background image

Advanced Configuration

6-9

6

MAC Address Format

 – MAC addresses can be specified in one of four formats, 

using no delimeter, with a single dash delimeter, with multiple dash delimeters, and 
with multiple colon delimeters.

VLAN ID Format

 – A VLAN ID (a number between 1 and 4094) can be assigned to 

each client after successful authentication using IEEE 802.1X and a central RADIUS 
server. The user VLAN IDs must be configured on the RADIUS server for each user 
authorized to access the network. VLAN IDs can be entered as hexadecimal 
numbers or as ASCII strings.

Primary Radius Server Setup

 – Configure the following settings to use RADIUS 

authentication on the access point.

• Radius Status: Enabling Radius Status allows the settings of RADIUS 

authentication. (Default: Enable)

• IP Address: Specifies the IP address or host name of the RADIUS server.
• Port: The UDP port number used by the RADIUS server for authentication 

messages. (Range: 1024-65535; Default: 1812)

• Key: A shared text string used to encrypt messages between the access point and 

the RADIUS server. Be sure that the same text string is specified on the RADIUS 
server. Do not use blank spaces in the string. (Maximum length: 255 characters)

• Timeout: Number of seconds the access point waits for a reply from the RADIUS 

server before resending a request. (Range: 1-60 seconds; Default: 5)

• Retransmit attempts: The number of times the access point tries to resend a 

request to the RADIUS server before authentication fails. (Range: 1-30; Default: 3)

• Accounting Port: The RADIUS Accounting server UDP port used for accounting 

messages. (Range: 0 or 1024-65535; Default: 0, disabled)

• Interim Update Timeout: The interval between transmitting accounting updates to 

the RADIUS server. (Range: 60-86400; Default: 3600 seconds)

Note:

For the Timeout and Retransmit attempts fields, accept the default values unless 
you experience problems connecting to the RADIUS server over the network.

Secondary Radius Server Setup

 – Configure a secondary RADIUS server to provide 

a backup in case the primary server fails. The access point uses the secondary 
server if the primary server fails or becomes inaccessible. Once the access point 
switches over to the secondary server, it periodically attempts to establish 
communication again with primary server. If communication with the primary server 
is re-established, the secondary server reverts to a backup role.

Summary of Contents for AWAP02O-86

Page 1: ...Enterprise Outdoor 802 11 a b g Access Point USER MANUAL...

Page 2: ...User Guide 2 4 GHz 5 GHz Wireless Outdoor Access Point IEEE 802 11g and 802 11a Dual band Access Point...

Page 3: ...Introduction Chapter 2 Hardware Pole Installation Chapter 3 Hardware Wall Installation Chapter 4 Network Configuration Chapter 5 Configuration Chapter 6 System Configuration Chapter 7 Country code set...

Page 4: ...does not have a cable connection to the wired Ethernet LAN Bridge Providing links to access points operating in Bridge or Root Bridge mode and thereby connecting other wired LAN segments Root Bridge P...

Page 5: ...ncludes 1 One Wireless Outdoor Access Point 2 One Mounting Kits 3 One 48W PoE Adapter 4 One User Guide CD Hardware Description Inform your dealer if there are any incorrect missing or damaged parts Wi...

Page 6: ...ent Protection WEP encryption IEEE 802 1X authentication via a RADIUS server Wi Fi Protected Access WPA and MAC address filtering features to protect your sensitive data and authenticate only authoriz...

Page 7: ...Server Enabled HTTP Server Port 80 HTTPS Server Enabled HTTPS Server Port 443 Web Redirect Disabled TCP IP DHCP Enabled IP Address 192 168 2 2 Subnet Mask 255 255 255 0 Default Gateway 0 0 0 0 Primary...

Page 8: ...isabled VLAN Management VLAN ID 1 VLAN ID VAP Interface 1 VLAN Tag Support Disabled QoS QoS Mode Off SVP SpectraLink Voice Priority Disabled Filter Control Local Bridge Disabled AP Management Enabled...

Page 9: ...Logging Facility Type 16 System Clock SNTP Server Status Enabled SNTP Server 1 IP 137 92 140 80 SNTP Server 2 IP 192 43 244 18 Date and Time 00 00 Jan 1 1970 when there is no time server Daylight Sav...

