Dynamic and Static IP Addressing on the AP ...................................................................................................... 13
Recovering an IP Address ............................................................................................................................. 13
Discovering a Dynamically Assigned IP Address .......................................................................................... 13
Installing the UAP ................................................................................................................................................ 13
Connecting to the AP Web Interface by Using the IPv6 Address .................................................................. 17
Using the CLI to View the IP Address.................................................................................................................. 17
Conguring the Ethernet Settings ....................................................................................................................... 18
Using the CLI to Congure Ethernet Settings ............................................................................................... 18
Using the CLI to Congure 802.1X Authentication Information ..................................................................... 20
Verifying the Installation ......................................................................................................................................20
Conguring Security on the Wireless Access Point .............................................................................................21
Section 3 - Viewing Access Point Status ...............................................................................22
Viewing Interface Status ...................................................................................................................................... 22
Link Integrity Monitoring ................................................................................................................................ 29
Viewing Rogue AP Detection............................................................................................................................... 29
Saving and Importing the Known AP List ...................................................................................................... 31
Viewing Managed AP DHCP Information ............................................................................................................ 32
Viewing TSPEC Status and Statistics Information .............................................................................................. 32
Viewing TSPEC AP Statistics Information ........................................................................................................... 33
Viewing Radio Statistics Information ................................................................................................................... 34
Viewing Email Alert Operational Status ............................................................................................................... 35
Section 4 - Managing the Access Point .................................................................................36
Using the 802.11h Wireless Mode ................................................................................................................. 41
Enabling AeroScout™ Engine Support .........................................................................................................41
Modifying Radio Settings ..................................................................................................................................... 42
Conguring Radio and VAP Scheduler................................................................................................................ 47
Scheduler Association Settings ........................................................................................................................... 49
Virtual Access Point Settings ............................................................................................................................... 50
WPA Personal ............................................................................................................................................... 57
Managed Access Point Overview ........................................................................................................................ 65
Transition Between Modes ............................................................................................................................ 65
Conguring Managed Access Point Settings ................................................................................................66
Creating a Management Access Control List (ACL) ............................................................................................ 68
Section 5 - Conguring Access Point Services ....................................................................69
Web Server Settings ........................................................................................................................................... 69
Conguring SNMP on the Access Point .............................................................................................................. 70
Setting the SSH Status ........................................................................................................................................ 72
Setting the Telnet Status ..................................................................................................................................... 73
Conguring Quality of Service ............................................................................................................................. 73
Enabling the Time Settings (NTP) ....................................................................................................................... 78
Conguring SNMPv3 Groups .............................................................................................................................. 81
Section 7 - Maintaining the Access Point ..............................................................................84
Saving the Current Conguration to a Backup File ............................................................................................. 84
Restoring the Conguration from a Previously Saved File .................................................................................. 85
Rebooting the Access Point ................................................................................................................................86
Resetting the Factory Default Conguration ................................................................................................. 86
Rebooting the Access Point ..........................................................................................................................86
Upgrading the Firmware ...................................................................................................................................... 86
Packet Capture Conguration and Settings ........................................................................................................ 88
Packet Capture Status .................................................................................................................................. 89
IPv4 and IPv6 ACLs ......................................................................................................................................94
MAC ACLs ..................................................................................................................................................... 95
ACL Conguration Process ........................................................................................................................... 95
Creating a DiffServ Class Map .......................................................................................................................... 100
Creating a DiffServ Policy Map ......................................................................................................................... 105
Client QoS Status .............................................................................................................................................. 106
Sorting Session Information ........................................................................................................................ 114
Conguring and Viewing Channel Management Settings ................................................................................. 114
Appendix A - Default AP Settings .........................................................................................120
Appendix B - Conguration Examples ................................................................................122
Conguring a VAP ............................................................................................................................................. 122
VAP Conguration from the Web Interface ................................................................................................. 122
VAP Conguration from the CLI .................................................................................................................. 123
VAP Conguration Using SNMP ................................................................................................................. 123
Conguring Radio Settings ................................................................................................................................ 124
Radio Conguration from the Web Interface ............................................................................................... 124
Radio Conguration from the CLI ................................................................................................................ 124
Radio Conguration Using SNMP ............................................................................................................... 125
Conguring the Wireless Distribution System ................................................................................................... 125
WDS Conguration from the Web Interface ................................................................................................ 125
WDS Conguration from the CLI ................................................................................................................. 126
WDS Conguration Using SNMP ................................................................................................................ 126
Figure 9 - Viewing Client Association Information ................................................................................................... 27
Figure 11 - Viewing Rogue and Known Access Points ............................................................................................ 29
Figure 12 - Managed AP DHCP Information ........................................................................................................... 32
Figure 13 - Viewing TSPEC Status and Statistics ................................................................................................... 32
Figure 14 - View TSPEC Status and Statistics ........................................................................................................ 33
Figure 15 - View Radio Statistics ............................................................................................................................. 34
Figure 16 - Email Alert Operational Status .............................................................................................................. 35
Figure 35 - Congure Management Access Control Parameters ............................................................................ 68
Figure 36 - Congure Web Server Settings ............................................................................................................. 69
Figure 38 - Set SSH Status ..................................................................................................................................... 72
Figure 39 - Set Telnet Status ................................................................................................................................... 73
Figure 40 - DDP Status Conguration ..................................................................................................................... 73
Figure 53 - Rebooting the Access Point .................................................................................................................. 86
Figure 54 - Performing AP Maintenance ................................................................................................................. 86
Figure 63 - Support Information .............................................................................................................................. 92
Table 13 - Rogue AP Detection ............................................................................................................................... 31
Table 14 - TSPEC Status and Statistics .................................................................................................................. 33
Table 15 - TSPEC AP Statistics ............................................................................................................................... 34
Table 16 - Radio Statistics Information .................................................................................................................... 35
Table 17 - Email Alert Status ................................................................................................................................... 35
Table 39 - Web Server Settings ............................................................................................................................... 70
Table 56 - Support Information ................................................................................................................................ 92
Table 63 - Access Points in the Cluster ..................................................................................................................111
Table 65 - Single IP Management Options .............................................................................................................111
This guide describes setup, conguration, administration and maintenance for the D-Link DWL-x600AP Unied Access
Point (UAP) on a wireless network.
Document Organization
The Unied Access Point Administrator’s Guide contains the following sections:
•) “Section 1 - About This Document” on page 9
•) “Section 2 - Getting Started” on page 11
•) “Section 3 - Viewing Access Point Status” on page 22
•) “Section 4 - Managing the Access Point” on page 36
•) “Section 5 - Conguring Access Point Services” on page 69
•) “Section 6 - Conguring SNMPv3” on page 80
•) “Section 7 - Maintaining the Access Point” on page 84
•) “Section 8 - Conguring Client Quality of Service (QoS)” on page 93
•) “Section 9 - Clustering Multiple APs” on page 109
•) “Appendix A - Default AP Settings” on page 120
•) “Appendix B - Conguration Examples” on page 122
Additional Documentation
The following documentation provides additional information about Unied Access Point software:
•) The Unied Access Point CLI Command Reference describes the commands available from the command-line
interface (CLI) for managing, monitoring, and conguring the switch.
