The term, AP, refers to an Access Point.
The term, 802.11, is used to describe features that apply to the 802.11a, 802.11b, and 802.11g wireless standards.
A Dual-radio AP is an Access Point that includes two radios; it can support one or two IEEE radio standards (depending on the type of radios installed). The AP-2000 is a Dual-radio AP. An 802.11a AP is an Access Point that supports the IEEE 802.11a standard. An 802.11b AP is an Access Point that supports the IEEE 802.11b standard. An 802.11b/g AP is an Access Point that supports the IEEE 802.11g standard.
An AP extends the capability of an existing Ethernet network to devices on a wireless network. Wireless devices can connect to a single Access Point, or they can move between multiple Access Points located within the same vicinity. As wireless clients move from one coverage cell to another, they maintain network connectivity.
To determine the best location for an Access Point, Proxim recommends conducting a Site Survey before placing the device in its final location. For information about how to conduct a Site Survey, contact your local reseller.
Before an Access Point can be configured for your specific networking requirements, it must first be initialized. See Getting Started for details.
Typical wireless network access infrastructure
Once initialized, the network administrator can configure each unit according to the network's requirements. The AP functions as a wireless network access point to data networks. An AP network provides:
Seamless client roaming Easy installation and operation Over-the-air encryption of data High speed network linksTo be fully operational, the AP-2000 needs at least one wireless card installed.
In 1997, the Institute of Electrical and Electronics Engineers (IEEE) adopted the 802.11 standard for wireless devices operating in the 2.4 GHz frequency band. This standard includes provisions for three radio technologies: direct sequence spread spectrum, frequency hopping spread spectrum, and infrared. Devices that comply with the 802.11 standard operate at a data rate of either 1 or 2 Megabits per second (Mbps).
In 1999, the IEEE modified the 802.11 standard to support direct sequence devices that can operate at speeds of up to 11 Mbps. The IEEE ratified this standard as 802.11b. 802.11b devices are backwards compatible with 2.4 GHz 802.11 direct sequence devices (that operate at 1 or 2 Mbps). Available Frequency Channels vary by regulatory domain and/or country. See 802.11b Channel Frequencies for details.
Also in 1999, the IEEE modified the 802.11 standard to support devices operating in the 5 GHz frequency band. This standard is referred to as 802.11a. 802.11a devices are not compatible with 2.4 GHz 802.11 or 802.11b devices. 802.11a radios use a radio technology called Orthogonal Frequency Division Multiplexing (OFDM) to achieve data rates of up to 54 Mbps. Available Frequency Channels vary by regulatory domain and/or country. See 802.11a Channel Frequencies for details.
In 2003, the IEEE introduced the 802.11g standard. 802.11g devices operate in the 2.4 GHz frequency band using OFDM to achieve data rates of up to 54 Mbps. In addition, 802.11g devices are backwards compatible with 802.11b devices. Available Frequency Channels vary by regulatory domain and/or country. See 802.11g Channel Frequencies for details.
There are several management and monitoring interfaces available to the network administrator to configure and manage an AP on the network:
The HTTP Interface (Web browser Interface) provides easy access to configuration settings and network statistics from any computer on the network. You can access the HTTP Interface over your LAN (switch, hub, etc.), over the Internet, or with a "crossover" Ethernet cable connected directly to your computer's Ethernet Port.
HTTPS provides an HTTP connection over a Secure Socket Layer. HTTPS is one of two available secure management options on the AP; the other secure management option is SNMPv3. Enabling HTTPS allows the user to access the AP in a secure fashion using Secure Socket Layer (SSL) over port 443. The AP supports SSLv3 with a 128-bit encryption certificate maintained by the AP for secure communications between the AP and the HTTP client. All communications are encrypted using the server and the client-side certificate.
The AP comes pre-installed with all required SSL files: default certificate, private key and SSL Certificate Passphrase installed.
The Command Line Interface (CLI) is a text-based configuration utility that supports a set of keyboard commands and parameters to configure and manage an AP.
Users enter Command Statements, composed of CLI Commands and their associated parameters. Statements may be issued from the keyboard for real time control, or from scripts that automate configuration.
For example, when downloading a file, administrators enter the download CLI Command along with IP Address, file name, and file type parameters.
You access the CLI over a HyperTerminal serial connection or via Telnet. During initial configuration, you can use the CLI over a serial port connection to configure an Access Point's IP address. When accessing the CLI via Telnet, you can communicate with the Access Point from over your LAN (switch, hub, etc.), from over the Internet, or with a "crossover" Ethernet cable connected directly to your computer's Ethernet Port.
See Using the Command Line Interface (CLI) for more information on the CLI and for a list of CLI commands and parameters.
In addition to the HTTP and the CLI interfaces, you can also manage and configure an AP using the Simple Network Management Protocol (SNMP). Note that this requires an SNMP manager program, like HP Openview or Castlerock's SNMPc.
The AP supports several Management Information Base (MIB) files that describe the parameters that can be viewed and/or configured over SNMP:
Proxim provides these MIB files on the CD included with each Access Point. You need to compile one or more of the above MIBs into your SNMP program's database before you can manage an Access Point using SNMP. Refer to the documentation that came with your SNMP manager for instructions on how to compile MIBs.
The Enterprise MIB defines the read and read-write objects that can be viewed or configured using SNMP. These objects correspond to most of the settings and statistics that are available with the other management interfaces. Refer to the Enterprise MIB for more information; the MIB can be opened with any text editor, such as Microsoft Word, Notepad, or WordPad.
SNMPv3 is one of two available secure management options on the AP; the other secure management option is HTTPS (HTTP connection over Secure Socket Layer). SNMPv3 is based on the existing SNMP framework, but addresses security requirements for device and network management.
The security threats addressed by Secure Management are:
To address the security threats listed above, SNMPv3 provides the following when secure management is enabled:
The default SNMPv3 username is administrator, with SHA authentication, and DES privacy protocol.
The remainder of this guide describes how to configure an AP using the HTTP Web interface or the CLI interface. For information on how to manage devices using SNMP, refer to the documentation that came with your SNMP program. Also, refer to the MIB files for information on the parameters available via SNMP.
Before installing an AP, you need to gather certain network information. The following section identifies the information you need.
Passwords must be configured with at least 6 characters in length.
Each Dual-radio AP comes with the following:
If any of these items are missing or damaged, please contact your reseller or Technical Support (see Technical Support for contact information).
The 5 GHz Antenna Adapter or 11a Upgrade Kit can be used in the Access Point. Because 802.11a requires an antenna adapter, only one 5 GHz radio can be installed in the AP. The second slot can be populated with an 802.11b or 802.11b/g card.
To begin using an AP, you must have the following minimum requirements:
(The computer is required to configure the AP using the HTTP interface.)
5 GHz or AP-2000 11a Upgrade Kit
Insert Module into Mounting Bracket
2. Slide an 802.11b, 802.11b/g wireless card, or 802.11a card with antenna adapter (not included in the kit) into Slot A or B. NOTE: The 802.11a wireless card with antenna adapter will only fit in Slot A.
3. Slide an 802.11b or an 802.11b/g wireless card (included in the kit) into Slot A or B.
4. Connect power to the unit from a DC injector device, such as the ORiNOCO 1-Port Active Ethernet DC Injector hub.
5. Wait for the LED indicators to turn green before proceeding.
Connect an Ethernet cable from an AE hub to the AP
6. Conduct a Site Survey to determine the best location for your device.
7. Once you have chosen a final location for your unit, mount the wall bracket and the processor module and place the cover onto the unit as shown.
2. Plug the AC power cord into the power supply.
3. Slide the AP module onto the mounting bracket. Make sure it is properly seated.
4. Plug the DC connector from the power supply into the top of the AP module.
Insert module in mounting bracket and attach power connector
5. Attach one end of an Ethernet cable to the AP's Ethernet port and the other end to a network hub or switch.
6. Connect the unit to a power source.
7. Wait for the power LED to turn green before proceeding.
Power LED turns green when the unit is operational
8. Conduct a Site Survey to determine the best location for your device.
9. Once you have chosen a final location for your unit, mount the wall bracket and the processor module and place the cover onto the unit as shown.
If you are installing this kit on a new AP (one that has not been installed yet), skip to Step 4.
1. Remove the AP from your network by unplugging the power and Ethernet cables from the unit.2. Remove the unit from its mounting location - keep the mounting bracket with the AP.
3. Remove the outer plastic cover.
The AP-2000 Upgrade Kit may be installed only in slot A of the AP-2000.
4. Make sure card slot A is available. The power or Ethernet cable tie wrap may need to be cut and the cable repositioned to allow the antenna adapter to fit correctly.
5. Position the antenna adapter, card inward, facing the top of the unit (see diagram) and insert the 5 GHz card into the available card slot.
6. Angle the antenna adapter slightly upwards, pinch the end tabs inwards and carefully slide the antenna adapter onto the mounting bracket.
7. Gently push forward while rotating the antenna downwards and clip the adapter into the small cutouts on the face of the mounting bracket.
8. Position the antenna for best reception:
at a 90° angle for flat surface mounts
at a 180° angle for wall mounts
9. Re-install the cover and mount the AP back in place.
10. Connect the power and Ethernet cables to the AP.
Proxim provides two tools to simplify the initialization and configuration of an AP:
ScanTool
ScanTool is included on the Installation CD; the Setup Wizard launches automatically the first time you access the HTTP interface.
These initialization instructions describe how to configure an AP over an Ethernet connection using ScanTool and the HTTP interface. If you want to configure the unit over the serial port, see Setting IP Address using Serial Port for information on how to access the CLI over a serial connection and Using the Command Line Interface (CLI) for a list of supported commands.
ScanTool is a software utility that is included on the installation CD-ROM. ScanTool allows you to find the IP address of an Access Point by referencing the MAC address in a Scan List, or to assign an IP address if one has not been assigned.
The tool automatically detects the Access Points installed on your network, regardless of IP address, and lets you configure each unit's IP settings. In addition, you can use ScanTool to download new software to an AP that does not have a valid software image installed (see Client Connection Problems).
To access the HTTP interface and configure the AP, the AP must be assigned an IP address that is valid on its Ethernet network. By default, the AP is configured to obtain an IP address automatically from a network Dynamic Host Configuration Protocol (DHCP) server during boot-up. If your network contains a DHCP server, you can run ScanTool to find out what IP address the AP has been assigned. If your network does not contain a DHCP server, the Access Point's IP address defaults to 10.0.0.1. In this case, you can use ScanTool to assign the AP a static IP address that is valid on your network.
Follow these steps to install ScanTool, initialize the Access Point, and perform initial configuration:
Result: The unit requests an IP Address from the network DHCP server.
The ORiNOCO Installation program supports the following operating systems:
Result: ScanTool scans the subnet and displays all detected Access Points. The ScanTool's Scan List screen appears, as shown in the following example.
If your computer has more than one network adapter installed, you will be prompted to select the adapter that you want ScanTool to use before the Scan List appears. If prompted, select an adapter and click OK. You can change your adapter setting at any time by clicking the Select Adapter button on the Scan List screen. Note that the ScanTool Network Adapter Selection screen will not appear if your computer only has one network adapter installed.
If your Access Point does not show up in the Scan List, click the Rescan button to update the display. If the unit still does not appear in the list, see Troubleshooting the AP-2000 for suggestions. Note that after rebooting an Access Point, it may take up to five minutes for the unit to appear in the Scan List.
1. Highlight the entry for the AP you want to configure.
Result: the Change screen appears.
3. Set IP Address Type to Static.
4. Enter a static IP Address for the AP in the field provided. You must assign the unit a unique address that is valid on your IP subnet. Contact your network administrator if you need assistance selecting an IP address for the unit.
5. Enter your network's Subnet Mask in the field provided.
6. Enter your network's Gateway IP Address in the field provided.
7. Enter the SNMP Read/Write password in the Read/Write Password field (for new units, the default SNMP Read/Write password is "public").
The TFTP Server IP Address and Image File Name fields are only available if ScanTool detects that the AP does not have a valid software image installed. See Client Connection Problems.
8. Click OK to save your changes.
Result: The Access Point will reboot automatically and any changes you made will take effect.
9. When prompted, click OK a second time to return to the Scan List screen.
10. Click Cancel to close the ScanTool.
11. Proceed to Setup Wizard for information on how to access the HTTP interface.
The first time you connect to an AP's HTTP interface, the Setup Wizard launches automatically. The Setup Wizard provides step-by-step instructions for how to configure the Access Point's basic operating parameter, such as Network Name, IP parameters, system parameters, and management passwords.
Follow these steps to access the Access Point's HTTP interface and launch the Setup Wizard:
1. Open a Web browser on a network computer.The HTTP interface supports the following Web browser:
Microsoft Internet Explorer 6 with Service Pack 1 or later
2. If necessary, disable the browser's Internet proxy settings. For Internet Explorer users, follow these steps:
Select Tools > Internet Options.
If necessary, remove the check mark from the Use a proxy server box.
Click OK twice to save your changes and return to Internet Explorer.
3. Enter the Access Point's IP address in the browser's Address field and press Enter.
This is either the dynamic IP address assigned by a network DHCP server or the static IP address you manually configured. See ScanTool for information on how to determine the unit's IP address and manually configure a new IP address, if necessary.
Result: The Enter Network Password screen appears.
4. Enter the HTTP password in the Password field. Leave the User Name field blank. For new units, the default HTTP password is "public".
Result: The Setup Wizard will launch automatically.
5. Click Setup Wizard to begin. If you want to configure the AP without using the Setup Wizard, click Exit and see Performing Advanced Configuration.
The Setup Wizard supports the following navigation options:
Save & Next Button: Each Setup Wizard screen has a Save & Next button. Click this button to submit any changes you made to the unit's parameters and continue to the next page. The instructions below describe how to navigate the Setup Wizard using the Save & Next buttons.
Navigation Panel: The Setup Wizard provides a navigation panel on the left-hand side of the screen. Click the link that corresponds to the parameters you want to configure to be taken to that particular configuration screen. Note that clicking a link in the navigation panel will not submit any changes you made to the unit's configuration on the current page.
Exit: The navigation panel also includes an Exit option. Click this link to close the Setup Wizard at any time.
If you exit from the Setup Wizard, any changes you submitted (by clicking the Save & Next button) up to that point will be saved to the unit but will not take effect until it is rebooted.
6. Configure the System Configuration settings and click Save & Next. See System for more information.
7. Configure the Access Point's Basic IP address settings, if necessary, and click Save & Next. See Basic IP Parameters for more information.
8. Assign the AP new passwords to prevent unauthorized access and click Save & Next. Each management interface has its own password:
SNMP Read Password
SNMP Read-Write Password
SNMPv3 Authentication Password
SNMPv3 Privacy Password
CLI Password
HTTP (Web) Password
By default, each of these passwords is set to "public". See Passwords for more information.
9. Configure the basic wireless interface settings and click Save & Next.
The following options are available for an 802.11a AP:
Primary Network Name (SSID): Enter a Network Name (between 1 and 32 characters long) for the wireless network. You must configure each wireless client to use this name as well.
Additional Network Names (SSIDs): The AP supports up to 16 SSIDs and VLANs per wireless interface (radio). Refer to the Advanced Configuration chapter for information on the detailed rules on configuring multiple SSIDs, VLANs, and security modes.
Auto Channel Select: By default, the AP scans the area for other Access Points and selects the best available communication channel, either a free channel (if available) or the channel with the least amount of interference. Remove the check mark to disable this option. Note that you cannot disable Auto Channel Select for 802.11a products in Europe (see Dynamic Frequency Selection (DFS) for details).
Frequency Channel: When Auto Channel Select is enabled, this field is read-only and displays the Access Point's current operating channel. When Auto Channel Select is disabled, you can specify the Access Point's channel. If you decide to manually set the unit's channel, ensure that nearby devices do not use the same frequency. Available Channels vary based on regulatory domain. See 802.11a Channel Frequencies. Note that you cannot manually set the channel for 802.11a products in Europe (see Dynamic Frequency Selection (DFS) for details).
Transmit Rate: Use the drop-down menu to select a specific transmit rate for the AP. Choose between 6, 9, 12, 18, 24, 36, 48, 54 Mbits/s, and Auto Fallback. The Auto Fallback feature allows the AP to select the best transmit rate based on the cell size.
The following options are available for an 802.11b AP:
Primary Network Name (SSID): Enter a Network Name (between 1 and 32 characters long) for the wireless network. You must configure each wireless client to use this name as well.
Additional Network Names (SSIDs): The AP supports up to 16 SSIDs and VLANs per wireless interface (radio). Refer to the Advanced Configuration chapter for information on the detailed rules on configuring multiple SSIDs, VLANs, and security modes.
Auto Channel Select: By default, the AP scans the area for other Access Points and selects the best available communication channel, either a free channel (if available) or the channel with the least amount of interference. Remove the check mark to disable this option. If you are setting up a Wireless Distribution System (WDS), it must be disabled. See Wireless Distribution System (WDS) for more information.
Frequency Channel: When Auto Channel Select is enabled, this field is read-only and displays the Access Point's current operating channel. When Auto Channel Select is disabled, you can specify the Access Point's operating channel. If you decide to manually set the unit's channel, ensure that nearby devices do not use the same frequency (unless you are setting up a WDS). Available Channels vary based on regulatory domain. See 802.11b Channel Frequencies.
Distance Between APs: Set to Large, Medium, Small, Microcell, or Minicell depending on the site survey for your system. The distance value is related to the Multicast Rate (described next). In general, a larger distance between APs means that your clients operate a slower data rates (on average). This feature is available only if you are using an Orinoco Classic Gold card. See Distance Between APs for more information.
Multicast Rate: Sets the rate at which Multicast messages are sent. This value is related to the Distance Between APs parameter (described previously). The table below displays the possible Multicast Rates based on the Distance between APs. This feature is available only if you are using an Orinoco Classic Gold card. See Multicast Rate for more information.
The following options are available for an 802.11b/g AP:
Operational Mode: An 802.11b/g wireless interface can be configured to operate in the following modes:
802.11b mode only
802.11g mode only
802.11g-wifi mode
802.11b/g mode (default)
Primary Network Name (SSID): Enter a Network Name (between 1 and 32 characters long) for the wireless network. You must configure each wireless client to use this name as well.
Additional Network Names (SSIDs): The AP supports up to 16 SSIDs and VLANs per wireless interface (radio). Refer to the Advanced Configuration chapter for information on the detailed rules on configuring multiple SSIDs, VLANs, and security modes.
Auto Channel Select: By default, the AP scans the area for other Access Points and selects the best available communication channel, either a free channel (if available) or the channel with the least amount of interference. Remove the check mark to disable this option.
Frequency Channel: When Auto Channel Select is enabled, this field is read-only and displays the Access Point's current operating channel. When Auto Channel Select is disabled, you can specify the Access Point's channel. If you decide to manually set the unit's channel, ensure that nearby devices do not use the same frequency. Available Channels vary based on regulatory domain. See 802.11g Channel Frequencies.
Transmit Rate: Select a specific transmit rate for the AP. The values available depend on the Operational Mode. Auto Fallback is the default setting; it allows the AP to select the best transmit rate based on the cell size.
For 802.11b only -- Auto Fallback, 1, 2, 5.5, 11 Mbps
For 802.11g only -- Auto Fallback, 6, 9, 12, 18, 24, 36, 48, 54 Mbps
For 802.11b/g and 802.11g-wifi-- Auto Fallback, 1, 2, 5.5, 6, 9, 11, 12, 18, 24, 36, 48, 54 Mbps
Additional advanced settings are available in the Wireless Interface Configuration screen. See Wireless A (802.11a), Wireless (802.11b), or Wireless (802.11b/g) for details. See SSID/VLAN/Security for more information on security features.
10. Review the configuration summary. If you want to make any additional changes, use the navigation panel on the left-hand side of the screen to return to an earlier screen. After making a change, click Save & Next to save the change and proceed to the next screen.
11. When finished, click Reboot on the Summary screen to restart the AP and apply your changes.
Proxim periodically releases updated software for the AP on its Web site at http://www.proxim.com. Proxim recommends that you check the Web site for the latest updates after you have installed and initialized the unit.
Three types of files can be downloaded to the AP from a TFTP server:
image (AP software image or kernel)UpgradeBSPBL (BSP/Bootloader firmware file)
A Trivial File Transfer Protocol (TFTP) server allows you to transfer files across a network. You can upload files from the AP for backup or copying, and you can download the files for configuration and AP Image upgrades. The Solarwinds TFTP server software is located on the ORiNOCO AP Installation CD. You can also download the latest TFTP software from Solarwind's Web site at http://www.solarwinds.net.
If a TFTP server is not available in the network, you can perform similar file transfer operations using the HTTP interface.
After the TFTP server is installed:
2. Copy the latest software updates to your TFTP server.
3. In the Web Interface, click the Commands button and select the Update AP tab.
4. Enter the IP address of your TFTP server in the field provided.
5. Enter the File Name (including the file extension). Enter the full directory path and file name. If the file is located in the default TFTP directory, you need enter only the file name.
6. Select the File Type from the drop-down menu (use Img for software updates).
7. Select Update AP & Reboot from the File Operation drop-down menu.
9. The Access Point will reboot automatically when the download is complete.
2. Copy the latest software updates to your TFTP server.
3. Open the CLI interface via Telnet or a serial connection.
4. Enter the CLI password when prompted.
5. Enter the command: download <tftpaddr> <filename> img
Result: The download will begin. Be patient while the image is downloaded to the Access Point.
6. When the download is complete, type reboot 0 and press Enter.
See Using the Command Line Interface (CLI) for more information.
In an office building, plenum is the space between the structural ceiling and the tile ceiling that is provided to help air circulate. Many companies also use the plenum to house communication equipment and cables. However, these products and cables must comply with certain safety requirements, such as Underwriter Labs (UL) Standard 2043: "Standard for Fire Test for Heat and Visible Smoke Release for Discrete Products and Their Accessories Installed in Air-Handling Spaces".
The AP has been certified under UL Standard 2043 and can be installed in the plenum only when the following conditions apply:
When using only one card in the Access Point mounted in a plenum environment, remove the plastic cover. Place the top edge of the faceplate under the front ridge of the metal enclosure. Snap the faceplate in the empty card slot in the Access Point.
