" NOTICEThis publication contains information proprietary to Intermec Technologies Corpo-
ration. It is being supplied to you with the express understanding that the information contained herein is for the benefit of the contracting party only, and may
not be copied, distributed, or displayed to third parties without the express written consent of Intermec Technologies Corporation, and shall be returned to Intermec Technologies Corporation upon written request. If a purchase, license, or
nondisclosure agreement has been executed, the terms of that agreement shall
govern this document.
This publication is furnished for information only, and the information in it is
subject to change without notice. Although every effort has been made to provide
complete and accurate information, Intermec Technologies Corporation assumes
no responsibility or liability for any errors or inaccuracies that may appear in this
document.
We welcome your comments concerning this publication. Although every effort
has been made to keep it free of errors, some may occur. When reporting a specific
problem, please describe it briefly and include the book title and part number, as
well as the paragraph or figure number and the page number.
Send your comments to:
Intermec Technologies Corporation
Publications Department
550 Second Street SE
Cedar Rapids, IA 52401
INTERMEC, NORAND, PEN*KEY ,and TRAKKER are registered trademarks
and ANTARES and JANUS are trademarks of Intermec Technologies Corporation.
Ó1996 Intermec Technologies Corporation. All rights reserved.
This publication printed on recycled paper.
Acknowledgments
Portions of this product contain software which is licensed from and is copyrighted
by Epilogue Technology Corporation, 1988--1995, all rights reserved.
DECnet and VT are registered trademarks of Digital Equipment Corporation.
Ethernet is a trademark of Xerox Corporation.
Hewlett-Packard and HP are registered trademarks and HP OpenView is a
trademark of Hewlett-Packard Company.
Microsoft is a registered trademark of Microsoft Corporation.
Netscape Navigator is a trademark of Netscape Communications Corporation.
Novell and NetWare are registered trademarks and IPX and SPX are trademarks
of Novell, Inc.
PC AT is a registered trademark of International Business Machines Corporation.
PROCOMM and PROCOMM PLUS are registered trademarks of DataStorm
Technologies, Inc.
Proxim and RangeLAN are trademarks of Proxim, Inc.
FCC Computer Compliance
" NOTICEThis equipment meets Class B digital device limits per Part 15 of FCC Rules.
These limits protect against interference in a residential area. It emits, uses, and
can radiate radio frequency energy. If you do not install and use the equipment
according to its instructions, it may interfere with radio signals. However, there is
no guarantee that interference will not occur in a particular installation.
If this equipment does cause harmful interference to radio or television reception,
which can be determined by turning our equipment off and on, the user is encouraged to try to correct the interference by one or more of the following measures:
"Reorient or relocate the radio or television receiving antenna.
"Increase the separation between the computer equipment and receiver.
"Connect the equipment into an outlet on a circuit different from that to
which the radio or television receiver is connected.
"Consult the dealer or an experienced radio or television technician for
help.
FCC Spread Spectrum Radio Certification
" NOTICEThis device is certified to operate under Part 15, Subpart C, Section 15.247 of the
FCC rules for Intentional Radiation Products. This certification includes Docket
87-389 covering rules effective June 1994. It may not cause interference to
authorized radio communication devices, and must accept any interference caused
by those devices.
Antenna Requirements
" NOTICEFCC rules section 15.203 and Canada’s RSS-210 require that this device be oper-
ated using an antenna furnished by Intermec Technologies Corporation. The antenna coupling on this product has been designed to accept only antennas
manufactured by us. Use of an antenna other than that furnished with the equipment is prohibited by FCC and Industry Canada rules.
Canadian Computer Compliance
This Class B digital apparatus meets all requirements of the Canadian
Interference-Causing Equipment Regulations.
Cet appareil numerique de la classe B respecte toutes les exigences du Reglement
sur le material boilleur du Canada.
Canadian Spread Spectrum Radio Certification
" NOTICEThis device complies with RSS-210 of Industry Canada. Operation is subject to
the following two conditions: (1) this device may not cause interference, and (2)
this device must accept any interference, including interference that may cause
undesired operation of the device.
Canadian 2.4 GHz Radio License
" NOTICEThis device requires a radio license, unless it is installed totally inside a building.
(Users must obtain this license)
Une licence radio est requise pour ces dispositifs, sauf pour ceux installés tout à
fait à l’intérieur d’un bâtiment. (Il faut que l’utilisateur obtienne cette licence.)
Telephone Installation Warning Notices
The following notices apply to equipment that may be connected to telephone lines
or systems. For your personal safety, and to protect this equipment from potential
electrical or physical damage, do NOT connect equipment to telephone lines or
data communication equipment unless the following warnings have been read,
understood, and complied with.
"Never install telephone wiring during a lightning storm.
"Never install telephone jacks in wet locations unless the jack is specifi-
cally designed for wet locations.
"Never touch uninsulated telephone wires or terminals unless the tele-
phone line has been disconnected at the network interface.
"Use caution when installing or modifying telephone lines.
"Avoid using telephone (other than cordless type) during an electrical
storm. There may be a remote risk of electric shock from lightning.
"Do not use the telephone to report a gas leak in the vicinity of the leak.
Installation du téléphone : avertissements
Les avertissements qui suivent s’appliquent à tout équipement qui peut être
branché aux lignes ou systèmes téléphoniques. Pour votre sécurité personnelle et
pour protéger l’équipement de tout dommage électrique ou physique potentiel, NE
PAS brancher un ordinateur tablette électronique ou ses périphériques aux lignes
téléphoniques ou équipements avant que les avertissements suivants aient été lus,
compris et observés :
"Ne jamais installer de câblage téléphonique pendant un orage électrique.
"Ne jamais installer de prise téléphonique dans un endroit humide à
moins que la prise ait été spécifiquement conçue pour être utilisée dans
les endroits humides.
"Ne jamais toucher les fils de téléphone ou de l’équipement terminal non
isolés à moins que la ligne téléphonique n’ait été débranchée de l’interface réseau.
"User de prudence lors de l’installation ou de la modification de lignes
téléphoniques.
"Éviter d’utiliser un téléphone (autre qu’un appareil téléphonique sans
fil) pendant un orage électrique. Il pourrait y avoir un faible risque d’électrocution par la foudre.
"Ne pas utiliser le téléphone afin de signaler une fuite de gaz à proximité
de la fuite.
B
CAUTION:Intermec Technologies Corporation suggests you buy cables from us
to connect with other devices. Our cables are safe, meet FCC rules,
and suit our products. Other cables may not be tested. They may
cause problems from electrostatic discharge or induced energy. Our
warranties do not cover loss, injury, or damage from other cables.
This user’s guide describes the installation, setup, and
maintenance of the 6710 Access Point. This guide covers
access point FLASH version 1.27 or greater and ROM
version 1.12 or greater .
Norand Corporation is now part of Intermec Technologies
Corporation. As part of our continuing efforts to offer the
broadest range of system solutions in the industry, the 6710
Access Point and other open wireless local area network
(LAN) components have been merged into the INTERMEC
Integrated Network Communications Architecture (INCA).
Where appropriate, we have continued to use the Norand
name in references to the open wireless LAN to maintain
continuity with existing product in the field.
R
Organization
This Preface describes the intended audience for this guide,
lists related publications, and tells how to contact the
Customer Response Center . Other sections do the
following:
Section 2,
“Features and
Functional
Overview”
Describes the access point and how
it operates on the open wireless
LAN. It also describes access point
components.
6710 Access Point User’s Guide1-1
SECTION 1 " Preface
Section 3,
“Installation”
Helps you prepare your site before
you install the access point, and
shows how to connect the access
point to 10BASE-T, 10BASE2, and
10BASE5 Ethernet.
Section 4,
“Configuration”
Describes how to create a
communications session with the
access point, access FLASH and
ROM, and set up the access point
through its configuration menus.
Section 5,
“Software Download”
Describes file system methodology
and the functional characteristics
of the software download process.
Section 6,
“Indicator Lights”
Describes the access point’s
indicator lights and contains
troubleshooting tips.
Appendixes contain supplemental information:
Appendix ALists mechanical, electrical, and
environmental specifications for
the access point.
Appendix BLists specifications and antennas
for the WLIF radio.
Appendix CLists specifications and antennas
for the 900 MHz radio.
Appendix DLists specifications and antennas
for the synthesized UHF radio. It
also discusses UHF technology.
Appendix EDescribes OWL/IP (IP tunneling).
Appendix FShows port and cable pin-outs.
Appendix GDescribes the 6710 Management
The glossary at the end of this manual lists network terms.
1-26710 Access Point User’s Guide
Information Base (MIB).
Intended Audience
This user’s guide is intended for these audiences:
" Network administrator who is familiar with various
types and configurations of computer networks, how
they work, and the terminology used when discussing
them.
" Hardware installer who is responsible for performing
the physical installation of the access point and any
related hardware that might be required.
Related Publications
The following publications are available. They include
information about hardware and software products related
to or used with the access point and the network on which it
operates.
SECTION 1 " Preface
Numbers in parentheses after the title indicate the
publication’s part number. Contact your Sales
Representative for ordering information.
Wireless Station User’s Guides
Wireless station user’s guides describe how to set up,
operate, and maintain radio terminals in each series of
terminal. Specific manuals are:
PEN*KEYRModel 6400 User’s Guide (961-047-093)
PEN*KEY Model 6500/6550 User’s Guide (961-047-099)
RT1100 Radio Terminal User’s Guide (961-047-069)
RT1700 Radio Terminal User’s Guide (961-047-068)
RT5900 Radio Terminal User’s Guide (961-047-121)
6710 Access Point User’s Guide1-3
SECTION 1 " Preface
System Management Publications
NORAND Open W ireless LAN with HP OpenView for
W indows User’s Guide (961-051-009)
This guide describes how to install and use the OpenView
for Windows network management platform by
Hewlett-Packard (HP).