•) The User Manual for the D-Link Unied Wired and Wireless System provides information about setting up and
managing the Unied Wireless Switch (UWS), including information about how to use the switch to manage
multiple UAPs.
•) Release notes for the D-Link Unied Wired and Wireless System detail the platform-specic functionality of the
software packages, including issues and workarounds.
Document Conventions
This section describes the conventions this document uses.
Note: A note provides more information about a feature or technology and cross-references to
related topics.
Caution! A caution provides information about critical aspects of AP conguration, combinations of
settings, events, or procedures that can adversely affect network connectivity, security, and so on.
The following table describes the typographical conventions used in this guide.
SymbolExampleDescription
BoldClick Apply to save your settings.Menu titles, page names, and button names.
Blue TextSee “Document Conventions” on
page 9
Courier FontWLAN-AP# show network
Courier Font
Italics
Square Brackets [ ][Value]Indicates an optional xed parameter.
October 2016
Value
Hyperlink text.
Screen text, le names, commands, user-typed
command-line entries.
Command parameter, which might be a variable or
xed value.
Unied Access Point Administrator’s Guide
Page 9
Unied Access Point Administrator’s Guide
SymbolExampleDescription
Curly Braces {}{Choice1 | Choice2}Indicates that you must select a parameter from the
list of choices.
Vertical Bars |Choice1 | Choice2Separates the mutually exclusive choices.
Braces within square
brackets [{}]
[{Choice1 | Choice2}]Indicate a choice within an optional element.
Table 1 - Typographical Conventions
Section 1 - About This Document
Online Help, Supported Browsers, and Limitations
Online help for the UAP Administration Web pages provides information about all elds and features available from
the user interface (UI). The information in the online help is a subset of the information available in the Unied Access
Point Administrator’s Guide.
Online help information corresponds to each page on the UAP Administration UI.
For information about the settings on the current page, click the Help link on the upper right side of a page.
The following gure shows an example of the online help available from the links on the user interface.
October 2016
Figure 1 - Administrator UI Online Help
Unied Access Point Administrator’s Guide
Page 10
Unied Access Point Administrator’s Guide
Section 2 - Getting Started
Section 2 - Getting Started
The D-Link DWL-x600AP unied access point (UAP) provides continuous, high-speed access between wireless
devices and Ethernet devices. It is an advanced, standards-based solution for wireless networking in businesses of
any size. The UAP enables wireless local area network (WLAN) deployment while providing state-of-the-art wireless
networking features.
The UAP can operate in two modes: Standalone Mode or Managed Mode. In Standalone Mode, the UAP acts
as an individual access point in the network, and you manage it by using the Administrator Web User Interface
(UI), command-line interface (CLI), or SNMP. In Managed Mode, the UAP is part of the D-Link Unied Wired and
Wireless System, and you manage it by using the D-Link Unied Wireless Switch. If an AP is in Managed Mode, the
Administrator Web UI, Telnet, SSH, and SNMP services are disabled.
This document describes how to perform the setup, management, and maintenance of the UAP in Standalone Mode.
For information about conguring the AP in Managed Mode by using the D-Link Unied Wireless Switch, see the User
Manual for the switch.
Before you power on a new UAP, review the following sections to check required hardware and software components,
client congurations, and compatibility issues. Make sure you have everything you need for a successful launch and
test of your new or extended wireless network.
The DWL-6600AP and DWL-8600AP are dual-radio access points and support the IEEE 802.11a, 802.11b, 802.11g,
and 802.11n modes. The DWL-2600AP and DWL-3600AP are single-radio access points and support the IEEE
802.11b, IEEE 802.11g, and 802.11n (2.4 GHz) modes. The DWL-3610AP is a single-radio access point that supports
both 2.4 GHz (IEEE 802.11b, 802.11g, 2.4 GHz IEEE 802.11n) and 5 GHz (IEEE 802.11a, 802.11n, 802.11ac) modes.
The DWL-6610, DWL-8610, and DWL-8710 are dual radio access points and support all the modes (IEEE 802.11a,
IEEE 802.11b, IEEE 802.11g, IEEE 802.11n, and IEEE 802.11ac)
This section contains the following topics:
•) “Administrator’s Computer Requirements” on page 11
•) “Wireless Client Requirements” on page 12
•) “Dynamic and Static IP Addressing on the AP” on page 13
•) “Installing the UAP” on page 13
•) “Basic Settings” on page 16
•) “Using the CLI to View the IP Address” on page 17
•) “Conguring the Ethernet Settings” on page 18
•) “Conguring IEEE 802.1X Authentication” on page 19
•) “Verifying the Installation” on page 20
•) “Conguring Security on the Wireless Access Point” on page 21
To manage the UAP by using the Web interface or by using the CLI through Telnet or SSH, the AP needs an IP
address. If you use VLANs or IEEE 802.1X Authentication (port security) on your network, you might need to congure
additional settings on the AP before it can connect to the network.
Note: The WLAN AP is not designed to function as a gateway to the Internet. To connect your
WLAN to other LANs or the Internet, you need a gateway device.
Administrator’s Computer Requirements
The following table describes the minimum requirements for the administrator’s computer for conguration and
administration of the UAP through a Web-based user interface (UI).
Required Software or ComponentDescription
Serial or Ethernet Connection to the
Access Point
October 2016
The computer used to congure the rst access point must be connected
to the access point by a serial cable or an Ethernet cable.
Unied Access Point Administrator’s Guide
Page 11
Unied Access Point Administrator’s Guide
Required Software or ComponentDescription
Wireless Connection to the NetworkAfter initial conguration and launch of the rst access point on your
new wireless network, you can make subsequent conguration changes
through the Administration Web pages using a wireless connection to the
internal network.
For wireless connection to the access point, your administration device will
need Wi-Fi capability similar to that of any wireless client:
•) Portable or built-in Wi-Fi client adapter that supports one or more of
the IEEE 802.11 modes in which you plan to run the access point.
•) Wireless client software congured to associate with the UAP.
Web Browser and Operating SystemConguration and administration of the UAP is provided through a Web-
based user interface hosted on the access point.
We recommend using one of the following supported Web browsers to
access the access point Administration Web pages:
•) Microsoft
level for either major version)
•) Mozilla® Firefox version 3.5 or later
•) Safari 5 and later versions
The administration Web browser must have JavaScript™ enabled to
support the interactive features of the administration interface.