Do not drop the faceplate into the card slot in the AP.
To install a second radio card, the faceplate must be removed. Gently pry the faceplate off using the tab on the faceplate.
An Active Ethernet-enabled AP is equipped with an 802.3af-compliant Active Ethernet module. Active Ethernet (AE) delivers both data and power to the access point over a single Ethernet cable. If you choose to use Active Ethernet, there is no difference in operation; the only difference is in the power source.
Also see Hardware Specifications.
The AP's 802.3af-compliant Active Ethernet module is backwards compatible with all ORiNOCO Active Ethernet hubs that do not support the IEEE 802.3af standard.
The AP has four LED indicators, which exhibit the following behavior:
Indicated interface in Administrative State. An Amber color on a wireless interface LED indicates that the Wireless Interface Status for the particular wireless interface is "Shutdown" (refer to Wireless Service Status). |
||||
The Setup Wizard helps you configure the basic AP settings required to get the unit up and running. The AP supports many other configuration and management options. The remainder of this user guide describes these options in detail.
See Performing Advanced Configuration for information on configuration options that are available within the Access Point's HTTP interface.See Monitoring the AP-2000 for information on the statistics displayed within the Access Point's HTTP interface.
See Performing Commands for information on the commands supported by the Access Point's HTTP interface.
See Troubleshooting the AP-2000 for troubleshooting suggestions.
See Using the Command Line Interface (CLI) for information on the CLI interface and for a list of CLI commands.
Once the AP has a valid IP Address and an Ethernet connection, you may use your web browser to monitor the system status.
Follow these steps to monitor an AP's operating statistics using the HTTP interface:
The HTTP interface supports the following Web browsers: Microsoft Internet Explorer 6 with Service Pack 1 or later, and Netscape 6.1 or later.
System Status is the first screen to appear each time you connect to the HTTP interface. You can also return to this screen by clicking the Status button.
Each section of the System Status screen provides the following information:
Follow these steps to configure an Access Point's operating settings using the HTTP/HTTPS interface:
The HTTP interface supports the following Web browsers: Microsoft Internet Explorer 6 with Service Pack 1 or later, and Netscape 6.1 or later.
You can configure and view the following parameters within the System Configuration screen: Name: The name assigned to the AP. System name must be between 1-31 characters. Refer to the Dynamic DNS Support and Access Point System Naming Convention sections for rules on naming the AP.
Location: The location where the AP is installed. Location must be between 1-255 characters.
Contact Name: The name of the person responsible for the AP. Name must be between 1-255 characters.
Contact Email: The email address of the person responsible for the AP. Email must be between 1-255 characters.
Contact Phone: The telephone number of the person responsible for the AP. Phone must be between 1-255 characters.
Object ID: This is a read-only field that displays the Access Point's MIB definition; this information is useful if you are managing the AP using SNMP.
Ethernet MAC Address: This is a read-only field that displays the unique MAC (Media Access Control) address for the Access Point's Ethernet interface. The MAC address is assigned at the factory.
Descriptor: This is a read-only field that reports the Access Point's name, serial number, current image software version, and current bootloader software version.
Up Time: This is a read-only field that displays how long the Access Point has been running since its last reboot.
DNS is a distributed database mapping the user readable names and IP addresses (and more) of every registered system on the Internet. Dynamic DNS is a lightweight mechanism which allows for modification of the DNS data of host systems whose IP addresses change dynamically. Dynamic DNS is usually used in conjunction with DHCP for assigning meaningful names to host systems whose IP addresses change dynamically.
Access Points provide DDNS support by adding the host name (option 12) in DHCP Client messages, which is used by the DHCP server to dynamically update the DNS server.
The Access Point's system name is used as its host name. In order to prevent Access Points with default configurations from registering similar host names in DNS, the default system name of the Access Point is uniquely generated. Access Points generate unique system names by appending the last 3 bytes of the Access Point's MAC address to the default system name.
The system name must be compliant with the encoding rules for host name as per DNS RFC 1123. The DNS host name encoding rules are: Characters have to be alphanumeric or hyphen.
The name cannot start or end with a hyphen.
The name cannot start with a digit.
The number of characters has to be 63 or less. (Currently the system name length is limited to 32 bytes).
Image upgrades could cause the system to boot with an older system name format that is not DNS compliant. To prevent problems with dynamic DNS after an image upgrade, the system name will automatically be converted to a DNS compliant system name.
The rules of conversion of older system names are: If the length is greater than 63 then the string is truncated. (This will not happen since the system name is anyway limited to 31 bytes)
All invalid characters at the beginning or end of the string are replaced with the character 'X'.
All other invalid characters are replaced with hyphens.
You can configure and view the following parameters within the IP Configuration screen: You must reboot the Access Point in order for any changes to the Basic IP or DNS Client parameters take effect.
IP Address: The Access Point's IP address. When IP Address Assignment Type is set to Dynamic, this field is read-only and reports the unit's current IP address. The Access Point will default to 10.0.0.1 if it cannot obtain an address from a DHCP server.
Subnet Mask: The Access Point's subnet mask. When IP Address Assignment Type is set to Dynamic, this field is read-only and reports the unit's current subnet mask. The subnet mask will default to 255.0.0.0 if the unit cannot obtain one from a DHCP server.
Gateway IP Address: The IP address of the Access Point's gateway. When IP Address Assignment Type is set to Dynamic, this field is read-only and reports the IP address of the unit's gateway. The gateway IP address will default to 10.0.0.2 if the unit cannot obtain an address from a DHCP server.
If you prefer to use host names to identify network servers rather than IP addresses, you can configure the AP to act as a Domain Name Service (DNS) client. When this feature is enabled, the Access Point contacts the network's DNS server to translate a host name to the appropriate network IP address. You can use this DNS Client function to identify RADIUS servers by host name. See RADIUS Profiles for details. Enable DNS Client: Place a check mark in the box provided to enable DNS client function. Note that this option must be enabled before you can configure the other DNS Client parameters.
DNS Primary Server IP Address: The IP address of the network's primary DNS server.
DNS Secondary Server IP Address: The IP address of a second DNS server on the network. The Access Point will attempt to contact the secondary server if the primary server is unavailable.
DNS Client Default Domain Name: The default domain name for the Access Point's network (for example, "proxim.com"). Contact your network administrator if you need assistance setting this parameter.
If your network does not have a DHCP Server, you can configure the AP as a DHCP server to assign dynamic IP addresses to Ethernet nodes and wireless clients. Make sure there are no other DHCP servers on the network and do not enable the DHCP server without checking with your network administrator first, as it could bring down the whole network. Also, the AP must be configured with a static IP address before enabling this feature.
When the DHCP Server function is enabled, you can create one or more IP address pools from which to assign addresses to network devices.
DHCP Server Configuration Screen
You can configure and view the following parameters within the DHCP Server Configuration screen: Enable DHCP Server: Place a check mark in the box provided to enable DHCP Server function.
You cannot enable the DHCP Server function unless there is at least one IP Pool Table Entry configured.
Subnet Mask: This field is read-only and reports the Access Point's current subnet mask. DHCP clients that receive dynamic addresses from the AP will be assigned this same subnet mask.
Gateway IP Address: The AP will assign the specified address to its DHCP clients.
Primary DNS IP Address: The AP will assign the specified address to its DHCP clients.
Secondary DNS IP Address: The AP will assign the specified address to its DHCP clients.
Number of IP Pool Table Entries: This is a read-only field that reports the number of IP address pools currently configured.
IP Pool Table Entry: This entry specifies a range of IP addresses that the AP can assign to its wireless clients. The maximum number of entries allowed is 20. Click Add to create a new entry. Click Edit to change an existing entry. Each entry contains the following field:
You must reboot the Access Point before changes to any of these DHCP server parameters take effect.
The Link Integrity feature checks the link between the AP and the nodes on the Ethernet backbone. These nodes are listed by IP address in the Link Integrity IP Address Table. The AP periodically pings the nodes listed within the table. If the AP loses network connectivity (that is, the ping attempts fail), the AP disables its wireless interface until the connection is restored. This forces the unit's wireless clients to switch to another Access Point that still has a network connection. Note that this feature does not affect WDS links (if applicable).
You can configure and view the following parameters within the Link Integrity Configuration screen: Enable Link Integrity: Place a check mark in the box provided to enable Link Integrity.
Poll Interval (milliseconds): The interval between link integrity checks. Range is 500 - 15000 ms in increments of 500 ms; default is 500 ms.
Poll Retransmissions: The number of times a poll should be retransmitted before the link is considered down. Range is 0 to 255; default is 5.
Target IP Address Entry: This entry specifies the IP address of a host on the network that the AP will periodically poll to confirm connectivity. The table can hold up to five entries. By default, all five entries are set to 0.0.0.0. Click Edit to update one or more entries. Each entry contains the following field:
Link Integrity Configuration Screen
From these sub-tabs, you configure the Access Point's operational mode, wireless interface settings and Ethernet settings. You may also configure a Wireless Distribution System (WDS) for AP-to-AP communications.
For the wireless interface configuration, refer to the wireless parameters below that correspond to your radio type.
You can configure and view the following parameters within the Operational Mode screen. Operational Mode: The mode of communication between the wireless clients and the Access Point:
802.11b only
802.11g only
802.11bg
802.11a
802.11g-wifi
Select the transmit power level for interface B from the Wireless-B: Transmit Power Level drop-down menu.
You can configure and view the following parameters within the Wireless Interface Configuration screen for an 802.11a AP: You must reboot the Access Point before any changes to these parameters take effect.
Physical Interface Type: For an 802.11a AP, this field reports: "802.11a (OFDM 5 GHz)." OFDM stands for Orthogonal Frequency Division Multiplexing; this is the name for the radio technology used by 802.11a devices.
MAC Address: This is a read-only field that displays the unique MAC (Media Access Control) address for the Access Point's wireless interface. The MAC address is assigned at the factory.
Regulatory Domain: Reports the regulatory domain for which the AP is certified. Not all features or channels are available in all countries. The available regulatory domains include:
Network Name (SSID): Enter a Network Name (between 1 and 32 characters long) for the wireless network. You must configure each wireless client to use this name as well.
Auto Channel Select: The AP scans the area for other Access Points and selects a free or relatively unused communication channel. This helps prevent interference problems and increases network performance. By default this feature is enabled. See 802.11a Channel Frequencies for a list of Channels.
You cannot disable Auto Channel Select for 802.11a products in Europe (see Dynamic Frequency Selection (DFS) for details).
Frequency Channel: When Auto Channel Select is enabled, this field is read-only and displays the Access Point's current operating Channel. When Auto Channel Select is disabled, you can specify the Access Point's channel. If you decide to manually set the unit's Channel, ensure that nearby devices do not use the same frequency. Available Channels vary based on regulatory domain. See 802.11a Channel Frequencies. Note that you cannot manually set the channel for 802.11a products in Europe (see Dynamic Frequency Selection (DFS) for details).
Transmit Rate: Use the drop-down menu to select a specific transmit rate for the AP. Choose a particular rate available for protocol being used or Auto Fallback. Auto Fallback is the default setting; it allows the AP unit to select the best transmit rate based on the cell size.
DTIM Period: The Deferred Traffic Indicator Map (DTIM) is used with clients that have power management enabled. DTIM should be left at 1, the default value, if any clients have power management enabled. This parameter supports a range between 1 and 255.
RTS/CTS Medium Reservation: This parameter affects message flow control and should not be changed under normal circumstances. Range is 0 to 2347. When set to a value between 0 and 2347, the Access Point uses the RTS/CTS mechanism for packets that are the specified size or greater. When set to 2347 (the default setting), RTS/CTS is disabled. See RTS/CTS Medium Reservation for more information.
Closed System: Check this box to allow only clients configured with the Access Point's specific Network Name to associate with the Access Point. When enabled, a client configured with the Network Name "ANY" cannot connect to the AP. This option is disabled by default. See Broadcast SSID and Closed System for more information.
Wireless Service Status: Select shutdown to shutdown the wireless service on a wireless interface, or resume to resume wireless service. See Wireless Service Status for more information.
802.11a APs sold in Europe use a technique called Dynamic Frequency Selection (DFS) to automatically select an operating channel. During boot-up, the AP scans the available frequency and selects a channel that is free of interference. If the AP subsequently detects interference on its channel, it automatically reboots and selects another channel that is free of interference.
DFS only applies to 802.11a APs used in Europe (i.e., units whose regulatory domain is set to ETSI). The European Telecommunications Standard Institute (ETSI) requires that 802.11a devices use DFS to prevent interference with radar systems and other devices that already occupy the 5 GHz band.
If you are using an 802.11a AP in Europe, keep in mind the following: DFS is not a configurable parameter. It is always enabled and cannot be disabled.
You cannot manually select the device's operating channel; you must let DFS select the channel.
You cannot configure the Auto Channel Select option. Within the HTTP interface, this option always appears enabled.
The 802.11 standard supports optional RTS/CTS communication based on packet size. Without RTS/CTS, a sending radio listens to see if another radio is already using the medium before transmitting a data packet. If the medium is free, the sending radio transmits its packet. However, there is no guarantee that another radio is not transmitting a packet at the same time, causing a collision. This typically occurs when there are hidden nodes (clients that can communicate with the Access Point but are out of range of each other) in very large cells.
When RTS/CTS occurs, the sending radio first transmits a Request to Send (RTS) packet to confirm that the medium is clear. When the receiving radio successfully receives the RTS packet, it transmits back a Clear to Send (CTS) packet to the sending radio. When the sending radio receives the CTS packet, it sends the data packet to the receiving radio. The RTS and CTS packets contain a reservation time to notify other radios (including hidden nodes) that the medium is in use for a specified period. This helps to minimize collisions. While RTS/CTS adds overhead to the radio network, it is particularly useful for large packets that take longer to resend after a collision occurs.
RTS/CTS Medium Reservation is an advanced parameter and supports a range between 0 and 2347 bytes. When set to 2347 (the default setting), the RTS/CTS mechanism is disabled. When set to 0, the RTS/CTS mechanism is used for all packets. When set to a value between 0 and 2347, the Access Point uses the RTS/CTS mechanism for packets that are the specified size or greater. You should not need to enable this parameter for most networks unless you suspect that the wireless cell contains hidden nodes.
The user can shutdown (or resume) the wireless service on the wireless interface of the AP through the CLI, HTTP, or SNMP interface. When the wireless service on a wireless interface is shutdown, the AP will:
In shutdown state, AP will not transmit and receive frames from the wireless interface and will stop transmitting periodic beacons. Moreover, none of the frames received from the Ethernet interface will be forwarded to that wireless interface.
Wireless service on a wireless interface of the AP can be resumed through CLI/HTTP/SNMP management interface. When wireless service on a wireless interface is resumed, the AP will:
After wireless service resumes, the AP resumes beaconing, transmitting and receiving frames to/from the wireless interface and bridging the frames between the Ethernet and the wireless interface. Traps Generated During Wireless Service Shutdown (and Resume)
The following traps are generated during wireless service shutdown and resume, and are also sent to any configured Syslog server.
When the wireless service is shutdown on a wireless interface, the AP generates a trap called oriTrapWirelessServiceShutdown.
When the wireless service is resumed on a wireless interface, the AP generate a trap called oriTrapWirelessServiceResumed. Wireless service can be shutdown/resumed on each wireless interface individually.
Wireless Interface Activity LED and Wireless Service Shutdown
When the wireless service is shutdown on a wireless interface, the Wireless Interface Activity LED for that interface changes to an amber color.
When wireless service is resumed on a wireless interface, the Wireless Interface Activity LED for that interface maintains an OFF state while there is no wireless link activity and changes to green color when there is wireless link activity.
You can configure and view the following parameters within the Wireless Interface Configuration screen for an 802.11b AP: You must reboot the Access Point before any changes to these parameters take effect.
Physical Interface Type: For 802.11b AP, this field reports: "802.11b (DSSS 2.4 GHz)." DSSS stands for Direct Sequence Spread Spectrum; this is the name for the radio technology used by 802.11b devices.
MAC Address: This is a read-only field that displays the unique MAC (Media Access Control) address for the Access Point's wireless interface. The MAC address is assigned at the factory.
Regulatory Domain: Reports the regulatory domain for which the AP is certified. Not all features or channels are available in all countries. The available regulatory domains include:
Network Name (SSID): Enter a Network Name (between 1 and 32 characters long) for the wireless network. You must configure each wireless client to use this name as well.
Auto Channel Select: The AP scans the area for other Access Points and selects a free or relatively unused communication channel. This helps prevent interference problems and increases network performance. By default this feature is enabled; see 802.11b Channel Frequencies for a list of Channels. However, if you are setting up a Wireless Distribution System (WDS), it must be disabled. See Wireless Distribution System (WDS) for more information.
Frequency Channel: When Auto Channel Select is enabled, this field is read-only and displays the Access Point's current operating channel. When Auto Channel Select is disabled, you can specify the Access Point's operating channel. If you decide to manually set the unit's channel, ensure that nearby devices do not use the same frequency (unless you are setting up a WDS). Available Channels vary based on regulatory domain. See 802.11b Channel Frequencies.
Distance Between APs: Set to Large, Medium, Small, Microcell, or Minicell depending on the site survey for your system. By default, this parameter is set to Large. The distance value is related to the Multicast Rate (described next). In general, a larger distance between APs means that your clients operate a slower data rates (on average). This feature is available only if you are using an Orinoco Classic Gold card. See Distance Between APs for more information.
Multicast Rate: Sets the rate at which Multicast messages are sent. This value is related to the Distance Between APs parameter (described previously). The table below displays the possible Multicast Rates based on the Distance between APs setting. By default, this parameter is set to 2 Mbps. This feature is available only if you are using an Orinoco Classic Gold card. See Multicast Rate for more information.
Distance between APs
|
Multicast Rate
|
Large
|
1 and 2 Mbps
|
Medium
|
1, 2, and 5.5 Mbps
|
Small
|
1, 2, 5.5 and 11 Mbps
|
Minicell
|
1, 2, 5.5 and 11 Mbps
|
Microcell
|
1, 2, 5.5 and 11 Mbps
|
DTIM Period: The Deferred Traffic Indicator Map (DTIM) is used with clients that have power management enabled. DTIM should be left at 1, the default value, if any clients have power management enabled. This parameter supports a range between 1 and 255.
RTS/CTS Medium Reservation: This parameter affects message flow control and should not be changed under normal circumstances. Range is 0 to 2347. When set to a value between 0 and 2347, the Access Point uses the RTS/CTS mechanism for packets that are the specified size or greater. When set to 2347 (the default setting), RTS/CTS is disabled. See RTS/CTS Medium Reservation for more information.
Interference Robustness: Enable this option if other electrical devices in the 2.4 GHz frequency band (such as a microwave oven or a cordless phone) may be interfering with the wireless signal. The AP will automatically fragment large packets into multiple smaller packets when interference is detected to increase the likelihood that the messages will be received in the presence of interference. The receiving radio reassembles the original packet once all fragments have been received. This feature is available only if you are using an Orinoco Classic Gold card. This option is disabled by default.
Closed System: Check this box to allow only clients configured with the Access Point's specific Network Name to associate with the Access Point. When enabled, a client configured with the Network Name "ANY" cannot connect to the AP. This option is disabled by default. See Broadcast SSID and Closed System for more information.
Wireless Service Status: Select shutdown to shutdown the wireless service on a wireless interface, or resume to resume wireless service. See Wireless Service Status for more information.
Load Balancing: Enable this option so clients can evaluate which Access Point to associate with, based on current AP loads. This feature is enabled by default; it helps distribute the wireless load between APs. This feature is not available if you are using an ORiNOCO ComboCard or a non-ORiNOCO client with the AP.
Medium Density Distribution: When enabled, the Access Point automatically notifies wireless clients of its Distance Between APs, Interference Robustness, and RTS/CTS Medium Reservation settings. This feature is enabled by default and allows clients to automatically adopt the values used by its current Access Point (even if these values differ from the client's default values or from the values supported by other Access Points). Note that this feature is available only if you are using an Orinoco Classic Gold card. Proxim recommends that you leave this parameter enabled, particularly if you have ORiNOCO clients on your wireless network (leaving this parameter enabled should not adversely affect the performance of any ORiNOCO ComboCards or non-ORiNOCO cards on your network).
Distance Between APs: Distance Between APs defines how far apart (physically) your AP devices are located, which in turn determines the size of your cell. Cells of different sizes have different capacities and, therefore, suit different applications. For instance, a typical office has many stations that require high bandwidth for complex, high-speed data processing. In contrast, a typical warehouse has a few forklifts requiring low bandwidth for simple transactions. This feature is available only if you are using an Orinoco Classic Gold card.
Cell capacities are compared in the following table, which shows that small cells suit most offices and large cells suit most warehouses:
The number of Access Points in a set area determines the network coverage for that area. A large number of Access Points covering a small area is a high-density cell. A few Access Points, or even a single unit, covering the same small area would result in a low-density cell, even though in both cases the actual area did not change - only the number of Access Points covering the area changed.
In a typical office, a high density area consists of a number of Access Points installed every 20 feet and each Access Point generates a small radio cell with a diameter of about 10 feet. In contrast, a typical warehouse might have a low density area consisting of large cells (with a diameter of about 90 feet) and Access Points installed every 200 feet.
Low Density vs. Ultra High Density Network
The Distance Between Cells parameter supports five values: Large, Medium, Small, Minicell, and Microcell. The distance between APs should not be approximated. It is calculated by means of a manual Site Survey, in which an AP is set up and clients are tested throughout the area to determine signal strength and coverage, and local limits such as physical interference are investigated. From these measurements the appropriate cell size and density is determined, and the optimum distance between APs is calculated to suit your particular business requirements. Contact your reseller for information on how to conduct a Site Survey.
