FEDERAL COMMUNICATION COMMISSION INTERFERENCE STATEMENT
This equipment has been tested and found to comply with the limits for a
Class B digital device, pursuant to Part 15 of the FCC Rules. These limits
are designed to provide reasonable protection against harmful interference
in a residential installation. This equipment generates, uses and can
radiate radio frequency energy and, if not installed and used in accordance
with the instructions, may cause harmful interference to radio
communications. However, there is no guarantee that interference will not
occur in a particular installation. If this equipment does cause harmful
interference to radio or television reception, which can be determined by
turning the equipment off and on, the user is encouraged to try to correct
the interference by one of the following measures:
◆Reorient or relocate the receiving antenna
◆Increase the separation between the equipment and receiver
◆Connect the equipment into an outlet on a circuit different from that to
which the receiver is connected
◆Consult the dealer or an experienced radio/TV technician for help
This device complies with Part 15 of the FCC Rules. Operation is subject to
the following two conditions: (1) This device may not cause harmful
interference, and (2) this device must accept any interference received,
including interference that may cause undesired operation.
FCC Caution: Any changes or modifications not expressly approved by the
party responsible for compliance could void the user's authority to operate
this equipment.
For product available in the USA/Canada market, only channel 1~11 can be
operated. Selection of other channels is not possible.
This device and its antenna(s) must not be co-located or operation in
conjunction with any other antenna or transmitter.
This device is going to be operated in 5.15~5.25GHz frequency range, it is
restricted in indoor environment only.
– 3 –
C
OMPLIANCES
IMPORTANT NOTE:
FCC RADIATION EXPOSURE STATEMENT
This equipment complies with FCC radiation exposure limits set forth for an
uncontrolled environment. This equipment should be installed and
operated with minimum distance 20 cm between the radiator & your body.
IC STATEMENT :
This Class B digital apparatus complies with Canadian ICES-003.
Operation is subject to the following two conditions: (1) this device may
not cause interference, and (2) this device must accept any interference,
including interference that may cause undesired operation of the device.
Cet appareil numérique de la classe B conforme á la norme NMB-003 du
Canada.
To reduce potential radio interference to other users, the antenna type and
its gain should be so chosen that the equivalent isotropically radiated
power (e.i.r.p) is not more than that permitted for successful
communication.
This device has been designed to operate with the antennas listed below,
and having a maximum gain of 5 dB. Antennas not included in this list or
having a gain greater than 5 dB are strictly prohibited for use with this
device. The required antenna impedance is 50 ohms.
The device could automatically discontinue transmission in case of absence
of information to transmit, or operational failure. Note that this is not
intended to prohibit transmission of control or signaling information or the
use of repetitive codes where required by the technology.
The device for the band 5150-5250 MHz is only for indoor usage to reduce
potential for harmful interference to co-channel mobile satellite systems.
The maximum antenna gain permitted (for devices in the band 5725-5825
MHz) to comply with the e.i.r.p. limits specified for point-to-point and non
point-to-point operation as appropriate, as stated in section A9.2(3).
The maximum antenna gain permitted (for devices in the bands 5250-5350
MHz and 5470-5725 MHz) to comply with the e.i.r.p. limit.
High-power radars are allocated as primary users (meaning they have
priority) of the bands 5250-5350 MHz and 5650-5850 MHz and these
radars could cause interference and/or damage to LE-LAN devices.
IMPORTANT NOTE:
ADIATION EXPOSURE STATEMENT:
IC R
This equipment complies with IC RSS-102 radiation exposure limits set
forth for an uncontrolled environment. This equipment should be installed
and operated with minimum distance 20 cm between the radiator & your
body.
Marking by the above symbol indicates compliance with the Essential
Requirements of the R&TTE Directive of the European Union (1999/5/EC).
This equipment meets the following conformance standards:
◆EN 60950-1 (IEC 60950-1) - Product Safety
◆EN 301 893 - Technical requirements for 5 GHz radio equipment
◆EN 300 328 - Technical requirements for 2.4 GHz radio equipment
◆EN 301 489-1 / EN 301 489-17 - EMC requirements for radio
equipment
This device is intended for use in the following European Community and
EFTA countries:
Requirements for indoor vs. outdoor operation, license requirements and
allowed channels of operation apply in some countries as described below:
◆In Italy the end-user must apply for a license from the national
spectrum authority to operate this device outdoors.
◆In Belgium outdoor operation is only permitted using the 2.46 - 2.4835
GHz band: Channel 13.
◆In France outdoor operation is only permitted using the 2.4 - 2.454 GHz
band: Channels 1 - 7.
– 5 –
C
OMPLIANCES
N
OTE
:
The user must use the configuration utility provided with this
product to ensure the channels of operation are in conformance with the
spectrum usage rules for European Community countries as described
below.
◆This device requires that the user or installer properly enter the current
country of operation in the command line interface as described in the
user guide, before operating this device.
◆This device will automatically limit the allowable channels determined
by the current country of operation. Incorrectly entering the country of
operation may result in illegal operation and may cause harmful
interference to other systems. The user is obligated to ensure the
device is operating according to the channel limitations, indoor/outdoor
restrictions and license requirements for each European Community
country as described in this document.
◆This device employs a radar detection feature required for European
Community operation in the 5 GHz band. This feature is automatically
enabled when the country of operation is correctly configured for any
European Community country. The presence of nearby radar operation
may result in temporary interruption of operation of this device. The
radar detection feature will automatically restart operation on a channel
free of radar.
◆The 5 GHz Turbo Mode feature is not allowed for operation in any
European Community country. The current setting for this feature is
found in the 5 GHz 802.11a Radio Settings Window as described in the
user guide.
◆The 5 GHz radio's Auto Channel Select setting described in the user
guide must always remain enabled to ensure that automatic 5 GHz
channel selection complies with European requirements. The current
setting for this feature is found in the 5 GHz 802.11a Radio Settings
Window as described in the user guide.
◆This device is restricted to indoor use when operated in the European
Community using the 5.15 - 5.35 GHz band: Channels 36, 40, 44, 48,
52, 56, 60, 64. See table below for allowed 5 GHz channels by country.
◆This device may be operated indoors or outdoors in all countries of the
European Community using the 2.4 GHz band: Channels 1 - 13, except
where noted below.
■
In Italy the end-user must apply for a license from the national
spectrum authority to operate this device outdoors.
■
In Belgium outdoor operation is only permitted using the 2.46 -
2.4835 GHz band: Channel 13.
■
In France outdoor operation is only permitted using the 2.4 - 2.454
GHz band: Channels 1 - 7.
– 6 –
C
OMPLIANCES
OPERATION USING
5 GHZ CHANNELSINTHE EUROPEAN COMMUNITY
The user/installer must use the provided configuration utility to check the
current channel of operation and make necessary configuration changes to
ensure operation occurs in conformance with European National spectrum
usage laws as described below and elsewhere in this document.
Allowed Frequency BandsAllowed Channel NumbersCountries
DECLARATIONOF CONFORMITYIN LANGUAGESOFTHE EUROPEAN
COMMUNITY
Czech
Česky
Estonian
Eesti
EnglishHereby, Edgecore, declares that this Radio LAN device is in compliance with the essential
Finnish
Suomi
Dutch
Nederlands
French
Français
Swedish
Svenska
Danish
Dansk
German
Deutsch
Greek
Ελληνική
Edgecore tímto prohlašuje, že tento Radio LAN device je ve shodě se základními
požadavky a dalšími příslušnými ustanoveními směrnice 1999/5/ES.
Käesolevaga kinnitab Edgecore seadme Radio LAN device vastavust direktiivi 1999/5/EÜ
põhinõuetele ja nimetatud direktiivist tulenevatele teistele asjakohastele sätetele.
requirements and other relevant provisions of Directive 1999/5/EC.
Valmistaja Edgecore vakuuttaa täten että Radio LAN device tyyppinen laite on direktiivin
1999/5/EY oleellisten vaatimusten ja sitä koskevien direktiivin muiden ehtojen mukainen.
Hierbij verklaart Edgecore dat het toestel Radio LAN device in overeenstemming is met
de essentiële eisen en de andere relevante bepalingen van richtlijn 1999/5/EG
Bij deze Edgecore dat deze Radio LAN device voldoet aan de essentiële eisen en aan de
overige relevante bepalingen van Richtlijn 1999/5/EC.
Par la présente Edgecore déclare que l'appareil Radio LAN device est conforme aux
exigences essentielles et aux autres dispositions pertinentes de la directive 1999/5/CE
Härmed intygar Edgecore att denna Radio LAN device står I överensstämmelse med de
väsentliga egenskapskrav och övriga relevanta bestämmelser som framgår av direktiv
1999/5/EG.
Undertegnede Edgecore erklærer herved, at følgende udstyr Radio LAN device
overholder de væsentlige krav og øvrige relevante krav i direktiv 1999/5/EF
Hiermit erklärt Edgecore, dass sich dieser/diese/dieses Radio LAN device in
Übereinstimmung mit den grundlegenden Anforderungen und den anderen relevanten
Vorschriften der Richtlinie 1999/5/EG befindet". (BMWi)
Hiermit erklärt Edgecore die Übereinstimmung des Gerätes Radio LAN device mit den
grundlegenden Anforderungen und den anderen relevanten Festlegungen der Richtlinie
1999/5/EG. (Wien)
με την παρουσα Edgecore δηλωνει οτι radio LAN device συμμορφωνεται προσ τισ
ουσιωδεισ
απαιτησεισ και τισ λοιπεσ σχετικεσ διαταξεισ τησ οδηγιασ 1999/5/εκ.
– 7 –
C
OMPLIANCES
Hungarian
Magyar
Italian
Italiano
Latvian
Latviski
Lithuanian
Lietuvių
Maltese
Malti
Spanish
Español
Polish
Polski
Portuguese
Português
Slovak
Slovensky
Slovenian
Slovensko
Alulírott, Edgecore nyilatkozom, hogy a Radio LAN device megfelel a vonatkozó alapvetõ
követelményeknek és az 1999/5/EC irányelv egyéb elõírásainak.
Con la presente Edgecore dichiara che questo Radio LAN device è conforme ai requisiti
essenziali ed alle altre disposizioni pertinenti stabilite dalla direttiva 1999/5/CE.
Ar šo Edgecore deklarē, ka Radio LAN device atbilst Direktīvas 1999/5/EK būtiskajām
prasībām un citiem ar to saistītajiem noteikumiem.
Šiuo Edgecore deklaruoja, kad šis Radio LAN device atitinka esminius reikalavimus ir
kitas 1999/5/EB Direktyvos nuostatas.
Hawnhekk, Edgecore, jiddikjara li dan Radio LAN device jikkonforma mal-ħtiġijiet
essenzjali u ma provvedimenti oħrajn relevanti li hemm fid-Dirrettiva 1999/5/EC.
Por medio de la presente Edgecore declara que el Radio LAN device cumple con los
requisitos esenciales y cualesquiera otras disposiciones aplicables o exigibles de la
Directiva 1999/5/CE
Niniejszym Edgecore oświadcza, że Radio LAN device jest zgodny z zasadniczymi
wymogami oraz pozostałymi stosownymi postanowieniami Dyrektywy 1999/5/EC.
Edgecore declara que este Radio LAN device está conforme com os requisitos
essenciais e outras disposições da Directiva 1999/5/CE.
Edgecore týmto vyhlasuje, že Radio LAN device spĺňa základné požiadavky a všetky
príslušné ustanovenia Smernice 1999/5/ES.
Edgecore izjavlja, da je ta radio LAN device v skladu z bistvenimi zahtevami in ostalimi
relevantnimi določili direktive 1999/5/ES.
– 8 –
ABOUT THIS GUIDE
PURPOSE This guide gives specific information on how to install the 11n wireless
access point and its physical and performance related characteristics. It
also gives information on how to operate and use the management
functions of the access point.
AUDIENCE This guide is intended for use by network administrators who are
responsible for installing, operating, and maintaining network equipment;
consequently, it assumes a basic working knowledge of LANs (Local Area
Networks), the Internet Protocol (IP), and Simple Network Management
Protocol (SNMP).
CONVENTIONS The following conventions are used throughout this guide to show
information:
N
OTE
:
Emphasizes important information or calls your attention to related
features or instructions.
C
AUTION
damage the system or equipment.
W
ARNING
:
Alerts you to a potential hazard that could cause loss of data, or
:
Alerts you to a potential hazard that could cause personal injury.
RELATED PUBLICATIONS As part of the access point’s software, there is an online web-based help
that describes all management related features.
REVISION HISTORY This section summarizes the changes in each revision of this guide.
SEPTEMBER 2009 REVISION
This is the first revision of this guide. It is valid for software version
1.1.0.13.