Page 10: ...Association Timeout Interval 30 minutes Authentication Timeout Interval 60 minutes Rogue AP Detection Disabled Antenna Control Method Diversity Antenna ID 0x0000 Antenna Location Indoor Wireless Secu...

Page 11: ...47 bytes Association Timeout Interval 30 minutes Authentication Timeout Interval 60 minutes Rogue AP Detection Disabled Antenna Control Method Diversity Antenna ID 0x0000 Antenna Location Indoor Wirel...

Page 12: ...System Defaults 1 11 1 Link Integrity Status Disabled Ping Interval 30 seconds Fail Retry Count 6 Table 1 1 System Defaults Feature Parameter Default...

Page 13: ...Chapter 2 3 Hardware Installation...

Page 14: ...ure wireless LAN for roaming wireless PCs Infrastructure wireless bridge to connect wired LANs Infrastructure wireless repeater for extended range The 802 11b and 802 11g frequency band which operates...

Page 15: ...ireless adapter connected via radio signals as an independent wireless LAN Computers in a specific ad hoc wireless LAN must therefore be configured to the same radio channel An ad hoc wireless LAN can...

Page 16: ...group via a radio link or access other computers or network resources in the wired LAN infrastructure via the access point The infrastructure configuration not only extends the accessibility of wirele...

Page 17: ...ccess points The SSID can be manually configured by the clients can be detected in an access point s beacon or can be obtained by querying for the identity of the nearest access point For clients that...

Page 18: ...The root bridge should be the unit connected to the main core of the wired LAN Other bridges must configure one parent link to the root bridge or to a bridge connected to the root bridge The other fi...

Page 19: ...o six WDS repeater links In repeater mode the access point does not support an Ethernet link to a wired LAN Note that when the access point operates in this mode only half the normal throughput is pos...

Page 20: ...se is received from the DHCP server then the access point uses the default address 192 168 2 2 If this address is not compatible with your network you can first use the command line interface CLI as d...

Page 21: ...provide network access to wireless clients The access point can be managed by any computer using a web browser Internet Explorer 5 0 or above or Netscape 6 2 or above Enter the default IP address http...

Page 22: ...Initial Configuration 5 4 5 The home page displays the Main Menu...

Page 23: ...he configured IP address of the access point or use the default address http 192 168 2 2 To log into the access point enter the default user name admin and then press LOGIN When the home page displays...

Page 24: ...22 AP Management Configures access to management interfaces 6 28 Administration Configures user name and password for management access upgrades software from local file FTP or TFTP server resets conf...

Page 25: ...fied on the network Default Enterprise Wireless AP Range 1 32 characters Security Enables each VAP interface sets the SSID and configures wireless security 6 69 Status Displays information about the a...

Page 26: ...e page 5 2 After you have network access to the access point you can use the web browser interface to modify the initial IP configuration if needed Note If there is no DHCP server on your network or D...

Page 27: ...servers located on another subnet type the IP address of the default gateway router in the text field provided Otherwise leave the address as all zeros 0 0 0 0 Primary and Secondary DNS Address The IP...

Page 28: ...Wi Fi Protected Access WPA wireless security A secondary RADIUS server may also be specified as a backup should the primary server fail or become inaccessible In addition the configured RADIUS server...

Page 29: ...System Configuration 6 8 6...

Page 30: ...is specified on the RADIUS server Do not use blank spaces in the string Maximum length 255 characters Timeout Number of seconds the access point waits for a reply from the RADIUS server before resendi...

Page 31: ...altered Clients can then securely use the local user name and password for access authentication Note that SSH client software needs to be installed on the management station to access the access poin...

Page 32: ...AC addresses can be manually configured on the access point itself without the need to set up a RADIUS server but managing a large number of MAC addresses across many access points is very cumbersome...

Page 33: ...station is compared against the local database stored on the access point Use the Local MAC Authentication section of this web page to set up the local database and configure all access points in the...

Page 34: ...all unknown MAC addresses that is those not listed in the local MAC database Deny Blocks access for all MAC addresses except those listed in the local database as Allow Allow Permits access for all M...

Page 35: ...access point Inter Client STAs Communication Filter Sets the global mode for wireless to wireless communications between clients associated to Virtual AP VAP interfaces on the access point Default Pre...

Page 36: ...access point You can add a maximum of four MAC addresses to the filter table Default Disabled MAC Address Specvifies a MAC address to filter in the form xx xx xx xx xx xx Permission Adds or deletes a...

