MOTOROLA AP-5131 User Manual

AP-5131 Access Point
Product Reference Guide
AP-5131 Access Point
Product Reference Guide
72E-70930-01
Revision A
© 2005 by Symbol Technologies, Inc. All rights reserved.
No part of this publication may be reproduced or used in any form, or by any electrical or mechanical means, without permission in writing from Symbol. This includes electronic or mechanical means, such as photocopying, recording, or information storage and retrieval systems. The material in this manual is subject to change without notice.
The software is provided strictly on an “as is” basis. All software, including firmware, furnished to the user is on a licensed basis. Symbol grants to the user a non-transferable and non-exclusive license to use each software or firmware program delivered hereunder (licensed program). Except as noted below, such license may not be assigned, sublicensed, or otherwise transferred by the user without prior written consent of Symbol. No right to copy a licensed program in whole or in part is granted, except as permitted under copyright law. The user shall not modify, merge, or incorporate any form or portion of a licensed program with other program material, create a derivative work from a licensed program, or use a licensed program in a network without written permission from Symbol. The user agrees to maintain Symbol’s copyright notice on the licensed programs delivered hereunder, and to include the same on any authorized copies it makes, in whole or in part. The user agrees not to decompile, disassemble, decode, or reverse engineer any licensed program delivered to the user or any portion thereof.
Symbol reserves the right to make changes to any software or product to improve reliability, function, or design.
Symbol does not assume any product liability arising out of, or in connection with, the application or use of any product, circuit, or application described herein.
No license is granted, either expressly or by implication, estoppel, or otherwise under any Symbol Technologies, Inc., intellectual property rights. An implied license only exists for equipment, circuits, and subsystems contained in Symbol products.
Symbol, Spectrum One, and Spectrum24 are registered trademarks of Symbol Technologies, Inc. Other product names mentioned in this manual may be trademarks or registered trademarks of their respective companies and are hereby acknowledged.
Symbol Technologies, Inc. One Symbol Plaza Holtsville, New York 11742-1300
http://www.symbol.com