®
Internet Explorer® version 7.x or 8.x (with up-to-date patch
Section 2 - Getting Started
Note: DWL-3610AP and DWL-6610B1AP support the following web
browsers:
•) Microsoft® Internet Explorer® version 8.x or 9.x (with up-to-date patch
level for either major version)
•) Mozilla® Firefox version 26.0 or later
•) Chrome on Windows (for AP only) version 32.0 or later
Security SettingsEnsure that security is disabled on the wireless client used to initially
congure the access point.
Table 2 - Requirements for the Administrator’s Computer
Wireless Client Requirements
The UAP provides wireless access to any client with a properly congured Wi-Fi client adapter for the 802.11 mode
in which the access point is running. The UAP supports multiple client operating systems. Clients can be laptop or
desktop computers, personal digital assistants (PDAs), or any other hand-held, portable or stationary device equipped
with a Wi-Fi adapter and supporting drivers.
To connect to the access point, wireless clients need the software and hardware described in the following table.
Required ComponentDescription
Wi-Fi Client AdapterPortable or built-in Wi-Fi client adapter that supports one or more of the
IEEE 802.11 modes in which you plan to run the access point.
Wireless Client SoftwareClient software, such as Microsoft Windows Supplicant, congured to
associate with the UAP.
October 2016
Unied Access Point Administrator’s Guide
Page 12
Unied Access Point Administrator’s Guide
Required ComponentDescription
Client Security SettingsSecurity should be disabled on the client used to do initial conguration of
the access point.
If the Security mode on the access point is set to anything other than plain
text, wireless clients will need to set a prole to the authentication mode
used by the access point and provide a valid username and password,
certicate, or similar user identity proof. Security modes are Static WEP,
IEEE 802.1X, WPA with RADIUS server, and WPA-PSK.
For information about conguring security on the access point, see “Virtual
Access Point Settings” on page 50.
Table 3 - Requirements for Wireless Clients
Section 2 - Getting Started
Dynamic and Static IP Addressing on the AP
When you power on the access point, the built-in DHCP client searches for a DHCP server on the network in order
to obtain an IP Address and other network information. If the AP does not nd a DHCP server on the network, the AP
continues to use its default Static IP Address (10.90.90.91) until you re-assign it a new static IP address (and specify a
static IP addressing policy) or until the AP successfully receives network information from a DHCP server.
To change the connection type and assign a static IP address by using the CLI, see “Conguring the Ethernet
Settings” on page 18 or, by using the Web UI, see “Ethernet Settings” on page 36.
Caution! If you do not have a DHCP server on your internal network, and do not plan to use one,
the rst thing you must do after powering on the access point is change the connection type from
DHCP to static IP. You can either assign a new static IP address to the AP or continue using the
default address. We recommend assigning a new static IP address so that if you bring up another
WLAN AP on the same network, the IP address for each AP will be unique.
Recovering an IP Address
If you experience trouble communicating with the access point, you can recover a static IP address by resetting the AP
conguration to the factory defaults (see “Resetting the Factory Default Conguration” on page 86), or you can get
a dynamically assigned address by connecting the AP to a network that has a DHCP server.
Discovering a Dynamically Assigned IP Address
If you have access to the DHCP server on your network and know the MAC address of your AP, you can view the new
IP address associated with the MAC address of the AP.
If you do not have access to the DHCP server that assigned the IP address to the AP or do not know the MAC address
of the AP, you might need to use the CLI to nd out what the new IP address is. For information about how to discover
a dynamically assigned IP address, see “Using the CLI to View the IP Address” on page 17.
Installing the UAP
To access the Administration Web UI, you enter the IP address of the AP into a Web browser. You can use the default
IP address of the AP (10.90.90.91) to log on to the AP and assign a static IP address, or you can use a DHCP server
on you network to assign network information to the AP. The DHCP client on the AP is enabled by default.
To install the UAP, use the following steps:
1.) Connect the AP to an administrative PC by using a LAN connection or a direct-cable connection.
Unied Access Point Administrator’s Guide
October 2016
Page 13
Unied Access Point Administrator’s Guide
•) To use a LAN connection, connect one end of an Ethernet cable to the network port on the access point and
the other end to the same hub where your PC is connected, as shown in the following gure.
The hub or switch you use must permit broadcast signals from the access point to reach all other devices on
the network.
•) To use a direct-cable connection, connect one end of an Ethernet straight-through or crossover cable to the
network port on the access point and the other end of the cable to the Ethernet port on the PC, as shown in
the following gure. You can also use a serial cable to connect the serial port on the AP to a serial port on the
administrative computer.
Section 2 - Getting Started
For initial conguration with a direct Ethernet connection and no DHCP server, be sure to set your PC to a
static IP address in the same subnet as the default IP address on the access point. (The default IP address for
the access point is 10.90.90.91.)
If you use this method, you will need to recongure the cabling for subsequent startup and deployment of the
access point so that the access point is no longer connected directly to the PC but instead is connected to the
LAN (either by using a hub or directly).
Note: It is possible to detect access points on the network with a wireless connection. However,
we strongly advise against using this method. In most environments you may have no way
of knowing whether you are actually connecting to the intended AP. Also, many of the initial
conguration changes required will cause you to lose connectivity with the AP over a wireless
connection.
2.) Connect the power adapter to the power port on the back of the access point, and then plug the other end of the
power cord into a power outlet.
3.) Use your Web browser to log on to the UAP Administration Web pages.
•) If the AP did not acquire an IP address from a DHCP server on your network, enter 10.90.90.91 in the address
eld of your browser, which is the default IP address of the AP.
•) If you used a DHCP server on your network to automatically congure network information for the AP, enter the
new IP address of the AP into the Web browser.
•) If you used a DHCP server and you do not know the new IP address of the AP, use the following procedures to
obtain the information:
•) Connect a serial cable from the administrative computer to the AP and use a terminal emulation program to
access the command-line interface (CLI).
•) At the login prompt, enter admin for the user name and admin for the password. At the command prompt,
enter get management.
•) The command output displays the IP address of the AP. Enter this address in the address eld of your browser.
For a more detailed explanation about how to log on to the CLI by using the console port, see “Using the CLI
to View the IP Address” on page 24.
4.) When prompted, enter admin for the user name and admin for the password, then click Logon.
Unied Access Point Administrator’s Guide
October 2016
Page 14
Unied Access Point Administrator’s Guide
After you log in, the Basic Settings page for UAP administration is displayed, as the following gure shows.
Section 2 - Getting Started
Figure 2 - Web UI Login Prompt
Figure 3 - Provide Basic Settings
5.) Verify the settings on the Basic Settings page.
•) Review access point description and provide a new administrator password for the access point if you do not
want to use the default password, which is admin.
•) Click the Apply button to activate the wireless network with these new settings.