– 9 –
CONTENTS
COMPLIANCES 3
A
BOUT THIS GUIDE 9
ONTENTS 10
C
F
IGURES 15
T
ABLES 18
NDEXOF CLI COMMANDS 21
I
SECTION IGETTING STARTED 24
1INTRODUCTION 25
Key Hardware Features 25
Description of Capabilities 25
Package Contents 26
Hardware Description 27
Antennas 28
External Antenna Connectors 28
LED Indicators 30
Console Port 31
Ethernet Port 31
Power Connector 31
Reset Button 31
2NETWORK TOPOLOGIES 32
Interference Issues 32
Infrastructure Wireless LAN 32
Infrastructure Wireless LAN for Roaming Wireless PCs 33
Infrastructure Wireless Bridge 34
3INSTALLINGTHE ACCESS POINT 36
– 10 –
C
ONTENTS
Location Selection 36
Mounting on a Horizontal Surface 37
Mounting on a Wall 38
Connecting and Powering On 39
4INITIAL CONFIGURATION 40
Connecting to the Login Page 40
Home Page and Main Menu 41
Common Web Page Buttons 42
Quick Start 43
Step 1 43
Step 2 44
Step 3 46
Main Menu Items 47
SECTION IIWEB CONFIGURATION 48
5SYSTEM SETTINGS 49
Administration Settings 50
IP Address 51
RADIUS Settings 52
Primary and Secondary RADIUS Server Setup 52
RADIUS Accounting 53
System Time 54
SNTP Server Settings 55
Time Zone Setting 55
Daylight Saving Settings 55
SpectraLink Voice Priority 56
VLAN Configuration 56
System Logs 58
Quick Start Wizard 59
6MANAGEMENT SETTINGS 60
Remote Management Settings 60
Access Limitation 62
Simple Network Management Protocol 63
SNMP Basic Settings 63
– 11 –
C
ONTENTS
SNMP Trap Settings 65
View Access Control Model 66
SNMPv3 Users 67
SNMPv3 Targets 68
SNMPv3 Notification Filters 69
7ADVANCED SETTINGS 71
Local Bridge Filter 71
Link Layer Discovery Protocol 72
Access Control Lists 74
Source Address Settings 74
Destination Address Settings 75
Ethernet Type 76
8WIRELESS SETTINGS 77
Spanning Tree Protocol (STP) 77
Bridge 78
Ethernet Interface 79
Wireless Interface 79
Authentication 80
Local MAC Authentication 80
RADIUS MAC Authentication 82
Interface Mode 83
Radio Settings 84
Virtual Access Points (VAPs) 87
VAP Basic Settings 88
WDS-STA Mode 89
Wireless Security Settings 90
Wired Equivalent Privacy (WEP) 92
Quality of Service (QoS) 93
9MAINTENANCE SETTINGS 98
Upgrading Firmware 98
Running Configuration 101
Resetting the Access Point 102
10 STATUS INFORMATION 103
AP Status 103
AP System Configuration 103
– 12 –
C
ONTENTS
AP Wireless Configuration 105
Station Status 105
Event Logs 106
SECTION IIICOMMAND LINE INTERFACE 108
11 USINGTHE COMMAND LINE INTERFACE 110
Console Connection 110
Telnet Connection 111
Entering Commands 112
Keywords and Arguments 112
Minimum Abbreviation 112
Command Completion 112
Getting Help on Commands 112
Showing Commands 112
Negating the Effect of Commands 113
Using Command History 113
Understanding Command Modes 113
Exec Commands 114
Configuration Commands 114
Command Line Processing 115
12 GENERAL COMMANDS 116
13 S
YSTEM MANAGEMENT COMMANDS 120
YSTEM LOGGING COMMANDS 135
14 S
15 S
YSTEM CLOCK COMMANDS 139
16 DHCP R
17 SNMP C
18 F
LASH/FILE COMMANDS 160
ELAY COMMANDS 144
OMMANDS 146
19 RADIUS C
20 802.1X A
21 MAC A
LIENT COMMANDS 163
UTHENTICATION COMMANDS 169
DDRESS AUTHENTICATION COMMANDS 171
– 13 –
C
ONTENTS
22 FILTERING COMMANDS 175
23 S
PANNING TREE COMMANDS 180
24 WDS B
25 E
26 W
27 W
28 L
29 VLAN C
30 WMM C
RIDGE COMMANDS 191
THERNET INTERFACE COMMANDS 193
IRELESS INTERFACE COMMANDS 198
IRELESS SECURITY COMMANDS 212
INK LAYER DISCOVERY COMMANDS 222
OMMANDS 226
OMMANDS 229
SECTION IVAPPENDICES 234
ATROUBLESHOOTING 235
Diagnosing LED Indicators 235
Before Contacting Technical Support 235
BWDS SETUP EXAMPLES 238
Basic WDS Link Between Two APs 239
WDS Links Between Three or More APs 244
CHARDWARE SPECIFICATIONS 247
DC
ABLESAND PINOUTS 250
Twisted-Pair Cable Assignments 250
10/100BASE-TX Pin Assignments 250
Straight-Through Wiring 251
Crossover Wiring 252
1000BASE-T Pin Assignments 252
Console Port Pin Assignments 254
GLOSSARY 255
NDEX 259
I
– 14 –
FIGURES
Figure 1: Top Panel27
Figure 2: Rear Panel27
Figure 3: Ports28
Figure 4: External Antenna Connectors29
Figure 5: Screw-off External Antenna Connector - Close Up29
Figure 6: LEDs30
Figure 7: Infrastructure Wireless LAN33
Figure 8: Infrastructure Wireless LAN for Roaming Wireless PCs34
Figure 9: Bridging Mode35
Figure 10: Attach Feet37
Figure 11: Wall Mounting38
Figure 12: Login Page40
Figure 13: Home Page41
Figure 14: Set Configuration Changes42
Figure 15: Help Menu42
Figure 16: Quick Start - Step 143
Figure 17: Quick Start - Step 244
Figure 18: Quick Start - Step 346
Figure 19: Administration50
Figure 20: IP Configuration51
Figure 21: RADIUS Settings53
Figure 22: SNTP Settings54
Figure 23: SVP Settings56
Figure 24: Setting the VLAN Identity57
Figure 25: System Log Settings58
Figure 26: Remote Management61
Figure 27: Access Limitation62
Figure 28: SNMP Basic Settings64
Figure 29: SNMP Trap Settings65
Figure 30: SNMP VACM66
Figure 31: Configuring SNMPv3 Users67
– 15 –
F
IGURES
Figure 32: SNMPv3 Targets69
Figure 33: SNMP Notification Filter69
Figure 34: Local Bridge Filter71
Figure 35: LLDP Settings72
Figure 36: Source ACLs74
Figure 37: Destination ACLs75
Figure 38: Ethernet Type Filter76
Figure 39: Spanning Tree Protocol78
Figure 40: Local Authentication81
Figure 41: RADIUS Authentication82
Figure 42: Interface Mode83
Figure 43: Radio Settings84
Figure 44: VAP Settings87
Figure 45: VAP Basic Settings88
Figure 46: WDS-STA Mode89
Figure 47: Configuring VAPs - Common Settings90
Figure 48: WEP Configuration92
Figure 49: WMM Backoff Wait Times95
Figure 50: QoS95
Figure 51: Firmware99
Figure 52: Running Configuration File101
Figure 53: Resetting the Access Point102
Figure 54: AP System Configuration103
Figure 55: AP Wireless Configuration105
Figure 56: Station Status105
Figure 57: Event Logs106
Figure 58: Basic WDS Link Between Two APs239
Figure 59: WDS Example — Access Point A VAP Setting240
Figure 60: WDS Example — Access Point A VAP Details240
Figure 61: WDS Example — Access Point A WDS-AP VAP Setting241
Figure 62: WDS Example — Access Point A VAP SSID and MAC241
Figure 63: WDS Example — Access Point B VAP Details242
Figure 64: WDS Example — Access Point B WDS-STA VAP Setting242
Figure 65: WDS Example — Access Point A Station Status243
Figure 66: WDS Links Between Three or More APs244
Figure 67: RJ-45 Connector250
– 16 –
F
IGURES
Figure 68: Straight Through Wiring251
Figure 69: Crossover Wiring252
Figure 70: RJ-45 Console254
– 17 –
TABLES
Table 1: Key Hardware Features 25
Table 2: LED Behavior 30
Table 3: Logging Levels 59
Table 4: WMM Access Categories 94
Table 5: Command Modes 114
Table 6: Keystroke Commands 115
Table 7: General Commands 116
Table 8: System Management Commands 120
Table 9: Country Codes 121
Table 10: System Management Commands 135
Table 11: Logging Levels 137
Table 12: System Clock Commands 139
Table 13: DHCP Relay Commands 144
Table 14: SNMP Commands 146
Table 15: Flash/File Commands 160
Table 16: RADIUS Client Commands 163
Table 17: 802.1x Authentication 169
Table 18: MAC Address Authentication 171
Table 19: Filtering Commands 175
Table 20: Spanning Tree Commands 180
Table 21: WDS Bridge Commands 191
Table 22: Ethernet Interface Commands 193
Table 23: Wireless Interface Commands 198
Table 24: Wireless Security Commands 212
Table 25: Link Layer Discovery Commands 222
Table 26: VLAN Commands 226
Table 27: WMM Commands 229
Table 28: AP Parameters 231
Table 29: BSS Parameters 231
Table 30: LED Indicators 235
Table 31: 10/100BASE-TX MDI and MDI-X Port Pinouts 251
– 18 –
T
ABLES
Table 32: 1000BASE-T MDI and MDI-X Port Pinouts 253
short-guard-interval 204
show apmanagement 129
show authentication 174
show bridge br-conf 187
show bridge forward address 189
show bridge port-conf interface 187
show bridge status 188
show bridge stp 186
show config 130
show dual-image 162
show event-log 138
show filters 179
show interface ethernet 196
show interface wireless 209
show line 119
show lldp 225
show logging 138
show radius 168
show snmp 157
show snmp filter 157
show snmp target 156
show snmp users 156
show snmp vacm group 158
show snmp vacm view 158
show sntp 142
show station 211
show system 129
show version 130
show wds wireless 192
shutdown 196
shutdown 209
snmp-server community 147
snmp-server contact 147
snmp-server enable server 148
snmp-server filter 155
snmp-server host 149
snmp-server location 148
snmp-server target 154
snmp-server trap 150
snmp-server user 153
snmp-server vacm group 152
snmp-server vacm view 151
sntp-server date-time 140
sntp-server daylight-saving 141
sntp-server enabled 140
sntp-server ip 139
sntp-server timezone 142
ssid 207
system name 122
wds ap 191
wds sta 191
wmm 229
wmm-acknowledge-policy 230
wmmparam 230
wpa-pre-shared-key 218
– 22 –
I
NDEX OF
CLI C
OMMANDS
– 23 –
S
ECTION
GETTING STARTED
This section provides an overview of the access point, and introduces some
basic concepts about wireless networking. It also describes the basic
settings required to access the management interface.
This section includes these chapters:
◆“Introduction” on page 25
◆“Network Topologies” on page 32
◆“Installing the Access Point” on page 36
I
◆“Initial Configuration” on page 40
– 24 –
1INTRODUCTION
The EAP8518 is an IEEE 802.11n access point (AP) that meets draft 2.0
standards. It is fully interoperable with older 802.11a/b/g standards,
providing a transparent, wireless high speed data communication between
the wired LAN and fixed or mobile devices. The unit includes three
detachable dual-band 2.4/5 GHz antennas with the option to attach
alternative antennas that can extend or shape the network coverage area.
KEY HARDWARE FEATURES
The following table describes the main hardware features of the AP.
Table 1: Key Hardware Features
FeatureDescription
AntennasThree detachable dual-band 2.4/5 GHz MIMO antennas.
LAN PortOne 1000BASE-T RJ-45 port that supports a Power over Ethernet
Console PortConsole connection through an RJ-45 port with included RS-232
(PoE) connection to power the device.
serial cable.
Reset ButtonFor resetting the unit and restoring factory defaults.
LEDsProvides LED indicators for system status, wireless radio status,
PowerPower over Ethernet (PoE) support through the RJ-45 Ethernet
Mounting OptionsCan be mounted on a wall, or on any horizontal surface such as a
DESCRIPTIONOF CAPABILITIES
The EAP8518 supports up to eight Virtual Access Point (VAP) interfaces,
which allow traffic to be separated for different user groups within the
same AP service area. The VAPs can support up to a total of 64 wireless
clients, whereby the clients associate with each VAP in the same way as
they would with physically separate access points. This means that each
VAP can be configured with its own Service Set Identification (SSID),
security settings, VLAN assignments, and other parameters, allowing the
AP to serve a diverse range of client needs in an area from a single unit.
In addition, the access point offers full network management capabilities
through an easy to configure web interface, a command line interface for
and LAN port status.
port, or from an external AC power adapter.
desktop or shelf.
– 25 –
C
HAPTER
Package Contents
1
| Introduction
PACKAGE CONTENTS
initial configuration and troubleshooting, and support for Simple Network
Management tools.
The EAP8518 utilises MIMO technology and Spatial Multiplexing to achieve
the highest possible data rate and throughput on the 802.11n frequency.
The unit’s PoE RJ-45 port provides a 1 Gbps full-duplex link to a wired LAN.
The EAP8518 package includes:
◆11n Access Point (EAP8518)
◆RJ-45 to RS-232 console cable
◆AC power adapter
◆Four rubber feet
◆User Guide CD
Inform your dealer if there are any incorrect, missing or damaged parts. If
possible,retain the carton, including the original packing materials. Use
them again to repack the product in case there is a need to return it.
– 26 –
HARDWARE DESCRIPTION
LED Indicators
Antennas
DC Power Socket
RJ-45 PoE Port
Reset Button
RJ-45 Console Port
Figure 1: Top Panel
C
HAPTER
1
| Introduction
Hardware Description
Figure 2: Rear Panel
– 27 –
C
DC Power Port
RJ-45 PoE Port
RJ-45 Console Port
HAPTER
Hardware Description
1
| Introduction
Figure 3: Ports
ANTENNAS The access point includes three integrated external MIMO (multiple-input
EXTERNAL ANTENNA
CONNECTORS
and multiple-output) antennas. MIMO uses multiple antennas for
transmitting and receiving radio signals to improve data throughput and
link range.
Each antenna transmits the outgoing signal as a toroidal sphere (doughnut
shaped), with the coverage extending most in a direction perpendicular to
the antenna. Therefore, the antennas should be adjusted to an angle that
provides the appropriate coverage for the service area.
The antennas supplied with the AP screw off in a clockwise manner and can
be replaced with alternative antennas that can extend or shape the
coverage area.
– 28 –
Figure 4: External Antenna Connectors
C
HAPTER
1
| Introduction
Hardware Description
Figure 5: Screw-off External Antenna Connector - Close Up
– 29 –
C
Ethernet
Link/Activity
System Error
or Failure
Power
802.11 a/b/g/n
Link/Activity
HAPTER
1
| Introduction
Hardware Description
LED INDICATORS The access point includes four status LED indicators, as described in the
following figure and table.
Figure 6: LEDs
Table 2: LED Behavior
LEDStatusDescription
LANOffEthernet RJ-45 has no valid link.
Blue
Ethernet RJ-45 has a 1000 Mbps link.
network activity.