The multicast rate determines the rate at which broadcast and multicast packets are transmitted by the Access Point to the wireless network. Stations that are closer to the Access Point can receive multicast packets at a faster data rate than stations that are farther away from the AP. Therefore, you should set the Multicast Rate based on the size of the Access Point's cell. For example, if the Access Point's cell is very small (e.g., Distance Between APs is set to Microcell), you can expect that all stations should be able to successfully receive multicast packets at 11 Mbps so you can set Multicast Rate to 11 Mbps. However, if the Access Point's cell is large, you need to accommodate stations that may not be able to receive multicast packets at the higher rates; in this case, you should set Multicast Rate to 1 or 2 Mbps.
1 Mbsp and 11 Mbsp Multicast Rates
There is an inter-dependent relationship between the Distance between APs and the Multicast Rate. In general, larger systems operate at a lower average transmit rate. The variation between Multicast Rate and Distance Between APs is presented in the following table:
|
1.0 Mbsp
|
2.0 Mbsp
|
5.5 Mbsp
|
11 Mbsp
|
Large
|
yes
|
yes
|
|
|
Medium
|
yes
|
yes
|
yes
|
|
Small
|
yes
|
yes
|
yes
|
yes
|
Minicell
|
yes
|
yes
|
yes
|
yes
|
Microcell
|
yes
|
yes
|
yes
|
yes
|
The Distance Between APs must be set before the Multicast Rate, because when you select the Distance Between APs, the appropriate range of Multicast values automatically populates the drop-down menu. This feature is not available if you are using an ORiNOCO ComboCard or a non-ORiNOCO client with the AP.
You can configure the following radio parameters for an 802.11b/g AP: You must reboot the Access Point before any changes to these parameters take effect.
Operational Mode: An 802.11b/g wireless interface can be configured to operate in the following modes:
In general, you should use either 802.11g only mode (if you want to support 802.11g devices only) or 802.11b/g mode to support a mix of 802.11b and 802.11g devices.
Physical Interface Type: Depending on the Operational Mode, this field reports:
OFDM stands for Orthogonal Frequency Division Multiplexing; this is the name for the radio technology used by 802.11a devices. DSSS stands for Direct Sequence Spread Spectrum; this is the name for the radio technology used by 802.11b devices.
MAC Address: This is a read-only field that displays the unique MAC (Media Access Control) address for the Access Point's wireless interface. The MAC address is assigned at the factory.
Regulatory Domain: Reports the regulatory domain for which the AP is certified. Not all features or channels are available in all countries. The available regulatory domains include:
Network Name (SSID): Enter a Network Name (between 1 and 32 characters long) for the wireless network. You must configure each wireless client to use this name as well.
Auto Channel Select: The AP scans the area for other Access Points and selects a free or relatively unused communication channel. This helps prevent interference problems and increases network performance. By default this feature is enabled; see 802.11g Channel Frequencies for a list of Channels.
Frequency Channel: When Auto Channel Select is enabled, this field is read-only and displays the Access Point's current operating channel. When Auto Channel Select is disabled, you can specify the Access Point's operating channel. If you decide to manually set the unit's channel, ensure that nearby devices do not use the same frequency (unless you are setting up a WDS). Available Channels vary based on regulatory domain. See 802.11g Channel Frequencies.
Transmit Rate: Select a specific transmit rate for the AP. The values available depend on the Operational Mode. Auto Fallback is the default setting; it allows the AP to select the best transmit rate based on the cell size.
DTIM Period: The Deferred Traffic Indicator Map (DTIM) is used with clients that have power management enabled. DTIM should be left at 1, the default value, if any clients have power management enabled. This parameter supports a range between 1 and 255.
RTS/CTS Medium Reservation: This parameter affects message flow control and should not be changed under normal circumstances. Range is 0 to 2347. When set to a value between 0 and 2347, the Access Point uses the RTS/CTS mechanism for packets that are the specified size or greater. When set to 2347 (the default setting), RTS/CTS is disabled. See RTS/CTS Medium Reservation for more information.
Closed System: Check this box to allow only clients configured with the Access Point's specific Network Name to associate with the Access Point. When enabled, a client configured with the Network Name "ANY" cannot connect to the AP. This option is disabled by default. See Broadcast SSID and Closed System for more information.
A Wireless Distribution System (WDS) creates a link between two 802.11a, 802.11b, or 802.11b/g APs over their radio interfaces. This link relays traffic from one AP that does not have Ethernet connectivity to a second AP that has Ethernet connectivity. WDS allows you to configure up to six (6) point-to-point links between Access Points.
In the WDS Example below, AP 1 and AP 2 communicate over a WDS link (represented by the blue line). This link provides Client 1 with access to network resources even though AP 1 is not directly connected to the Ethernet network. Packets destined for or sent by the client are relayed between the Access Points over the WDS link.
Each WDS link is mapped to a logical WDS port on the AP. WDS ports behave like Ethernet ports rather than like standard wireless interfaces: on a BSS port, an Access Point learns by association and from frames; on a WDS or Ethernet port, an Access Point learns from frames only. When setting up a WDS, keep in mind the following: The WDS link shares the communication bandwidth with the clients. Therefore, while the maximum data rate for the Access Point's cell is still 11 Mb, client throughput will decrease when the WDS link is active.
If there is no partner MAC address configured in the WDS table, the WDS port remains disabled.
Each WDS port on a single AP should have a unique partner MAC address. Do not enter the same MAC address twice in an AP's WDS port list.
Each Access Point that is a member of the WDS must have the same Channel setting to communicate with each other.
Each Access Point that is a member of the WDS must have the same network domain.
Each Access Point that is a member of the WDS must have the same WEP Encryption settings. WDS does not use 802.1x. Therefore, if you want to encrypt the WDS link, you must configure each Access Point to use WEP encryption, and each Access Point must have the same Encryption Key(s). See SSID/VLAN/Security.
If your network does not support spanning tree, be careful to avoid creating network loops between APs. For example, creating a WDS link between two Access Points connected to the same Ethernet network will create a network loop (if spanning tree is disabled). For more information, refer to the Spanning Tree section.
You must disable Auto Channel Select to create a WDS. Each Access Point that is a member of the WDS must have the same Channel setting to communicate with each other.
For radio cards that belong to the ETSI regulatory domain, ACS is enabled by default, and cannot be disabled. Therefore, it is not possible to set up a WDS link. This only applies to ETSI 802.11a wireless radios.
To setup a wireless backbone follow the steps below for each AP that you wish to include in the Wireless Distribution System.
1. Confirm that Auto Channel Select is disabled.
2. Write down the MAC Address of the radio that you wish to include in the Wireless Distribution System.
3. Click on Interfaces > Wireless-A or Wireless-B.
4. Scroll down to the Wireless Distribution System heading.
5. Click the Edit button to update the Wireless Distribution System (WDS) Table.
The WDS Configuration screen will be displayed.
6. If desired, enable security by checking the Enable WDS Security Mode box.
7. If security mode is enabled, enter a value for Encryption Key 0.
9. Enter the MAC Address that you wrote down in Step 2 in one of the Partner MAC Address field of the Wireless Distribution Setup window.
10. Set the Status of the device to Enable.
11. Click OK.
Select the desired speed and transmission mode from the drop-down menu. Half-duplex means that only one side can transmit at a time and full-duplex allows both sides to transmit. When set to auto-duplex, the AP negotiates with its switch or hub to automatically select the highest throughput option supported by both sides.
For best results, Proxim recommends that you configure the Ethernet setting to match the speed and transmission mode of the device the Access Point is connected to (such as a hub or switch). If in doubt, leave this setting at its default, auto-speed-auto-duplex. Choose between:
10 Mbit/s - half duplex, full duplex, or auto duplex
100 Mbit/s - half duplex or full duplex
auto speed - half duplex or auto duplex
The Management tab contains five sub-tabs.
The following passwords are configurable:
SNMP Read Community Password: The password for read access to the AP using SNMP. Enter a password in both the Password field and the Confirm field. This password must be between 6 and 32 characters. The default password is "public".
SNMP Read/Write Community Password: The password for read and write access to the AP using SNMP. Enter a password in both the Password field and the Confirm field. This password must be between 6 and 32 characters. The default password is "public".
SNMPv3 Authentication Password: The password used when sending authenticated SNMPv3 messages. Enter a password in both the Password field and the Confirm field. This password must be between 6 and 32 characters, but a length of at least at least 8 characters is recommended. The default password is "public". Secure Management (Services tab) must be enabled to configure SNMPv3.
The default SNMPv3 username is administrator, with SHA authentication, and DES privacy protocol.
SNMPv3 Privacy Password: The password used when sending encrypted SNMPv3 data. Enter a password in both the Password field and the Confirm field. This password must be between 6 and 32 characters, but a length of at least at least 8 characters is recommended. The default password is "public". Secure Management (Services tab) must be enabled to configure SNMPv3.
Telnet (CLI) Password: The password for the CLI interface (via serial or Telnet). Enter a password in both the Password field and the Confirm field. This password must be between 6 and 32 characters. The default password is "public".
HTTP (Web) Password: The password for the Web browser HTTP interface. Enter a password in both the Password field and the Confirm field. This password must be between 6 and 32 characters. The default password is "public".
For security purposes Proxim recommends changing ALL PASSWORDS from the default "public" immediately, to restrict access to your network devices to authorized personnel. If you lose or forget your password settings, you can always perform the Reset to Factory Default Procedure.
The Management IP Access table limits in-band management access to the IP addresses or range of IP addresses specified in the table. This feature applies to all management options (SNMP, HTTP, and CLI) except for CLI management over the serial port. To configure this table, click Add and set the following parameters:
IP Address: Enter the IP Address for the management station.
IP Mask: Enter a mask that will act as a filter to limit access to a range of IP Addresses based on the IP Address you already entered. Comment: Enter an optional comment, such
as the station name.
To edit or delete an entry, click Edit. Edit
the information, or select Enable, Disable, or Delete
from the Status pull-down menu.
You can configure the following management services:
You must reboot the Access Point if you change
the HTTP Port or Telnet Port.
Secure Management allows the use of encrypted and
authenticated communication protocols such as SNMPv3, and Secure Socket Link
(SSL), to manage the Access Point. Secure Management
Status: Enables the further configuration of HTTPS Access, and SNMPv3.
After enabling Secure Management, you can choose to configure HTTPS (SSL)
access on the Services tab, and configure SNMPv3 passwords on the Passwords
tab.
HTTP Port: Configure the HTTP port
from which you will manage the AP via the Web interface. By default, the HTTP
port is 80. You must reboot the Access Point if you change the HTTP Port.
HTTP Setup Wizard: The Setup Wizard appears
automatically the first time you access the HTTP interface. If you exited
out of the Setup Wizard and want to relaunch it, enable this option, click
OK, and then close your browser or reboot the AP. The Setup Wizard
will appear the next time you access the HTTP interface.
HTTPS (Secure Web Status): The user can
access the AP in a secure fashion using Secure Socket Layer (SSL) over port
443. The AP comes pre-installed with all required SSL files: default certificate
and private key installed. Check this box to enable SSL on the AP.
SSL Certificate Passphrase: After enabling
SSL, the only configurable parameter is the SSL passphrase. The default SSL
passphrase is proxim.
The AP supports SSLv3 with a 128-bit encryption certificate
maintained by the AP for secure communications between the AP and the HTTP
client. All communications are encrypted using the server and the client-side
certificate.
If you decide to upload a new certificate and private
key (using TFTP or HTTP File Transfer), you need to change the SSL Certificate
Passphrase for the new SSL files.
SSL requires Internet Explorer version 6, 128 bit
encryption, Service Pack 1, and patch Q323308.
You need to reboot the AP after enabling or disabling
SSL for the changes to take effect.
Management Services Configuration Screen
Telnet Interface Bitmask: Select the interface
(Ethernet, Wireless-Slot A, Wireless-Slot B, All Interfaces)
from which you can manage the AP via telnet. This parameter can also be used
to Disable telnet management.
Telnet Port: The default port number for
Telnet applications is 23. However, you can use this field if you want to
change the Telnet port for security reasons (but your Telnet application also
must support the new port number you select). You must reboot the Access Point
if you change the Telnet Port.
Login Idle Timeout (seconds): Enter the number
of seconds the system will wait for a login attempt. The AP terminates the
session when it times out. The range is 1 to 300 seconds; the default is 30
seconds.
Session Idle Timeout (seconds): Enter the
number of seconds the system will wait during a session while there is no
activity. The AP will terminate the session on timeout. The range is 1 to
36000 seconds; the default is 900 seconds.
The AP supports SSH version 2, for secure remote
CLI (Telnet) sessions. SSH provides strong authentication and encryption of
session data.
The SSH server (AP) has host keys - a pair
of assymetric keys - a private key that resides on the AP and a public
key that is distributed to clients that need to connect to the AP. As
the client has knowledge of the server host keys, the client can verify that
it is communicating with the correct SSH server. The client authentication
can be performed in two ways:
An SSH session is setup through the following process:
The SSH server public key is transferred to the client
using out-of-band or in-band mechanisms.
The SSH client verifies the correctness of the server
using the server's public key.
The user/client authenticates to the server.
An encrypted data session starts. The maximum number
of SSH sessions is limited to two. If there is no activity for a specified
amount of time (the Telnet Session Timeout parameter), the AP will timeout
the connection.
The following SSH clients have been verified to interoperate
with the AP's server. The following table lists the clients, version number,
and the website of the client.
For key generation, OpenSSH client has been verified.
Perform the following procedure to enable or disable
SSH and set the SSH host key:
When Secure Management is enabled on the AP,
SSH will be enabled by default and cannot be disabled.
Host keys must either be generated externally
and uploaded to the AP (see Uploading
Externally Generated Host Keys), generated manually, or auto-generated
at the time of SSH initialization if SSH is enabled and no host keys are
present. There is no key present in an AP that is in a factory default
state.
To manually generate or delete host keys on the
AP:
SSH Host key creation may take 3 to 4 minutes during
which time the AP may not respond.
Perform the following procedure to upload externally
generated host keys to the AP. You must upload both the SSH public key and
SSH private key for SSH to work.
Uploading an Externally Generated SSH Public
Key and SSH Private Key
The fingerprint of the new SSH public key will be
displayed in the Management -> Services page.
The serial port interface on the AP is enabled at
all times. See Setting IP Address using
Serial Port for information on how to access the CLI interface via the
serial port. You can configure and view following parameters:
Serial Baud Rate: Select the serial port speed (bits per second).
Choose between 2400, 4800, 9600, 19200, 38400, or 57600; the default Baud
Rate is 9600.
Serial Flow Control: Select either None
(default) or Xon/Xoff (software controlled) data flow control.
To avoid potential problems when communicating with
the AP through the serial port, Proxim recommends that you leave the Flow
Control setting at None (the default value).
Serial Data Bits: This is a read-only field
and displays the number of data bits used in serial communication (8 data
bits by default).
Serial Parity: This is a read-only field
and displays the number of parity bits used in serial communication (no parity
bits by default).
Serial Stop Bits: This is a read-only field
that displays the number of stop bits used in serial communication (1 stop
bit by default).
The serial port bit configuration is commonly referred
to as 8N1.
User management of APs can be centralized by using
a RADIUS server to store user credentials. The AP cross-checks credentials
using RADIUS protocol and the RADIUS server accepts or rejects the user.
HTTP/HTTPS and Telnet/SSH users can be managed with
RADIUS. Serial CLI and SNMP cannot be managed by RADIUS. Two types of users
can be supported using centralized RADIUS management:
When RADIUS Based Management is enabled, a local
user can be configured to provide Telnet, SSH, and HTTP(S) access to the
AP when RADIUS servers fail. The local user has super user capabilities. When
secure management is enabled, the local user can only login using secure means
(i.e., SSH or SSL). When the local user option is disabled the only access
to the AP when RADIUS servers are down will be through serial CLI or SNMP.
The Radius Based Management Access parameters allows
you to enable HTTP or Telnet Radius Management Access, to configure a RADIUS
Profile for management access control, and to enable or disable local user
access, and configure the local user password. You can configure and view
the following parameters: HTTP RADIUS Access Control
Status: Enable RADIUS management of HTTP/HTTPS users.
Telnet RADIUS Access Control Status: Enable
RADIUS management of Telnet/SSH users.
RADIUS Profile for Management Access Control:
Specifies the RADIUS Profile to be used for RADIUS Based Management Access.
Local User Status: Enables or disables the
local user when RADIUS Based Management is enabled. The default local user
ID is root.
Local User Password and Confirm Password:
The default local user password is public. "Root" cannot be configured as
a valid user for Radius based management access when local user access is
enabled.
The Automatic Configuration feature which allows
an AP to be automatically configured by downloading a specific configuration
file from a TFTP server during the boot up process.
Automatic Configuration is disabled by default. The
configuration process for Automatic Configuration varies depending on whether
the AP is configured for dynamic or static IP.
When an AP is configured for dynamic IP, the Configuration
filename and the TFTP server IP address are contained in the DHCP response
when the AP gets its IP address dynamically from the DHCP server. When configured
for static IP, these parameters are instead configured in the AP interface.
After setting up automatic configuration you must
reboot the AP. When the AP reboots it receives the new configuration information
and must reboot one additional time. If Syslog is configured, a Syslog message
will appear indicating the success or failure of the Automatic Configuration.
The Auto Configuration feature allows download of
the TLV (tag, length, value) format configuration file or the CLI Batch file.
The AP detects whether the file uploaded is TLV format or a CLI Batch file.
If the AP detects a CLI Batch file (a file with extension .cli), the AP executes
the file immediately.
The AP will reboot after executing the CLI Batch
file. Auto Configuration will not result in repeated reboots if the CLI Batch
file contains rebootable parameters.
For more information, refer to CLI
Batch File.
Perform the following procedure to enable and set
up Automatic Configuration when you have a static IP address for the TFTP
server.
The Automatic Configuration Screen
appears.
The default filename is "config". The default
TFTP IP address is "10.0.0.2" for AP-2000.
AutoConfig for Static IP
Automatic Configuration Screen
Perform the following procedure to enable and set
up Automatic Configuration when you have a dynamic IP address for the TFTP
server via DHCP.
The Configuration filename and the TFTP server IP
address are contained in the DHCP response when the AP gets its IP address
dynamically from the DHCP server. A Syslog server address is also contained
in the DHCP response, allowing the AP to send Auto Configuration success and
failure messages to a Syslog server. The configuration
filename and TFTP server IP address are configured only when the AP is configured
for Static IP. If the AP is configured for Dynamic IP these parameters are
not used and obtained from DHCP.
The Automatic Configuration Screen
appears.
When the AP is Configured with Dynamic IP, the
DHCP server should be configured with the TFTP Server IP address ("Boot
Server Host Name", option 66) and Configuration file ("Bootfile
name", option 67) as follows (note that this example uses a Windows
2000 server):
The DHCP Options: Scope Screen appears.
AutoConfig for Dynamic IP Hardware Configuration Reset Status is a parameter
that defines the hardware configuration reset behavior of the AP (i.e., what
effect pressing the reload button has on an AP operating in normal operating
mode).
If a user loses or forgets the AP's HTTP/Telnet/SNMP
password, the reset button on the AP provides a way to reset the AP to default
configuration values to gain access to the AP. However, in AP deployments
where physical access to the AP is not protected, an unauthorized person could
reset the AP to factory defaults and thus gain control of the AP. The user
can disable the hardware configuration reset function to prevent unauthorized
access.
The hardware configuration reset feature operates
as follows: When hardware configuration reset is enabled,
the user can press the hardware reload button for 10 seconds when the AP is
in normal operational mode in order to delete the AP configuration.
When hardware configuration reset is disabled, pressing
the reload button when the AP is in normal operational mode does not have
any effect on the AP.
The hardware configuration reset parameter does
not have any effect on the function of the reload button to delete the AP
image during AP boot loaded execution.
The default hardware configuration reset status
is enabled. When disabling hardware configuration reset, the user is recommended
to configure a configuration reset password. A configuration reset option
appears on the serial port during boot up, before the AP reads its configuration
and initializes.
Whenever the AP is reset to factory default configuration,
hardware configuration reset status is enabled and the configuration reset
password is set to the default, "public".
If secure mode is enabled in the AP, only secure
(SSL, SNMPv3, SSH) users can modify the values of the Hardware Configuration
Reset Status and the configuration reset password.
If hardware configuration reset is disabled, the
user gets prompted by a configuration reset option to reset the AP to factory
defaults during boot up from the serial interface. By pressing a key sequence
(ctrl-R), the user gets prompted to enter a configuration reset password before
the configuration is reset. It is important to safely
store the configuration reset password. If a user forgets the configuration
reset password, the user will be unable to reset the AP to factory default
configuration if the AP becomes inaccessible and the hardware configuration
reset function is disabled.
Perform the following procedure to configure Hardware
Configuration Reset and to set the Configuration Reset Password.
It is important to safely store the configuration
reset password. If a user forgets the configuration reset password, the
user will be unable to reset the AP to factory default configuration if
the AP becomes inaccessible and the hardware configuration reset function
is disabled.
The AP prompts the user with the message: "Press
ctrl-R in 3 seconds to choose configuration reset option."
The AP prompts the user with "Press ctrl-Z to
continue with normal boot up or enter password to reset configuration."
If the user enters ctrl-Z, the AP continues to boot with the stored configuration.
When the correct configuration reset password
is entered, the AP gets reset to factory defaults and displays the message
"AP has been reset to Factory Default Settings." The AP continues to boot
up. If an incorrect configuration reset password is entered, the AP shows
an error message and reprompts the user. If the incorrect password is
entered three times in a row, the AP proceeds to boot up.
The Access Point's Packet Filtering features
help control the amount of traffic exchanged between the wired and wireless
networks. There are four sub-tabs under the Filtering tab:
The Ethernet Protocol Filter blocks or forwards packets
based on the Ethernet protocols they support.
Follow these steps to configure the Ethernet Protocol
Filter:
Ethernet: Packets are examined at the
Ethernet interface
Wireless - Slot A: Packets are examined
at the Wireless A interface
Wireless - Slot B: Packets are examined
at the Wireless B interface
All Interfaces: Packets are examined
at both interfaces
If set to Passthru, only the enabled
Ethernet Protocols listed in the Filter Table will pass through the bridge.
If set to Block, the bridge will block
enabled Ethernet Protocols listed in the Filter Table.
To edit or delete an entry, click Edit and change the information, or select Enable, Disable, or Delete from the Status drop-down menu.
