Cisco 3200 Series Wireless MIC Software
Configuration Guide
June 2005
Corporate Headquarters
Cisco Systems, Inc.
170 West Tasman Drive
San Jose, CA 95134-1706
USA
http://www.cisco.com
Tel: 408 526-4000
800 553-NETS (6387)
Fax: 408 526-4100
Text Part Number: OL-7734-02
THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT NOTICE. ALL
STATEMENTS, INFORMATION, AND RECOMMENDATIONS IN THIS MANUAL ARE BELIEVED TO BE ACCURATE BUT ARE PRESENTED WITHOUT
WARRANTY OF ANY KIND, EXPRESS OR IMPLIED. USERS MUST TAKE FULL RESPONSIBILITY FOR THEIR APPLICATION OF ANY PRODUCTS.
THE SOFTWARE LICENSE AND LIMITED WARRANTY FOR THE ACCOMPANYING PRODUCT ARE SET FORTH IN THE INFORMATION PACKET THAT
SHIPPED WITH THE PRODUCT AND ARE INCORPORATED HEREIN BY THIS REFERENCE. IF YOU ARE UNABLE TO LOCATE THE SOFTWARE LICENSE
OR LIMITED WARRANTY, CONTACT YOUR CISCO REPRESENTATIVE FOR A COPY.
NOTWITHSTANDING ANY OTHER WARRANTY HEREIN, ALL DOCUMENT FILES AND SOFTWARE OF THESE SUPPLIERS ARE PROVIDED “AS IS” WITH
ALL FAULTS. CISCO AND THE ABOVE-NAMED SUPPLIERS DISCLAIM ALL WARRANTIES, EXPRESSED OR IMPLIED, INCLUDING, WITHOUT
LIMITATION, THOSE OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OR ARISING FROM A COURSE OF
DEALING, USAGE, OR TRADE PRACTICE.
IN NO EVENT SHALL CISCO OR ITS SUPPLIERS BE LIABLE FOR ANY INDIRECT, SPECIAL, CONSEQUENTIAL, OR INCIDENTAL DAMAGES, INCLUDING,
WITHOUT LIMITATION, LOST PROFITS OR LOSS OR DAMAGE TO DATA ARISING OUT OF THE USE OR INABILITY TO USE THIS MANUAL, EVEN IF CISCO
OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
CCIP, CCSP, the Cisco Arrow logo, the Cisco Powered Network mark, Cisco Unity, Follow Me Browsing, FormShare, and StackWise are trademarks of Cisco Systems, Inc.;
Changing the Way We Work, Live, Play, and Learn, and iQuick Study are service marks of Cisco Systems, Inc.; and Aironet, ASIST, BPX, Catalyst, CCDA, CCDP, CCIE, CCNA,
CCNP, Cisco, the Cisco Certified Internetwork Expert logo, Cisco IOS, the Cisco IOS logo, Cisco Press, Cisco Systems, Cisco Systems Capital, the Cisco Systems logo,
Empowering the Internet Generation, Enterprise/Solver, EtherChannel, EtherSwitch, Fast Step, GigaStack, Internet Quotient, IOS, IP/TV, iQ Expertise, the iQ logo, iQ Net
Readiness Scorecard, LightStream, MGX, MICA, the Networkers logo, Networking Academy, Network Registrar, Pack et , PIX, Post-Routing, Pre-Routing, RateMUX, Registrar,
ScriptShare, SlideCast, SMARTnet, StrataView Plus, Stratm, SwitchProbe, TeleRouter, The Fastest Way to Increase Your Internet Quotient, TransPath, and VCO are registered
trademarks of Cisco Systems, Inc. and/or its affiliates in the United States and certain other countries.
All other trademarks mentioned in this document or Website are the property of their respective owners. The use of the word partner does not imply a partnership relationship
between Cisco and any other company. (0401R)
Obtaining and Installing IPSU24
Using IPSU to Find the WMIC IP Address25
Using IPSU to Set the IP Address and SSID26
3Administering the WMIC2-1
Configuring a System Name and Prompt2-2
Configuring a System Name2-2
Managing DNS2-2
Default DNS Configuration2-3
Setting Up DNS2-3
Displaying the DNS Configuration2-4
Creating a Banner2-4
Default Banner Configuration2-4
Configuring a Message-of-the-Day Login Banner2-4
Configuring a Login Banner2-5
Managing the System Time and Date2-6
Understanding the System Clock 2-6
Understanding Network Time Protocol2-6
iv
Cisco 3200 Series Wireless MIC Software Configuration Guide
OL-7734-02
Configuring NTP2-9
Default NTP Configuration2-9
Configuring NTP Authentication2-9
Configuring NTP Associations2-11
Configuring NTP Broadcast Service2-12
Configuring NTP Access Restrictions2-14
Configuring the Source IP Address for NTP Packets2-16
Displaying the NTP Configuration2-16
Configuring Time and Date Manually2-17
Setting the System Clock2-17
Displaying the Time and Date Configuration2-17
Configuring the Time Zone 2-18
Configuring Summer Time (Daylight Saving Time)2-19
Protecting Access to Privileged EXEC Commands2-20
Setting or Changing a Static Enable Password2-21
Protecting Enable and Enable Secret Passwords with Encryption2-22
Configuring Username and Password Pairs2-24
Configuring Multiple Privilege Levels2-25
Setting the Privilege Level for a Command2-25
Logging Into and Exiting a Privilege Level2-26
Contents
Protecting the Wireless LAN2-26
Using VLANs2-26
Express Security Types2-27
Security Configuration Examples2-27
Configuring and Enabling RADIUS2-32
Understanding RADIUS2-32
RADIUS Operation2-33
Controlling WMIC Access with RADIUS2-34
Identifying the RADIUS Server Host 2-35
Configuring RADIUS Login Authentication2-37
Defining AAA Server Groups2-39
Configuring RADIUS Authorization for User Privileged Access and Network Services2-40
Starting RADIUS Accounting2-41
Configuring Settings for All RADIUS Servers2-42
Configuring the Bridge to Use Vendor-Specific RADIUS Attributes2-42
Configuring the Bridge for Vendor-Proprietary RADIUS Server Communication2-43
Displaying the RADIUS Configuration2-44