Contents

About This Guide
Introduction. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . vii
Document Conventions. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . vii
Notational Conventions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .viii
Service Information. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .viii
Chapter 1. AP-5131 Introduction
Feature Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-2
Single or Dual Mode Radio Options. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-2
Separate LAN and WAN Ports . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-3
Multiple Mounting Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-3
Antenna Support for 2.4 GHz and 5.2 GHz Radios . . . . . . . . . . . . . . . . . . . . . . 1-3
Sixteen Configurable WLANs. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-4
Support for 4 BSSIDs per Radio . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-4
Quality of Service (QoS) Support . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-4
Industry Leading Data Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-5
iv
AP-5131 Access Point Product Reference Guide
Kerberos Authentication. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-5
EAP Authentication. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-6
WEP Encryption . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-6
KeyGuard Encryption . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-7
Wi-Fi Protected Access (WPA) Using TKIP Encryption . . . . . . . . . . . . . . 1-7
WPA2-CCMP (802.11i) Encryption . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-8
Firewall Security. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-8
VPN Tunnels . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-8
Content Filtering . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-9
VLAN Support . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-9
Multiple Management Accessibility Options. . . . . . . . . . . . . . . . . . . . . . . . . . 1-9
Updatable Firmware . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-10
Programmable SNMP v1/v2/v3 Trap Support . . . . . . . . . . . . . . . . . . . . . . . . 1-10
Power-over-Ethernet Support. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-10
MU-MU Transmission Disallow . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-11
Voice Prioritization . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-11
Support for CAM and PSP MUs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-12
Statistical Displays. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-12
Transmit Power Control . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-12
Advanced Event Logging Capability . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-12
Configuration File Import/Export Functionality . . . . . . . . . . . . . . . . . . . . . . . 1-13
Default Configuration Restoration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-13
DHCP Support . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-13
Multi Function LEDs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-14
Theory of Operations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-14
Cellular Coverage . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-15
Network Topology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-16
MAC Layer Bridging . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-19
Media Types . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-20
Direct-Sequence Spread Spectrum . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-20
MU Association Process. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-21
Operating Modes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-22
Management Access Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-23
Chapter 2. Hardware Installation
Precautions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-1
Package Contents . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-2
Available Product Configurations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-2
Requirements. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-4
Placement of the AP-5131 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-4
Site Surveys . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-5
Antenna Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-5
Power Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-7
Symbol Power Injector System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-7
Installing the Power Injector . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-9
Preparing for Site Installation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-9
Cabling the Power Injector . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-9
Power Injector LED Indicators . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-10
Mounting the AP-5131. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-11
Desk Mounted Installations. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-11
Wall Mounted Installations. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-13
Suspended Ceiling T-Bar Installations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2-15
Above the Ceiling (Plenum) Installations. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-17
LED Indicators . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-20
Setting Up MUs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-22
v
Chapter 3. Getting Started
Installing the AP-5131 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-1
Configuration Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-2
Basic Device Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-3
Configuring Device Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-4
Configuring WLAN Security Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-9
Testing Connectivity . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .3-11
Where to Go from Here? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-12
Chapter 4. System Configuration
Configuring System Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-2
Configuring Data Access . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-5
Managing Certificate Authority (CA) Certificates . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-8
Importing a CA Certificate . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-8
Creating Self Certificates . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-9
Configuring SNMP Settings. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-11
Configuring SNMP Access Control . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-17
vi
AP-5131 Access Point Product Reference Guide
Enabling SNMP Traps. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-19
Configuring Specific SNMP Traps . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-22
Configuring SNMP RF Trap Thresholds . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-24
Configuring Network Time Protocol (NTP) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-26
Logging Configuration. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-28
Importing/Exporting Configurations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-30
Updating Device Firmware . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-34
Chapter 5. Network Management
Configuring the LAN Interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-1
Configuring VLAN Support . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-5
Configuring Advanced DHCP Server Settings . . . . . . . . . . . . . . . . . . . . . . . . 5-10
Setting the Type Filter Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-11
Configuring WAN Settings. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-13
Configuring Network Address Translation (NAT) Settings . . . . . . . . . . . . . . 5-18
Configuring Port Forwarding. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-20
Enabling Wireless LANs (WLANs) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-22
Creating/Editing Individual WLANs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-24
Configuring WLAN Security Policies . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-27
Configuring a WLAN Access Control List (ACL). . . . . . . . . . . . . . . . . . . 5-29
Setting the WLAN Quality of Service (QoS) Policy . . . . . . . . . . . . . . . . 5-31
Setting the WLAN’s Radio Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-36
Configuring the 802.11a or 802.11b/g Radio. . . . . . . . . . . . . . . . . . . . . 5-38
Configuring Bandwidth Management Settings . . . . . . . . . . . . . . . . . . . . . . . 5-45
Configuring Router Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-47
Chapter 6. Configuring Access Point Security
Configuring Security Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-2
Setting Passwords . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-3
Resetting the AP-5131 Password. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-4
Enabling Authentication and Encryption Schemes . . . . . . . . . . . . . . . . . . . . . . . . . 6-5
Configuring Kerberos Authentication. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-9
Configuring 802.1x EAP Authentication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-11
Configuring WEP Encryption. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-15
Configuring KeyGuard Encryption. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-17
Configuring WPA Using TKIP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-19
Configuring WPA2-CCMP (802.11i) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-22
Configuring Firewall Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-25
Configuring LAN to WAN Access . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-27
Available Protocols . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-30
Configuring Advanced LAN Access . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-30
Configuring VPN Tunnels. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-33
Configuring Manual Key Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-36
Configuring Auto Key Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .6-40
Configuring IKE Key Settings. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-42
Viewing VPN Status. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-46
Configuring Content Filtering Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-48
Configuring Rogue AP Detection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-51
Moving Rogue APs to the Allowed AP List . . . . . . . . . . . . . . . . . . . . . . . . . . .6-54
Displaying Rogue AP Details. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-56
Using MUs to Detect Rogue Devices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .6-58
Chapter 7. Monitoring Statistics
Viewing WAN Statistics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-2
Viewing LAN Statistics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-5
Viewing Wireless Statistics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-8
Viewing WLAN Statistics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-10
Viewing Radio Statistics Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-14
Viewing Radio Statistics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-15
Retry Histogram. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-19
Viewing MU Statistics Summary. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-20
Viewing MU Details. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-22
Pinging Individual MUs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-24
MU Authentication Statistics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-25
Viewing Known Access Point Statistics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-26
vii
Chapter 8. Command Line Interface Reference
Connecting to the CLI. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-1
Accessing the CLI through the Serial Port. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-1
Accessing the CLI via Telnet . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-2
Admin and Common Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-3
viii
AP-5131 Access Point Product Reference Guide
Network Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-12
Network LAN Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-13
Network LAN, VLAN Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-16
Network LAN, DHCP Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-23
Network Type Filter Commands. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-29
Network WAN Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-34
Network WAN NAT Commands. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-37
Network WAN, VLAN Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-43
Network WAN App Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-52
Network Wireless Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-56
Network WLAN Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-57
Network Security Commands. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-62
Network ACL Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-71
Network Radio Configuration Commands . . . . . . . . . . . . . . . . . . . . . . . 8-76
Network Quality of Service (QoS) Commands . . . . . . . . . . . . . . . . . . . . 8-93
Network Bandwith Management Commands . . . . . . . . . . . . . . . . . . . . 8-98
Network Rogue-AP Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-101
Network Firewall Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-111
Network Router Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-116
System Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-121
System Debug and Last Password Commands . . . . . . . . . . . . . . . . . . . . . . 8-125
System Access Commands. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-126
System Certificate Management Commands . . . . . . . . . . . . . . . . . . . . . . . 8-129
System SNMP Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-140
System SNMP Access Commands. . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-141
System SNMP Traps Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-146
System Network Time Protocol (NTP) Commands . . . . . . . . . . . . . . . . . . . . 8-152
System Log Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-155
System Configuration-Update Commands . . . . . . . . . . . . . . . . . . . . . . . . . 8-161
Firmware Update Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-168
System Test Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-172
Statistics Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-175
Appendix A. Technical Specifications
Physical Characteristics. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .A-1
Electrical Characteristics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .A-2
Radio Characteristics. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .A-3
Antenna Specifications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .A-3
2.4 GHz Antenna Matrix . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .A-4
ML-2499-11PNA2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .A-4
ML-2499-APA2-0 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .A-5
ML-2499-APA3-01 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .A-5
ML-2499-BYGA2-01. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .A-6
5.2 GHz Antenna Matrix . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .A-6
ML-5299-APA1-01 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .A-7
ML-5299-HPA1-01 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .A-9
ML-5299-WPNA1-01 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .A-12
Additional Antenna Components. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .A-14
Antenna Accessory Connectors, Cable Type and Length . . . . . . . . . . . . . . . .A-15
Country Codes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .A-15
ix
Appendix B. Customer Support
x
AP-5131 Access Point Product Reference Guide
About This Guide
Introduction
This guide provides configuration and setup information for the AP-5131 model access point.
Document Conventions
The following document conventions are used in this document:
NOTE Indicate tips or special requirements.
CAUTION Indicates conditions that can cause equipment damage or data loss.
!
viii
AP-5131 Access Point Product Reference Guide
WARNING! Indicates a condition or procedure that could result in personal injury or
equipment damage.
Notational Conventions
The following notational conventions are used in this document:
Italics are used to highlight specific items in the general text, and to identify chapters and sections in this and related documents.
Bullets (•) indicate:
• action items
• lists of alternatives
• lists of required steps that are not necessarily sequential
Sequential lists (those describing step-by-step procedures) appear as numbered lists.
Service Information
If a problem is encountered with the AP-5131, contact the Symbol Customer Support. Refer to
Appendix C for contact information. Before calling, have the model number and serial number at hand.
If the problem cannot be solved over the phone, you may need to return your equipment for servicing. If that is necessary, you will be given specific instructions.
Symbol Technologies is not responsible for any damages incurred during shipment if the approved shipping container is not used. Shipping the units improperly can possibly void the warranty. If the original shipping container was not kept, contact Symbol to have another sent to you.

