HP ProCurve 520wl User Manual

HP ProCurve Wireless Access Point 520wl
User Guide -
For Software Version 2.4.5
©
Copyright 2004, Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
Warranty
See the Customer Support/Warranty booklet included with the product.
A copy of the specific warranty terms applicable to you Hewlett-Packard products and replacement parts can b obtained from your HP Sales and Service Office or authorized dealer.
r
Publication Number
5990-6056 March 2004
Applicable Products
HP ProCurve Wireless AP 520wl (HP J8133A)
Trademark Credits
Microsoft are US registered trademarks of Microsoft Corporation.
Disclaimer
HEWLETT-PACKARD COMPANY MAKES NO WARRANTY OF ANY KIND WITH REGARD TO THIS MATERIAL, INCLUDING BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. Hewlett­Packard shall not be liable for errors contained herein or for incidental or consequential damages in connection with the furnishing, performance or use of this material.
The only warranties for HP products and services are set forth in the express warranty statements accompanying such products and services. Nothing herein should be construed as constituting an additional warranty. HP shall not be liable for technical or editorial errors or omissions contained herein.
Hewlett-Packard assumes no responsibility for the use or reliability of its software on equipment that is not furnished by Hewlett-Packard.
®
, Word®, WordPad®, and Internet Explorer
®
Safety Considerations
Prior to the installation and use of this product, review safety markings and instructions.
Notes and Cautions
NOTE:
A Note indicates important information that help you make better use of your computer.
CAUTION:
!
A Caution indicates either potential damage to hardware or loss of data and tells you how to avoid the problem.
a
ii

Contents

Regulatory Information
Safety Information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . viii
Grounding . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . viii
Servicing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . viii
Accessories . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . viii
Informations concernant la sécurité. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ix
Hinweise zur Sicherheit . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . x
Considerazioni sulla sicurezza . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xi
Consideraciones sobre seguridad . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xii
Safety Information (Japan) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xiii
Safety Information (China). . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xiv
EMC Regulatory Statements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xv
Notice for U.S.A. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xv
Notice for Canada . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xv
Notice for European Union . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xvi
Notice for Japan. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xvii
Notice for Korea. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xvii
1 Introducing the 520wl
Wireless Networking Concepts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-1
Management and Monitoring Capabilities . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-2
HTTP/HTTPS Interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1-2
Command Line Interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-2
SNMP Management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-2
SNMPv3 Secure Management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-3
802.11b/g compared to 802.11a Networks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-4
Feature List . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-4
Cell Size and Coverage Area . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-7
Installation and Initialization . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-8
2 Getting Started
Prerequisites . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-1
Product Package . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-2
AP Cards . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-2
System Requirements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-2
Hardware Installation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-3
iii
Initialization . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-6
ScanTool . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-6
Logging into the HTTP Interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-8
Setup Wizard . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-9
Download the Latest Software . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-13
Setup your TFTP Server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-13
Download Updates from your TFTP Server using the Web Interface . . . . . . . . . . . . . . . . . . 2-13
Download Updates from your TFTP Server using the CLI Interface . . . . . . . . . . . . . . . . . . . 2-13
Additional Hardware Features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-14
Installing the AP in a Plenum. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-14
LED Indicators . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-14
3 Status Information
System Status . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-1
4 Advanced Configuration
Configuring the AP Using the HTTP/HTTPS Interface . . . . . . . . . . . . . . . . . . . . . . . . . 4-1
System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-3
Dynamic DNS Support. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-3
Network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-4
IP Configuration. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-4
DHCP Server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-5
Link Integrity . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-6
Interfaces . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-7
Operational Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-8
Wireless (802.11a). . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-9
Wireless (802.11b). . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-10
Wireless (802.11b/g) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-14
Wireless Distribution System (WDS) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-15
Ethernet . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-16
Management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-17
Passwords . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-17
IP Access Table . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-17
Services . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-18
Filtering . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-24
Ethernet Protocol. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-24
Static MAC. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-24
Advanced. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-27
TCP/UDP Port . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-27
Alarms . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-28
Groups. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-28
Alarm Host Table . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-31
Syslog . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-31
iv
Bridge . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-32
Spanning Tree . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-32
Storm Threshold . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-33
Intra BSS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-33
Packet Forwarding. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-33
Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-34
Authentication and Encryption Modes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-34
MAC Access . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-39
Rogue Access Point Detection (RAD) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-41
RADIUS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-43
MAC Access Control by way of RADIUS Authentication . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-43
RADIUS Authentication with 802.1x . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-44
RADIUS Accounting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-46
VLAN/SSID . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-47
VLAN Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-47
VLAN Workgroups and Traffic Management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-49
Typical User VLAN Configurations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-49
Typical VLAN Management Configurations. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-50
5 Monitor Information
Accessing Monitor Features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-1
Version . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-2
ICMP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-3
IP/ARP Table . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-3
Learn Table . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-4
IAPP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-4
RADIUS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-5
Interfaces . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-6
Link Test . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-7
Station Statistics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-9
Enabling and Viewing Station Statistics. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-9
Refreshing Station Statistics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .5-9
v
6 Commands
Logging into the HTTP Interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-1
Introduction to File Transfer via TFTP or HTTP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-3
TFTP File Transfer Guidelines. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .6-3
HTTP File Transfer Guidelines . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-3
Image Error Checking during File Transfer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-3
Update AP via TFTP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-4
Update AP via HTTP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-5
Retrieve File via TFTP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-7
Retrieve File via HTTP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-8
Reboot . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-10
Reset . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-11
Help Link . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-12
7 Troubleshooting
Troubleshooting Concepts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-1
Symptoms and Solutions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-2
Connectivity Issues . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-2
Basic Software Setup and Configuration Problems. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .7-2
Client Connection Problems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-4
VLAN Operation Issues . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .7-4
Active Ethernet (AE) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-5
Recovery Procedures . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-5
Reset to Factory Default Procedure . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-6
Forced Reload Procedure . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .7-6
Setting IP Address using Serial Port . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .7-9
Related Applications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-11
RADIUS Authentication Server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-11
TFTP Server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-11
A Specifications
Software Features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . A-1
Management Functions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .A-1
Advanced Bridging Functions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .A-1
Medium Access Control (MAC) Functions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .A-2
Security Functions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .A-2
Network Functions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .A-2
Advanced Wireless Functions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .A-3
vi
Hardware Specifications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . A-3
Physical Specifications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .A-3
Ethernet Interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .A-4
Serial Port Interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .A-4
Active Ethernet Interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .A-4
HTTP Interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .A-4
Radio Specifications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . A-4
802.11a Channel Frequencies. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .A-4
802.11b Channel Frequencies. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .A-6
802.11g Channel Frequencies. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .A-7
Wireless Communication Range . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .A-7
B ASCII Character Chart
C Command Line Interface (CLI)
General Notes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . C-1
Prerequisite Skills and Knowledge . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . C-1
Notation Conventions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . C-1
Important Terminology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . C-1
Navigation and Special Keys . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . C-2
CLI Error Messages. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . C-2
Command Line Interface (CLI) Variations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . C-2
Bootloader CLI. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . C-3
CLI Command Types . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . C-4
Operational CLI Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . C-4
Parameter Control Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . C-8
Using Tables & User Strings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . C-11
Working with Tables. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .C-11
Using Strings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . C-12
Configuring the AP using CLI commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . C-12
Log into the AP using HyperTerminal . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . C-12
Log into the AP using Telnet . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . C-12
Set Basic Configuration Parameters using CLI Commands . . . . . . . . . . . . . . . . . . . . C-13
Other Network Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . C-17
CLI Monitoring Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . C-24
Parameter Tables . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . C-24
System Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . C-26
Network Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . C-27
Interface Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . C-30
Management Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . C-33
Filtering Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . C-36
Alarms Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . C-38
Bridge Parameters. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . C-39
vii
Security Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . C-41
RADIUS Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . C-42
Rogue Access Point Detection (RAD) Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . C-44
VLAN/SSID Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . C-44
Other Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . C-45
viii