Green
Ethernet RJ-45 has a 100 Mbps link.
network activity.
Amber
Ethernet RJ-45 has a 10 Mbps link.
network activity.
WLANOff
Green
The AP radio is disabled.
The radio is operating at 5 GHz (802.11a/n). Blinking
indicates network activity.
Yel low
The radio is operating at 2.4 GHz (802.11b/g/n). Blinking
indicates network activity.
Diag/FailOff
Red
Blinking
PowerOff
Yel low
The AP is operating normally.
The AP has detected a fault.
The system is initializing.
The AP has no power.
The AP is receiving power.
Blinking indicates
Blinking indicates
Blinking indicates
– 30 –
C
HAPTER
1
| Introduction
Hardware Description
CONSOLE PORT This port is used to connect a console device to the access point through a
serial cable. The console device can be a PC or workstation running a VT100 terminal emulator, or a VT-100 terminal. A crossover RJ-45 to DB-9
cable is supplied with the unit for connecting to the console port.
ETHERNET PORT The access point has one 1000BASE-T RJ-45 port that can be attached
directly to 10BASE-T/100BASE-TX/1000BASE-TX LAN segments.
This port supports automatic MDI/MDI-X operation, so you can use
straight-through cables for all network connections to PCs, switches, or
hubs.
The access point appears as an Ethernet node and performs a bridging
function by moving packets from the wired LAN to remote workstations on
the wireless infrastructure.
N
OTE
:
The RJ-45 port also supports Power over Ethernet (PoE) based on
the IEEE 802.3af standard. Refer to the description for the “Power
Connector” for information on supplying power to the access point’s
network port from a network device, such as a switch or power injector,
that provides Power over Ethernet (PoE).
POWER CONNECTOR The access point does not have a power switch. It is powered on when
connected to the AC power adapter, and the power adapter is connected to
a power source. The power adapter automatically adjusts to any voltage
between 100~240 volts at 50 or 60 Hz, and supplies 12 volts DC power to
the unit. No voltage range settings are required.
The access point may also receive Power over Ethernet (PoE) from a switch
or other network device that supplies power over the network cable based
on the IEEE 802.3af standard.
N
OTE
:
The access point supports both endspan and midspan PoE.
If the access point is connected to a PoE source device and also connected
to a local power source through the AC power adapter, AC power will be
disabled.
RESET BUTTON This button can be used to restart the AP.
– 31 –
2NETWORK TOPOLOGIES
Wireless networks support a standalone configuration as well as an
integrated configuration with 10/100/1000 Mbps Ethernet LANs. The
EAP8518 also provides bridging services that can be configured
independently on on any of the virtual AP (VAP) interfaces.
Access points can be deployed to support wireless clients and connect
wired LANs in the following configurations:
◆Infrastructure for wireless LANs
◆Infrastructure wireless LAN for roaming wireless PCs
◆Infrastructure wireless bridge to connect wired LANs
INTERFERENCE ISSUES
The 802.11b, 802.11g and 802.11n frequency band operating at 2.4 GHz
can easily encounter interference from other 2.4 GHz devices, such as
other 802.11b/g/n wireless devices, cordless phones and microwave
ovens. If you experience poor wireless LAN performance, try the following
measures:
◆Limit any possible sources of radio interference within the service area
◆Increase the distance between neighboring access points
◆Decrease the signal strength of neighboring access points
◆Increase the channel separation of neighboring access points (e.g. up
to 3 channels of separation for 802.11b, or up to 4 channels for
802.11a, or up to 5 channels for 802.11g)
INFRASTRUCTURE WIRELESS LAN
The access point also provides access to a wired LAN for wireless
workstations. An integrated wired/wireless LAN is called an Infrastructure
configuration. A Basic Service Set (BSS) consists of a group of wireless PC
users, and an access point that is directly connected to the wired LAN.
Each wireless PC in this BSS can talk to any computer in its wireless group
via a radio link, or access other computers or network resources in the
wired LAN infrastructure via the access point.
– 32 –
C
Server
Switch
Desktop PC
Access Point
Wired LAN Extension
to Wireless Clients
Desktop PC
Notebook PC
HAPTER
Infrastructure Wireless LAN for Roaming Wireless PCs
2
| Network Topologies
The infrastructure configuration extends the accessibility of wireless PCs to
the wired LAN.
A wireless infrastructure can be used for access to a central database, or
for connection between mobile workers, as shown in the following figure.
Figure 7: Infrastructure Wireless LAN
INFRASTRUCTURE WIRELESS LAN FOR ROAMING WIRELESS PCS
The Basic Service Set (BSS) defines the communications domain for each
access point and its associated wireless clients. The BSS ID is a 48-bit
binary number based on the access point’s wireless MAC address, and is
set automatically and transparently as clients associate with the access
point. The BSS ID is used in frames sent between the access point and its
clients to identify traffic in the service area.
The BSS ID is only set by the access point, never by its clients. The clients
only need to set the Service Set Identifier (SSID) that identifies the service
set provided by one or more access points. The SSID can be manually
configured by the clients, can be detected in an access point’s beacon, or
can be obtained by querying for the identity of the nearest access point.
For clients that do not need to roam, set the SSID for the wireless card to
that used by the access point to which you want to connect.
A wireless infrastructure can also support roaming for mobile workers.
More than one access point can be configured to create an Extended
Service Set (ESS). By placing the access points so that a continuous
coverage area is created, wireless users within this ESS can roam freely. All
– 33 –
C
<BSS 2>
<ESS>
<BSS 1>
Server
Switch
Desktop PC
Access Point
Seamless Roaming
Between Access Points
Desktop PC
Notebook PC
Access Point
Notebook PC
Switch
HAPTER
2
| Network Topologies
Infrastructure Wireless Bridge
wireless network cards and adapters and wireless access points within a
specific ESS must be configured with the same SSID.
Figure 8: Infrastructure Wireless LAN for Roaming Wireless PCs
INFRASTRUCTURE WIRELESS BRIDGE
The IEEE 802.11 standard defines a Wireless Distribution System (WDS)
for bridge connections between BSS areas (access points). The access
point uses WDS to forward traffic on links between units.
The access point supports WDS bridge links that are independently
configurable on each VAP. There are two WDS modes; WDS-AP and WDSSTA. Otherwise, VAPs operate in a normal AP mode.
◆AP Mode: The VAP provides services to clients as a normal access
point.
◆WDS-AP Mode: The VAP operates as an access point in WDS mode,
which accepts connections from client stations in WDS-STA mode.
◆WDS-STA Mode: The VAP operates as a client station in WDS mode,
which connects to an access point VAP in WDS-AP mode. The user
needs to specify the MAC address of the VAP in WDS-AP mode to which
it intends to connect.
– 34 –
Figure 9: Bridging Mode
WDS Links
Between Access Points
VAP 2
AP Mode
VAP 1
AP Mode
VAP 2
AP Mode
VAP 1
AP Mode
Network
Core
VAP 0
WDS-AP Mode
VAP 1
WDS-AP Mode
VAP 0
WDS-STA Mode
VAP 0
WDS-STA Mode
VAP 1
WDS-AP Mode
VAP 0
WDS-STA Mode
C
HAPTER
2
| Network Topologies
Infrastructure Wireless Bridge
– 35 –
3INSTALLINGTHE ACCESS POINT
This chapter describes how to install the access point.
LOCATION SELECTION
Choose a proper place for the access point. In general, the best location is
at the center of your wireless coverage area, within line of sight of all
wireless devices. Try to place the access point in a position that can best
cover its service area. For optimum performance, consider these
guidelines:
◆Mount the access point as high as possible above any obstructions in
the coverage area.
◆Avoid mounting next to or near building support columns or other
obstructions that may cause reduced signal or null zones in parts of the
coverage area.
◆Mount away from any signal absorbing or reflecting structures (such as
those containing metal).
The access point can be mounted on any horizontal surface, or a wall.
– 36 –
MOUNTINGONA HORIZONTAL SURFACE
To keep the access point from sliding on the surface, attach the four rubber
feet provided in the accessory kit to the marked circles on the bottom of
the access point.
Figure 10: Attach Feet
C
HAPTER
3
| Installing the Access Point
Mounting on a Horizontal Surface
– 37 –
C
Mounting Slots
HAPTER
Mounting on a Wall
3
| Installing the Access Point
MOUNTINGONA WALL
To mount on a wall follow the instructions below.
Figure 11: Wall Mounting
The access point should be mounted only to a wall or wood surface that is
at least 1/2-inch plywood or its equivalent. To mount the access point on a
wall, always use its wall-mounting bracket. The access point must be
mounted with the RJ-45 cable connector oriented upwards to ensure
proper operation.
1. Mark the position of the three screw holes on the wall. For concrete or
brick walls, you will need to drill holes and insert wall plugs for the
screws.
2. Insert the included 20-mm M4 tap screws into the holes, leaving about
2-3 mm clearance from the wall.
3. Line up the three mounting points on the AP with the screws in the wall,
then slide the AP down onto the screws until it is in a secured position.
– 38 –
CONNECTINGAND POWERING ON
Connect the power adapter to the access point, and the power cord to an
AC power outlet.
Otherwise, the access point can derive its operating power directly from
the RJ-45 port when connected to a device that provides IEEE 802.3af
compliant Power over Ethernet (PoE).
C
AUTION
Otherwise, the product may be damaged.
N
OTE
AC power source, AC will be disabled.
1. Observe the Self Test – When you power on the access point, verify
:
Use ONLY the power adapter supplied with this access point.
:
If the access point is connected to both a PoE source device and an
that the Power indicator turns on, and that the other indicators start
functioning as described under “LED Indicators” on page 30.
C
HAPTER
3
| Installing the Access Point
Connecting and Powering On
If the red DIAG/FAIL LED does not turn off, the self test has not
completed correctly. Refer to “Troubleshooting” on page 235.
2. Connect the Ethernet Cable – The access point can be connected to
a 10/100/1000 Mbps Ethernet through a network device such as a hub
or a switch. Connect your network to the RJ-45 port on the back panel
with Category 5E or better UTP Ethernet cable. When the access point
and the connected device are powered on, the Ethernet Link LED
should turn on indicating a valid network connection.
N
OTE
:
The RJ-45 port on the access point supports automatic MDI/MDI-X
operation, so you can use straight-through cables for all network
connections to PCs, switches, or hubs.
3. Position the Antennas – Each antenna emits a radiation pattern that
is toroidal (doughnut shaped), with the coverage extending most in the
direction perpendicular to the antenna. Therefore, the antennas should
be oriented so that the radio coverage pattern fills the intended
horizontal space. Also, the antennas should both be positioned along
the same axes, providing the same coverage area. For example, if the
access point is mounted on a horizontal surface, all antennas should be
positioned pointing vertically up to provide optimum coverage.
4. (Optional) Connect the Console Port – Connect the RJ-45 console
cable (included with access point) to the RS-232 console port for
accessing the command-line interface. You can manage the access
point using the console port, the web interface, or SNMP management
software.
– 39 –
4INITIAL CONFIGURATION
The EAP8518 offers a user-friendly web-based management interface for
the configuration of all the unit’s features. Any PC directly attached to the
unit can access the management interface using a web browser, such as
Internet Explorer (version 6.0 or above) or Firefox (version 2.0 or above).
CONNECTINGTOTHE LOGIN PAGE
It is recommended to make initial configuration changes by connecting a
PC directly to the EAP8518’s LAN port. The EAP8518 has a default IP
address of 192.168.1.1 and a subnet mask of 255.255.255.0. You must set
your PC IP address to be on the same subnet as the EAP8518 (that is, the
PC and EAP8518 addresses must both start 192.168.1.x).
To access the access point management interface, follow these steps:
1. Use your web browser to connect to the management interface using
the default IP address of 192.168.1.1.
2. Log into the interface by entering the default username “admin” and
password also “admin,” then click Login.
N
OTE
:
It is strongly recommended to change the default user name and
password the first time you access the web interface. For information on
changing user names and passwords, See “Administration Settings” on
page 50.
Figure 12: Login Page
– 40 –
HOME PAGEAND MAIN MENU
After logging in to the web interface, the Home page displays. The Home
page shows some basic settings for the AP, including Country Code and the
management access password.
Figure 13: Home Page
C
HAPTER
4
| Initial Configuration
Home Page and Main Menu
The web interface Main Menu menu provides access to all the configuration
settings available for the access point.
The following items are displayed on this page:
◆System Name – An alias for the access point, enabling the device to
be uniquely identified on the network. (Default: 11n_AP; Range: 1-32
characters)
◆Username – The name of the user is fixed as “admin” and is not
configurable.
◆Old Password – Type your old password. The default password is
“admin.”
◆New Password – The password for management access. (Length: 5-
32 characters, case sensitive)
◆Confirm New Password – Enter the password again for verification.
◆Country Code – This command configures the access point’s country
code, which identifies the country of operation and sets the authorized
radio channels.
– 41 –
C
HAPTER
Common Web Page Buttons
4
| Initial Configuration
C
AUTION
:
You must set the country code to the country of operation.
Setting the country code restricts operation of the access point to the radio
channels and transmit power levels permitted for wireless networks in the
specified country.
COMMON WEB PAGE BUTTONS
The list below describes the common buttons found on most web
management pages:
◆Set – Applies the new parameters and saves them to temporary RAM
memory. Also displays a screen to inform you when it has taken affect.
Clicking ‘OK’ returns to the home page. The running configuration will
not be saved upon a reboot unless you use the “Save Config” button.
Figure 14: Set Configuration Changes
◆Cancel – Cancels the newly entered settings and restores the originals.
◆Help – Displays the help window.
Figure 15: Help Menu
– 42 –
QUICK START
C
HAPTER
◆Logout – Ends the web management session.
◆Save Config – Saves the current configuration so that it is retained
after a restart.
The Quick Start menu is designed to help you configure the basic settings
required to get the access point up and running. Click ‘System’, followed by
‘Quick Start’.
4
| Initial Configuration
Quick Start
STEP 1 The first page of the Quick Start configures the system identification,
access password, and the Country Code.
