No part of this publication may be reproduced or used in any form, or by any electrical or mechanical means,
without permission in writing from Symbol. This includes electronic or mechanical means, such as
photocopying, recording, or information storage and retrieval systems. The material in this manual is subject to
change without notice.
The software is provided strictly on an “as is” basis. All software, including firmware, furnished to the user is
on a licensed basis. Symbol grants to the user a non-transferable and non-exclusive license to use each
software or firmware program delivered hereunder (licensed program). Except as noted below, such license may
not be assigned, sublicensed, or otherwise transferred by the user without prior written consent of Symbol. No
right to copy a licensed program in whole or in part is granted, except as permitted under copyright law. The
user shall not modify, merge, or incorporate any form or portion of a licensed program with other program
material, create a derivative work from a licensed program, or use a licensed program in a network without
written permission from Symbol. The user agrees to maintain Symbol’s copyright notice on the licensed
programs delivered hereunder, and to include the same on any authorized copies it makes, in whole or in part.
The user agrees not to decompile, disassemble, decode, or reverse engineer any licensed program delivered to
the user or any portion thereof.
Symbol reserves the right to make changes to any software or product to improve reliability, function, or design.
Symbol does not assume any product liability arising out of, or in connection with, the application or use of any
product, circuit, or application described herein.
No license is granted, either expressly or by implication, estoppel, or otherwise under any Symbol Technologies,
Inc., intellectual property rights. An implied license only exists for equipment, circuits, and subsystems
contained in Symbol products.
Symbol, Spectrum One, and Spectrum24 are registered trademarks of Symbol Technologies, Inc. Other product
names mentioned in this manual may be trademarks or registered trademarks of their respective companies
and are hereby acknowledged.
Symbol Technologies, Inc.
One Symbol Plaza
Holtsville, New York 11742-1300
This guide provides configuration and setup information for the AP-5131 model access point.
Document Conventions
The followingdocument conventions are used in this document:
NOTEIndicate tips or special requirements.
CAUTION Indicates conditions that can cause equipment damage or data loss.
!
viii
AP-5131 Access Point Product Reference Guide
WARNING! Indicates a condition or procedure that could result in personal injury or
equipment damage.
Notational Conventions
The following notational conventions are used in this document:
•Italics are used to highlight specific items in the general text, and to identify chapters and
sections in this and related documents.
•Bullets (•) indicate:
• action items
• lists of alternatives
• lists of required steps that are not necessarily sequential
•Sequential lists (those describing step-by-step procedures) appear as numbered lists.
Service Information
If a problem is encountered with the AP-5131, contact the Symbol Customer Support. Refer to
Appendix C for contact information. Before calling, have the model number and serial number at hand.
If the problem cannot be solved over the phone, you may need to return your equipment for servicing.
If that is necessary, you will be given specific instructions.
Symbol Technologies is not responsible for any damages incurred during shipment if the
approved shipping container is not used. Shipping the units improperly can possibly void
the warranty. If the original shipping container was not kept, contact Symbol to have
another sent to you.
AP-5131 Introduction
The Symbol AP-5131 Access Point (AP) provides a bridge between Ethernet wired LANs or WANs and
wireless networks. It provides connectivity between Ethernet wired networks and radio-equipped
mobile units (MUs). MUs include the full line of Symbol terminals, bar-code scanners, adapters (PC
cards, Compact Flash cards and PCI adapters) and other devices.
The AP-5131 provides a maximum 54Mbps data transfer rate via each radio. It monitors Ethernet
traffic and forwards appropriate Ethernet messages to MUs over the network. It also monitors MU
radio traffic and forwards MU packets to the Ethernet LAN.
The AP-5131 is available in two models:
•A single-radio version (Part No. AP-5131-4002X-WW), that can be configured as either an
802.11a access point or an 802.11b/g access point.
•A dual-radio version (Part No. AP-5131-1304X-WW), allowing both the 802.11a radio and
the 802.11b/g radio to function simultaneously.
If you are new to using an access point for managing your network, refer to Theory of Operations on
page 1-14 for an overview on wireless networking fundamentals.