An entry's status must be enabled in order for the protocol to be subject to the filter.
4. Reboot the AP for any changes to the Ethernet Protocol Filter Table to take effect.
The Static MAC Address filter optimizes the performance of a wireless (and wired) network. When this feature is properly configured, the AP can block traffic between wired devices and wireless devices based on MAC address.
For example, you can set up a Static MAC filter to prevent wireless clients from communicating with a specific server on the Ethernet network. You can also use this filter to block unnecessary multicast packets from being forwarded to the wireless network.
The Static MAC Filter is an advanced feature. You may find it easier to control wireless traffic via other filtering options, such as Ethernet Protocol Filtering.
Each static MAC entry contains the following fields:
Comment: This field is optional.
Each MAC Address or Mask is comprised of 12 hexadecimal digits (0-9, A-F) that correspond to a 48-bit identifier. (Each hexadecimal digit represents 4 bits (0 or 1).)
Taken together, a MAC Address/Mask pair specifies an address or a range of MAC addresses that the AP will look for when examining packets. The AP uses Boolean logic to perform an "AND" operation between the MAC Address and the Mask at the bit level. However, for most users, you do not need to think in terms of bits. It should be sufficient to create a filter using only the hexadecimal digits 0 and F in the Mask (where 0 is any value and F is the value specified in the MAC address). A Mask of 00:00:00:00:00:00 corresponds to all MAC addresses, and a Mask of FF:FF:FF:FF:FF:FF applies only to the specified MAC Address.
For example, if the MAC Address is 00:20:A6:12:54:C3 and the Mask is FF:FF:FF:00:00:00, the AP will examine the source and destination addresses of each packet looking for any MAC address starting with 00:20:A6. If the Mask is FF:FF:FF:FF:FF:FF, the AP will only look for the specific MAC address (in this case, 00:20:A6:12:54:C3).
When creating a filter, you can configure the Wired parameters only, the Wireless parameters only, or both sets of parameters. Which parameters to configure depends upon the traffic that you want block:
To create an entry, click Add and enter the appropriate MAC addresses and Masks to setup a filter. The entry is enabled automatically when saved. To edit an entry, click Edit. To disable or remove an entry, click Edit and change the Status field from Enable to Disable or Delete.
Static MAC Configuration Screen
Consider a network that contains a wired server and three wireless clients. The MAC address for each unit is as follows:
Configure the following settings to prevent the Wired Server and Wireless Client 1 from communicating:
Wired MAC Address: 00:40:F4:1C:DB:6A
Wireless MAC Address: 00:02:2D:51:94:E4
Wireless Mask: FF:FF:FF:FF:FF:FF
Result: Traffic between the Wired Server and Wireless Client 1 is blocked. Wireless Clients 2 and 3 can still communicate with the Wired Server.
Configure the following settings to prevent Wireless Clients 1 and 2 from communicating with the Wired Server.
Wired MAC Address: 00:40:F4:1C:DB:6A
Wireless MAC Address: 00:02:2D:51:94:E4
Wireless Mask: FF:FF:FF:00:00:00
Result: When a logical "AND" is performed on the Wireless MAC Address and Wireless Mask, the result corresponds to any MAC address beginning with the 00:20:2D prefix. Since Wireless Client 1 and Wireless Client 2 share the same prefix (00:02:2D), traffic between the Wired Server and Wireless Clients 1 and 2 is blocked. Wireless Client 3 can still communicate with the Wired Server since it has a different prefix (00:20:A6).
Configure the following settings to prevent all three Wireless Clients from communicating with Wired Server 1.
Wired MAC Address: 00:40:F4:1C:DB:6A
Wireless MAC Address: 00:00:00:00:00:00
Wireless Mask: 00:00:00:00:00:00
Result: The Access Point blocks all traffic between Wired Server 1 and all wireless clients.
Configure the following settings to prevent Wireless Client 3 from communicating with any device on the Ethernet.
Wired MAC Address: 00:00:00:00:00:00
Wireless MAC Address: 00:20:A6:12:4E:38
Wireless Mask: FF:FF:FF:FF:FF:FF
Result: The Access Point blocks all traffic between Wireless Client 3 and the Ethernet network.
If there are devices on your Ethernet network that use multicast packets to communicate and these packets are not required by your wireless clients, you can set up a Static MAC filter to preserve wireless bandwidth. For example, if routers on your network use a specific multicast address (such as 01:00:5E:00:32:4B) to exchange information, you can set up a filter to prevent these multicast packets from being forwarded to the wireless network:
Wired MAC Address: 01:00:5E:00:32:4B
Wireless MAC Address: 00:00:00:00:00:00
Wireless Mask: 00:00:00:00:00:00
Result: The Access Point does not forward any packets that have a destination address of 01:00:5E:00:32:4B to the wireless network.
You can configure the following advanced filtering options:
Enable Proxy ARP: Place a check mark in the box provided to allow the Access Point to respond to Address Resolution Protocol (ARP) requests for wireless clients. When enabled, the AP answers ARP requests for wireless stations without actually forwarding them to the wireless network. If disabled, the Access Point will bridge ARP requests for wireless clients to the wireless LAN.
Enable IP/ARP Filtering: Place a check mark in the box provided to allow IP/ARP filtering based on the IP/ARP Filtering Address and IP Mask. Leave the box unchecked to prevent filtering. If enabled, you should also configure the IP/ARP Filtering Address and IP/ARP IP Mask.
IP/ARP Filtering Address: Enter the Network filtering IP Address.
IP/ARP IP Mask: Enter the Network Mask IP Address.
The following protocols are listed in the Advanced Filter Table:
The AP can filter these protocols in the wireless-to-Ethernet direction, the Ethernet-to-wireless direction, or in both directions. Click Edit and use the Status field to Enable or Disable the filter.
Port-based filtering enables you to control wireless user access to network services by selectively blocking TCP/UDP protocols through the AP. A user specifies a Protocol Name, Port Number, Port Type (TCP, UDP, or TCP/UDP), and filtering interfaces ( Ethernet, Wireless A only, Wireless A and Ethernet, Wireless B only, Wireless B and Ethernet, All Interfaces) in order to block access to services, such as Telnet and FTP, and traffic, such as NETBIOS and HTTP.
For example, an AP with the following configuration would discard frames received on its Ethernet interface with a UDP destination port number of 137, effectively blocking NETBIOS Name Service packets.
Name Service
Ethernet
The AP can be configured to generate and send alarms/notifications/traps as version 1 or a version 2c. Use the drop-down menu to select SNMP alarm type.
There are seven alarm groups that can be enabled or disabled via the Web interface. Place a check mark in the box provided to enable a specific group. Remove the check mark from the box to disable the alarms. Alarm Severity Levels vary.
Wireless Interface/Card Trap Group
In addition, the AP supports these standard traps, which are always enabled:
RFC 1215-Trap
All these alarm groups correspond to System Alarms that are displayed in the System Status screen, including the traps that are sent by the AP to the SNMP managers specified in the Alarm Host Table.
Critical alarms will often result in severe disruption in network activity or an automatic reboot of the AP
Major alarms are usually activated due to a breach in the security of the system. Clients cannot be authenticated or an attempt at unauthorized access into the AP has been detected.
Informational alarms are there to provide the network administrator with some general information about the activities the AP is performing.
To add an entry and enable the AP to send SNMP trap messages to a Trap Host, click Add, and then specify the IP Address and Password for the Trap Host.
Up to 10 entries are possible in the Alarm Host table.
IP Address: Enter the Trap Host IP Address.
Password: Enter the password in the Password field and the Confirm field.
Comment: Enter an optional comment, such as the alarm (trap) host station name.
To edit or delete an entry, click Edit. Edit the information, or select Enable, Disable, or Delete from the Status drop-down menu.
The Syslog messaging system enables the AP to transmit event messages to a central server for monitoring and troubleshooting. The AP can send messages to multiple Syslog servers. The access point logs "Session Start (Log-in)" and "Session Stop (Log-out)" events for each wireless client as an alternative to RADIUS accounting.
See RFC 3164 at http://www.rfc-editor.org for more information on the Syslog standard.
Syslog Events are logged according to the level of detail specified by the administrator. Logging only urgent system messages will create a far smaller, more easily read log then a log of every event the system encounters. Determine which events to log by selecting a priority defined by the following scale:
You can configure the following Syslog settings from the HTTP interface:
Enable Syslog: Place a check mark in the box provided to enable system logging.
Syslog Port Number: This field is read-only and displays the port number (514) assigned for system logging.
Syslog Lowest Priority Logged: The AP will send event messages to the Syslog server that correspond to the selected priority and above. For example, if set to 6, the AP will transmit event messages labeled priority 0 to 6 to the Syslog server(s). This parameter supports a range between 1 and 7; 6 is the default.
Syslog Heartbeat Status: Enables or disables the sending of heartbeat messages from the AP to the configured Syslog servers.
Syslog Heartbeat Interval: Specifies the interval (in seconds) at which Syslog Heartbeat messages are sent to the configured Syslog servers.
Syslog Host Table: This table specifies the IP addresses of a network servers that the AP will send Syslog messages to. Click Add to create a new entry. Click Edit to change an existing entry. Each entry contains the following field:
The following messages are supported in the AP:
The Rogue AP Detection (RAD) feature provides an additional security level for wireless LAN deployments. Rogue AP detection provides a mechanism for detecting Rogue Access Points by utilizing the coverage of the trusted Access Point deployment.
The Rogue AP Scan employs background scanning using low-level 802.11 scanning functions for effective wireless detection of Access Points in its coverage area with minimal impact on the normal operation of the Access Point.
This RAD feature can be enabled on an Access Point via its HTTP, CLI, or SNMP Interfaces. The scan repetition duration is configurable. If the Access Point uses directional antennas to provide directional coverage, then the interface bitmask can be configured to maximize the scanning coverage area. The Access Point will periodically scan the wireless network and report all the available Access Points within its coverage area using SNMP traps. For additional reliability the results are stored in the Access Point in a table, which can be queried via SNMP. The BSSID and Channel number of the detected Access Points are provided in the scan results.
The RAD scan is done on a channel list initialized based on the regulatory domain of the device. The RAD Scan then performs background scanning on all the channels in this channel list using 802.11 MAC scanning functions. It will either actively scan the network by sending probe requests or passively scan by only listening for beacons. The access point information is then gathered from the probe responses and beacons.
To minimize traffic disruption and maximize the scanning efficiency, the RAD feature employs an enhanced background-scanning algorithm and uses the CTS to Self mechanism to keep the clients silent. The scanning algorithm allows traffic to be serviced between each channel scan. Before start of every scan (except scan on the working channel) the CTS to self-mechanism is used to set the NAV values of clients to keep them silent during the scanning period. In addition, the scan repetition duration can also be configured to reduce the frequency of RAD scan cycles to maximize Access Point performance.
The RAD feature can be configured/monitored via the HTTP, CLI, or SNMP management interfaces.
The following management options are provided:
The RAD feature can be enabled or disabled.
The repetition interval of RAD can be configured.
The interface on which RAD can operate can be configured.
SNMP Traps are sent after completion of a RAD scan cycle and also whenever a new Access Point is detected.
Example Rogue AP Detection Deployment
Additionally, the RAD scan results are maintained in a table that can be queried via SNMP. The system administrator has to enable RAD on the Access Points in the wireless network and also configure the Trap Host on all these Access Points to the IP address of the management station. The Access Points on detecting a new Access Point sends a RAD Scan Result Trap to the management station.
An example network deployment is shown. The Trusted AP has Rogue Access Detection enabled and the trap host is configured to be the management station. The Trusted AP on detecting the Rogue AP will send a trap to the management station with the Channel and BSSID of the Rogue Access Point.
Perform this procedure to enable and configure RAD.
The RAD screen also displays the time of the last scan and the number of new access points detected in the last scan.
The Scan Interval specifies the time period in minutes between scans and can be set to any value between 15 and 1440 minutes.
The results of the RAD scan be viewed in the Status page in the HTTP interface.
Rogue Access Point Detection Screen
The AP is a bridge between your wired and wireless networking devices. As a bridge, the functions performed by the AP include:
MAC address learning
Forward and filtering decision making
Spanning Tree protocol used for loop avoidance
Once the AP is connected to your network, it learns which devices are connected to it and records their MAC addresses in the Learn Table. The table can hold up to 10,000 entries. To view the Learn Table, click on the Monitor tab and select the Learn Table tab.
A Spanning Tree is used to avoid redundant communication loops in networks with multiple bridging devices. Bridges do not have any inherent mechanism to avoid loops, because having redundant systems is a necessity in certain networks. However, redundant systems can cause Broadcast Storms, multiple frame copies, and MAC address table instability problems.
Complex network structures can create multiple loops within a network. The Spanning Tree configuration blocks certain ports on AP devices to control the path of communication within the network, avoiding loops and following a spanning tree structure.
For more information on Spanning Tree protocol, see Section 8.0 of the IEEE 802.1d standard. The Spanning Tree configuration options are advanced settings. Proxim recommends that you leave these parameters at their default values unless you are familiar with the Spanning Tree protocol.
Storm Threshold is an advanced Bridge setup option that you can use to protect the network against data overload by:
Specifying a maximum number of frames per second as received from a single network device (identified by its MAC address).
Specifying an absolute maximum number of messages per port.
The Storm Threshold parameters allow you to specify a set of thresholds for each port of the AP, identifying separate values for the number of broadcast messages/second and Multicast messages/second.
When the number of frames for a port or identified station exceeds the maximum value per second, the AP will ignore all subsequent messages issued by the particular network device, or ignore all messages of that type.
The wireless clients (or subscribers) that associate with a certain AP form the Basic Service Set (BSS) of a network infrastructure. By default, wireless subscribers in the same BSS can communicate with each other. However, some administrators (such as wireless public spaces) may wish to block traffic between wireless subscribers that are associated with the same AP to prevent unauthorized communication and to conserve bandwidth. This feature enables you to prevent wireless subscribers within a BSS from exchanging traffic.
Although this feature is generally enabled in public access environments, Enterprise LAN administrators use it to conserve wireless bandwidth by limiting communication between wireless clients. For example, this feature prevents peer-to-peer file sharing or gaming over the wireless network.
To block Intra BSS traffic, set Intra BSS Traffic Operation to Block. To allow Intra BSS traffic, set Intra BSS Traffic Operation to Passthru.
The Packet Forwarding feature enables you to redirect traffic generated by wireless clients that are all associated to the same AP to a single MAC address. This filters wireless traffic without burdening the AP and provides additional security by limiting potential destinations or by routing the traffic directly to a firewall. You can redirect to a specific port (Ethernet or WDS) or allow the bridge's learning process (and the forwarding table entry for the selected MAC address) to determine the optimal port.
The gateway to which traffic will be redirected should be node on the Ethernet network. It should not be a wireless client.
To configure interfaces for packet forwarding, specifying interface port(s) to which packets are redirected and a destination MAC address, as follows:
This feature is not supported in the AP. Clicking on this tab displays the following message: "The Quality of Service (QoS) feature is not implemented on the AP-600 and AP-2000."
Configuring RADIUS Profiles on the AP define a profile for RADIUS Servers used by the system or by a VLAN. The network administrator can define RADIUS Servers per Authentication Mode and per VLAN.
The AP communicates with the RADIUS server defined in a profile to provide the following features:
Also, RADIUS Based Management Access allows centralized user management.
The network administrator can configure default RADIUS authentication servers to be used on a system-wide basis, or in networks with VLANs enabled the administrator can also configure separate authentication servers to be used for MAC authentication, EAP authentication, or Accounting in each VLAN. You can configure the AP to communicate with up to six different RADIUS servers per VLAN/SSID:
Primary Authentication Server (MAC-based authentication)
Back-up Authentication Server (MAC-based authentication)
Primary Authentication Server (EAP/802.1x authentication)
Back-up Authentication Server (EAP/802.1x authentication)
The back-up servers are optional, but when configured, the AP will communicate with the back-up server if the primary server is off-line. After the AP has switched to the backup server, it will periodically check the status of the primary RADIUS server every five (5) minutes. Once the primary RADIUS server is again online, the AP automatically reverts from the backup RADIUS server back to the primary RADIUS server. All subsequent requests are then sent to the primary RADIUS server.
You can view monitoring statistics for each of the configured RADIUS servers.
The user can configure separate RADIUS authentication servers for each authentication mode and for each SSID (VLAN). For example:
This figure shows a network with separate authentication servers for each authentication type and for each VLAN. The clients in VLAN 1 are authenticated using the authentication servers configured for VLAN 1. The type of authentication server used depends on whether the authentication is done for an 802.1x client or non-802.1x client. The clients in VLAN 2 are authenticated using a different set of authentication servers configured for authenticating users in VLAN 2.
Authentication servers for each VLAN are configured as part of the configuration options for that VLAN. You can also configure authentication servers on a system-wide basis; these are called the default authentication servers. For each VLAN, the user could opt to use the default authentication servers, or to configure separate authentication servers to be used for a particular authentication type in that VLAN.
The AP currently supports two methods of assigning a wireless client a VLAN ID. The wireless client can either be assigned the static VLAN ID configured for the SSID the wireless client is associated to, or the wireless client can be assigned a VLAN ID which is returned by the RADIUS server during authentication.
A VLAN ID can only be assigned to a wireless client by a RADIUS server if they are associated to an SSID that is configured to a RADIUS-based authentication security mode/protocol (802.1X, WPA, 802.11i/WPA2, and RADIUS based MAC Address Authentication). If the wireless client is associated to an SSID that does not provide RADIUS-based authentication (such as None, WEP, WPA-PSK, and 802.11i/WPA2-PSK), then the wireless client will be assigned the static VLAN ID configured for respective SSID. See SSID/VLAN/Security for more information.
A RADIUS server can be used to enforce VLAN access control in two ways:
Authorize the SSID the client uses to connect to the AP. The SSID determines the VLAN that the client gets assigned to.
Assigning the user to a VLAN by specifying the VLAN membership information of the user.
A RADIUS server Profile consists of a Primary and a Secondary RADIUS server that get assigned to act as either MAC Authentication servers, 802.1x/EAP Authentication servers, or Accounting Servers in the VLAN Configuration. Refer to SSID/VLAN/Security.
The RADIUS Profiles tab allows you to add new RADIUS profiles or modify or delete existing profiles.
Perform the following procedure to add a RADIUS server profile and to configure its parameters.
Click Add to create a new profile. To Modify an existing profile, select the profile and click Edit. To delete an existing profile, select the profile and click Delete. You cannot delete a RADIUS server profile if you are using it in an SSID. Also, the four default RADIUS server profiles cannot be deleted.
Configure the following parameters for the RADIUS Server profile:
Server Profile Name: the profile name. This is the name used to associated a VLAN to the profile. Refer to SSID/VLAN/Security.
MAC Address Format Type: This parameter should correspond to the format in which the clients' 12-digit MAC addresses are listed within the RADIUS server. Available options are:
Dash delimited: dash between each pair of digits: xx-yy-zz-aa-bb-cc
Colon delimited: colon between each pair of digits: xx:yy:zz:aa:bb:cc
Single dash delimited: dash between the sixth and seventh digits: xxyyzz-aabbcc
No delimiters: No characters or spaces between pairs of hexidecimal digits: xxyyzzaabbcc
Accounting Inactivity Timer: Enter the accounting inactivity timer. This parameter supports a value from 1-60 minutes. The default is 5 minutes.
Authorization Lifetime: Enter the time, in seconds, each client session may be active before being automatically re-authenticated. This parameter supports a value between 900 and 43200 seconds. The default is 900 sec.
Server Addressing Format: select IP Address or Name. If you want to identify RADIUS servers by name, you must configure the AP as a DNS Client. See DNS Client for details.
Server Name/IP Address: Enter the server's name or IP address.
Destination Port: Enter the port number which the AP and the server will use to communicate. By default, RADIUS servers communicate on port 1812.
Server VLAN ID: Indicates the VLAN that uses this RADIUS server profile. If VLAN is disabled, the text "VLAN is disabled" will appear.
Shared Secret and Confirm Shared Secret: Enter the password shared by the RADIUS server and the AP. The same password must also be configured on the RADIUS server.
Response Time (seconds): Enter the maximum time, in seconds, that the AP should wait for the RADIUS server to respond to a request. The range is 1-10 seconds; the default is 3 seconds.
Maximum Retransmissions (0-4): Enter the maximum number of times an authentication request may be transmitted. The range is 0 to 4, the default is 3.
Server Status: Select Enable from the drop-down box to enable the RADIUS Server Profile.
If you want to control wireless access to the network and if your network includes a RADIUS Server, you can store the list of MAC addresses on the RADIUS server rather than configure each AP individually. You can define a RADIUS Profile that specifies the IP Address of the server that contains a central list of MAC Address values identifying the authorized stations that may access the wireless network. You must specify information for at least the primary RADIUS server. The back-up RADIUS server is optional.
Each VLAN can be configured to use a separate RADIUS server (and backup server) for MAC authentication.
Contact your RADIUS server manufacturer if you have problems configuring the server or have problems using RADIUS authentication.
You must configure a primary EAP/802.1x Authentication server to use 802.1x security. A back-up server is optional.
Each VLAN can be configured to use a separate RADIUS server (and backup server) for 802.1x authentication. 802.1x authentication ("EAP authentication") can be separately enabled for each VLAN.
Using an external RADIUS server, the AP can track and record the length of client sessions on the access point by sending RADIUS accounting messages per RFC2866. When a wireless client is successfully authenticated, RADIUS accounting is initiated by sending an "Accounting Start" request to the RADIUS server. When the wireless client session ends, an "Accounting Stop" request is sent to the RADIUS server.
Accounting sessions continue when a client reauthenticates to the same AP. Sessions are terminated when:
A client disassociates.
A client does not transmit any data to the AP for a fixed amount of time.
A client is detected on a different interface.
If the client roams from one AP to another, one session is terminated and a new session is begun.
This feature requires RADIUS authentication using MAC Access Control or 802.1x. Wireless clients configured in the Access Point's static MAC Access Control list are not tracked.
The AP provides several security features to protect your network from unauthorized access.