OWL View for HP OpenView for UNIX User’s Guide
(961-051-01 1)
This guide describes how to install and use the OWLView
for HP OpenView for UNIX network management platform.
OWL View for HP OpenView for Windows User’s Guide
(961-051-010)
This guide describes how to install and use the OWLView
for HP OpenView for Windows network management
platform.
Customer Support
The goal of Intermec Technologies Corporation is 100
percent customer satisfaction. If you would like more
information about the access point or other open wireless
LAN system components, contact us through the Customer
Response Center .
In North America, call: 800-221-9236 or 319-369-3533
1-46710 Access Point User’s Guide
Section 2
Features and Functional Overview
""""""""""""""""""""""""""""
This section describes the 6710 Access Point and how it
operates on the open wireless LAN. This section also
describes access point components.
Description
The 6710 Access Point provides transparent, wireless
communications between a wired Ethernet LAN and
wireless stations. Figure 2-1 shows current designs;
information in this user’s guide applies to both designs.
Figure 2-1
6710 Access Points
6710 Access Point User’s Guide2-1
SECTION 2 " Features and Functional Overview
The access point functions as a 4-port translating bridge.
Functionality within the access point can be partitioned
into two major functional blocks: bridging functionality
and management functionality. Bridging functions pertain
to the forwarding of data through the access point.
Management functionality involves configuration, software
upgrade, and network management.
Figure 2-2 is a simplified diagram showing the functions
within the access point.
Management and ConfigurationBridging
MIB
SNMP
DHCP
TFTPHTTPTelnet
File
System
RS-232 Diagnostics Port
Agent
TCP/IP
Device
Configuration
Forwarding
Database
Network
Organization
Figure 2-2
6710 Access Point Functions
Bridging Functionality
General Concepts
Bridges are common components in wired LANs. Bridges
are devices that join two or more LAN segments. This
provides the appearance of a single LAN segment to the
protocols and applications that operate within the LAN.
Port 2
(NIC 2)
Bridging
(Ethernet)
AUI10BASE210BASE-T
Port 3
(NIC 1)
Port 1
Port 4
(OWL/IP)
Proxy ARP
2-26710 Access Point User’s Guide
SECTION 2 " Features and Functional Overview
Bridges operate at the Media Access Control (MAC)
sublayer of the Data Link Layer (Layer 2) of the
International Organization for Standardization (ISO)
protocol model. Operating at the MAC layer allows bridges
to operate transparently to commonly used network
protocols such as TCP/IP, Novell SPX/IPX, NetBEUI, and
DECnet.
In wired LANs, bridges do the following:
" Segment traffic for better efficiency and performance.
" Extend the reach of LANs when cable length or node
limits have been reached.
" Translate between different LAN types such as IEEE
802.3 Ethernet and 802.5 Token Ring.
A LAN environment normally consists of a collection of
nodes or stations, each identified by a unique 48-bit
physical address (also called an IEEE address or MAC
address). Data is sent on the LAN as frames or packets
that contain the source address of the station sending the
frame, and the destination address of the recipient station.
A bridge has at least two ports, each connected to a
different LAN segment. Bridges learn which source
addresses are generating traffic on each of their ports. If
the bridge receives a frame with a destination address
corresponding to a source address it has seen on another
port, it forwards the frame to the port. If it receives a
frame where the source and destination addresses are on
the same port, it ignores (drops) the frame, since the
destination node receives the original transmission.
Generally, if a bridge receives a frame for an unknown
destination address on any one port, it floods the frame on
all other ports.
6710 Access Point User’s Guide2-3
SECTION 2 " Features and Functional Overview
Access Point Bridging Layer
The 6710 Access Point functions as a bridge with up to four
ports:
" An Ethernet port.
" One or two radio ports.
" An Open Wireless LAN/Internet Protocol (OWL/IP)
port.
The access point is a translating bridge because it forwards
frames between Ethernet and wireless media that have
unique physical and MAC protocol implementations. The
access point implements the basic learning and forwarding
functions of a simple wired LAN bridge. It also includes
additional functionality to address unique problems in
wireless LANs.
Significant functions supported at the bridging layer
include network organization, support for roaming and
power-managed stations, and programmable flooding levels.
Network Organization
Open wireless LAN networks may be complex, supporting:
" Small or large numbers of access points on a single
wired LAN backbone.
" Stations that roam between coverage areas and
employ power management to improve battery life.
More complex topologies include the following:
" Range extension through wireless access points, which
are not connected to the wired LAN backbone.
" Secondary LANs (connection of wired LAN segments
by wireless links).
" Mixed radio frequency (RF) media.
" Operation over multiple IP subnets.
" Multiple, independent wireless LANs on one wired
LAN backbone.
2-46710 Access Point User’s Guide
SECTION 2 " Features and Functional Overview
Access points automatically configure into a self-organized
network using a spanning tree topology. They
automatically reconfigure the network to maintain reliable
operation as devices are added or removed, or in the event
of some types of wired LAN failure. The spanning tree
provides efficient, loop-free forwarding of frames through
the network and rapid roaming of mobile stations within
the network.
The spanning tree is initiated by the super root, an access
point that coordinates the network and distributes common
system parameters to other access points and stations. The
super root is elected from a group of access points
designated at the time of installation. The election process
also occurs in the event of a super root failure, preventing a
single point of failure.
Forwarding
The bridge maintains a forwarding database of all physical
station addresses known to the access point, and the correct
port for each address. This database makes efficient
forwarding decisions in the bridging software.
The database is updated through monitoring addresses on
each port, and by messages exchanged between access
points when stations roam. The database also includes the
power management status of each station, supporting the
pending message feature of the network.
Pending Messages
Wireless stations may use power management to maintain
battery life. These stations wake up periodically to receive
messages that may have arrived while their radio was
powered down. The bridging software provides a pending
message delivery service, allowing frames to be held until
the station is ready to receive them.
6710 Access Point User’s Guide2-5
SECTION 2 " Features and Functional Overview
Flooding Configurations
Standard LAN bridges flood frames on all ports when the
destination address is unknown. Additionally, many
network protocols use multicast addressing for connection
and status communications. A multicast frame is a special
type of frame destined for more than one physical address.
Standard bridges always flood multicast frames.
Most wireless media supported in the access point operate
at lower media speeds than Ethernet. Indiscriminate
flooding from a busy Ethernet backbone to a wireless
medium can consume a substantial portion of the available
wireless bandwidth. This reduces system performance even
though flooded frames are frequently not intended for
stations on a given wireless segment.
To allow performance tuning, the access point provides
separate flooding control options for both unicast (single
physical address) and multicast frames. Access points
serving as designated bridges connecting wired LAN
segments may be configured to use different flooding
settings than access points serving only wireless stations.
Two of the wireless media supported in the access point —
synthesized UHF (S-UHF) and 900 MHz — provide reliable
attach mechanisms, which guarantee that wireless stations
are always in the access point’s forwarding database.
Unicast flooding is never required for these stations.
The Wireless LAN Interoperability Forum (WLIF) 2.4 GHz
option also provides a reliable attach mechanism for
stations using the NORANDRNetwork Layer (NNL)
terminal emulation network protocol. Multicast flooding
levels are set for individual networks based on the needs of
wireless stations to receive multicast frames. For networks
with IP wireless stations only, the Proxy ARP Server
provides an option to enabling multicast flooding.
2-66710 Access Point User’s Guide
SECTION 2 " Features and Functional Overview
Proxy ARP Server
The Proxy ARP Server is an advanced flooding control
capability for stations using IP. An ARP (Address
Resolution Protocol) is a type of multicast message used to
determine the physical (MAC) address of a station using a
specific IP address. When Proxy ARP is enabled, the IP
addresses of stations using IP are included in the
forwarding database. If the destination IP address matches
an entry in the forwarding database, the ARP is sent to the
physical unicast address matching that IP address.
To allow customization of this capability to optimize
performance, the server operates in one of the following
modes:
" No flooding.
" Delayed flooding.
" Normal flooding.
Proxy ARP Server is discussed in more detail in Section 4,
“Configuration.”
Bridge Ports
The access point has the following physical ports:
" An Ethernet port.
" Two PC card slots capable of accepting a variety of
wireless Network Interface Cards (NICs).
The access point also has a logical OWL/IP port.
Ethernet Port
The Ethernet port can be configured to support 10BASE-T
twisted pair , 10BASE2 thinnet, or an AUI connection. The
AUI connection can support 10BASE5 thicknet or 10BASEF
fiber optic connections with the appropriate media
adapters.
6710 Access Point User’s Guide2-7
SECTION 2 " Features and Functional Overview
The physical connections are on the bottom panel of the
access point. The desired Ethernet medium is selectable
through the device configuration menus. Section 3,
“Installation,” has more information about connecting the
access point to Ethernet media. Section 4, “Configuration,”
describes how to set the medium through the configuration
menus.
Ethernet Port Filters
The Ethernet port can be configured to support a variety of
preconfigured and custom input filters. Access points are
commonly installed on LANs that carry traffic for wired and
wireless devices. Setting filters prevents unnecessary
traffic from the wired LAN from being forwarded onto the
wireless medium. This is important because common
wireless technologies operate at data rates below Ethernet
speeds.
Normally, filters are set to pass traffic known to be (or
likely to be) destined for wireless stations, and drop traffic
not destined for stations requiring wireless connectivity.