1-2
AP-5131 Access Point Product Reference Guide
1.1 Feature Overview
The Symbol AP-5131 has the following features:
•Single or Dual Mode Radio Options
•Separate LAN and WAN Ports
•Multiple Mounting Options
•Antenna Support for 2.4 GHz and 5.2 GHz Radios
•Sixteen Configurable WLANs
•Support for 4 BSSIDs per Radio
•Quality of Service (QoS) Support
•Industry Leading Data Security
•VLAN Support
•Multiple Management Accessibility Options
•Updatable Firmware
•Programmable SNMP v1/v2/v3 Trap Support
•Power-over-Ethernet Support
•MU-MU Transmission Disallow
•Voice Prioritization
•Support for CAM and PSP MUs
•Statistical Displays
•Transmit Power Control
•Advanced Event Logging Capability
•Configuration File Import/Export Functionality
•Default Configuration Restoration
•DHCP Support
•Multi Function LEDs
1.1.1 Single or Dual Mode Radio Options
One or two possible configurations are available on the AP-5131 depending on which model is
purchased. If the AP-5131 is manufactured as a single radio access point, the AP-5131 enables you
to configure the single radio for either 802.11a or 802.11b/g.
AP-5131 Introduction
If the AP-5131 is manufactured as a dual-radio access point, the AP-5131 enables you to configure
one radio for 802.11a, and the other 802.11b/g. For more information on configuring your AP-5131,
see Setting the WLAN’s Radio Configuration on page 5-36.
1.1.2 Separate LAN and WAN Ports
The AP-5131 has one LAN port and one WAN port, each with their own MAC address. The AP-5131
must manage all data traffic over the LAN connection carefully as either a DHCP client, BOOTP client,
DHCP server or using a static IP address. The AP-5131 can only use a Power-over-Ethernet device
when connected to the LAN port. For more information on configuring the AP-5131 LAN port, see
Configuring the LAN Interface on page 5-1.
A Wide Area Network (WAN) is a widely dispersed telecommunications network. In a corporate
environment, the WAN port might connect to a larger corporate network. For a small business, the
WAN port might connect to a DSL or cable modem to access the Internet. Regardless, network
address information must be configured for the AP-5131’s intended mode of operation. For
information on configuring the AP-5131’s WAN port, see Configuring WAN Settings on page 5-13.
The LAN and WAN port MAC addresses can be located within the LAN and WAN Stats screens. For
information on locating the AP-5131 MAC addresses, see Viewing WAN Statistics on page 7-2 and
Viewing LAN Statistics on page 7-5.
1-3
1.1.3 Multiple Mounting Options
The AP-5131 rests on a flat surface, attaches to a wall, mounts under a ceiling or above a ceiling
(attic). Choose a mounting option based on the physical environment of the coverage area. Do not
mount the AP-5131 in a location that has not been approved in an AP-5131 radio coverage site survey.
For detailed information on the mounting options available for the AP-5131, see Mounting the
AP-5131 on page 2-11.
1.1.4 Antenna Support for 2.4 GHz and 5.2 GHz Radios
The AP-5131 supports several 802.11a and 802.11b/g radio antennas. Select the antenna best suited
to the radio transmission requirements of your coverage area. For an overview of the Radio 1 (2.4 GHz)
and Radio 2 (5.2 GHz) antennas supported on the AP-5131’s Reverse SMA (RSMA) connectors, see
Technical Specifications on page A-1.
1-4
AP-5131 Access Point Product Reference Guide
1.1.5 Sixteen Configurable WLANs
A Wireless Local Area Network (WLAN) is a data-communications system that flexibly extends the
functionalities of a wired LAN. A WLAN does not require lining up devices for line-of-sight
transmission, and are thus, desirable for wireless networking. Roaming users can be handed off from
one AP-5131 to another like a cellular phone system. WLANs can therefore be configured around the
needs of specific groups of users, even when they are not in physical proximity. Sixteen WLANs are
configurable on each AP-5131. To enable and configure WLANs on an AP-5131 radio, see Enabling
Wireless LANs (WLANs) on page 5-22.
1.1.6 Support for 4 BSSIDs per Radio
The AP-5131 supports four BSSIDs per radio. Each BSSID has a corresponding MAC address. The first
MAC address corresponds to BSSID #1. The MAC addresses for the other three BSSIDs (BSSIDs #2,
#3, #4) are derived by adding 1, 2, 3, respectively, to the radio MAC address.