Virtual Local Area Networks (VLANs) are logical groupings of network hosts. Defined by software settings, other VLAN members or resources appear (to clients) to be on the same physical segment, no matter where they are attached on the logical LAN or WAN segment. They simplify traffic flow between clients and their frequently-used or restricted resources.
The AP uses Security Profiles to define allowed wireless clients, and authentication and encryption types and RADIUS Profiles to define RADIUS Servers used by the system or by a VLAN.
The SSID/VLAN/Security tab contains the following sub-tabs:
Management VLAN
Virtual Local Area Networks (VLANs) are logical groupings of network hosts. Defined by software settings, other VLAN members or resources appear (to clients) to be on the same physical segment, no matter where they are attached on the logical LAN or WAN segment. They simplify traffic flow between clients and their frequently-used or restricted resources.
VLANs now extend as far as the reach of the access point signal. Clients can be segmented into wireless sub-networks via SSID and VLAN assignment. A Client can access the network by connecting to an AP configured to support its assigned SSID/VLAN.
AP devices are fully VLAN-ready; however, by default VLAN support is disabled. Before enabling VLAN support, certain network settings should be configured, and network resources such as a VLAN-aware switch, a RADIUS server, and possibly a DHCP server should be available.
Once enabled, VLANs are used to conveniently, efficiently, and easily manage your network in the following ways:
VLAN tagged data is collected and distributed through an AP's wireless interface(s) based on Network Name (SSID). An Ethernet port on the access point connects a wireless cell or network to a wired backbone. The access points communicate across a VLAN-capable switch that analyzes VLAN-tagged packet headers and directs traffic to the appropriate ports. On the wired network, a RADIUS server authenticates traffic and a DHCP server manages IP addresses for the VLAN(s). Resources like servers and printers may be present, and a hub may include multiple APs, extending the network over a larger area.
In this figure, the numbered items correspond to the following components:
1. VLAN-enabled access point
Access Points that are not VLAN-capable typically transmit broadcast and multicast traffic to all wireless Network Interface Cards (NICs). This process wastes wireless bandwidth and degrades throughput performance. In comparison, VLAN-capable AP is designed to efficiently manage delivery of broadcast, multicast, and unicast traffic to wireless clients.
The AP assigns clients to a VLAN based on a Network Name (SSID). The AP can support up to 16 VLAN/SSID pairs per radio (based on model type).
The ability to configure up to 16 VLAN/SSID pairs and to configure a security profile per SSID is available only for 802.11b/g APs and 802.11a Upgrade Kit APs.
802.11b APs do not support multiple VLAN/SSID pairs. APs with the 802.11a card support multiple VLAN/SSID pairs, but do not support the security profile per SSID capability.
The AP matches packets transmitted or received to a network name with the associated VLAN. Traffic received by a VLAN is only sent on the wireless interface associated with that same VLAN. This eliminates unnecessary traffic on the wireless LAN, conserving bandwidth and maximizing throughput.
In addition to enhancing wireless traffic management, the VLAN-capable AP supports easy assignment of wireless users to workgroups. In a typical scenario, each user VLAN represents a workgroup; for example, one VLAN could be used for an EMPLOYEE workgroup and the other, for a GUEST workgroup.
In this scenario, the AP would assign every packet it accepted to a VLAN. Each packet would then be identified as EMPLOYEE or GUEST, depending on which wireless NIC received it. The AP would insert VLAN headers or "tags" with identifiers into the packets transmitted on the wired backbone to a network switch.
Finally, the switch would be configured to route packets from the EMPLOYEE workgroup to the appropriate corporate resources such as printers and servers. Packets from the GUEST workgroup could be restricted to a gateway that allowed access to only the Internet. A member of the GUEST workgroup could send and receive e-mail and access the Internet, but would be prevented from accessing servers or hosts on the local corporate network.
VLANs segment network traffic into workgroups, which enable you to limit broadcast and multicast traffic. Workgroups enable clients from different VLANs to access different resources using the same network infrastructure. Clients using the same physical network are limited to those resources available to their workgroup.
The AP can segment users into a maximum of 16 different workgroups (32 if using two cards in a Dual-radio AP) based on an SSID/VLAN pair (also referred as a VLAN Workgroup or a Sub-network).
The ability to configure up to 16 VLAN/SSID pairs and to configure a security profile per SSID is available only for 802.11b/g APs and 802.11a Upgrade Kit APs.
802.11b APs do not support multiple VLAN/SSID pairs. APs with the 802.11a card support multiple VLAN/SSID pairs, but do not support the security profile per SSID capability.
The three primary scenarios for using VLAN workgroups are as follows:
Management access to the AP can easily be secured by making management stations or hosts and the AP itself members of a common VLAN. Simply configure a non-zero management VLAN ID and enable VLAN to restrict management of the AP to members of the same VLAN.
If a non-zero management VLAN ID is configured then management access to the AP is restricted to wired or wireless hosts that are members of the same VLAN. Ensure your management platform or host is a member of the same VLAN before attempting to manage the AP.
The VLAN feature can allow wireless clients to manage the AP. If the VLAN Management ID matches a VLAN User ID, then those wireless clients who are members of that VLAN will have AP management access.
Once a VLAN Management ID is configured and is equivalent to one of the VLAN User IDs on the AP, all members of that User VLAN will have management access to the AP. Be careful to restrict VLAN membership to those with legitimate access to the AP.
The MAC Access sub-tab allows you to build a list of stations, identified by their MAC addresses, authorized to access the network through the AP. The list is stored inside each AP within your network. Note that you must reboot the AP for any changes to the MAC Access Control Table to take effect.
The "MAC ACL Status" parameter (configurable on the SSID/VLAN -> Wireless sub-tab) is per VLAN if VLAN Management is enabled. All other parameters besides "MAC ACL Status" are configured per AP, even if VLAN is enabled.
Operation Type: Choose between Passthru and Block. This determines how the stations identified in the MAC Access Control Table are filtered.
If set to Passthru, only the addresses listed in the Control Table will pass through the bridge.
If set to Block, the bridge will block traffic to or from the addresses listed in the Control Table.
MAC Access Control Table: Click Add to create a new entry. Click Edit to change an existing entry. Each entry contains the following field:
Status: The entry is enabled automatically when saved (so the Status field is only visible when editing an entry). You can also disable or delete entries by changing this field's value.
For larger networks that include multiple Access Points, you may prefer to maintain this list on a centralized location using the MAC Access Control Via RADIUS Authentication.
MAC Access Configuration Screen
The AP supports the following Security features:
WEP Encryption: The original encryption technique specified by the IEEE 802.11 standard.
802.1x Authentication: An IEEE standard for client authentication.
Wi-Fi Protected Access (WPA): A new standard that provides improved encryption security over WEP.
The IEEE 802.11 standards specify an optional encryption feature, known as Wired Equivalent Privacy or WEP, that is designed to provide a wireless LAN with a security level equal to what is found on a wired Ethernet network. WEP encrypts the data portion of each packet exchanged on an 802.11 network using an Encryption Key (also known as a WEP Key).
When Encryption is enabled, two 802.11 devices must have the same Encryption Keys and both devices must be configured to use Encryption in order to communicate. If one device is configured to use Encryption but a second device is not, then the two devices will not communicate, even if both devices have the same Encryption Keys.
An 802.11b AP supports 64-bit and 128-bit encryption:
An 802.11a or 802.11b/g AP supports 64-bit, 128-bit, and 152-bit encryption:
IEEE 802.1x is a standard that provides a means to authenticate and authorize network devices attached to a LAN port. A port in the context of IEEE 802.1x is a point of attachment to the LAN, either a physical Ethernet connection or a wireless link to an Access Point. 802.1x requires a RADIUS server and uses the Extensible Authentication Protocol (EAP) as a standards-based authentication framework, and supports automatic key distribution for enhanced security. The EAP-based authentication framework can easily be upgraded to keep pace with future EAP types.
Popular EAP types include:
EAP-Message Digest 5 (MD5): Username/Password-based authentication; does not support automatic key distribution
EAP-Transport Layer Security (TLS): Certificate-based authentication (a certificate is required on the server and each client); supports automatic key distribution
EAP-Tunneled Transport Layer Security (TTLS): Certificate-based authentication (a certificate is required on the server; a client's username/password is tunneled to the server over a secure connection); supports automatic key distribution
PEAP - Protected EAP with MS-CHAP v2: Secure username/password-based authentication; supports automatic key distribution
Different servers support different EAP types and each EAP type provides different features. Refer to the documentation that came with your RADIUS server to determine which EAP types it supports.
The AP supports the following EAP types when Authentication Mode is set to 802.1x, WPA or 802.11i (WPA2): EAP-TLS, PEAP, and EAP-TTLS. When Authentication Mode is set to Mixed, the AP supports the following EAP types: EAP-TLS, PEAP, EAP-TLLS, and EAP-MD5 (MD5 does not support automatic key distribution; therefore, if you choose this method you need to manually configure each client with the network's encryption key).
There are three main components in the authentication process. The standard refers to them as:
When using Authentication Mode to 802.1x, WPA, Mixed mode (802.1x and WEP), or 802.11i, you need to configure your RADIUS server for authentication purposes.
Prior to successful authentication, an unauthenticated client PC cannot send any data traffic through the AP device to other systems on the LAN. The AP inhibits all data traffic from a particular client PC until the client PC is authenticated. Regardless of its authentication status, a client PC can always exchange 802.1x messages in the clear with the AP (the client begins encrypting data after it has been authenticated).
RADIUS Authentication Illustrated
The AP acts as a pass-through device to facilitate communications between the client PC and the RADIUS server. The AP (2) and the client (1) exchange 802.1x messages using an EAPOL (EAP Over LAN) protocol (A). Messages sent from the client station are encapsulated by the AP and transmitted to the RADIUS (3) server using EAP extensions (B).
Upon receiving a reply EAP packet from the RADIUS, the message is typically forwarded to the client, after translating it back to the EAPOL format. Negotiations take place between the client and the RADIUS server. After the client has been successfully authenticated, the client receives an Encryption Key from the AP (if the EAP type supports automatic key distribution). The client uses this key to encrypt data after it has been authenticated.
For 802.11a and 802.11b/g clients that communicate with an AP, each client receives its own unique encryption key; this is known as Per User Per Session Encryption Keys.
Wi-Fi Protected Access (WPA) is a security standard designed by the Wi-Fi Alliance in conjunction with the Institute of Electrical and Electronics Engineers (IEEE). THE AP supports WPA2, based on the IEEE 802.11i security standard.
For Dual-radio APs: WPA is available only for the AP-2000b/g and for APs using either an 802.11a or 802.11b/g Upgrade Kit. WPA is not available for APs with an 802.11b PC Card or a 5 GHz Upgrade Kit.
WPA is a replacement for Wired Equivalent Privacy (WEP), the encryption technique specified by the original 802.11 standard. WEP has several vulnerabilities that have been widely publicized. WPA addresses these weaknesses and provides a stronger security system to protect wireless networks.
WPA provides the following new security measures not available with WEP:
Improved packet encryption using the Temporal Key Integrity Protocol (TKIP) and the Michael Message Integrity Check (MIC).
For more information on WPA, see the Wi-Fi Alliance Web site at http://www.wi-fi.org.
The AP supports the following WPA authentication modes:
WPA: The AP uses 802.1x to authenticate clients. You should only use an EAP that supports mutual authentication and session key generation, such as EAP-TLS, EAP-TTLS, and PEAP. See 802.1x Authentication for details.
WPA-PSK (Pre-Shared Key): For networks that do not have 802.1x implemented, you can configure the AP to authenticate clients based on a Pre-Shared Key. This is a shared secret that is manually configured on the AP and each of its clients. The Pre-Shared Key must be 256 bits long, which is 64 hexadecimal digits. The AP also supports a PSK Pass Phrase option to facilitate the creation of the Pre-Shared Key (so a user can enter an easy-to-remember phrase rather than a string of characters).
802.11i (also known as WPA2): The AP authenticates clients according to the 802.11i draft standard, using 802.1x authentication, an AES cipher, and re-keying.
802.11i-PSK (also known as WPA2 PSK): The AP uses an AES cipher, and authenticates clients based on a Pre-Shared Key. The Pre-Shared Key must be 256 bits long, which is either 64 hexadecimal digits. The AP also supports a PSK Pass Phrase option to facilitate the creation of the Pre-Shared Key (so a user can enter an easy-to-remember phrase rather than a string of characters).
There is a hierarchy of authentication protocols defined for the AP.
The hierarchy is as follows, from Highest to lowest:
802.1x authentication
MAC Access Control via RADIUS Authentication
MAC Access Control through individual APs' MAC Access Control Lists
If you have both 802.1x and MAC authentication enabled, the 802.1x results will take effect. This is required in order to propagate the WEP keys to the clients in such cases. Once you disable 802.1x on the AP, you will see the effects of MAC authentication.
The AP2000 allows you to segment wireless networks into multiple sub-networks based on Network Name (SSID) and VLAN membership. A Network Name (SSID) identifies a wireless network. Clients associate with Access Points that share an SSID. During installation, the Setup Wizard prompts you to configure a Primary Network Name for each wireless interface.
After initial setup and once VLAN is enabled, the AP can be configured to support up to 16 SSIDs per wireless interface to segment wireless networks based on VLAN membership.
Each VLAN can be associated to a Security Profile and RADIUS Server Profiles. A Security Profile defines the allowed wireless clients, and authentication and encryption types. Refer to VLANs and Security Profiles for configuration details.
The ability to configure up to 16 VLAN/SSID pairs and to configure a security profile per SSID is available only for 802.11b/g APs and 802.11a Upgrade Kit APs.
802.11b APs do not support multiple VLAN/SSID pairs. APs with the 802.11a card support multiple VLAN/SSID pairs, but do not support the security profile per SSID capability.
Security policies can be configured and applied on the AP as a whole, or on a per VLAN basis. When VLAN is disabled on the AP, the user can configure a security profile for each interface of the AP. When VLANs are enabled and Security per SSID is enabled, the user can configure a security profile for each VLAN.
The user defines a security policy by specifying one or more values for the following parameters:
Wireless STA types (WPA station, 802.11i station, 802.1x station, WEP station) that can associate to the AP.
Authentication mechanisms (802.1x, RADIUS MAC authentication) that are used to authenticate clients for each type of station.
Cipher Suites (CCMP, TKIP, WEP) used for encapsulating the wireless data for each type of station.
Up to 16 security profiles can be configured per wireless interface.
If the security mode selected in a profile is WEP, WPA-PSK, or 802.11i-PSK, then you must configure the WEP or Pre-Shared Keys.
Authentication Mode: None. The AP allows access to Stations without authentication.
Non secure station should be used only with WEP or 802.1x security mode.
Encryption Key 0, Encryption Key 1, Encryption Key 2, Encryption Key 3
Encryption Transmit Key: select Key 0, Key 1, Key 2, or Key 3
Encryption Key Length: 64 or 128 Bits.
If 802.1x is enabled simultaneously with WEP, the 802.1x Station's encryption key length is determined by the WEP encryption key.
PSK Passphrase: an 8-63 character user-defined phrase. It is recommended a passphrase of at least 13 characters, including both letters and numbers, and upper and lower case characters to ensure that the generated key cannot be easily deciphered by network infiltrators.
PSK Passphrase: an 8-63 character user-defined phrase. It is recommended a passphrase of at least 13 characters, including both letters and numbers, and upper and lower case characters to ensure that the generated key cannot be easily deciphered by network infiltrators.
Security Profile 1 will be used by default for all wireless interfaces.
Security Profile Table - Add Entries
Each SSID/VLAN can have its own Security Profile that defines its security mode, authentication mechanism, and encryption, so that customers can have multiple types of clients (non-WEP, WEP, 802.1x, WPA) on the same system, but separated per VLAN. Refer to the Security Profiles section for more information. These parameters are configurable from the Wireless A and Wireless B sub-tabs.
This tab allows you to select the index of the SSID/VLAN to be added or edited. It also allows you to configure the RADIUS Accounting and Authentication Status, the MAC ACL Status, the Rekeying Interval, the Security Profile, and the RADIUS Server Profiles for the VLAN.
The Add Entry or Edit Entry screen appears.
SSID/VLAN Add Entries Screen (VLAN Protocol Disabled)
You must specify a unique VLAN ID for each SSID on the interface. A VLAN ID is a number from -1 to 4094. A value of -1 means that an entry is "untagged."
You can set the VLAN ID to "-1" or "untagged" if you do not want clients that are using a specific SSID to be members of a VLAN workgroup. Only one "untagged" VLAN ID is allowed per interface.
The VLAN ID must match an ID used by your network; contact your network administrator if you need assistance defining the VLAN IDs.
SSID, VLAN, and Security Data Configuration (VLAN Protocol Disabled)
If you have two or more SSIDs per interface using a security Profile with a security mode of Non Secure, be aware that security being applied in the VLAN is not being applied in the wireless network.
RADIUS MAC Authentication Profile
RADIUS EAP Authentication Profile
If 802.1x, WPA, or 802.11i security mode is used, the RADIUS EAP Authentication Profile must have a value.
A RADIUS Server Profile for authentication for each VLAN shall be configured as part of the configuration options for that VLAN. RADIUS profiles are independent of VLANs. The user can define any profile to be the default and associate all VLANs to that profile. Four profiles are created by default, "MAC Authentication", "EAP Authentication", Accounting", and "Management".
This tab allows you to select the index of the SSID/VLAN to be added or edited. It also allows you to enable Security Per SSID, and configure the RADIUS Accounting and Authentication Status, the MAC ACL Status, the Rekeying Interval, the Security Profile, and the RADIUS Server Profiles for the VLAN.
The Add Entry or Edit Entry screen appears.
SSID/VLAN Add Entries Screen (VLAN Protocol Enabled)
You must specify a unique VLAN ID for each SSID on the interface. A VLAN ID is a number from -1 to 4094. A value of -1 means that an entry is "untagged."
You can set the VLAN ID to "-1" or "untagged" if you do not want clients that are using a specific SSID to be members of a VLAN workgroup. Only one "untagged" VLAN ID is allowed per interface.
The VLAN ID must match an ID used by your network; contact your network administrator if you need assistance defining the VLAN IDs.
SSID Authorization is the RADIUS based authorization of the SSID for a particular client. The authorized SSIDs are sent as the tunnel attributes.
If you have two or more SSIDs per interface using a security Profile with a security mode of Non Secure, be aware that security being applied in the VLAN is not being applied in the wireless network.
RADIUS MAC Authentication Profile
RADIUS EAP Authentication Profile
If 802.1x, WPA, or 802.11i security mode is used, the RADIUS EAP Authentication Profile must have a value.
A RADIUS Server Profile for authentication for each VLAN shall be configured as part of the configuration options for that VLAN. RADIUS profiles are independent of VLANs. The user can define any profile to be the default and associate all VLANs to that profile. Four profiles are created by default, "MAC Authentication", "EAP Authentication", Accounting", and "Management".
Broadcast SSID allows the broadcast of a single SSID when the AP is configured for multiple SSIDs. Broadcast SSID may only be enabled for a single SSID. This object can only be configured using the CLI and SNMP using a MIB browser or network management application.
Closed System manages the way probe requests are handled. If enabled, the AP will respond to probe requests with an SSID only if the client has specified the SSID in the probe request. If the client sends a probe request with a null or "ANY" SSID, the AP will respond with a null SSID. If disabled, the AP will respond with each configured SSID, whether or not an SSID has been specified in the probe request. This option is disabled by default.
To enable Closed System, click on Interfaces > Wireless-A or Wireless-B and check the Enable Closed System box.
For more information, on Broadcast SSID and Closed System, refer to Technical Bulletin 69680 at http://support.proxim.com.
Logging into the HTTP Interface
Version: Provides version information for the Access Point's system components.
ICMP: Displays statistics for Internet Control Message Protocol packets sent and received by the AP.
IP/ARP Table: Displays the AP's IP Address Resolution table.
Learn Table: Displays the list of nodes that the AP has learned are on the network.
IAPP: Provides statistics for the Inter-Access Point Protocol messages sent and received by the AP.
RADIUS: Provides statistics for the configured primary and backup RADIUS server(s).
Interfaces: Displays the Access Point's interface statistics (Wireless and Ethernet).
Station Statistics: Displays statistics for stations and Wireless Distribution System links.
Once the AP has a valid IP Address and an Ethernet connection, you may use your web browser to monitor network statistics.
The Command Line Interface (CLI) also provides a method for viewing network statistics using Telnet or a serial connection. This section covers only use of the HTTP interface. For more information about viewing network statistics with the CLI, refer to Using the Command Line Interface (CLI).
Follow these steps to monitor an AP's operating statistics using the HTTP interface:
The HTTP interface supports the following Web browsers:
Microsoft Internet Explorer 6 with Service Pack 1 or later, and Netscape 6.1 or later.
Result: The System Status screen appears.
Click the tab that corresponds to the statistics you want to review. For example, click Learn Table to see the list of nodes that the AP has discovered on the network.
If applicable, click the Refresh
button to update the statistics.
From the HTTP interface, click the Monitor button and select the Version tab. The list displayed provides you with information that may be pertinent when calling Technical Support. With this information, your Technical Support representative can verify compatibility issues and make sure the latest software are loaded. This screen displays the following information for each Access Point component:
ID: The AP identifies a system component based on its ID. Each component has a unique identifier.
Variant: Several variants may exist of the same component (for example, a hardware component may have two variants, one with more memory than the other).
Version: Specifies the component's version or build number. The Software Image version is the most useful information on this screen for the typical end user.
This tab provides statistical information for both received and transmitted messages directed to the AP. Not all ICMP traffic on the network is counted in the ICMP (Internet Control Message Protocol) statistics.
This tab provides information based on the Address Resolution Protocol (ARP), which relates MAC Address and IP Addresses.
This tab displays information relating to network bridging. It reports the MAC address for each node that the device has learned is on the network and the interface on which the node was detected. There can be up 10,000 entries in the Learn Table.
This tab displays statistics relating to client handovers and communications between ORiNOCO Access Points.
This tab provides RADIUS authentication, EAP/802.1x authentication, and accounting information for both the Primary and Backup RADIUS servers.
