Strix Systems OWS2420-90, OWS2430-90, OWS2410-90 User Manual

Access / One® Network
Channels for Public Safety (4.9 GHz)
11 dBi Radome Omni Antenna (4.940 GHz – 4.990 GHz)
Identifier
30 4955 No Full (+30.7dBm)
70 4975 No Full (+30.7dBm)
* Listed power level settings are peak power.
Frequency
(MHz)
Filter
Power Level (dBm) *
ODFM
173
A
Use this Space for Your Notes
Access / One® Network
A
174
Access / One® Network
Technical Support
Strix has partnered with industry leading resellers and system integrators and has equipped them with all of the training and support tools needed to service our end­user customers. Strix Partners may log in to the Partner Page for detailed support information.
Figure 129. Partner Login Page
Warranty
Our Access/One Network ships with a standard warranty of one year for hardware and software. See also, Access/One® Indoor and Outdoor Wireless System Limited
Warranty and Software License Agreement in the front matter In addition to
warranty services, Strix offers technical support services for firmware and software, and advanced replacements for Access/One products.
175
B
Access / One® Network
Priority Assignment
Strix recognizes our customers’ reliance on our products to gain a competitive edge in their respective industries. Therefore, Strix offers priority assignment of our technical resources and expertise for those support situations where there is a critical impact to the customers’ business operations.
Partner Training
Strix provides training to our partners on product features and benefits, including:
Wireless network design, including mesh implementation
Network operation and management
Wireless security
Our partners are experienced at installing, configuring, operating and troubleshooting your Access/One Network.
B
Partner Tools
Once a VAR becomes a Strix partner, they have access to our Partners Web page, where they are equipped with sales tools, product documentation, competitive comparisons, case studies and support instructions.
Integration
Access/One Network fits easily into existing customer installations. The network is designed to be fully compatible in most switching/routing environments with no special software, servers, or power injectors required. IWS equipment may be installed on ceilings and walls, mounted above the ceiling, or placed on a desktop or cubicle divider. The OWS is usually mounted on a pole, though mounting options are dictated by the environment.
Goal
Our goal is to provide easy-to-deploy products that are backed by reliable and responsive support.
176
Access / One® Network
Syslog Messages
Format
The following format is used for all Access/One Network syslog messages:
<recv-time> <code> <ip> <seqNumber:time-stamp, CloudName, subcloudName,
StackId, Module, sysName, subSystem> <source> <sw-version> <syslog message>
Element Definition
recv-time Time when the syslog message is received.
code As defined by RFC for syslog daemons.
ip Sender's IP address.
seqNumber Internal sequence number (generated for all syslog
messages).
time-stamp Time when the message is generated.
Module Module type.
source Internal source information, containing event-module &
event-type.
sw-version Software build version number
Syslog message Format is a string of ASCII text delimited by separators.
Subsystems
Syslog messages are assigned to the following subsystems:
Wireless
Security
Management
Others
B
177
Access / One® Network
Severity Levels
The following severity levels are assigned to syslog messages (shown here in descending order from the most severe):
EMERGENCY
ALERT
CRITICAL
ERROR
WARNING
NOTICE
INFORM
DEBUG
Assigning a severity level informs the system to automatically log all messages in that level, and all messages above that level (messages below the assigned level are
B
not logged).
Message Listing
The following tables list syslog messages by subsystem.
Security Subsystem
Severity Syslog Message
ALERT Telnet local authentication failed.
WARNING Super user login failed, invalid character.
WARNING Super user login failed, invalid password.
WARNING Telnet login failed, invalid password.
WARNING CLI login failed, invalid password.
WARNING Telnet login failed, invalid password.
178
Access / One® Network
Severity Syslog Message
WARNING CLI login failed, invalid password.
WARNING Too many invalid login attempts.
NOTICE Telnet user logged in, user:XXXXX.
NOTICE CLI user logged in, user:XXXXX.
NOTICE Telnet user logged out, user:XXXXX.
NOTICE CLI user logged out, user:XXXXX.
NOTICE Super user logged in.
Wireless Subsystem
Severity Syslog Message
EMERGENCY Failed to start the radio.
EMERGENCY AP/STA features not enabled.
EMERGENCY Error while starting the module. Wireless services disabled.
EMERGENCY Radio interference detected on selected channel.
WARNING Backhaul key mismatch. Putting it in RESTRICTED
mode,mac:xx.xx.xx.xx.xx.xx.
ALERT Radius authentication failed, mac:xx.xx.xx.xx.xx.xx.
ERROR Association fails, can't find station in table,
ssid:XXXXX,vlan:[id=x tag=x], mac:xx.xx.xx.xx.xx.x.
ERROR Reassociation fails, can't find station in table, ssid:XXXXX,
vlan:[id=x tag=x], mac:xx.xx.xx.xx.xx.x.
ERROR Association fails, not authenticated, ssid:XXXXX,vlan:[id=x
tag=x], mac:xx.xx.xx.xx.xx.xx.
B
179
Access / One® Network
Severity Syslog Message
ERROR Reassociation fails, not authenticated,
ssid:XXXXX,vlan:[id=x tag=x], mac:xx.xx.xx.xx.xx.xx.
ERROR Association fails, already associated, ssid:XXXXX,vlan:[id=x
tag=x], mac:xx.xx.xx.xx.xx.xx.
ERROR Reassociation fails, already associated,
ssid:XXXXX,vlan:[id=x tag=x], mac:xx.xx.xx.xx.xx.xx.