Controlling WMIC Access with TACACS+2-44
Understanding TACACS+2-45
OL-7734-02
Cisco 3200 Series Wireless MIC Software Configuration Guide
Root Bridge Without VLANs5-10
Non-Root Bridge Without VLANs5-11
Root Bridge with VLANs5-12
Non-Root Bridge with VLANs5-13
Displaying Spanning-Tree Status5-15
7Configuring WEP and WEP Features6-1
Understanding WEP6-2
Cisco 3200 Series Wireless MIC Software Configuration Guide
vii
Contents
Configuring Cipher Suites and WEP6-3
Creating WEP Keys6-3
WEP Key Restrictions6-4
Example WEP Key Setup6-4
Enabling Cipher Suites and WEP6-5
Matching Cipher Suites with WPA6-6
CHAPTER
CHAPTER
8Configuring Authentication Types7-1
Understanding Authentication Types7-2
Open Authentication to the WMIC7-2
Shared Key Authentication to the Bridge7-2
EAP Authentication to the Network7-3
Using CCKM for Authenticated Bridges7-5
Using WPA Key Management7-5
Configuring Authentication Types7-5
Default Authentication Settings7-6
Assigning Authentication Types to an SSID7-6
Configuring the Root Bridge to Interact with the WDS Device7-8
Configuring Additional WPA Settings7-9
Configuring Authentication Holdoffs, Timeouts, and Intervals7-10
Setting Up a Non-Root Bridge as a LEAP Client7-10
Matching Authentication Types on Root and Non-Root Bridges7-11
LEAP Example Configurations7-12
9Configuring WDS, Fast Secure Roaming, and Radio Management8-1
viii
Understanding WDS8-2
Role of the WDS Access Point8-2
Role of Access Points Using the WDS Access Point8-2
Understanding Fast Secure Roaming8-3
Understanding Radio Management8-4
Configuring WDS and Fast Secure Roaming8-5
Guidelines for WDS8-5
Requirements for WDS and Fast Secure Roaming8-5
Configuring the WMIC to use the WDS Access Point8-5
Configuring the Authentication Server to Support Fast Secure Roaming8-6
CLI Commands to Enable the WDS Server8-9
CLI Commands to Enable the Root Device8-10
dot11 interface speed Command8-11
Viewing WDS Information8-12
Cisco 3200 Series Wireless MIC Software Configuration Guide
OL-7734-02
Using Debug Messages8-13
Contents
CHAPTER
CHAPTER
10Configuring VLANs9-1
Understanding VLANs9-2
Related Documents9-3
Incorporating Wireless Bridges into VLANs9-4
Configuring VLANs9-4
Configuring a VLAN9-4
Viewing VLANs Configured on the WMIC9-7
11Configuring QoS in a Wireless Environment10-1
Understanding QoS for Wireless LANs10-2
QoS for Wireless LANs Versus QoS on Wired LANs10-2
Impact of QoS on a Wireless LAN10-2
Precedence of QoS Settings10-3
Configuring QoS10-3
Configuration Guidelines10-4
Configuring QoS Using the Web-Browser Interface10-4
Adjusting Radio Access Category Definitions10-7
CW-min and CW-max Settings for Point-to-Point and Point-to-Multipoint Bridge Links10-8
CHAPTER
QoS Configuration Examples10-9
Giving Priority to Voice Traffic10-9
Giving Priority to Video Traffic10-10
QoS Example Configuration for VLAN10-11
QoS Example of IP DSCP and IP Precedence10-12
12Configuring Filters11-1
Understanding Filters11-2
Configuring Filters Using the CLI11-2
Configuring Filters Using the Web-Browser Interface11-2
Configuring and Enabling MAC Address Filters11-3
Creating a MAC Address Filter11-4
Configuring and Enabling IP Filters11-5
Creating an IP Filter11-6
Configuring and Enabling Ethertype Filters11-7
Creating an Ethertype Filter11-8
OL-7734-02
Cisco 3200 Series Wireless MIC Software Configuration Guide
ix
Contents
CHAPTER
CHAPTER
13Configuring CDP12-1
Understanding CDP12-2
Configuring CDP12-2
Default CDP Configuration12-2
Configuring the CDP Characteristics12-3
Disabling and Enabling CDP12-3
Disabling and Enabling CDP on an Interface12-4
Monitoring and Maintaining CDP12-5
14Configuring SNMP13-1
Understanding SNMP13-2
SNMP Versions13-2
SNMP Manager Functions13-3
SNMP Agent Functions13-3
SNMP Community Strings13-4
Using SNMP to Access MIB Variables 13-4
Configuring SNMP13-5
Default SNMP Configuration13-5
Enabling the SNMP Agent13-5
Configuring Community Strings13-5
Configuring Trap Managers and Enabling Traps13-7
Setting the Agent Contact and Location Information13-10
Using the snmp-server view Command13-10
SNMP Examples13-10
CHAPTER
x
Displaying SNMP Status13-11
15Managing Firmware and Configurations14-1
Working with the Flash File System14-2
Displaying Available File Systems14-2
Setting the Default File System14-3
Displaying Information About Files on a File System14-3
Changing Directories and Displaying the Working Directory14-4
Creating and Removing Directories14-4
Copying Files14-5
Deleting Files14-5
Creating, Displaying, and Extracting tar Files14-6
Creating a tar File14-6
Displaying the Contents of a tar File14-7
Extracting a tar File14-7
Cisco 3200 Series Wireless MIC Software Configuration Guide
OL-7734-02
Displaying the Contents of a File14-8
Working with Configuration Files14-8
Guidelines for Creating and Using Configuration Files14-9
Configuration File Types and Location14-9
Creating a Configuration File by Using a Text Editor14-10
Copying Configuration Files by Using TFTP14-10
Preparing to Download or Upload a Configuration File by Using TFTP14-10