If the radio MAC address displayed on the Radio Settings screen is 00:A0:F8:72:20:DC, then the
BSSIDs for that radio will have the following MAC addresses:
BSSIDMAC AddressHexadecimal Addition
BSSID #100:A0:F8:72:20:DCSame as Radio MAC address
BSSID #200:A0:F8:72:20:DDRadio MAC address +1
BSSID #300:A0:F8:72:20:DERadio MAC address +2
BSSID #400:A0:F8:72:20:DFRadio MAC address +3
For information on strategically mapping BSSIDs to WLANs, see Configuring the 802.11a or 802.11b/
g Radio on page 5-38.
1.1.7 Quality of Service (QoS) Support
The AP-5131 QoS implementation provides applications running on different wireless devices a
variety of priority levels to transmit data to and from the AP-5131. Equal data transmission priority is
fine for data traffic from applications such as Web browsers, file transfers or email, but is inadequate
for multimedia applications. Voice over Internet Protocol (VoIP), video streaming and interactive
gaming are highly sensitive to latency increases and throughput reductions. These forms of higher
priority data traffic can significantly benefit from the AP-5131 QoS implementation.The WiFi Multimedia QOS Extensions (WMM) implementation used by the AP-5131 shortens the time between
transmitting higher priority data traffic and is thus desirable for multimedia applications.
AP-5131 Introduction
WMM defines four access categories (voice, video, best effort and background) to prioritize traffic to
provide enhanced multimedia support. For information on configuring QoS support for the AP-5131,
see Setting the WLAN Quality of Service (QoS) Policy on page 5-31.
1.1.8 Industry Leading Data Security
The AP-5131 supports numerous encryption and authentication techniques to protect the data
transmitting on the WLAN.
The following authentication techniques are supported on the AP-5131:
•Kerberos Authentication
•EAP Authentication
The following encryption techniques are supported on the AP-5131:
•WEP Encryption
•KeyGuard Encryption
•Wi-Fi Protected Access (WPA) Using TKIP Encryption
•WPA2-CCMP (802.11i) Encryption
1-5
In addition, the AP-5131 supports the following additional security features:
•Firewall Security
•VPN Tunnels
•Content Filtering
For an overview on the encryption and authentication schemes available on the AP-5131, refer to
Configuring Access Point Security on page 6-1.
1.1.8.1 Kerberos Authentication
Authentication is a means of verifying information that is transmitted from a secure source. If
information is authentic, you know who created it and you know that it has not been altered in any
way since it was originated. Authentication entails a network administrator employing a software
“supplicant” on their computer or wireless device.
Authentication is critical for the security of any wireless LAN device. Traditional authentication
methods are not suitable for use in wireless networks where an unauthorized user can monitor
network traffic and intercept passwords. The use of strong authentication methods that do not
disclose passwords is necessary. Symbol uses the Kerberos authentication service protocol (specified
1-6
AP-5131 Access Point Product Reference Guide
in RFC 1510), to authenticate users/clients in a wireless network environment and to securely
distribute the encryption keys used for both encrypting and decrypting.
A basic understanding of RFC 1510 Kerberos Network Authentication Service (V5) is helpful in
understanding how Kerberos functions. By default, WLAN devices operate in an open system network
where any wireless device can associate with an AP without authorization. Kerberos requires device
authentication before access to the wired network is permitted. For additional information on
configuring Kerbeors, see Configuring Kerberos Authentication on page 6-9.
1.1.8.2 EAP Authentication
The Extensible Authentication Protocol (EAP) feature provides access points and their associated
MU’s an additional measure of security for data transmitted over the wireless network. Using EAP,
authentication between devices is achieved through the exchange and verification of certificates.
EAP can be used in mixed mode security with Kerberos and WEP.
EAP is a mutual authentication method whereby both the MU and AP are required to prove their
identities. Like Kerberos, the user loses device authentication if the server cannot provide proof of
device identification
Using EAP, a user requests connection to a WLAN through the AP-5131. The AP-5131 then requests
the identity of the user and transmits that identity to an authentication server. The server prompts the
AP for proof of identity (supplied to the AP-5131 by the user) and then transmits the user data back
to the server to complete the authentication.
An MU is not able to access the network if not authenticated. When configured for EAP support, the
access point displays the MU as an EAP station.