ERROR Association fails, can't authenticate during scan,
ssid:ssid:XXXXX, vlan:[id=x tag=x], mac:xx.xx.xx.xx.xx.xx.
ERROR Reassociation fails, can't authenticate during scan,
ssid:ssid:XXXXX, vlan:[id=x tag=x], mac:xx.xx.xx.xx.xx.xx.
ERROR Association fails, reason:xxxx, wlanmode:xxxx,
ssid:XXXXXX, vlan:[Id=x Tag=x],mac:xx:xx:xx:xx:xx:xx.
B
ERROR Reassociation fails, reason:xxxx, wlanmode:xxxx,
ssid:XXXXXX, vlan:[Id=x Tag=x],mac:xx:xx:xx:xx:xx:xx.
ERROR Bad authentication transaction sequence, number:XX,
type=XXXXX, mac:xx.xx.xx.xx.xx.xx.
ERROR Authentication[1] fails, can't find station in table,
mac:xx.xx.xx.xx.xx.xx.
ERROR Authentication[1] fails, can't authenticate in scan mode,
mac:xx.xx.xx.xx.xx.xx.
ERROR Authentication[3] fails, can't find station in table,
mac:xx.xx.xx.xx.xx.xx.
ERROR Authentication[3] done, error in Tx, wlanmode:X,
mac:xx.xx.xx.xx.xx.xx.
ERROR Deauthentication requested, can't find station in table,
mac:xx.xx.xx.xx.xx.xx.
180
Access / One® Network
Severity Syslog Message
ERROR Association fails, module is not ready,
mac:xx:xx:xx:xx:xx:xx.
ERROR Reassociation fails, module is not ready,
mac:xx:xx:xx:xx:xx:xx.
WARNING Authentication[3] fails, auth:shared, wlanmode:X,
mac:xx.xx.xx.xx.xx.xx.
WARNING Unsupported 802.11 authentication request, auth:LEAP,
wlanmode:X, mac:xx.xx.xx.xx.xx.xx.
WARNING Unsupported 802.11 authentication request, auth:x(hex),
wlanmode:X, mac:xx.xx.xx.xx.xx.xx.
WARNING Deauthentication fails, incorrect source,
mac:xx.xx.xx.xx.xx.xx.
WARNING Deauthentication fails, unknown source,
mac:xx.xx.xx.xx.xx.xx.
WARNING Association fails, wrong ssid, ssid:XXXXX, vlan:[id=x tag=x],
mac:xx.xx.xx.xx.xx.xx.
WARNING Reassociation fails, wrong ssid, ssid:XXXXX, vlan:[id=x
tag=x], mac:xx.xx.xx.xx.xx.xx.
WARNING NC-sel approves RESTRICTED Mode.
WARNING Backhaul [mac:xx:xx:xx:xx:xx:xx] at if=XXXX is put to
RESTRICTED mode.
WARNING Loop is detected at if=XX. Mac:xx:xx:xx:xx:xx:xx.
NOTICE NC-sel approves OPEN Mode.
NOTICE Backhaul is using default cloud name. Putting it in
RESTRICTED mode,mac:xx.xx.xx.xx.xx.xx.
NOTICE AP has put backhaul in RESTRICTED mode.
B
181
Access / One® Network
Severity Syslog Message
NOTICE Stack ID is available, stackId:XXXXXX.
NOTICE The unit/Radio x will operate as - Network Connect.
NOTICE The unit/Radio x will operate as - Client Connect.
NOTICE The unit/Radio x will switch to - Client Connect.
NOTICE Added station, mac:xx.xx.xx.xx.xx.xx.
NOTICE Deauthentication completed, mac:xx.xx.xx.xx.xx.xx.
NOTICE Association with AP done, response NOT sent,
wlanmode:X, ssid:XXXX, mac:xx:xx:xx:xx:xx:xx.
NOTICE Reassociation with AP done, response NOT sent,
wlanmode:X, ssid:XXXX, mac:xx:xx:xx:xx:xx:xx.
B
NOTICE Loop is cleared at if=XX. mac:xx:xx:xx:xx:xx:xx.
NOTICE WLNC link [if=XX] state is up. SSID=XX,
BSSID=xx:xx:xx:xx:xx:xx:xx, Channel=XX, Wireless Mode=XXXX.
NOTICE WLNC link [if=XX] state is down.
NOTICE Access Point state is up.
NOTICE Access Point state is down
NOTICE Association done, ssid:XXXX, vlan:[Id=x Tag=x],
mac:xx:xx:xx:xx:xx:xx:xx.
NOTICE Reassociation done, ssid:XXXX, vlan:[Id=x Tag=x],
mac:xx:xx:xx:xx:xx:xx:xx.
NOTICE Disassociation done, mac:xx:xx:xx:xx:xx:xx.
NOTICE Backhaul [mac:xx:xx:xx:xx:xx:xx] at if=XXXX is approved
with OPEN mode.
182
Access / One® Network
Severity Syslog Message
NOTICE Authentication failed, type=XXX, reason=XXXX,
mac:xx:xx:xx:xx:xx:xx.
NOTICE Authentication done, type=XXX, mac:xx:xx:xx:xx:xx:xx.
NOTICE Device will switch to Access Point.
Management Subsystem
Severity Syslog Message
WARNING Fan failed.
WARNING Temperature alarm on.
WARNING DHCP Bind failed.
WARNING Image load failed.
NOTICE xx.xx.xx.xx detected rogue device [xx:xx:xx:xx:xx:xx] with
RSSI [xxxx] channel [xxxx] SSID [XXXXX].
