1.1 About the WiNG Software .....................................................................................................................................1-3
1.1.2 High Availability Networks ...........................................................................................................................1-4
1.1.3 Gap Free Security .......................................................................................................................................1-4
1.1.4 Outdoor Wireless and Mesh Networking .....................................................................................................1-4
1.1.5 Network Services, Routing and Switching ...................................................................................................1-4
1.1.6 Management, Deployment and Troubleshooting .........................................................................................1-4
Chapter 2, Web User Interface Features
2.1 Accessing the Web UI ...........................................................................................................................................2-2
2.1.1 Browser and System Requirements ............................................................................................................2-2
2.1.2 Connecting to the Web UI ...........................................................................................................................2-2
2.2 Glossary of Icons Used .........................................................................................................................................2-4
2.2.1 Global Icons .................................................................................................................................................2-4
2.2.4 Status Icons .................................................................................................................................................2-5
2.2.8 Access Type Icons ....................................................................................................................................2-10
2.2.9 Administrative Role Icons ..........................................................................................................................2-10
3.1 Using the Initial Setup Wizard ...............................................................................................................................3-2
3.1.1.4 LAN Configuration ............................................................................................................................3-11
3.1.1.5 WAN Configuration ..........................................................................................................................3-13
3.1.1.6 Wireless LAN Setup .........................................................................................................................3-15
3.1.1.7 Summary And Commit Screen .........................................................................................................3-19
3.1.1.8 Adopt to a controller .........................................................................................................................3-20
3.1.2.2 LAN Configuration ............................................................................................................................3-25
3.1.2.3 WAN Configuration ..........................................................................................................................3-27
3.1.2.4 Radio Configuration .........................................................................................................................3-29
3.1.2.5 Wireless LAN Setup .........................................................................................................................3-31
3.1.2.6 System Information ..........................................................................................................................3-33
3.1.2.7 Summary And Commit Screen .........................................................................................................3-34
3.1.2.8 Adopt to a controller .........................................................................................................................3-35
4.1.1.1 Health .................................................................................................................................................4-3
4.2.2 Device Specific Information .......................................................................................................................4-11
5.1.2 RF Client Name Configuration .....................................................................................................................5-5
5.1.3 RF Domain Alias Configuration ...................................................................................................................5-7
5.1.3.1 Basic Alias ..........................................................................................................................................5-8
5.1.3.2 Network Group Alias ........................................................................................................................5-11
5.1.3.3 Network Service Alias ......................................................................................................................5-13
5.2 System Profile Configuration ..............................................................................................................................5-15
5.2.1 General Profile Configuration ....................................................................................................................5-16
5.2.2 Profile Radio Power ...................................................................................................................................5-17
5.2.5.7 Bluetooth Configuration ....................................................................................................................5-67
5.2.6.1 DNS Configuration ...........................................................................................................................5-71
5.2.6.6 Quality of Service (QoS) ..................................................................................................................5-87
5.2.6.7 Spanning Tree Configuration ...........................................................................................................5-92
5.2.6.15 Alias .............................................................................................................................................5-125
5.2.11.1 Upgrading AP6532 Firmware from 5.1 .........................................................................................5-180
5.2.11.2 Profile Management Configuration and Deployment Considerations ..........................................5-181
5.2.12 Mesh Point Configuration ......................................................................................................................5-181
6.1.2.1 802.1x EAP, EAP-PSK and EAP MAC ..............................................................................................6-9
6.1.2.2 MAC Authentication .........................................................................................................................6-11
6.1.2.6 MAC Registration .............................................................................................................................6-15
6.3 Radio QoS Policy ................................................................................................................................................6-72
6.3.1 Configuring a Radio’s QoS Policy .............................................................................................................6-73
6.4 Association ACL ..................................................................................................................................................6-82
6.4.1 Association ACL Deployment Considerations ...........................................................................................6-84
7.6 Alias ....................................................................................................................................................................7-31
7.6.1 Network Basic Alias ...................................................................................................................................7-31
7.6.2 Network Group Alias ..................................................................................................................................7-34
7.6.3 Network Service Alias ................................................................................................................................7-36
7.8 Web Filtering .......................................................................................................................................................7-42
8.1.1 Defining a Firewall Configuration .................................................................................................................8-2
8.2 Configuring IP Firewall Rules ..............................................................................................................................8-16
8.2.1 Setting an IPv4 or IPv6 Firewall Policy ......................................................................................................8-16
8.2.2 Setting an IP SNMP ACL Policy ................................................................................................................8-20
8.2.3 Setting a Network Group Alias ..................................................................................................................8-22
8.2.4 Setting a Network Service Alias ................................................................................................................8-23
9.1.1 Configuring a Captive Portal Policy .............................................................................................................9-2
9.2 Setting the DNS Whitelist Configuration .............................................................................................................9-14