EAP is only supported on mobile devices running Windows XP, Windows 2000 (using Service Pack #4)
and Windows Mobile 2003. Refer to the system administrator for information on configuring a
RADIUS Server for EAP (802.1x) support. For additional information on configuring EAP, see
Configuring 802.1x EAP Authentication on page 6-11.
1.1.8.3 WEP Encryption
All WLAN devices face possible information theft. Theft occurs when an unauthorized user
eavesdrops to obtain information illegally. The absence of a physical connection makes wireless links
particularly vulnerable to this form of theft. Most forms of WLAN security rely on encryption to
various extents. Encryption entails scrambling and coding information, typically with mathematical
formulas called algorithms, before the information is transmitted. An algorithm is a set of instructions
AP-5131 Introduction
or formula for scrambling the data. A key is the specific code used by the algorithm to encrypt or
decrypt the data. Decryption is the decoding and unscrambling of received encrypted data.
The same device, host computer or front-end processor, usually performs both encryption and
decryption. The data transmit or receive direction determines whether the encryption or decryption
function is performed. The device takes plain text, encrypts or scrambles the text typically by
mathematically combining the key with the plain text as instructed by the algorithm, then transmits
the data over the network. At the receiving end, another device takes the encrypted text and decrypts,
or unscrambles, the text revealing the original message. An unauthorized user can know the
algorithm, but cannot interpret the encrypted data without the appropriate key. Only the sender and
receiver of the transmitted data know the key.
Wired Equivalent Privacy (WEP) is an encryption security protocol specified in the IEEE Wireless
Fidelity (Wi-Fi) standard, 802.11b and supported by the AP-5131 AP. WEP encryption is designed to
provide a WLAN with a level of security and privacy comparable to that of a wired LAN. The level of
protection provided by WEP encryption is determined by the encryption key length and algorithm. An
encryption key is a string of case sensitive characters used to encrypt and decrypt data packets
transmitted between a mobile unit (MU) and the AP-5131. An AP-5131 and associated wireless
clients must use the same encryption key (typically 1 through 4) to interoperate. For additional
information on configuring WEP, see Configuring WEP Encryption on page 6-15.
1-7
1.1.8.4 KeyGuard Encryption
Use KeyGuard to shield the master encryption keys from being discovered through hacking. KeyGuard
negotiation takes place between the access point and MU upon association. The access point can
use KeyGuard with Symbol MUs. KeyGuard is only supported on Symbol MUs making it a Symbol
proprietary security mechanism. For additional information on configuring KeyGuard on the AP-5131,
see Configuring KeyGuard Encryption on page 6-17.
1.1.8.5 Wi-Fi Protected Access (WPA) Using TKIP Encryption
Wi-Fi Protected Access (WPA) is a security standard for systems operating with a Wi-Fi wireless
connection. WEP’s lack of user authentication mechanisms is addressed by WPA. Compared to WEP,
WPA provides superior data encryption and user authentication.
WPA addresses the weaknesses of WEP by including:
•a per-packet key mixing function
•a message integrity check
•an extended initialization vector with sequencing rules
1-8
AP-5131 Access Point Product Reference Guide
•a re-keying mechanism
WPA uses an encryption method called Temporal Key Integrity Protocol (TKIP). WPA employs 802.1X
and Extensible Authentication Protocol (EAP). For additional information con configuring WPA, see
Configuring WPA Using TKIP on page 6-19.
1.1.8.6 WPA2-CCMP (802.11i) Encryption
WPA2 is a newer 802.11i standard that provides even stronger wireless security than Wi-Fi Protected
Access (WPA) and WEP. Counter-mode/CBC-MAC Protocol (CCMP) is the security standard used by
the Advanced Encryption Standard (AES). AES serves the same function TKIP does for WPA-TKIP.
CCMP computes a Message Integrity Check (MIC) using the proven Cipher Block Message Authentication Code (CBC-MAC) technique. Changing just one bit in a message produces a totally
different result.
WPA2-CCMP is based on the concept of a Robust Security Network (RSN), which defines a hierarchy
of keys with a limited lifetime (similar to TKIP). Like TKIP, the keys the administrator provides are used
to derive other keys. Messages are encrypted using a 128-bit secret key and a 128-bit block of data.
the end result is an encryption scheme as secure as any the AP-5131 provides. For additional
information on configuring WPA2-CCMP, see Configuring WPA2-CCMP (802.11i) on page 6-22.
