
code selection affects the wireless radio modes the access
point can support as well as the list of channels and transmit
power of the wireless radio.
Enabling support for IEEE 802.11d (World Mode) on the access
point causes the access point to broadcast which country it is
operating in as a part of its beacons and probe responses. This
allows client stations to operate in any country without
reconfiguration.
Disabling 802.11d prevents the country code setting from
being broadcast in the beacons. However, this only applies to
wireless radios configured to operate in the
band). For wireless radios operating in the
band), the access point software configures support for
802.11h. When 802.11h is supported, the country code
information is broadcast in the beacons.
g
band (2.4 GHz
a
band (5 GHz
To enable 802.11d regulatory domain support, click Enabled.
To disable 802.11d regulatory domain support, click Disabled.
Wireless
Radio
Interface
MAC Address
53Cisco AP 541N Dual-band Single-radio Access Point Quick Start Guide
Turns the wireless radio interface on or off.
Indicates the Media Access Control (MAC) addresses for the
interface.
This page shows the MAC addresses for Radio Interface One.
A MAC address is a permanent, unique hardware address for
any device that represents an interface to the network. The
MAC address is assigned by the manufacturer. You cannot
change the MAC address. It is provided here for informational
purposes as a unique identifier for the interface.
Page 57
Table 10Radio Settings Field Descriptions
FieldDescription
4
Mode
The Physical Layer (PHY) standard the wireless radio uses.
NOTE: If the Wireless Radio Interface is set to Off, the Mode
cannot be changed.
NOTE: The modes available on your access point depend on
the country code setting.
Select one of the following modes for the wireless radio
interface:
•802.11a. Only 802.11a clients can connect to the access
point.
•802.11b/g. 802.11b and 802.11g clients can connect to
the access point.
•802.11a/n. 802.11a clients and 802.11n clients operating
in the 5-GHz frequency can connect to the access point.
•802.11b/g/n (default). 802.11b, 802.11g, and 802.11n
clients operating in the 2.4-GHz frequency can connect
to the access point.
•2.4 GHz 802.11n. Only 802.11n clients operating in the
2.4-GHz frequency can connect to the access point.
•5 GHz 802.11n.Only 802.11n clients operating in the 5-
GHz frequency can connect to the access point.
Cisco AP 541N Dual-band Single-radio Access Point Quick Start Guide54
Page 58
4
Wireless
Modifying Virtual Access Point Settings
Table 10Radio Settings Field Descriptions
FieldDescription
Channel
NOTE After you configure the wireless settings, you must click Apply to apply the
changes and to save the settings. Changing some settings might cause the access
point to stop and restart system processes. If this happens, wireless clients
temporarily lose connectivity. We recommend that you change access point
settings when WLAN traffic is low.
Select the Channel.
NOTE: If Radio Interface is set to Off, the Channel cannot be
changed.
The range of available channels is determined by the mode of
the wireless radio interface and the country code setting. If
you select Auto for the channel setting, the access point scans
all available channels, immediately selects a channel, and
begins operation. If interference or errors occur on that
channel, another channel is automatically selected.
The Channel defines the portion of the wireless radio
spectrum the wireless radio uses for transmitting and
receiving. Each mode offers a number of channels, depending
on how the spectrum is licensed by national and transnational
authorities such as the Federal Communications Commission
(FCC) or the International Telecommunication Union (ITU-R).
Modifying Virtual Access Point Settings
To change VAP 0 or to enable and configure additional VAPs, select the Virtual
Access Points (SSIDs) tab in the Wireless section.
VAPs segment the wireless LAN into multiple broadcast domains that are the
wireless equivalent of Ethernet VLANs. VAPs simulate multiple access points in
one physical access point. The Cisco AP 541N supports up to 16 VAPs.
55Cisco AP 541N Dual-band Single-radio Access Point Quick Start Guide
Page 59
Wireless
Modifying Virtual Access Point Settings
NOTE Note that only those VAPs which have non-default configuration are displayed
when the page initially loads. To configure additional VAPs, click Add Another to
expose new (empty) VAP entries.
For each VAP, you can customize the security mode to control wireless client
access. Each VAP can also have a unique SSID. Multiple SSIDs make a single
access point look like two or more access point
By configuring VAPs, you can maintain better control over broadcast and multicast
traffic that affects network performance.
You can configure each VAP to use a different VLAN, or you can configure multiple
VAPs to use the same VLAN. VAP0, which is always enabled, is assigned to
VLAN 1 by default. VAP1 is also enabled by default and assigned to VLAN 100.
The access point adds VLAN ID tags to wireless client traffic based on the VLAN
ID you configure on the VAP page or by using the RADIUS server assignment. If
you use an external RADIUS server, you can configure multiple VLANs on each
VAP. The external RADIUS server assigns wireless clients to the VLAN when the
clients associate and authenticate.
4
s to other systems on the network.
You can configure up to four global IPv4 RADIUS servers. One of the servers
always acts as a primary while the others act as backup servers. The network
type and accounting mode are common across all configured RADIUS servers.
You can configure each VAP to use the global RADIUS server settings, which is the
default, or you can configure a per-VAP RADIUS server set. You can also configure
separate RADIUS server settings for each VAP.
The Global RADIUS server settings are collapsed when the page initially loads. To
show (expand) the Global RADIUS server settings section of the page, click the
right arrow icon to the left of the Global RADIUS server settings section title. To
collapse the Global RADIUS server settings section, click the down arrow icon to
the left of the Global RADIUS server settings section title.
If wireless clients use a security mode that does not communicate with the
RADIUS server, or if the RADIUS server does not provide the VLAN information,
you can assign a VLAN ID to each VAP. The access point assigns the VLAN to all
wireless clients that connect to the access point through that VAP.
NOTE Before you configure VLANs on the access point, be sure to verify that the switch
and DHCP server the access point uses can support IEEE 802.1Q VLAN
encapsulation.
Cisco AP 541N Dual-band Single-radio Access Point Quick Start Guide56
Page 60
4
To configure multiple VAPs, click the VA P tab.
Figure15Configuring Virtual Access Points
Wireless
Modifying Virtual Access Point Settings
Ta bl e 11 describes the fields and configuration options on the VAP page.
Table 11VAP Field Descriptions
FieldDescription
RADIUS IP
Address
57Cisco AP 541N Dual-band Single-radio Access Point Quick Start Guide
Enter the address for the primary global RADIUS server. By
default, each VAP uses the global RADIUS settings that you
define for the access point at the top of the VAP page.
When the first wireless client tries to authenticate with the
access point, the access point sends an authentication
request to the primary server. If the primary server responds
to the authentication request, the access point continues to
use this RADIUS server as the primary server, and
authentication requests are sent to the address you specify.
Page 61
Wireless
Modifying Virtual Access Point Settings
Table 11VAP Field Descriptions
FieldDescription
4
RADIUS IP
Address 1–3
RADIUS Key
RADIUS Key
1–3
Enter up to three IPv4 addresses to use as the backup
RADIUS servers.
If authentication fails with the primary server, each
configured backup server is tried in sequence. The address
must be valid in order for the access point to attempt to
contact the server.
Enter the RADIUS key in the text box.