Regulatory Information

Safety Information

Documentation reference symbol. If the product is marked with this symbol, refer to the product documentation
!
WARNING A WARNING in the manual denotes a hazard that can cause injury or death.
CAUTION A CAUTION in the manual denotes a hazard that can damage the equipment.

Grounding

This product is a safety class I compliant product and has a protective earthing terminal. There must be an uninterruptible safety earth ground from the main power source to the product’s power cord or supplied power cord set. Whenever it is likely that the protection has been impaired, disconnect the power cord until the ground has been restored.
For LAN cable grounding:
Q If your LAN covers an area served by more than one power distribution system, be sure their safety grounds
are securely interconnected.
Q LAN cables may occasionally be subject to hazardous transient voltages (such as lightning or disturbances in
the electrical utilities power grid). Handle exposed metal components of the network with caution.
to get more information about the product.
Do not proceed beyond a WARNING or CAUTION notice until you have understood the hazardous conditions and have taken appropriate steps.

Servicing

There are no user-serviceable parts inside this product. Any servicing, adjustment, maintenance or repair must be performed only by service trained personnel.
This product does not have a power switch; it is powered on when the power cord is plugged in.

Accessories

The following accessories are available for this product:
Q Wireless 802.11b Access Point Card 150wl Q Wireless 802.11a Access Point Card 160wl Q Wireless 802.11g Access Point Card 170wl Q Wireless Range Extender Antenna 100wl
Regulatory information for these products can be found in the installation instructions included with them.
ix

Informations concernant la sécurité

Symbole de référence à la documentation. Si le produit est marqué de ce symbole, reportez-vous à la
!
WARNING Dans la documentation, un WARNING indique un danger susceptible d'entraîner des dommages corporels ou
CAUTION Un texte de mise en garde intitulé CAUTION indique un danger susceptible de causer des dommages à
Cet appareil est un produit de classe I et possède une borne de mise à la terre. La source d'alimentation principale doit être munie d'une prise de terre de sécurité installée aux bornes du câblage d'entrée, sur le cordon d'alimentation ou le cordon de raccordement fourni avec le produit. Lorsque cette protection semble avoir été endommagée, débrancher le cordon d'alimentation jusqu'à ce que la mise à la terre ait été réparée.
Mise à la terre du câble de réseau local:
Q si votre réseau local s'étend sur une zone desservie par plus d'un système de distribution de puissance,
assurez-vous que les prises de terre de sécurité soient convenablement interconnectées.
Q Les câbles de réseaux locaux peuvent occasionnellement être soumis à des surtensions transitoires
dangereuses (telles que la foudre ou des perturbations dans le réseau d'alimentation public). Manipulez les composants métalliques du réseau avec précautions.
Aucune pièce contenue à l'intérieur de ce produit ne peut être réparée par l'utilisateur. Tout dépannage, réglage, entretien ou réparation devra être confié exclusivement à un personnel qualifié.
Cet appareil ne comporte pas de commutateur principal ; la mise sous tension est effectuée par branchement du cordon d'alimentation.
documentation du produit afin d'obtenir des informations plus détaillées.
la mort.
l'équipement.
Ne continuez pas au-delà d'une rubrique WARNING ou CAUTION avant d'avoir bien compris les conditions présentant un danger et pris les mesures appropriées.
x