Downloading the Configuration File by Using TFTP14-11
Uploading the Configuration File by Using TFTP14-11
Copying Configuration Files by Using FTP14-12
Preparing to Download or Upload a Configuration File by Using FTP14-13
Downloading a Configuration File by Using FTP14-13
Uploading a Configuration File by Using FTP14-14
Copying Configuration Files by Using RCP14-15
Preparing to Download or Upload a Configuration File by Using RCP14-16
Downloading a Configuration File by Using RCP14-16
Uploading a Configuration File by Using RCP14-17
Clearing Configuration Information14-18
Deleting a Stored Configuration File14-18
Contents
Working with Software Images14-19
Image Location on the WMIC14-19
tar File Format of Images on a Server or Cisco.com14-19
Copying Image Files by Using TFTP14-20
Preparing to Download or Upload an Image File by Using TFTP14-20
Downloading an Image File by Using TFTP14-21
Uploading an Image File by Using TFTP14-22
Copying Image Files by Using FTP14-23
Preparing to Download or Upload an Image File by Using FTP14-23
Downloading an Image File by Using FTP14-24
Uploading an Image File by Using FTP14-26
Copying Image Files by Using RCP14-27
Preparing to Download or Upload an Image File by Using RCP14-27
Downloading an Image File by Using RCP14-29
Uploading an Image File by Using RCP14-31
Reloading the Image Using the Web Browser Interface14-32
Cisco 3200 Series Wireless MIC Software Configuration Guide
xi
Contents
CHAPTER
CHAPTER
16Configuring System Message Logging15-1
Understanding System Message Logging15-2
Configuring System Message Logging15-2
System Log Message Format15-2
Default System Message Logging Configuration15-4
Disabling and Enabling Message Logging15-4
Setting the Message Display Destination Device15-5
Enabling and Disabling Timestamps on Log Messages15-6
Enabling and Disabling Sequence Numbers in Log Messages15-6
Defining the Message Severity Level15-7
Limiting Syslog Messages Sent to the History Table and to SNMP15-8
Setting a Logging Rate Limit15-9
Configuring UNIX Syslog Servers15-10
Logging Messages to a UNIX Syslog Daemon15-10
Configuring the UNIX System Logging Facility15-10
Displaying the Logging Configuration15-12
17Wireless Device Troubleshooting16-1
APPENDIX
Checking the LED Indicators16-2
Checking Basic Settings16-3
SSID16-3
WEP Keys16-3
Security Settings16-3
Resetting to the Default Configuration16-4
Using the Web Browser Interface16-4
Using the CLI16-5
Using the CLI16-7
Obtaining the Image File16-9
Obtaining TFTP Server Software16-9
Reloading the Bootloader Image16-10
AConnecting to the Cisco 3200 Series Router and Using the Command-Line InterfaceA-1
xii
Before You StartA-2
Resetting the WMIC to the Default SettingsA-2
Cisco 3200 Series Wireless MIC Software Configuration Guide
OL-7734-02
Assigning an IP AddressA-3
IOS Command ModesA-4
Getting HelpA-5
Abbreviating CommandsA-5
Using no and default Forms of CommandsA-6
Understanding CLI MessagesA-6
Using Command HistoryA-6
Changing the Command History Buffer SizeA-7
Recalling CommandsA-7
Disabling the Command History FeatureA-7
Using Editing FeaturesA-8
Enabling and Disabling Editing FeaturesA-8
Editing Commands Through KeystrokesA-8
Editing Command Lines that WrapA-9
Contents
APPENDIX
APPENDIX
APPENDIX
APPENDIX
Searching and Filtering the Output of show and more CommandsA-10
BChannels and Antenna SettingsB-1
ChannelsB-2
IEEE 802.11g (2.4-GHz Band)B-2
4.9-GHz BandB-3
Maximum Power Levels and Antenna GainsB-4
IEEE 802.11g (2.4-GHz Band)B-4
CProtocol FiltersC-1
DSupported MIBsD-1
MIB ListD-1
Using FTP to Access the MIB FilesD-2
EError and Event MessagesE-1
OL-7734-02
Cisco 3200 Series Wireless MIC Software Configuration Guide
xiii
Contents
xiv
Cisco 3200 Series Wireless MIC Software Configuration Guide
OL-7734-02
Audience
Purpose
Preface
This guide is for the networking professional who installs and manages Cisco 3200 Series Mobile
Access Routers. To use this guide, you should have experience working with the Cisco IOS and be
familiar with the concepts and terminology of wireless local area networks.
This guide provides the information you need to install and configure your bridge. This guide provides
procedures for using the IOS commands that have been created or changed for use with the WMIC. It
does not provide detailed information about these commands. For detailed information about these
commands, refer to the IOS documentation set available from the Cisco.com home page at Service and Support > Technical Documents. On the Cisco Product Documentation home page, select Release 12.3
from the Cisco IOS Software drop-down list.
This guide includes an overview of the web-based interface, which contains all the funtionality of the
command-line interface (CLI). This guide does not provide field-level descriptions of the web-based
windows nor does it provide the procedures for configuring the WMIC from the web-based interface.
For all window descriptions and procedures, refer to the online help, which is available from the Help
buttons on the web-based interface pages.