The RADIUS Key is the shared secret key for the global
RADIUS server. You can use up to 63 standard alphanumeric
and special characters. The key is case sensitive, and you
must configure the same key on the access point and on your
RADIUS server. The text you enter is displayed as large dot
characters to prevent others from seeing the RADIUS key as
you type.
Enter the RADIUS key associated with the configured
backup RADIUS servers. The server at RADIUS IP Address-1
uses RADIUS Key-1, RADIUS IP Address-2 uses RADIUS
Key-2, and so forth.
Enable Radius
Accounting
VAP
Select this option to track and measure the resources a
particular user has consumed such as system time, amount
of data transmitted and received, and so forth.
If you enable RADIUS accounting, it is enabled for the
primary RADIUS server and all backup servers.
You can configure up to 16 VAPs for each wireless radio.
VAP0 is the physical wireless radio interface. To disable
VAP0, you must disable the wireless radio. Due to the
dependency of the WDS links with the VAP0 security mode,
VAP0 cannot be configured to None, Static WEP, or 802.1X if
the WDS links have WPA Personal as the security mode. If
you need to change the security of VAP0 from WPA Personal
or WPA Enterprise to None, Static WEP, or 802.1X, then
remove the WPA security mode for all the WDS links.
Cisco AP 541N Dual-band Single-radio Access Point Quick Start Guide58
Page 62
4
Wireless
Modifying Virtual Access Point Settings
Table 11VAP Field Descriptions
FieldDescription
Enabled
VLAN ID
You can enable or disable a configured network.
•To enable the specified network, select the Enabled
option beside the appropriate VAP.
•To disable the specified network, clear the Enabled
option beside the appropriate VAP.
If you disable the specified network, you lose the VLAN ID
you entered.
When a wireless client connects to the access point by using
this VAP, the access point tags all traffic from the wireless
client with the VLAN ID you enter in this field unless you
enable the untagged VLAN ID or use a RADIUS server to
assign a wireless client to a VLAN. The range for the VLAN ID
is 1–4094.
If you use RADIUS-based authentication for clients, you can
optionally add the following attributes to the appropriate file
in the RADIUS or AAA server to configure a VLAN for the
client:
•Tunnel-Type
•Tunnel-Medium-Type
•Tunnel-Private-Group-ID
The RADIUS-assigned VLAN ID overrides the VLAN ID you
configure on the VAP page.
You configure the untagged and management VLAN IDs on
the Ethernet Settings page. For more information, see LAN
Settings, page 40.
59Cisco AP 541N Dual-band Single-radio Access Point Quick Start Guide
Page 63
Wireless
Modifying Virtual Access Point Settings
Table 11VAP Field Descriptions
FieldDescription
4
SSID
Broadcast
SSID
Enter a name for the wireless network. The SSID is an
alphanumeric string of up to 32 characters. Double quote (")
is not a valid character. You can use the same SSID for
multiple VAPs, or you can choose a unique SSID for each VAP.
NOTE: If you are connected as a wireless client to the same
access point that you are administering, resetting the SSID
will cause you to lose connectivity to the access point. You
will need to reconnect to the new SSID after you save this
new setting.
Specify whether to allow the access point to broadcast the
Service Set Identifier (SSID) in its beacon frames. The
Broadcast SSID parameter is disabled by default. When the
VAP does not broadcast its SSID, the network name is not
displayed in the list of available networks on a client station.
Instead, the client must have the exact network name
configured in the supplicant before it is able to connect.
•To enable the SSID broadcast, select the Broadcast
SSID check box.
•To prohibit the SSID broadcast, clear the Broadcast
SSID check box.
NOTE: Disabling the broadcast SSID is sufficient to prevent
clients from accidentally connecting to your network, but it
will not prevent even the simplest of attempts by a hacker to
connect or monitor unencrypted traffic. Suppressing the
SSID broadcast offers a very minimal level of protection on
an otherwise exposed network (such as a guest network)
where the priority is making it easy for clients to get a
connection and where no sensitive information is available.
Cisco AP 541N Dual-band Single-radio Access Point Quick Start Guide60
Page 64
4
Wireless
Modifying Virtual Access Point Settings
Table 11VAP Field Descriptions
FieldDescription
Security
MAC Auth Type
Select one of the following Security modes for this VAP:
•None
•Static WEP
•Dynamic WEP
•IEEE 802.1X
•WPA Personal
•WPA Enterprise
If you select a security mode other than None, additional
fields appear. These fields are explained in the “Security
(Mode)” section.
You can configure a global list of MAC addresses that are
allowed or denied access to the network. The drop-down
menu for this feature allows you to select the type of MAC
authentication to use:
•Disabled: Do not use MAC authentication.
•Local: Use the MAC authentication list that you
configure on the Wireless Connection Control page.
•RADIUS: Use the MAC authentication list on the
external RADIUS server.
For more information about MAC authentication, see Client
Connection Control, page 76.
61Cisco AP 541N Dual-band Single-radio Access Point Quick Start Guide
Page 65
Wireless
Modifying Virtual Access Point Settings
Table 11VAP Field Descriptions
FieldDescription
4
Station
Isolation
Redirect Mode
Select from the drop-down menu to configure Station
Isolation for this VAP:
•When Station Isolation is disabled, wireless clients
can communicate with one another normally by
sending traffic through the access point.
•When Station Isolation is enabled, the access point
blocks communication between wireless clients on
the same VAP. The access point still allows data traffic
between its wireless clients and wired devices on the
network, across a WDS link, and with other wireless
clients associated with a different VAP.
Enable the HTTP redirect feature to redirect wireless clients
to a custom Web page.
When redirect mode is enabled, the user is redirected to the
URL you specify after the wireless client associates with an
access point and the user opens a Web browser on the
client to access the Internet.
The custom Web page must be located on an external Web
server and might contain information such as the company
logo and network usage policy.
NOTE: The wireless client is redirected to the external Web
server only once, when it is first associated with the access
point.
Redirect URL
Delete
Cisco AP 541N Dual-band Single-radio Access Point Quick Start Guide62
Specify the URL where the Web browser is to be redirected
after the wireless client associates with the access point and
sends HTTP traffic. Length is 1 to 120 alphanumeric and
special characters, in the form "^[A-Za-z]+://[A-Za-z0-9]+\.[A-Za-z0-9]+"). For example: http://cisco.com.
Click the red x Delete icon to remove the configuration for a
particular VAP. When a VAP is deleted, all of its configuration
is restored to its default configuration settings. The entry is
removed from the list of displayed VAPs.
NOTE: VAP0 corresponds to the physical wireless radio
interface and cannot be deleted. The Delete icon is not
displayed for this VAP.
Page 66
4
Wireless
Modifying Virtual Access Point Settings
NOTE After you configure the VAP settings, you must click Apply to apply the changes
and to save the settings. Changing some settings might cause the access point to
stop and restart system processes. If this happens, wireless clients temporarily
lose connectivity. We recommend that you change access point settings when
WLAN traffic is low.
Security (Mode)
The Security mode you set here is specifically for this VAP.
When the page initially loads, any VAP that has a security mode other than None
will have a Show details link below the Security selection box. Click the Show
details link to show the current security settings. When showing the current
security settings, the link changes to Hide details. Click Hide details to collapse
the current security settings.