NOTICE Rogue device [xx:xx:xx:xx:xx:xx] detected by xx.xx.xx.xx
aged out.
NOTICE Detected Rogue Device [xx:xx:xx:xx:xx:xx].
NOTICE Cloud is renamed to XXXXX.
NOTICE Configuration update completed.
NOTICE Configuration update started.
NOTICE Selected AP at if=XX, mac:xx:xx:xx:xx:xx:xx.
NOTICE I am the Master NC.
NOTICE Temperature alarm off.
NOTICE Fan is working.
B
183
Access / One® Network
Severity Syslog Message
NOTICE Include list updated.
INFORM Load image file XXXXX from XXXXXX.
INFORM Image load is done.
INFORM Received DHCP, IP - xx.xx.xx.xx, Gateway - xx.xx.xx.xx.
B
184
Access / One® Network
Supported MIBs
MIBs that are supported with Access/One Network include the following:
Strix Private MIBs
STRIX-PRODUCTS.mib
Define the object identifiers assigned to various Strix hardware platforms.
STRIX-CONFIG-SYSTEM.mib
Configuration MIB for system wide parameters, including Usernames and Passwords, DHCP, DNS, SNTP, FTP, CoS, Trusted IPs, Syslog, and RADIUS accounting.
STRIX-CONFIG-WIFI.mib
Configuration MIB for 802.11 radio parameters, per-SSID configuration of authentication, keys and VLANs, Inventory list, Network Client and Client Connect configurations.
STRIX-MANAGEMENT.mib
Management MIB for taking actions, such as loading configurations, upgrading image, rebooting the entire network, and collecting network wide report from all devices.
STRIX-INVENTORY.mib
MIB to present and modify the inventory list of all modules in the network.
STRIX-SYSLOG-MIB.mib
MIB to present the buffered history of syslog messages generated by a module.
STRIX-MONITOR.mib
MIB to monitor radio status and statistics on a Wi-Fi module, and to report VLANs, device information, and a scanned list of access points.
STRIX-ROGUES.mib
MIB to present a list of rogue Access Points detected by Strix modules, and report the closest access points.
B
185
Access / One® Network
STRIX-ENT-TRAPS.mib
List of traps that Strix devices can generate.
STRIX-CONFIG-TRAPS.mib
Configuration MIB for enabling and disabling specific traps per trap manager.
STRIX-ACCESSONE-CAPABILITY.mib
Indicates the level of support implemented by an SNMP agent on the Access/ One Network with respect to standard MIBs.
Standard MIBs
RFC1213-MIB
IF-MIB (RFC 2233)
IP-MIB (RFC 2011)
B
TCP-MIB (RFC 2012)
UDP-MIB (RFC 2013)
SNMPv2-MIB (RFC 1907)
IEEE802DOT11-MIB
Contact Information
Strix Systems is located in Calabasas, California, just 45 minutes northwest of downtown Los Angeles and 45 minutes southeast of Santa Barbara.
Strix Systems, Inc. 26610 Agoura Road Calabasas, CA 91302
Tel: 818.251.1000 Fax: 818.251.1099
Visit us at: http://www.strixsystems.com
186
Access / One® Network
Glossary of Terms
802.11a
A supplement to the IEEE 802.11 wireless LAN (WLAN) specification that describes transmission through the physical layer (PHY) based on orthogonal frequency division multiplexing (OFDM), at a frequency of 5 GHz and data rates of up to 54 Mbps. See also, OFDM.
802.1D
The IEEE LAN specification for remote media access control (MAC) bridging.
802.11g
A supplement to the IEEE 802.11 wireless LAN (WLAN) specification that describes transmission through the physical layer (PHY) based on orthogonal frequency division multiplexing (OFDM), at a frequency of 2.4 GHz and data rates of up to 54 Mbps. See also, OFDM.
802.11i
A supplement to the IEEE 802.11 wireless LAN (WLAN) specification for enhanced security. It describes encryption protocols such as the Temporal Key Integrity Protocol (TKIP) and AES Counter-Mode Cipher Block Chaining Message Authentication Code Protocol (AES-CCMP). These protocols provide replay protection, cryptographically keyed integrity checks, and key derivation based on the IEEE 802.1X port authentication standard. See also, TKIP.
802.1Q
The IEEE LAN specification for bridged virtual LANs (VLANs). See also, VLAN.
802.1X
The IEEE specification for port-based network access control. The 802.1X standard based on the Extensible Authentication Protocol (EAP) provides an authentication framework that supports a variety of methods for authenticating and authorizing network access for wired or wireless users. See also, EAP.
GL
Glossary of Terms 187
Access / One® Network
802.11x
An IEEE specification that defines wireless LAN (WLAN) data link and physical layers. The specification includes data link layer media access control (MAC) sub-layer, and two sub-layers of the physical (PHY) layer-a frequency-hopping spread-spectrum (FHSS). See also, FHSS.
802.2
IEEE specification that describes the logical link control (LLC) encapsulation common to all 802 series LANs.
802.3
An IEEE LAN specification for a Carrier Sense Multiple Access with Collision Detection (CSMA-CD) Ethernet network. The standard describes physical media. An 802.3 frame uses source and destination media access control (MAC) addresses to identify its originator and receiver(s).
authentication
The process that a station, device, or user employs to announce its identify to the network which validates it. IEEE 802.11 specifies two forms of authentication: open system and shared key. See also, 802.11x and
GL
authentication.
authorization
The process of deciding if device 'X' may use network service 'Y'. Trusted devices (the devices that are both authenticated and authorized) are allowed access to network services. Unknown (not trusted) devices may require further user authorization to access network services. This does not principally exclude that the authorization might be given by an application automatically. Authorization always includes authentication. See also, authentication.
bandwidth
Specifies the amount of the frequency spectrum that is usable for data transfer. In other words, it identifies the maximum data rate a signal can attain on the medium without encountering significant attenuation (loss of power). See also,
bit rate.