9.3 Setting the DHCP Server Configuration ..............................................................................................................9-15
9.4 Setting the Bonjour Gateway Configuration ........................................................................................................9-28
9.4.1 Configuring the Bonjour Discovery Policy .................................................................................................9-28
9.4.2 Configuring the Bonjour Forwarding Policy ...............................................................................................9-30
9.5 Setting the DHCPv6 Server Policy ......................................................................................................................9-32
9.5.2 DHCPv6 Pool Configuration ......................................................................................................................9-35
9.6 Setting the RADIUS Configuration ......................................................................................................................9-38
9.6.1 Creating RADIUS Groups ..........................................................................................................................9-38
9.6.1.1 Creating RADIUS Groups ................................................................................................................9-40
9.6.2 Defining User Pools ...................................................................................................................................9-42
9.6.3 Configuring the RADIUS Server ................................................................................................................9-47
9.7 Setting the URL List ............................................................................................................................................9-57
10.1 Creating Administrators and Roles ..................................................................................................................10-2
10.2 Setting the Access Control Configuration .........................................................................................................10-5
10.3 Setting the Authentication Configuration ...........................................................................................................10-9
10.4 Setting the SNMP Configuration .....................................................................................................................10-11
12.1.2 Rebooting the Device ..............................................................................................................................12-8
12.1.5 Troubleshooting the Device ...................................................................................................................12-13
12.1.5.2 Copy Crash Info ...........................................................................................................................12-16
12.1.5.3 Copy Tech Support Dump ............................................................................................................12-18
12.1.5.4 Locating a Device .........................................................................................................................12-20
13.1 System Statistics ..............................................................................................................................................13-2
13.1.1 Health ......................................................................................................................................................13-3
13.2.1 Health ....................................................................................................................................................13-17
13.2.4 AP Detection ..........................................................................................................................................13-23
13.2.8.1 Status ...........................................................................................................................................13-31
13.2.9 Bluetooth ...............................................................................................................................................13-35
13.2.11 Mesh Point ...........................................................................................................................................13-38
13.3 Access Point Statistics ....................................................................................................................................13-65
13.3.1 Health ....................................................................................................................................................13-67
13.3.5.2 AP Adoption History .....................................................................................................................13-77
13.3.5.3 AP Self Adoption History ..............................................................................................................13-78
13.3.6 AP Detection ..........................................................................................................................................13-80
13.3.7 Guest User ............................................................................................................................................13-82
13.3.10 Policy Based Routing ..........................................................................................................................13-88
13.3.11.1 Status .........................................................................................................................................13-90
13.3.16 Bluetooth ..........................................................................................................................................13-109
13.3.17.6 OSPF State ..............................................................................................................................13-119
13.3.21 LDAP Agent Status ............................................................................................................................13-127
13.3.22 Mint Links .........................................................................................................................................13-128
13.3.24 GRE Tunnels .....................................................................................................................................13-132
13.3.28 DHCP Server .....................................................................................................................................13-159
13.3.28.1 DHCP Server General Information ...........................................................................................13-159
13.3.28.2 DHCP Server Bindings .............................................................................................................13-160
13.3.28.3 DHCP Server Networks ...........................................................................................................13-161
13.3.29.2 Denial of Service ......................................................................................................................13-164
13.3.29.3 IP Firewall Rules .....................................................................................................................13-165
13.3.36 Network Time ...........................................................................................................
13.3.36.1 NTP Status ...............................................................................................................................13-187
13.3.36.2 NTP Association .......................................................................................................................13-188
13.4.1 Health ..................................................................................................................................................13-197
13.4.5 Association History ..............................................................................................................................13-208
14.1 Event History Messages ...................................................................................................................................14-2
Appendix A, Customer Support
Appendix B, Publicly Available Software
B.1 General Information ............................................................................................................................................. B-1
B.2 Open Source Software Used ............................................................................................................................... B-1
B.3.6 GNU Lesser General Public License, version 3.0 .................................................................................... B-44
B.3.7 GNU General Public License 2.0 ............................................................................................................. B-45
B.3.8 GNU Lesser General Public License, version 2.0 .................................................................................... B-52
B.3.9 GNU Lesser General Public License, version 2.1 .................................................................................... B-58
B.3.10 MIT License ............................................................................................................................................ B-64
B.3.11 Mozilla Public License, version 2 ........................................................................................................... B-64
B.3.12 The Open LDAP Public License ............................................................................................................. B-68
xi
xii WiNG 5.8.4 Access Point System Reference Guide
• AP6511, AP6521, AP6522, AP6522M, AP6532 and AP6562 are collectively represented as
AP65XX.
• AP7131, AP7161 and AP7181 are collectively represented as AP71XX.
• AP7502, AP7522, AP7532 and AP7562 are collectively represented as AP75XX.
• AP8122, AP8132 and AP8163 are collectively represented as AP81XX.