Hinweise zur Sicherheit

Symbol für Dokumentationsverweis. Wenn das Produkt mit diesem Symbol markiert ist, schlagen Sie bitte in
!
WARNING Eine WARNING in der Dokumentation symbolisiert eine Gefahr, die Verletzungen oder sogar Todesfälle
CAUTION CAUTION in der Dokumentation symbolisiert eine Gefahr, die dis Gerät beschädigen kann.
Dies ist ein Gerät der Sicherheitsklasse I und verfügt über einen schützenden Erdungsterminal. Der Betrieb des Geräts erfordert eine ununterbrochene Sicherheitserdung von der Hauptstromquelle zu den Geräteingabeterminals, den Netzkabeln oder dem mit Strom belieferten Netzkabelsatz voraus. Sobald Grund zur Annahme besteht, daß der Schutz beeinträchtigt worden ist, das Netzkabel aus der Wandsteckdose herausziehen, bis die Erdung wiederhergestellt ist.
Für LAN-Kabelerdung:
Q Wenn Ihr LAN ein Gebiet umfaßt, das von mehr als einem Stromverteilungssystem beliefert wird, müssen Sie
sich vergewissern, daß die Sicherheitserdungen fest untereinander verbunden sind.
Q LAN-Kabel können gelegentlich gefährlichen Übergangsspannungen ausgesetzt werden (beispielsweise
durch Blitz oder Störungen in dem Starkstromnetz des Elektrizitätswerks). Bei der Handhabung exponierter Metallbestandteile des Netzwerkes Vorsicht walten lassen.
Dieses Gerät enthält innen keine durch den Benutzer zu wartenden Teile. Wartungs-, Anpassungs-, Instandhaltungs­oder Reparaturarbeiten dürfen nur von geschultem Bedienungspersonal durchgeführt werden.
Dieses Gerät hat keinen Netzschalter; es wird beim Anschließen des Netzkabels eingeschaltet.
der Produktdokumentation nach, um mehr Informationen über das Produkt zu erhalten.
verursachen kann.
Fahren Sie nach dem Hinweis WARNING oder CAUTION erst fort, nachdem Sie den Gefahrenzustand verstanden und die entsprechenden Maßnahmen ergriffen haben.
xi

Considerazioni sulla sicurezza

Simbolo di riferimento alla documentazione. Se il prodotto è contrassegnato da questo simbolo, fare riferimento
!
WARNING La dicitura WARNINGdenota un pericolo che può causare lesioni o morte.
CAUTION La dicituraCAUTION denota un pericolo che può danneggiare le attrezzature.
Questo prodotto è omologato nella classe di sicurezza I ed ha un terminale protettivo di collegamento a terra. Dev'essere installato un collegamento a terra di sicurezza, non interrompibile che vada dalla fonte d'alimentazione principale ai terminali d'entrata, al cavo d'alimentazione oppure al set cavo d'alimentazione fornito con il prodotto. Ogniqualvolta vi sia probabilità di danneggiamento della protezione, disinserite il cavo d'alimentazione fino a quando il collegaento a terra non sia stato ripristinato.
Per la messa a terra dei cavi LAN:
Q se la vostra LAN copre un'area servita da più di un sistema di distribuzione elettrica, accertatevi che i
collegamenti a terra di sicurezza siano ben collegati fra loro;
Q i cavi LAN possono occasionalmente andare soggetti a pericolose tensioni transitorie (ad esempio, provocate
da lampi o disturbi nella griglia d'alimentazione della società elettrica); siate cauti nel toccare parti esposte in metallo della rete.
Nessun componente di questo prodotto può essere riparato dall'utente. Qualsiasi lavoro di riparazione, messa a punto, manutenzione o assistenza va effettuato esclusivamente da personale specializzato.
Questo apparato non possiede un commutatore principale; si mette scotto tensione all'inserirsi il cavo d'alimentazione.
alla documentazione sul prodotto per ulteriori informazioni su di esso.
Non procedere oltre un avviso di WARNING o di CAUTIONprima di aver compreso le condizioni di rischio e aver provveduto alle misure del caso.
xii