Note: The changes you make are not saved or applied until you click Apply. Changing some
access point settings might cause the AP to stop and restart system processes. If this happens,
wireless clients will temporarily lose connectivity. We recommend that you change access point
settings when WLAN trafc is low.
For information about the elds and conguration options on the Basic Settings page, see “Basic Settings” on
page 16.
6.) If you do not have a DHCP server on the management network and do not plan to use one, you must change
the Connection Type from DHCP to Static IP.
You can either assign a new Static IP address to the AP or continue using the default address. We recommend
assigning a new Static IP address so that if you bring up another UAP on the same network, the IP address
for each AP will be unique. To change the connection type and assign a static IP address, see “Conguring the
Ethernet Settings” on page 18 (CLI) or “Ethernet Settings” on page 36 (Web).
7.) If your network uses VLANs, you might need to congure the management VLAN ID or untagged VLAN ID on
the UAP in order for it to work with your network.
For information about how to congure VLAN information, see “Conguring the Ethernet Settings” on page 18
(CLI) or “Ethernet Settings” on page 36 (Web).
Unied Access Point Administrator’s Guide
October 2016
Page 15
Unied Access Point Administrator’s Guide
8.) If your network uses IEEE 802.1X port security for network access control, you must congure the 802.1X
supplicant information on the AP.
For information about how to congure the 802.1X user name and password, see “Conguring IEEE 802.1X
Authentication” on page 19.
Section 2 - Getting Started
Basic Settings
From the Basic Settings page, you can view various information about the UAP, including IP and MAC address
information, and congure the administrator password for the UAP. The following table describes the elds and
conguration options on the Basic Settings page.
FieldDescription
IP AddressShows the IP address assigned to the AP. This eld is not editable on this page because
the IP address is already assigned (either by DHCP, or statically through the Ethernet
Settings page).
IPv6 AddressShows the IPv6 address assigned to the AP. This eld is not editable on this page because
the IP address is already assigned (either by DHCPv6, or statically through the Ethernet
Settings page).
IPv6 Address Status Shows the operational status of the static IPv6 address assigned to the management
interface of the AP. The possible values are Operational and Tentative.
IPv6 Autocongured Global
Addresses
IPv6 Link Local
Address
MAC AddressShows the MAC address of the AP. The address shown here is the MAC address
Firmware VersionShows version information about the rmware currently installed on the AP. As new
ModelDisplays the AP model number.
Product IdentierIdenties the AP hardware model.
Hardware VersionIdenties the AP hardware version.
Serial NumberShows the AP serial number.
Device NameGeneric name to identify the type of hardware.
Device DescriptionProvides information about the product hardware.
New PasswordEnter a new administrator password. The characters you enter are displayed as bullet
Shows each automatically-congured global IPv6 address for the management interface of
the AP.
Shows the IPv6 Link Local address, which is the IPv6 address used by the local physical
link. The link local address is not congurable and is assigned by using the IPv6 Neighbor
Discovery process.
associated with the management interface. This is the address by which the AP is known
externally to other networks.
versions of the WLAN AP rmware become available, you can upgrade the rmware on
your APs.
characters to prevent others from seeing your password as you type.
Conrm New
Password
October 2016
The administrator password must be an alphanumeric string of up to 32 characters. The
special characters are also supported.
Note: As an immediate rst step in securing your wireless network, we recommend that
you change the administrator password from the default.
Re-enter the new administrator password to conrm that you typed it as intended.
Unied Access Point Administrator’s Guide
Page 16
Unied Access Point Administrator’s Guide
FieldDescription
Baud RateSelect a baud rate for the serial port connection. The baud rate on the AP must match the
baud rate on the terminal or terminal emulator to connect to the AP command-line interface
(CLI) by using a serial (console) connection.
The following baud rates are available:
•) 9600
•) 19200
•) 38400
•) 57600
•) 115200
System NameEnter a name for the AP. This name appears only on the Basic Settings page and is a
name to identify the AP to the administrator. Use up to 64 alphanumeric characters, for
example My AP.
System ContactEnter the name, e-mail address, or phone number of the person to contact regarding
issues related to the AP.
System LocationEnter the physical location of the AP, for example Conference Room A.
Table 4 - Basic Settings Page
Section 2 - Getting Started
Connecting to the AP Web Interface by Using the IPv6 Address
To connect to the AP by using the IPv6 global address or IPv6 link local address, you must enter the AP address into
your browser in a special format.
Note: The following instructions and examples work with Microsoft Internet Explorer 7 (IE7) and
might not work with other browsers. For DWL-3610AP and DWL-6610B1AP, it will work with
Microsoft Internet Explorer 8 (IE8).
To connect to an IPv6 global address, add square brackets around the IPv6 address. For example, if the AP
global IPv6 address is 2520::230:abff:fe00:2420, type the following address into the IE7 address eld: http://
[2520::230:abff:fe00:2420].
To connect to the iPv6 link local address, replace the colons (:) with hyphens (-), add the interface number preceded
with an “s,” then add “.ipv6-literal.net.” For example, if the AP link local address is fe80::230:abff:fe00:2420, and the
Windows interface is dened as “%6,” type the following address into the IE7 address eld: http://fe80--230-abff-fe00-
2420s6.ipv6-literal.net.
Using the CLI to View the IP Address
The DHCP client on the UAP is enabled by default. If you connect the UAP to a network with a DHCP server, the
AP automatically acquires an IP address. To manage the UAP by using the Administrator UI, you must enter the IP
address of the access point into a Web browser.
If a DHCP server on your network assigns an IP address to the UAP, and you do not know the IP address, use the
following steps to view the IP address of the UAP:
1.) Using a null-modem cable, connect a VT100/ANSI terminal or a workstation to the console (serial) port.
If you attached a PC, Apple, or UNIX workstation, start a terminal-emulation program, such as HyperTerminal or
TeraTerm.
2.) Congure the terminal-emulation program to use the following settings:
•) Baud rate: 115200 bps
•) Data bits: 8
•) Parity: none
•) Stop bit: 1
•) Flow control: none
3.) Press the return key, and a login prompt should appear.
The login name is admin. The default password is admin. After a successful login, the screen shows the
Unied Access Point Administrator’s Guide
October 2016
Page 17
Unied Access Point Administrator’s Guide
(Access Point Name)# prompt.
4.) At the login prompt, enter
Information similar to the following prints to the screen.
get management.
Section 2 - Getting Started
Figure 4 - Command Line Interface (CLI) Connection
Conguring the Ethernet Settings
The default Ethernet settings, which include DHCP and VLAN information, might not work for all networks.
By default, the DHCP client on the UAP automatically broadcasts requests for network information. If you want to
use a static IP address, you must disable the DHCP client and manually congure the IP address and other network
information.