AP-5131 Introduction

The Symbol AP-5131 Access Point (AP) provides a bridge between Ethernet wired LANs or WANs and wireless networks. It provides connectivity between Ethernet wired networks and radio-equipped mobile units (MUs). MUs include the full line of Symbol terminals, bar-code scanners, adapters (PC cards, Compact Flash cards and PCI adapters) and other devices.
The AP-5131 provides a maximum 54Mbps data transfer rate via each radio. It monitors Ethernet traffic and forwards appropriate Ethernet messages to MUs over the network. It also monitors MU radio traffic and forwards MU packets to the Ethernet LAN.
The AP-5131 is available in two models:
A single-radio version (Part No. AP-5131-4002X-WW), that can be configured as either an
802.11a access point or an 802.11b/g access point.
A dual-radio version (Part No. AP-5131-1304X-WW), allowing both the 802.11a radio and
the 802.11b/g radio to function simultaneously.
If you are new to using an access point for managing your network, refer to Theory of Operations on
page 1-14 for an overview on wireless networking fundamentals.
1-2
AP-5131 Access Point Product Reference Guide

1.1 Feature Overview

The Symbol AP-5131 has the following features:
Single or Dual Mode Radio Options
Separate LAN and WAN Ports
Multiple Mounting Options
Antenna Support for 2.4 GHz and 5.2 GHz Radios
Sixteen Configurable WLANs
Support for 4 BSSIDs per Radio
Quality of Service (QoS) Support
Industry Leading Data Security
VLAN Support
Multiple Management Accessibility Options
Updatable Firmware
Programmable SNMP v1/v2/v3 Trap Support
Power-over-Ethernet Support
MU-MU Transmission Disallow
Voice Prioritization
Support for CAM and PSP MUs
Statistical Displays
Transmit Power Control
Advanced Event Logging Capability
Configuration File Import/Export Functionality
Default Configuration Restoration
DHCP Support
Multi Function LEDs

1.1.1 Single or Dual Mode Radio Options

One or two possible configurations are available on the AP-5131 depending on which model is purchased. If the AP-5131 is manufactured as a single radio access point, the AP-5131 enables you to configure the single radio for either 802.11a or 802.11b/g.
AP-5131 Introduction
If the AP-5131 is manufactured as a dual-radio access point, the AP-5131 enables you to configure one radio for 802.11a, and the other 802.11b/g. For more information on configuring your AP-5131, see Setting the WLAN’s Radio Configuration on page 5-36.