Consideraciones sobre seguridad

Símbolo de referencia a la documentación. Si el producto va marcado con este símbolo, consultar la
!
WARNING Una WARNING en la documentación señala un riesgo que podría resultar en lesiones o la muerte.
CAUTION Una CAUTION en la documentación señala un riesgo que podría resultar en averías al equipo.
Este aparato se enmarca dentro de la clase I de seguridad y se encuentra protegido por una borna de puesta a tierra. Es preciso que exista una puesta a tierra continua desde la toma de alimentación eléctrica hasta las bornas de los cables de entrada del aparato, el cable de alimentación o el juego de cable de alimentación suministrado. Si existe la probabilidad de que la protección a tierra haya sufrido desperfectos, desenchufar el cable de alimentación hasta haberse subsanado el problema.
Puesta a tierra del cable de la red local (LAN):
Q Si la LAN abarca un área cuyo suministro eléctrico proviene de más de una red de distribución de electricidad,
cerciorarse de que las puestas a tierra estén conectadas entre sí de modo seguro.
Q Es posible que los cables de la LAN se vean sometidos de vez en cuando a voltajes momentáneos que
entrañen peligro (rayos o alteraciones en la red de energía eléctrica). Manejar con precaución los componentes de metal de la LAN que estén al descubierto.
Este aparato no contiene pieza alguna susceptible de reparación por parte del usuario. Todas las reparaciones, ajustes o servicio de mantenimiento debe realizarlos solamente el técnico.
Este producto no tiene interruptor de potencia; se activa cuando se enchufa el cable de alimentación.
documentación del producto a fin de obtener mayor información sobre el producto.
No proseguir después de un símbolo de WARNING o CAUTION hasta no haber entendido las condiciones peligrosas y haber tomado las medidas apropiadas.
xiii

Safety Information (Japan)

xiv

Safety Information (China)

xv

EMC Regulatory Statements

Notice for U.S.A.

Manufacturer’s FCC Declaration of Conformity Statement
Tes ted to Comply with F CC Standar ds
Product No: J8133A Manufacturer:Hewlett-Packard Company
3000 Hanover Street Palo Alto, CA 94304-1185 USA
Phone:650-857-1501
For questions regarding this declaration, contact the Product Regulations Manager at the above address or phone number.
This device complies with Part 15 of the FCC rules. Operation is subject to the following two conditions: 1) this device may not cause harmful interference, and 2) this device must accept any interference received, including interference that may cause undesired operation.
This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential
installation. This equipment generates, uses and can radiate radio frequency energy and, if not installed and used in accordance with the instructions, may cause harmful interference to radio communications. However, there is no
guarantee that interference will not occur in a particular installation. If this equipment does cause harmful interference to radio or television reception, which can be determined by turning the equipment off and on, the user is encouraged to try to correct the interference by one or more of the following measures:
Q Reorient or relocate the receiving antenna. Q Increase the separation between the equipment and the receiver. Q Connect the equipment into an outlet on a circuit different from that to which the receiver is connected. Q Consult the dealer or an experienced radio/television technician for help.
The FCC requires the user to be notified that any changes or modifications made to the device that are not expressly approved by the Hewlett-Packard Company may void the user’s authority to operate the equipment.

Notice for Canada

This device complies with the limits for a Class B digital device and conforms to Industry Canada standard ICES-003. Cet appareil numérique de la classe B est conforme à la norme ICES-003 de Industry Canada.
xvi

Notice for European Union

DECLARATION OF CONFORMITY
according to ISO/IEC Guide 22 and EN 45014
Manufacturer's Name: Hewlett-Packard Company
Manufacturer's Address: 8000 Foothills Blvd.
Roseville, CA 95747-5502 U.S.A.
declares, that the product
Product Name: HP Procurve Wireless Enterprise Access Point 520wl
Product Number(s): J8133A
Regulatory Model: WA1010
Product Options: J8134A, J8136A, J8149A, J8430A
conforms to the following Product Specifications:
Safety: IEC 60950:1991 + A1, A2, A3, A4 / EN 60950:1992 + A1, A2, A3, A4
EMC: EN 55022:1998 / CISPR 22:1997 Class B
EN 55024:1998 / CISPR 24:1997 EN 61000-3-2:1995 +A1, A2 / IEC 61000-3-2:1995 +A2 EN 61000-3-3:1995 Class B / IEC 61000-3-3:1994
1
Supplementary Information:
The product herewith complies with the requirements of the Low Voltage Directive 73/23/EEC and the EMC Directive 89/336/EEC and carries the CE marking accordingly.
1) The Product was tested in a typical configuration with 150wl 802.11b Access Point Cards.
Roseville, March 15, 2004
European Contact: Your local Hewlett-Packard Sales and Service Office or Hewlett-Packard GmbH, Department HQ-TRE, Herrenberger Straße 140, D-71034 Böblingen (FAX: + 49-7031-14-3143)
xvii

Notice for Japan

Notice for Korea

Regulatory Model Identification Number
For regulatory identification purposes, this product has been assigned a Regulatory Model Number (RMN). The RMN for your product is WA1010. The RMN should not be confused with the marketing name (Wireless Enterprise Access Point 520wl) or the Product Number (J8133A).
xviii

Introducing the 520wl

1

In This Chapter

Q Wireless Networking Concepts Q Management and Monitoring Capabilities Q 802.11b/g compared to 802.11a Networks Q Installation and Initialization