Organization
This guide is organized into these chapters:
Chapter 1, “Overview,” lists the software and hardware features of the WMIC and describes the WMIC’s
role in your network.
Chapter 2, “Configuring the WMIC for the First Time,” describes how to configure basic settings on a
Wireless Mobile Interface Card (WMIC) for the first time.
Chapter 3, “Administering the WMIC,” describes how to perform one-time operations to administer your
WMIC, such as preventing unauthorized access to the device, setting the system date and time, and
setting the system name and prompt.
Chapter 4, “Configuring Radio Settings,” describes how to configure settings for the WMIC radio such
as the role in the radio network, data rates, transmit power, channel settings, and others.
OL-7734-02
Cisco 3200 Series Wireless MIC Software Configuration Guide
xv
Organization
Preface
Chapter 5, “Configuring SSIDs,” describes how to configure and manage multiple service set identifiers
(SSIDs). You can configure up to 16 SSIDs and assign different configuration settings to each SSID.
Chapter 6, “Configuring Spanning Tree Protocol,” descibes how to configure Spanning Tree Protocol
(STP). STP prevents data loops in your network.
Chapter 7, “Configuring WEP and WEP Features,” describes how to configure the cipher suites required
to use authenticated key management, Wired Equivalent Privacy (WEP), and WEP features including
MIC, CMIC, TKIP, CKIP, and broadcast key rotation.
Chapter 8, “Configuring Authentication Types,” describes how to configure authentication types. Client
devices use these authentication methods to join your network.
Chapter 9, “Configuring WDS, Fast Secure Roaming, and Radio Management,” describes Wireless
Domain Services (WDS), fast secure roaming, and radio management features. The chapter also
provides instructions for configuring the WMIC to register with a WDS access point.
Chapter 10, “Configuring VLANs,” describes how to configure your WMIC to interoperate with the
VLANs set up on your wired LAN.
Chapter 11, “Configuring QoS in a Wireless Environment,” describes how to configure quality of service
(QoS) on your WMIC. With this feature, you can provide preferential treatment to certain traffic at the
expense of others.
Chapter 12, “Configuring Filters,” describes how to configure and manage MAC address, IP, and
Ethertype filters on the WMICWMIC by using the web-browser interface.
Chapter 13, “Configuring CDP,” describes how to configure Cisco Discovery Protocol (CDP) on your
WMIC. CDP is a device-discovery protocol that runs on all Cisco network equipment.
Chapter 14, “Configuring SNMP,” describes how to configure the Simple Network Management
Protocol (SNMP) on your WMIC.
Chapter 15, “Managing Firmware and Configurations,” describes how to manipulate the Flash file
system, how to copy configuration files, and how to archive (upload and download) software images.
Chapter 16, “Configuring System Message Logging,” describes how to configure system message
Appendix E, “Error and Event Messages,” lists the CLI error and event messages and provides an
explanation and recommended action for each message.
xvi
Cisco 3200 Series Wireless MIC Software Configuration Guide
OL-7734-02
Preface
Conventions
This publication uses these conventions to convey instructions and information:
Command descriptions use these conventions:
Interactive examples use these conventions:
Notes, cautions, and timesavers use these conventions and symbols:
Conventions
• Commands and keywords are in boldface text.
• Arguments for which you supply values are in italic.
• Square brackets ([ ]) mean optional elements.
• Braces ({ }) group required choices, and vertical bars ( | ) separate the alternative elements.
• Braces and vertical bars within square brackets ([{ | }]) mean a required choice within an optional
element.
• Terminal sessions and system displays are in screen font.
• Information you enter is in boldface screen font.
• Non printing characters, such as passwords or tabs, are in angle brackets (< >).
TipMeans the following will help you solve a problem. The tips information might not be troubleshooting
NoteMeans reader take note. Notes contain helpful suggestions or references to materials not contained in
CautionMeans reader be careful. In this situation, you might do something that could result equipment damage
Warning
Waarschuwing
or even an action, but could be useful information.
this manual.
or loss of data.
This warning symbol means danger. You are in a situation that could cause bodily injury. Before you
work on any equipment, be aware of the hazards involved with electrical circuitry and be familiar
with standard practices for preventing accidents. (To see translations of the warnings that appear
in this publication, refer to the appendix “Translated Safety Warnings.”)
Dit waarschuwingssymbool betekent gevaar. U verkeert in een situatie die lichamelijk letsel kan
veroorzaken. Voordat u aan enige apparatuur gaat werken, dient u zich bewust te zijn van de bij
elektrische schakelingen betrokken risico’s en dient u op de hoogte te zijn van standaard
maatregelen om ongelukken te voorkomen. (Voor vertalingen van de waarschuwingen die in deze
publicatie verschijnen, kunt u het aanhangsel “Translated Safety Warnings” (Vertalingen van
veiligheidsvoorschriften) raadplegen.)
OL-7734-02
Cisco 3200 Series Wireless MIC Software Configuration Guide
xvii
Conventions
Preface
Varoitus
Attention
Warnung
Avvertenza
Tämä varoitusmerkki merkitsee vaaraa. Olet tilanteessa, joka voi johtaa ruumiinvammaan. Ennen
kuin työskentelet minkään laitteiston parissa, ota selvää sähkökytkentöihin liittyvistä vaaroista ja
tavanomaisista onnettomuuksien ehkäisykeinoista. (Tässä julkaisussa esiintyvien varoitusten
käännökset löydät liitteestä "Translated Safety Warnings" (käännetyt turvallisuutta koskevat
varoitukset).)
Ce symbole d’avertissement indique un danger. Vous vous trouvez dans une situation pouvant
entraîner des blessures. Avant d’accéder à cet équipement, soyez conscient des dangers posés par
les circuits électriques et familiarisez-vous avec les procédures courantes de prévention des
accidents. Pour obtenir les traductions des mises en garde figurant dans cette publication, veuillez
consulter l’annexe intitulée « Translated Safety Warnings » (Traduction des avis de sécurité).