Filtering occurs in the Ethernet driver software that
controls low level operation of the Ethernet ports,
minimizing involvement of other functions when
unnecessary frames are received. In most installations, the
predefined filters are used. The default access point
configuration sets no filters. Filter setup is discussed in
more detail in Section 4, “Configuration.”
Filtering and flooding control (described on page 2-6) are
complimentary but have different functions. Filters allow
frames to be eliminated based upon content of the frame,
usually the network protocol header fields within the frame.
For example, filters can be set to eliminate some or all IP
traffic or Novell IPX traffic.
2-86710 Access Point User’s Guide
SECTION 2 " Features and Functional Overview
Filtering occurs regardless of whether the destination
address is in the forwarding database. Using filters can
improve the performance of the access point and prevent
undesired frames from being forwarded to wireless stations
attached to the access point.
Flooding decisions are made after frames have been
received on a port and filtered. Flooding settings determine
how the access point forwards frames to destination
addresses not in the forwarding database.
Radio Ports
Each of the two radio ports in the access point are a
connection into a LAN segment consisting of all wireless
stations and access points that use the same wireless
technology, are within wireless communications range of
the access point, and are configured to communicate
together .
The two PC card slots are intended for wireless NICs and
are designated as NIC1 and NIC2. Internally, they are
configured as Port 3 and Port 2, respectively. The following
wireless options are currently supported:
" WLIF (2.4 GHz).
" 900 MHz.
" 450 MHz S-UHF.
The different media options provide alternative coverage
and throughput tradeoffs. Radio media options are
described in more detail in Appendixes B, C, and D.
The access point also supports combinations of two adapters
for operation in mixed media systems; or , for WLIF radios,
a wireless access point capability. The following dual radio
configurations are supported:
" WLIF and 900 MHz.
" WLIF and S-UHF.
" WLIF and WLIF (limited to Master/Slave
configuration for wireless access points).
6710 Access Point User’s Guide2-9
SECTION 2 " Features and Functional Overview
Configuration of individual radio options and the WLIF
wireless access point configuration are discussed in Section
4, “Configuration.”
OWL/IP Port
The OWL/IP port is a logical port used in installations
where the wireless infrastructure is required to operate
across multiple IP subnets; that is, in installations where
IP routers are used.
The OWL/IP port is an advanced capability that allows
stations supporting IP and nonroutable protocols such as
NNL (used in some terminal emulation installations) to
roam without losing connectivity when a wireless LAN
installation must extend over multiple IP subnets. In some
cases, OWL/IP may also provide connectivity in larger ,
routed networks when roaming between IP subnets is not
required, but where it is desirable to configure a single
wireless network across router boundaries.
OWL/IP uses General Router Encapsulation (GRE), a
registered protocol from the TCP/IP protocol suite. GRE
allows frames destined for stations on a different IP subnet
to be encapsulated with an IP address that passes
transparently through routers. Encapsulation is also
sometimes referred to as tunneling.
To simplify configuration, OWL/IP functionality is treated
as an additional port within the access point architecture.
It is a logical port in that there is no physical radio or wired
LAN port associated with OWL/IP.
Encapsulated frames may be sent through any of the three
physical ports. Access points separated by one or more
routers may be thought of as originating and receiving
nodes on the two sides of a tunnel that is established
through the router .
2-106710 Access Point User’s Guide
SECTION 2 " Features and Functional Overview
The forwarding database entry for a station on the other
side of the tunnel includes the physical port (NIC1, NIC2,
or Ethernet) the frame should be forwarded through, and
an indication that encapsulation is required. The receiving
access point on the other side of the tunnel de-encapsulates
the frame and then forwards it on the correct physical port.
OWL/IP is described in more detail in Section 4,
“Configuration,” and Appendix E, “OWL/IP.”
Configuration and Management
Configuration
The access point can be configured through a local RS-232
connection, or remotely through a TCP/IP connection. The
access point includes a command monitor and menu driven
configuration with online help. The command monitor and
file system configuration are contained in permanent
read-only memory (ROM) within the access point, and can
be accessed through the RS-232 diagnostics port even if
software is not loaded in the access point.
Most access point functionality is provided by the software
stored within the file system. Configuration parameters
are stored in nonvolatile EEPROM memory, and are
maintained in the event of power loss.
Diagnostics and Configuration Port
An RS-232 configuration port is provided for direct access to
the access point’s command monitor and configuration
menus. Access through the diagnostics port is
password-protected for security.
6710 Access Point User’s Guide2-11
SECTION 2 " Features and Functional Overview
The port uses a standard PC AT style cable, and operates at
speeds up to 57.6 Kbps. Configuration using this port is
described in Section 4, “Configuration.”
Remote Access
Remote access is available over TCP/IP connections using
Telnet or Hypertext Transfer Protocol (HTTP) for
configuration management, and Simple Network
Management Protocol (SNMP) for network management.
TCP/IP
The access point supports remote access through a Request
for Comments (RFC) compliant TCP/IP stack. Before initial
usage, the stack must be initially configured with an IP
address and an optional default router through the RS-232
diagnostics port. Alternatively, the access point may be
configured with a Dynamic Host Configuration Protocol
(DHCP) server name. The access point then obtains its IP
address, default router , and subnet mask from a DHCP
server .
DHCP Client
The access point contains a DHCP client, allowing it to
receive an IP address over the network. The DHCP client
supports temporary and permanent leases. It also accepts
permanent leases from a Bootstrap Protocol (Bootp) server .
See Section 4, “Configuration,” for further detail on DHCP
operation.
Telnet
Telnet may be used to access the access point’s
configuration menus. The command interface is identical to
the command interface through the diagnostics port. See
Section 4, “Configuration,” for more information about
access through Telnet.
2-126710 Access Point User’s Guide
SECTION 2 " Features and Functional Overview
HTTP
The access point supports configuration using HTTP from a
workstation equipped with a Web browser . Internet
Explorer or Netscape Navigator is recommended. See
Section 4, “Configuration,” for more information about
access through a Web browser .
Electronic Software Distribution
The access point supports electronic software distribution,
which allows software upgrades after installation. The
access point provides a dual bank file system with one
active bank and one inactive bank. It operates from the
active bank, allowing software upgrades to be stored in the
inactive bank. This enables upgrades to be loaded while
the access point is operating.
The upgrade can be started immediately after downloading
by swapping the active and inactive banks and rebooting.
The access point can also be programmed to load the new
software at a later time, such as after all access points have
been upgraded or during a time of little system activity.
TFTP Client and Server
Software downloads are accomplished using the Trivial File
Transfer Protocol (TFTP), another member of the IP suite.
Each access point contains a TFTP client and server . The
TFTP client allows the access point to obtain software
updates from a TFTP server . The server can be an access
point configured with the TFTP server enabled, or another
network workstation with TFTP server capability.
Scripting
The access point supports a scripting capability that
automates most of the software download process. Scripts
can be uploaded to the access point through Telnet or
SNMP.
6710 Access Point User’s Guide2-13
SECTION 2 " Features and Functional Overview
Network Management
The access point is instrumented for network management,
with variables defined in the Management Information
Base (MIB). The MIB is SNMP V1 compliant.
Management information can be accessed through the
SNMP agent. The MIB may be ordered separately and
compiled for any SNMP network management platform.
Additional capabilities are supported in the OWLView
network management application for HP OpenView.
Appendix G, “MIB,” contains the 6710 Access Point MIB.
Consult the following documentation for more information
on network management:
" NORAND Open Wireless LAN with HP OpenV iew for
Windows User’s Guide (961-051-009)
" OWLV iew for HP OpenView for UNIX User’s Guide
(961-051-011)
" OWLV iew for HP OpenView for Windows User’s Guide
(961-051-010)
Sample Configuration
Figure 2-3 shows a sample network configuration. It also
shows access points providing additional coverage and
wireless links to secondary Ethernet LANs.
"
NOTE:Consult Appendix D, “S-UHF Specifications and Antennas,” for
network configuration limitations for S-UHF systems.
2-146710 Access Point User’s Guide
SECTION 2 " Features and Functional Overview
LAN Server
6710 Access Point
6710 Access Point
(Designated Bridge)
Secondary Ethernet LAN
Desktop
Host
6710 Access Points
PEN*KEYR6400
Computer
Terminal Emulation
Gateway
Distribution LAN
Wireless Hop
Notebook
(WLIF)
PEN*KEY 6400
Computer
Figure 2-3
Sample Network Configuration
6710 Access Point User’s Guide2-15
SECTION 2 " Features and Functional Overview
Components
Figure 2-4 shows access point components, described on the
following pages. Not shown is the mounting bracket, which
attaches the access point to a wall or ceiling.
2-166710 Access Point User’s Guide
Figure 2-4
Access Point Components
SECTION 2 " Features and Functional Overview
1.Protective cover. The cover protects two Type II or
Type III PC card slots. Figure 2-5 shows where the
slots are located.
1
1
1. PC card slots
Figure 2-5
PC Card Slots
2.Indicator lights. Four pairs of indicator lights
(LEDs) on the front panel show the status of the
access point. During the power-up sequence, the
lights show the results of the power-up self diagnostics
and provide information about the operating status.
After the power-up sequence, the lights show the
current operating status and indicate if a problem
exists. Section 6, “Indicator Lights,” describes the
lights in detail.
6710 Access Point User’s Guide2-17
SECTION 2 " Features and Functional Overview
3.Rubber feet. Four nonskid rubber feet provide a
stable base for the access point when you place it on a
desktop or other horizontal surface.
When the mounting bracket is installed for an access
point mounted vertically or on the ceiling, the rubber
feet provide a small amount of tension to the bracket
to help hold it in place.