188 Glossary of Terms
Access / One® Network
baud rate
The number of pulses of a signal that occur in one second. Thus, baud rate is the speed at which digital signal pulses travel.
Beacon
A uniframe system packet broadcast by the AP to keep the network synchronized. A beacon Includes the Net_ID (ESSID), the AP address, the broadcast destination addresses, a time stamp, a DTIM (Delivery Traffic Indicator Maps) and the TIM (Traffic Indicator Message).
bit rate
The transmission rate of binary symbols ('0' and '1'). Bit rate is equal to the total number of bits transmitted in one second.
bridge
A network component that provides inter-networking functionality at the data link or medium access layer (Layer 2). Bridges provide segmentation and re­assembly of data frames.
Cat 5
(Category 5) A category of performance for inside Ethernet wiring that defines a cable with eight insulated copper wires. Each pair is twisted around each other to reduce cross talk and electromagnetic induction. Each connection on a twisted pair requires both wires. Cat5 cables are suitable for 10/100BaseT communication.
connectivity
A path for communications signals to flow through. Connectivity exists between a pair of Nodes if the destination Node can correctly receive data from the source Node at a specified minimum data rate.
GL
Glossary of Terms 189
Access / One® Network
DHCP
(Dynamic Host Configuration Protocol) A method for dynamically assigning IP addresses to devices on a network. Issues IP addresses automatically within a specified range to devices such as PCs when they are first powered up. The device retains the use of the IP address for a specific license period defined by the system administrator.
EAP
(Extensible Authentication Protocol) A general point-to-point protocol that supports multiple authentication mechanisms. Defined in RFC 2284, EAP has been adopted by IEEE 802.1X as an encapsulation protocol for carrying authentication messages in a standard message exchange between a user (client or supplicant) and an authenticator. See also, 802.1X.
EAPoL
(EAP over LAN) An encapsulated form of the Extensible Authentication Protocol (EAP), defined in the IEEE 802.1X standard, that allows EAP messages to be
GL
carried directly by a LAN media access control (MAC) service between a user (client or supplicant) and an authenticator. See also, 802.1X.
EAP-TLS
(Extensible Authentication Protocol with Transport Layer Security) Used for
802.1X authentication. EAP-TLS supports mutual authentication and uses digital certificates to address the mutual challenge. The authentication server responds to a user authentication request with a server certificate. The user then replies with its own certificate and validates the server certificate. EAP-TLS algorithm derives session encryption keys from the certificate values. The authentication server in turn sends the session encryption keys for a particular session to the user after validating the user certificate. See also, authentication and EAP.
encryption
Any procedure used in cryptography to translate data into a form that can be decrypted and read only by its intended receiver.
190 Glossary of Terms
Access / One® Network
FHSS
(Frequency-Hopping Spread-Spectrum) One of two types of spread-spectrum radio technology used in wireless LAN (WLAN) transmissions. The FHSS technique modulates the data signal with a narrowband carrier signal that “hops” in a predictable sequence from frequency to frequency as a function of time over a wide band of frequencies. Interference is reduced, because a narrowband interferer affects the spread-spectrum signal only if both are transmitting at the same frequency at the same time. The transmission frequencies are determined by a spreading (hopping) code. The receiver must be set to the same hopping code and must listen to the incoming signal at the proper time and frequency to receive the signal.
FTP
(File Transfer Protocol) A TCP/IP based protocol for file transfer. FTP is defined by RFC 959.
GMK
(Group Master Key) A cryptographic key used to derive a group transient key (GTK) for the Temporal Key Integrity Protocol (TKIP) and Advanced Encryption Standard (AES). See also, GTK and TKIP.
GTK
(Group Transient Key) A cryptographic key used to encrypt broadcast and multicast packets for transmissions using the Temporal Key Integrity Protocol (TKIP) and Advanced Encryption Standard (AES). See also, TKIP.
HiperLAN
(High Performance Radio Local Area Network) A set of wireless LAN (WLAN) communication standards used primarily in European countries and adopted by the European Telecommunications Standards Institute (ETSI).
homologation
The process of certifying a product or specification to verify that it meets regulatory standards.
GL
Glossary of Terms 191
Access / One® Network
IAPP
(InterAP Protocol) A protocol being developed as the 802.11f version of the IEEE
802.11 wireless LAN (WLAN) specification to support interoperability, mobility, handover, and coordination among Access Points (APs). Implemented on top of IP, IAPP uses UDP/IP and Sub-network Access Protocol (SNAP) as transfer protocols. See also, 802.11x.
IAS
(Internet Authentication Service) Microsoft's RADIUS server. See also, RADIUS.
IGMP
(Internet Group Management Protocol) An Internet protocol defined in RFC 2236 used to report its multicast group membership to neighboring multicast routers.
IPsec
A Layer 3 authentication and encryption protocol. Used to secure VPNs. See
GL
also, encryption and VPN.
MAC address
(Media Access Control Address) A 6-byte hexadecimal address assigned by a manufacturer to a device.
master secret
A code derived from the pre-master secret. A master secret is used to encrypt Transport Layer Security (TLS) authentication exchanges and to derive a pair­wise master key (PMK). See also, PMK and TLS.