The management VLAN is VLAN 1 by default. This VLAN is also the default untagged VLAN. If you already have
a management VLAN congured on your network with a different VLAN ID, you must change the VLAN ID of the
management VLAN on the access point.
For information about using the Web interface to congure the Ethernet settings, see “Ethernet Settings” on page
36. You can also use the CLI to congure the Ethernet settings, which the following section describes.
Using the CLI to Congure Ethernet Settings
Use the commands shown in the following table to view and set values for the Ethernet (wired) interface. For more
information about each setting, see the description for the eld in the following table.
ActionCommands
Get the DNS Name
Set the DNS Name
Get Current Settings for the Ethernet (Wired) Internal
Interface
Set the management VLAN ID
View untagged VLAN information
Enable the untagged VLAN
Disable the untagged VLAN
October 2016
get host id
set host id <host_name>
For example:
set host id lab-ap
get management
set management vlan-id <1-4094>
get untagged-vlan
set untagged-vlan status up
set untagged-vlan status down
Unied Access Point Administrator’s Guide
Page 18
Unied Access Point Administrator’s Guide
ActionCommands
Set the untagged VLAN ID
View the connection type
Use DHCP as the connection type
Use a Static IP as the connection type
Set the Static IP address
set untagged-vlan vlan-id <1-4094>
get management dhcp-status
set management dhcp-status up
set management dhcp-status down
set management static-ip <ip_address>
For example:
set management static-ip 10.10.12.221
Set a Subnet Mask
set management static-mask <netmask>
For example:
set management static-mask 255.255.255.0
Set the Default Gateway
set static-ip-route gateway <ip_address>
For example:
set static-ip-route gateway 10.10.12.1
View the DNS Nameserver mode Dynamic= up
get host dns-via-dhcp
Manual=down
Set DNS Nameservers to Use Static IP Addresses
(Dynamic to Manual Mode)
set host dns-via-dhcp down
set host static-dns-1 <ip_address>
set host static-dns-2 <ip_address>
For example:
set host static-dns-1 192.168.23.45
Set DNS Nameservers to Use DHCP IP Addressing
set host dns-via-dhcp up
(Manual to Dynamic Mode)
Table 5 - CLI Commands for Ethernet Setting
Section 2 - Getting Started
In the following example, the administrator uses the CLI to set the management VLAN ID to 123 and to disable the
untagged VLAN so that all trafc is tagged with a VLAN ID.
DLINK-WLAN-AP# set management vlan-id 123
DLINK-WLAN-AP# set untagged-vlan status down
DLINK-WLAN-AP# get management
Property Value
-------------------------------------------vlan-id 123
interface brtrunk
static-ip 10.90.90.91
static-mask 255.0.0.0
ip 10.90.90.91
mask 255.0.0.0
mac 00:05:5E:80:70:00
dhcp-status down
ipv6-status up
ipv6-autocong-status up
static-ipv6 ::
static-ipv6-prex-length 0
DLINK-WLAN-AP# get untagged-vlan
Property Value
--------------vlan-id 1
status down
DLINK-WLAN-AP#
Conguring IEEE 802.1X Authentication
On networks that use IEEE 802.1X, port-based network access control, a supplicant (client) cannot gain access to
the network until the 802.1X authenticator grants access. If your network uses 802.1X, you must congure 802.1X
authentication information that the AP can supply to the authenticator.
If your network uses IEEE 802.1X see “Conguring IEEE 802.1X Authentication” on page 19 for information about
Unied Access Point Administrator’s Guide
October 2016
Page 19
Unied Access Point Administrator’s Guide
Section 2 - Getting Started
how to congure 802.1X by using the Web interface.
Using the CLI to Congure 802.1X Authentication Information
The following table shows the commands used to congure the 802.1X supplicant information using the CLI.
ActionCommand
View 802.1X supplicant settings
Enable 802.1X supplicant
Disable 802.1X supplicant
Set the 802.1X user name
Set the 802.1X password
Table 6 - CLI Commands for the 802.1X Supplicant
In the following example, the administrator enables the 802.1X supplicant and sets the user name to wlanAP and the
password to test1234.
DLINK-WLAN-AP# set dot1x-supplicant status up
DLINK-WLAN-AP# set dot1x-supplicant user wlanAP
DLINK-WLAN-AP# set dot1x-supplicant password test1234
DLINK-WLAN-AP# get dot1x-supplicant
Property Value
-------------------------status up
user wlanAP
eap-method md5
debug off
cert-present no
cert-exp-date Not Present
get dot1x-supplicant
set dot1x-supplicant status up
set dot1x-supplicant status down
set dot1x-supplicant user <name>
set dot1x-supplicant password <password>
DLINK-WLAN-AP#
Verifying the Installation
Make sure the access point is connected to the LAN and associate some wireless clients with the network. Once you
have tested the basics of your wireless network, you can enable more security and ne-tune the AP by modifying
advanced conguration features.
1.) Connect the access point to the LAN.
•) If you congured the access point and administrator PC by connecting both into a network hub, then your
access point is already connected to the LAN. The next step is to test some wireless clients.
•) If you congured the access point by using a direct cable connection from your computer to the access point,
do the following procedures:
•) Disconnect the cable from the computer and the access point.
•) Connect an Ethernet cable from the access point to the LAN.
•) Connect your computer to the LAN by using an Ethernet cable or a wireless card.
2.) Test LAN connectivity with wireless clients.
Test the UAP by trying to detect it and associate with it from some wireless client devices. For information about
requirements for these clients, see “Wireless Client Requirements” on page 12.
3.) Secure and congure the access point by using advanced features.
Once the wireless network is up and you can connect to the AP with some wireless clients, you can add in layers
of security, create multiple virtual access points (VAPs), and congure performance settings.
Note: The WLAN AP is not designed for multiple, simultaneous conguration changes. If more
than one administrator is logged onto the Administration Web pages and making changes to the
conguration, there is no guarantee that all conguration changes specied by multiple users will
be applied.
By default, no security is in place on the access point, so any wireless client can associate with it and access
Unied Access Point Administrator’s Guide
October 2016
Page 20
Unied Access Point Administrator’s Guide
your LAN. An important next step is to congure security, as described in “Virtual Access Point Settings” on page
50.
Section 2 - Getting Started
Conguring Security on the Wireless Access Point
You congure secure wireless client access by conguring security for each virtual access point (VAP) that you
enable. You can congure up to 16 VAPs per radio that simulate multiple APs in one physical access point. By default,
only one VAP is enabled. For each VAP, you can congure a unique security mode to control wireless client access.
Each radio has 16 VAPs, with VAP IDs from 0-15. By default, only VAP 0 on each radio is enabled. VAP0 has the
following default settings:
•) VLAN ID: 1
•) Broadcast SSID: Enabled
•) SSID: dlink1
•) Security: None
•) MAC Authentication Type: None
•) Redirect Mode: None
All other VAPs are disabled by default. The default SSID for VAPs 1–15 is ”dlinkx” where x is the VAP ID.