1.1.2 Separate LAN and WAN Ports

The AP-5131 has one LAN port and one WAN port, each with their own MAC address. The AP-5131 must manage all data traffic over the LAN connection carefully as either a DHCP client, BOOTP client, DHCP server or using a static IP address. The AP-5131 can only use a Power-over-Ethernet device when connected to the LAN port. For more information on configuring the AP-5131 LAN port, see
Configuring the LAN Interface on page 5-1.
A Wide Area Network (WAN) is a widely dispersed telecommunications network. In a corporate environment, the WAN port might connect to a larger corporate network. For a small business, the WAN port might connect to a DSL or cable modem to access the Internet. Regardless, network address information must be configured for the AP-5131’s intended mode of operation. For information on configuring the AP-5131’s WAN port, see Configuring WAN Settings on page 5-13.
The LAN and WAN port MAC addresses can be located within the LAN and WAN Stats screens. For information on locating the AP-5131 MAC addresses, see Viewing WAN Statistics on page 7-2 and
Viewing LAN Statistics on page 7-5.
1-3

1.1.3 Multiple Mounting Options

The AP-5131 rests on a flat surface, attaches to a wall, mounts under a ceiling or above a ceiling (attic). Choose a mounting option based on the physical environment of the coverage area. Do not mount the AP-5131 in a location that has not been approved in an AP-5131 radio coverage site survey. For detailed information on the mounting options available for the AP-5131, see Mounting the
AP-5131 on page 2-11.

1.1.4 Antenna Support for 2.4 GHz and 5.2 GHz Radios

The AP-5131 supports several 802.11a and 802.11b/g radio antennas. Select the antenna best suited to the radio transmission requirements of your coverage area. For an overview of the Radio 1 (2.4 GHz) and Radio 2 (5.2 GHz) antennas supported on the AP-5131’s Reverse SMA (RSMA) connectors, see
Technical Specifications on page A-1.
1-4
AP-5131 Access Point Product Reference Guide

1.1.5 Sixteen Configurable WLANs

A Wireless Local Area Network (WLAN) is a data-communications system that flexibly extends the functionalities of a wired LAN. A WLAN does not require lining up devices for line-of-sight transmission, and are thus, desirable for wireless networking. Roaming users can be handed off from one AP-5131 to another like a cellular phone system. WLANs can therefore be configured around the needs of specific groups of users, even when they are not in physical proximity. Sixteen WLANs are configurable on each AP-5131. To enable and configure WLANs on an AP-5131 radio, see Enabling
Wireless LANs (WLANs) on page 5-22.

1.1.6 Support for 4 BSSIDs per Radio

The AP-5131 supports four BSSIDs per radio. Each BSSID has a corresponding MAC address. The first MAC address corresponds to BSSID #1. The MAC addresses for the other three BSSIDs (BSSIDs #2, #3, #4) are derived by adding 1, 2, 3, respectively, to the radio MAC address.
If the radio MAC address displayed on the Radio Settings screen is 00:A0:F8:72:20:DC, then the BSSIDs for that radio will have the following MAC addresses:
BSSID MAC Address Hexadecimal Addition
BSSID #1 00:A0:F8:72:20:DC Same as Radio MAC address
BSSID #2 00:A0:F8:72:20:DD Radio MAC address +1
BSSID #3 00:A0:F8:72:20:DE Radio MAC address +2
BSSID #4 00:A0:F8:72:20:DF Radio MAC address +3
For information on strategically mapping BSSIDs to WLANs, see Configuring the 802.11a or 802.11b/
g Radio on page 5-38.

1.1.7 Quality of Service (QoS) Support

The AP-5131 QoS implementation provides applications running on different wireless devices a variety of priority levels to transmit data to and from the AP-5131. Equal data transmission priority is fine for data traffic from applications such as Web browsers, file transfers or email, but is inadequate for multimedia applications. Voice over Internet Protocol (VoIP), video streaming and interactive gaming are highly sensitive to latency increases and throughput reductions. These forms of higher priority data traffic can significantly benefit from the AP-5131 QoS implementation.The WiFi Multimedia QOS Extensions (WMM) implementation used by the AP-5131 shortens the time between transmitting higher priority data traffic and is thus desirable for multimedia applications.
AP-5131 Introduction
WMM defines four access categories (voice, video, best effort and background) to prioritize traffic to provide enhanced multimedia support. For information on configuring QoS support for the AP-5131, see Setting the WLAN Quality of Service (QoS) Policy on page 5-31.