• AP8222 and AP8232 are collectively represented as AP82XX.
NOTE: ES6510, EX3524 and EX3548 are Ethernet Switches managed by a wireless
controller such as RFS4000/RFS6000/RFS7000/NX4500/NX4524/NX6500/NX6524/NX7500/
NX7510/NX7520/NX7530/NX9000/NX9500/NX9510/NX9600/VX9000. These devices do not
have radios and do not provide WLAN support.
This section is organized into the following:
• Document Convention
• Notational Conventions
• ZEBRA END USER LICENSE AGREEMENT
xiv WiNG 5.8.4 Access Point System Reference Guide
Document Convention
The following conventions are used in this document to draw your attention to important information:
NOTE: Indicates tips or special requirements.
CAUTION: Indicates conditions that can cause equipment damage or data
!
loss.
WARNING! Indicates a condition or procedure that could result in
personal injury or equipment damage.
Switch Note: Indicates caveats unique to a RFS4000/RFS6000/RFS7000/
NX4500/NX4524/NX6500/NX6524/NX7500/NX7510/NX7520/NX7530/
NX9000/NX9500/NX9510/NX9600/VX9000 model controllers or service platforms.
Notational Conventions
The following notational conventions are used in this document:
• Italics are used to highlight specific items in the general text, and to identify chapters and sections in this and
related documents
• Bullets (•) indicate:
• lists of alternatives
• lists of required steps that are not necessarily sequential
BY INSTALLING AND/OR USING THIS PRODUCT, YOU ACKNOWLEDGE THAT YOU HAVE READ THIS
AGREEMENT, UNDERSTAND IT AND AGREE TO BE BOUND ITS TERMS. IF YOU DO NOT AGREE TO THE
TERMS OF THIS AGREEMENT, ZEBRA IS NOT WILLING TO LICENSE THE PRODUCT TO YOU, AND YOU
MUST NOT INSTALL OR USE THIS PRODUCT.
Grant of License. Zebra Technologies Corporation (“Zebra”) grants you ("Licensee" or "you") a personal,
nonexclusive, nontransferable, revocable, nonassignable, limited license to use the software and documentation
(“Product(s)”) subject to the terms and conditions of this Agreement. You shall use the Products only for your
internal business purposes, exclusively to support Zebra devices. Any use of the Products outside of the conditions
set forth herein is strictly prohibited and will be deemed a breach of this Agreement resulting in immediate
termination of your License. In the event of a breach of this Agreement, Zebra will be entitled to all available
remedies at law or in equity (including immediate termination of the license without notice, immediate injunctive
relief and repossession of all Products unless Licensee is a Federal agency of the United States Government).
You shall not distribute, sublicense, rent, loan, lease, export, re-export, resell, ship or divert or cause to be
exported, re-exported, resold, shipped or diverted, directly or indirectly, the Products under this Agreement. You
shall not, and shall not permit others to: (i) modify, translate, decompile, bootleg, reverse engineer, disassemble,
or extract the inner workings of the Products, (ii) copy the look-and-feel or functionality of the Products; (iii) remove
any proprietary notices, marks, labels, or logos from the Products; (iv) rent or transfer all or some of the Products
to any other party without Zebra’s prior written consent; or (v) utilize any computer software or hardware which is
designed to defeat any copy protection device, should the Products be equipped with such a protection device.
Title to all copies of Products will not pass to Licensee at any time and remains vested exclusively in Zebra. All
intellectual property developed, originated, or prepared by Zebra in connection with the Products remain vested
exclusively in Zebra, and this Agreement does not grant to Licensee any intellectual property rights.
Portions of the Products are protected by United States patent and copyright laws, international treaty provisions,
and other applicable laws. Therefore, you must treat the Products like any other copyrighted material (e.g., a book
or musical recording) except that you may make one copy of the Product solely for back-up purposes.
Unauthorized duplication of the Products constitutes copyright infringement, and in the United States is punishable
in federal court by fine and imprisonment.
Limited Warranty. Zebra warrants for a period of ninety (90) days from your receipt of the Products to you that
the Software, under normal use, will perform substantially in accordance with Zebra’s published specifications for
that release level of the Software. The written materials are provided "AS IS" and without warranty of any kind.
Zebra’s entire liability and your sole and exclusive remedy for any breach of the foregoing limited warranty will be,
at Zebra’s option, the provision of a downloadable patch or replacement code, or a refund of the unused portion
of your bargained for contractual benefit up to the amount paid for the Products.