Wireless Networking Concepts

The 520wl provides wireless access to network infrastructures. As wireless clients move from one coverage cell to another, 520wl units automatically allow client roaming within the same subnet.
To determine the best location for the wireless access point units, we recommend conducting a site survey before placing the devices in their final locations. For information about how to conduct a site survey, contact your local reseller.
Before the 520wl can be configured for your specific networking requirements, it must first be initialized. Initialization consists of setting a static IP address and the appropriate IP mask for the 520wl so that you can recognize it once it is located in your network.
Figure 1-1 Standalone wireless network access infrastructure
The network administrator can configure each unit according to the requirements for the network. The HP ProCurve Wireless Access Point 520wl (hereafter called just “520wl”) functions as a wireless network access point (AP) to data networks. 520wl networks provide:
Q Seamless client roaming Q Easy installation and operation Q Over-the-air encryption of data Q High speed network links
For the 520wl to be fully operational, at least one HP ProCurve Wireless AP Card, either the 150wl (802.11b), 160wl (802.11a), or 170wl (802.11g) must be installed.
NOTE:
The AP Cards are not included with your 520wl and must be ordered as separate items.
1-1

Management and Monitoring Capabilities

To configure the 520wl for your needs, set your specific network, wireless interface, and bridge parameters. The HTTP (web browser) Interface provides easy configuration and management.
Wireless clients (computers connected to your network through wireless access) use configuration software for network access. Once connected, users can roam from one coverage cell to another while maintaining their connection.
There are four management and monitoring interfaces available to the network administrator to configure and manage the 520wl unit(s) in the network:
1. HTTP/HTTPS Interface
2. Command Line Interface
3. Full SNMP configuration capabilities
4. SNMPv3 Secure Management

HTTP/HTTPS Interface

The HTTP Interface (Web browser Interface) provides easy access to configuration settings and network statistics from any computer in the network. Use the HTTP Interface through your LAN (switch, hub, and so forth), through the Internet, or with a crossover Ethernet cable connected directly to your computer’s Ethernet Port.
HTTPS provides an HTTP connection over a Secure Socket Layer. HTTPS is one of two available secure management options on the AP; the other secure management option is SNMPv3. Enabling HTTPS allows the user to access the AP in a secure fashion using Secure Socket Layer (SSL) over port 443. The AP supports SSLv3 with a 128-bit encryption certificate maintained by the AP for secure communications between the AP and the HTTP client. All communications are encrypted using the server and the client-side certificate.
The AP comes with all required SSL files: default certificate, private key and SSL Certificate Passphrase, installed.

Command Line Interface

The Command Line Interface (CLI) represents a set of keyboard commands and parameters used for configuring and managing the 520wl.
Users enter Command Statements, composed of CLI Commands and their associated parameters. Statements may be issued from the keyboard for real time control, or from scripts that automate configuration. For example, when downloading a file, administrators enter the
download CLI Command along with IP Address, file name, and file type
parameters.
Q If necessary, use the CLI with your computer serial port to initialize the proper IP address for your network. Q The CLI provides configuration and management access for most generic Telnet and Terminal clients. Use the CLI
through your computer serial port, over your LAN, through the Internet, or with a crossover Ethernet cable connected directly to your computer.
Details of the CLI commands used to manage the 520wl device along with syntax and specific parameters names can be found in “Command Line Interface (CLI).”

SNMP Management

In addition to the HTTP and the CLI interfaces, you can also manage and configure a 520wl using the Simple Network Management Protocol (SNMP). This requires an SNMP manager program, like HP Openview or Castlerock’s SNMPc.
The 520wl supports several Management Information Base (MIB) files that describe the parameters that can be viewed and/or configured over SNMP:
Q MIB-II (RFC 1213) Q Bridge MIB (RFC 1493) Q Ethernet-like MIB (RFC 1643) Q 802.11 MIB Q Enterprise MIB
HP provides these MIB files on the 520wl CD and through the HP ProCurve website at
http://www.hp.com/go/hpprocurve. You need to compile one or more of the above MIBs into your SNMP program’s
database before you can manage the 520wl. Refer to the documentation that came with your SNMP manager for instructions on how to compile MIBs.
The Enterprise MIB defines the read and read-write objects that can be viewed or configured using SNMP. These objects correspond to most of the settings and statistics that are available with the other management interfaces. Refer to the Enterprise MIB for more information; the MIB can be opened with any text editor, such as Microsoft Word or WordPad.
1-2

SNMPv3 Secure Management

SNMPv3 is one of two available secure management options on the AP; the other secure management option is HTTPS (HTTP connection over Secure Socket Layer). SNMPv3 is based on the existing SNMP framework, but addresses security requirements for device and network management.
The security threats addressed by Secure Management are:
Q Modification of information: An entity could alter an in-transit message generated by an authorized entity in such a
way as to effect unauthorized management operations, including the setting of object values. The essence of this threat is that an unauthorized entity could change any management parameter, including those related to configuration, operations, and accounting.
Q Masquerade: Management operations that are not authorized for some entity may be attempted by that entity by
assuming the identity of an authorized entity.
Q Message stream modification: SNMP is designed to operate over a connectionless transport protocol. There is a
threat that SNMP messages could be reordered, delayed, or replayed (duplicated) to effect unauthorized management operations. For example, a message to reboot a device could be copied and replayed later.
Q Disclosure: An entity could observe exchanges between a manager and an agent and thereby learns the values of
managed objects and learn of notifiable events. For example, the observation of a set command that changes passwords would enable an attacker to learn the new passwords.
To address the security threats listed above, SNMPv3 provides the following when secure management is enabled:
Q Authentication: Provides data integrity and data origin authentication. Q Privacy (Encryption): Protects against disclosure of message payload. Q Access Control: Controls and authorizes access to managed objects.
NOTE:
The remainder of this guide describes how to configure a 520wl using the HTTP Web interface or the CLI interface. For information on how to manage devices using SNMP, refer to the documentation that came with your SNMP program. Also, refer to the MIB files for information on the parameters available by way of SNMP.
1-3