4.AC INPUT. The AC INPUT connector is a standard
IEC type, three-prong AC input connector . The power
cord attaches to this connector . The internal power
supply is an autosensing international power supply.
It accepts a source voltage between 85 and 264 V ac,
with a frequency between 47 and 63 Hz.
5.10 BASE 2. The 10 BASE 2 port is a standard BNC
port through which the access point connects to
10BASE2 Ethernet (thinnet).
6.10 BASE T. The 10 BASE T port is a standard RJ45
port through which the access point connects to
10BASE-T (UTP) Ethernet.
7.AUI. The AUI port is a 15-pin, D-subminiature
(D-sub) port. The access point connects to an AUI
network adaptor through this port, for connection to
10BASE5 Ethernet (thicknet). Appendix F, “Port and
Cable Pin-Outs,” contains pin definitions.
"
NOTE:Section 3, “Installation,” shows how to connect the access point to
10BASE2, 10BASE5, and 10BASE-T.
8.DIAG. The DIAG port is a 9-pin D-sub
communication port that communicates at RS-232
levels. Use this port to configure the access point,
download new software, and retrieve statistics.
Appendix F contains pin definitions.
2-186710 Access Point User’s Guide
Accessories
Power Cord
The power cord connects the access point to the wall outlet.
The following chart lists power cord part numbers.
CountryPart Number
Australia321-472-001
Denmark321-501-001
Europe321-473-001
Italy321-471-001
Germany321-515-001
United Kingdom321-474-001
United States321-054-001
SECTION 2 " Features and Functional Overview
Industrial Locking Mounting
Bracket
The Industrial Locking Mounting Bracket “locks” the access
point into the bracket. This bracket is recommended for
installations where vibration, shaking, or other movement
can dislodge the access point from its mount.
ItemPart Number
Mounting kit203-386-001
6710 Access Point User’s Guide2-19
SECTION 2 " Features and Functional Overview
2-206710 Access Point User’s Guide
Section 3
Installation
""""""""""""""""""""""""""""
This section describes how to:
" Check the access point’s default configuration.
" Prepare for the installation.
" Collect the networking equipment you need.
" Find the best location.
" Connect to the Ethernet medium.
" Install PC cards.
" Apply power .
Checking the Default Configuration
The access point is shipped with default settings for system
software parameters, which are listed in Section 4,
“Configuration.” You may need to change some default
settings to achieve a more efficient configuration for your
site. See Section 4 for information about reconfiguring the
access point. The access point should be properly
configured before it is connected to the network.
6710 Access Point User’s Guide3-1
SECTION 3 " Installation
Preparing for the Installation
"
NOTE:Someone who knows and understands all applicable local building
codes and is proficient with the tools and equipment used to install
FCC Class B electromechanical devices should physically install the
access point.
Before you install the access point, unpack it and inspect it
for damage or missing parts. Save all the paperwork you
received. If the access point appears to be damaged, contact
the Customer Response Center for instructions on
returning the unit for replacement.
The shipment contains the access point with FLASH and
the following items:
" Mounting bracket
" AC power cord
" Warranty card
Collecting the Equipment
Before you install the access point onto the network, collect
the equipment you will need.
Ethernet LAN Components
The access point directly connects to 10BASE2, 10BASE-T,
or 10BASE5 Ethernet medium. Consult a cabling reference
for maximum run lengths and node limits for Ethernet
wiring.
3-26710 Access Point User’s Guide
SECTION 3 " Installation
10BASE2 Components
10BASE2 components include a T-connector, a cable
terminator , and the proper lengths of 10BASE2 coax cable.
The 10BASE2 T-connector (Figure 3-1) attaches to the
access point’s 10BASE2 port, and connects the access point
to the middle or end of 10BASE2 cable.
Figure 3-1
T-Connector
A cable terminator (Figure 3-2) attaches to the
T-connector. It is required for a device connected to the end
of 10BASE2 cable. The terminator properly terminates the
network cable to maintain proper impedance. Proper
termination is necessary for reliable Ethernet operation.
Figure 3-2
Cable Terminator
10BASE -T Component
10BASE-T coax cable is normally used to connect the
access point to an Ethernet hub. The cable has an RJ45
plug on each end (Figure 3-3).
Figure 3-3
Cable With RJ45 Plugs
6710 Access Point User’s Guide3-3
SECTION 3 " Installation
10BASE5 Components
10BASE2 components include the proper lengths of
10BASE5 coax cable, an AUI drop cable (less than or equal
to 50 feet/15 meters long), and a transceiver . Two types of
transceivers are the intrusive N-Series transceiver and the
nonintrusive vampire tap.
The N-Series transceiver (Figure 3-4) is a T-shaped
connector with a 15-pin AUI port and two type N
connectors. This transceiver is intrusive because network
service is disrupted while the coaxial cable is cut and a
threaded N-series connector placed on each end of the cable.
A 10BASEF (fiber optic) adapter may be attached directly
to the AUI connector .
The vampire tap is an insulation-piercing clamp device that
clamps onto the coaxial cable (Figure 3-5). The vampire tap
pierces the coaxial cable’s insulation and makes contact
with the shield and inner conductor without cutting the
cable.
3-46710 Access Point User’s Guide
Figure 3-4
N-Series Transceiver
SECTION 3 " Installation
Figure 3-5
Vampire Tap
Communication Equipment
You can access the access point’s system software
configuration menus locally through the unit’s DIAG port,
or remotely through a Telnet session or Web browser.
Local DIAG Port Access
For local access, you need the following:
" Third-party communications software terminal
emulation package with Y-modem capability (such as
PROCOMM PLUS by DataStorm Technologies, Inc.).
Install the program according to its user guide.
" PC (personal computer) station, which should meet
the requirements outlined in the user guide for the
terminal emulation program.
" Cable to connect the PC to the access point’s DIAG
port. The following chart lists cables.
6710 Access Point User’s Guide3-5
SECTION 3 " Installation
Telnet
You need the following to access the configuration menus
through a Telnet session:
" PC or workstation with an installed and configured
" Telnet VT emulator (TNVT) installed on the PC.
" IP address for the access point. See Section 4 for more
Web Browser
The access point’s configuration menus are designed for
HTML Level 2.0 or higher . You need the following to access
the configuration menus through a Web browser:
network interface card and a Telnet application. Y ou
can also use a host capable of acting as a Telnet client.
information about IP addresses.
" Graphical browser application.
" Internet or local network connection.
" IP address for the access point. See Section 4 for more
information about IP addresses.
Network Management Platform
To manage the system through a network management
platform, you need the platform (such as OpenView for
Windows by Hewlett-Packard) installed on a network
management station using SNMP. The station must meet
the requirements outlined in the platform’s user guide.
3-66710 Access Point User’s Guide
Finding the Best Location
Site Survey
Intermec strongly recommends that Intermec or certified
providers conduct a site survey to determine the ideal
locations for all of your network components. A proper site
survey requires special equipment and training. A site
survey provides an installation recommendation that
addresses various factors, which can affect the performance
of your wireless LAN system.
General Installation Guidelines
Coverage in most sites requires a network of access points
to be installed. Radio coverage varies greatly with factors
such as building construction, number and type of
obstructions in the signal path, and the RF media in use.
Additional factors related to the intended use of the system
also dictate installation practices. The following general
practices should be followed in any installation:
SECTION 3 " Installation
" Locate access points centrally within areas requiring
coverage.
" Try to position the access point so its indicator lights
are visible. The lights are useful for troubleshooting
the installation.
" Position antennas below roof trusses and away from
I-beams, racks, or other structures and obstructions.
" Overlap access point coverage areas to avoid coverage
holes.
" Install wired LAN cabling within node limit and cable
length limitations.
6710 Access Point User’s Guide3-7
SECTION 3 " Installation
" Ensure that a power outlet is within 6 feet of the
access point. An uninterruptable power supply is
recommended when the ac power system is not
reliable.
" Ensure that LAN and ac cables can reach the access
point after you install it. Leave sufficient room
around the access point so you can easily attach and
remove cables.
" Do not locate an access point with the S-UHF radio
option in a computer room. RF emissions from the
higher speed processors in current-generation
computers may reduce system range.
Mounting the Access Point
You can mount the access point horizontally on a tabletop,
vertically on a wall or post, or on the ceiling.
Horizontal (Tabletop) Mount
1.Remove the mounting bracket from the bottom of the
access point. The bracket is not needed for a tabletop
installation.
2.Set the access point in position. The unit rests
securely on four rubber feet that keep it from slipping
out of place.
3.Make all Ethernet connections. See “Connecting to
Ethernet” on page 3-10.
4.Make all power connections. See “Applying Power” on
page 3-20.
5.Watch the indicator lights to verify that the access
point is working properly. See Section 6, “Indicator
Lights,” for help.
3-86710 Access Point User’s Guide
SECTION 3 " Installation
Vertical and Ceiling Mounts
See Figure 3-6 and the procedure following it.
"
NOTE:If mounting the access point on a hollow wall, secure the mounting
plate to a 3/4” (thick) plywood base by four 1” X 1/4” nuts, bolts, and
washers. Anchor the plywood base to two separate wall studs by
four 2” X 1/4” diameter lag screws (two lag screws in each stud).
6.00"
1.00"
2.00"
1.00"
2.00”
1.00"
Figure 3-6
Mounting Bracket
6710 Access Point User’s Guide3-9
SECTION 3 " Installation
1.Inspect where the access point will be mounted and
2.Remove the mounting plate from the bottom of the
3.Using the mounting plate as a template, mark where
4.Attach the access point mounting plate to the wall or
5.Reattach the access point to the mounting plate.