To prevent unauthorized access to the UAP, we recommend that you select and congure a security option other than
None for the default VAP and for each VAP that you enable.
For information about how to congure the security settings on each VAP, see “Virtual Access Point Settings” on page
50.
October 2016
Unied Access Point Administrator’s Guide
Page 21
Unied Access Point Administrator’s Guide
Section 3 - Viewing Access Point Status
Section 3 - Viewing Access Point Status
This section describes the information you can view from the tabs under the Status heading on the Administration
Web UI. This section contains the following subsections:
•) “Viewing Interface Status” on page 22
•) “Viewing Events” on page 23
•) “Viewing Transmit and Receive Statistics” on page 25
•) “Viewing Wireless Multicast Forwarding Statistics” on page 26
•) “Viewing TSPEC Client Associations” on page 27
•) “Viewing Rogue AP Detection” on page 29
•) “Viewing Managed AP DHCP Information” on page 32
•) “Viewing TSPEC Status and Statistics Information” on page 32
•) “Viewing TSPEC AP Statistics Information” on page 33
•) “Viewing Radio Statistics Information” on page 34
•) “Viewing Email Alert Operational Status” on page 35
Note: The web-based UI images show the DWL-8600AP administration pages. Pages for the
DWL-2600AP, DWL-3600AP, or DWL-3610AP will display information for one radio only.
Viewing Interface Status
To monitor Ethernet LAN (wired) and wireless LAN (WLAN) settings, click the Interfaces tab.
Figure 5 - Viewing Interface Status
This page displays the current settings of the UAP. It displays the Wired Settings and the Wireless Settings.
Wired Settings (Internal Interface)
The Internal interface includes the Ethernet MAC Address, Management VLAN ID, IP Address (IPv4 and IPv6),
Subnet Mask, and DNS information. To change any of these settings, click the Edit link. After you click Edit, you are
redirected to the Ethernet Settings page.
For information about conguring these settings, see “Conguring the Ethernet Settings” on page 18.
Wireless Settings
The Radio Interface includes the AeroScout™ Engine Communication status, Radio Mode and Channel. The
Wireless Settings section also shows the MAC address (read-only) associated with each radio interface.
To change the Radio Mode or Channel settings, click the Edit link. After you click Edit, you are redirected to the
Unied Access Point Administrator’s Guide
October 2016
Page 22
Unied Access Point Administrator’s Guide
Modify Wireless Settings page.
For information about conguring these settings, see “Wireless Settings” on page 38 and “Modifying Radio Settings”
on page 42.
Section 3 - Viewing Access Point Status
Viewing Events
The Events page shows real-time system events on the AP such as wireless clients associating with the AP and being
authenticated.
To view system events, click the Events tab.
Figure 6 - Viewing Events
From the Events page, you can perform the following tasks:
•) View the most recent, high-level events generated by this AP.
•) Enable and congure Persistent logging to write system event logs to non-volatile memory so that the events
are not erased when the system reboots.
•) Set a Severity Level to determine what category of log messages are displayed.
•) Set Depth to determine how many log messages are displayed in the Event log.
•) Enable a remote log relay host to capture all system events and errors in a Kernel Log.
Note: The AP acquires its date and time information using the network time protocol (NTP). This
data is reported in UTC format (also known as Greenwich Mean Time). You need to convert the
reported time to your local time.
Conguring Persistent Logging Options
If the system unexpectedly reboots, log messages can be useful to diagnose the cause. However, log messages are
erased when the system reboots unless you enable persistent logging.
Caution! Enabling persistent logging can wear out the ash (non-volatile) memory and degrade
network performance. You should only enable persistent logging to debug a problem. Make sure
you disable persistent logging after you nish debugging the problem.
To congure persistent logging on the Events page, set the persistence, severity, and depth options as described in
the following table, and then click Apply.
Unied Access Point Administrator’s Guide
October 2016
Page 23
Unied Access Point Administrator’s Guide
FieldDescription
PersistenceChoose Enabled to save system logs to non-volatile memory so that the logs are not erased
when the AP reboots. Choose Disabled to save system logs to volatile memory. Logs in
volatile memory are deleted when the system reboots.
SeveritySpecify the severity level of the log messages to write to non-volatile memory. For example,
if you specify 2, critical, alert, and emergency logs are written to non-volatile memory. Error
messages with a severity level of 3 – 7 are written to volatile memory.
•) 0 — emergency
•) 1 — alert
•) 2 — critical
•) 3 — error
•) 4 — warning
•) 5 — notice
•) 6 — info
•) 7 — debug
DepthYou can store up to 128 messages in non-volatile memory and 512 messages in volatile
memory. Once the number you congure in this eld is reached, the oldest log event is
overwritten by the new log event.
Table 7 - Logging Options
Note: To apply your changes, click Apply. Changing some settings might cause the AP to stop
and restart system processes. If this happens, wireless clients will temporarily lose connectivity.
We recommend that you change AP settings when WLAN trafc is low.
Section 3 - Viewing Access Point Status
Conguring the Log Relay Host for Kernel Messages
The Kernel Log is a comprehensive list of system events (shown in the System Log) and kernel messages such as
error conditions, like dropping frames.
You cannot view kernel log messages directly from the Administration Web UI for an AP. You must rst set up a remote
server running a syslog process and acting as a syslog log relay host on your network. Then, you can congure the
UAP to send syslog messages to the remote server.
Remote log server collection for AP syslog messages provides the following features:
•) Allows aggregation of syslog messages from multiple APs
•) Stores a longer history of messages than kept on a single AP
•) Triggers scripted management operations and alerts
To use Kernel Log relaying, you must congure a remote server to receive the syslog messages. The procedure to
congure a remote log host depends on the type of system you use as the remote host.
Note: The syslog process will default to use port 514. We recommend keeping this default port.
However, if you choose to recongure the log port, make sure that the port number you assign to
syslog is not being used by another process.
Enabling or Disabling the Log Relay Host on the Events Page
To enable and congure Log Relaying on the Events page, set the Log Relay options as described in the following
table, and then click Update.
FieldDescription
Relay LogSelect Enabled to allow the UAP to send log messages to a remote host. Select Disabled
to keep all log messages on the local system.
Relay HostSpecify the IP Address or DNS name of the remote log server.
Relay PortSpecify the Port number for the syslog process on the Relay Host.
The default port is 514.
Table 8 - Log Relay Host
Unied Access Point Administrator’s Guide
October 2016
Page 24
Unied Access Point Administrator’s Guide
Note: To apply your changes, click Apply. Changing some settings might cause the AP to stop
and restart system processes. If this happens, wireless clients will temporarily lose connectivity.
We recommend that you change AP settings when WLAN trafc is low.