1.1.8.7 Firewall Security
A firewall keeps personal data in and hackers out. The AP-5131 firewall prevents suspicious Internet
traffic from proliferating the AP-5131 managed network. The AP-5131 performs network address
translation (NAT) on packets passing to and from the WAN port. This combination provides enhanced
security by monitoring communication with the wired network. For instructions on setting the
AP-5131 firewall, see Configuring Firewall Settings on page 6-25.
1.1.8.8 VPN Tunnels
Virtual Private Networks (VPNs) are IP-based networks using encryption and tunneling providing
users remote access to a secure LAN. In essence, the trust relationship is extended from one LAN
across the public network to another LAN, without sacrificing security. A VPN behaves like a private
network; however, because the data travels through the public network, it needs several layers of
security. The AP-5131 can function as a robust VPN gateway. For additional information on
configuring VPN security on the AP-5131, see Configuring VPN Tunnels on page 6-33.
AP-5131 Introduction
1.1.8.9 Content Filtering
Content filtering allows system administrators to block specific commands and URL extensions from
going out through the AP-5131 WAN port only. Therefore, content filtering affords system
administrators selective control on the content proliferating the network and is a powerful screening
tool. Content filtering allows the blocking of up to 10 files or URL extensions and allows blocking of
specific outbound HTTP, SMTP, and FTP requests.
For instructions on configuring content filtering on the AP-5131, see Configuring Content Filtering
Settings on page 6-48.
1.1.9 VLAN Support
A Virtual Local Area Network (VLAN) is a means to electronically separate data on the same AP-5131
from a single broadcast domain into separate broadcast domains. By using a VLAN, you can group by
logical function instead of physical location. There are 16 VLANs supported on the AP-5131. An
administrator can map up to 16 WLANs to 16 VLANs and enable or disable dynamic VLAN
assignment. In addition to these 16 VLANs, the AP-5131 supports dynamic, user-based, VLANs when
using EAP authentication.
VLANs enable organizations to share network resources in various network segments within large
areas (airports, shopping malls, etc.). A VLAN is a group of clients with a common set of requirements
independent of their physical location. VLANs have the same attributes as physical LANs, but they
enable administrators to group clients even when they are not members of the same network
segment. For more information, see Configuring VLAN Support on page 5-5.
1-9
1.1.10 Multiple Management Accessibility Options
The AP-5131 can be accessed and configured using one of the following methods:
•Java-Based Web UI
•Human readable config file (imported via FTP or TFTP)
•MIB (Management Information Base)
•Command Line Interface (CLI) accessed via RS-232 or Telnet. Use the AP-5131 DB-9 serial
port for direct access to the command-line interface from a PC. Use Symbol's Null-Modem
cable (Part No. 25-632878-0) for the best fitting connection.
1-10
AP-5131 Access Point Product Reference Guide
1.1.11 Updatable Firmware
Symbol periodically releases updated versions of the AP-5131 device firmware to the Symbol Web
site. If the AP-5131 firmware version displayed on the System Settings page (see Configuring System
Settings on page 4-2) is older than the version on the Web site, Symbol recommends updating the
AP-5131 to the latest firmware version for full feature functionality. For instructions on updating the
AP-5131 firmware using FTP or TFTP, see Updating Device Firmware on page 4-34.
1.1.12 Programmable SNMP v1/v2/v3 Trap Support
Simple Network Management Protocol (SNMP) facilitates the exchange of management information
between network devices. SNMP uses Management Information Bases (MIBs) to manage the device
configuration and monitor Internet devices in remote locations. MIB information accessed via SNMP
is defined by a set of managed objects called object identifiers (OIDs). An object identifier (OID) is
used to uniquely identify each object variable of a MIB.
SNMP allows a network administrator to configure the AP-5131, manage network performance, find
and solve network problems, and plan for network growth. The AP-5131 supports SNMP management
functions for gathering information from its network components. The AP-5131 CDROM and the (AP5131 downloads site) contains the following 2 MIB files:
• Symbol-CC-WS2000-MIB-2.0 (standard Symbol MIB file)
• Symbol-AP-5131-MIB (AP-5131 specific MIB file)
The AP-5131 SNMP agent functions as a command responder and is a multilingual agent responding
to SNMPv1, v2c and v3 managers (command generators). The factory default configuration maintains
SNMPv1/2c support of the community names, hence providing backward compatibility. For
information on configuring SNMP traps, see Configuring SNMP Settings on page 4-11.