6.Make all Ethernet connections. See “Connecting to
7.Make all power connections. See “Applying Power” on
8.Watch the indicator lights to verify that the access
determine what hardware is needed. Different
surfaces such as drywall, wood, and concrete block
require different mounting hardware. For this reason,
a universal mounting bracket is included with the
access point.
access point.
the anchors that secure the mounting plate to the
surface should be located.
ceiling with 2I x 1/4I diameter lag screws or bolts,
depending upon the surface. The mounting plate
must be secured to the surface by at least four
anchors, one on each corner .
Ethernet.”
page 3-20.
point is working properly. See Section 6, “Indicator
Lights,” for help.
"
NOTE:An optional locking kit is available. See Section 2, “Features and
Functional Overview,” for more information.
Connecting to Ethernet
The following pages show how to connect the access point to
10BASE2, 10BASE5, and 10BASE-T Ethernet.
3-106710 Access Point User’s Guide
SECTION 3 " Installation
10BASE2 Ethernet
The access point connects to the end or middle of the
10BASE2 cable segment.
"
NOTE:Cable lengths between network devices on the 10BASE2 Ethernet
LAN must meet ANSI/IEEE standards.
End of Segment
See Figure 3-7 and the procedure following it.
10 BASE 2
AC INPUT
100/240 VAC
10 BASE T
1. Cable terminator (50 ohm)
2. T-connector
3. 10BASE2 cable
AUI
DIAG
312
Figure 3-7
End of 10BASE2 Segment
1.Plug the T-connector (2) into the 10 BASE 2 port.
2.Plug one end of the Ethernet cable (3) into an open
end of the T-connector. Align the notches in the cable
end with the posts on the T-connector, push the cable
in, and twist one-quarter turn.
3.Plug the cable terminator (1) into the other end of the
T-connector.
6710 Access Point User’s Guide3-11
SECTION 3 " Installation
Middle of Segment
See Figure 3-8 and the procedure following it.
10 BASE 2
AC INPUT
100/240 VAC
10 BASE T
2
1. 10BASE2 cable
2. T-connector
AUI
DIAG
11
Figure 3-8
Middle of 10BASE2 Segment
1.Plug the T-connector (2) into the 10 BASE 2 port.
2.Plug one end of the Ethernet coaxial cable (1) into an
open end of the T-connector. Align the notches in the
cable end with the posts on the T-connector, push the
cable in, and twist about one-quarter turn.
3.Plug the end of another Ethernet coaxial cable
segment into the other open end of the T-connector.
3-126710 Access Point User’s Guide
SECTION 3 " Installation
10BASE5 Ethernet
The access point connects to 10BASE5 through an N-Series
transceiver or vampire tap.
"
NOTE:Cable lengths between network devices on the 10BASE5 Ethernet
LAN must meet ANSI/IEEE standards.
N- Series Transceiver
See Figure 3-9 and the following procedure.
1.Attach one end of the drop cable (1) to the AUI port.
2.Route the drop cable to the 10BASE5 cable (4) and
determine a suitable spot to cut the cable and attach
the transceiver (3).
3.Attach the transceiver to the 10BASE5 cable, then
connect the other end of the drop cable to the AUI port
(2) on the transceiver .
Vampire Tap
See Figure 3-10 and the following procedure.
1.Attach one end of the drop cable (1) to the AUI port.
2.Route the drop cable to the 10BASE5 cable and
determine a suitable spot on the cable to attach the
vampire tap (3).
3.Attach the vampire tap to the 10BASE5 cable, then
connect the other end of the drop cable to the AUI port
(2) on the tap.
6710 Access Point User’s Guide3-13
SECTION 3 " Installation
10 BASE 2
AC INPUT
100/240 VAC
10 BASE T
AUI
1
2
DIAG
3
3-146710 Access Point User’s Guide
4
1. Drop cable
2 15-pin AUI port
3. N-Series transceiver
4. 10BASE5 coax
Figure 3-9
N-Series Transceiver
4
SECTION 3 " Installation
10 BASE 2
AC INPUT
100/240 VAC
10 BASE T
AUI
1
2
DIAG
3
1. Drop cable
2. 15-pin AUI port
3. Vampire tap
4. 10BASE5 coax
Figure 3-10
Vampire Tap
6710 Access Point User’s Guide 3-15
4
4
SECTION 3 " Installation
10BASE-T Ethernet
See Figure 3-11 and the procedure following it.
10 BASE 2
AC INPUT
100/240 VAC
1
10 BASE T
1. Cable with RJ45 plugs
2. RJ45 jack (or hub port)
AUI
Figure 3-11
10BASE-T
DIAG
1.Plug the cable with RJ45 jacks (1) into the 10 BASE T
port.
2.Plug the other end of the cable into RJ45 jack or hub
port (2).
3-16 6710 Access Point User’s Guide
Installing PC Cards
The following pages describe how to install WLIF, 900 MHz,
and S-UHF PC cards.
WLIF
The WLIF radio option is a Type III PC card that can be
installed in either slot. To install the card, see Figure 3-12.
1
SECTION 3 " Installation
2
3
4
5
4
1. Nonskid rubber feet (4)
2 Access point (no radio)
3. PC card (RM180)
4. Antenna cable
5. End plate
6. 4--40 captive thumb screws
7. Hex nut and lock washer (supplied with antenna cable)
Figure 3-12
WLIF PC Card Assembly
6710 Access Point User’s Guide 3-17
6
7
SECTION 3 " Installation
900 MHz
The 900 MHz radio option is a Type III PC card that can be
installed in either slot. To install the card, see Figure 3-13.
1
2
3
4
4
1. Nonskid rubber feet (4)
2 Access point (no radio)
3. PC card (RM160)
4. Antenna cable
5. End plate
6. 4--40 captive thumb screws
7. Hex nut and lock washer (supplied with antenna cable)
5
Figure 3-13
900 MHz PC Card Assembly
6
7
3-18 6710 Access Point User’s Guide
SECTION 3 " Installation
S-UHF
The S-UHF radio option is a Type II PC card that can only
be installed in the left-hand slot (with LEDs facing down).
To install the card, see Figure 3-14.
1
2
3
4
5
1. Nonskid rubber feet (4)
2 Access point (no radio)
3. Sliding latch (open for RM11 1adapter)
4. PC card (RM111)
5. Flex circuit
6. RM1 11 adapter
7. Radio bracket
8. Conductive washer
9. End plate
10. 4--40 captive thumb screws
11. 4--40 x .25 PH
12. Antenna adapter
6
9
7
8
10
11
12
Figure 3-14
S-UHF PC Card Assembly
6710 Access Point User’s Guide 3-19
SECTION 3 " Installation
Applying Power
B
CAUTION:NEVER remove the cover of the access point with power
applied. ALWAYS make the access point connection before
making the connection at the source (“load to source”).
Damage to the radio or other devices can occur with the cover
removed.
"
NOTE:Connect the access point to an uninterruptable power source — a
power source that cannot be inadvertently turned off or otherwise
disconnected.
Power is applied to the access point through the grounded
AC INPUT connector . See Figure 3-15 and the following
procedure.
1.Plug the receptacle end of the power cord (1) into the
AC INPUT connector .
2.Insert the three-prong plug on the other end of the
power cord (2) into a grounded power outlet.
3.See Section 6, “Indicator Lights,” for descriptions of
the indicator lights.
3-20 6710 Access Point User’s Guide
SECTION 3 " Installation
10 BASE 2
AC INPUT
100/240 VAC
1
10 BASE T
1. Receptacle on power cord
2. Three-prong plug
AUI
2
Figure 3-15
AC Power Input Connection
DIAG
6710 Access Point User’s Guide 3-21
SECTION 3 " Installation
3-22 6710 Access Point User’s Guide
Section 4
Configuration
""""""""""""""""""""""""""""
This section describes how to:
" Create a local DIAG port, Telnet, and Web browser
session with the access point.
" Access the access point’s FLASH and ROM.
" Set up the access point through its configuration
menus.
You can configure the access point locally through its DIAG
port, or remotely through Telnet or a Web browser. The
following chart shows the sessions you can use to do other
tasks.
T askDIAG PortTelnet Browser
Change configuration passwords
Modify the configurationÖÖÖ
Upgrade FLASHÖÖ
Check the FLASH versionÖÖ
Access ROMÖ
Check the ROM versionÖ
Use online helpÖÖÖ
ÖÖÖ
6710 Access Point User’s Guide 4-1
SECTION 4 "Configuration
Only one type of session can be running at a time. For
example, if someone starts a Telnet session while someone
else is configuring the access point through its DIAG port,
the configuration through the DIAG port will terminate.
Creating a Local DIAG Port Session
In summary, you establish a local DIAG port session with
the access point through a VT100 terminal emulation
program. Most general purpose communications software
(such as PROCOMM PLUS) supports this emulation.
To create a session, see Figure 4-1 and the procedure
following it. You should carefully review the procedure first
to become familiar with the process.
4-2 6710 Access Point User’s Guide
SECTION 4"Configuration
1
2
3
10BASE2
AC INPUT
100/240 VAC
10BASET
AUI
DIAG
1. PC with terminal emulation program
2. Cable: 321-355-001 for a 25-pin PC COM port
or
Cable: 226-106-001 for a 9-pin PC COM port
(standard null modem cable)
3. 6710 Access Point DIAG port
Figure 4-1
Local Session
1.Ensure the terminal emulation program is installed
on the PC.
2.With both the PC and access point powered OFF,
connect the communication cable to the appropriate
PC COM port.