1.1.8 Industry Leading Data Security

The AP-5131 supports numerous encryption and authentication techniques to protect the data transmitting on the WLAN.
The following authentication techniques are supported on the AP-5131:
Kerberos Authentication
EAP Authentication
The following encryption techniques are supported on the AP-5131:
WEP Encryption
KeyGuard Encryption
Wi-Fi Protected Access (WPA) Using TKIP Encryption
WPA2-CCMP (802.11i) Encryption
1-5
In addition, the AP-5131 supports the following additional security features:
Firewall Security
VPN Tunnels
Content Filtering
For an overview on the encryption and authentication schemes available on the AP-5131, refer to
Configuring Access Point Security on page 6-1.
1.1.8.1 Kerberos Authentication
Authentication is a means of verifying information that is transmitted from a secure source. If information is authentic, you know who created it and you know that it has not been altered in any way since it was originated. Authentication entails a network administrator employing a software “supplicant” on their computer or wireless device.
Authentication is critical for the security of any wireless LAN device. Traditional authentication methods are not suitable for use in wireless networks where an unauthorized user can monitor network traffic and intercept passwords. The use of strong authentication methods that do not disclose passwords is necessary. Symbol uses the Kerberos authentication service protocol (specified
1-6
AP-5131 Access Point Product Reference Guide
in RFC 1510), to authenticate users/clients in a wireless network environment and to securely distribute the encryption keys used for both encrypting and decrypting.
A basic understanding of RFC 1510 Kerberos Network Authentication Service (V5) is helpful in understanding how Kerberos functions. By default, WLAN devices operate in an open system network where any wireless device can associate with an AP without authorization. Kerberos requires device authentication before access to the wired network is permitted. For additional information on configuring Kerbeors, see Configuring Kerberos Authentication on page 6-9.
1.1.8.2 EAP Authentication
The Extensible Authentication Protocol (EAP) feature provides access points and their associated MU’s an additional measure of security for data transmitted over the wireless network. Using EAP, authentication between devices is achieved through the exchange and verification of certificates. EAP can be used in mixed mode security with Kerberos and WEP.
EAP is a mutual authentication method whereby both the MU and AP are required to prove their identities. Like Kerberos, the user loses device authentication if the server cannot provide proof of device identification
Using EAP, a user requests connection to a WLAN through the AP-5131. The AP-5131 then requests the identity of the user and transmits that identity to an authentication server. The server prompts the AP for proof of identity (supplied to the AP-5131 by the user) and then transmits the user data back to the server to complete the authentication.
An MU is not able to access the network if not authenticated. When configured for EAP support, the access point displays the MU as an EAP station.
EAP is only supported on mobile devices running Windows XP, Windows 2000 (using Service Pack #4) and Windows Mobile 2003. Refer to the system administrator for information on configuring a RADIUS Server for EAP (802.1x) support. For additional information on configuring EAP, see
Configuring 802.1x EAP Authentication on page 6-11.
1.1.8.3 WEP Encryption
All WLAN devices face possible information theft. Theft occurs when an unauthorized user eavesdrops to obtain information illegally. The absence of a physical connection makes wireless links particularly vulnerable to this form of theft. Most forms of WLAN security rely on encryption to various extents. Encryption entails scrambling and coding information, typically with mathematical formulas called algorithms, before the information is transmitted. An algorithm is a set of instructions
AP-5131 Introduction
or formula for scrambling the data. A key is the specific code used by the algorithm to encrypt or decrypt the data. Decryption is the decoding and unscrambling of received encrypted data.
The same device, host computer or front-end processor, usually performs both encryption and decryption. The data transmit or receive direction determines whether the encryption or decryption function is performed. The device takes plain text, encrypts or scrambles the text typically by mathematically combining the key with the plain text as instructed by the algorithm, then transmits the data over the network. At the receiving end, another device takes the encrypted text and decrypts, or unscrambles, the text revealing the original message. An unauthorized user can know the algorithm, but cannot interpret the encrypted data without the appropriate key. Only the sender and receiver of the transmitted data know the key.
Wired Equivalent Privacy (WEP) is an encryption security protocol specified in the IEEE Wireless Fidelity (Wi-Fi) standard, 802.11b and supported by the AP-5131 AP. WEP encryption is designed to provide a WLAN with a level of security and privacy comparable to that of a wired LAN. The level of protection provided by WEP encryption is determined by the encryption key length and algorithm. An encryption key is a string of case sensitive characters used to encrypt and decrypt data packets transmitted between a mobile unit (MU) and the AP-5131. An AP-5131 and associated wireless clients must use the same encryption key (typically 1 through 4) to interoperate. For additional information on configuring WEP, see Configuring WEP Encryption on page 6-15.
1-7
1.1.8.4 KeyGuard Encryption
Use KeyGuard to shield the master encryption keys from being discovered through hacking. KeyGuard negotiation takes place between the access point and MU upon association. The access point can use KeyGuard with Symbol MUs. KeyGuard is only supported on Symbol MUs making it a Symbol proprietary security mechanism. For additional information on configuring KeyGuard on the AP-5131, see Configuring KeyGuard Encryption on page 6-17.
1.1.8.5 Wi-Fi Protected Access (WPA) Using TKIP Encryption
Wi-Fi Protected Access (WPA) is a security standard for systems operating with a Wi-Fi wireless connection. WEP’s lack of user authentication mechanisms is addressed by WPA. Compared to WEP, WPA provides superior data encryption and user authentication.
WPA addresses the weaknesses of WEP by including:
a per-packet key mixing function
a message integrity check
an extended initialization vector with sequencing rules
1-8
AP-5131 Access Point Product Reference Guide
a re-keying mechanism
WPA uses an encryption method called Temporal Key Integrity Protocol (TKIP). WPA employs 802.1X and Extensible Authentication Protocol (EAP). For additional information con configuring WPA, see
Configuring WPA Using TKIP on page 6-19.
1.1.8.6 WPA2-CCMP (802.11i) Encryption
WPA2 is a newer 802.11i standard that provides even stronger wireless security than Wi-Fi Protected Access (WPA) and WEP. Counter-mode/CBC-MAC Protocol (CCMP) is the security standard used by the Advanced Encryption Standard (AES). AES serves the same function TKIP does for WPA-TKIP. CCMP computes a Message Integrity Check (MIC) using the proven Cipher Block Message Authentication Code (CBC-MAC) technique. Changing just one bit in a message produces a totally different result.
WPA2-CCMP is based on the concept of a Robust Security Network (RSN), which defines a hierarchy of keys with a limited lifetime (similar to TKIP). Like TKIP, the keys the administrator provides are used to derive other keys. Messages are encrypted using a 128-bit secret key and a 128-bit block of data. the end result is an encryption scheme as secure as any the AP-5131 provides. For additional information on configuring WPA2-CCMP, see Configuring WPA2-CCMP (802.11i) on page 6-22.
1.1.8.7 Firewall Security
A firewall keeps personal data in and hackers out. The AP-5131 firewall prevents suspicious Internet traffic from proliferating the AP-5131 managed network. The AP-5131 performs network address translation (NAT) on packets passing to and from the WAN port. This combination provides enhanced security by monitoring communication with the wired network. For instructions on setting the AP-5131 firewall, see Configuring Firewall Settings on page 6-25.
1.1.8.8 VPN Tunnels
Virtual Private Networks (VPNs) are IP-based networks using encryption and tunneling providing users remote access to a secure LAN. In essence, the trust relationship is extended from one LAN across the public network to another LAN, without sacrificing security. A VPN behaves like a private network; however, because the data travels through the public network, it needs several layers of security. The AP-5131 can function as a robust VPN gateway. For additional information on configuring VPN security on the AP-5131, see Configuring VPN Tunnels on page 6-33.
AP-5131 Introduction
1.1.8.9 Content Filtering
Content filtering allows system administrators to block specific commands and URL extensions from going out through the AP-5131 WAN port only. Therefore, content filtering affords system administrators selective control on the content proliferating the network and is a powerful screening tool. Content filtering allows the blocking of up to 10 files or URL extensions and allows blocking of specific outbound HTTP, SMTP, and FTP requests.
For instructions on configuring content filtering on the AP-5131, see Configuring Content Filtering
Settings on page 6-48.