Figure 16: Quick Start - Step 1
The following items are displayed on the first page of the Quick Start
wizard:
IDENTIFICATION
◆System Name — The name assigned to the access point.
(Default: 11n_AP)
CHANGE PASSWORD
◆Username — The name of the user is fixed as “admin” and is not
configurable.
– 43 –
C
HAPTER
Quick Start
4
| Initial Configuration
◆Old Password — If the unit has been configured with a password
◆New Password — The password for management access.
◆Confirm New Password — Enter the password again for verification.
COUNTRY CODE
◆Country Code — Configures the access point’s country code from a
C
Setting the country code restricts operation of the access point to the radio
channels and transmit power levels permitted for wireless networks in the
specified country.
already, enter that password, otherwise enter the default password
“admin.”
(Length: 5-32 characters, case sensitive)
drop down menu, which identifies the country of operation and sets the
authorized radio channels.
AUTION
:
You must set the country code to the country of operation.
◆Cancel — Cancels the newly entered settings and restores the orignals.
◆Next — Proceeds to the next page.
STEP 2 The Step 2 page of the Quick Start configures IP settings and DHCP client
status.
Figure 17: Quick Start - Step 2
– 44 –
C
HAPTER
4
| Initial Configuration
Quick Start
The following items are displayed on this page:
DHCP
◆DHCP Status — Enables/disables DHCP on the access point. (Default:
disabled)
◆IP Address — Specifies an IP address for management of the access
point. Valid IP addresses consist of four decimal numbers, 0 to 255,
separated by periods. (Default: 192.168.1.1.)
◆Subnet Mask — Indicates the local subnet mask. Select the desired
mask from the drop down menu. (Default: 255.255.255.0)
◆Default Gateway — The default gateway is the IP address of the
router for the access point, which is used if the requested destination
address is not on the local subnet. (Default: 192.168.1.254)
If you have management stations, DNS, RADIUS, or other network
servers located on another subnet, type the IP address of the default
gateway router in the text field provided.
◆Primary and Secondary DNS Address — The IP address of Domain
Name Servers on the network. A DNS maps numerical IP addresses to
domain names and can be used to identify network hosts by familiar
names instead of the IP addresses. (The default Primary and Secondary
DNS addresses are null values.)
◆Prev — Returns to the previous screen.
◆Cancel — Cancels the newly entered settings and restores the orignals.
◆Next — Proceeds to the final step in the Quick Start wizard.
– 45 –
C
HAPTER
Quick Start
4
| Initial Configuration
STEP 3 The Step 3 page of the Quick Start configures radio interface settings.
Figure 18: Quick Start - Step 3
The following items are displayed on this page:
INTERFACE SETTING
◆WiFi Mode — Sets the mode of operation of the radio chip to
802.11n/g (2.4 GHz) or 802.11n/a (5 GHz). (Default: 11n/g)
BASIC SETTING
◆SSID — Sets the service set identifier for the primary VAP.
(Default: EC_VAP_0)
SECURITY
◆Association Mode — Selects the security mode for association of
other access points and wireless devices to the access point. For more
information, see “Wireless Security Settings” on page 90.
(Default: Open System; Range: Open System, WPA, WPA-PSK, WPA2,
WPA2-PSK, WPA-WPA2-mixed, or WPA-WPA2-PSK-mixed)
◆Encryption Mode — The available data encryption methods depend on
the selected Association Mode. (Default: None)
■
None: Implements no encryption for Open System association.
■
WEP: WEP is used as the multicast encryption cipher. You should
select WEP only when both WPA and WEP clients are supported.
– 46 –
C
HAPTER
■
TKIP: TKIP is used as the multicast encryption cipher.
■
AES-CCMP: AES-CCMP is used as the multicast encryption cipher.
4
| Initial Configuration
Main Menu Items
AES-CCMP is the standard encryption cipher required for WPA2.
◆802.1x Reauthentication Refresh Rate — The time period after
which a connected client must be re-authenticated. During the
reauthentication process of verifying the client’s credentials on the
RADIUS server, the client remains connected the network. Only if
reauthentication fails is network access blocked. (Default: 3600
seconds; Range: 0-65535 seconds; 0=disabled)
N
OTE
:
When 802.1X is enabled, be sure to configure RADIUS server
details. For more information, see “RADIUS Settings” on page 52.
MAIN MENU ITEMS
To configure settings, click the relevant Main Menu item. Each Main Menu
item is sumarized below with links to the relevant section in this guide
where configuration parameters are described in detail:
◆System — Configures Management IP, WAN, LAN and QoS settings.
See “System Settings” on page 49.
◆Management — Configures SNMP, HTTP and Telnet settings. See
“Management Settings” on page 60.
◆Advanced — Confiures LLDP and Access Control Lists. See “Advanced
Settings” on page 71.
◆Wireless — Configures Wi-Fi access point settings. See “Wireless
Settings” on page 77.
◆Mantentance — Congifures firmware upgrades remote and locally. See
“Maintenance Settings” on page 98.
◆Information — Displays current system settings. See “Status
Information” on page 103.
– 47 –
S
ECTION
WEB CONFIGURATION
This section provides details on configuring the access point using the web
browser interface.
This section includes these chapters:
◆“System Settings” on page 49
◆“Management Settings” on page 60
◆“Advanced Settings” on page 71
◆“Wireless Settings” on page 77
II
◆“Maintenance Settings” on page 98
◆“Status Information” on page 103
– 48 –
5SYSTEM SETTINGS
This chapter describes basic system settings on the access point. It
includes the following sections:
◆“Administration Settings” on page 50
◆“IP Address” on page 51
◆“RADIUS Settings” on page 52
◆“System Time” on page 54
◆“SpectraLink Voice Priority” on page 56
◆“VLAN Configuration” on page 56
◆“System Logs” on page 58
◆“Quick Start Wizard” on page 59
– 49 –
C
HAPTER
Administration Settings
5
| System Settings
ADMINISTRATION SETTINGS
The Administration Settings page configures some basic settings for the AP,
such as the system identification name, the management access password,
and the wireless operation Country Code.
Figure 19: Administration
The following items are displayed on this page:
◆System Name — An alias for the access point, enabling the device to
be uniquely identified on the network. (Default: 11n_AP; Range: 1-32
characters)
◆Username — The user name is fixed as “admin” and cannot be
configured.
◆Old Password — Type your current password.
◆New Password — The password for management access.
(Length: 5-32 characters, case sensitive)
◆Confirm New Password — Enter the password again for verification.
◆Country Code — This command configures the access point’s country
code, which identifies the country of operation and sets the authorized
radio channels.
– 50 –
IP ADDRESS
C
C
AUTION
HAPTER
:
You must set the country code to the country of operation.
5
| System Settings
IP Address
Setting the country code restricts operation of the access point to the radio
channels and transmit power levels permitted for wireless networks in the
specified country.
Configuring the access point with an IP address expands your ability to
manage the access point. A number of access point features depend on IP
addressing to operate.
You can use the web browser interface to access IP addressing only if the
access point already has an IP address that is reachable through your
network.
By default, the access point will be not be automatically configured with IP
settings from a Dynamic Host Configuration Protocol (DHCP) server. The
default IP address is 192.168.1.1, subnet mask 255.255.255.0 and a
default gateway of 192.168.1.254.
Figure 20: IP Configuration
The following items are displayed on this page:
◆DHCP Status — Enables/disables DHCP on the access point.
◆IP Address — Specifies an IP address for management of the access
point. Valid IP addresses consist of four decimal numbers, 0 to 255,
separated by periods. (Default: 192.168.1.1.)
◆Subnet Mask — Indicates the local subnet mask. Select the desired
mask from the drop down menu. (Default: 255.255.255.0)
– 51 –
C
HAPTER
RADIUS Settings
5
| System Settings
◆Default Gateway — The default gateway is the IP address of the
router for the access point, which is used if the requested destination
address is not on the local subnet.
If you have management stations, DNS, RADIUS, or other network
servers located on another subnet, type the IP address of the default
gateway router in the text field provided.
◆Primary and Secondary DNS Address — The IP address of Domain
Name Servers on the network. A DNS maps numerical IP addresses to
domain names and can be used to identify network hosts by familiar
names instead of the IP addresses.
If you have one or more DNS servers located on the local network, type
the IP addresses in the text fields provided.
After you have network access to the access point, you can use the web
browser interface to modify the initial IP configuration, if needed.
If there is no DHCP server on your network, or DHCP fails, the access point
will automatically start up with a default IP address of 192.168.1.1
RADIUS SETTINGS
PRIMARYAND
SECONDARY RADIUS
ERVER SETUP
S
Remote Authentication Dial-in User Service (RADIUS) is an authentication
protocol that uses software running on a central server to control access to
RADIUS-aware devices on the network. An authentication server contains a
database of user credentials for each user that requires access to the
network.
A primary RADIUS server must be specified for the access point to
implement IEEE 802.1X network access control and Wi-Fi Protected Access
(WPA) wireless security. A secondary RADIUS server may also be specified
as a backup should the primary server fail or become inaccessible.
In addition, you can configure a RADIUS Accounting server to receive usersession accounting information from the access point. RADIUS Accounting
can be used to provide valuable information on user activity in the
network.
This guide assumes that you have already configured RADIUS server(s) to
support the access point. Configuration of RADIUS server software is
beyond the scope of this guide, refer to the documentation provided with
the RADIUS server software.
– 52 –
Figure 21: RADIUS Settings
C
HAPTER
5
| System Settings
RADIUS Settings
The following items are displayed on the RADIUS Settings page:
◆RADIUS Status — Enables/disables the primary RADIUS server.
◆IP Address — Specifies the IP address or host name of the RADIUS
server.
◆Port (1024-65535) — The UDP port number used by the RADIUS
server for authentication messages. (Range: 1024-65535; Default:
1812)
◆Key — A shared text string used to encrypt messages between the
access point and the RADIUS server. Be sure that the same text string
is specified on the RADIUS server. Do not use blank spaces in the
string. (Maximum length: 255 characters)
RADIUS ACCOUNTING The following items are displayed on the RADIUS Settings page:
◆Account Status — Enables/disables RADIUS accounting.
◆IP Address — Specifies the IP address or host name of the RADIUS
accounting server.
– 53 –
C
HAPTER
System Time
5
| System Settings
SYSTEM TIME
◆Port (1024-65535) — The UDP port number used by the RADIUS
accounting server for authentication messages. (Range: 1024-65535;
Default: 1813)
◆Key — A shared text string used to encrypt messages between the
access point and the RADIUS accounting server. Be sure that the same
text string is specified on the RADIUS server. Do not use blank spaces
in the string. (Maximum length: 255 characters)
◆Interim Update Timeout (60-86400) — The interval between
transmitting accounting updates to the RADIUS server. (Range: 6086400; Default: 300 seconds)
Simple Network Time Protocol (SNTP) allows the access point to set its
internal clock based on periodic updates from a time server (SNTP or NTP).
Maintaining an accurate time on the access point enables the system log to
record meaningful dates and times for event entries. If the clock is not set,
the access point will only record the time from the factory default set at the
last bootup.
The access point acts as an SNTP client, periodically sending time
synchronization requests to specific time servers. You can configure up to
two time server IP addresses. The access point will attempt to poll each
server in the configured sequence.
Figure 22: SNTP Settings
– 54 –
C
HAPTER
5
| System Settings
System Time
SNTP SERVER
SETTINGS
Configures the access point to operate as an SNTP client. When enabled, at
least one time server IP address must be specified.
◆SNTP Status — Enables/disables SNTP. (Default: enabled)
◆Primary Server — The IP address of an SNTP or NTP time server that
the access point attempts to poll for a time update.
◆Secondary Server — The IP address of a secondary SNTP or NTP time
server. The access point first attempts to update the time from the
primary server; if this fails it attempts an update from the secondary
server.
TIME ZONE SETTING SNTP uses Greenwich Mean Time, or GMT (sometimes referred to as
Coordinated Universal Time, or UTC) based on the time at the Earth’s
prime meridian, zero degrees longitude. To display a time corresponding to
your local time, you must indicate the number of hours your time zone is
located before (east) or after (west) GMT.
◆Time Zone — Select from the scroll down list the locale you are
situated most close to, for example for New York, select ‘(GMT-05)
Eastern Time (US & Canada)’.
DAYLIGHT SAVING
SETTINGS
The access point provides a way to automatically adjust the system clock
for Daylight Savings Time changes. To use this feature you must define the
month and date to begin and to end the change from standard time.
During this period the system clock is set back by one hour.
◆Daylight Saving Status — Enalbes/disables daylight savings time.
(Default: disabled)
When enabled, set the month, day, and week to start and stop the
daylight savings time.
– 55 –
C
HAPTER
SpectraLink Voice Priority
5
| System Settings
SPECTRALINK VOICE PRIORITY
SpectraLink Voice Priority (SVP) is a voice priority mechanism for WLANs.
SVP is an open, straightforward QoS approach that has been adopted by
most leading vendors of WLAN APs. SVP favors isochronous voice packets
over asynchronous data packets when contending for the wireless medium
and when transmitting packets onto the wired LAN.
Figure 23: SVP Settings
The following items are displayed on this page:
◆SVP Status — Enables/disables SVP on the access point.
VLAN CONFIGURATION
VLANs (virtual local area networks) are turned off by default when first
installing the access point. If turned on they will automatically tag any
packets received by the LAN port before sending them on to the relevant
VAP (virtual access point).
The access point can employ VLAN tagging support to control access to
network resources and increase security. VLANs separate traffic passing
between the access point, associated clients, and the wired network. There
can be a default VLAN for each VAP (Virtual Access Point) interface, and a
management VLAN for the access point.
Note the following points about the access point’s VLAN support:
◆The management VLAN is for managing the access point through
remote management tools, such as the web interface, SSH, SNMP, or
Telnet. The access point only accepts management traffic that is tagged
with the specified management VLAN ID.