6710 Access Point User’s Guide 4-3
SECTION 4 "Configuration
3.Connect the other end of the communication cable to
the DIAG port on the access point. Turn the PC on.
4.After the PC boots, start the terminal emulation
program.
5.Set the terminal emulation program’s options
according to what you want to do: Access the
configuration menus, or access the ROM command
monitor .
Accessing the Configuration
Menus
1.Set the terminal emulation parameters in your
communications software. If you are configuring this
access point for the first time, set the parameters to
the access point’s default settings:
9600, 8N1, full duplex
If you have already changed the default settings, set
the parameters to those you set in FLASH mode
through the configuration menus.
2.Plug the access point into the outlet. These messages
appear:
QXS6700K <version> <date>
<Press any key within 5 seconds to enter the ROM monitor>
Executing file USTART29.BIN from segment <segment number>
Quickly press a key to perform configuration before startup
Starting system
3.To access the configuration menus, wait until you see
the message “Quickly press a key to perform
configuration before startup.” Press any key to access
the configuration menus.
4.See “Configuring the Access Point” on page 4-12.
4-4 6710 Access Point User’s Guide
SECTION 4"Configuration
Accessing the ROM Command
Monitor
1.Set the terminal emulation parameters in your
communications software. If you are configuring this
access point for the first time, set the parameters to
the default settings for ROM mode:
9600, 8N1, full duplex
If you have already changed the default settings, set
the parameters to those you set in ROM mode through
the ROM command monitor .
2.Plug the access point into the outlet. These messages
appear:
QXS6700K <version> <date>
<Press any key within 5 seconds to enter the ROM monitor>
Executing file USTART29.BIN from segment <segment number>
Quickly press a key to perform configuration before startup
Starting system
3.Press any key within 5 seconds of the first ROM
message.
Note that if the access point is in Power-Up Quiet
mode (versus Power-Up Normal mode, the default
setting), the ROM messages do not display. More
information about Power-Up Quiet (PQ) mode and
Power-Up Normal (PN) mode starts on page 5-27 in
Section 5, “Software Download.”
4.See page 5-22 in Section 5, “Software Download,” for
information about the ROM command monitor .
6710 Access Point User’s Guide 4-5
SECTION 4 "Configuration
Creating a Telnet Session
Before you can configure the access point through Telnet,
you must connect the unit to the Ethernet cable. (See
Section 3, “Installation,” for help.) You must also perform
initial configuration through the DIAG port to:
" Set an IP address or DHCP server name. You should
also configure a subnet mask and IP router address.
" Set the Ethernet cable type.
"
NOTE:The access point includes an autodetect feature that senses the
Ethernet medium if traffic is present. If no traffic is present on the
cable, the system software defaults to 10BASE-T. For most
installations, it is recommended that you explicitly set the Ethernet
type.
The access point must go through its boot sequence before
you can create a Telnet session. If you reboot the unit while
in a session, the session terminates. You can create a new
session after the unit reboots.
To create a Telnet session, see Figure 4-2 and the procedure
following it.
Ethernet LAN
1. PC or workstation with Telnet VT emulator (TNVT)
2. 6710 Access Point
4-6 6710 Access Point User’s Guide
Telnet
1
2
Figure 4-2
Telnet Session
1.Ensure the access point is connected to the Ethernet
cable, and has an assigned IP address and cable type.
2.Ensure the PC or workstation has an installed and
configured Ethernet interface card.
3.Ensure the Telnet VT emulator is installed on the PC
or workstation.
4.Open a new Telnet session on the PC or workstation.
5.Enter the access point’s IP address in the host name
or IP address field.
6.See “Configuring the Access Point” on page 4-12.
Default and Site Settings
The access point is factory configured with the default
settings listed in the following charts. You may need to
change the defaults to match the way your system is set up.
You can record your site’s settings in the table for reference.
SECTION 4"Configuration
TCP/IP
OptionDefaultSite Setting
IP Address0.0.0.0
IP Subnet Mask255.255.255.0
IP Router0.0.0.0
IP Frame TypeDIX
DHCPEnabled, if IP Ad-
dress is zero
DHCP Server NameNorand DHCP Server
Auto ARP Minutes5
6710 Access Point User’s Guide 4-7
SECTION 4 "Configuration
Security
OptionDefaultSite Setting
PasswordCR52401
Service PasswordEnabled
Advanced Password
“” (empty string)
Bridge
OptionDefaultSite Setting
Serial Number(Read-only)
Lan ID0
[Root]
Root Priority1
[Global Radio]
UHF Rfp Threshold
Set GloballyDisabled
Value70
UHF Frag Size
Set GloballyDisabled
Value250
Falc Frag Size
Set GloballyDisabled
Value250
A wake Time
Set GloballyDisabled
Value0
[Global Flooding]
Inbound
MulticastPrimary
UnicastDisabled
Outbound to Secondaries
MulticastDisabled
UnicastDisabled
Outbound to Stations
MulticastDisabled
UnicastDisabled
4-8 6710 Access Point User’s Guide
OptionSite SettingDefault
[Ports]
Ethernet port:
Nameomde
MAC Address(Unique number)
StatusEnabled
Hello Period2 seconds
[Ethernet]
When you create a local DIAG port or remote Telnet session
with the access point, the configuration program’s password
screen appears:
Configuration of Access Point
Copyright (c) 1995-1997 Norand Corporation. All rights reserved.
Portions copyright Epilogue Technology Corporation 1988-1995.
All rights reserved
IP:0.0.0.0
Serial:(Unique 10-digit number.)
Password:
"
NOTE:A different screen appears when you create a session through a
Web browser. See page 4-88 for information about Web browser
sessions.
The password screen shows the current settings for the IP
address and serial number . It also shows the prompt for
the top-level password. Enter the password (case
insensitive) to display the Main Menu. The default
password is CR52401.
Main Menu
After you enter the top-level password, the Main Menu
appears:
4-12 6710 Access Point User’s Guide
SECTION 4"Configuration
Loading configuration from EEPROM
CommandDescription
FileFile system menu
ViewView/modify the configuration
ClearSet the configuration to default values
ReadRead the configuration from EEPROM
WriteWrite the configuration to EEPROM
RebootRestart using last written configuration
ExitDisconnect
?Display this help
>
The menu lists the commands you can use to do various
tasks, described on the following pages. The screen also
displays the command prompt (>). At the prompt, type the
name of the command you want to perform and press
[Enter]. (Commands are case insensitive.) The Main Menu
redisplays when you enter an invalid command.
The following chart describes how to use the commands.
UseTo
FileList file system commands and descriptions.
Section 5, “Software Download,” describes the
commands and file system methodology.
ViewView or modify configuration program settings.
See “Using the View Command” on page 4-14.
Clear
ReadLoad the most recent configuration from
Reset the access point’s configuration to the factory-set default settings, which start on page 4-7.
EEPROM. The configuration that was written to
EEPROM since the access point was lastrebooted becomes the new configuration.
6710 Access Point User’s Guide 4-13
SECTION 4 "Configuration
UseT o
Read
(Continued)
WriteWrite (save) a new configuration to EEPROM.
RebootReboot the access point. You must reboot the unit
ExitQuit the configuration program. If you exit a new
?Display online help for a command, option, or
The access point’s configuration is stored in
EEPROM. You reprogram the EEPROM
whenever you change the configuration, write
(save) the new configuration to EEPROM, and
reboot the access point.
This command overwrites the previous configuration. You must write the new configuration
to EEPROM and reboot the access point for
any changes to take effect.
for any changes you made to the configuration to
take effect.
configuration without writing it to EEPROM, any
changes you made are not saved.
setting.
Using the View Command
To view or modify configuration program settings, type
View at the command prompt. The Main Options Menu
appears:
The following chart describes how to use the options.
4-14 6710 Access Point User’s Guide
[Tcpip]
[Bridge]
[Security]
SECTION 4"Configuration
UseT o
[Tcpip]
Page 4-16
[Bridge]
Page 4-23
[Security]
Page 4-86
Set options necessary for communications with
this access point. The options apply to all
TCP/IP ports. Telnet, SNMP, and HTTP
communications are supported.
Control the bridging of messages among the
radio and Ethernet ports for this access point.
Settings to control interaction with other access
points are also under the [Bridge] option.
Set the configuration program’s top-level
password and other security passwords.
The screens in this section show the options’ default
settings. Some settings (such as the serial number) are
unique to each access point. Other settings (such as certain
radio configurations) are automatically set and you cannot
change them. This section identifies the settings you
cannot change as “read-only.”
The following chart shows how to navigate the View
command’s menus and edit data.
PressTo
[-] or [--]Scroll up through items in a list.
[¯], [+], [=], or [Tab]Scroll down through items in a list.
[®], [Enter], or [Spacebar] Display an option’s settings or
prompt after you highlight the
option. Also use these keys to
select the desired setting.
[¬], [Esc], or [Backspace]Exit a menu or prompt.
[Esc]Cancel editing.
[Enter]Complete editing.
6710 Access Point User’s Guide 4-15
SECTION 4 "Configuration
TCP/IP Options
Use [Tcpip] to set options necessary for communications
with this access point, such as IP addresses. Addresses are
required for remote setup or SNMP network management.
Options are:
IP Address0.0.0.0
IP Subnet Mask255.255.255.0
IP Router0.0.0.0
IP Frame Type<DIX>
DHCP<Enabled, if IP address is zero>
DHCP Server Name“Norand DHCP Server”
Auto ARP Minutes5
IP Address
IP Address is the unique address locally assigned to this
access point. The prompt is:
The default is 0.0.0.0, which disables the ability to use
TCP/IP. Following are suggestions for setting the address:
" If you are installing this access point on an existing
Ethernet segment, you should allocate the IP address
from the same pool as the existing computers on the
segment.