RADIUS authentication and accounting must be enabled for this information to be valid.
This tab displays statistics for the Ethernet and wireless interfaces. The Operational Status can be up, down, or testing.
This tab displays information on wireless clients attached to the AP and on Wireless Distribution System links.
To enable the monitoring of Stations Statistics, perform the following procedure:
You do not need to reboot the AP for the changes to take effect. If clients are connected to the device or WDS links are configured for the device, the statistics will now be shown on the screen.
Click on the Refresh button in the browser window to view the latest statistics. If any new clients associate to the AP, you can see the statistics of the new clients after you click the refresh button.
The following stations statistics are displayed:
MAC Address: The MAC address of the wireless client for which the statistics are gathered. For WDS links, this is the partner MAC address of the link.
IP Address: The IP address of the associated wireless station for which the Statistics are gathered. (0.0.0.0 for WDS links)
Interface to which the Station is connected: The interface number on which the client is connected with the AP. For WDS links this is the interface on which the link is configured.
Station Type: The type of wireless client (STA or WDS).
MAC Protocol: The MAC protocol for this wireless client (or WDS link partner). The possible values are 802.11a, 802.11b, 802.11g
Signal / Noise: The Signal /Noise Level measured at the AP when frames are received from the associated wireless station (or WDS link partner)
Time since Last Packet Received: The time elapsed since the last frame from the associated wireless station (or WDS link partner) was received.
Number of Clients: The number of stations and WDS links monitored. The following stations statistics are not displayed in the Graphical User Interface, but can be viewed from a MIB browser:
Octets Received: The number of octets received from the associated wireless station (or WDS link partner) by the AP.
Unicast Frames Received: The number of Unicast frames received from the associated wireless station (or WDS link partner) by the AP.
Non-Unicast Frames Received: The number of Non-Unicast frames received (i.e. broadcast or multicast) from the associated wireless station (or WDS link partner) by the AP.
Octets Transmitted: The number of octets sent to the associated wireless station (or WDS link partner) from the AP.
Unicast Frames Transmitted: The number of Unicast frames transmitted to the associated wireless station (or WDS link partner) from the AP.
Logging into the HTTP Interface
Introduction to File Transfer via TFTP or HTTP: Describes the available file transfer methods.
Update AP via TFTP: Download files from a TFTP server to the AP.
Update AP via HTTP: Download files to the AP from HTTP.
Retrieve File via TFTP: Upload configuration files from the AP to a TFTP server.
Retrieve File via HTTP: Upload configuration files from the AP via HTTP.
Reboot: Reboot the AP in the specified number of seconds.
Reset: Reset all of the Access Point's configuration settings to factory defaults.
Help Link: Configure the location where the AP Help files can be found.
Once the AP has a valid IP Address and an Ethernet connection, you may use your web browser to issue commands.
The Command Line Interface (CLI) also provides a method for issuing commands using Telnet or a serial connection. This section covers only use of the HTTP Interface. For more information about issuing commands with the CLI, refer to Using the Command Line Interface (CLI).
Follow these steps to view the available commands supported by the AP's HTTP interface:
The HTTP interface supports the following Web browsers: Microsoft Internet Explorer 6 with Service Pack 1 or later, and Netscape 6.1 or later
- Select Tools > Internet Options....
- If necessary, remove the check mark from the Use a proxy server box.
- Click OK twice to save your changes and return to Internet Explorer.
- Result: The System Status screen appears.
There are two methods of transferring files to or from the AP, TFTP or HTTP (or HTTPS if enabled).
The following procedures describe downloading Configuration, AP Image, Bootloader, Private Key, and Certificate files to the AP:
Update AP via TFTP
The following procedures describe uploading Configuration files from the AP:
Retrieve File via TFTP
A TFTP server must be running and configured to point to the directory containing the file.
If you do not have a TFTP server installed on your system, install the TFTP server from the ORiNOCO CD.
HTTP file transfer can be performed either with or without SSL enabled.
HTTP file transfers with SSL require enabling Secure Management and Secure Socket Layer. HTTP transfers that use SSL may take additional time.
SSL requires Internet Explorer version 6, 128 bit encryption, Service Pack 1, and patch Q323308.
The Access Point performs checks to verify that an image downloaded through HTTP or TFTP is valid. The following checks are performed on the downloaded image:
Digital signature verification
If any of the above checks fail on the downloaded image, the Access Point deletes the downloaded image and retains the old image. Otherwise, if all checks pass successfully, the AP deletes the old image and retains the downloaded image.
These checks are to ensure that the AP does not enter an invalid image state. The storage of the two images is only temporary to ensure the proper verification; the two images will not be stored in the AP permanently.
Image error checking functions automatically in the background. No user configuration is required.
Use the Update AP via TFTP tab to download Configuration, AP Image, Bootloader files, and Certificate and Private Key files to the AP. A TFTP server must be running and configured to point to the directory containing the file.
Update AP via TFTP Command Screen
If you do not have a TFTP server installed on your system, install the TFTP server from the ORiNOCO CD. You can either install the TFTP server from the CD Wizard or run OEM-TFTP-Server.exe found in the CD's Xtras/SolarWinds sub-directory.
The Update AP via TFTP tab shows version information and allows you to enter TFTP information as described below.
Server IP Address: Enter the TFTP server IP Address.
- Double-click the TFTP server icon on your desktop and locate the IP address assigned to the TFTP server. Note: This is the IP address that will be used to point the Access Point to the AP Image file.
File Name: Enter the name of the file to be downloaded (including the file extension).
- Copy the updated AP Image file to the TFTP server's root folder. The default AP Image is located at C:/Program Files/ORiNOCO/AP/.
File Type: Select the proper file type. Choices include:
- Config for configuration information, such as System Name, Contact Name, and so on.
- Image for the AP Image (executable program).
- UpgradeBspBl for the Bootloader software.
- SSL Certificate: the digital certificate for authentication in SSL communications.
- SSL Private Key: the private key for encryption in SSL communications.
- SSH Public Key: the public key in SSH communications. Refer to Secure Shell (SSH) for more information.
- SSH Private Key: the private key in SSH communications. Refer to Secure Shell (SSH) for more information.
- CLI Batch File: a CLI Batch file that contains CLI commands to configure the AP. This file will be executed by the AP immediately after being uploaded. Refer to CLI Batch File for more information.
File Operation: Select either Update AP or Update AP & Reboot. You should reboot the AP after downloading files.
Use the Update AP via HTTP tab to download Configuration, AP Image, Bootloader files, and Certificate and Private Key files to the AP.
Once on the Update AP screen, click on the via HTTP tab.
Update AP via HTTP Command Screen
The Update AP via HTTP tab shows version information and allows you to enter HTTP information as described below.
Select the File Type that needs to be updated from the drop-down box. Choices include:
- Config for configuration information, such as System Name, Contact Name, and so on.
- Image for the AP Image (executable program).
- Upgrade BSPBL: for the Bootloader software.
- SSL Certificate: the digital certificate for authentication in SSL communications.
- SSL Private Key: the private key for encryption in SSL communications.
- SSH Public Key: the public key in SSH communications. Refer to Secure Shell (SSH) for more information.
- SSH Private Key: the private key in SSH communications. Refer to Secure Shell (SSH) for more information.
- CLI Batch File: a CLI Batch file that contains CLI commands to configure the AP. This file will be executed by the AP immediately after being uploaded. Refer to CLI Batch File for more information.
Use the Browse button or manually type in the name of the file to be downloaded (including the file extension) in the File Name field. If typing the file name, you must include the full path and the file extension in the file name text box.
To initiate the HTTP Update operation, click the Update AP button.
A warning message is displayed that advises the user that a reboot of the device will be required for changes to take effect.
Click OK to continue with the operation or Cancel to abort the operation.
An HTTP file transfer using SSL may take extra time.
If the operation completes successfully the following screen appears.
If the operation did not complete successfully the following screen appears, and the reason for the failure is displayed.
Use the Retrieve File via TFTP tab to upload files from the AP to the TFTP server. The TFTP server must be running and configured to point to the directory to which you want to copy the uploaded file. We suggest you assign the file a meaningful name, which may include version or location information.
If you don't have a TFTP server installed on your system, install the TFTP server from the ORiNOCO CD. You can either install the TFTP server from the CD Wizard or run OEM-TFTP-Server.exe found in the CD's Xtras/SolarWinds sub-directory.
The Retrieve AP via TFTP tab shows version information and allows you to enter TFTP information as described below.
Server IP Address: Enter the TFTP server IP Address.
- Double-click the TFTP server icon on your desktop and locate the IP address assigned to the TFTP server.
File Name: Enter the name of the file to be uploaded.
File Type: Select the type of file to be uploaded: Config file, CLI Batch File, or CLI Batch (Error) Log.
Use the following procedure to retrieve a file from an AP to a TFTP server:
1. If retrieving a Configuration file, configure all the required parameters in their respective tabs. Reboot the device.
2. Retrieve and store the file. Click the Retrieve File button to initiate the upload of the file from the AP to the TFTP server.
3. If you retrieved a Configuration file, update the file as necessary.
4. If you retrieved a CLI Batch File or CLI Batch Log, you can examine the file using a standard text editor. For more information on CLI Batch Files, refer to CLI Batch File.
Retrieve File via TFTP Command Screen
Use the Retrieve File via HTTP tab to retrieve configuration files, CLI Batch Files, or CLI Batch Logs from the AP. Select the type of file (Config, CLI Batch File, or CLI Batch Log) from the File Type drop-down menu.
For more information on CLI Batch Files and CLI Batch Logs refer to CLI Batch File.
Retrieve File via HTTP Command Screen
A confirmation message gets displayed that asks if the user wants to proceed with retrieving the file. Click OK to continue with the operation or Cancel to abort the operation.
Retrieve File Confirmation Dialog
On clicking the Save button the following Save As window displays, where the user is prompted to choose the filename and location where the file is to be downloaded. Select an appropriate filename and location and click OK.
Use the Reboot tab to save configuration changes (if any) and reset the AP. Entering a value of 0 (zero) seconds causes an immediate reboot. Note that Reset, described below, does not save configuration changes.
Rebooting the AP will cause all users who are currently connected to lose their connection to the network until the AP has completed the restart process and resumed operation.
Use the Reset tab to restore the AP to factory default conditions. The AP may also be reset from the RESET button located on the side of the unit. Since this will reset the Access Point's current IP address, a new IP address must be assigned. Refer to Recovery Procedures for more information.
Resetting the AP to its factory default configuration will permanently overwrite all changes that have made to the unit. The AP will reboot automatically after this command has been issued.
Reset to Factory Defaults Command Screen
To open Help, click the Help button on any display screen.
During initialization, the AP on-line help files are downloaded to the default location: C:/Program Files/ORiNOCO/AP/HTML/index.htm.
Use the forward slash character ("/") rather than the backslash character ("\") when configuring the Help Link location.
Add the AP's management IP address into the Internet Explorer list of Trusted Sites.
The ORiNOCO AP Help information is available in English, French, German, Italian, Spanish, and Japanese. The Help files are copied to your computer in one language only.
If you want to place these files on a shared drive, copy the Help Folder to the new location, and then specify the new path in the Help Link box.
Help Link Configuration Screen
The following list identifies important troubleshooting concepts and topics. The most common initialization and installation problems relate to IP addressing. For example, you must have valid IP addresses for both the AP and the management computer to access the unit's HTTP interface.
Connectivity issues include any problem that prevents you from powering up or connecting to the AP.
Make sure you have configured your client software with the proper Network Name and Security settings. Network Names and WEP Keys are typically allocated and maintained by your network administrator.
The correct VLAN configuration can be verified by "pinging" both wired and wireless hosts from both sides of the AP device and the network switch. Traffic can be "sniffed" on both the wired (Ethernet) and wireless (WDS) backbones (if configured). Bridge frames generated by wireless clients and viewed on one of the backbones should contain IEEE 802.1Q compliant VLAN headers or tags. The VLAN ID in the headers should correspond to one of the VLAN User IDs configured for the AP.
The correct VLAN assignment can be verified by pinging the AP to ensure connectivity, by pinging the switch to ensure VLAN properties, and by pinging hosts past the switch to confirm the switch is functional. Ultimately, traffic can be "sniffed" on the Ethernet or WDS interfaces (if configured) using third-party packages. Most problems can be avoided by ensuring that 802.1Q compliant VLAN tags containing the proper VLAN ID have been inserted in the bridged frames. The VLAN ID in the header should correspond to the user's assigned network name.
The most common installation problems relate to IP addressing. For example, without the TFTP server IP Address, you will not be able to download a new AP Image to the AP. IP Address management is fundamental. We suggest you create a chart to document and validate the IP addresses for your system.
If the password is lost or forgotten, you will need to reset the AP to default values. The Reset to Factory Default Procedure resets configuration settings, but does not change the current AP Image.
If the AP has a corrupted software image, follow the Forced Reload Procedure to erase the current AP Image and download a new image.
Use this procedure to reset the network configuration values, including the Access Point's IP address and subnet mask. The current AP Image is not deleted. Follow this procedure if you forget the Access Point's password:
Use this procedure to erase the current AP Image and download a new AP Image. In some cases, specifically when a missing or corrupted AP Image prevents successful booting, you may need to use ScanTool or the Bootloader CLI to download a new executable AP Image.
For this procedure, you will first erase the AP Image currently installed on the unit and then use either ScanTool or the Bootloader CLI (over the serial port) to set the IP address and download a new AP Image. Follow these steps:
To download the AP Image, you will need an Ethernet connection to the computer on which the TFTP server resides and to a computer that is running ScanTool (this is either two separate computers connected to the same network or a single computer running both programs).
ScanTool detects if an Access Point does not have a valid software image installed. In this case, the TFTP Server and Image File Name parameters are enabled in the ScanTool's Change screen so you can download a new image to the unit. (These fields are grayed out if ScanTool does not detect a software image problem.)
Before starting, you need to know the Access Point's IP address, subnet mask, the TFTP Server IP Address, and the AP Image file name. Make sure the TFTP server is running and configured to point to the folder containing the image to be downloaded.
Follow these steps to use ScanTool to download a software image to an Access Point with a missing image:
To download the AP Image, you will need an Ethernet connection to the computer on which the TFTP server resides. This can be any computer on the LAN or connected to the AP with a cross-over Ethernet cable.
You must also connect the AP to a computer with a standard serial cable and use a terminal client, such as HyperTerminal. From the terminal, enter CLI Commands to set the IP address and download an AP Image.
Before starting, you need to know the Access Point's IP address, subnet mask, the TFTP Server IP Address, and the AP Image file name. Make sure the TFTP server is running and configured to point to the folder containing the image to be downloaded.
Use the following procedure to set an IP address over the serial port using the CLI. The network administrator typically provides the AP IP address.
After installing the serial port cable, you may use the CLI to communicate with the AP. CLI supports most generic terminal emulation programs, such as HyperTerminal (which is included with the Windows operating systems). In addition, many web sites offer shareware or commercial terminal programs you can download. Once the IP address has been assigned, you can use the HTTP interface or the CLI over Telnet to complete configuration.
Follow these steps to assign the AP an IP address:
If you enabled RADIUS Authentication on the AP, make sure that your network's RADIUS servers are operational. Otherwise, clients will not be able to log in. There are several reasons the authentication server services might be unavailable, here are two typical things to check:
The "Trivial File Transfer Protocol" (TFTP) server allows you to transfer files across a network. You can upload configuration files from the AP for backup or copying, and you can download configuration files or new software images. The TFTP software is located on the ORiNOCO AP Installation CD-ROM.
If a TFTP server is not configured and running, you will not be able to download and upload images and configuration files to/from the AP. Remember that the TFTP server does not have to be local, so long as you have a valid TFTP IP address. Note that you do not need a TFTP server running unless you want to transfer files to or from the AP.
After the TFTP server is installed:
This section describes the AP's Command Line (CLI) Interface. CLI commands can be used to initialize, configure, and manage the Access Point.
To use this document effectively, you should have a working knowledge of Local Area Networking (LAN) concepts, network access infrastructures, and client-server relationships. In addition, you should be familiar with software setup procedures for typical network operating systems and servers.
This CLI supports the following navigation and special key functions to move the cursor along the prompt line.
The following table describes the error messages associated with improper inputs or expected CLI behavior.
Administrators use the CLI to control Access Point operation and monitor network statistics. The AP supports two types of CLI: the Bootloader CLI and the normal CLI. The Bootloader CLI provides a limited command set, and is used when the current AP Image is bad or missing. The Bootloader CLI allows you to assign an IP Address and download a new image. Once the image is downloaded and running, the Access Point uses the normal CLI. This guide covers the normal CLI unless otherwise specified.
The Bootloader CLI is a minimal subset of the normal CLI used to perform initial configuration of the AP. This interface is only accessible via the serial interface if the AP does not contain a software image or a download image command over TFTP has failed.
The Bootloader CLI provides you with the ability to configure the initial setup parameters as well as download a software image to the device.
The following functions are supported by the Bootloader CLI:
The parameters supported by the Bootloader CLI (for viewing and modifying) are:
The following lists display the results of using the help command in the Bootloader CLI:
The following lists display the results of using the show command in the Bootloader CLI:
This guide divides CLI Commands into two categories: Operational and Parameter Controls.
These commands affect Access Point behavior, such as downloading, rebooting, and so on. After entering commands (and parameters, if any) press the Enter key to execute the Command Line.
This command can be used in a number of ways to display available commands and parameters.
The following table lists each operation and provides a basic example. Following the table are detailed examples and display results for each operation.
To display the Command List, enter ?.
To show all commands that start with specified letters, enter one or more letters, then ? with no space between letters and ?.
Example 3a allows you to see every possible parameter for the set (or show) commands. Notice from example 3a that the list is very long. Example 3b shows how to display a subset of the parameters based on initial parameter letters.
This example shows entries for parameters that start with the letter "i". The more letters you enter, the fewer the results returned. Notice that there is no space between the letters and the question mark.
Enter the command, a space, and then ?. Then, when the parameter prompt appears, enter the parameter value. Result: The parameter is changed and a new CLI line is echoed with the new value (in the first part of the following example, the value is the IP Address of the TFTP server).
After entering one parameter, you may add another ? to the new CLI line to see the next parameter prompt, and so on until you have entered all of the required parameters. The following example shows how this is used for the download Command. The last part of the example shows the completed download Command ready for execution.
[Device-Name]> download ?
[Device-Name]> download 192.168.0.101 ?
[Device-Name]> download 192.168.0.101 apimage ?
[Device-Name]> download 192.168.0.101 apimage img <CR>
Each of the following commands ends a CLI session:
[Device-Name]> done
Downloads the specified file from a TFTP server to the Access Point. Executing download in combination with the asterisks character ("*") will make use of the previously set TFTP parameters. Executing download without parameters will display command help and usage information.
Displays instructions on using control-key sequences for navigating a Command Line and displays command information and examples.
Shows content of Command History Buffer. The Command History Buffer stores command statements entered in the current session. To avoid re-entering long command statements, use the keyboard "up arrow" (Ctrl-P) and "down arrow" (Ctrl-N) keys to recall previous statements from the Command History Buffer. When the desired statement reappears, press the Enter key to execute, or you may edit the statement before executing it.
[Device-Name]> passwd oldpassword newpassword newpassword
Reboots Access Point after specified number of seconds. Specify a value of 0 (zero) for immediate reboot.
[Device-Name]> reboot 0
Lists the parameters supported by the specified table. This list corresponds to the table information displayed in the HTTP interface. In this example, the CLI returns the list of parameters that make up an entry in the IP Access Table.
[Device-Name]> search mgmtipaccesstbl
Uploads a text-based configuration file from the AP to the TFTP Server. Executing upload with the asterisk character ("*") will make use of the previously set/stored TFTP parameters. Executing upload without parameters will display command help and usage information.
The following sections cover the two Parameter Control Commands (show and set) and include several tables showing parameter properties. These commands allow you to view (show) all parameters and statistics and to change (set) parameters.
Displays the value of the specified parameter, or displays all parameter values of a specified group (parameter table). Groups contain Parameters and Tables. Tables contain parameters for a series of similar entities.
To see a definition and syntax example, type only show and then press the Enter key. To see a list of available parameters, enter a question mark (?) after show (example: show ?).
Sets (modifies) the value of the specified parameter. To see a definition and syntax example, type only set and then press the Enter key. To see a list of available parameters, enter a space, then a question mark (?) after set (example: set?).
Syntax:
Certain objects supported by the Access Point require a device reboot in order for the changes to take effect. In order to inform the end-user of this behavior, the CLI provides informational messages when the user has configured an object that requires a reboot. The following messages are displayed as a result of the configuring such object or objects.
The following message is displayed every time the user has configured an object that requires the device to be rebooted.
[Device-Name]>set ipaddr 135.114.73.10
In addition to the above informational message, the CLI also provides a message as a result of the exit, quit, or done command if changes have been made to objects that require reboot. If you make changes to objects that require reboot and execute the exit command the following message is displayed:
[Device-Name]>exit<CR> OR quit<CR> OR done<CR>
In general, you will use the CLI show Command to view current parameter values and use the CLI set Command to change parameter values. As shown in the following examples, parameters may be set individually or all parameters for a given table can be set with a single statement.
Use 0 (zero) as the index to a table when creating an entry. When creating a table row, only the mandatory table elements are required (comment is usually an optional table element). For optional table elements, the default value is generally applied if you do not specify a value.
Use the index to be modified and the table elements you would like to modify. For example, suppose the IP Access Table has one entry and you wanted to modify the IP address:
You can also modify several elements in the table entry. Enter the index number and specific table elements you would like to modify. (Hint: Use the search Command to see the elements that belong to the table.)
The following example illustrates how to manage the second entry in a table.
This example illustrates how to view all elements of a group or table.
2. View all parameters in a table.
Each table element (or parameter) must be specified, as in the example below.
[Device-Name]>set mgmtipaccesstbl 0 ipaddr 10.0.0.10 ipmask 255.255.0.0
Below are the rules for creating, modifying, enabling/disabling, and deleting table entries.