◆All wireless clients associated to the access point are assigned to a
VLAN. Wireless clients are assigned to the default VLAN for the VAP
interface with which they are associated. The access point only allows
traffic tagged with default VLAN IDs to access clients associated on
each VAP interface.
– 56 –
C
HAPTER
5
| System Settings
VLAN Configuration
◆When VLAN support is enabled on the access point, traffic passed to the
wired network is tagged with the appropriate VLAN ID, either a VAP
default VLAN ID, or the management VLAN ID. Traffic received from the
wired network must also be tagged with one of these known VLAN IDs.
Received traffic that has an unknown VLAN ID or no VLAN tag is
dropped.
◆When VLAN support is disabled, the access point does not tag traffic
passed to the wired network and ignores the VLAN tags on any received
frames.
N
OTE
:
Before enabling VLAN tagging on the access point, be sure to
configure the attached network switch port to support tagged VLAN frames
from the access point’s management VLAN ID and default VLAN IDs.
Otherwise, connectivity to the access point will be lost when you enable the
VLAN feature.
◆Native VLAN ID(1-4094) — If enabled the packets received by the
LAN port must be tagged within the Management VLAN ID (native VLAN
ID). (Range: 1-4094)
– 57 –
C
HAPTER
System Logs
5
| System Settings
SYSTEM LOGS
The access point can be configured to send event and error messages to a
System Log Server. The system clock can also be synchronized with a time
server, so that all the messages sent to the Syslog server are stamped with
the correct time and date.
Figure 25: System Log Settings
The following items are displayed on this page:
◆Syslog Status — Enables/disables the logging of error messages.
(Default: enabled)
◆Server 1~4 — Enables the sending of log messages to a Syslog server
host. Up to four Syslog servers are supported on the access point.
(Default: disabled)
◆IP — The IP address or name of a Syslog server. (Server 1 Default:
10.7.16.98; Server 2 Default: 10.7.13.48; Server 3 Default:
10.7.123.123; Server 4 Default: 10.7.13.77)
◆UDP Port — The UDP port used by a Syslog server. (Range: 514 or
11024-65535; Server 1~2 Default: 514; Server 3 Default: 6553;
Server 4 Default: 5432)
◆Logging Console — Enables the logging of error messages to the
console. (Default: disabled)
– 58 –
C
HAPTER
5
| System Settings
Quick Start Wizard
◆Logging Level — Sets the minimum severity level for event logging.
(Default: Debug)
The system allows you to limit the messages that are logged by
specifying a minimum severity level. The following table lists the error
message levels from the most severe (Emergency) to least severe
(Debug). The message levels that are logged include the specified
minimum level up to the Emergency level.
Table 3: Logging Levels
Error LevelDescription
EmergencySystem unusable
AlertsImmediate action needed
CriticalCritical conditions (e.g., memory allocation, or free memory
NoticeNormal but significant condition, such as cold start
InformationalInformational messages only
DebugDebugging messages
error - resource exhausted)
QUICK START WIZARD
The Quick Start menu item is described in the preceding chapter, see
“Quick Start” on page 43.
– 59 –
6MANAGEMENT SETTINGS
This chapter describes management access settings on the access point. It
includes the following sections:
◆“Remote Management Settings” on page 60
◆“Access Limitation” on page 62
◆“Simple Network Management Protocol” on page 63
REMOTE MANAGEMENT SETTINGS
The Web, Telnet, and SNMP management interfaces are enabled and open
to all IP addresses by default. To provide more security for management
access to the access point, specific interfaces can be disabled and
management restricted to a single IP address or a limited range of IP
addresses.
Once you specify an IP address or range of addresses, access to
management interfaces is restricted to the specified addresses. If anyone
tries to access a management interface from an unauthorized address, the
access point will reject the connection.
Telnet is a remote management tool that can be used to configure the
access point from anywhere in the network. However, Telnet is not secure
from hostile attacks. The Secure Shell (SSH) can act as a secure
replacement for Telnet. The SSH protocol uses generated public keys to
encrypt all data transfers passing between the access point and SSHenabled management station clients and ensures that data traveling over
the network arrives unaltered. Clients can then securely use the local user
name and password for access authentication.
Note that SSH client software needs to be installed on the management
station to access the access point for management via the SSH protocol.
Both HTTP and HTTPS service can be enabled independently. If you enable
HTTPS, you must indicate this in the URL: https://device:port_number]
When you start HTTPS, the connection is established in this way:
◆The client authenticates the server using the server’s digital certificate.
◆The client and server negotiate a set of security protocols to use for the
connection.
– 60 –
C
HAPTER
6
| Management Settings
Remote Management Settings
◆The client and server generate session keys for encrypting and
decrypting data.
◆The client and server establish a secure encrypted connection.
◆A padlock icon should appear in the status bar for Internet Explorer.
Figure 26: Remote Management
The following items are displayed on Admin Interface page:
◆Telnet Access — Enables/disables management access from Telnet
interfaces. (Default: enabled)
◆Telnet Access Port — Sets the specified Telnet port for
communication. (Default: 23)
◆SSH Server — Enables/disables management access from SSH
Servers. (Default: enabled)
◆SSH Server Port — Sets the specified SSH Server port for
communication. (Default: 22)
◆HTTP Access — Enables/disables management access from any IP
address. (Default: enabled)
◆HTTP Timeout — Specifies the time after which the HTTP connection
will be lost with a period of inactivity. (Default: 1800 seconds; Range:
1-1800 seconds; 0=disabled)
◆HTTP Port — Specifies the HTTP port for IP connectivity. (Default: 80;
Range 1024-65535)
– 61 –
C
HAPTER
Access Limitation
6
| Management Settings
ACCESS LIMITATION
◆HTTPS Server — Enables/disables management access from a HTTPS
server. (Default: enabled)
◆HTTPS Port — Specifies the HTTPS port for secure IP connectivity.
(Default: 443; Range 1024-65535)
◆SNMP Access — Enables/disables management access from SNMP
interfaces. (Default: enabled)
The Access Limitation page limits management access to the access point
from specified IP addresses or wireless clients.
Figure 27: Access Limitation
The following items are displayed on the Access Limitation page:
IP MANAGEMENT CONTROL
◆Any IP — Indicates that any IP address is allowed management
access.
◆Single IP — Specifies a single IP address that is allowed management
access.
◆Multiple IP — Specifies an address range as defined by the entered IP
address and subnet mask. For example, IP address 192.168.1.6 and
subnet mask 255.255.255.0, defines all IP addresses from 192.168.1.1
to 192.168.1.254.
◆IP Address — Specifies the IP address.
– 62 –
◆Subnet Mask — Specifies the subnet mask in the form 255.255.255.x
RESTRICT MANAGEMENT
◆Enable/Disable — Enables/disables management of the device by a
wireless client. (Default: disabled)
SIMPLE NETWORK MANAGEMENT PROTOCOL
Simple Network Management Protocol (SNMP) is a communication protocol
designed specifically for managing devices on a network. Equipment
commonly managed with SNMP includes switches, routers and host
computers. SNMP is typically used to configure these devices for proper
operation in a network environment, as well as to monitor them to evaluate
performance or detect potential problems.
Managed devices supporting SNMP contain software, which runs locally on
the device and is referred to as an agent. A defined set of variables, known
as managed objects, is maintained by the SNMP agent and used to manage
the device. These objects are defined in a Management Information Base
(MIB) that provides a standard presentation of the information controlled
by the agent. SNMP defines both the format of the MIB specifications and
the protocol used to access this information over the network.
C
HAPTER
Simple Network Management Protocol
6
| Management Settings
SNMP BASIC
SETTINGS
The access point includes an onboard agent that supports SNMP versions
1, 2c, and 3 clients. This agent continuously monitors the status of the
access point, as well as the traffic passing to and from wireless clients. A
network management station can access this information using SNMP
management software that is compliant with MIB II. To implement SNMP
management, the access point must first have an IP address and subnet
mask, configured either manually or dynamically. Access to the onboard
agent using SNMP v1 and v2c is controlled by community strings. To
communicate with the access point, the management station must first
submit a valid community string for authentication.
Access to the access point using SNMP v3 provides additional security
features that cover message integrity, authentication, and encryption; as
well as controlling notifications that are sent to specified user targets.
The access point SNMP agent must be enabled to function (for versions 1,
2c, and 3 clients). Management access using SNMP v1 and v2c also
requires community strings to be configured for authentication. Trap
notifications can be enabled and sent to up to four management stations.
– 63 –
C
HAPTER
Simple Network Management Protocol
6
| Management Settings
Figure 28: SNMP Basic Settings
The following items are displayed on this page:
◆SNMP — Enables or disables SNMP management access and also
enables the access point to send SNMP traps (notifications). (Default:
Disable)
◆System Location — A text string that describes the system location.
(Maximum length: 255 characters)
◆System Contact — A text string that describes the system contact.
(Maximum length: 255 characters)
◆Read-Only Community — Defines the SNMP community access string
that has read-only access. Authorized management stations are only
able to retrieve MIB objects. (Maximum length: 23 characters, case
sensitive; Default: public)
◆Read-Write Community — Defines the SNMP community access
string that has read/write access. Authorized management stations are
able to both retrieve and modify MIB objects. (Maximum length: 23
characters, case sensitive; Default: private)
– 64 –
C
HAPTER
Simple Network Management Protocol
6
| Management Settings
SNMP TRAP SETTINGS Traps indicating status changes are issued by the AP to specified trap
managers. You must specify trap managers so that key events are reported
by the AP to your management station (using network management
platforms).
Figure 29: SNMP Trap Settings
The following items are displayed on this page:
◆Trap Destination — Specifies the recipient of SNMP notifications.
Enter the IP address or the host name. (Host Name: 1 to 63 characters,
case sensitive)
◆Community — The community string sent with the notification
operation. (Maximum length: 23 characters, case sensitive; Default:
public)
◆Action — Adds a new SNMP trap destination to the list.
◆Trap Destination List — Lists the configured SNMP trap destinations.
◆Trap Configuration — Enables or disables trap status.
■
sysSystemUp: The access point is up and running.
■
sysSystemDown: The access point is about to shutdown and
reboot.
◆Save Trap Config — Applies the new parameters and saves them to
RAM memory. Also prompts a screen to inform you when it has taken
affect. Clicking ‘OK’ returns to the home page. Changes will not be
saved upon a reboot unless the running configuration file is saved.
– 65 –
C
HAPTER
Simple Network Management Protocol
6
| Management Settings
VIEW ACCESS
CONTROL MODEL
To configure SNMPv3 management access to the AP, follow these steps:
1. Specify read and write access views for the AP MIB tree.
2. Configure SNMP user groups with the required security model (that is,
SNMP v1, v2c, or v3) and security level (authentication and privacy).
3. Assign SNMP users to groups, along with their specific authentication
and privacy passwords.
Figure 30: SNMP VACM
CREATING VIEWS
SNMPv3 views are used to restrict user access to specified portions of the
MIB tree. The are no predefined views by default.
The following items are displayed on the VACM page.
◆View Name – The name of the SNMP view. (Range: 1-32 characters)
◆Type – Indicates if the object identifier of a branch within the MIB tree
is included or excluded from the SNMP view.
◆OID – Allows you to configure the object identifiers of branches within
the MIB tree. Wild cards can be used to mask a specific portion of the
OID string.
◆Mask (option) – A hexadecimal value with each bit masking the
corresponding ID in the MIB subtree. A “1” in the mask indicates an
exact match and a “0” indicates a “wild card.” For example, a mask
value of 0xFFBF provides a bit mask “1111 1111 1011 1111.” If applied
– 66 –
C
HAPTER
Simple Network Management Protocol
6
| Management Settings
to the subtree “1.3.6.1.2.1.2.2.1.1.23,” the zero corresponds to the
10th subtree ID. When there are more subtree IDs than bits in the
mask, the mask is padded with ones.
◆View List – Shows the currently configured object identifiers of
branches within the MIB tree that define the SNMP view.
CREATING GROUPS
An SNMPv3 group sets the access policy for its assigned users, restricting
them to specific read, write, and notify views. You can create new groups
to map a set of SNMP users to SNMP views.
◆Group Name – The name of the SNMP group. (Range: 1-32
characters)
◆Security Level – The security level used for the group:
■
noAuthNoPriv – There is no authentication or encryption used in
SNMP communications.
■
AuthNoPriv – SNMP communications use authentication, but the
data is not encrypted.
■
AuthPriv – SNMP communications use both authentication and
encryption.
◆Read View – The configured view for read access. (Range: 1-32
characters)
◆Write View – The configured view for write access. (Range: 1-32
characters)
SNMPV3 USERS The access point allows multiple SNMP v3 users to be configured. Each
SNMPv3 user is defined by a unique name. Users must be configured with a
specific security level and assigned to a group. The SNMPv3 group restricts
users to a specific read, write, or notify view.
Figure 31: Configuring SNMPv3 Users
– 67 –
C
HAPTER
Simple Network Management Protocol
6
| Management Settings
The following items are displayed on this page:
◆User Name — The SNMPv3 user name. (32 characters maximum)
◆Group — The SNMPv3 group name.
◆Auth Type — The authentication type used for the SNMP user; either
MD5 or none. When MD5 is selected, enter a password in the
corresponding Passphrase field.
◆Auth Passphrase — The authentication password or key associated
with the authentication and privacy settings. A minimum of eight plain
text characters is required.
◆Priv Type — The data encryption type used for the SNMP user; either
DES or none. When DES is selected, enter a key in the corresponding
Passphrase field.
◆Priv Passphrase — The password or key associated with the
authentication and privacy settings. A minimum of eight plain text
characters is required.
◆Action — Click the Add button to add a new user to the list. Click the
edit button to change details of an existing user. Click the Del button to
remove a user from the list.
N
OTE
:
Users must be assigned to groups that have the same security
levels. For example, a user who has “Auth Type” and “Priv Type” configured
to MD5 and DES respectively (that it, uses both authentication and data
encryption) must be assigned to the RWPriv group. If this same user were
instead assigned to the read-only (RO) group, the user would not be able
to access the database.