Disclaimer. THIS LIMITED WARRANTY IS THE ONLY WARRANTY PROVIDED BY ZEBRA, AND ZEBRA
MAKES, AND YOU RECEIVE, NO OTHER WARRANTIES OF ANY KIND, WHETHER EXPRESS, IMPLIED,
STATUTORY, OR IN ANY COMMUNICATION WITH YOU. ZEBRA SPECIFICALLY DISCLAIMS ANY
WARRANTY INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILTY, NONINFRINGEMENT, OR
FITNESS FOR A PARTICULAR PURPOSE. ZEBRA DOES NOT WARRANT THAT THE PRODUCTS WILL
MEET YOUR REQUIREMENTS, OR THAT THE OPERATION OF THE PRODUCTS WILL BE UNINTERRUPTED
OR ERROR FREE, OR THAT DEFECTS IN THE PRODUCTS WILL BE CORRECTED. ZEBRA MAKES NO
WARRANTY WITH RESPECT TO THE CORRECTNESS, ACCURACY, OR RELIABILITY OF THE PRODUCTS.
Some jurisdictions do not allow the exclusion of implied warranties, so the above exclusion may not apply to you.
Limitation of Liability. THE TOTAL LIABILITY OF ZEBRA UNDER THIS AGREEMENT FOR DAMAGES SHALL
NOT EXCEED THE FAIR MARKET VALUE OF THE PRODUCTS LICENSED UNDER THIS AGREEMENT. IN
NO EVENT WILL ZEBRA BE LIABLE IN ANY WAY FOR INCIDENTAL, CONSEQUENTIAL, INDIRECT, SPECIAL
OR PUNITIVE DAMAGES OF ANY NATURE, INCLUDING WITHOUT LIMITATION, LOST BUSINESS PROFITS,
OR LIABILITY OR INJURY TO THIRD PERSONS, WHETHER FORESEEABLE OR NOT, REGARDLESS OF
WHETHER ZEBRA HAS BEEN ADVISED OF THE POSSIBLITY OF SUCH DAMAGES. Some jurisdictions do not
permit limitations of liability for incidental or consequential damages, so the above exclusions may not apply to
you. This Limitation of Liability provision survives the termination of this Agreement and applies notwithstanding
About This Guide xv
xvi WiNG 5.8.4 Access Point System Reference Guide
any contrary provision in this Agreement. Licensee must bring any action under this Agreement within one (1) year
after the cause of action arises.
Maintenance. Unless provided for in a separate agreement, Zebra shall not be responsible for maintenance or
field service of the Products.
High Risk Activities. The Products are not fault-tolerant and are not designed, manufactured or intended for use
or resale as on-line control software in hazardous environments requiring fail-safe performance, such as in the
operation of nuclear facilities, aircraft navigation or communication systems, air traffic control, direct life support
machines, or weapons systems, in which the failure of the Products could lead directly to death, personal injury,
or severe physical or environmental damage ("High Risk Activities"). Zebra and its suppliers specifically disclaim
any express or implied warranty of fitness for High Risk Activities, and if you elect to use the Products in any High
Risk Activities, you agree to indemnify, defend, and hold Zebra harmless from and against any and all costs,
damages, and losses related to that use.
U.S. Government. If you are acquiring the Products on behalf of any unit or agency of the U.S. Government, the
following shall apply. Use, duplication, or disclosure of the Products is subject to the restrictions set forth in
subparagraphs (c) (1) and (2) of the Commercial Computer Software - Restricted Rights clause at FAR 52.227-19
(JUNE 1987), if applicable, unless being provided to the Department of Defense. If being provided to the
Department of Defense, use, duplication, or disclosure of the Products is subject to the restricted rights set forth
in subparagraph (c) (1) (ii) of the Rights in Technical Data and Computer Software clause at DFARS 252.227-7013
(OCT 1988), if applicable. Products may or may not include a Restricted Rights notice, or other notice referring
specifically to the terms and conditions of this Agreement. The terms and conditions of this Agreement shall each
continue to apply, but only to the extent that such terms and conditions are not inconsistent with the rights provided
to you under the aforementioned provisions of the FAR and DFARS, as applicable to the particular procuring
agency and procurement transaction.
Assignment. Except as otherwise provided in this section, neither party may assign this Agreement, or any of its
rights or obligations under this Agreement, without the prior written approval of the other party, which will not be
unreasonably withheld. Any attempted assignment, delegation, or transfer without the necessary approval will be
void. Notwithstanding the foregoing, for any Zebra acquisition, merger, consolidation, reorganization, or similar
transaction, or any spin-off, divestiture, or other separation of a Zebra business, Zebra may, without the prior
written consent of the other party: (i) assign its rights and obligations under this Agreement, in whole or in part, or
(ii) split and assign its rights and obligations under this Agreement so as to retain the benefits of this Agreement
for both Zebra and the assignee entity(ies) (and their respective Affiliates) following the split.