None (Plain-text)
If you select None as your security mode, no other options are configurable on the
access point. This mode means that any data transferred to and from the access
point is not encrypted. This security mode can be useful during initial network
configuration or for problem solving, but it is not recommended for regular use on
the Internal network because it is not secure.
Static WEP
Wired Equivalent Privacy (WEP) is a data encryption protocol for 802.11 wireless
networks. All wireless stations and access point
with a static 64-bit (40-bit secret key + 24-bit initialization vector (IV)) or 128-bit
(104-bit secret key + 24-bit IV) Shared Key for data encryption.
Static WEP is not the most secure mode available, but it offers more protection
than setting the security mode to None (Plain-text) as it does prevent an outsider
from easily sniffing out unencrypted wireless traffic.
WEP encrypts data moving across the wireless network based on a static key.
(The encryption algorithm is a stream cipher called RC4.)
s on the network are configured
63Cisco AP 541N Dual-band Single-radio Access Point Quick Start Guide
Page 67
Wireless
Modifying Virtual Access Point Settings
If you use Static WEP, the following rules apply:
•All client stations must have the Wireless LAN (WLAN) security set to WEP,
and all clients must have one of the WEP keys specified on the access point
in order to de-code AP-to-station data transmissions.
•The access point must have all keys used by clients for station-to-AP
transmit so that it can de-code the station transmissions.
•The same key must occupy the same slot on all nodes (access point and
clients). For example if the access point defines abc123 key as WEP key 3,
then the client stations must define that same string as WEP key 3.
•Client stations can use different keys to transmit data to the access point.
(Or they can all use the same key, but this is less secure because it means
one station can decrypt the data being sent by another.)
•On some wireless client software, you can configure multiple WEP keys and
define a client station “transfer key index”, and then set the stations to
encrypt the data they transmit using different keys. This ensures that
neighboring access point
4
s cannot decode each other’s transmissions.
•You cannot mix 64-bit and 128-bit WEP keys between the access point and
its client stations.
Ta bl e 12 describes the WEP fields.
Table 12WEP Field Descriptions
FieldDescription
Transfer Key
Index
Key Length
Select a key index from the drop-down menu. Key indexes 1
through 4 are available. The default is1.
The transfer key index indicates which WEP key the access
point will use to encrypt the data it transmits.
Specify the length of the key by clicking one of the radio
buttons:
•64 bits
•128 bits
Cisco AP 541N Dual-band Single-radio Access Point Quick Start Guide64
Page 68
4
Wireless
Modifying Virtual Access Point Settings
Table 12WEP Field Descriptions
FieldDescription
Key Type
WEP Keys
Select the key type by clicking one of the radio buttons:
•ASCII
•Hex
You can specify up to four WEP keys. In each text box, enter a
string of characters for each key. The keys you enter depend
on the key type selected:
•ASCII. Includes upper and lower case alphabetic
letters, the numeric digits, and special symbols such
as @ and #.
•Hex. Includes digits 0 to 9 and the letters A to F.
Use the same number of characters for each key as specified
in the Characters Required field. These are the RC4 WEP
keys shared with the stations using the access point.
Each client station must be configured to use one of these
same WEP keys in the same slot as specified here on the
access point.
Characters Required: The number of characters you enter
into the WEP Key fields is determined by the Key length and
Key type you select. For example, if you use 128-bit ASCII
keys, you must enter 13 characters in the WEP key. The
number of characters required updates automatically based
on how you set Key Length and Key Type.
65Cisco AP 541N Dual-band Single-radio Access Point Quick Start Guide
Page 69
Wireless
Modifying Virtual Access Point Settings
Table 12WEP Field Descriptions
FieldDescription
4
802.1X
Authentication
The authentication algorithm defines the method used to
determine whether a client station is allowed to associate
with an access point when static WEP is the security mode.
Specify the authentication algorithm you want to use by
choosing one of the following options:
•Open system authentication allows any client station
to associate with the access point whether that client
station has the correct WEP key or not. This algorithm
is also used in plaintext, Dynamic WEP, IEEE 802.1X,
and WPA modes. When the authentication algorithm is
set to Open System, any client can associate with the
access point.
NOTE Just because a client station is allowed to associate
does not ensure it can exchange traffic with an access
point. A station must have the correct WEP key to be
able to successfully access and decrypt data from an
access point, and to transmit readable data to the
access point.
•Shared key authentication requires the client station to
have the correct WEP key in order to associate with
the access point. When the authentication algorithm is
set to Shared Key, a station with an incorrect WEP key
will not be able to associate with the access point.
•Both Open system and Shared key. When you select
both authentication algorithms:
-Client stations configured to use WEP in shared key
mode must have a valid WEP key to associate with
the access point.
-Client stations configured to use WEP as an open
system (shared key mode not enabled) are able to
associate with the access point, even if they do not
have the correct WEP key.
Cisco AP 541N Dual-band Single-radio Access Point Quick Start Guide66
Page 70
4
Wireless
Modifying Virtual Access Point Settings
IEEE 802.1X Authentication
IEEE 802.1X is the standard defining port-based authentication and infrastructure
for doing key management. Extensible Authentication Protocol (EAP) messages
sent over an IEEE 802.11 wireless network using a protocol called EAP
Encapsulation Over LANs (EAPOL). IEEE 802.1X provides dynamically-generated
keys that are periodically refreshed. An RC4 stream cipher is used to encrypt the
frame body and cyclic redundancy checking (CRC) of each 802.11 frame.
This mode requires the use of an external RADIUS server to authenticate users.
The access point requires a RADIUS server capable of EAP, such as the Microsoft
Internet Authentication Server. To work with Windows clients, the authentication
server must support Protected EAP (PEAP) and MSCHAP V2.
You can use any of a variety of authentication methods that the IEEE 802.1X mode
supports, including certificates, Kerberos, and public key authentication. You must
configure the client stations to use the same authentication method the access
point uses.
NOTE After you configure the security settings, you must click Apply to apply the changes
and to save the settings.
Table 13IEEE 802.1X
FieldDescription
Use Global RADIUS
Server Settings
RADIUS IP Address
By default each VAP uses the global RADIUS settings
that you define for the access point at the top of the
VAP page. However, you can configure each VAP to
use a different set of RADIUS servers.
To use the global RADIUS server settings, make sure
the check box is selected.
To use a separate RADIUS server for the VAP, clear the
check box and enter the RADIUS server IP address
and key in the following fields.
Enter the address for the primary RADIUS server for
this VAP.
67Cisco AP 541N Dual-band Single-radio Access Point Quick Start Guide
Page 71
Wireless
Modifying Virtual Access Point Settings
Table 13IEEE 802.1X
FieldDescription
4
RADIUS IP Address
1–3
RADIUS Key
RADIUS Key 1–3
Enable RADIUS
Accounting
Enter up to three IPv4 addresses to use as the backup
RADIUS servers for this VAP.
If authentication fails with the primary server, each
configured backup server is tried in sequence.
Enter the RADIUS key in the text box.
The RADIUS Key is the shared secret key for the
global RADIUS server. You can use up to 63 standard
alphanumeric and special characters. The key is case
sensitive, and you must configure the same key on the
access point and on your RADIUS server. The text you
enter will be displayed as "*" characters to prevent
others from seeing the RADIUS key as you type.