SNMPV3 TARGETS An SNMP v3 notification Target ID is specified by the SNMP v3 user, IP
address, and UDP port. A user-defined filter can also be assigned to
specific targets to limit the notifications received to specific MIB objects.
(Note that the filter must first be configured. See “SNMPv3 Notification
Filters” on page 69.)
To configure a new notification receiver target, define the parameters and
select a filter, if required. Note that the SNMP v3 user name must first be
defined (See “SNMPv3 Users” on page 67.)
– 68 –
C
HAPTER
Simple Network Management Protocol
Figure 32: SNMPv3 Targets
6
| Management Settings
The following items are displayed on this page:
◆Target ID — A user-defined name that identifies a receiver of
notifications. (Maximum length: 32 characters)
◆IP Address — Specifies the IP address of the receiving management
station.
SNMPV3
NOTIFICATION FILTERS
◆UDP Port — The UDP port that is used on the receiving management
station for notification messages.
◆SNMP User — The defined SNMP v3 user that is to receive notification
messages.
◆Notification Filter — The name of a user-defined notification filter
that is applied to the target.
SNMP v3 users can be configured to receive notification messages from the
access point. An SNMP Target ID is created that specifies the SNMP v3 user,
IP address, and UDP port. A user-defined notification filter can be created
so that specific notifications can be prevented from being sent to particular
targets.
Figure 33: SNMP Notification Filter
– 69 –
C
HAPTER
Simple Network Management Protocol
6
| Management Settings
The following items are displayed on this page:
◆Filter ID — A user-defined name that identifies the filter. (Maximum
length: 32 characters)
◆Subtree — Specifies MIB subtree to be filtered. The MIB subtree must
be defined in the form “.1.3.6.1” and always start with a “.”.
◆Type — Indicates if the filter is to “include” or “exclude” the MIB
subtree objects from the filter. Note that MIB objects included in the
filter are not sent to the receiving target and objects excluded are sent.
By default all traps are sent, so you can first use an “include” filter
entry for all trap objects. Then use “exclude” entries for the required
trap objects to send to the target. Note that the filter entries are
applied in the sequence that they are defined.
◆Action — Adds the notification filter.
– 70 –
7ADVANCED SETTINGS
This chapter describes advanced settings on the access point. It includes
the following sections:
◆“Local Bridge Filter” on page 71
◆“Link Layer Discovery Protocol” on page 72
◆“Access Control Lists” on page 74
LOCAL BRIDGE FILTER
The access point can employ network traffic frame filtering to control
access to network resources and increase security. You can prevent
communications between wireless clients and prevent access point
management from wireless clients. Also, you can block specific Ethernet
traffic from being forwarded by the access point.
The Local Bridge Filter sets the global mode for wireless-to-wireless
communications between clients associated to Virtual AP (VAP) interfaces
on the access point. (Default: Disabled)
Figure 34: Local Bridge Filter
The following items are displayed on this page:
◆Disabled — All clients can communicate with each other through the
access point.
◆Prevent Intra VAP client communication — When enabled, clients
associated with a specific VAP interface cannot establish wireless
communications with each other. Clients can communicate with clients
associated to other VAP interfaces.
– 71 –
C
HAPTER
Link Layer Discovery Protocol
7
| Advanced Settings
◆Prevent Inter and Intra VAP client communication — When
enabled, clients cannot establish wireless communications with any
other client, either those associated to the same VAP interface or any
other VAP interface.
LINK LAYER DISCOVERY PROTOCOL
This page allows you to configure the Link Layer Discovery Protocol (LLDP).
LLDP allows devices in the local broadcast domain to share information
about themselves. LLDP-capable devices periodically transmit information
in messages called Type Length Value (TLV) fields to neighbor devices.
Advertised information is represented in Type Length Value (TLV) format
according to the IEEE 802.1ab standard, and can include details such as
device identification, capabilities and configuration settings.
This information can be used by SNMP applications to simplify
troubleshooting, enhance network management, and maintain an accurate
network topology.
Figure 35: LLDP Settings
The following items are displayed on this page:
◆Disable/Enable — Disables/Enables LLDP on the access point.
◆Message Transmission Hold Time — Configures the time-to-live
(TTL) value sent in LLDP advertisements as shown in the formula
below. (Range: 2-10; Default: 4)
The time-to-live tells the receiving LLDP agent how long to retain all
information pertaining to the sending LLDP agent if it does not transmit
updates in a timely manner. TTL in seconds is based on the following
rule: (Transmission Interval * Hold time) ≤ 65536. Therefore, the
default TTL is 4*30 = 120 seconds.
– 72 –
C
HAPTER
7
| Advanced Settings
Link Layer Discovery Protocol
◆Message Transmission Interval (seconds) — Configures the
This attribute must comply with the following rule: (Transmission
Interval * Hold Time) ≤ 65536, and Transmission Interval >= (4 *
Delay Interval)
◆ReInitial Delay Time (seconds) — Configures the delay before
attempting to re-initialize after LLDP ports are disabled or the link goes
down. (Range: 1-10 seconds; Default: 2 seconds)
When LLDP is re-initialized on a port, all information in the remote
systems LLDP MIB associated with this port is deleted.
◆Transmission Delay Value (seconds) — Configures a delay between
the successive transmission of advertisements initiated by a change in
local LLDP MIB variables. (Range: 1-8192 seconds; Default: 4 seconds)
The transmit delay is used to prevent a series of successive LLDP
transmissions during a short period of rapid changes in local LLDP MIB
objects, and to increase the probability that multiple, rather than single
changes, are reported in each transmission.
This attribute must comply with the rule: (4 * Delay Interval) ≤
Transmission Interval
– 73 –
C
HAPTER
Access Control Lists
7
| Advanced Settings
ACCESS CONTROL LISTS
Access Control Lists allow you to configure a list of wireless client MAC
addresses that are not authorized to access the network. A database of
MAC addresses can be configured locally on the access point.
SOURCE ADDRESS
SETTINGS
The ACL Source Address Settings page enables traffic filtering based on the
source MAC address in the data frame.
Figure 36: Source ACLs
The following items are displayed on this page:
◆SA Status — Enables network traffic with specific source MAC
addresses to be filtered (dropped) from the access point.
◆MAC Address — Specifies a source MAC address to filter, in the form
xx.xx.xx.xx.xx.xx, or xx-xx-xx-xx-xx-xx.
◆Action — Selecting “Add” adds a new MAC address to the filter list,
selecting delete removes the specified MAC address.
◆Number — Specifies the number associated with the MAC address.
◆MAC Address — Displays the configured source MAC address.
– 74 –
C
HAPTER
7
| Advanced Settings
Access Control Lists
DESTINATION
ADDRESS SETTINGS
The ACL Destination Address Settings page enables traffic filtering based
on the destination MAC address in the data frame.
Figure 37: Destination ACLs
The following items are displayed on this page:
◆DA Status — Enables network traffic with specific destination MAC
addresses to be filtered (dropped) from the access point.
◆MAC Address — Specifies a destination MAC address to filter, in the
form xx:xx:xx:xx:xx:xx or xx-xx-xx-xx-xx-xx.
◆Action — Selecting “Add” adds a new MAC address to the filter list,
selecting delete deletes the specified MAC address.
◆Number — Specifies the number of the MAC address in the filter table.
◆MAC Address — Displays the configured destination MAC address.
– 75 –
C
HAPTER
Access Control Lists
7
| Advanced Settings
ETHERNET TYPE The Ethernet Type Filter controls checks on the Ethernet type of all
incoming and outgoing Ethernet packets against the protocol filtering table.
(Default: Disabled)
Figure 38: Ethernet Type Filter
The following items are displayed on this page:
◆Disabled — Access point does not filter Ethernet protocol types.
◆Enabled — Access point filters Ethernet protocol types based on the
configuration of protocol types in the filter table. If the status of a
protocol is set to “ON,” the protocol is filtered from the access point.
◆Local Management — Describes the Ethernet filter type.
◆ISO Designator — Describes the ISO Designator identifier.
◆Filter Status — Turns the filter on or off.
– 76 –
8WIRELESS SETTINGS
This chapter describes wireless settings on the access point. It includes the
following sections:
◆“Spanning Tree Protocol (STP)” on page 77
◆“Authentication” on page 80
◆“Radio Settings” on page 84
◆“Virtual Access Points (VAPs)” on page 87
◆“Quality of Service (QoS)” on page 93
SPANNING TREE PROTOCOL (STP)
The Spanning Tree Protocol (STP) can be used to detect and disable
network loops, and to provide backup links between switches, bridges or
routers. This allows the wireless bridge to interact with other bridging
devices (that is, an STP-compliant switch, bridge or router) in your network
to ensure that only one route exists between any two stations on the
network, and provide backup links which automatically take over when a
primary link goes down.
STP uses a distributed algorithm to select a bridging device (STP-compliant
switch, bridge or router) that serves as the root of the spanning tree
network. It selects a root port on each bridging device (except for the root
device) which incurs the lowest path cost when forwarding a packet from
that device to the root device. Then it selects a designated bridging device
from each LAN which incurs the lowest path cost when forwarding a packet
from that LAN to the root device. All ports connected to designated
bridging devices are assigned as designated ports. After determining the
lowest cost spanning tree, it enables all root ports and designated ports,
and disables all other ports. Network packets are therefore only forwarded
between root ports and designated ports, eliminating any possible network
loops.
Once a stable network topology has been established, all bridges listen for
Hello BPDUs (Bridge Protocol Data Units) transmitted from the root bridge.
If a bridge does not get a Hello BPDU after a predefined interval (Maximum
Age), the bridge assumes that the link to the root bridge is down. This
bridge will then initiate negotiations with other bridges to reconfigure the
network to reestablish a valid network topology.
– 77 –
C
HAPTER
Spanning Tree Protocol (STP)
8
| Wireless Settings
Figure 39: Spanning Tree Protocol
BRIDGE Sets STP bridge link parameters.
The following items are displayed on the STP page:
◆Spanning Tree Protcol — Enables/disables STP on the AP.
(Default: Enabled)
◆Priority — Used in selecting the root device, root port, and designated
port. The device with the highest priority becomes the STP root device.
However, if all devices have the same priority, the device with the
lowest MAC address will then become the root device. (Note that lower
numeric values indicate higher priority.)
(Default:32768; Range: 0-65535)
◆Max Age — The maximum time (in seconds) a device can wait without
receiving a configuration message before attempting to reconfigure. All
device ports (except for designated ports) should receive configuration
messages at regular intervals. Any port that ages out STP information
(provided in the last configuration message) becomes the designated
port for the attached LAN. If it is a root port, a new root port is selected
– 78 –
C
HAPTER
8
| Wireless Settings
Spanning Tree Protocol (STP)
from among the device ports attached to the network.
(Default: 20 seconds; Range: 6-40 seconds)
Minimum: The higher of 6 or [2 x (Hello Time + 1)].
Maximum: The lower of 40 or [2 x (Forward Delay - 1)]
◆Hello Time — Interval (in seconds) at which the root device transmits
a configuration message. (Default: 2 seconds; Range: 1-10 seconds)
Minimum: 1
Maximum: The lower of 10 or [(Max. Message Age / 2) -1]
◆Forwarding Delay — The maximum time (in seconds) this device
waits before changing states (i.e., discarding to learning to forwarding).
This delay is required because every device must receive information
about topology changes before it starts to forward frames. In addition,
each port needs time to listen for conflicting information that would
make it return to a discarding state; otherwise, temporary data loops
might result. (Default: 15 seconds; Range: 4-30 seconds)
Minimum: The higher of 4 or [(Max. Message Age / 2) + 1]
Maximum: 30
ETHERNET INTERFACE Sets STP settings for the Ethernet port.
◆Link Path Cost — This parameter is used by the STP to determine the
best path between devices. Therefore, lower values should be assigned
to ports attached to faster media, and higher values assigned to ports
with slower media. (Path cost takes precedence over port priority.)
(Default: Ethernet interface: 19; Wireless interface: 40;
Range: 1-65535
◆Link Port Priority — Defines the priority used for this port in the
Spanning Tree Protocol. If the path cost for all ports on a switch are the
same, the port with the highest priority (i.e., lowest value) will be
configured as an active link in the spanning tree. This makes a port
with higher priority less likely to be blocked if the Spanning Tree
Protocol is detecting network loops. Where more than one port is
assigned the highest priority, the port with lowest numeric identifier will
be enabled. (Default: 128; Range: 0-240, in steps of 16)
WIRELESS INTERFACE Sets STP settings for the radio interface.
◆Index — Describes the VAP in question.
◆Link Path Cost — This parameter is used by the STP to determine the
best path between devices. Therefore, lower values should be assigned
to ports attached to faster media, and higher values assigned to ports
with slower media. (Path cost takes precedence over port priority.)
(Default: Ethernet interface: 19; Wireless interface: 40;
Range: 1-65535
– 79 –
C
HAPTER
Authentication
8
| Wireless Settings
AUTHENTICATION
◆Link Port Priority — Defines the priority used for this port in the
Spanning Tree Protocol. If the path cost for all ports on a switch are the
same, the port with the highest priority (i.e., lowest value) will be
configured as an active link in the spanning tree. This makes a port
with higher priority less likely to be blocked if the Spanning Tree
Protocol is detecting network loops. Where more than one port is
assigned the highest priority, the port with lowest numeric identifier will
be enabled. (Default: 128; Range: 0-240, in steps of 16)
Wireless clients can be authenticated for network access by checking their
MAC address against the local database configured on the access point, or
by using a database configured on a central RADIUS server. Alternatively,
authentication can be implemented using the IEEE 802.1X network access
control protocol.
You can configure a list of the MAC addresses for wireless clients that are
authorized to access the network. This provides a basic level of
authentication for wireless clients attempting to gain access to the
network. A database of authorized MAC addresses can be stored locally on
the access point or remotely on a central RADIUS server. (Default: Local
MAC)
LOCAL MAC
AUTHENTICATION
Configures the local MAC authentication database. The MAC database
provides a mechanism to take certain actions based on a wireless client’s
MAC address. The MAC list can be configured to allow or deny network
access to specific clients.