Dieses Warnsymbol bedeutet Gefahr. Sie befinden sich in einer Situation, die zu einer
Körperverletzung führen könnte. Bevor Sie mit der Arbeit an irgendeinem Gerät beginnen, seien Sie
sich der mit elektrischen Stromkreisen verbundenen Gefahren und der Standardpraktiken zur
Vermeidung von Unfällen bewußt. (Übersetzungen der in dieser Veröffentlichung enthaltenen
Warnhinweise finden Sie im Anhang mit dem Titel “Translated Safety Warnings” (Übersetzung der
Warnhinweise).)
Questo simbolo di avvertenza indica un pericolo. Si è in una situazione che può causare infortuni.
Prima di lavorare su qualsiasi apparecchiatura, occorre conoscere i pericoli relativi ai circuiti
elettrici ed essere al corrente delle pratiche standard per la prevenzione di incidenti. La traduzione
delle avvertenze riportate in questa pubblicazione si trova nell’appendice, “Translated Safety
Warnings” (Traduzione delle avvertenze di sicurezza).
Advarsel
Aviso
¡Advertencia!
Varning!
Dette varselsymbolet betyr fare. Du befinner deg i en situasjon som kan føre til personskade. Før du
utfører arbeid på utstyr, må du være oppmerksom på de faremomentene som elektriske kretser
innebærer, samt gjøre deg kjent med vanlig praksis når det gjelder å unngå ulykker. (Hvis du vil se
oversettelser av de advarslene som finnes i denne publikasjonen, kan du se i vedlegget "Translated
Safety Warnings" [Oversatte sikkerhetsadvarsler].)
Este símbolo de aviso indica perigo. Encontra-se numa situação que lhe poderá causar danos
fisicos. Antes de começar a trabalhar com qualquer equipamento, familiarize-se com os perigos
relacionados com circuitos eléctricos, e com quaisquer práticas comuns que possam prevenir
possíveis acidentes. (Para ver as traduções dos avisos que constam desta publicação, consulte o
apêndice “Translated Safety Warnings” - “Traduções dos Avisos de Segurança”).
Este símbolo de aviso significa peligro. Existe riesgo para su integridad física. Antes de manipular
cualquier equipo, considerar los riesgos que entraña la corriente eléctrica y familiarizarse con los
procedimientos estándar de prevención de accidentes. (Para ver traducciones de las advertencias
que aparecen en esta publicación, consultar el apéndice titulado “Translated Safety Warnings.”)
Denna varningssymbol signalerar fara. Du befinner dig i en situation som kan leda till personskada.
Innan du utför arbete på någon utrustning måste du vara medveten om farorna med elkretsar och
känna till vanligt förfarande för att förebygga skador. (Se förklaringar av de varningar som
förekommer i denna publikation i appendix "Translated Safety Warnings" [Översatta
säkerhetsvarningar].)
xviii
Cisco 3200 Series Wireless MIC Software Configuration Guide
OL-7734-02
Preface
Related Documentation
You can access these documents on the Documentation page on Cisco Connection Online (CCO) at
www.cisco.com. The following documentation is available at the
• Release Notes for the Cisco 3200 Series Mobile Access Routers—Provides information on accessing
documentation and technical assistance for the Cisco 3200 Series Mobile Access Router.
• Cisco IOS Command Reference for Cisco Access Points and Bridges
commands for the radio ports provided on the Wireless Mobile Interface Card (WMIC).
• Cisco 3200 Series Wireless MIC Software Configuration Guide
IOS commands to configure the Wireless Mobile Interface Card (WMIC).
• Configuration Guide for the Cisco 3200 Series Mobile Access Router
using the IOS commands to configure assembled Cisco 3200 Series routers.
• Cisco 3200 Series Mobile Access Router Hardware Reference
descriptions of the Cisco MIC I/O cards found in Cisco 3200 Series routers.
• Cisco 3200 Series Mobile Access Router Reference Sell Document
sell program and components for the Cisco 3200 Series router.
The Release Notes for the Cisco 3250 Mobile Router lists the enhancements to and caveats for Cisco IOS
releases as they relate to the Cisco 3200 Series router can be found at:
http://www.cisco.com/en/US/products/sw/iosswrel/products_ios_cisco_ios_software_releases.html or
This feature adds support for RFC 2006 Set operations and security violation traps. For specifications,
see RFC 2006, The Definitions of Managed Objects for IP Mobility Support Using SMIv2.
For information about using Cisco IOS software to configure SNMP, refer to the following documents:
• The “Configuring SNMP Support” chapter of the Cisco IOS Configuration Fundamentals
Configuration Guide, Release 12.2
• The “SNMP Commands” chapter of the Cisco IOS Configuration Fundamentals Command
Reference, Release 12.2
For information about using Cisco IOS software to configure SNMP MIB features, refer to the
appropriate documentation for your network management system.
For information on configuring Mobile IP using Cisco IOS software, refer to the following documents:
• The “Configuring Mobile IP” chapter of the Cisco IOS IP Configuration Guide, Release 12.2
• The “Mobile IP Commands” chapter of the Cisco IOS IP Command Reference, Volume 1 of 3:
Addressing and Services, Release 12.2
Related documents from the Cisco TAC Web pages include:
Cisco 3200 Series Wireless MIC Software Configuration Guide
xix
Related Documentation
Obtaining Documentation
Cisco documentation and additional literature are available on Cisco.com. Cisco also provides several
ways to obtain technical assistance and other technical resources. These sections explain how to obtain
technical information from Cisco Systems.