Enter the RADIUS key associated with the configured
backup RADIUS servers. The server at RADIUS IP
Address-1 uses RADIUS Key-1, RADIUS IP Address-2
uses RADIUS Key-2, and so forth.
Select this option to track and measure the resources
a particular user has consumed such as system time,
amount of data transmitted and received, and so forth.
If you enable RADIUS accounting, it is enabled for the
primary RADIUS server and all backup servers.
Broadcast Key
Refresh Rate
Session Key Refresh
Rate
Cisco AP 541N Dual-band Single-radio Access Point Quick Start Guide68
Enter a value to set the interval at which the broadcast
(group) key is refreshed for clients associated to this
VA P.
The valid range is 0–86400 seconds. A value of 0
indicates that the broadcast key is not refreshed.
Enter a value to set the interval at which the access
point will refresh session (unicast) keys for each client
associated to the VAP.
The valid range is 0–86400 seconds. A value of 0
indicates that the broadcast key is not refreshed.
Page 72
4
Wireless
Modifying Virtual Access Point Settings
Dynamic WEP
Dynamic WEP mode uses IEEE 802.1X, the standard defining port-based
authentication and infrastructure for doing key management. Extensible
Authentication Protocol (EAP) messages are sent over an IEEE 802.11 wireless
network by using a protocol called EAP Encapsulation Over LANs (EAPOL).
Dynamic WEP mode provides dynamically-generated keys that are periodically
refreshed. An RC4 stream cipher is used to encrypt the frame body and cyclic
redundancy checking (CRC) of each 802.11 frame.
This mode requires the use of an external RADIUS server to authenticate users.
The AP requires a RADIUS server capable of EAP, such as the Microsoft Internet
Authentication Server. To work with Windows clients, the authentication server
must support Protected EAP (PEAP) and MSCHAP V2.
You can use any of a variety of authentication methods that the Dynamic WEP
mode supports, including certificates, Kerberos, and public key authentication.
You must configure the client stations to use the same authentication method the
access point uses.
Table 14Dynamic WEP
FieldDescription
Use Global
RADIUS Server
Settings
RADIUS IP
Address
RADIUS IP
Address 1–3
By default each VAP uses the global RADIUS settings that
you define for the AP at the top of the VAP page. However,
you can configure each VAP to use a different set of RADIUS
servers.
To use the global RADIUS server settings, make sure the
check box is selected.
To use a separate RADIUS server for the VAP, clear the check
box and enter the RADIUS server IP address and key in the
following fields.
Enter the address for the primary RADIUS server for this VAP.
Enter up to three IPv4 addresses to use as the backup
RADIUS servers for this VAP.
If authentication fails with the primary server, each
configured backup server is tried in sequence.
69Cisco AP 541N Dual-band Single-radio Access Point Quick Start Guide
Page 73
Wireless
Modifying Virtual Access Point Settings
Table 14Dynamic WEP
FieldDescription
RADIUS KeyEnter the RADIUS key in the text box.
4
RADIUS Key
1–3
Enable RADIUS
Accounting
Broadcast Key
Refresh Rate
RADIUS Key
The
RADIUS server. You can use up to 63 standard alphanumeric
and special characters. The key is case sensitive, and you
must configure the same key on the AP and on your RADIUS
server. The text you enter will be displayed as "*" characters
to prevent others from seeing the RADIUS key as you type.
Enter the RADIUS key associated with the configured backup
RADIUS servers. The server at RADIUS IP Address-1 uses
RADIUS Key-1, RADIUS IP Address-2 uses RADIUS Key-2,
and so on.
Select this option to track and measure the resources a
particular user has consumed such as system time, amount
of data transmitted and received, and so on.
If you enable RADIUS accounting, it is enabled for the
primary RADIUS server and all backup servers.
Enter a value to set the interval at which the broadcast
(group) key is refreshed for clients associated to this VAP.
The valid range is 0–86400 seconds. A value of 0 indicates
that the broadcast key is not refreshed.
is the shared secret key for the global
Session Key
Refresh Rate
NOTE After you configure the security settings, you must click Apply to apply the changes
and to save the settings.
Cisco AP 541N Dual-band Single-radio Access Point Quick Start Guide70
Enter a value to set the interval at which the AP will refresh
session (unicast) keys for each client associated to the VAP.
The valid range is 0–86400 seconds. A value of 0 indicates
that the broadcast key is not refreshed.
Page 74
4
Wireless
Modifying Virtual Access Point Settings
WPA Personal
WPA Personal is a Wi-Fi Alliance IEEE 802.11i standard, which includes AES-CCMP
and TKIP mechanisms. The Personal version of WPA employs a pre-shared key
(instead of using IEEE 802.1X and EAP as is used in the Enterprise WPA security
mode). The PSK is used for an initial check of credentials only.
This security mode is backwards-compatible for wireless clients that support the
original WPA.
Table 15WPA Personal Field Descriptions
FieldDescription
WPA Versions
Select the types of client stations you want to support:
WPA. If all client stations on the network support the original
WPA but none support the newer WPA2, select WPA.
WPA2. If all client stations on the network support WPA2, we
suggest using WPA2, as it provides the best security by
supporting the IEEE 802.11i standard.
WPA and WPA2. If you have a mix of clients, some of which
support WPA2 and others which support only the original
WPA, select both of the check boxes. This lets both WPA and
WPA2 client stations associate and authenticate, but uses the
more robust WPA2 for clients that support it. This WPA
configuration allows more interoperability, at the expense of
some security.
71Cisco AP 541N Dual-band Single-radio Access Point Quick Start Guide
Page 75
Wireless
Modifying Virtual Access Point Settings
Table 15WPA Personal Field Descriptions
FieldDescription
4
Cipher Suites
Key
Select the cipher suite you want to use:
•TKIP
•CCMP (AES)
•TKIP and CCMP (AES)
Both TKIP and AES clients can associate with the access
point. WPA clients must have one of the following to be able
to associate with the access point:
•A valid TKIP key
•A valid AES-CCMP key
Clients not configured to use a WPA Personal cannot
associate with the access point.
The Pre-shared Key is the shared secret key for WPA
Personal. Enter a string of at least 8 characters to a maximum
of 63 characters. Acceptable characters include upper and
lower case alphabetic letters, the numeric digits, and special
symbols such as @ and #.
Broadcast Key
Refresh Rate
Enter a value to set the interval at which the broadcast
(group) key is refreshed for clients associated to this VAP.
The valid range is 0–86400 seconds. A value of 0 indicates
that the broadcast key is not refreshed.
WPA Enterprise
WPA Enterprise with RADIUS is an implementation of the Wi-Fi Alliance IEEE
802.11i standard, which includes CCMP (AES), and TKIP mechanisms. The
Enterprise mode requires the use of a RADIUS server to authenticate users.
This security mode is backwards-compatible with wireless clients that support
the original WPA.
Cisco AP 541N Dual-band Single-radio Access Point Quick Start Guide72
Page 76
4
Wireless
Modifying Virtual Access Point Settings
Table 16WPA Enterprise Field Descriptions
FieldDescription
WPA Versions
Enable
preauthentication
Select the types of client stations you want to support:
•WPA. If all client stations on the network support the
original WPA but none support the newer WPA2, then
select WPA.