1.1.13 Power-over-Ethernet Support
When users purchase a Symbol WLAN solution, they often need to place access points in obscure
locations. In the past, a dedicated power source was required for each access point in addition to the
Ethernet infrastructure. This often required an electrical contractor to install power drops at each
access point location. An approved power injector solution merges power and Ethernet into one
cable, reducing the burden of installation and allows optimal AP-5131 placement in respect to the
intended radio coverage area. The AP-5131 can only use a Power-over-Ethernet device when
connected to the LAN port.
AP-5131 Introduction
The Symbol Power Injector (Part No. AP-PSBIAS-T-1P-AF) is a single-port, 802.3af compliant Power
over Ethernet hub combining low-voltage DC with Ethernet data in a single cable connecting to the
AP-5131. The Power Injector’s single DC and Ethernet data cable creates a modified Ethernet cabling
environment on the AP-5131’s LAN port eliminating the need for separate Ethernet and power cables.
For more information on the Symbol Power Injector, see Symbol Power Injector System on page 2-7.
1.1.14 MU-MU Transmission Disallow
The AP-5131’s MU-MU Disallow feature prohibits MUs from communicating with each other even if
they are on different WLANs, assuming one of the WLAN’s is configured to disallow MU-MU
communication. Therefore, if an MU’s WLAN is configured for MU-MU disallow, it will not be able to
communicate with any other MUs connected to this AP-5131.
For information on configuring an AP-5131 WLAN to disallow MU to MU communications, see
Creating/Editing Individual WLANs on page 5-24.
1.1.15 Voice Prioritization
Each AP-5131 WLAN has the capability of having its QoS policy configured to prioritize the network
traffic requirements for associated MUs. A WLAN QoS page is available for each enabled WLAN on
either the AP-5131 802.11a or 802.11b/g radio.
1-11
Use the QoS page to enable voice prioritization for devices to receive the transmission priority they
may not normally receive over other data traffic. Voice prioritization allows the AP-5131 to assign
priority to voice traffic over data traffic, and (if necessary) assign legacy voice supported devices (non
WMM supported voice devices) additional priority. For information on configuring voice prioritization
over other voice enabled devices, see Setting the WLAN Quality of Service (QoS) Policy on page 5-31.
1-12
AP-5131 Access Point Product Reference Guide
1.1.16 Support for CAM and PSP MUs
The AP-5131 supports both CAM and PSP powered MUs. CAM (Continuously Aware Mode) MUs
leave their radios on continuously to hear every beacon and message transmitted. These systems
operate without any adjustments by the AP-5131. A beacon is a uniframe system packet broadcast
by the AP to keep the network synchronized. A beacon includes the ESSID, AP-5131 MAC address,
Broadcast destination addresses, a time stamp, a DTIM (Delivery Traffic Indication Message) and the
TIM (Traffic Indication Map).
PSP (Power Save Polling) MUs power off their radios for short periods. When a Symbol MU in PSP
mode associates with an AP-5131, it notifies the AP-5131 of its activity status. The AP-5131 responds
by buffering packets received for the MU. PSP mode is used to extend an MU’s battery life by enabling
the MU to “sleep” during periods of inactivity.
1.1.17 Statistical Displays
The AP-5131 can display robust transmit and receive statistics for the WAN and LAN ports. WLAN
stats can be displayed collectively and individually for enabled WLANs. Transmit and receive
statistics are available for the AP-5131’s 802.11a and 802.11b/g radios. An advanced radio statistics
page is also available to display retry histograms for specific data packet retry information.
Associated MU stats can be displayed collectively and individually for specific MUs. An echo (ping)
test is also available to ping specific MUs to assess association strength. Finally, the AP-5131 can
detect and display the properties of other APs detected within the AP-5131’s radio coverage area. The
type of AP detected can be displayed as well as the properties of individual APs. For information on
available AP-5131 statistical displays and the values they represent, see Monitoring Statistics on
page 7-1.
1.1.18 Transmit Power Control
The AP-5131 has a configurable power level for each radio. This enables the network administrator
to define the antenna’s transmission power level in respect to the AP-5131’s placement or network
requirements as defined in the AP-5131 site survey. For detailed instructions on setting the radio
transmit power level, see Configuring the 802.11a or 802.11b/g Radio on page 5-38.