Cisco.com
You can access the Cisco website at this URL:
http://www.cisco.com
You can access international Cisco websites at this URL:
• Nonregistered Cisco.com users can order documentation through a local account representative by
calling Cisco Systems Corporate Headquarters (California, USA) at 408 526-7208 or, elsewhere in
North America, by calling 1 800 553-NETS (6387).
Documentation Feedback
You can send comments about technical documentation to bug-doc@cisco.com.
You can submit comments by using the response card (if present) behind the front cover of your
document or by writing to the following address:
Cisco Systems
Attn: Customer Document Ordering
170 West Tasman Drive
San Jose, CA 95134-9883
We appreciate your comments.
Tools and Web Sites
If you are registered Cisco Direct Customer, you can access the following web sites:
IOS Command Lookup—A search engine dedicated to finding information on Cisco IOS commands in
the Cisco IOS Command Reference, Cisco IOS Configuration Guide, Catalyst Command Reference, and
PIX Firewall Command Reference.
Bug Toolkit—Searches for known bugs based on software version, feature set and keywords. The
resulting matrix shows when each bug was integrated, or fixed if applicable.
Information about Cisco products, technologies, and network solutions is available from various online
and printed sources.
• Cisco Marketplace provides a variety of Cisco books, reference guides, and logo merchandise. Visit
Cisco Marketplace, the company store, at this URL:
http://www.cisco.com/go/marketplace/
• The Cisco Product Catalog describes the networking products offered by Cisco Systems, as well as
ordering and customer support services. Access the Cisco Product Catalog at this URL:
http://cisco.com/univercd/cc/td/doc/pcat/
Related Documentation
• Cisco Press publishes a wide range of general networking, training and certification titles. Both new
and experienced users will benefit from these publications. For current Cisco Press titles and other
information, go to Cisco Press at this URL:
http://www.ciscopress.com
• Pack et magazine is the Cisco Systems technical user magazine for maximizing Internet and
networking investments. Each quarter, Packet delivers coverage of the latest industry trends,
technology breakthroughs, and Cisco products and solutions, as well as network deployment and
troubleshooting tips, configuration examples, customer case studies, certification and training
information, and links to scores of in-depth online resources. You can access Packet magazine at
this URL:
http://www.cisco.com/packet
• iQ Magazine is the quarterly publication from Cisco Systems designed to help growing companies
learn how they can use technology to increase revenue, streamline their business, and expand
services. The publication identifies the challenges facing these companies and the technologies to
help solve them, using real-world case studies and business strategies to help readers make sound
technology investment decisions. You can access iQ Magazine at this URL:
http://www.cisco.com/go/iqmagazine
• Internet Protocol Journal is a quarterly journal published by Cisco Systems for engineering
professionals involved in designing, developing, and operating public and private internets and
intranets. You can access the Internet Protocol Journal at this URL:
http://www.cisco.com/ipj
OL-7734-02
• World-class networking training is available from Cisco. You can view current offerings at
this URL:
http://www.cisco.com/en/US/learning/index.html
Cisco 3200 Series Wireless MIC Software Configuration Guide
xxi
Cisco 3200 Documentation CD
Cisco 3200 Documentation CD
The Cisco 3200 Series Router Documentation CD contains the technical publications for the
Cisco 3200 Series Mobile Access Router. To view the documentation requires Acrobat Reader 4.0 or
higher.
After the CD is inserted in the CD ROM drive and recognized by your PC, do the following:
Step 1Access the root directory CD drive.
Step 2Double click the StartHere.htm file.
System Requirements for the CD
ProcessorPentium 150 MHz or faster recommended
PC Operating SystemMicrosoft Windows 95
Microsoft Windows 98
Microsoft Windows ME
Microsoft Windows XP
Microsoft Windows NT 4.0
Microsoft Windows 2000
Memory64-MB DRAM
Drives4x CD-ROM drive
MonitorColor monitor capable of 800 x 600 pixel
resolution
SoftwareAdobe Acrobat Reader 4.0 or later
Preface
Printing Documents from the CD
To print a document:
Step 1Display the document in Acrobat.
Step 2Click the Printer icon on the Acrobat toolbar.
The Windows Print Dialog box appears.
Step 3Select your default printer, and click OK.
Cisco 3200 Series Wireless MIC Software Configuration Guide
xxii
OL-7734-02
Preface
Obtaining Technical Assistance
For all customers, partners, resellers, and distributors who hold valid Cisco service contracts, the Cisco
Technical Assistance Center (TAC) provides 24-hour-a-day, award-winning technical support services,
online and over the phone. Cisco.com features the Cisco TAC website as an online starting point for
technical assistance. If you do not hold a valid Cisco service contract, please contact your reseller.
Cisco TAC Website
The Cisco TAC website provides online documents and tools for troubleshooting and resolving technical
issues with Cisco products and technologies. The Cisco TAC website is available 24 hours a day, 365
days a year. The Cisco TAC website is located at this URL:
http://www.cisco.com/tac
Accessing all the tools on the Cisco TAC website requires a Cisco.com user ID and password. If you
have a valid service contract but do not have a login ID or password, register at this URL:
http://tools.cisco.com/RPF/register/register.do
Obtaining Technical Assistance
Opening a TAC Case
Using the online TAC Case Open Tool is the fastest way to open P3 and P4 cases. (P3 and P4 cases are
those in which your network is minimally impaired or for which you require product information.) After
you describe your situation, the TAC Case Open Tool automatically recommends resources for an
immediate solution. If your issue is not resolved using the recommended resources, your case will be
assigned to a Cisco TAC engineer. The online TAC Case Open Tool is located at this URL:
http://www.cisco.com/tac/caseopen
For P1 or P2 cases (P1 and P2 cases are those in which your production network is down or severely
degraded) or if you do not have Internet access, contact Cisco TAC by telephone. Cisco TAC engineers
are assigned immediately to P1 and P2 cases to help keep your business operations running smoothly.