Governing Law. This Agreement shall be governed by the laws of the United States of America to the extent that
they apply and otherwise by the laws of the State of New York without regard to its conflict of laws provisions or by
the internal substantive laws of the country to which the Products is shipped if end-user customer is a sovereign
governmental entity. The terms of the U.N. Convention on Contracts for the International Sale of Goods do not
apply. In the event that the Uniform Computer information Transaction Act, any version of this Act, or a
substantially similar law (collectively “UCITA”) becomes applicable to a Party’s performance under this Agreement,
UCITA does not govern any aspect of this End User License Agreement or any license granted under this EndUser License Agreement, or any of the parties’ rights or obligations under this End User License Agreement. The
governing law will be that in effect prior to the applicability of UCITA.
Compliance with Laws. Licensee will comply with all applicable laws and regulations, including export laws and
regulations of the United States. Licensee will not, without the prior authorization of Zebra and the appropriate
governmental authority of the United States, in any form export or re-export, sell or resell, ship or reship, or divert,
through direct or indirect means, any item or technical data or direct or indirect products sold or otherwise furnished
to any person within any territory for which the United States Government or any of its agencies at the time of the
action, requires an export license or other governmental approval. Violation of this provision will be a material
breach of this Agreement, permitting immediate termination by Zebra.
Third Party Software. The Products may contain one or more items of Third-Party Software. The terms of this
Agreement govern your use of any Third-Party Software UNLESS A SEPARATE THIRD-PARTY SOFTWARE
LICENSE IS INCLUDED, IN WHICH CASE YOUR USE OF THE THIRD-PARTY SOFTWARE WILL THEN BE
GOVERNED BY THE SEPARATE THIRD-PARTY LICENSE.
Open Source Software. The Products may contain one or more items of Open Source Software. Open Source
Software is software covered by a publicly available license governed solely under Copyright law, whereas the
About This Guide xvii
complete terms and obligations of such license attach to a licensee solely through the act of copying, using and/
or distribution of the licensed software, such obligations often include one or more of attribution obligations,
distribution obligations, copyleft obligations, and intellectual property encumbrances. The use of any Open Source
Software is subject to the terms and conditions of this Agreement as well as the terms and conditions of the
corresponding license of each Open Source Software package. If there is a conflict between the terms and
conditions of this Agreement and the terms and conditions of the Open Source Software license, the applicable
Open Source Software license will take precedence. Copies of the licenses for the included Open Source
Software, if any, as well as their attributions, acknowledgements, and software information details, are provided in
the electronic copy of this Agreement, which is available in the Legal Notices or README file associated with the
Product. Zebra is required to reproduce the software licenses, acknowledgments and copyright notices as
provided by the authors and owners, thus, all such information is provided in its native language form, without
modification or translation. Depending on the license terms of the specific Open Source Software, source code
may not be provided. Please reference and review the entire Open Source Software information to identify which
Open Source Software packages have source code provided or available. For instructions on how to obtain a copy
of any source code made publicly available by Zebra related to Open Source Software distributed by Zebra, you
may send your request (including the Zebra Product name and version, along with the Open Source Software
specifics) in writing to: Zebra Technologies Corporation, Open Source Software Director, Legal Department, 3
Overlook Point, Lincolnshire, IL 60069 USA.
xviii WiNG 5.8.4 Access Point System Reference Guide
CHAPTER 1
OVERVIEW
The family of WING supported access points enable high performance with secure and resilient wireless voice and
data services to remote locations with the scalability required to meet the needs of large distributed enterprises.
AP6511, AP6521, AP6522, AP6532, AP6562, AP8432, AP8533, AP71XX, AP7502, AP81XX and AP82XX access
points and ES6510 model ethernet switch can now use WiNG software as its onboard operating system. The
unique WiNG software enables the access point to function as a Standalone “thick” access point, or a Virtual
Controller AP capable of adopting and managing up to 24 access points of the same model.
NOTE: ES6510, EX3524 and EX3548 are Ethernet Switches managed by a wireless
controller such as RFS4000/RFS6000/RFS7000/NX4500/NX4524/NX6500/NX6524/NX7500/
NX7510/NX7520/NX7530/NX9000/NX9500/NX9510/NX9600/VX9000. These devices do not
have radios and do not provide WLAN support.
When deploying an access point as a pure Virtual Controller AP, with no RFS Series controllers available anywhere
on the network, the access point itself is a controller supporting other access points of the same model. The Virtual
Controller AP can:
• Provide firmware upgrades for connected access point
• Aggregate statistics for the group of access points the Virtual Controller is managing
• Be the single point of configuration for that deployment location
NOTE: The recommended way to administer a network populated by numerous access points
is to configure them directly from the Virtual Controller AP. If a single access point
configuration requires an update from the Virtual Controller AP’s assigned profile
configuration, the administrator should apply a Device Override to change just that access
point’s configuration. For more information on applying an override to an access point’s Virtual
Controller AP assigned configuration and profile, see Device Overrides on page 5-229.