Page 37: ...r an assigned client VLAN ID default VLAN ID or the management VLAN ID Traffic received from the wired network must also be tagged with one of these known VLAN IDs Received traffic that has an unknown...

Page 38: ...te The specific configuration of RADIUS server software is beyond the scope of this guide Refer to the documentation provided with the RADIUS server software VLAN Classification Enables or disables VL...

Page 39: ...es that is an STP compliant switch bridge or router in your network to ensure that only one route exists between any two stations on the network and provide backup links which automatically take over...

Page 40: ...n the wireless bridge network Up to six Child links are available to other bridges in the network Bridge Parent The physical layer address of the root bridge unit or the bridge unit connected to the r...

Page 41: ...network It selects a root port on each bridging device except for the root device which incurs the lowest path cost when forwarding a packet from that device to the root device Then it selects a desig...

Page 42: ...ge 0 65535 Default 32768 Bridge Max Age The maximum time in seconds a device can wait without receiving a configuration message before attempting to reconfigure All device ports except for designated...

Page 43: ...ss interface 40 Link Port Priority Defines the priority used for this port in the Spanning Tree Protocol If the path cost for all ports on a switch are the same the port with the highest priority i e...

Page 44: ...the access point will reject the connection UI Management Enables or disables management access through Telnet the Web HTTP or SNMP interfaces Default Enabled Note Secure Web HTTPS connections are no...

Page 45: ...ccess to the access point may be able to compromise access point and network security Once a new Administrator has been configured you can delete the default admin user name from the system Note Press...

Page 46: ...ew access point software from a local file on the management workstation or from an FTP or TFTP server New software may be provided periodically from your distributor After upgrading new software you...

Page 47: ...software is stored If upgrading from an FTP server be sure that you have an account configured on the server with a user name and password If VLANs are configured on the access point determine the VL...

Page 48: ...nfiguration file to a specified remote FTP or TFTP server A configuration file can also be downloaded to the access point to restore a specific configuration Export Import Select Export to upload a fi...

Page 49: ...Advanced Configuration 6 33 6 Upon uploading a new configuration file you will be prompted to either restore factory settings or reboot the unit...

Page 50: ...to memory or sent to a Syslog server The logged messages serve as a valuable tool for isolating access point and network problems System Log Setup Enables the logging of error messages Default Disabl...

Page 51: ...in the access point s memory are erased when the device is rebooted Logging Facility Type Sets the facility type for remote logging of syslog messages The command specifies the facility type tag sent...

Page 52: ...periodically sending time synchronization requests to specific time servers You can configure up to two time server IP addresses The access point will attempt to poll each server in the configured se...

Page 53: ...ero degrees longitude To display a time corresponding to your local time you must indicate the number of hours your time zone is located before east or after west UTC Enable Daylight Saving The access...

Page 54: ...s both the format of the MIB specifications and the protocol used to access this information over the network The access point includes an onboard agent that supports SNMP versions 1 2c and 3 clients...

Page 55: ...ns SNMP Enables or disables SNMP management access and also enables the access point to send SNMP traps notifications Default Disable Location A text string that describes the system location Maximum...

Page 56: ...sent with the notification operation Maximum length 23 characters case sensitive Default public Engine ID Sets the engine identifier for the SNMPv3 agent that resides on the access point This engine p...

Page 57: ...Fail A client station has failed MAC address authentication with the RADIUS server dot1xAuthNotInitiated A client station did not initiate 802 1X authentication dot1xAuthSuccess A 802 1X client statio...

Page 58: ...longer associates with the network dot11StationAuthenticateFail A client station has tried and failed to authenticate to the network Enable All Traps Click the button to enable all the available trap...

Page 59: ...e corresponding Passphrase field Priv Type The data encryption type used for the SNMP user either DES or none When DES is selected enter a key in the corresponding Passphrase field Passphrase The pass...

Page 60: ...opens to configure the filter see below To edit an existing filter select the radio button next to the entry in the table and then click the Edit button To delete a filter select the radio button nex...

Page 61: ...start with a Filter Type Indicates if the filter is to include or exclude the MIB subtree objects from the filter Note that MIB objects included in the filter are not sent to the receiving target and...

Page 62: ...gure the settings see below To edit an existing target select the radio button next to the entry in the table and then click the Edit button To delete targets select the radio button next to the entry...