If you enabled the Log Relay Host, clicking Apply will activate remote logging. The AP will send its kernel messages
real-time for display to the remote log server monitor, a specied kernel log le, or other storage, depending on how
you congured the Log Relay Host.
If you disabled the Log Relay Host, clicking Apply will disable remote logging.
Section 3 - Viewing Access Point Status
Viewing Transmit and Receive Statistics
The Transmit/Receive page provides some basic information about the current AP and a real-time display of the
transmit and receive statistics for the Ethernet interface on the AP and for the VAPs on all supported radio interfaces.
All transmit and receive statistics shown are totals since the AP was last started. If you reboot the AP, these gures
indicate transmit and receive totals since the reboot.
To view transmit and receive statistics for the AP, click the Transmit/Receive tab.
Figure 7 - Viewing Trafc Statistics
FieldDescription
InterfaceThe name of the Ethernet or VAP interface.
StatusShows whether the interface is up or down.
MAC AddressMAC address for the specied interface. The UAP has a unique MAC address for each
interface. Each radio has a different MAC address for each interface on each of its two
radios.
VLAN IDVirtual LAN (VLAN) ID.
You can use VLANs to establish multiple internal and guest networks on the same AP.
The VLAN ID is set on the VAP page. (See “Conguring Load Balancing” on page 64)
Name (SSID)Wireless network name. Also known as the SSID, this alphanumeric key uniquely identies a
wireless local area network.
The SSID is set on the VAP page. (See “Conguring Load Balancing” on page 64)
Transmit and Receive Information
Total PacketsIndicates total packets sent (in Transmit table) or received (in Received table) by this AP.
Total BytesIndicates total bytes sent (in Transmit table) or received (in Received table) by this AP.
Unied Access Point Administrator’s Guide
October 2016
Page 25
Unied Access Point Administrator’s Guide
FieldDescription
Total Drop PacketsIndicates total number of packets sent (in Transmit table) or received (in Received table) by
this AP that were dropped.
Total Drop BytesIndicates total number of bytes sent (in Transmit table) or received (in Received table) by
this AP that were dropped.
ErrorsIndicates total errors related to sending and receiving data on this AP.
Table 9 - Transmit/Receive
Section 3 - Viewing Access Point Status
Viewing Wireless Multicast Forwarding Statistics
The Wireless Multicast Forwarding Transmit and Receive Statistics page provides some basic information about the
current AP and a real-time display of the transmit and receive statistics for the Wireless Multicast Trafc interface on
the AP and for the VAPs on the radio interface. All transmit and receive statistics shown are totals since the AP was
last started. If you reboot the AP, these gures indicate transmit and receive totals since the reboot.
Figure 8 - Viewing WMF Transmit and Receive Statistics
To view transmit and receive statistics for the AP, click the Wireless Multicast Forwarding Transmit and Receive
Statistics tab.
FieldDescription
NetworkShows which VAP the client is associated with. For example, an entry of wlan0vap2 means
the client is associated with Radio 1, VAP 2.
An entry of wlan0 means the client is associated with VAP 0 on Radio 1. An entry of wlan1
means the client is associated with VAP 0 on Radio 2.
StationShows the MAC address of the associated wireless client.
StatusThe Authenticated and Associated Status shows the underlying IEEE 802.11 authentication
and association status, which is present no matter which type of security the client uses to
connect to the AP. This status does not show IEEE 802.1X authentication or association
status.
Some points to keep in mind with regard to this eld are:
•) If the AP security mode is None or Static WEP, the authentication and association
status of clients showing on the Client Associations page will be in line with what is
expected; that is, if a client shows as authenticated to the AP, it will be able to transmit
and receive data. (This is because Static WEP uses only IEEE 802.11 authentication.)
•) If the AP uses IEEE 802.1X or WPA security, however, it is possible for a client
association to show on this page as authenticated (via the IEEE 802.11 security) but
actually not be authenticated to the AP via the second layer of security.
From StationShows the number of packets and bytes received from the wireless client and the number of
packets and bytes that were dropped after being received.
October 2016
Unied Access Point Administrator’s Guide
Page 26
Unied Access Point Administrator’s Guide
FieldDescription
To StationShows the number of packets and bytes transmitted from the AP to the wireless client and
the number of packets and bytes that were dropped upon transmission.
Table 10 - WMF Transmit and Receive Statistics Table
Section 3 - Viewing Access Point Status
Viewing Associated Wireless Client Information
To view the client stations associated with a particular access point, click the Client Associations tab.
Figure 9 - Viewing Client Association Information
The associated stations are displayed along with information about packet trafc transmitted and received for each
station.
The following describes the elds on the Client Associations page.
FieldDescription
NetworkShows which VAP the client is associated with. For example, an entry of wlan0vap2 means
the client is associated with Radio 1, VAP 2.
An entry of wlan0 means the client is associated with VAP 0 on Radio 1. An entry of wlan1
means the client is associated with VAP 0 on Radio 2.
StationShows the MAC address of the associated wireless client.
StatusThe Authenticated and Associated Status shows the underlying IEEE 802.11 authentication
and association status, which is present no matter which type of security the client uses to
connect to the AP. This status does not show IEEE 802.1X authentication or association
status.
Some points to keep in mind with regard to this eld are:
•) If the AP security mode is None or Static WEP, the authentication and association
status of clients showing on the Client Associations page will be in line with what is
expected; that is, if a client shows as authenticated to the AP, it will be able to transmit
and receive data. (This is because Static WEP uses only IEEE 802.11 authentication.)
•) If the AP uses IEEE 802.1X or WPA security, however, it is possible for a client
association to show on this page as authenticated (via the IEEE 802.11 security) but
actually not be authenticated to the AP via the second layer of security.
From StationShows the number of packets and bytes received from the wireless client and the number of
packets and bytes that were dropped after being received.
To StationShows the number of packets and bytes transmitted from the AP to the wireless client and
the number of packets and bytes that were dropped upon transmission.
Table 11 - Associated Clients
Viewing TSPEC Client Associations
The TSPEC Client Association Status and Statistics page provides some basic information about the client
associations status and a real-time display of the transmit and receive statistics for the TSPEC clients. All transmit and
receive statistics shown are totals since the client association started.
A TSPEC is a trafc specication that is sent from a QoS-capable wireless client to an AP requesting a certain
amount of network access for the trafc stream (TS) it represents. A trafc stream is a collection of data packets
identied by the wireless client as belonging to a particular user priority. An example of a voice trafc stream is a Wi-Fi
CERTIFIED™ telephone handset that marks its codec-generated data packets as voice priority trafc. An example of
a video trafc stream is a video player application on a wireless laptop that prioritizes a video conference feed from a
Unied Access Point Administrator’s Guide
October 2016
Page 27
Unied Access Point Administrator’s Guide
Section 3 - Viewing Access Point Status
corporate server.