– 80 –
Figure 40: Local Authentication
C
HAPTER
8
| Wireless Settings
Authentication
The following items are displayed on Authentication page:
MAC Authentication — Selects between, disabled, Local MAC
authentication and RADIUS authentication.
◆Local MAC — The MAC address of the associating station is compared
against the local database stored on the access point. The Local MAC
Authentication section enables the local database to be set up.
◆System Default — Specifies a default action for all unknown MAC
addresses (that is, those not listed in the local MAC database).
■
Deny: Blocks access for all MAC addresses except those listed in
the local database as “Allow.”
■
Allow: Permits access for all MAC addresses except those listed in
the local database as “Deny.”
◆MAC Authentication Settings — Enters specified MAC addresses and
permissions into the local MAC database.
■
MAC Address: Physical address of a client. Enter six pairs of
hexadecimal digits separated by hyphens; for example, 00-90-D112-AB-89.
■
■
Permission: Select Allow to permit access or Deny to block access.
Add/Delete: Adds or deletes the specified MAC address and
permission setting into or from the local database.
– 81 –
C
HAPTER
Authentication
8
| Wireless Settings
◆MAC Authentication Table — Displays current entries in the local
MAC database.
RADIUS MAC
A
UTHENTICATION
The MAC address of the associating station is sent to a configured RADIUS
server for authentication. When using a RADIUS authentication server for
MAC address authentication, the server must first be configured on the
RADIUS page.
Figure 41: RADIUS Authentication
The following items are displayed on Authentication page:
MAC Authentication — Selects between, disabled, Local MAC
authentication and RADIUS authentication.
◆RADIUS MAC — The MAC address of the associating station is
compared against the RADIUS server database. The RADIUS MAC
Authentication section enables the RADIUS database to be set up.
◆Session Timeout — The time period after which a connected client
must be re-authenticated. During the re-authentication process of
verifying the client’s credentials on the RADIUS server, the client
remains connected the network. Only if re-authentication fails is
network access blocked. (Default: 0 means disabled; Range: 30-65535
seconds)
– 82 –
INTERFACE MODE
C
HAPTER
8
| Wireless Settings
Interface Mode
The access point can operate in two modes, IEEE 802.11a/n only, or
802.11g/n only. Also note that 802.11g is backward compatible with
802.11b, operating in the 2.4 GHz band. The 802.11a/n mode operates in
the 5 GHz band.
N
OTE
:
The EAP8518 radio can operate in 2.4 GHz mode or 5 GHz mode. It
does not operate at 2.4 GHz and 5 GHz modes at the same time. You must
first select the basic radio operating mode you want to use for your
network.
Figure 42: Interface Mode
The following items are displayed on the Interface Mode Selection page:
◆Interface0 Mode — Selects the mode of the radio interface:
■
11ng: All 802.11g and n clients can communicate with the wireless
AP/ Router (up to 300 Mbps) using the 2.4 GHz band, but data
transmission rates may be slowed to compensate for 802.11g
clients.
■
11na: All 802.11a and n clients can communicate with the wireless
AP/ Router (up to 300 Mbps) using the 5 GHz band, but data
transmission rates may be slowed to compensate for 802.11a
clients.
– 83 –
C
HAPTER
Radio Settings
8
| Wireless Settings
RADIO SETTINGS
The IEEE 802.11n interfaces include configuration options for radio signal
characteristics and wireless security features.
The access point can operate in two modes, mixed 802.11g/n (2.4 GHz), or
mixed 802.11a/n (5 GHz). Note that the radio cannot not operate at
2.4 GHz and 5 GHz modes at the same time.
Each radio supports eight virtual access point (VAP) interfaces, referred to
as VAP0 ~ VAP7. Each VAP functions as a separate access point, and can
be configured with its own Service Set Identification (SSID) and security
settings. However, most radio signal parameters apply to all VAP
interfaces. The configuration options are nearly identical, and are therefore
both covered in this section of the manual. Traffic to specific VAPs can be
segregated based on user groups or application traffic. The clients
associate with each VAP in the same way as they would with separate
physical access points. The access point supports up to a total of 64
wireless clients across all VAP interfaces.
Figure 43: Radio Settings
– 84 –
C
HAPTER
8
| Wireless Settings
Radio Settings
The following items are displayed on this page:
◆High Throughput Mode — The access point provides a channel
bandwidth of 20 MHz by default giving an 802.11g connection speed of
54 Mbps and a 802.11n connection speed of up to 108 Mbps, and
ensures backward compliance for slower 802.11b devices. Setting the
HT Channel Bandwidth to 40 MHz (sometimes referred to as Turbo
Mode) increases connection speed for 802.11g and 802.11n to 74 Mbps
and 300 Mbps respectively. HT40plus indicates that the secondary
channel is above the primary channel. HT40minus indicates that the
secondary channel is below the primary channel.
(Default: HT20; Range:HT20, HT40PLUS, HT40MINUS)
N
OTE
:
Some 802.11n wireless clients may be capable of transmission rates
of up to 600 Mbps, however the access point will only be able to connect to
them at a maximum transmission rate of 300 Mbps.
◆Radio Channel — The radio channel that the access point uses to
communicate with wireless clients. When multiple access points are
deployed in the same area, set the channel on neighboring access
points at least five channels apart to avoid interference with each other.
For example, in 11ng HT20 mode you can deploy up to three access
points in the same area using channels 1, 6, 11. Note that wireless
clients automatically set the channel to the same as that used by the
access point to which it is linked. (The available channels are
dependent on the Radio Mode, High Throughput Mode, and Country
Code settings.)
◆Auto Channel Select — Selecting Auto Select enables the access point
to automatically select an unoccupied radio channel.
◆Transmit Power — Adjusts the power of the radio signals transmitted
from the access point. The higher the transmission power, the farther
the transmission range. Power selection is not just a trade off between
coverage area and maximum supported clients. You also have to
ensure that high-power signals do not interfere with the operation of
other radio devices in the service area. (Default: Minimum; Range:
min, 12.5%, 25%, 50%, 100%)
◆Maximum Association Clients — The total maximum number of
clients that may associate with all VAPs is fixed at 64.
◆Radio Mode — Defines the radio mode for the VAP interface. (Default:
Enabling the access point to communicate with 802.11b/g clients in
both 802.11b/g/n Mixed and 802.11n modes also requires that HT
Operation be set to HT20.
– 85 –
C
HAPTER
Radio Settings
8
| Wireless Settings
◆Preamble Length — The radio preamble (sometimes called a header)
is a section of data at the head of a packet that contains information
that the wireless device and client devices need when sending and
receiving packets. You can set the radio preamble to long or short. A
short preamble improves throughput performance, whereas a long
preamble is required when legacy wireless devices are part of your
network.
◆Beacon Interval (20-1000) — The rate at which beacon signals are
transmitted from the access point. The beacon signals allow wireless
clients to maintain contact with the access point. They may also carry
power-management information. (Range: 20-1000 TUs; Default:
100 TUs)
◆Data Beacon Rate (DTIM) (1-255) — The rate at which stations in
sleep mode must wake up to receive broadcast/multicast
transmissions.
Known also as the Delivery Traffic Indication Map (DTIM) interval, it
indicates how often the MAC layer forwards broadcast/multicast traffic,
which is necessary to wake up stations that are using Power Save
mode. The default value of 2 indicates that the access point will save all
broadcast/multicast frames for the Basic Service Set (BSS) and forward
them after every second beacon. Using smaller DTIM intervals delivers
broadcast/multicast frames in a more timely manner, causing stations
in Power Save mode to wake up more often and drain power faster.
Using higher DTIM values reduces the power used by stations in Power
Save mode, but delays the transmission of broadcast/multicast frames.
(Range: 1-255 beacons; Default: 1 beacon)
◆RTS Threshold (0-2345) — Sets the packet size threshold at which a
Request to Send (RTS) signal must be sent to a receiving station prior
to the sending station starting communications. The access point sends
RTS frames to a receiving station to negotiate the sending of a data
frame. After receiving an RTS frame, the station sends a CTS (clear to
send) frame to notify the sending station that it can start sending data.
If the RTS threshold is set to 0, the access point always sends RTS
signals. If set to 2347, the access point never sends RTS signals. If set
to any other value, and the packet size equals or exceeds the RTS
threshold, the RTS/CTS (Request to Send / Clear to Send) mechanism
will be enabled.
The access points contending for the medium may not be aware of each
other. The RTS/CTS mechanism can solve this “Hidden Node Problem.”
(Range: 0-2345 bytes: Default: 2345 bytes)
◆Short Guard Interval — The 802.11n draft specifies two guard
intervals: 400ns (short) and 800ns (long). Support of the 400ns GI is
optional for transmit and receive. The purpose of a guard interval is to
introduce immunity to propagation delays, echoes, and reflections to
which digital data is normally very sensitive. Enabling the Short Guard
Interval sets it to 400ns. (Default: Disabled)
– 86 –
◆Aggregate MAC Protocol Data Unit(A-MPDU) — Enables / disables
the sending of this four frame packet header for statistical purposes.
(Default: Enabled)
◆A-MPDU Length Limit (1024-65535) — Defines the A-MPDU length.
(Default: 65535 bytes; Range: 1024-65535 bytes)
◆Aggregate MAC Service Data Unit (A-MSDU) — Enables / disables
the sending of this four frame packet header for statistical purposes.
(Default: Enabled)
◆A-MSDU Length Limit (2290-4096) — Defines the A-MSDU length.
(Default: 4096 bytes; Range: 2290-4096 bytes)
◆Set Radio — Sets all entered parameters.
VIRTUAL ACCESS POINTS (VAPS)
C
HAPTER
8
| Wireless Settings
Virtual Access Points (VAPs)
The access point supports up to eight virtual access point (VAP) interfaces
numbered 0 to 7. Each VAP functions as a separate access point, and can
be configured with its own Service Set Identification (SSID) and security
settings. However, most radio signal parameters apply to all eight VAP
interfaces.
The VAPs function similar to a VLAN, with each VAP mapped to its own
default VLAN ID. Traffic to specific VAPs can be segregated based on user
groups or application traffic. All VAPs can support up to a total of 64
wireless clients, whereby the clients associate with each VAP the same way
as they would with separate physical access points.
N
OTE
:
The radio channel settings for the access point are limited by local
regulations, which determine the number of channels that are available.
See “Operating Channels” on page 248 for additional information on the
maximum number channels available.
Figure 44: VAP Settings
– 87 –
C
HAPTER
Virtual Access Points (VAPs)
8
| Wireless Settings
The following items are displayed on this page:
◆VAP Number — The number associated with the VAP, 0-7.
◆SSID — The name of the basic service set provided by a VAP interface.
Clients that want to connect to the network through the access point
must set their SSID to the same as that of an access point VAP
interface. (Default: EC _VAP_# (0 to 7); Range: 1-32 characters)
◆Enable — Enables the specified VAP. (Default: Disabled)
◆Status — Displays the mode of the VAP. The default is set to "AP," for
normal access point services.
◆Edit Setting — Click to open the page for configuring the selected VAP.
VAP B ASIC SETTINGS Sets the basic operating mode and other settings for the VAP.
Each VAP can operate in one of three modes; normal AP mode, WDS-AP
bridge AP mode, or WDS-STA bridge station mode. The default mode is AP
for the VAP to support normal access point services.
N
OTE
:
For more information and examples for setting up WDS networks,
see “WDS Setup Examples” on page 238.
Note that the Basic Settings are the same for both AP and WDS-AP modes.
Figure 45: VAP Basic Settings
The following items are displayed on this page:
◆Closed System — When enabled, the VAP does not include its SSID in
beacon messages. Nor does it respond to probe requests from clients
that do not include a fixed SSID. (Default: Disable)
– 88 –
C
HAPTER
8
| Wireless Settings
Virtual Access Points (VAPs)
◆Mode — Selects the mode in which the VAP will function.
■
AP Mode: The VAP provides services to clients as a normal access
point.
■
WDS-AP Mode: The VAP operates as an access point in WDS
mode, which accepts connections from client stations in WDS-STA
mode.
■
WDS-STA Mode: The VAP operates as a client station in WDS
mode, which connects to an access point VAP in WDS-AP mode. The
user needs to specify the MAC address of the access point in WDSAP mode to which it intends to connect.
◆Association Timeout Interval — The idle time interval (when no
frames are sent) after which a client is disassociated from the VAP
interface. (Range: 5-60 minutes; Default: 30 minutes)
◆Authentication Timeout Interval — The time within which the client
should finish authentication before authentication times out.
(Range: 5-60 minutes; Default: 60 minutes)
◆Default VLAN ID — The VLAN ID assigned to wireless clients
associated to the VAP interface that are not assigned to a specific VLAN
by RADIUS server configuration. (Default: 1)
◆DHCP Relay Server — The IP address of the DHCP relay server.
Dynamic Host Configuration Protocol (DHCP) can dynamically allocate
an IP address and other configuration information to network clients
that broadcast a request. To receive the broadcast request, the DHCP
server would normally have to be on the same subnet as the client.
However, when the access point’s DHCP relay agent is enabled,
received client requests can be forwarded directly by the access point
to a known DHCP server on another subnet. Responses from the DHCP
server are returned to the access point, which then broadcasts them
back to clients. (Default: 0.0.0.0 (disabled))
◆SSID — The service set identifier for the VAP.
WDS-STA MODE Describes additional basic VAP settings when functioning in WDS-STA
mode.
Figure 46: WDS-STA Mode
– 89 –
C
HAPTER
Virtual Access Points (VAPs)
8
| Wireless Settings
The following items are displayed in the VAP Basic Settings when WDS-AP
mode is selected:
◆WDS-AP (Parent) SSID — The SSID of the VAP on the connecting
access point that is set to WDS-AP mode.
◆WDS-AP (Parent) MAC — The MAC address of the VAP on the
connecting access point that is set to WDS-AP mode.
WIRELESS SECURITY
SETTINGS
Describes the wireless security settings for each VAP, including association
mode, encryption, and authentication.