Since there are several string objects supported by the AP, a string delimiter is required for the strings to be interpreted correctly by the command line parser. For this CLI implementation, the single quote or double quote character can be used at the beginning and at the end of the string.
For example:
The scenarios supported by this CLI are:
The string delimiter does not have to be used for every string object. The single quote or double quote only has to be used for string objects that contain blank space characters. If the string object being used does not contain blank spaces, then the string delimiters, single or double quotes, mentioned in this section are not required.
The CLI commands can be used to access, configure, and manage the AP using Telnet. Follow these steps:
There are a few basic configuration parameters that you may want to setup right away when you receive the AP. For example:
[Device-Name]>set sysname <system name> sysloc <Unit Location>
[Device-Name]>set ipaddrtype static
[Device-Name]>passwd <Old Password> <New Password> <Confirm Password> (CLI password)
[Device-Name]>set wif <index 3 (Slot A) or 4 (Slot B)> netname <Network Name (SSID) for wireless interface>
The TX Power Control feature lets the user configure the transmit power level of the card in the AP at one of four levels:
Perform the following commands to enable TX Power Control and set the transmit power level:
[Device-Name]>set txpowercontrol enable
Perform the following command to configure an SSID/VLAN pair, and to assign a Security Profile and RADIUS Profiles to it.
[Device-Name]>set wifssidtbl <Index.subindex> ssid <Network Name> vlanid <-1 to 1094> ssidauth <enable/disable> acctstatus <enable/disable> secprofile <Security Profile Nmuber> radmacprofile <MAC Authentication Profile Name> radeapprofile <EAP Authentication Profile Name> radacctprofile <Accounting Profile Name> radmacauthstatus <enable/disable> aclstatus <enable/disable> denynonencrypted <enable/disable>
set wifssidtbl 4.1 ssid accesspt1 vlanid 22 ssidauth enable acctstatus enable secprofile 1 radmacprofile "MAC Authentication" radeapprofile "EAP Authentication" radacctprofile "Accounting" radmacauthstatus enable aclstatus enable
Begin by starting your TFTP program. It must be running and configured to transmit and receive.
[Device-Name]>set tftpfilename <file name> tftpfiletype config
After following the complete process (above) once, you can download a file of the same name (so long as all the other parameters are the same), with the following command:
Begin by starting your TFTP program. It must be running and configured to transmit and receive.
After setting the TFTP parameters, you can backup your current file (so long as all the other parameters are the same), with the following command:
The Auto Configuration feature which allows an AP to be automatically configured by downloading a specific configuration file from a TFTP server during the boot up process.
Perform the following commands to enable and set up automatic configuration:
[Device-Name]>set autoconfigstatus <enable/disable>
There are other configuration settings that you may want to set for the AP. Some of them are listed below.
[Device-Name]>set dnsstatus enable
[Device-Name]>show linkinttbl (this shows the current links)
See Interfaces for information on the parameters listed below. Dual-radio APs use index 3 for Slot A and index 4 for Slot B.
[Device-Name]>set wif <index> mode <see table>
ACS is enabled by default. Reboot after disabling or enabling ACS.
[Device-Name]>set wif <index> autochannel <enable/disable>
[Device-Name]>set wif <index> closedsys <enable/disable>
[Device-Name]>set wif <index> wssstatus <1 (resume)/2 (shutdown)>
[Device-Name]>set wif <index> interrobust <enable/disable>
[Device-Name]>set wif <index> ldbalance <enable/disable>
[Device-Name]>set wif <index> meddendistrib <enable/disable>
[Device-Name]>set wif <index> distaps <large, medium, small, minicell, microcell>
[Device-Name]>set wif <index> multrate <1,2,5.5,11 (Mbits/sec)>
[Device-Name]>set wif 3 super <enable/disable>
[Device-Name]>set wif 3 turbo <enable/disable>
[Device-Name]>set etherspeed <value (see below)>
[Device-Name]>set mgmtipaccesstbl <index> ipaddr <IP address> ipmask <subnet mask>
[Device-Name]>set snmpifbitmask <(see below)>
Choose from the following values:
[Device-Name]>set httpport <HTTP port number (default is 80)>
Enabling SSL and configuring a passphrase allows encrypted Secure Socket Layer communications to the AP through the HTTPS interface.
HTTP Group Parameters
httpifbitmask : 15
[Device-Name]>set tellogintout <time in seconds between 1 and 300 (default is 30)>
[Device-Name]>set serbaudrate <2400, 4800, 9600, 19200, 38400, 57600>
Ethernet
Management
Passwords
IP Access Table
Services
Secure Management
SNMP Settings
SNMP Interface Bitmask: Configure the interface
or interfaces (Ethernet, Wireless-Slot A, Wireless-Slot B, All
Interfaces) from which you will manage the AP via SNMP. Select Disabled
to prevent a user from accessing the AP via SNMP.
HTTP Access
HTTP Interface Bitmap: Configure the interface
or interfaces (Ethernet, Wireless-Slot A, Wireless-Slot B, All
Interfaces) from which you will manage the AP via the Web interface. For
example, to allow Web configuration via the Ethernet network only, set HTTP
Interface Bitmask to Ethernet. Select Disabled to prevent
a user from accessing the AP from the Web interface.
HTTPS Access
Accessing the AP through the HTTPS
interface
The user should use a SSL intelligent browser to access
the AP through the HTTPS interface. After configuring SSL, access the AP using
https:// followed by the AP's management IP address.
Telnet Configuration Settings
Secure Shell (SSH) Settings
SSH Session Setup
SSH Clients
Clients
Version
Website
OpenSSH
V3.4-2
http://www.openssh.com
Putty
Rel 0.53b
http://www.chiark.greenend.org.uk
Zoc
5.00
http://www.emtec.com
Axessh
V2.5
http://www.labf.com
Configuring SSH
Uploading Externally Generated
Host Keys
Serial Configuration Settings
RADIUS Based Management Access
Automatic Configuration (AutoConfig)
Auto Configuration and the CLI
Batch File
Set up Automatic Configuration
for Static IP
TFTP server address and configuration filename
AutoConfig Successful
Set up Automatic Configuration
for Dynamic IP
TFTP server address and configuration filename
AutoConfig Successful
Hardware Configuration Reset (CHRP)
Configuration Reset via Serial
Port During Bootup
Configuring Hardware Reset
Procedure to Reset Configuration
via the Serial Interface
Filtering
Ethernet Protocol
To add an entry, click Add, and then specify
the Protocol Number and a Protocol Name.
Static MAC
Static MAC Filter Examples
Prevent Two Specific Devices from Communicating
Prevent Multiple Wireless Devices From Communicating With a Single Wired Device
Prevent All Wireless Devices From Communicating With a Single Wired Device
Prevent A Wireless Device From Communicating With the Wired Network
Prevent Messages Destined for a Specific Multicast Group from Being Forwarded to the Wireless LAN
Advanced
TCP/UDP Port
Protocol Type (TCP/UDP)
DestinationPort Number
Protocol Name
Interface
Status(Enable/Disable)
UDP
137
NETBIOS
Ethernet
Enable
Adding TCP/UDP Port Filters
Wireless Slot A
Ethernet and Wireless Slot A
Wireless Slot B
Ethernet and Wireless Slot B
Wireless Slot A and B
All Interfaces
Editing TCP/UDP Port Filters
Alarms
Groups
Trap Name
Description
TFTP Operation Failure
oriTrapTFTPFailedOperation
TFTP Operation Initiated
oriTrapTFTPOperationInitiated
TFTP Operation Completed
oriTrapTFTPOperationCompleted
Severity Levels
Alarm Host Table
Syslog
Setting Syslog Event Notifications
Configuring Syslog Event Notifications
Syslog Messages
Rogue Access Point Detection (RAD)
RAD Configuration Requirements
Configuring RAD
Bridge
Spanning Tree
Storm Threshold
Intra BSS
Packet Forwarding (Pkt Fwd)
QoS (Quality of Service)
RADIUS Profiles
RADIUS Servers per Authentication Mode and per VLAN
RADIUS-based VLAN Assignment
RADIUS Servers Enforcing VLAN Access Control
Configuring RADIUS Profiles
Adding or Modifying a RADIUS Server Profile
MAC Access Control Via RADIUS Authentication
802.1x Authentication using RADIUS
RADIUS Accounting
Session Length
SSID/VLAN/Security
Management VLAN
VLAN Overview
2. VLAN-aware switch (IEEE 802.1Q uplink)
3. AP management via wired host (SNMP, Web interface or CLI)
4. DHCP Server
5. RADIUS Server
6. VLAN 1
7. VLAN 2
VLAN Workgroups and Traffic Management
Typical User VLAN Configurations
Enabling/Disabling VLAN Protocol
Control Access to the AP
Provide Access to a Wireless Host in the Same Workgroup
Disable VLAN Management
MAC Access
Configuring MAC Access
MAC Access Control status is enabled or disabled when configuring each Security Profile.
Security Profiles
WEP Encryption
802.1x Authentication
Authentication Process
Wi-Fi Protected Access (WPA)
Authentication Protocol Hierarchy
VLANs and Security Profiles
Configuring Security Profiles
Wireless-A and Wireless-B
Adding or Modifying an SSID/VLAN with VLAN Protocol Disabled
.
Adding or Modifying an SSID/VLAN with VLAN Protocol Enabled
Broadcast SSID and Closed System
Monitoring the AP-2000
Logging into the HTTP Interface
Version
ICMP
IP/ARP Table
Learn Table
IAPP
RADIUS
Interfaces
Station Statistics
Enabling and Viewing Station Statistics
Refreshing Station Statistics
Description of Station Statistics
Performing Commands
Logging into the HTTP Interface
Introduction to File Transfer via TFTP or HTTP
TFTP File Transfer Guidelines
HTTP File Transfer Guidelines
Image Error Checking during File Transfer
Update AP via TFTP
Update AP via HTTP
Retrieve File via TFTP
Retrieve File via HTTP
Reboot
Reset
Help Link
Troubleshooting the AP-2000
Troubleshooting Concepts
Symptoms and Solutions
Connectivity Issues
AP Unit Will Not Boot - No LED Activity
Serial Link Does Not Work
(In HyperTerminal select:
File -> Properties -> Settings -> ASCII Setup -> Send Line Ends with Line Feeds)
Ethernet Link Does Not Work
Basic Software Setup and Configuration Problems
Lost AP, Telnet, or SNMP Password
The default AP HTTP password is "public", and the default Telnet password is also "public".
Client Computer Cannot Connect
AP Has Incorrect IP Address
HTTP (browser) or Telnet Interface Does Not Work
http://192.168.1.100
When the Enter Network Password window appears, leave the User Name field empty and enter the HTTP password in the Password field. The default HTTP password is "public".
HTML Help Files Do Not Appear
C:\Program Files\ORiNOCO\AP\HTML\
Telnet CLI Does Not Work
C:\> telnet <AP IP Address>
TFTP Server Does Not Work
Client Connection Problems
Client Software Finds No Connection
Client PC Card Does Not Work
Intermittent Loss of Connection
Client Does Not Receive an IP Address - Cannot Connect to Internet
VLAN Operation Issues
Verifying Proper Operation of the VLAN Feature
VLAN Workgroups
What if network traffic is being directed to a nonexistent host?
I have just configured the Management ID and now I can't manage the AP?
Active Ethernet (AE)
The AP Does Not Work
There Is No Data Link
"Overload" Indications
Recovery Procedures
Reset to Factory Default Procedure
Forced Reload Procedure
Download a New Image Using ScanTool
Preparing to Download the AP Image
Download Procedure
Download a New Image Using the Bootloader CLI
Preparing to Download the AP Image
Download Procedure
Setting IP Address using Serial Port
Hardware and Software Requirements
Attaching the Serial Port Cable
Initializing the IP Address using CLI
Related Applications
RADIUS Authentication Server
TFTP Server
Using the Command Line Interface (CLI)
General Notes
Prerequisite Skills and Knowledge
Notation Conventions
Important Terminology
Navigation and Special Keys
CLI Error Messages
Command Line Interface (CLI) Variations
Bootloader CLI
CLI Command Types
Operational CLI Commands
? (List Commands)
Example 1. Display Command list
Example 2. Display specific Commands
Example 3. Display parameters for set and show
Example 3a. Display every parameter that can be changed
Example 3b. Display parameters based on letter sequence
Example 4. Display Prompts for Successive Parameters
<TFTP IP Address>
<File Name>
<file type (config/img/bootloader)>
done, exit, quit
[Device-Name]> exit
[Device-Name]> quit
download
Device-Name]>download <tftp server address> <path and filename> <file type>
Example:
[Device-Name]>download 192.168.1.100 APImage2 img
[Device-Name]>download *
help
[Device-Name]>help <command name>
[Device-Name]><command name> help
history
passwd
reboot
[Device-Name]> reboot 30
search
upload
[Device-Name]>upload <tftp server address> <path and filename> <filetype>
Example:
[Device-Name]>upload 192.168.1.100 APconfig.sys config
[Device-Name]>upload *
Parameter Control Commands
"show" CLI Command
[Device-Name]>show <parameter>
[Device-Name]>show <group>
[Device-Name]>show <table>
Examples:
[Device-Name]>show ipaddr
[Device-Name]>show network
[Device-Name]>show mgmtipaccesstbl
"set" CLI Command
[Device-Name]>set <parameter> <value>
[Device-Name]>set <table> <index> <argument 1> <value 1> ... <argument N> <value N>
Example:
[Device-Name]>set sysloc "Main Lobby"
[Device-Name]>set mgmtipaccesstbl 0 ipaddr 10.0.0.10 ipmask 255.255.0.0
Configuring Objects that Require Reboot
Example 1: Configuring objects that require the device to be rebooted
The following elements require reboot
Example 2: Executing the "exit", "quit", or "done" commands when an object that requires reboot has been configured
Modifications have been made to parameters that require the device to be rebooted. These changes will only take effect after the next reboot.
"set" and "show" Command Examples
Example 1 - Set the Access Point IP Address Parameter
[Device-Name]>set <parameter name> <parameter value>
Example:
[Device-Name]> set ipaddr 10.0.0.12
Result: IP Address will be changed when you reboot the Access Point. The CLI reminds you when rebooting is required for a change to take effect. To reboot immediately, enter reboot 0 (zero) at the CLI prompt.
Example 2 - Create a table entry or row
Example:
[Device-Name]> set mgmtipaccesstbl 0 ipaddr 10.0.0.10 ipmask 255.255.0.0
Result: A new table entry is created for IP address 10.0.0.10 with a 255.255.0.0 subnet mask.
Example 3 - Modify a table entry or row
[Device-Name]>set mgmtipaccesstbl 1 ipaddr 10.0.0.11
[Device-Name]>set mgmtipaccesstbl 1 ipaddr 10.0.0.12 ipmask 255.255.255.248
cmt "First Row"
Example 4 - Enable, Disable, or Delete a table entry or row
[Device-Name]>set <Table> index status <enable, disable, delete>
[Device-Name]>set <Table> index status <1=enable, 2=disable, 3=delete>
Example:
[Device-Name]>set mgmtipaccesstbl 2 status enable
[Device-Name]>set mgmtipaccesstbl 2 status disable
[Device-Name]>set mgmtipaccesstbl 2 status delete
[Device-Name]>set mgmtipaccesstbl 2 status 2
Example 5 - Show the Group Parameters
[Device-Name]> show <group name>
Example:
[Device-Name]>show network
Result: The CLI displays network group parameters. Note show network and show ip return the same data.
Example 6 - Show Individual and Table Parameters
[Device-Name]>show <parameter name>
Example:
[Device-Name]> show ipaddr
Result: Displays the Access Point IP address.
[Device-Name]> show <table name>
Example:[Device-Name]> show mgmtipaccesstbl
Result: Displays the IP Access Table and its entries.
Using Tables & User Strings
Working with Tables
Using Strings
[Device-Name]> set sysname Lobby - Does not need quote marks
[Device-Name]> set sysname "Front Lobby" - Requires quote marks.
Configuring the AP using CLI commands
Log into the AP using HyperTerminal
Log into the AP using Telnet
Set Basic Configuration Parameters using CLI Commands
Set System Name, Location and Contact Information
[Device-Name]>set sysctname <Contact Name (person responsible for system)>
[Device-Name]>set sysctphone <Contact Phone Number> sysctemail <Contact E-mail address>
[Device-Name]>show system
Set Static IP Address for the AP
[Device-Name]>set ipaddr <fixed IP address of unit>
[Device-Name]>set ipsubmask <IP Mask>
[Device-Name]>set ipgw <gateway IP address>
[Device-Name]>show network
Change Passwords
[Device-Name]>set httppasswd <New Password> (HTTP interface password)
[Device-Name]>set snmprpasswd <New Password> (SNMP read password)
[Device-Name]>set snmprwpasswd <New Password> (SNMP read/write)
[Device-Name]>set snmpv3authpasswd <New Password> (SNMPv3 authentication password)
[Device-Name]>set snmpv3privpasswd <New Password> (SNMPv3 privacy password)
[Device-Name]>reboot 0
Set Network Names for the Wireless Interface
[Device-Name]>show wif
Enable and Configure TX Power Control for the Wireless Interface(s)
[Device-Name]>set wif <interface number> currenttxpowerlevel <value>
Allowed values are: 1 (100%), 2 (50%), 3 (25%), 4 (12.5%)
Configure SSID (Network Name) and VLAN Pairs, and Profiles
Examples:
[Device-Name]>set wifssidtbl 3.1 ssid accesspt1 vlanid 22 ssidauth enable acctstatus enable secprofile 1 radmacprofile "MAC Authentication" radeapprofile "EAP Authentication" radacctprofile "Accounting" radmacauthstatus enable aclstatus enable
Download an AP Configuration File from your TFTP Server
tftpipaddr <IP address of your TFTP server>
[Device-Name]>show tftp (to ensure the filename, file type, and the IP address are correct)
[Device-Name]>download *
[Device-Name]>reboot 0
Backup your AP Configuration File
[Device-Name]>show tftp (to ensure the filename, file type, and the IP address are correct)
Set up Auto Configuration
The default filename is "config". The default TFTP IP address is "10.0.0.2" for AP-2000.
[Device-Name]>set autoconfigfilename <filename>
Enter the filename of the configuration file that is used if the AP is configured for Static IP.
[Device-Name]>set autoconfigTFTPaddr <IP address>
Enter the TFTP server address that is used if the AP is configured for Static IP.
Other Network Settings
Configure the AP as a DHCP Server
[Device-Name]>set dhcpippooltbl 0 startipaddr <start ip address>
endipaddr <end ip address>
[Device-Name]>set dhcpgw <gateway ip address>
[Device-Name]>set dhcppridnsipaddr <primary dns ip address>
[Device-Name]>set dhcpsecdnsipaddr <secondary dns ip address>
[Device-Name]>set dhcpstatus enable
[Device-Name]>reboot 0
Configure the DNS Client
[Device-Name]>set dnsprisvripaddr <IP address of primary DNS server>
[Device-Name]>set dnssecsvripaddr <IP address of secondary DNS server>
[Device-Name]>set dnsdomainname <default domain name>
[Device-Name]>show dns
Maintain Client Connections using Link Integrity
[Device-Name]>set linkinttbl <1-5 (depending on what table row you wish to address)>
ipaddr <ip address of the host computer you want to check>
[Device-Name]>set linkintpollint <the interval between link integrity checks>
[Device-Name]>set linkintpollretx <number of times to retransmit before considering
the link down>
[Device-Name]>set linkintstatus enable
[Device-Name]>show linkinttbl (confirm new settings)
[Device-Name]>reboot 0
Change your Wireless Interface Settings
Operational Mode
Autochannel Select (ACS)
[Device-Name]>reboot 0
Enable/Disable Closed System
Shutdown/Resume Wireless Service
Enable/Disable Interference Robustness (802.11b Only)
Enable/Disable Load Balancing (802.11b Only)
Enable/Disable Medium Density Distribution (802.11b Only)
Set the Distance Between APs (802.11b Only)
[Device-Name]>reboot 0
Set the Multicast Rate (802.11b Only)
Enable/Disable Super Mode (802.11a/g only)
Enable/Disable Turbo Mode (802.11a/g only)
Set Ethernet Speed and Transmission Mode
[Device-Name]>reboot 0
Set Interface Management Services
Edit Management IP Access Table
Configure Management Ports
[Device-Name]>set httpifbitmask <(see below)>
[Device-Name]>set telifbitmask <(see below)>
Set Communication Ports
[Device-Name]>set telport <Telnet port number (default is 23)>
Configure Secure Socket Layer (HTTPS)
[Device-Name]>set sslstatus <enable/disable>
The user must change the SSL passphrase when uploading a new certificate/private key pair, which will have a corresponding passphrase.
[Device-Name]>set sslpassphrase <SSL certificate passphrase>
[Device-Name]>show http
To view all HTTP configuration information including SSL.
=====================
httppasswd : ********
httpport : 80
httphelplink : file:///C:/Program Files/ORiNOCO/AP2000/HTML/home.htm
httpsetupwiz : disable
sslstatus : enable
sslpassphrase : ********
Set Telnet Session Timeouts
[Device-Name]>set telsessiontout <time in seconds between 1 and 36000 (default is 900)>
Configure Serial Port Interface
[Device-Name]>set serflowctrl <none, xonxoff>
[Device-Name]>show serial
[Device-Name]>set syslogpriority <1-7 (default is 6)>
[Device-Name]>set syslogstatus <enable/disable>
[Device-Name]>set sysloghbstatus <enable/disable> (default is disable)
[Device-Name]>set sysloghbinterval <1 - 604800> (default is 900 seconds)
[Device-Name]>set sysloghosttbl <index> ipaddr <ipaddress> cmt <comment> status <enable/disable>
[Device-Name]>set intrabssoptype <passthru (default)/block)>
[Device-Name]>set macaclstatus enable
[Device-Name]>set macacloptype <passthru, block>
[Device-Name]>reboot 0
[Device-Name]>set macacltbl <index> macaddr <MAC Address> status enable
[Device-Name]>show macacltbl
[Device-Name]>set macacltbl <index> status <disable/delete>
[Device-Name]>show macacltbl
Perform the following command to configure a RADIUS Server and assign it to a VLAN. The RADIUS Server Profile index is specified by the index parameter and the subindex parameter specifies whether you are configuring a primary or secondary RADIUS server.