" If you are installing this access point on a new
Ethernet segment that is not going to connect to the
Internet, try using this Class B address:
172.16.h.h
4-16 6710 Access Point User’s Guide
Range is:
4 nums 0..255
SECTION 4"Configuration
The host number is “h.h.” This Class B network
address is reserved by the numbering authority for a
company’s internal use. If the Class B address
appears on the Internet, routers drop the data.
Note the following:
" If the IP address is 0.0.0.0 and DHCP is set to
“Enabled, if IP address is zero,” this IP address is
obtained through DHCP.
" If DHCP is set to Enabled, DHCP is used to obtain the
IP address.
" If the IP address is 0.0.0.0 and DHCP is disabled,
TCP/IP access to this access point is disabled.
A discussion of DHCP starts on page 4-19.
IP Subnet Mask
IP subnets partition traffic and are connected by routers.
The subnet mask indicates how many bits of the IP address
represent a network number and how many indicate a host
number . The prompt is:
Range is:
4 nums 0..255
The default is 255.255.255.0. Following are suggestions for
setting the subnet mask:
" If you are installing this access point on an existing
Ethernet segment, the subnet mask should match the
other computers on the segment.
" If you are using the 172.16.h.h address suggested for
IP Address, you may want to use a subnet mask of
255.255.248.0. This mask provides the network
172.16 with 30 subnets of 2046 computers each.
The IP address breakdown is:
6710 Access Point User’s Guide 4-17
SECTION 4 "Configuration
The following chart lists IP addresses when the submask is
" 16 bits of network address.
" 5 bits of subnet address. Do not use all 0’s or all
1’s.
" 11 bits of host address. Do not use all 0’s or all
1’s.
If you are using DHCP to obtain an IP subnet mask for this
access point, the subnet mask obtained from DHCP
overrides the setting for the IP Subnet Mask option.
IP Router
"
NOTE:The IP address of the router is required only if this access point will
communicate with devices on the other side of the router.
IP Router identifies the default router used to forward data
frames to addresses on another subnet. The prompt is:
Range is:
4 nums 0..255
The default is 0.0.0.0, which disables the ability to
exchange TCP/IP traffic with another subnet or network.
4-18 6710 Access Point User’s Guide
SECTION 4"Configuration
A router that connects subnet 1 to subnet 2 might have the
address 172.16.8.1 on subnet 1 and 172.16.16.1 on subnet 2.
A host with IP address 172.16.16.5 would specify an IP
router address of 172.16.16.1 to reach host 172.16.8.10.
IP routers are usually configured so a computer only needs
to know one router’s address. This is true even if several
routers on the segment connect to several other segments.
If you are using DHCP to obtain an IP router address, and
the DHCP server specifies a default IP router , the DHCP
server specification overrides the setting for IP Router .
IP Frame Type
IP Frame Type sets the type of frame containing IP traffic:
DIX
802.3
SettingDescription
DIX (default)Sets Ethernet type to DIX (Ethernet 2.0) for IP
frames.
802.3Sets Ethernet type to 802.3 with a SNAP header
for IP frames. Select 802.3 if other network
computers use SNAP encapsulation for IP
frames.
DHCP
DHCP provides a way for this access point (the client) to
obtain IP addresses from a DHCP server on the network.
Settings are:
Enabled
Enabled, if IP address is zero
Disabled
6710 Access Point User’s Guide 4-19
SECTION 4 "Configuration
SettingDescription
EnabledDHCP always obtains IP addresses for the
access point, subnet mask, and (optional)
default router when the access point reboots.
It also obtains the lease expiration time.
Enabled, if IP
address is zero
(default)
DisabledDisables DHCP. You must manually set the IP
"
NOTE:If you are using OWL/IP tunneling, you should not use DHCP to
allocate IP addresses to super root candidates or designated bridges
unless a permanent lease is used, and the access point is rebooted
after getting an address. OWL/IP options start on page 4-79.
If IP Address is 0.0.0.0, DHCP obtains IP
addresses for the access point, subnet mask,
and (optional) default router. It also obtains
the lease expiration time. The access point
ignores other DHCP configuration options.
addresses before the TCP/IP stack is enabled.
The access point responds only to address offers from
DHCP or Bootp servers. In either case the server is
specified in the DHCP server name field.
DHCP Server Name
The prompt for the DHCP server name is:
The access point responds only to the named server . The
default server name is “Norand DHCP Server .” This name
prevents the access point from inadvertently obtaining an
IP configuration from existing servers on the network.
If the DHCP server name is configured with a null string
(“”), the access point responds to offers from any server .
4-20 6710 Access Point User’s Guide
Range is:
31 chars
SECTION 4"Configuration
The class identifier string for the access point is “Norand
Access Point.” Servers use this string to identify the access
point.
Bootp Operation
The access point can also accept addresses from a Bootp
server identified in the DHCP server name field. An
address offer from a Bootp server is treated as if it were an
infinite lease from a DHCP server .
Networks With DHCP and Bootp Servers
If the DHCP server name is configured as “”, the access
point responds to either DHCP or Bootp servers. The
access point gives preference to DHCP offers. If a Bootp
reply arrives at the access point before any DHCP offers are
received, the access point waits an additional 4 seconds for
a DHCP offer before responding. If a DHCP offer is
received within the 4-second period, the Bootp reply is
ignored and the DHCP offer is accepted.
Handshaking
When the access point responds to a DHCP or Bootp server ,
it broadcasts a single ARP request to the address offered. If
no ARP response is received within 3 seconds, the access
point assumes the IP address is unique and completes the
negotiation for that address. If an ARP reply is received
before the timeout, the access point assumes the address is
a duplicate and declines the offer .
Infinite Leases
A DHCP server may be configured to grant an infinite lease
to the access point. A Bootp grant is always treated as an
infinite lease. The access point stores the IP address,
subnet mask, and default router in the EEPROM
configuration register and disables DHCP. These settings
are maintained if the access point is powered off or rebooted
through the ROM command monitor . To restore DHCP
client operation, reconfigure the IP address to 0.0.0.0.
6710 Access Point User’s Guide 4-21
SECTION 4 "Configuration
"
NOTE:DHCP is documented in RFCs 1533, 1534, and 1541. Bootp is
documented in RFC 951.
Auto ARP Minutes
The access point periodically sends an unsolicited ARP
response so routers can update their routing tables. The
response enables a network management platform to learn
about the access point on the network by querying routers.
Auto ARP Minutes is the number of minutes between
periodic ARP requests. The prompt is:
Range is:
0..120
The default is 5 minutes. A setting of 0 disables Auto ARP
Minutes.
If the default router’s address is 0, the ARP request is sent
to the IP address of this access point. Without the Auto
ARP Minutes option, an access point might not use its IP
address for extended periods of time and expire from the
router’s ARP table.
Auto ARP Minutes enhances the discovery of the network
architecture by network management tools, such as
OpenView by Hewlett-Packard. The network management
tool queries IP router ARP tables to locate the active IP
addresses for the subnet IP addresses for access points
should not be allowed to expire. The network management
program would then need to ping all potential addresses on
a subnet to locate active IP addresses, or require the user to
enter a list.
4-22 6710 Access Point User’s Guide
Bridge Options
Use [Bridge] to configure options that define the bridging
topology of the open wireless LAN. Options are:
Serial Number“(Unique 10-digit number.)”
Lan ID0
[Root]
[Ports]
ARP Server Mode<Disabled>
Serial Number
Serial Number is a read-only setting that displays this
access point’s unique 10-digit serial number, which
identifies this unit on the network.
SECTION 4"Configuration
Lan ID
The LAN ID (also called domain) is a number that logically
isolates adjacent but independent open wireless LANs. The
prompt is:
Range is:
0..254
Following are ranges:
" 900 MHz and S-UHF radios: 0 (default) to 254.
" WLIF radio: 0 to 15.
"
NOTE:For mixed systems containing WLIF radios, you must use LAN ID 0
to 15.
6710 Access Point User’s Guide 4-23
SECTION 4 "Configuration
You should change the default of 0 to another number to
avoid a potential conflict with an adjacent network. All
access points and wireless stations in the same network
must have the same LAN ID.
"
NOTE:See page 4-87 for information about combining WLIF, 900 MHz, and
S-UHF radios in a common network by following basic guidelines for
LAN ID and controller setup.
[Root]
[Root] options apply to access points configured to operate
as the super root. They should be set to the same settings
in all access points with a nonzero root priority configured.
Options are:
Root Priority
[Global Radio]
[Global Flooding]
Root Priority
Root Priority determines which access points are candidates
to become the super root node on the distribution LAN (also
called primary LAN). The prompt is:
The default is 1.
Super Root Candidates
Access points assigned a root priority between 1 and 7 are
candidates to become the super root. Access points
assigned a root priority of 0 are prohibited from becoming
the super root.
4-24 6710 Access Point User’s Guide
Range is:
0..7
SECTION 4"Configuration
Super Root Selection
The access point with the highest assigned root priority
becomes the super root whenever it is powered on and
active. If the current super root goes offline, the remaining
candidates negotiate to determine which one becomes the
new super root. This normally takes about 1 minute.
The super root is always the access point with the highest
root priority (other than 0). If two or more access points
have the same root priority, the unit with the highest
Ethernet address becomes the super root.
Super Root Redundancy
For redundancy, two or three access points should have a
nonzero root priority. All other access points should have a
root priority of 0. (Redundancy is the ability of another
access point to take over if the super root goes offline.)
You should do the following:
" Configure one access point as a primary super root
(with the highest root priority).