802.11b/g compared to 802.11a Networks

The 520wl supports 802.11 wireless connectivity through the use of 802.11a-compliant 5 GHz, 802.11b-compliant 2.4 GHz, and 802.11g-compliant 2.4 GHz radio technology. The IEEE 802.11a standard adds support for a high-speed wireless physical layer in the 5 GHz band using Orthogonal Frequency Division Multiplexing (OFDM). The standard requires support for data rates of 6, 12, 24, and 54 Mbps. The 520wl supports the following data rates: 1, 2, 5.5, 11, 6, 9, 12, 18, 24, 36, 48, 54 Mbits/s. The IEEE 802.11b standard supports wireless physical layer in the 2.4 GHz band using Direct Sequence Spread Spectrum (DSSS). The standard provides for data rates of 1, 2, 5.5, and 11 Mbits/s.
The new IEEE 802.11g standard adds support for a high-speed wireless physical layer in the 2.4 GHz band using Orthogonal Frequency Division Multiplexing (OFDM). The standard requires support for data rates of 6, 9, 12, 18, 24, 36, 48, and 54 Mbps.
The 520wl can be used with any combination of 802.11a, 802.11b, and 802.11g AP Cards. You can have an 802.11a and an 802.11b or 802.11g card present in the 520wl at the same time and 2.4 GHz and 5 GHz clients will be supported simultaneously. Note however that only one 802.11a card with antenna adapter can be plugged into the 520wl at one time.