To open a case by telephone, use one of the following numbers:
To ensure that all cases are reported in a standard format, Cisco has established case priority definitions.
Priority 1 (P1)—Your network is “down” or there is a critical impact to your business operations. You
and Cisco will commit all necessary resources around the clock to resolve the situation.
OL-7734-02
Priority 2 (P2)—Operation of an existing network is severely degraded, or significant aspects of your
business operation are negatively affected by inadequate performance of Cisco products. You and Cisco
will commit full-time resources during normal business hours to resolve the situation.
Cisco 3200 Series Wireless MIC Software Configuration Guide
xxiii
Obtaining Additional Publications and Information
Priority 3 (P3)—Operational performance of your network is impaired, but most business operations
remain functional. You and Cisco will commit resources during normal business hours to restore service
to satisfactory levels.
Priority 4 (P4)—You require information or assistance with Cisco product capabilities, installation, or
configuration. There is little or no effect on your business operations.
Obtaining Additional Publications and Information
Information about Cisco products, technologies, and network solutions is available from various online
and printed sources.
• Cisco Marketplace provides a variety of Cisco books, reference guides, and logo merchandise. Go
to this URL to visit the company store:
http://www.cisco.com/go/marketplace/
• The Cisco Product Catalog describes the networking products offered by Cisco Systems, as well as
ordering and customer support services. Access the Cisco Product Catalog at this URL:
http://cisco.com/univercd/cc/td/doc/pcat/
• Cisco Press publishes a wide range of general networking, training and certification titles. Both new
and experienced users will benefit from these publications. For current Cisco Press titles and other
information, go to Cisco Press online at this URL:
Preface
http://www.ciscopress.com
• Pack et magazine is the Cisco quarterly publication that provides the latest networking trends,
technology breakthroughs, and Cisco products and solutions to help industry professionals get the
most from their networking investment. Included are networking deployment and troubleshooting
tips, configuration examples, customer case studies, tutorials and training, certification information,
and links to numerous in-depth online resources. You can access Packet magazine at this URL:
http://www.cisco.com/packet
• iQ Magazine is the Cisco bimonthly publication that delivers the latest information about Internet
business strategies for executives. You can access iQ Magazine at this URL:
http://www.cisco.com/go/iqmagazine
• Internet Protocol Journal is a quarterly journal published by Cisco Systems for engineering
professionals involved in designing, developing, and operating public and private internets and
intranets. You can access the Internet Protocol Journal at this URL:
http://www.cisco.com/ipj
• Training—Cisco offers world-class networking training. Current offerings in network training are
listed at this URL:
http://www.cisco.com/en/US/learning/index.html
xxiv
Cisco 3200 Series Wireless MIC Software Configuration Guide
OL-7734-02
CHA P T E R
1
Overview
The Cisco Wireless Mobile Interface Card (WMIC) provides wireless connectivity for the
Cisco 3200 Series Mobile Access Router. WMICs operate in the 2.4-GHz or 4.9-GHz bands and
conform to the 802.11 standards.
This chapter provides information on the following topics:
• Understanding the Cisco Mobile Wireless Network
• Features
• Management Options
OL-7734-02
Cisco 3200 Series Wireless MIC Software Configuration Guide
1-1
Understanding the Cisco Mobile Wireless Network
Understanding the Cisco Mobile Wireless Network
This section provides basic wireless network configuration descriptions and an example of a metro
mobile network. The 2.4-GHz WMIC has a fixed channel spacing and bandwidth of 20-MHz. The
4.9-GHz WMIC can be configured for different channel spacings or bandwidths of 5-MHz, 10-MHz, or
20-MHz. These channels are designed to be non overlapping and non-interfering.
Network Configuration Descriptions
This section describes the role of a Cisco 3200 Series Mobile Access Router in common wireless
configurations: access point mode, point-to-point bridging, point-to-multipoint bridging, redundant
bridging, and workgroup bridge mode.
Root Bridge–accepts associations from workgroup bridges, non-root bridges, and clients
Root Access Point–accepts assocations from workgroup bridge and clients
Workgroup Bridge–associates to root access points or root bridges
Non-Root Bridge–associates to root bridges
Chapter 1 Overview
Access Point Mode
You can configure the WMIC as an access point. In the access point mode, the WMIC accepts
associations from local client devices. See Chapter 4, “Configuring Radio Settings,” for instructions on
configuring the WMIC as an access point.
Figure 1-1 shows a typical scenario where the WMIC functions as an access point.
Figure 1-1Access Point Mode
Point-to-Point Bridging
In a point-to-point configuration, a non-root bridge associates to a root bridge. The WMIC listens for
another bridge. If it does not recognize another bridge, the WMIC becomes a root bridge. If it recognizes
another bridge, it becomes a non-root bridge associated to the bridge it recognizes.
Cisco 3200
127919
1-2
Figure 1-2 shows bridges in a point-to-point configuration.
Cisco 3200 Series Wireless MIC Software Configuration Guide
OL-7734-02
Chapter 1 Overview
Figure 1-2Point-to-Point Bridge Configuration
Point-to-Multipoint Bridging
In a point-to-multipoint configuration, two or more non-root bridges associate to a root bridge. Up to 17
non-root bridges can associate to a root bridge, but the non-root bridges must share the available
bandwidth.
Figure 1-3 shows bridges in a point-to-multipoint configuration.
Figure 1-3Point-to-Multipoint Configuration
Understanding the Cisco Mobile Wireless Network
127920
OL-7734-02
117021
Cisco 3200 Series Wireless MIC Software Configuration Guide
1-3
Features
Redundant Bridging
You can set up two pairs of bridges to add redundancy or load balancing to the bridge link. The bridges
must use non-adjacent, non-overlapping radio channels to prevent interference, and they must use
Spanning Tree Protocol (STP) to prevent loops. (STP is disabled by default. See Chapter 6, “Configuring
Spanning Tree Protocol,” for instructions on configuring STP.)