Mbps
(Megabits per second) A standard measure for data transmission speeds (for example, the rate at which information travels over the Internet). 1 Mbps denotes one million bits per second.
192 Glossary of Terms
Access / One® Network
MD5
(Message Direct algorithm 5) A one-way hashing algorithm used in many authentication algorithms to derive cryptographic keys. MD5 takes a message of an arbitrary length and creates a 128-bit message digest. See also,
authentication.
MIB
(Management Information Base) A set of parameters an SNMP management station can query or establish in the SNMP agent of a network device (for example, a router). Standard minimal MIBs have been defined, and vendors often have their own private enterprise MIBs. In theory, any SNMP manager can talk to any SNMP agent with a properly defined MIB. See also, SNMP and
station.
MS-CHAP
(Microsoft Challenge Handshake Authentication Protocol) Microsoft's extension to CHAP. MS-CHAP is a mutual authentication protocol that also permits a single login in a Microsoft network environment. See also, connectivity.
NAT
(Network Address Translation) RFC 3022 defines a way to translate global routable IP addresses into local and private non-routable ones.
NTP
(Network Time Protocol) An Internet standard protocol (built on top of TCP/IP) that ensures the accurate synchronization (to the millisecond) of computer clock times in a network of computers. NTP synchronizes client workstation clocks to the U.S. Naval Observatory master clocks in Washington, D.C. and Colorado Springs, CO. Running as a continuous background client program on a computer, NTP sends periodic time requests to servers, obtaining server time stamps and using them to adjust the client's clock. See also, SNTP.
Odyssey
An 802.1X security and access control application for wireless LANs (WLANs), developed by Funk Software, Inc. See also, 802.1X.
GL
Glossary of Terms 193
Access / One® Network
OFDM
(Orthogonal Frequency Division Multiplexing) A technique that splits a wide frequency band into a number of narrow frequency bands and sends data across the sub-channels. The 802.11a and 802.11g standards are based on OFDM. See also, 802.11a and 802.11g.
open system authentication
The IEEE 802.11 default authentication method. The device sends an authentication management frame containing the sender's identify in the clear to the authenticating device which sends back a clear frame alerting whether it recognizes the identity of the requesting device. See also, 802.11x.
PAN
(Personal Area Network) A personal area network is used to interconnect devices used by an individual or in their immediate proximity, including devices they are carrying with them and devices that are simply nearby. According to the IEEE, PANs must be capable of supporting segments at least 10 meters in
GL
length.
PAP
(Password Authentication Protocol) One of two authentication methods that is part of PPP (CHAP is the other). PAP is a method for a device to authenticate itself with a two-way handshake. Note that PAP sends its authentication information in the clear; that is, not encrypted. PAP is defined in RFC 1334.
PCI devices
Devices that adhere to the Peripheral Component Interconnect/Interface.
PEAP
(Protected Extensible Authentication Protocol) An extension to the Extensible Authentication Protocol with Transport Layer Security (EAP-TLS), developed by Microsoft Corporation. TLS is used in PEAP Part 1 to authenticate the server only, and thus avoids having to distribute user certificates to every client. PEAP Part 2 performs mutual authentication between the EAP client and the server. See also, EAP-TLS and TLS.
194 Glossary of Terms
Access / One® Network
PKCS
(Public-Key Cryptography Standards) A group of specifications produced by RSA and secure systems developers, and first published in 1991. Among many other features and functions, the standards define syntax for digital certificates, certificate signing requests and key exchanges.
PKI
(Public-Key Infrastructure) Software that enables users of an insecure public network such as the Internet to exchange information securely and privately. PKI uses public-key cryptography to authenticate the message sender and encrypt the message by means of a pair of cryptographic keys, one public and one private. A trusted certificate authority (CA) creates both keys simultaneously with the same algorithm. A registration authority (RA) must verify the certificate authority before a digital certificate is issued to a requestor. PKI uses the digital certificate to identify an individual or an organization. The private key is given only to the requesting party and is never shared, and the public key is made publicly available (as part of the digital certificate) in a directory that all parties can access.
plenum-rated cable
A type of cable approved by an independent test laboratory for installation in ducts, plenums, and other air-handling spaces.
PMK
(Paise-wise Master Key) A code derived from a master secret and used as an encryption key for IEEE 802.11 encryption algorithms. A PMK is also used to derive a pair-wise transient key (PTK) for IEEE 802.11i robust security. See also,
802.11x, 802.11i and PTK.
PoE
(Power over Ethernet) A technology, defined in the IEEE 802.3af standard, to deliver power over the twisted-pair Ethernet data cables rather than power cords.
GL
Glossary of Terms 195
Access / One® Network
PPTP
(Point-to-Point Tunneling Protocol) A protocol from Microsoft that is used to create a virtual private network (VPN) over the Internet. It uses Microsoft's Point­to-Point Encryption (MPPE), which is based on RSA's RC4. It only uses static keys and should not be used to secure WLANs. See also, VPN.
pre-master secret
A key generated during the handshake process in Transport Layer Security (TLS) protocol negotiations and used to derive a master secret. See also, TLS.
private key
In cryptography, one of a pair of keys, one public and one private, that are created with the same algorithm for encrypting and decrypting messages and digital signatures. The private key is provided to only the requestor and never shared. The requestor uses the private key to decrypt text that has been encrypted with the public key by someone else. See also, public key.