Feature List

The IEEE standards that govern wireless communications are different for the 2.4 GHz band and the 5 GHz band. The table below compares the software features supported for each type of card in the 520wl:
Feature 2.4 GHz
Number of stations per AP up to 250 up to 128 up to 128 This information corresponds to a cas where no
HTTP/HTTPS Server yes yes yes Telnet / CLI yes yes yes SNMP/SNMPv3 support yes yes yes VLAN Support (16 User VLANs) no yes no Emergency Reset to Default
Configuration DHCP Client yes yes yes DHCP Server yes yes yes TFTP yes yes yes RADIUS Mac-based Access Control yes yes yes Fallback to Primary RADIUS Server yes yes yes RADIUS Session Timeout yes yes yes RADIUS Multiple MAC Address Formats yes yes yes RADIUS DNS Host Name Support yes yes yes RADIUS Start/Stop Accounting yes yes yes
802.1X (EAP-MD5, EAP-TLS and EAP­TTLS)
802.1d bridging yes yes yes MAC Access Control Table yes yes yes Protocol Filtering yes yes yes Multicast/Broadcast Storm Filtering yes yes yes Proxy ARP yes yes yes Roaming yes yes yes Link Integrity yes yes yes Automatic Channel Select yes yes yes WEP yes yes yes Key lengths supported for 802.11b: 64-bit and 128-bit
WEP Plus (Weak Key Avoidance) WDS Relay yes yes yes Remote Link Test Medium Density Distribution Distance between APs yes no no
1
1
1
(802.11b)
yes yes yes
yes yes yes
yes no no
yes no no yes no no
2.4 GHz
(802.11g)
5 GHz
(802.11a)
Comments
encryption is enabled. For more information about the number of stations supported when using different types of encryption, please see the table “Number of Stations per BSS” located in appendix A.
Key lengths supported for 802.11a and 802.11g: 64-bit, 128-bit, and 152-bit (Note: Some products refer to 64-bit as “40-bit”, 128-bit as “104-bit”, and 152-bit as “128-bit”.)
1-4
Feature 2.4 GHz
Closed System yes yes yes Interference Robustness yes no no Load Balancing AP List SpectraLink VoIP Support yes no no Blocking Intra BSS Clients yes yes yes Packet Forwarding yes yes yes TCP/UDP Port Filtering yes yes yes Dynamic Frequency Selection N/A N/A yes A user cannot manually select a channel for products
Per User Per Session Encryption no yes yes In conjunction with 802.1x or WPA Syslog Messaging yes no yes Turbo Mode no no yes Turbo mode provides twice the data rate of standard
Monitoring Station Statistics yes yes yes Secure Socket Layer (SSL) yes yes yes Rogue AP Detection Support no yes yes TX Power Control no yes no Auto Configuration yes yes yes Multiple Authentication Server Support yes yes yes Dynamic Domain Name Service (DDNS) yes yes yes AP System Naming Convention yes yes yes WiFi Protected Access (WPA) no yes no
1
This feature is only available when using an HP ProCurve Wireless 802.11b AP Card 150WL. In addition, this feature
1
1
(802.11b)
yes no no yes no no No client support for 802.11a
2.4 GHz
(802.11g)
5 GHz
(802.11a)
Comments
sold in Europe; these products require automatic channel selection using Dynamic Frequency Selection (DFS).
802.11a mode; not available in all countries.
2
will only give information for ORiNOCO/Agere/Lucent based clients.
2
WPA is supported only in the HP ProCurve Wireless 802.11g AP Card 170WL.
1-5
The following table provides detailed information on the differences between the 802.11a and 802.11b/g feature sets.
2.4 GHz (802.11b) 2.4 GHz (802.11g) 5 GHz (802.11a)
Physical Layer Type (Modulation Type)
Auto Channel Select (ACS)
DSSS (Direct Sequence Spread Spectrum)
Enable (default) Disable
ODFM (Orthogonal Frequency Division Multiplexing)
Enable (default) Disable
ODFM (Orthogonal Frequency Division Multiplexing)
Enable (default) Disable
Note: If your country has channel restrictions the ACS feature on the 150wl card should be disabled and you should configure an appropriate channel for your country manually. Use the table below and the HP
ProCurve Wireless Products Regulatory and Radio Approvals Booklet to determine which channels
you can use in your country.
Frequency Channel 1 - 2.412 GHz
2 - 2.417 GHz 3 - 2.422 GHz (default FCC, ETSI, Japan) 4 - 2.427 GHz 5 - 2.432 GHz 6 - 2.437 GHz 7 - 2.442 GHz 8 - 2.447 GHz 9 - 2.452 GHz 10 - 2.457 GHz 11 - 2.462 GHz 12 - 2.467 GHz (ETSI countries only) 13 - 2.472 GHz 14 - 2.484 GHz (Japan only)
For France, channels 10-13 only
Note: If your country has channel restrictions the ACS feature on the 170wl card should be disabled and you should configure an appropriate channel for your country manually. Use the table below and the HP
ProCurve Wireless Products Regulatory and Radio Approvals Booklet to determine which channels
you can use in your country. 1 - 2.412 GHz
2 - 2.417 GHz 3 - 2.422 GHz 4 - 2.427 GHz 5 - 2.432 GHz 6 - 2.437 GHz 7 - 2.442 GHz 8 - 2.447 GHz 9 - 2.452 GHz 10 - 2.457 GHz (default FCC, ETSI, Japan) 11 - 2.462 GHz 12 - 2.467 GHz (ETSI countries only) 13 - 2.472 GHz 14 - 2.484 GHz (Japan only)
For France, channels 10-13 only Channel 14 is only available when
using the .11b only mode.
Note: A user cannot manually select a channel for products sold in Europe; these products require automatic channel selection using DFS. See “
Frequency Selection (DFS)
36 - 5.180 GHz 40 - 5.200 GHz 44 - 5.220 GHz 48 - 5.240 GHz 52 - 5.260 GHz (default FCC) 56 - 5.280 GHz 60 - 5.300 GHz 64 - 5.320 GHz Channels 36-64 are valid for products in the FCC regulatory domain.
The following channels are available in Europe: 36 - 5.180 GHz (default) 40 - 5.200 GHz 44 - 5.220 GHz 48 - 5.240 GHz
The following channels are available in Japan:
34 - 5.170 GHz (default) 38 - 5.190 GHz 42 - 5.210 GHz 46 - 5.230 GHz
Dynamic
.”
Regulatory Domain USA (FCC)
Canada (DOC) Europe (ETSI) France (FR) Japan (MKK)
USA (FCC) Canada (DOC) Europe (ETSI) France (FR) Japan (MKK)
continued on the next page
For Turbo mode (not available in all countries), the following channels are available: 42 - 5.210 GHz 50 - 5.250 GHz 58 - 5.290 GHz
USA (FCC) Canada (DOC) Europe (ETSI) Japan (MKK)
1-6
2.4 GHz (802.11b) 2.4 GHz (802.11g) 5 GHz (802.11a)
Transmit Rate 1 Mbps
Distance Between APs
Multicast Rate 1 Mbps
Interference Robustness
Closed System Enable
Load Balancing Enable (default)
Medium Density Distribution
2 Mbps
5.5 Mbps 11 Mbps
large (default) medium small minicell microcell
2 Mbps (default)
5.5 Mbps 11 Mbps
Available options depend on Distance Between APs setting
Enable (default) Disable
Disable (default)
Disable Enable (default)
Disable
6 Mbps 9 Mbps 12 Mbps 18 Mbps 24 Mbps 36 Mbps 48 Mbps 54 Mbps
large (default) medium small
N/A N/A
Enable Disable (default)
0 - Auto Fallback (default) 6 Mbps 9 Mbps 12 Mbps 18 Mbps 24 Mbps 36 Mbps 48 Mbps 54 Mbps
For Turbo mode (not available in all countries):
0 - Auto Fallback (default) 12 Mbps 18 Mbps 24 Mbps 36 Mbps 48 Mbps 72 Mbps 96 Mbps 108 Mbps
N/A
N/A
Enable Disable (default)
N/A
N/A

Cell Size and Coverage Area

The coverage area achieved with the 2.4 GHz card type is larger than that of a 5 GHz card. The transmit rate is higher in the smaller (5 GHz) cell than the larger (2.4 GHz cell). The following illustrations depict the difference in cell sizes and the way that cell size affects coverage area.
Figure 1-2 Cell Size and Coverage Area
1-7
Figure 1-3 802.11a compared to 802.11b/g Coverage Area