" Configure one or two access points as “fallback” super
roots (with lower priority).
" Configure remaining access points with a root priority
of 0.
[Global Radio]
"
NOTE:Use the same [Global Radio] settings in all super root candidates.
[Global Radio] distributes network-wide configuration
parameters. Settings in the super root are distributed
throughout the network. Options are:
The previous sample screen shows the options’ default
settings, which are optimum for most installations. It is
recommended that you not change the defaults.
OptionDescription
UHF Rfp ThresholdThis option adjusts the S-UHF protocol
UHF Frag SizeFor reliable transmission, large frames
Falcon Frag SizeFor reliable transmission, large frames
A wake Time
(Does not apply to
WLIF radio.)
characteristics for smaller data frames.
The recommended setting in most cases is
Disabled. For installations that primarily send very small frames, Enabled at the
default value of 70 may improve network
response time.
may be fragmented or split into several
smaller frames. The receiver reassembles
the fragments into a complete frame. The
default is 250.
may be fragmented or split into several
smaller frames. The receiver reassembles
the fragments into a complete frame. The
default is 250.
This option establishes an awake time
after a station transmits. Portable
stations do not enter a power managed
state for this time period. The access
point may deliver a response without
using the pending message delivery
mechanism during the awake time.
The time is specified in tenths of seconds.
When awake time is Disabled (the
default), each station uses its own default
(2 seconds for 900 MHz or S-UHF
stations). Longer awake times may
reduce station battery life.
4-26 6710 Access Point User’s Guide
SECTION 4"Configuration
Each [Global Radio] option has the following settings:
Set Globally<Disabled>
Value0
Set Globally
The value for all radios in the system is specified according
to how Set Globally is configured.
SettingDescription
EnabledIf this access point is the super root, it sets the
value for all stations and access points in the
network. This setting has no effect in access
points other than the super root.
Disabled
(default)
The super root does not distribute global
parameters. All radios in the network use local
settings or defaults.
Value
Following are ranges and defaults for the Value option.
ValueRangeDefault
UHF Rfp Threshold0--250 octets70
UHF Frag Size0--250 octets250
Falcon Frag Size0--250 octets250
A wake Time0--255 (tenths of seconds)0
6710 Access Point User’s Guide 4-27
SECTION 4 "Configuration
[Global Flooding]
"
NOTE:Use the same [Global Flooding] settings in all super root candidates.
Use [Global Flooding] to set system-wide flooding options.
The settings are sent throughout the network when and if
this access point becomes the super root. Options are:
MulticastUnicast
Inbound<Primary><Disabled>
Outbound to Secondaries<Disabled> <Disabled>
Outbound to Stations<Disabled><Disabled>
An access point normally forwards frames only to
destination addresses it has learned and stored in the
forwarding database. Frames are forwarded only on the
port that provides the shortest path to the destination
address. The access point can be configured to flood frames
on one or more ports when the destination address is
unknown.
Global flooding options allow for different flooding
configurations to optimize performance. Settings in the
super root are distributed to all other access points.
A frame flooded toward the distribution LAN (LAN segment
containing the super root) is inbound. A frame flooded
away from the distribution LAN is outbound. A special
case of outbound is outbound to secondary LANs.
"
NOTE:A Flooding Level Checklist starts on page 4-31.
Inbound
Flooding may be configured separately for unicast (single
physical address) and multicast (group address) frame
types. Many network protocols use multicast messages for
establishing and maintaining connections, and use unicast
messages for data exchange.
4-28 6710 Access Point User’s Guide
SECTION 4"Configuration
Inbound options are:
Multicast<Primary>
Unicast<Disabled>
Multicast and Unicast options have the following settings:
Enabled
Primary
Disabled
SettingDescription
EnabledAccess point floods to all ports, similar to a
conventional bridge.
Primary
(Multicast default)
Disabled
(Unicast default)
Frames are flooded inbound only. This
setting is useful in many wireless installations where the super root, servers, or
gateways for wireless stations are on the
same Ethernet segment.
Frames are not flooded. Use this setting
only if the Outbound to Secondaries option
is also set to Disabled.
Outbound to Secondaries
Outbound to Secondaries floods frames with unknown
destinations to secondary LAN segments. Settings are:
Enabled
Registered
Disabled
6710 Access Point User’s Guide 4-29
SECTION 4 "Configuration
SettingDescription
EnabledAll designated bridges flood to secondary
RegisteredDesignated bridges flood according to their
Disabled
(Multicast and
Unicast default)
Outbound to Stations
Outbound to Stations applies only to access points with the
WLIF radio option. Settings are:
LANs. This setting allows the super root to
control flooding for all access points serving
as designated bridges for secondary LANs
(see page 4-57).
individual flood register settings. This setting allows individual designated bridges to
be configured separately.
Flooding is disabled in all designated
bridges. This setting allows the super root to
control flooding for all access points serving
as designated bridges for secondary LANs
(see page 4-57). This setting should be used
only if Inbound flooding is Disabled.
SettingDescription
EnabledFrames are flooded.
Disabled
(Multicast and
Unicast default)
4-30 6710 Access Point User’s Guide
Enabled
Disabled
Frames are not flooded.
SECTION 4"Configuration
Flooding Level Checklist
You can use the following list of questions to determine the
required flooding levels for the Inbound and Outbound to
Secondaries options. The list is structured so that you
should skip later questions as soon as you determine
the appropriate flood level settings.
If your answer is “I do not know,” go to the next question. If
you cannot determine the appropriate flooding levels, use
the higher (multicast) flooding levels.
"
NOTE:If extensive flooding is enabled, it will be more important to set
Ethernet filters to reduce unnecessary traffic in the radio network. In
general, the need for filters increases with the amount of traffic on
the distribution LAN and the flooding levels. Filtering starts on page
4-43.
1.Is the open wireless LAN used only with NORAND
emulation terminals?
AnswerSettings
YesInbound/Unicast/Disabled
Inbound/Multicast/Enabled
Outbound to Secondaries/Unicast/Disabled
Outbound to Secondaries/Multicast/Disabled
Comments:
Unicast flooding is not required to support NORAND
terminal emulation because the NORAND transport
layer (used for terminal emulation) periodically
generates traffic. Inbound multicast flooding is
required. Outbound multicast flooding is not required
because NORAND terminal emulation stations do not
need to receive multicast frames.
R
6710 Access Point User’s Guide 4-31
SECTION 4 "Configuration
2.Does the network contain only 900 MHz or S-UHF
access points?
AnswerSettings
YesInbound/Unicast/Disabled
Comments:
Unicast flooding is never required for 900 MHz or
S-UHF access points, since stations supporting these
media options establish reliable connections as they
roam between access points. The correct port for
S-UHF or 900 MHz stations is always known.
3.Do all nodes in the radio network routinely transmit a
frame at least once every 4 minutes?
AnswerSettings
YesInbound/Unicast/Disabled
Outbound to Secondaries/Unicast/Disabled
Outbound to Secondaries/Unicast/Disabled
4.Do any nodes in the radio network need to receive
multicast or broadcast messages?
AnswerSettings
NoInbound/Multicast/Enabled
Note: TCP/IP nodes must receive broadcast ARP frames.
Comments:
The destination of a multicast frame is never known.
The Disabled setting should be used for any network
where stations do not need to receive multicast
frames. The Disabled setting can be used for
secondary LANs that only need to receive ARP frames.
When WLIF wireless stations must receive multicast
frames, set Outbound to Stations to Enabled.
4-32 6710 Access Point User’s Guide
Outbound to Secondaries/Multicast/Disabled
SECTION 4"Configuration
5.Do nodes in the radio network communicate with
other nodes in the radio network?
AnswerSettings
YesInbound/Unicast/Enabled
Inbound/Multicast/Enabled
NoInbound/Unicast/Primary
Inbound/Multicast/Primary
Outbound to Secondaries/Unicast/Registered
Outbound to Secondaries/Multicast/Registered
Comments:
The Enabled settings facilitate peer-to-peer
applications, where nodes in the open wireless LAN
communicate with each other .
In general, the Primary and Registered settings are
designed for client or terminal applications where
nodes in the open wireless LAN communicate with
server nodes on the distribution LAN.
6.Do radio-equipped wireless station nodes (open or
non-wireless LAN) need to receive multicast or
broadcast frames?
AnswerSetting
YesOutbound to Stations/Multicast/Enabled
6710 Access Point User’s Guide 4-33
SECTION 4 "Configuration
7.Does the radio network contain WLIF nodes that do
not periodically generate traffic?
AnswerSetting
YesInbound/Unicast/Primary
*Support communications with a distribution LAN.
** Supports general peer -to-peer communications.
"
NOTE:WLIF nodes using NORAND terminal emulation periodically
generate traffic, and do not require flooding.
Comments:
You may need to enable unicast flooding if the radio
network contains WLIF terminal nodes or nodes on a
secondary Ethernet LAN that do not periodically
generate traffic. Occasional traffic is needed to
maintain information in the forwarding database.
Outbound to Secondaries/Unicast/Registered*
or
Inbound/Unicast/Enabled**
You can also do the following:
" Use the Outbound to Secondaries/Unicast/
Enabled setting to force unicast flooding to WLIF
nodes.
" Use the Inbound/Unicast/Primary or Outbound
to Secondaries/Unicast/Registered setting in
combination with the Flood Register/Unicast
setting for selected secondary Ethernet LANs.
These settings avoid network-wide universal
flooding if nodes that do not periodically generate
traffic are restricted to those secondary Ethernet
LANs.
4-34 6710 Access Point User’s Guide
Loading...
+ hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.