[Device-Name]>set radiustbl <Index> profname <Profile Name> seraddrfmt <1 - IP Address 2 - Name> sernameorip <IP Address or Name> port <value> ssecret <value> responsetm <value> maxretx <value> acctupdtintrvl <value> macaddrfmt <value> authlifetm <value> radaccinactivetmr <value> vlanid <vlan id -1 to 4094> status enable
set radiustbl 1.1 profname "MAC Authentication" seraddrfmt 1 sernameorip 20.0.0.20 port 1812 ssecret public responsetm 3 maxretx 3 acctupdtintrvl 0 macaddrfmt 1 authlifetm 900 radaccinactivetmr 5 vlanid 22 status enable
Secondary server configuration:
set radiustbl 1.2 profname "MAC Authentication" seraddrfmt 1 sernameorip 20.0.0.30 port 1812 ssecret public responsetm 3 maxretx 3 acctupdtintrvl 0 macaddrfmt 1 authlifetm 900 radaccinactivetmr 5 vlanid 33 status enable
Index : 1
Primary/Backup : Primary
Profile Name : MAC Authentication
Server Status : notReady
Server Addressing Format : ipaddr
IP Address/Host Name : 0.0.0.0
Destination Port : 1812
VLAN Identifier : -1
MAC Address Format : dashdelimited
Response Time : 3
Maximum Retransmission : 3
Authorization Lifetime : 0
Accounting Update Interval : 0
Accounting Inactivity Timer : 5
Index : 1
Primary/Backup : Backup
Profile Name : MAC Authentication
Server Status : notReady
Server Addressing Format : ipaddr
IP Address/Host Name : 0.0.0.0
Destination Port : 1812
VLAN Identifier : -1
MAC Address Format : dashdelimited
Response Time : 3
Maximum Retransmission : 3
Authorization Lifetime : 0
Accounting Update Interval : 0
Accounting Inactivity Timer : 5
Index : 2
Primary/Backup : Primary
Profile Name : EAP Authentication
Server Status : notReady
Server Addressing Format : ipaddr
IP Address/Host Name : 0.0.0.0
Destination Port : 0
VLAN Identifier : -1
MAC Address Format : dashdelimited
Response Time : 3
Maximum Retransmission : 3
Authorization Lifetime : 0
Accounting Update Interval : 0
Accounting Inactivity Timer : 5
Index : 2
Primary/Backup : Backup
Profile Name : EAP Authentication
Server Status : notReady
Server Addressing Format : ipaddr
IP Address/Host Name : 0.0.0.0
Destination Port : 0
VLAN Identifier : -1
MAC Address Format : dashdelimited
Response Time : 3
Maximum Retransmission : 3
Authorization Lifetime : 0
Accounting Update Interval : 0
Accounting Inactivity Timer : 5
Index : 3
Primary/Backup : Primary
Profile Name : Accounting
Server Status : notReady
Server Addressing Format : ipaddr
IP Address/Host Name : 0.0.0.0
Destination Port : 1813
VLAN Identifier : -1
MAC Address Format : dashdelimited
Response Time : 3
Maximum Retransmission : 3
Authorization Lifetime : 0
Accounting Update Interval : 0
Accounting Inactivity Timer : 5
Index : 3
Primary/Backup : Backup
Profile Name : Accounting
Server Status : notReady
Server Addressing Format : ipaddr
IP Address/Host Name : 0.0.0.0
Destination Port : 1813
VLAN Identifier : -1
MAC Address Format : dashdelimited
Response Time : 3
Maximum Retransmission : 3
Authorization Lifetime : 0
Accounting Update Interval : 0
Accounting Inactivity Timer : 5
Index : 4
Primary/Backup : Primary
Profile Name : Management Access
Server Status : notReady
Server Addressing Format : ipaddr
IP Address/Host Name : 0.0.0.0
Destination Port : 1812
VLAN Identifier : -1
MAC Address Format : dashdelimited
Response Time : 3
Maximum Retransmission : 3
Authorization Lifetime : 0
Accounting Update Interval : 0
Accounting Inactivity Timer : 5
Index : 4
Primary/Backup : Backup
Profile Name : Management Access
Server Status : notReady
Server Addressing Format : ipaddr
IP Address/Host Name : 0.0.0.0
Destination Port : 1812
VLAN Identifier : -1
MAC Address Format : dashdelimited
Response Time : 3
Maximum Retransmission : 3
Authorization Lifetime : 0
Accounting Update Interval : 0
Accounting Inactivity Timer : 5
The Rogue AP Detection (RAD) feature enables an additional security level for wireless LAN deployments. The RAD feature provides a mechanism for detecting Rogue Access Points by utilizing the coverage of the trusted Access Point deployment.
The Rogue AP Scan employs background scanning using low-level 802.11 scanning functions for effective wireless detection of Access Points in its coverage area with minimal impact on the normal operation of the Access Point.
The set radstatus command enables Rogue Access Point Detection. The scan repetition duration (radscanint) is also configurable.If the Access Point uses directional antennas to provide directional coverage, then the interface bitmask (radifbitmask) can be configured to maximize the scanning coverage area.
[Device-Name]>set radstatus enable
[Device-Name]>set radscanint <15-1440>
[Device-Name]>set radifbitmask <4 (WiF A), 8 (WiF B), or 12 (both interfaces)>
The Hardware Configuration Reset commands allows you to enable or disable the hardware reset functionality and to change the password to be used for configuration reset during boot up.
To disable hardware configuration reset, enter:
[Device-Name]>set hwconfigresetstatus disable
To enable hardware configuration reset, enter:
[Device-Name]>set hwconfigresetstatus enable
To define the Configuration Reset Password to be used for configuration reset during boot up, enter the following command
[Device-Name]>set configresetpasswd <password>]
[Device-Name]>set vlanstatus enable
[Device-Name]>set vlanmgmtid <-1-4094>
[Device-Name]>show wifssidtbl (to review your settings)
[Device-Name]>reboot 0
[Device-Name]>set vlanstatus disable or 2
[Device-Name]>set vlanmgmtid 0
[Device-Name]>reboot 0
Using the show command with the following table parameters will display operating statistics for the AP (these are the same statistics that are described in Monitoring the AP-2000 for the HTTP Web interface).
Objects contain groups that contain both parameters and parameter tables. Use the following Tables to configure the Access Point. Columns used on the tables include:
Access Point network objects are associated with Groups. The network objects are listed below and associated parameters are described in the following Parameter Tables:
The wireless interface group parameter is wif. For Dual-radio APs, Slot A uses table index 3 and Slot B uses table index 4.
Note 1: For 802.11a APs in Europe, Auto Channel Select is a read-only parameter; it is always enabled.
Note 1: Super Mode must be enabled first on the wireless interface before Turbo Mode can be enabled.
Note 1: Super Mode must be enabled first on the wireless interface before Turbo Mode can be enabled.
The Wireless Interface SSID table manages the SSID/VLAN pairs, and the Security Profile and RADIUS Profiles associated to the VLAN
The WDS Security Table manages WDS related security objects.
The RADIUS Based Management Access parameters allow you to enable HTTP or Telnet Radius Management Access, enable or disable local user access, and configure the local user password.
The default local user ID is root and the default local user password is public. "Root" cannot be configured as a valid user for RADIUS based management access when local user access is enabled.
The following commands enable or disable SSH and set the SSH host key.
The AP SSH feature, open-SSH, confirms to the SSH protocol, and supports SSH version 2.
The following SSH clients have been verified to interoperate with the AP's server. The following table lists the clients, version number, and the website of the client.
For key generation, only the OpenSSH client has been verified.
These parameters relate to the Auto Configuration feature which allows an AP to be automatically configured by downloading a specific configuration file from a TFTP server during the boot up process.
These parameters relate to upload and download commands.
When a user executes an upload and/or download Command, the specified arguments are stored in TFTP parameters for future use. If nothing is specified in the command line when issuing subsequent upload and/or download commands, the stored arguments are used.
When creating table entries, you may either specify the argument name followed by argument value or simply entering the argument value. When only the argument value is specified, then enter the values in the order depicted by the following table. CLI applies default values to the omitted arguments. Due to the nature of the information, the only argument that can be omitted is the "comment" argument.
Identify the different filters by using the table index.
The following parameters are used to enable/disable the Port filter feature.
The following parameters are used to configure TCP/UDP Port filters.
When creating table entries, you may either specifying the argument name followed by argument value. CLI applies default values to the omitted arguments. Due to the nature of the information, the only argument that can be omitted is the "comment" argument.
The following parameters configure the Syslog settings.
The table described below configures the Syslog hosts that will receive message from the AP. You can configure up to ten Syslog hosts.
The following parameters control the Intra BSS traffic feature, which prevent wireless clients that are associated with the same AP from communicating with each other:
The following parameters control the Packet Forwarding feature, which redirects wireless traffic to a specific MAC address:
The Hardware Configuration Reset commands allows you to enable or disable the feature and to change the password to be used for configuration reset during boot up.
The Security Profile Table allows you to configure security profiiles. A maximum of 16 security profiles are supported per wireless interface.
Each security profile can be enable and configure one or more security modes (None Secure Station, WEP Station, 802.1x Station, WPA Station, WPA-PSK Station). The WEP/PSK parameters are separately configurable for each security mode.
set secprofiletbl <index> secmode nonsecure status enable
Example: set secprofiletbl 2 secmode nonsecure status enable
set secprofiletbl <index> secmode wep encryptkey0 <value> encryptkeylength <vakue> encryptkeytx <value> status enable
Example: set secprofiletbl 3 secmode wep encryptkey0 12345 encryptkeylength 1 encryptkeytx 0 status enable
set secprofiletbl <index> secmode 802.1x rekeyint 900 status enable
Example: set secprofiletbl 4 secmode 802.1x rekeyint 900 status enable
set secprofiletbl <index> secmode wpa rekeyint 900 status enable
Example: set secprofiletbl 5 secmode wpa rekeyint 900 status enable
set secprofiletbl <index> secmode wpa-psk passphrase <value> status enable
Example: set secprofiletbl 6 secmode wpa-psk passphrase 12345678 status enable
set secprofiletbl <index> secmode 802.11i rekeyint <value> status enable
Example: set secprofiletbl 7 secmode 802.11i rekeyint 900 status enable
set secprofiletbl <index> secmode 802.11i-psk passphrase <value> status enable
Example: set secprofiletbl 8 secmode 802.11i-psk passphrase 12345678 status enable
These parameters enable or disable the SpectraLink Voice over IP feature.
The Spectralink Legacy Support parameter should be enabled if the AP is operating in 802.11bg mode and legacy 802.11 Spectralink telephones are used. This parameter will set the basic rates of the AP to be 1 and 2 Mbps in 802.11bg mode and will allow old telephones that operate only at the 1 and 2 Mbps basic rate to connect to the AP.
A CLI Batch file is a user-editable configuration file that provides a user-friendly way to change the AP configuration through a file upload. The CLI Batch file is an ASCII file that facilitates Auto Configuration because it does not require the user to access one of the AP's management interfaces to make configuration changes as is required with the proprietary TLV format configuration file.
The CLI Batch file does not replace the existing TLV format configuration file, which continues to define the configuration of the AP.
The CLI Batch file contains a list of CLI commands that the AP will execute. The AP performs the commands in the file immediately after the file is uploaded to the AP manually or during Auto Configuration.
The AP parses the file and executes the CLI commands. Commands that do not require a reboot take effect immediately, while commands that require a reboot (typically commands affecting a wireless interface) will take effect after reboot.
The Auto Configuration feature allows download of the TLV format configuration file or the CLI Batch file. The AP detects whether the file uploaded is TLV format or a CLI Batch file. If the AP detects a CLI Batch file (a file with extension .cli), the AP executes the file immediately.
The AP will reboot after executing the CLI Batch file. Auto Configuration will not result in repeated reboots if the CLI Batch file contains rebootable parameters.
The CLI Batch file must be named with a .cli extension to be recognized by the AP. The maximum file size allowed is 100 Kbytes, and files with larger sizes cannot be uploaded to the AP. The CLI commands supported in the CLI Batch File are a subset of the legal AP CLI commands.
The follow commands are supported:
Each command must be separated by a new line. Refer to Appendix A, CLI Command Reference for detailed command syntax.
The following is a sample CLI Batch File:
set sysname system1
set sysloc sunnyvale
set sysctname contact1
set sysctphone 1234567890
set sysctemail email@domain.com
set ipaddr 11.0.0.66
set ipaddrtype static
set ipsubmask 255.255.255.0
set ipgw 11.0.0.1
set wif 4 autochannel disable
set wif 4 mode 1
set syslogstatus enable
set sysloghbstatus enable
set sysloghbinterval 5
set wif 4 netname london
reboot
When a CLI Batch file contains a reboot command, the reboot will occur only after the entire CLI Batch file has been executed.
There are two methods of uploading the CLI Batch File:
If there is any error during the execution of the CLI Batch file, the AP will stop executing the file. The AP generates traps for all errors and each trap contains the following information:
The AP logs all the errors during execution and stores them in the Flash memory in a CLI Batch File Error Log named "CBFERR.LOG". The CLI Batch File Error Log can be downloaded though TFTP, HTTP, or CLI file transfer to a specified host.
You can configure WEP Encryption Keys in either Hexadecimal or ASCII format. Hexadecimal digits are 0-9 and A-F (not case sensitive). ASCII characters are 0-9, A-F, a-f (case sensitive), and punctuation marks. Each ASCII character corresponds to two hexadecimal digits.
The table below lists the ASCII characters that you can use to configure WEP Encryption Keys. It also lists the Hexadecimal equivalent for each ASCII character.
The tables below compare the software features available depending on the card type in the Access Point:
Note 1: A user cannot manually select a channel for products sold in Europe; these products require automatic channel selection using Dynamic Frequency Selection (DFS).
Note 1: Key lengths supported by 802.11a: 64-bit, 128-bit, and 152-bit.
Key lengths supported by 802.11b: 64-bit and 128-bit.
Key lengths supported by 802.11b/g: 64-bit, 128-bit, and 152-bit.
Note 2: EAP-MD5, EAP-TLS, EAP-TTLS, and PEAP client supplicant supported.
Note 3: Use in conjunction with WPA or 802.1x Authentication.
Note 4: Support is provided for a primary and backup RADIUS authentication server for both MAC-based authentication and 802.1x authentication.
Note 1: Includes Fallback to Primary RADIUS Server, RADIUS Session Timeout, RADIUS Multiple MAC Address Formats, RADIUS DNS Host Name Support, RADIUS Start/Stop Accounting.
Note 1: Available only one way (AP to client) if using an ORiNOCO ComboCard or a non-ORiNOCO client.
Note 2: No client support in 802.11a or 802.11b/g.
Note 3: This feature is not available if you are using an ORiNOCO ComboCard or a non-ORiNOCO client with an 802.11b AP.
Dimensions (H x W x L) = 6.5 x 18.5 x 26 cm (2.5 x 7.25 x 10.25 in.)
Weight = 1.75 Kg (3.5 lb.)
Dimensions (H x W x L) = 11.3 x 2.10 x 26.2 cm (4.5 x 0.83 x 10.3in.)
Weight = 0.18kg (0.4lb)
Voltage = 100 to 240 VAC (50-60 Hz)
Current = 0.2 amp
Power Consumption = 20 Watts
Input Voltage = 42 to 60 VDC
Output Current = 200mA at 48V
Power Consumption = 9-10 Watts
Operating = 0° to 40°C (32° to 104 °F) @ 20 to 90% relative humidity
Transport = -40° to 60°C (-40° to 140°F) @ 15 to 95% relative humidity (no condensation allowed)
Storage = -10° to 60°C (14° to 140°F) @ 10 to 90% relative humidity (no condensation allowed)
Operating = 0° to 70°C (32° to 158 °F) @ 20 to 90% relative humidity
Transport = -40° to 75°C (-40° to 167 °F) @ 15 to 95% relative humidity
Storage = -20° to 75°C (-4° to 167 °F) @ 10 to 95% relative humidity
10/100 Base-TX, RJ-45 female socket
Standard RS-232C interface with DB-9, female connector
Category 5, foiled, twisted pair cables must be used to ensure compliance with FCC Part 15, subpart B,
Class B requirements
Standard 802.3af pin assignments
The available 802.11a Channels varies by regulatory domain and/or country. 802.11a radio certification is available in the following regions:
There are five sets of frequency bands that determine the available channels depending on the regulatory domain.
Some countries restrict 802.11a operation to specific frequency bands. The Web interface and CLI display the available channels for a radio's particular regulatory domain. In the CLI, any channels that are not available are labeled "Not Supported".
Note 1: Channel 34 is the default channel for Japan
The available 802.11b channels vary by regulatory domain and/or country. 802.11b radio certification is available in the following regions:
Some countries restrict 802.11b operation to specific frequency bands. The web interface will always display the available channels depending in the cards regulatory domain. In the CLI, any channels that are not available are labeled "Not Supported".
Note 1: France is restricted to these four channels.
The available 802.11g channels vary by regulatory domain and/or country. 802.11g radio certification is available in the following regions:
Some countries restrict 802.11g operation to specific frequency bands. The web interface will always display the available channels depending in the cards regulatory domain. In the CLI, any channels that are not available are labeled "Not Supported".
Note 1: France is restricted to these channels.
Note 2: Channel 14 is only available when using 802.11b only mode.
The range of the wireless signal is related to the composition of objects in the radio wave path and the transmit rate of the wireless communication. Communications at a lower transmit range may travel longer distances. The range values listed in the Communications Range Chart are typical distances as calculated by Proxim's development team for FCC-certified products. These values provide a rule of thumb and may vary according to the actual radio conditions at the location where the product is used.
The range of your wireless devices can be affected when the antennas are placed near metal surfaces and solid high-density materials. Range is also impacted due to "obstacles" in the signal path of the radio that may either absorb or reflect the radio signal.
In Open Office environments, antennas can "see" each other (no physical obstructions between them). In Semi-open Office environments, workspace is divided by shoulder-height, hollow wall elements; antennas are at desktop level. In a Closed Office environment, solid walls and other obstructions may affect signal strength.
The following tables show typical range values for various environments for FCC-certified products (range may differ for products certified in other regulatory domains).
If you are having a problem using an AP and cannot resolve it with the information in Troubleshooting the AP-2000, gather the following information and contact ORiNOCO Technical Support:
You can reach ORiNOCO Technical Support as described below.
Your local supplier in the EMEA region is trained to give you the support you require. Local suppliers have direct access to the ORiNOCO Technical Support Center and will help you in every way they can.
Proxim Corporation warrants that its Products are manufactured solely from new parts, conform substantially to specifications, and will be free of defects in material and workmanship for a Warranty Period of 1 year from the date of purchase.
In the event a Product fails to perform in accordance with its specification during the Warranty Period, Proxim offers return-to-factory repair or replacement, with a thirty (30) business-day turnaround from the date of receipt of the defective Product at a Proxim Corporation Repair Center. When Proxim has reasonably determined that a returned Product is defective and is still under Warranty, Proxim shall, at its option, either: (a) repair the defective Product; (b) replace the defective Product with a refurbished Product that is equivalent to the original; or (c) where repair or replacement cannot be accomplished, refund the price paid for the defective Product. The Warranty Period for repaired or replacement Products shall be ninety (90) days or the remainder of the original Warranty Period, whichever is longer. This constitutes Buyer's sole and exclusive remedy and Proxim's sole and exclusive liability under this Warranty.
The express warranties set forth in this Agreement will not apply to defects in a Product caused; (i) through no fault of Proxim during shipment to or from Buyer, (ii) by the use of software other than that provided with or installed in the Product, (iii) by the use or operation of the Product in an application or environment other than that intended or recommended by Proxim, (iv) by modifications, alterations, or repairs made to the Product by any party other than Proxim or Proxim's authorized repair partners, (v) by the Product being subjected to unusual physical or electrical stress, or (vii) by failure of Buyer to comply with any of the return procedures specified in this Statement of Warranty.
Buyer should return defective LAN Products1 within the first 30 days to the merchant from which the Products were purchased. Buyer can contact a Proxim Customer Service Center either by telephone or via web. Calls for support for Products that are near the end of their warranty period should be made not longer than seven (7) days after expiration of warranty. Repair of Products that are out of warranty will be subject to a repair fee. Contact information is shown below. Additional support information can be found at Proxim's web site at http://support.proxim.com.
When contacting the Customer Service for support, Buyer should be prepared to provide the Product description and serial number and a description of the problem. The serial number should be on the product.
In the event the Customer Service Center determines that the problem can be corrected with a software update, Buyer might be instructed to download the update from Proxim's web site or, if that's not possible, the update will be sent to Buyer. In the event the Customer Service Center instructs Buyer to return the Product to Proxim for repair or replacement, the Customer Service Center will provide Buyer a Return Material Authorization ("RMA") number and shipping instructions. Buyer must return the defective Product to Proxim, properly packaged to prevent damage, shipping prepaid, with the RMA number prominently displayed on the outside of the container.
Calls to the Customer Service Center for reasons other than Product failure will not be accepted unless Buyer has purchased a Proxim Service Contract or the call is made within the first thirty (30) days of the Product's invoice date. Calls that are outside of the 30-day free support time will be charged a fee of $25.00 (US Dollars) per Support Call.
If Proxim reasonably determines that a returned Product is not defective or is not covered by the terms of this Warranty, Buyer shall be charged a service charge and return shipping charges.
Proxim stores all resolved problems in a solution database at the following URL: http://support.proxim.com.
Submit a question or open an issue to Proxim technical support staff at the following URL: http://support.proxim.com/cgi-bin/proxim.cfg/php/enduser/ask.php.
Proxim does not support internal mini-PCI devices that are built into laptop computers, even if identified as "ORiNOCO" devices. Customers having such devices should contact the laptop vendor's technical support for assistance.
For support for a PCMCIA card carrying a brand name other than Proxim, ORiNOCO, Lucent, Wavelan, or Skyline, Customer should contact the brand vendor's technical support for assistance.
Return to top.