•WPA2. If all client stations on the network support
WPA2, we suggest using WPA2, as it provides the
best security by supporting the IEEE 802.11i standard.
•WPA and WPA2. If you have a mix of clients, some of
which support WPA2 and others which support only
the original WPA, select both WPA and WPA2. This lets
both WPA and WPA2 client stations associate and
authenticate, but uses the more robust WPA2 for
clients that support it. This WPA configuration allows
more interoperability, at the expense of some security.
If in WPA Versions you selected only WPA2 or both WPA and
WPA2, you can enable pre-authentication for WPA2 clients.
Click Enable pre-authentication if you want WPA2 wireless
clients to send a pre-authentication packet. The preauthentication information is relayed from the access point
the client is using to the target access point. Enabling this
feature can speed up authentication for roaming clients that
connect to multiple access point
s.
73Cisco AP 541N Dual-band Single-radio Access Point Quick Start Guide
This option does not apply if you selected only WPA for WPA
Versions because WPA does not support this feature.
Page 77
Wireless
Modifying Virtual Access Point Settings
Table 16WPA Enterprise Field Descriptions
FieldDescription
4
Cipher Suites
Active Server
Use Global
RADIUS Server
Settings
Select the cipher suite you want to use:
•TKIP
•CCMP (AES)
•TKIP and CCMP (AES)
By default both TKIP and CCMP are selected. When both
TKIP and CCMP are selected, client stations configured to
use WPA with RADIUS must have one of the following:
•A valid TKIP RADIUS IP address and RADIUS Key
•A valid CCMP (AES) IP address and RADIUS Key
Displays which RADIUS server is in use. You can manually
change from this server to a different server by selecting the
desired server in the dropdown box.
NOTE: The Active Server is not stored across reboots. The
first configured RADIUS server is selected when the device
is rebooted or reset.
By default each VAP uses the global RADIUS settings that
you define for the access point at the top of the VAP page.
However, you can configure each VAP to use a different set of
RADIUS servers.
RADIUS IP
Address
RADIUS IP
Address 1–3
Cisco AP 541N Dual-band Single-radio Access Point Quick Start Guide74
To use the global RADIUS server settings, make sure the
check box is selected.
To use a separate RADIUS server for the VAP, clear the check
box and enter the RADIUS server IP address and key in the
fields.
Enter the address for the primary RADIUS server for this VAP.
Enter up to three IPv4 addresses to use as the backup
RADIUS servers for this VAP.
If authentication fails with the primary server, each
configured backup server is tried in sequence.
Page 78
4
Wireless
Modifying Virtual Access Point Settings
Table 16WPA Enterprise Field Descriptions
FieldDescription
RADIUS Key
RADIUS Key
1–3
Enable RADIUS
Accounting
Broadcast Key
Refresh Rate
Enter the RADIUS key in the text box.
The RADIUS Key is the shared secret key for the global
RADIUS server. You can use up to 63 standard alphanumeric
and special characters. The key is case sensitive, and you
must configure the same key on the access point and on your
RADIUS server. The text you enter is displayed as "*"
characters to prevent others from seeing the RADIUS key as
you type.
Enter the RADIUS key associated with the configured backup
RADIUS servers. The server at RADIUS IP Address-1 uses
RADIUS Key-1, RADIUS IP Address-2 uses RADIUS Key-2,
and so forth.
Select this option to track and measure the resources a
particular user has consumed such as system time, amount
of data transmitted and received, and so forth.
If you enable RADIUS accounting, it is enabled for the
primary RADIUS server and all backup servers.
Enter a value to set the interval at which the broadcast
(group) key is refreshed for clients associated to this VAP.
The valid range is 0–86400 seconds. A value of 0 indicates
that the broadcast key is not refreshed.
Session Key
Refresh Rate
NOTE After you configure the security settings, you must click Apply to apply the changes
and to save the settings.
75Cisco AP 541N Dual-band Single-radio Access Point Quick Start Guide
Enter a value to set the interval at which the access point will
refresh session (unicast) keys for each client associated to
the VAP.
The valid range is 0–86400 seconds. A value of 0 indicates
that the broadcast key is not refreshed.
Page 79
Wireless
Client Connection Control
Client Connection Control
A Media Access Control (MAC) address is a hardware address that uniquely
identifies each node of a network. All IEEE 802 network devices share a common
48-bit MAC address format, usually displayed as a string of 12 hexadecimal digits
separated by colons, for example 00:DC:BA:09:87:65. Each wireless network
interface card (NIC) used by a wireless client has a unique MAC address.
You can use the Access Point Configuration Utility on the access point or use an
external RADIUS server to control access to the network through the access point
based on the MAC address of the wireless client. This feature is called MAC
Authentication or MAC Filtering. To control access, you configure a global list of
MAC addresses locally on the access point or on an external RADIUS server. Then,
you set a filter to specify whether the clients with those MAC addresses are
allowed or denied access to the network. When a wireless client attempts to
associate with an access point, the access point looks up the MAC address of the
client in the local Stations List or on the RADIUS server. If it is found, the global
allow or deny setting is applied. If it is not found, the opposite is applied.
4
On the Virtual Access Point Settings page, the MAC Auth Type setting controls
whether the access point uses the station list configured locally on the Client
Connection Control page or the external RADIUS server. The Allow/Block filter
setting on the Client Connection Control page determines whether the clients in
the station list (local or RADIUS) can access the network through the access point.
For more information about setting the MAC authentication type, see Configuring
the Wireless Distribution System, page 91.
Configuring a MAC Filter and Station List on the Access Point
The Client Connection Control page allows you to control access to access point
based on MAC addresses. Based on how you set the filter, you can allow only
client stations with a listed MAC address or deny access to the stations listed.
When you enable MAC Authentication and specify a list of approved MAC
addresses, only clients with a listed MAC address can access the network. If you
specify MAC addresses to deny, all clients can access the network except for the
clients on the deny list.
To enable filtering by MAC address, click the Client Connection Control tab.
Cisco AP 541N Dual-band Single-radio Access Point Quick Start Guide76
Page 80
4
Figure16Configuring MAC Authentication
Wireless
Client Connection Control
NOTE Global MAC Authentication settings apply to all VAPs.
Ta bl e 17 describes the fields and configuration options available on the MAC
Authentication page
Table 17MAC Authentication Field Descriptions
FieldDescription
Filter
To set the MAC Address Filter, select one of the following
options:
•Allow only stations in list. Any station that is in the
Stations List is allowed access to the network through
the access point; all other stations are denied.
•Block all stations in list. Only the stations that appear in
the list are denied access to the network through the
access point. All other stations are permitted access.
NOTE: The filter you select is applied to the clients in the
station list, regardless of whether that station list is local or on
the RADIUS server.
77Cisco AP 541N Dual-band Single-radio Access Point Quick Start Guide
Page 81
Wireless
Client Connection Control
4
Table 17MAC Authentication Field Descriptions
FieldDescription
Stations List
This is the local list of clients that are either permitted or
denied access to the network through the access point.
To add a MAC Address to the local Stations List, enter its 48bit MAC address into the MAC Address text boxes, then click
Add.