Installation and Initialization

The 520wl is designed to support both 2.4 GHz (IEEE 802.11b), 2.4 GHz (IEEE 802.11g), and 5 GHz (IEEE 802.11a) AP Cards. The HP ProCurve Wireless 802.11a Access Point Kit 160wl has an antenna adapter which snaps into place on the existing wall mounting bracket. Because of the antenna adapter, only one 160wl card can be installed in the AP. The second slot can be populated with an HP ProCurve Wireless Access Point card 150wl (802.11b), or 170wl (802.11g).
Caution: Exposure to Radio Frequency Radiation.
To comply with the FCC RF exposure compliance requirements the following antenna installation and device operating configurations must be satisfied:
a. For configurations using the integral antenna the separation distance
between the antenna(s) and any person’s body (including hands, wrists, feet, and ankles) must be at least 2.5 cm (1 inch).
b. For configurations using an approved external antenna the separation
distance between the antenna and any person’s body (including hands, wrists, feet, and ankles) must be at least 20 cm (8 inches).
The transmitter shall not be collocated with other transmitters or antennas.
1-8

Getting Started

In This Chapter

Prerequisites
Product Package
System Requirements
Hardware Installation
Hardware Installation
Initialization
Download the Latest Software
Additional Hardware Features

Prerequisites

Before installing an AP, you need to gather certain network information. The following section identifies the information you need.
2
Network Name (SSID of the wireless cards) You must assign the Access Point a Network Name before wireless users can
AP’s IP Address If you do not have a DHCP server on your network, then you need to assign the
HTTP Password Each Access Point requires a read/write password to access the web interface. The default
CLI Password Each Access Point requires a read/write password to access the CLI interface. The default
SNMP Read Password Each Access Point requires a password to allow get requests from an SNMP manager.
SNMP Read-Write Password Each Access Point requires a password to allow get and set requests from an SNMP
SNMPv3 Authentication Password If Secure Management is enabled, each Access Point requires a password for sending
SNMPv3 Privacy Password If Secure Management is enabled, each Access Point requires a password when sending
Security Settings You need to determine what security features you will enable on the Access Point. Authentication Method A primary authentication server may be configured; a back-up authentication server is
Authentication Server Shared Secret This is a password shared between the Access Point and the RADIUS authentication
Authentication Server Authentication Port This is a port number (default is 1812) and is typically provided by the network
Client IP Address Pool Allocation Scheme The Access Point can automatically provide IP addresses to clients as they sign on. The
DNS Server IP Address The network administrator typically provides this IP Address.
communicate with it. The clients also need the same Network Name. This is not the same as the System Name, which applies only to the Access Point. The network administrator typically provides the Network Name.
Access Point an IP address that is valid on your network.
password is “public”.
password is “public”.
The default password is “public”.
manager. The default password is “public”.
authenticated SNMPv3 messages. The default password is “public”.
encrypted SNMPv3 data. The default password is “public”.
optional. The network administrator typically provides this information.
server (so both passwords must be the same), and is typically provided by the network administrator.
administrator.
network administrator typically provides the IP Pool range.
2-1
Getting Started

Product Package

Each AP comes with the following:
• One mounting plate
• Mounting hardware
• Metal faceplate for APs mounted in a plenum environment
• AP cover
• Processor module
• Power supply
• AC power cord
• One Installation CD-ROM that contains the following: – Software Installation Wizard – ScanTool – TFTP software – HTML Help – This user’s guide in PDF format
• One Unit Installation Quick Start Guide - foldout
If any of these items are missing or damaged, contact your reseller or see the support document that came with your AP for contact information.

AP Cards

APs can be fitted with different radio type AP Cards. AP Cards are available for 802.11a, 802.11b, and 802.11g.

System Requirements

To begin using an AP, you must have the following minimum requirements:
• A 10Base-T Ethernet or 100Base-TX Fast Ethernet switch or hub.
• At least one radio card designed for the AP: an HP ProCurve Wireless 802.11a Access Point Kit 160wl, 802.11b Access Point card 150wl, or 802.11g Access Point card 170wl.
• At least one of the following IEEE 802.11-compliant devices: – An 802.11a client device if you have an HP ProCurve Wireless 802.11a Access Point Kit 160wl – An 802.11b or 802.11g client device if you have an HP ProCurve Wireless Access Point card 150wl (802.11b)
or 170wl (802.11g)
• A computer that is connected to the same IP network as the AP and has one of the following Web browsers installed:
– Microsoft Internet Explorer 6 with Service Pack 1 or later and patch Q323308 – Netscape 6.1 or later (The computer is required to configure the AP using the HTTP interface.)
2-2
Getting Started

Hardware Installation

Follow these steps to install your AP:
1. Clip the power supply into the mounting bracket.
2. Plug the AC power cord into the power supply.
Figure 2-1 Install the power supply
3. Slide the AP module onto the mounting bracket. Ensure it is properly seated. It mounts over the power supply.
4. Plug the DC connector from the power supply into the top of the AP module.
Figure 2-2 Insert module in mounting bracket and attach power connector
2-3
Getting Started
Figure 2-3 Slide an AP Card into the AP
5. Slide an AP Card (not included in the kit) into slot A or B of the AP.
6. Connect the unit to a power source, such as a wall outlet.
7. Wait for the power LED to turn green before proceeding.
Figure 2-4 Power LED turns green when the unit is operational
8. Conduct a Site Survey to determine the best location for your device.
9. Once you have chosen a final location for your unit, mount the bracket and the processor module and place the cover onto the unit as shown.
Figure 2-5 Final Installation with Cover
2-4
Loading...
+ 161 hidden pages