Page 63: ...characters IP Address Specifies the IP address of the receiving management station UDP Port The UDP port that is used on the receiving management station for notification messages SNMP User The defin...

Page 64: ...tual access point VAP interfaces numbered 0 to 3 Each VAP functions as a separate access point and can be configured with its own Service Set Identification SSID and security settings However most rad...

Page 65: ...system After you have configured the radio settings go to the Security page under the 802 a Interface see Security on page 6 69 enable the radio service for any of the VAP interfaces and then set an S...

Page 66: ...lient is disassociated from the VAP interface Range 5 60 minutes Default 30 minutes WPA2 PMKSA Life Time WPA2 provides fast roaming for authenticated clients by retaining keys and other security setti...

Page 67: ...tion Rogue AP A rogue AP is either an access point that is not authorized to participate in the wireless network or an access point that does not have the correct security configuration Rogue APs can...

Page 68: ...milliseconds Rogue AP Authenticate Enables or disables RADIUS authentication Enabling RADIUS Authentication allows the access point to discover rogue access points With RADIUS authentication enabled t...

Page 69: ...f up to 108 Mbps Enabling Turbo Mode allows the access point to provide connections up to 108 Mbps Default Disabled Note In normal mode the access point provides a channel bandwidth of 20 MHz and supp...

Page 70: ...the service area Options 100 50 25 12 minimum Default 100 Note When operating the access point using 5 GHz channels in a European Community country the end user and installer are obligated to operate...

Page 71: ...nce of the access point can be improved by selecting the best method for the specific deployment Default Software Hardware Provides best performance when the number of supported clients is less than 2...

Page 72: ...p the retransmission of smaller frames However it is more efficient to set the fragment size larger if very little or no interference is present because it requires overhead to send multiple frames Ra...

Page 73: ...the Wi Fi Multimedia WMM standard Using WMM the access point is able to prioritize traffic and optimize performance when multiple applications compete for wireless network bandwidth at the same time...

Page 74: ...dent on two timing parameters AIFSN Arbitration Inter Frame Space Number a number used to calculate the minimum time between data frames CW Contention Window a number used to calculate a random backof...

Page 75: ...values equate to less backoff and wait time and therefore more transmit opportunities To configure WMM select the Radio Settings page and scroll down to the WMM configuration settings AIFS Random Bac...

Page 76: ...limit of the random backoff wait time before wireless medium access can be attempted The initial wait time is a random value between zero and the CWMin value Specify the CWMin value in the range 0 15...

Page 77: ...ngs that apply to the individual VAPs Virtual Access Point and the common radio settings that apply to all of the 802 11g interfaces After you have configured the radio settings go to the Security pag...

Page 78: ...s specific to the 802 11g interface are included in this section To configure the 802 11g radio settings select the Radio Settings page Radio Mode Selects the operating mode for the 802 11g wireless i...

Page 79: ...tance is affected by the data rate The lower the data rate the longer the transmission distance Default 54 Mbps Super G The Atheros proprietary Super G performance enhancements are supported by the ac...

Page 80: ...between the access point and clients must be protected from interception and eavesdropping For a more secure network the access point can implement one or a combination of the following security mech...

Page 81: ...bled system and network card driver native support provided in Windows XP Provides robust security in WPA only mode i e WPA clients only Offers support for legacy WEP clients but with increased securi...

Page 82: ...Settings Authentication Shared Key or Open System Encryption Enable 802 1x Disable Local RADIUS or Disabled Yesc Dynamic WEP 802 1x only Interface Detail Settings Authentication Open System Encryption...

Page 83: ...authentication rates Local or Disabled Yes WPA2 Pre Shared Key only Interface Detail Settings Authentication WPA2 PSK Encryption Enable WPA Configuraton Required Cipher Suite AES CCMP 802 1x Disable W...

Page 84: ...urity under Radio A or Radio G set an SSID to identify the wireless network service provided by each VAP you want to use and then click Apply to save your settings Before enabling the radio service fo...

Page 85: ...mended for a high level of network security For more robust wireless security the access point provides Wi Fi Protected Access WPA for improved data encryption and user authentication Setting up share...

Page 86: ...ent with clients using static WEP keys and WPA select WEP transmit key index 2 3 or 4 The access point uses transmit key index 1 for the generation of dynamic keys To enable WEP shared keys for a VAP...