To remove a MAC Address from the Stations List, select its
48-bit MAC address, then click Remove.
The stations in the list will either be allowed or denied access
based on how you set the filter in the previous field.
NOTE: If the MAC authentication type for the VAP is set to
Local, the access point uses the Stations List to permit or
deny the clients access to the network. If the MAC
authentication type is set to RADIUS, the access point
ignores the MAC addresses configured in this list and uses
the list that is stored on the RADIUS server. The MAC
authentication type is set on the VAP configuration page.
NOTE After you configure local MAC Authentication settings, you must click Apply to
apply the changes and to save the settings. Changing some settings might cause
the access point to stop and restart system processes. If this happens, wireless
clients will temporarily lose connectivity. We recommend that you change access
point settings when WLAN traffic is low.
Cisco AP 541N Dual-band Single-radio Access Point Quick Start Guide78
Page 82
4
Wireless
Modifying Advanced Settings
Configuring MAC Authentication on the RADIUS Server
If you use RADIUS MAC authentication for MAC-based access control, you must
configure a station list on the RADIUS server. The station list contains client MAC
address entries, and the format for the list is described in the following table.
Table 18Configuring MAC Authentication on the RADIUS Server
RADIUS Server
Attribute
User-Name (1)
User-Password
(2)
DescriptionValue
MAC address of the client station.Valid Ethernet
A fixed global password used to
lookup a client MAC entry.
Modifying Advanced Settings
The advanced wireless settings directly control the behavior of the wireless radio
in the access point and its interaction with the physical medium; that is, how and
what type of electromagnetic waves the access point emits.
To specify the wireless radio settings, click the Advanced Settings tab.
MAC Address.
NOPASSWORD
79Cisco AP 541N Dual-band Single-radio Access Point Quick Start Guide
Page 83
Wireless
Modifying Advanced Settings
4
Figure17Configuring the Wireless Radio Settings
Cisco AP 541N Dual-band Single-radio Access Point Quick Start Guide80
Page 84
4
Wireless
Modifying Advanced Settings
81Cisco AP 541N Dual-band Single-radio Access Point Quick Start Guide
Page 85
Wireless
Modifying Advanced Settings
4
Different settings display depending on the mode you select. Ta bl e 1 9 describes
the fields and configuration options for the Advanced Settings page.
Table 19Advanced Settings Field Descriptions
FieldDescription
Status (On/Off)
Mode
Specify whether you want the wireless radio on or off by
clicking On or Off.
If you turn off a wireless radio, the access point sends
disassociation frames to all the wireless clients it was
supporting so that the wireless radio can be gracefully
shutdown and the clients can start the association process
with other available access points.
NOTE: If Status is set to Off, then all fields are not able to be
edited.
The Mode defines the Physical Layer (PHY) standard used
by the wireless radio.
NOTE: The modes available on your access point depend
on the country code setting.
Select one of the following modes for the wireless radio
interface:
•802.11a
•802.11b/g
Cisco AP 541N Dual-band Single-radio Access Point Quick Start Guide82
•802.11a/n
•802.11b/g/n
•5 GHz 802.11n
•2.4 GHz 802.11n
Page 86
4
Wireless
Modifying Advanced Settings
Table 19Advanced Settings Field Descriptions
FieldDescription
Channel
Channel
Bandwidth
The range of available channels is determined by the mode
of the wireless radio interface and the country code setting.
If you select Auto for the channel setting, and Auto channel is
configured, the access point scans available channels,
immediately selects a channel and begins operation. If
interference or errors occur on that channel, another channel
is automatically selected.
The channel defines the portion of the wireless radio
spectrum the wireless radio uses for transmitting and
receiving. Each mode offers a number of channels,
depending on how the spectrum is licensed by national and
transnational authorities such as the Federal
Communications Commission (FCC) or the International
Telecommunication Union (ITU-R).
This field is available only if the wireless radio mode includes
802.11n.
The 802.11n specification allows a 40-MHz-wide channel in
addition to the legacy 20-MHz channel available with other
modes. The 40-MHz channel enables higher data rates but
leaves fewer channels available for use by other 2.4 GHz and
5 GHz devices.
Select a value to set the use of the channel bandwidth.
The default is 20-MHz.
83Cisco AP 541N Dual-band Single-radio Access Point Quick Start Guide
Page 87
Wireless
Modifying Advanced Settings
4
Table 19Advanced Settings Field Descriptions
FieldDescription
Primary
Channel
Short Guard
Interval
Supported
This field is available only if the radio mode includes 802.11n.
This setting can be changed only when the channel
bandwidth is set to 40 MHz. A 40-MHz channel can consist of
two contiguous 20-MHz channels in the same frequency
domain. These two 20-MHz channels are often referred to as
the Primary and Secondary channels. The Primary Channel
is used for 802.11n clients that support only a 20-MHz
channel bandwidth and for legacy clients.
Select one of the following options:
•Upper. Set the Primary Channel as the upper 20-MHz
channel in the 40-MHz band.
•Lower. Set the Primary Channel as the lower 20-MHz
channel in the 40-MHz band.
This field is available only if the radio mode includes 802.11n.
The guard interval is the dead time, in nanoseconds,
between OFDM symbols. It prevents Inter-Symbol and InterCarrier Interference (ISI, ICI). The 802.11n mode allows for a
reduction in this guard interval from the a and g definition of
800 nanoseconds to 400 nanoseconds. Reducing the guard
interval can yield a 10 percent improvement in data
throughput.
Cisco AP 541N Dual-band Single-radio Access Point Quick Start Guide84
Select one of the following options:
•Ye s . The access point transmits data using a 400 ns
guard Interval when communicating with clients that
also support the short guard interval.
•No. The access point transmits data using an 800 ns
guard interval.
Page 88
4
Wireless
Modifying Advanced Settings
Table 19Advanced Settings Field Descriptions
FieldDescription
STBC Mode
Protection
This field is available only if the radio mode includes 802.11n.
Space Time Block Coding (STBC) is an 802.11n technique
intended to improve the reliability of data transmissions. The
data stream is transmitted on multiple antennas so the
receiving system has a better chance of detecting at least
one of the data streams.
Select one of the following options:
•On. The access point transmits the same data stream
on multiple antennas at the same time.
•Off. The access point does not transmit the same data
on multiple antennas.
The protection feature contains rules to guarantee that
802.11 transmissions do not cause interference with legacy
stations or applications. By default, these protection
mechanisms are enabled (Auto). With protection enabled,
protection mechanisms will be invoked if legacy devices are
within range of the access point.
You can disable (Off) these protection mechanisms; however,
when protection is off, legacy clients or access points within
range can be affected by 802.11n transmissions. Protection
is also available when the mode is 802.11b/g. When
protection is enabled in this mode, it protects 802.11b clients
and access points from 802.11g transmissions.
Beacon
Interval
85Cisco AP 541N Dual-band Single-radio Access Point Quick Start Guide
Note: This setting does not affect the ability of the client to
associate with the access point.
Beacon frames are transmitted by an access point at regular
intervals to announce the existence of the wireless network.
The default behavior is to send a beacon frame once every
100 milliseconds (or 10 per second).
Enter a value from 20 to 2000 milliseconds.