N
OTE
:
For VAPs set to WDS-AP or WDS-STA mode, the security options are
limited to WPA-PSK and WPA2-PSK only.
Figure 47: Configuring VAPs - Common Settings
The following items are common to all three modes:
◆Association Mode — Defines the mode with which the access point
will associate with other clients.
■
■
■
Open System: The VAP is configured by default as an “open
system,” which broadcasts a beacon signal including the configured
SSID. Wireless clients with an SSID setting of “any” can read the
SSID from the beacon and automatically set their SSID to allow
immediate connection.
WPA: WPA employs a combination of several technologies to
provide an enhanced security solution for 802.11 wireless networks.
WPA-PSK: For enterprise deployment, WPA requires a RADIUS
authentication server to be configured on the wired network.
However, for small office networks that may not have the resources
– 90 –
C
HAPTER
8
| Wireless Settings
Virtual Access Points (VAPs)
to configure and maintain a RADIUS server, WPA provides a simple
operating mode that uses just a pre-shared password for network
access. The Pre-Shared Key mode uses a common password for
user authentication that is manually entered on the access point
and all wireless clients. The PSK mode uses the same TKIP packet
encryption and key management as WPA in the enterprise,
providing a robust and manageable alternative for small networks.
■
WPA2: WPA2 – WPA was introduced as an interim solution for the
vulnerability of WEP pending the ratification of the IEEE 802.11i
wireless security standard. In effect, the WPA security features are
a subset of the 802.11i standard. WPA2 includes the now ratified
802.11i standard, but also offers backward compatibility with WPA.
Therefore, WPA2 includes the same 802.1X and PSK modes of
operation and support for TKIP encryption.
■
WPA2-PSK: Clients using WPA2 with a Pre-shared Key are
accepted for authentication.
■
WPA-WPA2 Mixed: Clients using WPA or WPA2 are accepted for
authentication.
■
WPA-WPA2-PSK-mixed: Clients using WPA or WPA2 with a Preshared Key are accepted for authentication.
◆Encryption Method — Selects an encryption method for the global
key used for multicast and broadcast traffic, which is supported by all
wireless clients.
■
WEP: WEP is used as the multicast encryption cipher. You should
select WEP only when both WPA and WEP clients are supported.
■
TKIP: TKIP is used as the multicast encryption cipher.
■
AES-CCMP: AES-CCMP is used as the multicast encryption cipher.
AES-CCMP is the standard encryption cipher required for WPA2.
◆802.1X — The access point supports 802.1X authentication only for
clients initiating the 802.1X authentication process (i.e., the access
point does not initiate 802.1X authentication). For clients initiating
802.1X, only those successfully authenticated are allowed to access the
network. For those clients not initiating 802.1X, access to the network
is allowed after successful wireless association with the access point.
The 802.1X mode allows access for clients not using WPA or WPA2
security.
◆Pre-Authentication — When using WPA2 over 802.1X, pre-
authentication can be enabled, which allows clients to roam to a new
access point and be quickly associated without performing full 802.1X
authentication. (Default: Disabled)
◆802.1x Reauthentication Time — The time period after which a
connected client must be re-authenticated. During the reauthentication process of verifying the client’s credentials on the
– 91 –
C
HAPTER
Virtual Access Points (VAPs)
8
| Wireless Settings
RADIUS server, the client remains connected the network. Only if reauthentication fails is network access blocked. (Range: 0-65535
seconds; Default: 0 means disabled)
WIRED EQUIVALENT
PRIVACY (WEP)
WEP provides a basic level of security, preventing unauthorized access to
the network, and encrypting data transmitted between wireless clients and
the VAP. WEP uses static shared keys (fixed-length hexadecimal or
alphanumeric strings) that are manually distributed to all clients that want
to use the network.
WEP is the security protocol initially specified in the IEEE 802.11 standard
for wireless communications. Unfortunately, WEP has been found to be
seriously flawed and cannot be recommended for a high level of network
security. For more robust wireless security, the access point provides Wi-Fi
Protected Access (WPA) and WPA2 for improved data encryption and user
authentication.
Setting up shared keys enables the basic IEEE 802.11 Wired Equivalent
Privacy (WEP) on the access point to prevent unauthorized access to the
network.
If you choose to use WEP shared keys instead of an open system, be sure
to define at least one static WEP key for user authentication and data
encryption. Also, be sure that the WEP shared keys are the same for each
client in the wireless network. All clients share the same keys, which are
used for user authentication and data encryption. Up to four keys can be
specified.
Figure 48: WEP Configuration
– 92 –
C
HAPTER
8
| Wireless Settings
Quality of Service (QoS)
The following items are on this page for WEP configuration:
◆Default WEP Key Index – Selects the key number to use for
encryption for the VAP interface. If the clients have all four WEP keys
configured to the same values, you can change the encryption key to
any of the settings without having to update the client keys.
(Default: Key 1)
◆Key Type – Select the preferred method of entering WEP encryption
keys for the VAP, either hexadecimal digits (Hex) or alphanumeric
characters (ASCII).
◆Key Length – Select 64 Bit or 128 Bit key length. Note that the same
size of encryption key must be supported on all wireless clients.
(Default: 64 bit)
◆Key – Enter up to four WEP encryption keys for the VAP.
■
Hex: Enter keys as 10 hexadecimal digits (0-9 and A-F) for 64 bit
keys, or 26 hexadecimal digits for 128 bit keys.
■
N
OTE
:
Key index, type, and length must match that configured on the
clients.
QUALITYOF SERVICE (QOS)
Wireless networks offer an equal opportunity for all devices to transmit
data from any type of application. Although this is acceptable for most
applications, multimedia applications (with audio and video) are
particularly sensitive to the delay and throughput variations that result
from this “equal opportunity” wireless access method. For multimedia
applications to run well over a wireless network, a Quality of Service (QoS)
mechanism is required to prioritize traffic types and provide an “enhanced
opportunity” wireless access method.
The access point implements QoS using the Wi-Fi Multimedia (WMM)
standard. Using WMM, the access point is able to prioritize traffic and
optimize performance when multiple applications compete for wireless
network bandwidth at the same time. WMM employs techniques that are a
subset of the developing IEEE 802.11e QoS standard and it enables the
access point to inter operate with both WMM-enabled clients and other
devices that may lack any WMM functionality.
ASCII: Enter keys as 5 alphanumeric characters for 64 bit keys, or
13 alphanumeric characters for 128 bit keys.
Access Categories — WMM defines four access categories (ACs): voice,
video, best effort, and background. These categories correspond to traffic
priority levels and are mapped to IEEE 802.1D priority tags (see “WMM
Access Categories” on page 94). The direct mapping of the four ACs to
– 93 –
C
HAPTER
Quality of Service (QoS)
8
| Wireless Settings
802.1D priorities is specifically intended to facilitate inter operability with
other wired network QoS policies. While the four ACs are specified for
specific types of traffic, WMM allows the priority levels to be configured to
match any network-wide QoS policy. WMM also specifies a protocol that
access points can use to communicate the configured traffic priority levels
to QoS-enabled wireless clients.
AC_BE (AC0)Best EffortNormal priority, medium delay and throughput.
AC_BK (AC1)BackgroundLowest priority. Data with no delay or
WMM
Designation
Description802.1D
data such as VoIP (Voice over IP) calls.
data such as streaming video.
Data only affected by long delays. Data from
applications or devices that lack QoS
capabilities.
throughput requirements, such as bulk data
transfers.
Tags
7, 6
5, 4
0, 3
2, 1
WMM Operation — WMM uses traffic priority based on the four ACs; Voice,
Video, Best Effort, and Background. The higher the AC priority, the higher
the probability that data is transmitted.
When the access point forwards traffic, WMM adds data packets to four
independent transmit queues, one for each AC, depending on the 802.1D
priority tag of the packet. Data packets without a priority tag are always
added to the Best Effort AC queue. From the four queues, an internal
“virtual” collision resolution mechanism first selects data with the highest
priority to be granted a transmit opportunity. Then the same collision
resolution mechanism is used externally to determine which device has
access to the wireless medium.
For each AC queue, the collision resolution mechanism is dependent on two
timing parameters:
◆AIFSN (Arbitration Inter-Frame Space Number), a number used to
calculate the minimum time between data frames
◆CW (Contention Window), a number used to calculate a random backoff
time
After a collision detection, a backoff wait time is calculated. The total wait
time is the sum of a minimum wait time (Arbitration Inter-Frame Space, or
AIFS) determined from the AIFSN, and a random backoff time calculated
from a value selected from zero to the CW. The CW value varies within a
configurable range. It starts at CWMin and doubles after every collision up
to a maximum value, CWMax. After a successful transmission, the CW
value is reset to its CWMin value.
– 94 –
C
AIFSRandom Backoff
AIFS
Random Backoff
CWMinCWMax
CWMinCWMax
Time
High Priority
Low Priority
Minimum Wait TimeRandom Wait Time
Minimum Wait TimeRandom Wait Time
HAPTER
8
| Wireless Settings
Quality of Service (QoS)
Figure 49: WMM Backoff Wait Times
For high-priority traffic, the AIFSN and CW values are smaller. The smaller
values equate to less backoff and wait time, and therefore more transmit
opportunities.
Figure 50: QoS
– 95 –
C
HAPTER
Quality of Service (QoS)
8
| Wireless Settings
The following items are displayed on this page:
◆WMM — Sets the WMM operational mode on the access point. When
enabled, the parameters for each AC queue will be employed on the
access point and QoS capabilities are advertised to WMM-enabled
clients. (Default: Disabled)
■
Disable: WMM is disabled.
■
Enable: WMM must be supported on any device trying to
associated with the access point. Devices that do not support this
feature will not be allowed to associate with the access point.
◆WMM Acknowledge Policy — By default, all wireless data
transmissions require the sender to wait for an acknowledgement from
the receiver. WMM allows the acknowledgement wait time to be turned
off for each Access Category (AC) 0-3. Although this increases data
throughput, it can also result in a high number of errors when traffic
levels are heavy. (Default: Acknowledge)
■
Aknowledge — Applies the WMM policy.
■
No Aknowledge — Ignores the WMM policy.
◆WMM BSS Parameters — These parameters apply to the wireless
clients.
◆WMM AP Parameters — These parameters apply to the access point.
■
logCWMin (Minimum Contention Window): The initial upper limit of
the random backoff wait time before wireless medium access can be
attempted. The initial wait time is a random value between zero and
the CWMin value. Specify the CWMin value in the range 0-15
microseconds. Note that the CWMin value must be equal or less
than the CWMax value.
■
logCWMax (Maximum Contention Window): The maximum upper
limit of the random backoff wait time before wireless medium
access can be attempted. The contention window is doubled after
each detected collision up to the CWMax value. Specify the CWMax
value in the range 0-15 microseconds. Note that the CWMax value
must be greater or equal to the CWMin value.
■
AIFSN (Arbitration Inter-Frame Space): The minimum amount of
wait time before the next data transmission attempt. Specify the
AIFS value in the range 0-15 microseconds.
■
TXOP Limit (Transmit Opportunity Limit): The maximum time an
AC transmit queue has access to the wireless medium. When an AC
queue is granted a transmit opportunity, it can transmit data for a
time up to the TxOpLimit. This data bursting greatly improves the
efficiency for high data-rate traffic. Specify a value in the range 065535 microseconds.
– 96 –
C
HAPTER
■
Admission Control: The admission control mode for the access
8
| Wireless Settings
Quality of Service (QoS)
category. When enabled, clients are blocked from using the access
category. (Default: Disabled)
◆Set WMM — Applies the new parameters and saves them to RAM
memory. Also prompts a screen to inform you when it has taken affect.
Click “OK” to return to the home page. Changes will not be saved upon
a reboot unless the running configuration file is saved.
– 97 –
9MAINTENANCE SETTINGS
Maintenance settings includes the following sections:
◆“Upgrading Firmware” on page 98
◆“Running Configuration” on page 101
◆“Resetting the Access Point” on page 102
UPGRADING FIRMWARE
You can upgrade new access point software from a local file on the
management workstation, or from an FTP or TFTP server. New software
may be provided periodically from your distributor.
After upgrading new software, you must reboot the access point to
implement the new code. Until a reboot occurs, the access point will
continue to run the software it was using before the upgrade started. Also
note that new software that is incompatible with the current configuration
automatically restores the access point to the factory default settings when
first activated after a reboot.
– 98 –
Figure 51: Firmware
C
HAPTER
9
| Maintenance Settings
Upgrading Firmware
The following items are displayed on this page:
◆Firmware Version — Displays what version of software is being used
as a runtime image - “Active”, and what version is a backup image “Backup”. You may specify up to two images.
◆Next Boot Image — Specifies what version of firmware will be used as
a runtime image upon bootup.
◆Set Next Boot — Applies the runtime image setting.
◆Local — Downloads an operation code image file from the web
management station to the access point using HTTP. Use the Browse
button to locate the image file locally on the management station and
click Start Upgrade to proceed.
■
New Firmware File: Specifies the name of the code file on the
server. The new firmware file name should not contain slashes (\ or
/), the leading letter of the file name should not be a period (.), and
the maximum length for file names is 32 characters for files on the
access point. (Valid characters: A-Z, a-z, 0-9, “.”, “-”, “_”)
– 99 –
C
HAPTER
9
| Maintenance Settings
Upgrading Firmware
◆Remote — Downloads an operation code image file from a specified
remote FTP or TFTP server. After filling in the following fields, click Start
Upgrade to proceed.
■
New Firmware File: Specifies the name of the code file on the
server. The new firmware file name should not contain slashes (\ or
/), the leading letter of the file name should not be a period (.), and
the maximum length for file names on the FTP/TFTP server is 255
characters or 32 characters for files on the access point. (Valid
characters: A-Z, a-z, 0-9, “.”, “-”, “_”)
■
IP Address: IP address or host name of FTP or TFTP server.
■
Username: The user ID used for login on an FTP server.
■
Password: The password used for login on an FTP server.
◆Start Upgrade — Commences the upgrade process.
– 100 –
Loading...
+ hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.