The WiNG architecture is a solution designed for 802.11n and 802.11ac networking. It leverages the best aspects
of independent and dependent architectures to create a smart network that meets the connectivity, quality and
security needs of each user and their applications, based on the availability of network resources including wired
networks. By distributing intelligence and control amongst access points, a WiNG network can route directly via
the best path, as determined by factors including the user, location, the application and available wireless and
wired resources. WiNG extends the differentiation offered to the next level, by making available services and
security at every point in the network. managed traffic flow is optimized to prevent wired congestion and wireless
1-2 WiNG 5.8.4 Access Point System Reference Guide
congestion. Traffic flows dynamically, based on user and application, and finds alternate routes to work around
network choke points.
NOTE: This guide describes the installation and use of the WiNG software designed
specifically for AP6511, AP6521, AP6522, AP6532, AP6562, AP8432, AP8533, AP71XX,
AP7502, AP7522, AP7532, AP81XX and AP82XX access points and ES6510 model ethernet
switch. It does not describe the version of the WiNG software designed for use with the
RFS4000, RFS6000, RFS7000, NX4500, NX4524, NX6500, NX6524, NX7500,
NX7510,NX7520, NX7530, NX9000, NX9500 and NX9510. For information on using WiNG in
a controller managed network, go to www.zebra.com/support.
Overview 1-3
1.1 About the WiNG Software
Zebra Technologies’ WiNG 5 operating system is the next generation in the evolution of WLAN architectures.
WiNG 5 OS is designed to scale efficiently from the smallest networks to large, geographically dispersed
deployments. The co-operative, distributed control plane innovation in the WiNG 5 architecture offers a softwaredefined networking (SDN)-ready operating system that can distribute controller functionality to every access point
in your network. Now, every access point is network aware, providing the intelligence required to truly unleash
optimal performance, all wireless LAN infrastructure can work together to ensure every transmission is routed
through the most efficient path, every time.
WiNG 5 brings you the resiliency of a standalone access point network without the vulnerability of a centralized
controller, with advancements that take performance, reliability, security, scalability and manageability to a new
level. The result? Maximum network uptime and security with minimal management. And true seamless and
dependable mobility for your users.
WiNG 5 advances the following technology:
Comprehensive Wi-Fi support. - WiNG supports all Wi-Fi protocols, including 802.11a/b/g/n/ac, allowing you to
create a cost-effective migration plan based on the needs of your business.
Extraordinary scalability - With WiNG, you can build any size network, from a small WLAN network in a single
location to a large multi-site network that reaches all around the globe.
Extraordinary flexibility - No matter what type of infrastructure you deploy, WiNG 5 delivers intelligence to all:
standalone independent access point or adaptive access point that can be adopted by a controller but can switch
to independent mode; virtual controllers; physical controllers in branch offices, the network operating center (NOC)
or the cloud.
The power of distributed intelligence - WiNG distributes intelligence right to the network edge, empowering
every controller and access point with the intelligence needed to be network-aware, able to identify and
dynamically route traffic over the most efficient path available at that time.
Extraordinary network flexibility and site survivability - WiNG provides the best of both worlds: true
hierarchical management that delivers a new level of management simplicity and resiliency by enabling controllers
to adopt and manage other controllers and access point, while allowing adopted infrastructure to also stand on its
own.
Gap-free security - When it comes to security, there can be no compromises. WiNG’s comprehensive security
capabilities keep your network and your data safe — period — ensuring compliance with PCI, HIPAA and other
government and industry security regulations.
Connectivity for the largest indoor and outdoor spaces - In addition to enabling a robust indoor WLAN, our
patented MeshConnex™ technology enables the extension of Wi-Fi networks to the largest of outdoor spaces —
from an expansive outdoor campus environment to an entire city.
Powerful centralized management - With WiNG you get complete control over every aspect of your WLAN. This
single powerful windowpane enables zero touch infrastructure deployment, rich analytics that can help you
recognize and correct brewing issues before they impact service quality and user connectivity, along with
centralized and remote troubleshooting and issue resolution of the entire network.
1.1.1 Distributed Intelligence
WiNG 5 enables all WLAN infrastructure with the intelligence required to work together to determine the most
efficient path for every transmission. The need to route all traffic through a controller is eliminated, along with the
resulting congestion and latency, resulting in higher throughput and superior network performance. Since all
features are available at the access layer, they remain available even when the controller is offline, for example,
due to a WAN outage, ensuring site survivability and extraordinary network resilience. In addition, you get
unprecedented scalability, large networks can support as many as 10,000 nodes without impacting throughput or
manageability, providing unprecedented scalability.
1-4 WiNG 5.8.4 Access Point System Reference Guide
1.1.2 High Availability Networks
WiNG 5 enables the creation of highly reliable networks, with several levels of redundancy and failover
mechanisms to ensure continuous network service in case of outages. Access points in remote sites coordinate
with each other to provide optimized routing and self-healing, delivering a superior quality of experience for
business critical applications. Even when WiNG 5 site survivable access points lose communication with the
controller, they continue to function, able to bridge traffic while still enforcing QoS and security policies, including
stateful inspection of Layer2 (locally bridged) or Layer 3 traffic.