Page 89
Wireless
Modifying Advanced Settings
4
Table 19Advanced Settings Field Descriptions
FieldDescription
DTIM Period
Specify a DTIM period from 1 to 255 beacons.
The Delivery Traffic Information Map (DTIM) message is an
element included in some beacon frames. It indicates which
client stations, currently sleeping in low-power mode, have
data buffered on the access point and are awaiting pick-up.
The DTIM period you specify indicates how often the clients
served by this access point should check for buffered data
still on the access point awaiting pickup.
The measurement is in beacons. For example, if you set this
field to 1, clients will check for buffered data on the access
point at every beacon. If you set this field to 10, clients will
check on every 10th beacon.
Cisco AP 541N Dual-band Single-radio Access Point Quick Start Guide86
Page 90
4
Wireless
Modifying Advanced Settings
Table 19Advanced Settings Field Descriptions
FieldDescription
Fragmentation
Threshold
Specify a number between 256 and 2,346 to set the frame
size threshold in bytes. The fragmentation threshold must be
set to an even number within the range.
The fragmentation threshold is a way of limiting the size of
packets (frames) transmitted over the network. If a packet
exceeds the fragmentation threshold you set, the
fragmentation function is activated and the packet is sent as
multiple 802.11 frames.
If the packet being transmitted is equal to or less than the
threshold, fragmentation is not used.
Setting the threshold to the largest value (2346 bytes)
effectively disables fragmentation. Fragmentation plays no
role when Aggregation is enabled.
Fragmentation involves more overhead both because of the
extra work of dividing up and reassembling of frames it
requires, and because it increases message traffic on the
network. However, fragmentation can help improve network
performance and reliability if properly configured.
Sending smaller frames (by using lower fragmentation
threshold) might help with some interference problems; for
example, with microwave ovens.
By default, fragmentation is off. We recommend not using
fragmentation unless you suspect that there is wireless radio
interference. The additional headers applied to each
fragment increase the overhead on the network and can
greatly reduce throughput.
87Cisco AP 541N Dual-band Single-radio Access Point Quick Start Guide
Page 91
Wireless
Modifying Advanced Settings
4
Table 19Advanced Settings Field Descriptions
FieldDescription
RTS Threshold
Maximum
Stations
Specify a Request to Send (RTS) Threshold value between 0
and 2347.
The RTS threshold indicates the number of octets in an
MPDU, below which an RTS/CTS handshake is not
performed.
Changing the RTS threshold can help control traffic flow
through the access point, especially one with a lot of clients.
If you specify a low threshold value, RTS packets will be sent
more frequently. This will consume more bandwidth and
reduce the throughput of the packet. On the other hand,
sending more RTS packets can help the network recover
from interference or collisions which might occur on a busy
network, or on a network experiencing electromagnetic
interference.
Specify the maximum number of stations allowed to access
this access point at any one time.
You can enter a value between 0 and 200.
Cisco AP 541N Dual-band Single-radio Access Point Quick Start Guide88
Page 92
4
Wireless
Modifying Advanced Settings
Table 19Advanced Settings Field Descriptions
FieldDescription
Transmit
Power
Select the value for the transmit power level for this access
point:
•Low
•Medium
•High
•Full
The default value, which is Full, can be more cost-efficient
than a lower level since it gives the access point a maximum
broadcast range and reduces the number of access points
needed.
To increase capacity of the network, place access points
closer together and reduce the value of the transmit power.
This helps reduce overlap and interference among access
points. A lower transmit power setting can also keep your
network more secure because weaker wireless signals are
less likely to propagate outside of the physical location of
your network.
Fixed Multicast
Rate
Select the multicast traffic transmission rate you want the
access point to support.
89Cisco AP 541N Dual-band Single-radio Access Point Quick Start Guide
Page 93
Wireless
Modifying Advanced Settings
4
Table 19Advanced Settings Field Descriptions
FieldDescription
Rate Sets
Broadcast/
Multicast Rate
Limiting
Check the transmission rate sets you want the access point
to support and the basic rate sets you want the access point
to advertise:
•Rate is expressed in megabits per second.
•Supported indicates rates that the access point
supports. You can check multiple rates (click a check
box to select or de-select a rate). The access point
automatically chooses the most efficient rate based
on factors like error rates and distance of client
stations from the access point.
•Basic indicates rates that the access point will
advertise to the network for the purposes of setting up
communication with other access points and client
stations on the network. It is generally more efficient to
have an access point broadcast a subset of its
supported rate sets.
Enabling multicast and broadcast rate limiting can improve
overall network performance by limiting the number of
packets transmitted across the network.
By default the Multicast/Broadcast Rate Limiting option is
enabled. When Multicast/Broadcast Rate Limiting is
disabled, the Rate Limit and Rate Limit Burst fields cannot be
modified.
Rate Limit
Rate Limit
Burst
Cisco AP 541N Dual-band Single-radio Access Point Quick Start Guide90
Enter the rate limit you want to set for multicast and
broadcast traffic. The limit should be greater than 1; the max
value is 100 packets per second (pps). Any traffic that falls
below this rate limit will always conform and be transmitted
to the appropriate destination.
The default rate limit setting is 100 packets per second.
Setting a rate limit burst determines how much traffic bursts
can be before all traffic exceeds the rate limit. This burst limit
allows intermittent bursts of traffic on a network above the
set rate limit.
The rate limit burst range is 1-150 packets per second. The
default rate limit burst setting is 150 packets per second.
Page 94
4
Configuring the Wireless Distribution System
Configuring the Wireless Distribution System
The Wireless Distribution System (WDS) allows you to connect multiple access
points. With WDS, access point
standardized way. This capability is critical in providing a seamless experience for
roaming clients and for managing multiple wireless networks. It can also simplify
the network infrastructure by reducing the amount of cabling required. You can
configure the access point in point-to-point or point-to-multipoint bridge mode
based on the number of links to connect.
In the point-to-point mode, the access point accepts client associations and
communicates with wireless clients and other repeaters. The access point
forwards all traffic meant for the other network over the tunnel that is established
between the access point
as a simple OSI layer 2 network device.
s communicate with one another without wires in a
s. The bridge does not add to the hop count. It functions
Wireless
In the point-to-multipoint bridge mode, one access point acts as the common link
between multiple access point
client associations and communicates with the clients and other repeaters. All
other access point
packets to the appropriate wireless bridge for routing purposes.
The access point can also act as a repeater. In this mode, the access point serves
as a connection between two access point
within cell range. When acting as a repeater, the access point does not have a
wired connection to the LAN and repeats signals by using the wireless connection.
No special configuration is required for the access point to function as a repeater,
and there are no repeater mode settings. Wireless clients can still connect to an
access point that is operating as a repeater.
To specify the details of traffic exchange from this access point to others, click the
WDS Bridge tab.
s associate only with the central access point that forwards the
s. In this mode, the central access point accepts
s that might be too far apart to be
91Cisco AP 541N Dual-band Single-radio Access Point Quick Start Guide
Page 95
Wireless
Configuring the Wireless Distribution System
Figure18Configuring WDS Bridge Settings
4
Before you configure WDS on the access point, note the following guidelines:
•When using WDS, be sure to configure WDS settings on both access points
participating in the WDS link.
•You can have only one WDS link between any pair of access points. That is,
a remote MAC address might appear only once on the WDS page for a
particular access point.