1.1.9 VLAN Support

A Virtual Local Area Network (VLAN) is a means to electronically separate data on the same AP-5131 from a single broadcast domain into separate broadcast domains. By using a VLAN, you can group by logical function instead of physical location. There are 16 VLANs supported on the AP-5131. An administrator can map up to 16 WLANs to 16 VLANs and enable or disable dynamic VLAN assignment. In addition to these 16 VLANs, the AP-5131 supports dynamic, user-based, VLANs when using EAP authentication.
VLANs enable organizations to share network resources in various network segments within large areas (airports, shopping malls, etc.). A VLAN is a group of clients with a common set of requirements independent of their physical location. VLANs have the same attributes as physical LANs, but they enable administrators to group clients even when they are not members of the same network segment. For more information, see Configuring VLAN Support on page 5-5.
1-9

1.1.10 Multiple Management Accessibility Options

The AP-5131 can be accessed and configured using one of the following methods:
Java-Based Web UI
Human readable config file (imported via FTP or TFTP)
MIB (Management Information Base)
Command Line Interface (CLI) accessed via RS-232 or Telnet. Use the AP-5131 DB-9 serial
port for direct access to the command-line interface from a PC. Use Symbol's Null-Modem cable (Part No. 25-632878-0) for the best fitting connection.
1-10
AP-5131 Access Point Product Reference Guide

1.1.11 Updatable Firmware

Symbol periodically releases updated versions of the AP-5131 device firmware to the Symbol Web site. If the AP-5131 firmware version displayed on the System Settings page (see Configuring System
Settings on page 4-2) is older than the version on the Web site, Symbol recommends updating the
AP-5131 to the latest firmware version for full feature functionality. For instructions on updating the AP-5131 firmware using FTP or TFTP, see Updating Device Firmware on page 4-34.