1.1.3 Gap Free Security
When it comes to wireless security, one size does not fit all. A variety of solutions are required to meet the varying
needs and demands of different types of organizations. Regardless of the size of your WLAN or your security
requirements, our tiered approach to security allows you to deploy the features you need to achieve the right level
of security for your networks and your data. And where a hub-and-spoke architecture can’t stop threats until they
reach the controller inside your network, WiNG 5 distributes security features to every access point, including
those at the very edge of your network, creating an around-the-clock constant network perimeter guard that
prevents threats from entering your network for unprecedented gap free security.
1.1.4 Outdoor Wireless and Mesh Networking
When you need to extend your wireless LAN to outdoor spaces, our patented MeshConnex technology combines
with comprehensive mesh networking features to enable you to create secure, high performance, flexible and
scalable mesh networks. With our mesh technology, you can cover virtually any area without installing cabling,
enabling the creation of cost-effective outdoor wireless networks that can provide coverage to enterprise workers
in vast campus-style environments as well as public safety personnel in patrol cars.
1.1.5 Network Services, Routing and Switching
WiNG 5 integrates network services like built-in DHCP server, AAA server and routing protocols like policy based
routing and OSPF, Layer 2 protocols like MSTP and Link Aggregation. Integration of services and routing/
switching protocols eliminates the need for additional servers or other networking gear in small offices thereby
reducing Total Cost of Ownership (TCO). In large networks, where such services are deployed on a dedicated
server/ router at the NOC, this provides a backup solution for remote sites when the WAN link to the NOC is
temporarily lost. Integrating also provides the added benefit of coordination across these services on failover from
primary to standby, assisting a more meaningful behavior, rather than when each fails over independently of the
other for the same root cause.
1.1.6 Management, Deployment and Troubleshooting
WiNG’s comprehensive end-to-end management capabilities cover deployment through day-to-day management.
You get true zero-touch deployment for access points located anywhere in the world, the simplicity of a single
window into the entire network, plus the ability to remotely troubleshoot and resolve issues. And since our
management technology is manufacturer-agnostic, you can manage your Zebra Technologies WLAN
infrastructure as well as any legacy equipment from other manufacturers, allowing you to take advantage of our
advanced WLAN infrastructure without requiring a costly rip and replace of your existing WLAN.
CHAPTER 2
WEB USER INTERFACE FEATURES
The access point’s on board user interface contains a set of features specifically designed to enable either Virtual
Controller AP, Standalone AP or Adopt to Controller functionality. In Virtual Controller AP mode, an access point
can manage up to 24 other access points of the same model and share data amongst managed access points. In
Standalone mode, an access point functions as an autonomous, non adopted, access point servicing wireless
clients. If adopted to controller, an access point is reliant on its connected controller for its configuration and
management.
For information on how to access and use the access point’s Web UI, see:
• Accessing the Web UI
• Glossary of Icons Used
2-2 WiNG 5.8.4 Access Point System Reference Guide
2.1 Accessing the Web UI
Web User Interface Features
The access point uses a Graphical User Interface (GUI) which can be accessed using any supported Web browser
on a client connected to the subnet the Web UI is configured on.
2.1.1 Browser and System Requirements
To access the GUI, a browser supporting Flash Player 11 is recommended. The system accessing the GUI should
have a minimum of 1 GB of RAM for the UI to display and function properly. The Web UI is based on Flex, and
does not use Java as the underlying UI framework. It is recommended to use a resolution of 1280 x 1024 pixels
when using the GUI.
The following browsers have been validated with the Web UI:
• Firefox 3.0 or higher
• Internet Explorer 7 or higher
• Google Chrome 2.0 or higher
• Safari 3 and higher
• Opera 9.5 and higher
2.1.2 Connecting to the Web UI
1. Connect one end of an Ethernet cable to an access point LAN port and connect the other end to a computer
with a working Web browser.
2. Set the computer to use an IP address between 192.168.0.10 and 192.168.0.250 on the connected port. Set
a subnet/network mask of 255.255.255.0.
NOTE: The access point’s IP address is optimally provided using DHCP. A zero
config IP address can also be derived if DHCP resources are unavailable.
Using zero config, the last two octets in the IP address are the decimal
equivalent of the last two bytes in the access point’s hardcoded MAC address.
For example:
MAC address - 00:C0:23:00:F0:0A
Zero-config IP address - 169.254.240.10
3. To derive the access point’s IP address using its MAC address:
4. Open the Windows calculator be selecting Start > All Programs > Accessories > Calculator. This menu path
may vary slightly depending on your version of Windows.