•Both access points participating in a WDS link must be on the same
wireless radio channel and use the same IEEE 802.11 mode. (See
Modifying Advanced Settings, page 79 for information on configuring the
Radio mode and channel.)
Cisco AP 541N Dual-band Single-radio Access Point Quick Start Guide92
Page 96
4
Wireless
Configuring the Wireless Distribution System
•When 802.11h is operational, setting up two WDS links can be difficult. See
Modifying Advanced Settings, page 79.
•If you use WPA encryption on the WDS link, VAP0 must use WPA Personal
or WPA Enterprise as the security mode.
To configure WDS on this access point, describe each remote access point
intended to receive and send information to this access point. For each destination
access point, configure the fields listed in Ta bl e 2 0.
Table 20WDS Bridge Settings
FieldDescription
Spanning Tree
Mode
Local Address
Remote Address
Encryption
Spanning Tree Protocol (STP) prevents switching loops. STP is
recommended if you configure WDS links.
Select Enabled to use STP
Select Disabled to turn off STP links (not recommended)
The MAC address for this access point.
The MAC address of the destination access point; the access
point on the other end of the WDS link to which data will be sent
and from which data will be received.
Click the drop-down arrow to the right of the Remote Address
field to see a list of all the available MAC addresses and their
associated SSIDs on the network. Select the appropriate MAC
address from the list.
NOTE: The SSID displayed in the drop-down list is the SSID of
the remote access point.
You can use no encryption, WEP, or WPA (PSK) on the WDS link.
If you are unconcerned about security issues on the WDS link,
you might decide not to set any type of encryption.
Alternatively, if you have security concerns you can choose
between Static WEP and WPA (PSK). In WPA (PSK) mode, the
access point uses WPA2-PSK with CCMP (AES) encryption
over the WDS link.
93Cisco AP 541N Dual-band Single-radio Access Point Quick Start Guide
NOTE: To configure WPA-PSK on any WDS link, VAP0 of the
selected wireless radio must be configured for WPA-PSK or
WPA-Enterprise.
Page 97
Wireless
Configuring the Wireless Distribution System
If you select None as your preferred WDS encryption option, you will not be asked
to fill in any more fields on the WDS page. All data transferred between the two
access point
NOTE To disable a WDS link, you must remove the value configured in the Remote
Address field.
s on the WDS link will be unencrypted.
WEP on WDS Links
Ta bl e 2 1 describes the additional fields that appear when you select WEP as the
encryption type.
4
Table 21WEP on WDS Links
FieldDescription
Encryption
WEP
Key Length
Key Type
Characters
Required
WEP Key
WEP
Select this option if you want to set WEP encryption on the
WDS link.
If WEP is enabled, specify the length of the WEP key:
64 bits
128 bits
If WEP is enabled, specify the WEP key type:
ASCII
Hex
The number of characters required in the WEP key. The field
updates automatically based on how you set Key Length and
Key Type.
Enter a string of characters. If you selected ASCII, enter any
combination of 0–9, a–z, and A–Z. If you selected HEX, enter
hexadecimal digits (any combination of 0–9 and a–f or A–F).
These are the RC4 encryption keys shared with the stations
using the access point.
Cisco AP 541N Dual-band Single-radio Access Point Quick Start Guide94
Page 98
4
Wireless
Configuring the Wireless Distribution System
WPA/PSK on WDS Links
Ta bl e 2 2 describes the additional fields that appear when you select WPA/PSK
as the encryption type.
NOTE To configure WPA-PSK on any WDS link, VAP0 of the selected wireless radio must
be configured for WPA-PSK or WPA-Enterprise.
Table 22WPA/PSK on WDS Links
FieldDescription
Encryption
SSID
Key
WPA (PSK)
Enter an appropriate name for the new WDS link you have
created. This SSID should be different from the other SSIDs
used by this access point. However, it is important that the
same SSID is also entered at the other end of the WDS link. If
this SSID is not the same for both access points on the WDS
link, they will not be able to communicate and exchange data.
The SSID can be any alphanumeric combination.
Enter a unique shared key for the WDS bridge. This unique
shared key must also be entered for the access point at the
other end of the WDS link. If this key is not the same for both
access points, they will not be able to communicate and
exchange data.
The WPA-PSK key is a string of at least 8 characters to a
maximum of 63 characters. Acceptable characters include
upper and lower case alphabetic letters, the numerics, and
special symbols such as @ and #.
NOTE After you configure the WDS settings, you must click Apply to apply the changes
and to save the settings. Changing some settings might cause the access point to
stop and restart system processes. If this happens, wireless clients will temporarily
lose connectivity. We recommend that you change access point settings when
WLAN traffic is low.
95Cisco AP 541N Dual-band Single-radio Access Point Quick Start Guide
Page 99
Wireless
Bandwidth Utilization
Bandwidth Utilization
You can set network utilization thresholds on the access point to maintain the
speed and performance of the wireless network as clients associate and
disassociate with the access point.
To configure load balancing and set limits and behavior to be triggered by a
specified utilization rate of the access point, click the Bandwidth Utilization tab
and update the fields shown in the following figure.
Figure19Configuring Bandwidth Utilization
4
Table 23Bandwidth Utilization
FieldDescription
Bandwidth
Utilization
Maximum
Utilization
Threshold
Cisco AP 541N Dual-band Single-radio Access Point Quick Start Guide96
Enable or disable bandwidth utilization:
To enable bandwidth utilization this access point, click Enable.
To disable bandwidth utilization on this access point, click
Disable.
Provide the percentage of network bandwidth utilization
allowed on the wireless radio before the access point stops
accepting new client associations.
The default is 0, which means that all new associations are
allowed regardless of the utilization rate.
Page 100
4
NOTE After you configure the bandwidth utilization settings, you must click Apply to apply
the changes and to save the settings. Changing some settings might cause the
access point to stop and restart system processes. If this happens, wireless clients
will temporarily lose connectivity. We recommend that you change access point
settings when WLAN traffic is low.
Configuring Quality of Service (QoS)
Quality of Service (QoS) provides you with the ability to specify parameters on
multiple queues for increased throughput and better performance of differentiated
wireless traffic like Voice-over-IP (VoIP), other types of audio, video, and
streaming media, as well as traditional IP data over the access point.
Wireless
Configuring Quality of Service (QoS)
Configuring QoS on the access point consists of setting parameters on existing
queues for different types of wireless traffic, and effectively specifying minimum
and maximum wait times (through Contention Windows) for transmission. The
settings described here apply to data transmission behavior on the access point
only, not to that of the client stations.
AP Enhanced Distributed Channel Access (EDCA) Parameters affect
traffic flowing from the access point to the client station.
Station Enhanced Distributed Channel Access (EDCA) Parameters
affect traffic flowing from the client station to the access point.
The default values for the access point and station EDCA parameters are those
suggested by the Wi-Fi Alliance in the WMM specification. In normal use these
values should not need to be changed. Changing these values will affect the QoS
provided.
To set up queues for QoS, click the QoS tab under the Services heading and
configure settings as described in Ta bl e 2 4.
97Cisco AP 541N Dual-band Single-radio Access Point Quick Start Guide
Loading...
+ hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.