GL
PSK
(Pre-Shared Key) The IEEE 802.11 term for a shared secret, also known as a shared key. See also, 802.11x and shared secret.
PTK
(Pair-wise Transient Key) A value derived from a pair-wise master key (PMK) and split into multiple encryption keys and message integrity code (MIC) keys for use by a client and server as temporal session keys for IEEE 802.11i robust security. See also, 802.11i and PMK.
public key
In cryptography, one of a pair of keys, one public and one private, that are created with the same algorithm for encrypting and decrypting messages and digital signatures. The public key is made publicly available for encryption and decryption. See also, encryption and private key.
196 Glossary of Terms
Access / One® Network
RADIUS
(Remote Authentication Dial-In User Service) A client-server security protocol described in RFC 2865 and RFC 2866. Developed to authenticate, authorize, and account for dial-up users, RADIUS has been widely extended to broadband and enterprise networking. The RADIUS server stores user profiles, which include passwords and authorization attributes. See also, authentication and
authorization.
RC4
(River Cipher 4) A common encryption algorithm, designed by RSA., used by the Wired-Equivalent Privacy (WEP) protocol and Temporal Key Integrity Protocol (TKIP). See also, TKIP and WEP.
RA
(Registration Authority) Network software that verifies a user (client) request for a digital certificate and instructs the certificate authority (CA) to issue the certificate. Registration authorities are part of a public-key infrastructure (PKI), which enables secure exchanges of information over a network. The digital certificate contains a public key for encrypting and decrypting messages and digital signatures. See also, PKI.
roaming
The ability of a user (client) to maintain network access when moving between access points (APs).
rogue AP
An Access Point (AP) that is not authorized to operate within a wireless network. Rogue APs subvert security of an enterprise network by allowing potentially unchallenged access to the network resources by any wireless user in the physical vicinity.
rogue client
A user who is not recognized within a network, but who gains access to it by intercepting and modifying transmissions to circumvent the normal authorization and authentication processes.
GL
Glossary of Terms 197
Access / One® Network
RSN
(Robust Security Network) A secure wireless LAN (WLAN) based on the developing IEEE 802.11i standard. See also, 802.11i.
shared secret
A static key distributed by an out-of-band mechanism to both the sender and receiver. Also known as a shared key or pre-shared key (PSK), a shared secret is used as input to a one-way hash algorithm. When a shared secret is used for authentication and the hash output of both the sender and the receiver match, they share the same secret and are authenticated. A shared secret can also be used to generate encryption key. See also, PSK.
SNMP
(Simple Network Management Protocol) A standard protocol that regulates network management over the Internet. SNMP uses TCP/IP to communicate with a management platform, and offers a standard set of commands that make multi-vendor operability possible. SNMP uses a standard set of definitions,
GL
known as a MIB (Management Information Base), which can be supplemented with enterprise-specific extensions. See also, MIB.
SNTP
(Simple Network Time Protocol) A a simplified version of NTP. SNTP can be used when the ultimate performance of the full NTP implementation described in RFC 1305 is not needed or justified. See also, NTP.
spread spectrum
A modulation technique that spreads a signal's power over a wide band of frequencies. The main reason for the technique is that the signal is much less susceptible to electrical noise and interferences then other techniques.
SSH
(Secure SHell) A Telnet-like protocol that establishes an encrypted session.
198 Glossary of Terms
Access / One® Network
SSID
(Service Set Identifier) The unique name shared among all devices in a wireless LAN (WLAN).
station
In IEEE 802.11 networks, any device that contains an IEEE 802.11-compliant media access control and physical layers. See also, 802.11x.
TKIP
(Temporal Key Integrity Protocol) A wireless encryption protocol that fixes the known problems in the Wired-Equivalent Privacy (WEP) protocol for existing
802.11 products. Like WEP, TKIP uses RC4 ciphering, but adds functions such as a 128-bit encryption key, a 48-bit initialization vector, a new message integrity code (MIC), and initialization vector (IV) sequencing rules to provide better protection. See also, 802.11x and WEP.
TLS
(Transport Layer Security Protocol) An authentication and encryption protocol that is the successor to the Secure Sockets Layer (SSL) protocol for private transmission over the Internet. Defined in RFC 2246, TLS provides mutual authentication with non-repudiation, encryption, algorithm negotiation, secure key derivation, and message integrity checking. TLS has been adapted for use in wireless LANs (WLANs) and is used widely in IEEE 802.1X authentication. See also, 802.1X.
TTLS
(Tunneled Transport Layer Security) An Extensible Authentication Protocol (EAP) sub-protocol developed by Funk Software, Inc. for 802.1X authentication. TTLS uses a combination of certificate and password challenge and response for authentication. The entire EAP sub-protocol exchange of attribute-value pairs takes place inside an encrypted transport layer security (TLS) tunnel. TTLS supports authentication methods defined by EAP, as well as the older Challenge Handshake Authentication Protocol (CHAP), Password Authentication Protocol (PAP), Microsoft CHAP (MS-CHAP), and MS-CHAPV2. Compare EAP-TLS; PEAP. See also, 802.1X, connectivity, MS-CHAP, PAP and PEAP.
Glossary of Terms 199
GL
Access / One® Network
Tunneling
A technology that enables one network to send its data via another network's connections. Tunneling works by encapsulating a network protocol within packets carried by the second network. For example, Microsoft's PPTP technology enables organizations to use the Internet to transmit data across a Virtual Private Network (VPN). It does this by embedding its own network protocol within the TCP/IP packets carried by the Internet. See also, PPTP and
VPN.
twisted-pair wire
Type of medium using metallic type conductors twisted together to provide a path for current flow. The wire in this medium is twisted in pairs to minimize the electromagnetic interference between one pair and another.