5. With the Calculator displayed, select View > Scientific. Select the Hex radio button.
6. Enter a hex byte of the access point’s MAC address. For example, F0.
7. Select the Dec radio button. The calculator converts F0 into 240. Repeat this process for the last access point
MAC address octet.
8. Once obtained, point the Web browser to the access point’s IP address. The following login screen displays:
Web User Interface Features 2-3
Figure 2-1 Access Point Web UI Login screen
9. Enter the default username admin in the Username field.
10. Enter the default password admin123 in the Password field.
11. Select the Login button to load the management interface.
If this is the first time the management interface has been accessed, the first screen to display will prompt for
a change of the default access point password. Then, a dialogue displays to start the initial setup wizard. For
more information on using the initial setup wizard see Using the Initial Setup Wizard on page 3-2.
2-4 WiNG 5.8.4 Access Point System Reference Guide
2.2 Glossary of Icons Used
Web User Interface Features
The access point interface utilizes a number of icons designed to interact with the system, gather information from
managed devices and obtain status. This chapter is a compendium of the icons used, and is organized as follows:
• Global Icons
• Dialog Box Icons
• Table Icons
• Status Icons
• Configurable Objects
• Configuration Objects
• Configuration Operation Icons
• Access Type Icons
• Administrative Role Icons
• Device Icons
2.2.1 Global Icons
Glossary of Icons Used
This section lists global icons available throughout the interface.
Logout – Select this icon to log out of the system. This icon is always
available and is located at the top right-hand corner of the UI.
Add – Select this icon to add a row in a table. When this icon is selected,
a new row is created in the table, or a dialog box opens where you can
enter values for that particular list.
Delete – Select this icon to remove a row from a table. When this icon is
clicked, the selected row is immediately deleted.
More Information – Select this icon to display a pop-up with supplementary
information that may be available for an item.
Trash – Select this icon to remove a row from a table. When this icon is
clicked, the selected row is immediately deleted.
Create new policy – Select this icon to create a new policy. Policies define
different configuration parameters that can be applied to device
configurations, and device profiles.
Edit policy – Select this icon to edit an existing configuration item or policy.
To edit a policy, select the policy and this icon.
2.2.2 Dialog Box Icons
Glossary of Icons Used
These icons indicate the current state of various controls in a dialog. These icons enables you to gather, at a
glance, the status of all the controls in a dialog. The absence of any of these icons next to a control indicates the
value in that control has not been modified from its last saved configuration.
Entry Updated – Indicates a value has been modified from its last
saved configuration.
Entry Update – States that an override has been applied to a device’s
profile configuration.
Mandatory Field – Indicates the control’s value is a mandatory
configuration item. You will not be allowed to proceed further without
providing all mandatory values in the dialog or the screen.
Error in Entry – Indicates there is an error in a supplied value. A small
red popup provides a likely cause of the error.
Web User Interface Features 2-5
2.2.3 Table Icons
Glossary of Icons Used
The following two override icons are status indicators for transactions that need to be committed.
2.2.4 Status Icons
Glossary of Icons Used
These icons define device status, operations on the wireless controller, or any other action that requires a status
being returned to the user.
Table Row Overridden – Indicates a change (profile configuration
override) has been made to a table row, and the change will not be
implemented until saved. This icon represents a change from this
device’s profile assigned configuration.
Table Row Added – Indicates a new row has been added to a table,
and the change will not be implemented until saved. This icon
represents a change from this device’s profile assigned configuration.
Fatal Error – States there is an error causing a managed device to
stop functioning.
Error – Indicates an error exits requiring intervention. An action has
failed, but the error is not system wide.
2-6 WiNG 5.8.4 Access Point System Reference Guide
Warning – States a particular action has completed, but some errors
were detected that did not stop the process from completing.
Intervention might still be required to resolve subsequent warnings.
Success – Indicates everything is well within the network or a process
has completed successfully without error.
Information – This icon always precedes information displayed to the
user. This may either be a message displaying progress for a
particular process, or may just be a message from the system.
2.2.5 Configurable Objects
Glossary of Icons Used
These icons define configurable items within the UI.
Device Configuration – Represents a configuration file applicable to a
device category.
Auto Provisioning Policy – Represents a provisioning policy.
Provisioning policies are a set of configuration parameters that define
how access points and wireless clients are adopted and their
management configuration supplied.
Wireless LANs – States an action impacting a WLAN has occurred.
WLAN QoS Policy – States a Quality of Service (QoS) policy
configuration has been impacted.
Radio QoS Policy – Indicates a QoS policy configuration has been
impacted.
AAA Policy – Indicates an Authentication, Authorization and
Accounting (AAA) policy has been impacted. AAA policies define
RADIUS authentication and accounting parameters.
Association ACL – Indicates an Association Access Control List
(ACL) configuration has been impacted. An ACL is a set of
configuration parameters used to set access to managed resources.
The association ACL configures the parameters for controlling device
associations.
Loading...
+ 1146 hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.