1.1.12 Programmable SNMP v1/v2/v3 Trap Support

Simple Network Management Protocol (SNMP) facilitates the exchange of management information between network devices. SNMP uses Management Information Bases (MIBs) to manage the device configuration and monitor Internet devices in remote locations. MIB information accessed via SNMP is defined by a set of managed objects called object identifiers (OIDs). An object identifier (OID) is used to uniquely identify each object variable of a MIB.
SNMP allows a network administrator to configure the AP-5131, manage network performance, find and solve network problems, and plan for network growth. The AP-5131 supports SNMP management functions for gathering information from its network components. The AP-5131 CDROM and the (AP­5131 downloads site) contains the following 2 MIB files:
• Symbol-CC-WS2000-MIB-2.0 (standard Symbol MIB file)
• Symbol-AP-5131-MIB (AP-5131 specific MIB file)
The AP-5131 SNMP agent functions as a command responder and is a multilingual agent responding to SNMPv1, v2c and v3 managers (command generators). The factory default configuration maintains SNMPv1/2c support of the community names, hence providing backward compatibility. For information on configuring SNMP traps, see Configuring SNMP Settings on page 4-11.

1.1.13 Power-over-Ethernet Support

When users purchase a Symbol WLAN solution, they often need to place access points in obscure locations. In the past, a dedicated power source was required for each access point in addition to the Ethernet infrastructure. This often required an electrical contractor to install power drops at each access point location. An approved power injector solution merges power and Ethernet into one cable, reducing the burden of installation and allows optimal AP-5131 placement in respect to the intended radio coverage area. The AP-5131 can only use a Power-over-Ethernet device when connected to the LAN port.
AP-5131 Introduction
The Symbol Power Injector (Part No. AP-PSBIAS-T-1P-AF) is a single-port, 802.3af compliant Power over Ethernet hub combining low-voltage DC with Ethernet data in a single cable connecting to the AP-5131. The Power Injector’s single DC and Ethernet data cable creates a modified Ethernet cabling environment on the AP-5131’s LAN port eliminating the need for separate Ethernet and power cables. For more information on the Symbol Power Injector, see Symbol Power Injector System on page 2-7.

1.1.14 MU-MU Transmission Disallow

The AP-5131’s MU-MU Disallow feature prohibits MUs from communicating with each other even if they are on different WLANs, assuming one of the WLAN’s is configured to disallow MU-MU communication. Therefore, if an MU’s WLAN is configured for MU-MU disallow, it will not be able to communicate with any other MUs connected to this AP-5131.
For information on configuring an AP-5131 WLAN to disallow MU to MU communications, see
Creating/Editing Individual WLANs on page 5-24.

1.1.15 Voice Prioritization

Each AP-5131 WLAN has the capability of having its QoS policy configured to prioritize the network traffic requirements for associated MUs. A WLAN QoS page is available for each enabled WLAN on either the AP-5131 802.11a or 802.11b/g radio.
1-11
Use the QoS page to enable voice prioritization for devices to receive the transmission priority they may not normally receive over other data traffic. Voice prioritization allows the AP-5131 to assign priority to voice traffic over data traffic, and (if necessary) assign legacy voice supported devices (non WMM supported voice devices) additional priority. For information on configuring voice prioritization over other voice enabled devices, see Setting the WLAN Quality of Service (QoS) Policy on page 5-31.
1-12
AP-5131 Access Point Product Reference Guide

1.1.16 Support for CAM and PSP MUs

The AP-5131 supports both CAM and PSP powered MUs. CAM (Continuously Aware Mode) MUs leave their radios on continuously to hear every beacon and message transmitted. These systems operate without any adjustments by the AP-5131. A beacon is a uniframe system packet broadcast by the AP to keep the network synchronized. A beacon includes the ESSID, AP-5131 MAC address, Broadcast destination addresses, a time stamp, a DTIM (Delivery Traffic Indication Message) and the
TIM (Traffic Indication Map).
PSP (Power Save Polling) MUs power off their radios for short periods. When a Symbol MU in PSP
mode associates with an AP-5131, it notifies the AP-5131 of its activity status. The AP-5131 responds by buffering packets received for the MU. PSP mode is used to extend an MU’s battery life by enabling the MU to “sleep” during periods of inactivity.