1.1.19 Advanced Event Logging Capability
The AP-5131 provides the capability for periodically logging system events. Logging events is useful
in assessing the throughput and performance of the AP-5131 or troubleshooting problems on the
AP-5131 Introduction
AP-5131 managed Local Area Network (LAN). For more information, see Logging Configuration on
Configuration settings for an AP-5131 can be downloaded from the current configuration of another
AP-5131. This affords the administrator the opportunity to save the current configuration before
making significant changes or restoring the default configuration. For information on importing or
exporting configuration files, see Importing/Exporting Configurations on page 4-30.
1.1.21 Default Configuration Restoration
The AP-5131 has the ability to restore its default configuration or a partial default configuration with
the exception of current WAN and SNMP settings. Restoring the default configuration is a good way
to create new WLANs if the MUs the AP-5131 supports have been moved to different radio coverage
areas. For information on restoring a default or partial default configuration, see Configuring System
Settings on page 4-2.
1.1.22 DHCP Support
1-13
The AP-5131 can use Dynamic Host Configuration Protocol (DHCP) to obtain a leased IP address and
configuration information from a remote server. DHCP is based on the BOOTP protocol and can coexist
or interoperate with BOOTP. Configure the AP-5131 to send out a DHCP request searching for a DHCP/BOOTP server to acquire HTML, firmware or network configuration files when the AP-5131 boots.
Because BOOTP and DHCP interoperate, whichever responds first becomes the server that allocates
information.
The AP-5131 can be set to only accept replies from DHCP or BOOTP servers or both (this is the default
setting). Disabling DHCP disables BOOTP and DHCP and requires network settings to be set manually.
If running both DHCP and BOOTP, do not select BOOTP Only. BOOTP should only be used when the
server is running BOOTP exclusively.
The DHCP client automatically sends a DHCP request at an interval specified by the DHCP server to
renew the IP address lease as long as the AP-5131 is running (this parameter is programmed at the
DHCP server). For example: Windows 2000 servers typically are set for 3 days.
1-14
AP-5131 Access Point Product Reference Guide
1.1.23 Multi Function LEDs
The AP-5131 houses seven LED indicators. Four LEDs exist on the top of the AP-5131 and are visible
from wall, ceiling and table-top orientations. Three of these four LEDs are single color activity LEDs,
and one is a multi-function red and white status LED. Two LEDs exist on the rear of the AP-5131 and
are viewable using a single (customer installed) extended light pipe, adjusted as required to suit
above the ceiling installations. For detailed descriptions of the AP-5131 LEDs and their functionality,
see LED Indicators on page 2-20.
1.2 Theory of Operations
To understand AP-5131 management and performance alternatives, users need familiarity with
AP-5131 functionality and configuration options. The AP-5131 includes features for different
interface connections and network management.
The AP-5131 uses electromagnetic waves to transmit and receive electric signals without wires.
Users communicate with the network by establishing radio links between mobile units (MUs) and
access points.
The AP-5131 uses DSSS (direct sequence spread spectrum) to transmit digital data from one device
to another. A radio signal begins with a carrier signal that provides the base or center frequency. The
digital data signal is encoded onto the carriers using a DSSS chipping algorithm. The AP-5131 radio
signal propagates into the air as electromagnetic waves. A receiving antenna (on the MU) in the path
of the waves absorbs the waves as electrical signals. The receiving MU interprets (demodulates) the
signal by reapplying the direct sequence chipping code. This demodulation results in the original
digital data.
The AP-5131 uses its environment (the air and certain objects) as the transmission medium.The
AP-5131 can either transmit in the 2.4 to 2.5-GHz frequency range (802.11b/g radio) or the 5.2 GHz
frequency range (802.11a radio), the actual range is country-dependent. Symbol devices, like other
Ethernet devices, have unique, hardware encoded Media Access Control (MAC) or IEEE addresses.
MAC addresses determine the device sending or receiving data. A MAC address is a 48-bit number
written as six hexadecimal bytes separated by colons.
For example: 00:A0:F8:24:9A:C8
Also see the following sections:
•Cellular Coverage
•Network Topology
Loading...
+ 426 hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.