Figure 1-4 shows two pairs of redundant bridges.
Figure 1-4Redundant Bridge Configuration
Chapter 1 Overview
Cisco 3200
Workgroup Bridge Mode
You can configure the WMIC to function as a workgroup bridge. Figure 1-5 shows a typical scenario
where the WMIC functions as a workgroup bridge. See Chapter 4, “Configuring Radio Settings,” for
instructions on how to configure the WMIC as a workgroup bridge.
Figure 1-5Workgroup Bridge Mode
Features
Cisco wireless devices running Cisco IOS offer these software features:
• VLANs—Allow VLAN trunking on both wireless and Ethernet interfaces.
• QoS—Use this feature to support quality of service for prioritizing traffic on the wireless interface.
127922
Cisco 3200
127923
1-4
• RADIUS Accounting—Enable accounting on the WMIC to send accounting data about wireless
client devices to a RADIUS server on your network.
• TACACS+ administrator authentication—Enable TACACS+ for server-based, detailed accounting
information and flexible administrative control over authentication and authorization processes. It
provides secure, centralized validation of administrators attempting to gain access to your WMIC.
Cisco 3200 Series Wireless MIC Software Configuration Guide
OL-7734-02
Chapter 1 Overview
NoteThe 4.9-GHz WMIC does not support CKIP and CMIC encryption; however, The 2.4-GHz WMIC does
Features
• Enhanced security—Enable three advanced security features to protect against sophisticated attacks
on your wireless network's WEP keys: Message Integrity Check (MIC) and WEP key hashing.
Enhanced security for WPA/TKIP is also available.
• Enhanced authentication services—Set up non-root bridges or workgroup bridges to authenticate to
the network like other wireless client devices. After a network username and password for the
non-root bridge or workgroup bridge are set, it authenticates to the network using Cisco Light
Extensible Authentication Protocol (LEAP), and receives and uses dynamic WEP keys.
• Advanced Encryption Standard (AES) (only available on the 4.9-GHz WMIC)—This feature
supports Advanced Encryption Standard-Counter Mode with Cipher Block Chaining Message
Authentication Code Protocol (AES-CCMP). AES-CCMP is required for Wi-Fi Protected Access 2
(WPA2) and IEEE 802.11i wireless LAN security.
• Enhanced authentication for Cisco Centralized Key Management (CCKM).
• Fast, secure roaming of client devices, and radio management through wireless domain services
(WDS) (See the “Configuring WDS, Fast Secure Roaming, and Radio Management” chapter for
more information.
support CKIP and CMIC encryption.
The key differences between the 2.4-GHz WMIC and the 4.9-GHz WMIC are shown in Tab le 1-1.
Table 1-1Differences Between the 2.4-GHz WMIC and the 4.9-GHz WMIC
Feature2.4-GHz WMIC4.9-GHz WMICComment
Cookie and
C3201C32XX
Banner
Frequency 2.4 GHz4.9 GHz
Data rates802.11b data rates are
1 Mbps, 2 Mbps, 5.5 Mbps
and 11 Mbps.
802.11g, data rates are
1 Mbps, 2 Mbps, 5.5 Mbps,
6 Mbps, 9 Mbps, 11 Mbps,
12 Mbps, 18 Mbps, 24 Mbps,
36 Mbps, 48 Mbps, and
54 Mbps
20-MHz base band. 6 Mbps,
9 Mbps, 12 Mbps, 24 Mbps,
36 Mbps, 48 Mbps, and
56 Mbps.
10-MHz base band. Data
rates are 3 Mbps, 4.5 Mbps,
6 Mbps, 9 Mbps, 12 Mbps,
18 Mbps, 24 Mbps, and
27 Mbps.
The dot11 interface speed command
manages data rates and only applies to the
4.9-GHz WMIC.
5-MHz base band. Data
rates are 1.5 Mbps,
2.25 Mbps, 3 Mbps,
4.5 Mbps, 6 Mbps, 9 Mbps,
12 Mbps, and 13.5 Mbps
Power Maximum OFDM power
level is 15 dBm (30mw). This
varies by country.
Maximum OFDM power
level is 17 dBm (50mw). US
only.
The dot11 interface power command is
used to manage the power levels.
ConcatenationSupportedNot supported
OL-7734-02
Cisco 3200 Series Wireless MIC Software Configuration Guide
1-5
Features
Table 1-1Differences Between the 2.4-GHz WMIC and the 4.9-GHz WMIC
Feature2.4-GHz WMIC4.9-GHz WMICComment
distance
command
(minimizes delay
SupportedSupported Formula to minimize the delay propagation
will be added to the dot11 interface distance command
CKIP, CMIC and CKIP-CMIC are not part
of 802.11 standard cipher suites.
number of
stations with
WEP
Maximum
25626
number of
stations with
TKIP
Maximum
256116
number of
stations with
AES-CCM
ChannelizationStatically declared as defined
by IEEE 802.11b/g.
Channel spacing selected by
using the CLI.
WDS serverNot supportedCan be configured to act as
WDS server.
WDS client2.4 GHz WMIC
(C3201-WMIC) acting as
Root device can
auto-discover a WDS server.
Acting as Root device, it can
auto-discover and work
within a subnet WDS server.
If the IP address of a WDS server is
statically configured, the 4.9-GHz WMIC,
acting as Root device, can also work with
central WDS server located anywhere in the
network.
Chapter 1 Overview
1-6
Cisco 3200 Series Wireless MIC Software Configuration Guide
OL-7734-02
Loading...
+ 300 hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.