UDP
(User Data Protocol) A connectionless protocol that works at the OSI transport layer. UDP provides datagram transport but does not acknowledge their receipt.
GL
URL
(Uniform Resource Locator) The standard method used for identifying the location of information available to the Internet.
VLAN
(Virtual LAN) A group of devices that communicate as a single network, even though they are physically located on different LAN segments. Because VLANs are based on logical rather than physical connections, they are extremely flexible. A device that is moved to another location can remain on the same VLAN without any hardware reconfiguration.
VoIP
(Voice over IP) The ability of an IP network to carry telephone voice signals as IP packets in compliance with International Telecommunications Union Telecommunication Standardization Sector (ITU-T) specification H.323. VoIP enables a router to transmit telephone calls and faxes over the Internet with no loss in functionality, reliability, or voice quality.
200 Glossary of Terms
Access / One® Network
VPN
(Virtual Private Network) A virtual private network (VPN) is a way to use a public telecommunication infrastructure, such as the Internet, to provide remote offices or individual users with secure access to their organization's network. A VPN works by using the shared public infrastructure while maintaining privacy through security procedures and tunneling protocols such as the Layer Two Tunneling Protocol (L2TP). In effect, the protocols, by encrypting data at the sending end and decrypting it at the receiving end, send the data through a “tunnel” that cannot be “entered” by data that is not properly encrypted.
WAN
(Wide Area Network) A computer network that is geographically dispersed. Commonly, a WAN comprises two or more inter-connected LANs. The Internet is the world's largest WAN. According to the IEEE, WANs interconnect facilities in different parts of a country or of the world.
WECA
Wireless Ethernet Compatibility Alliance) See also, Wi-Fi Alliance.
WEP
(Wired Equivalent Privacy) An optional IEEE 802.11 function that offers frame transmission privacy similar to a wired network. The Wired Equivalent Privacy generates secret shared encryption keys that both source and destination stations can use to alter frame bits to avoid disclosure to eavesdroppers. See also, 802.11x and encryption.
Wi-Fi Alliance
A nonprofit international association formed in 1999 to certify interoperability of wireless Local Area Network products based on IEEE 802.11 specification. The goal of the Wi-Fi Alliance's members is to enhance the user experience through product interoperability. See also, 802.11x.
WPA
(W-Fi Protected Access) A Wi-Fi Alliance standard that contains a subset of the
GL
IEEE 802.11i standard, using TKIP as an encryption method and 802.1X for authentication. See also, 802.11x, 802.1X and TKIP.
Glossary of Terms 201
Access / One® Network
XML
(eXtensible Markup Language) A simpler and easier-to-use subset of the Standard Generalized Markup Language (SGML), with unlimited, self-defining markup symbols (tags). Developed by the World Wide Web Consortium (W3C), the XML specification provides a flexible way to create common information formats and share both the format and the data on the Internet, Intranets, and elsewhere.
GL
202 Glossary of Terms
Access / One® Network
Index
Numerics
802.11a 97
802.11g 98
A
about this user’s guide 1 access control list 106 accessone.bin 36 accessone_m.bin 36 action status results 67 action type 136 actions
factory defaults 135 load firmware 136 page device 137
reboot 137 active scanning 13 advanced security 14 advanced settings 93, 154 AES 17 antenna power settings 167 apply configuration 124 authentication 104 automatic time 89 auto-sensing power supply 7
B
browser 26 BSSID information 166
C
cautions 3 channel coordination 22 channel list 22 channel selector 152 class of service 81, 144 Client Connect 16, 101, 155
privacy 108
privacy tags 141 client limits 150 client query 22 commands
Firmware Updates 37, 41
Load Firmware on Network 38
Load Firmware/Configuration 42
Reboot 4
Subnet 4 Reboot Network 4, 39 View Action Status 39
common terms 3 Configure function 71, 138 contact information 186 contacting Strix 167, 175 copyright notice 3
background scanning 13, 112 beacon interval 154 BIN files 36
Index 203
Cos 20 CSV 118
IX
Access / One® Network
D
data input 64 data rate 151 data trust level 113 date and time 88, 145 daylight saving time 89 default gateway 78 deployment 8 details pane 38 device information 164 DHCP server 23
options 24 DNS server 79 DTIM 154 dual radio 18 dynamic operation 14
E
elevation 140 encryption 14, 17, 104 Ethernet segments 20 explosive device proximity 7 exporting CSV 118
F
f 42 factory defaults 19, 135 file name 146 file type 136 file version 136 firmware
frequency 151 FTP aggressiveness 37 FTP server 23, 25, 35, 37, 41, 69
G
general 73, 141 getting started 23 glossary of terms 187 GPS positioning 19
H
hardware specifications 22 host network requirements 23
DHCP server 23 FTP server 23, 25 Internet browser 26
I
image files 36 Indoor Wireless System 6 inputting data 64 integration 176 intelligent network 11 Internet browser 26 introduction 1 intuitive mouse-over 18, 64 inventory 12, 40 inventory control 19 Inventory function 116 IP settings 143 IWS 6, 18
IX
downloading 36