To view TSPEC client association statistics, click the TSPEC Client Associations tab.
Figure 10 - Viewing TSPEC Client Associations
The following table describes the information provided on the TSPEC Client Association Status and Statistics
page.
Access CategoryTS Access Category (voice or video).
DirectionThe trafc direction for this TS. Direction can be:
•) uplink
•) downlink
•) bidirectional
User PriorityThe User Priority (UP) for this TS. The UP is sent with each packet in the UP portion of the
IP header. Typical values are:
•) 6 or 7 for voice
•) 4 or 5 for video
The value may differ depending on other priority trafc sessions.
Medium TimeThe time (in 32 microsecond per second units) that the TS trafc occupies the transmission
medium.
Excess Usage
Events
The number of times the client has exceeded the medium time established for its TSPEC.
Minor, infrequent violations are ignored.
VAPThe Virtual Access Point associated with this TS client.
MAC AddressThe Virtual Access Point MAC address.
SSIDThe service set identier associated with this TS client.
Access CategoryTS Access Category (voice or video).
DirectionThe trafc direction for this TS. Direction can be:
•) uplink
•) downlink
•) bidirectional
From StationShows the number of packets and bytes received from the wireless client and the number
of packets and bytes that were dropped after being received. Also shows the number of
packets:
•) in excess of an admitted TSPEC.
•) for which no TSPEC has been established when admission is required by the AP.
October 2016
Unied Access Point Administrator’s Guide
Page 28
Unied Access Point Administrator’s Guide
FieldDescription
To StationShows the number of packets and bytes transmitted from the AP to the wireless client and
the number of packets and bytes that were dropped upon transmission. Also shows the
number of packets:
•) in excess of an admitted TSPEC.
•) for which no TSPEC has been established when admission is required by the AP.
Table 12 - TSPEC Client Associations
Section 3 - Viewing Access Point Status
Link Integrity Monitoring
The UAP provides link integrity monitoring to continually verify its connection to each associated client. To do this,
the AP sends data packets to clients every few seconds when no other trafc is passing. This allows the AP to detect
when a client goes out of range, even during periods when no normal trafc is exchanged. The client connection
drops off the list within 300 seconds if these data packets are not acknowledged, even if no disassociation message is
received.
Viewing Rogue AP Detection
The status page to view Rogue AP Detection information provides real-time statistics for all APs within range of the
AP on which you are viewing the Administration Web pages. When AP detection is enabled, the radio will periodically
switch from its operating channel to scan other channels within the same band. Click Refresh to update the screen
and display the most current information.
The Rogue AP Detection page contains the following two lists:
•) Detected Rogue AP List — Lists all APs within range of the AP that have not been acknowledged as known APs.
•) Known AP List — Lists all APs within range of the AP that have been acknowledged as known APs either by
clicking the Grant button associated with an AP in the Detected Rogue AP List or by appearing in an imported
AP list.
To view information about other access points on the wireless network, click the Rogue AP Detection tab.
Figure 11 - Viewing Rogue and Known Access Points
You must enable the AP detection on a radio in order to collect information about other APs within range.
The following table describes the information provided on neighbouring access points.
Unied Access Point Administrator’s Guide
October 2016
Page 29
Unied Access Point Administrator’s Guide
FieldDescription
AP Detection for
Radio
Detected Rogue AP List
ActionClick Grant to move the AP from the Detected Rogue AP List to the Known AP List.
MACShows the MAC address of the neighbouring AP.
RadioThe Radio eld indicates which radio detected the neighbouring AP:
Beacon Int.Shows the Beacon interval being used by this AP.
TypeIndicates the type of device:
SSIDThe Service Set Identier (SSID) for the AP.
PrivacyIndicates whether there is any security on the neighbouring device.
WPAIndicates whether WPA security is on or off for this AP.
BandThis indicates the IEEE 802.11 mode being used on this AP. (For example, IEEE 802.11a,
ChannelShows the Channel on which the AP is currently broadcasting.
RateShows the rate (in megabits per second) at which this AP is currently transmitting.
SignalIndicates the strength of the radio signal emitting from this AP. If you hover the mouse
BeaconsShows the total number of beacons received from this AP since it was rst discovered.
Last BeaconShows the date and time of the last beacon received from this AP.
RatesShows supported and basic (advertised) rate sets for the neighbouring AP. Rates are shown
To allow the AP radios to perform neighbour AP detection and collect information about
neighbour APs, click Enabled.
To disable neighbour AP detection on the radios, click Disabled.
If you change the AP detection mode, click Update to save the new settings.
Note: The Detected Rouge AP and Known AP lists provide information. The DWL-x600AP
does not have any control over the APs on the list and cannot apply any security policies to
APs detected through the RF scan.
•) wlan0 (Radio One)
•) wlan1 (Radio Two)
Beacon frames are transmitted by an AP at regular intervals to announce the existence
of the wireless network. The default behaviour is to send a beacon frame once every 100
milliseconds (or 10 per second).
The Beacon Interval is set on the Radio page.(See “Modifying Radio Settings” on page
42)
•) AP indicates the neighbouring device is an AP that supports the IEEE 802.11 Wireless
Networking Framework in Infrastructure Mode.
•) Ad hoc indicates a neighbouring station running in Ad hoc Mode. Stations set to ad
hoc mode communicate with each other directly, without the use of a traditional AP.
Ad-hoc mode is an IEEE 802.11 Wireless Networking Framework also referred to as
peer-to-peer mode or an Independent Basic Service Set (IBSS).
The SSID is an alphanumeric string of up to 32 characters that uniquely identies a wireless
local area network. It is also referred to as the Network Name.
The SSID is set on the VAP page. (See “Conguring Load Balancing” on page 64)
•) Off indicates that the Security mode on the neighbouring device is set to None (no
security).
•) On indicates that the neighbouring device has some security in place.
•) Security is congured on the AP from the VAP page.
IEEE 802.11b, IEEE 802.11g.)
The number shown indicates the mode according to the following map:
•) 2.4 indicates IEEE 802.11b, 802.11g, or 802.11n mode (or a combination of the modes)
•) 5 indicates IEEE 802.11a or 802.11n mode (or both modes)
The channel denes the portion of the radio spectrum that the radio uses for transmitting
and receiving.
The channel is set in Radio Settings. (See “Modifying Radio Settings” on page 42)
The current rate will always be one of the rates shown in Supported Rates.
pointer over the bars, a number appears and shows the strength in decibels (dB).
in megabits per second (Mbps).
All Supported Rates are listed, with Basic Rates shown in bold.
Rate sets are congured on the Radio Settings page. (See “Modifying Radio Settings” on
page 42)
Section 3 - Viewing Access Point Status
October 2016
Unied Access Point Administrator’s Guide
Page 30
Loading...
+ 107 hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.