1.1.17 Statistical Displays

The AP-5131 can display robust transmit and receive statistics for the WAN and LAN ports. WLAN stats can be displayed collectively and individually for enabled WLANs. Transmit and receive statistics are available for the AP-5131’s 802.11a and 802.11b/g radios. An advanced radio statistics page is also available to display retry histograms for specific data packet retry information.
Associated MU stats can be displayed collectively and individually for specific MUs. An echo (ping) test is also available to ping specific MUs to assess association strength. Finally, the AP-5131 can detect and display the properties of other APs detected within the AP-5131’s radio coverage area. The type of AP detected can be displayed as well as the properties of individual APs. For information on available AP-5131 statistical displays and the values they represent, see Monitoring Statistics on
page 7-1.

1.1.18 Transmit Power Control

The AP-5131 has a configurable power level for each radio. This enables the network administrator to define the antenna’s transmission power level in respect to the AP-5131’s placement or network requirements as defined in the AP-5131 site survey. For detailed instructions on setting the radio transmit power level, see Configuring the 802.11a or 802.11b/g Radio on page 5-38.

1.1.19 Advanced Event Logging Capability

The AP-5131 provides the capability for periodically logging system events. Logging events is useful in assessing the throughput and performance of the AP-5131 or troubleshooting problems on the
AP-5131 Introduction
AP-5131 managed Local Area Network (LAN). For more information, see Logging Configuration on
page 4-28.

1.1.20 Configuration File Import/Export Functionality

Configuration settings for an AP-5131 can be downloaded from the current configuration of another AP-5131. This affords the administrator the opportunity to save the current configuration before making significant changes or restoring the default configuration. For information on importing or exporting configuration files, see Importing/Exporting Configurations on page 4-30.

1.1.21 Default Configuration Restoration

The AP-5131 has the ability to restore its default configuration or a partial default configuration with the exception of current WAN and SNMP settings. Restoring the default configuration is a good way to create new WLANs if the MUs the AP-5131 supports have been moved to different radio coverage areas. For information on restoring a default or partial default configuration, see Configuring System
Settings on page 4-2.

1.1.22 DHCP Support

1-13
The AP-5131 can use Dynamic Host Configuration Protocol (DHCP) to obtain a leased IP address and configuration information from a remote server. DHCP is based on the BOOTP protocol and can coexist or interoperate with BOOTP. Configure the AP-5131 to send out a DHCP request searching for a DHCP/ BOOTP server to acquire HTML, firmware or network configuration files when the AP-5131 boots. Because BOOTP and DHCP interoperate, whichever responds first becomes the server that allocates information.
The AP-5131 can be set to only accept replies from DHCP or BOOTP servers or both (this is the default setting). Disabling DHCP disables BOOTP and DHCP and requires network settings to be set manually. If running both DHCP and BOOTP, do not select BOOTP Only. BOOTP should only be used when the server is running BOOTP exclusively.
The DHCP client automatically sends a DHCP request at an interval specified by the DHCP server to renew the IP address lease as long as the AP-5131 is running (this parameter is programmed at the DHCP server). For example: Windows 2000 servers typically are set for 3 days.
1-14
AP-5131 Access Point Product Reference Guide

1.1.23 Multi Function LEDs

The AP-5131 houses seven LED indicators. Four LEDs exist on the top of the AP-5131 and are visible from wall, ceiling and table-top orientations. Three of these four LEDs are single color activity LEDs, and one is a multi-function red and white status LED. Two LEDs exist on the rear of the AP-5131 and are viewable using a single (customer installed) extended light pipe, adjusted as required to suit above the ceiling installations. For detailed descriptions of the AP-5131 LEDs and their functionality, see LED Indicators on page 2-20.

1.2 Theory of Operations

To understand AP-5131 management and performance alternatives, users need familiarity with AP-5131 functionality and configuration options. The AP-5131 includes features for different interface connections and network management.
The AP-5131 uses electromagnetic waves to transmit and receive electric signals without wires. Users communicate with the network by establishing radio links between mobile units (MUs) and access points.
The AP-5131 uses DSSS (direct sequence spread spectrum) to transmit digital data from one device to another. A radio signal begins with a carrier signal that provides the base or center frequency. The digital data signal is encoded onto the carriers using a DSSS chipping algorithm. The AP-5131 radio signal propagates into the air as electromagnetic waves. A receiving antenna (on the MU) in the path of the waves absorbs the waves as electrical signals. The receiving MU interprets (demodulates) the signal by reapplying the direct sequence chipping code. This demodulation results in the original digital data.
The AP-5131 uses its environment (the air and certain objects) as the transmission medium.The AP-5131 can either transmit in the 2.4 to 2.5-GHz frequency range (802.11b/g radio) or the 5.2 GHz frequency range (802.11a radio), the actual range is country-dependent. Symbol devices, like other Ethernet devices, have unique, hardware encoded Media Access Control (MAC) or IEEE addresses. MAC addresses determine the device sending or receiving data. A MAC address is a 48-bit number written as six hexadecimal bytes separated by colons.
For example: 00:A0:F8:24:9A:C8
Also see the following sections:
Cellular Coverage
Network Topology
Loading...
+ 426 hidden pages