updating 35 firmware updates 91, 145 fragment length 154
204 Index
L
latitude 139 launching Manager/One 29
Access / One® Network
lightning protection 18 load firmware 136 load firmware on network 68 logical mesh view 19 long distances 150 longitude 140
M
Manage function 65, 134 Management Information Base 20 Manager/One 18
accessing for the first time 31
an overview 43
auto-discovered 63
choice of layouts 45
commands 60
details pane 56
exporting inventory 63
factory default 62
general layout 44
icon view 49
installing 27
intuitive mouse-over 18
inventory 63
launching 29
legends 61
list view 49
logical mesh view 19
logical view 47
legend 52 node registers 54 panning 53
zooming 53 management tools 55 mesh view 47
monitors 19 multi-view 19 node status 57 plug-in 27 refresh 62 segment view 19, 48 switching between layouts 46 tabbed pages 58 toolbar 58 tools 18, 50
utility pane 29 managing a subnet 127 managing modules 133 managing nodes 127 managing the network 65 manual organization 1 manual time 90 master 15 Master Network Server 15, 40 master network server mesh 9
structured 9
topology 9 mesh view 19 metro scenario 5 MIB 20 mobility 15 module name 139 modules
managing 133 Monitor function 119, 158 monitors 19
AP 119
Network Connect 121
Rogue 123
80
IX
Index 205
Access / One® Network
Wireless Client Query 122 mouse-over 18, 64 multi-version environment 35
N
Network Connect 17, 109, 156 network management 15, 65, 73, 141
general 141
SNMP 142 network name 139 network scenarios
metro 5
transportation 10 Network Server 14 network topology 79 node commands
update network membership 131
update node names 130 notes 3 notices 6
European Community 6
Industry Canada 6
non-modification 6
RF exposure 6
VCCI 6 NTP
setting up 33
overviews
advanced security 14 background scanning 13 benefits 18 client connect 16 dynamic operation 14 features 18 Indoor Wireless System 6 master network server 15 mesh topology 9 network connect 17 network intelligence 11 network management 15 network servers 14 Outdoor Wireless System 7 remote subnets 16 rogue devices 13 self-discovery 12 self-healing 12 self-tuning 12 technology 18 traffic prioritization 15 wireless workgroups 17
OWS 7, 18
P
page 30
IX
Windows 2000 33
O
operating environment 91, 145 operating mode 149 organization 1 Outdoor Wireless System 7 output power 151
206 Index
page device 137 partner login 36 partners
tools 176 training 176
password 140
encryption 140
peer selection 110
Access / One® Network
ping 30 PoE 20 power 151 power settings 167 power supply 7 Power-over-Eternet 20 printing an inventory 117 prioritising traffic 15 priority assignment 176 Priority/One 20, 81, 144 product images 4 protection mode 99, 152 protection rate 153 protection type 153 public safety 18, 22, 97, 149, 152, 173
R
radio parameters 95, 147 radio statistics 160
wireless neighbors 161 roaming 15 rogue devices 13, 14
triangulation 13 Rogue Devices function 165
scan 165 rogue scan 114, 157 round trip delay 156 RTD 156 RTS/CTS threshold 154
S
safety warnings 7 sample network 4 scan 165 security 14 security key 105, 112 security mode 104 segment view 19
RADIUS accounting 21, 84, 144 reboot 137 reboot network 68 rebooting 4 registry editor 33 remote management 20 remote network server 70
exclude 70 include 70
remote subnets 125
communicating between 16
reports 159
radio statistics 160 SSID list 163 VLAN list 163 wireless client monitor 162
self-discovery 12 self-healing 12 self-tuning 12, 111 short slot 100, 153 short slot preamble 153 short slot time 153 slave 15 SmartSelect 151 SNMP 75, 142 SNTP 89 specifications 22 SSID 21, 102 SSID list 163 static network server 80 structured mesh 9 subnet commands 129
IX
Index 207
Access / One® Network
load firmware 129
reboot 129 subnet management 127 Super G 22 support 167, 175 symbols used in this guide 3 Syslog 85 syslog 21, 144 system 71, 138
network management 141
TCP/IP settings 143
user login 139 system and security 19
Ethernet segments 20
factory defaults 19
GPS positioning 19
inventory control 19
network server 20
PoE 20
Power-over-Ethernet 20
Priority/One 20
RADIUS accounting 21
remote management 20
time zone 88 TKIP 21 topology 79 traffic prioritization 15 transfer system files 69 transmit power 151, 167 transportation scenario 10 traps 76 trusted IP addresses 77, 143 trusted mode 77
U
Ultrawideband 6 update network membership 69, 131 update node names 68, 130 updating firmware 35
module 41
network 37 user login 72, 139 user mobility 15 user name 140 utility pane 29
options 30
IX
syslog 21 system logging 21
system and securityzero configuration
21
system logging 21
T
target MAC address 156 TCP/IP 78 TCP/IP settings 143 technical support 167, 175 Telnet 30
208 Index
V
view action status 39, 66
results 67 Virtual Private Network 14 Virtual/Strix 101 VirtualStrix 21 VLAN 21 VLAN list 163 VLAN security 103 VPN 14
Access / One® Network
W
warnings 7, 3
antenna placement 8 battery 8 electrical power 7 general safety 7 grounding the unit 8
lightning activity 7 warranty 175 welcome 5 WEP 21 why choose Access/One Network 8 Wi-Fi 146
radio parameters 147 Windows 2000 33 wireless 22
channel coordination 22
channel list 22
client query 22
Super G 22
WLAN associations 22 wireless client monitor 162 wireless mode 150 wireless neighbors 161 Wireless Workgroups 17 WLAN associations 22 WPA 21
Z
zero configuration 21
Index 209
IX
Access / One® Network
IX
210 Index
Loading...