Page 87: ...so provides native WPA support Other systems require additional client software to support 802 1X and WPA Encryption Enable or disable the access point to use data encryption WEP TKIP or AES If this o...

Page 88: ...twork card driver and 802 1X client software that supports the EAP authentication type that you want to use Windows XP provides native WPA support other systems require additional software Temporal Ke...

Page 89: ...nd support for TKIP encryption The main differences and enhancements in WPA2 can be summarized as follows Advanced Encryption Standard AES WPA2 uses AES Counter Mode encryption with Cipher Block Chain...

Page 90: ...icated to a wireless network it has to be fully authenticated When the client is about to roam to another access point in the network the access point sends pre authentication messages to the new acce...

Page 91: ...hentication WPA2 PSK Clients using WPA2 with a Pre shared Key are accepted for authentication WPA WPA2 mixed Clients using WPA or WPA2 over 802 1X are accepted for authentication WPA WPA2 PSK mixed Cl...

Page 92: ...WPA2 PSK or WPA WPA2 mixed Cipher Suite WEP TKIP AES CCMP WPA Pre shared Key Type Hex ASCII Encryption Enabled Authentication Setup WPA WPA2 WPA WPA2 mixed Cipher Suite WEP TKIP AES CCMP requires RAD...

Page 93: ...either digital certificates user names and passwords or other from the client to the RADIUS server Client authentication is then verified on the RADIUS server before the access point grants client acc...

Page 94: ...after successful wireless association with the access point The 802 1X supported mode allows access for clients not using WPA or WPA2 security Required The access point enforces 802 1X authentication...

Page 95: ...cked Range 0 65535 seconds Default 0 means disabled Status Information The Status page includes information on the following items Access Point Status The AP Status window displays basic system config...

Page 96: ...G MAC The physical layer address for the 802 11b g interface System Name Name assigned to this system System Contact Administrator responsible for the system IP Address IP address of the management in...

Page 97: ...w Note that Interface Wireless A refers to the 802 11a radio and Interface Wireless G refers the 802 11b g radio SSID The service set identifier for the VAP interface Radio Channel The radio channel t...

Page 98: ...ent identity by distributing a shared key to stations before attempting authentication Associated Shows if the station has been successfully associated with the access point Once authentication is com...

Page 99: ...Error Messages An example of a logged error message is Station Failed to authenticate unsupported algorithm This message may be caused by any of the following conditions Access point was set to Open A...

Page 100: ...or each port ID Displays the port ID number Priority The priority designated to the specified port Path Cost Displays the path cost value for the specified port Status Displays if STP is enabled or di...

Page 101: ...ration See the following table for a full list of codes Table 7 5 Country Codes Country Code Country Code Country Code Country Code Albania AL Dominican Republic DO Kuwait KW Romania RO Algeria DZ Ecu...

Page 102: ...UA Bulgaria BG Indonesia ID Qatar QA United Arab Emirates AE Canada CA Iran IR Oman OM United Kingdom GB Chile CL Ireland IE Pakistan PK United States US China CN Israel IL Panama PA Uruguay UY Colomb...

Page 103: ...ice Set ESS are configured to the same SSID and authentication method 2 If the access point cannot be configured using the Telnet a web browser or SNMP software Be sure to have configured the access p...

Page 104: ...interface 4 If all other recovery measure fail and the access point is still not functioning properly take any of these steps Reset the access point s hardware using the console interface web interfac...

Page 105: ...The following figure illustrates how the pins on the RJ 45 connector are numbered Be sure to hold the connectors in the same orientation when attaching the wires to the pins 10 100BASE TX Pin Assignm...

Page 106: ...Table B 1 10 100BASE TX MDI Port Pinouts Pin MDI Signal Name 1 Transmit Data plus TD 2 Transmit Data minus TD 3 Receive Data plus RD 4 GND Positive Vport 5 GND Positive Vport 6 Receive Data minus RD...

Page 107: ...rvers or other end nodes that only have MDI ports However if the device to which you are connecting supports auto MDIX operation you can use either straight through or crossover cable White Orange Str...

Page 108: ...ance 10 13 MKK 1 14 Taiwan 1 11 Maximum Clients 64 per VAP interface Operating Range See Operating Range on page C 6 Data Rate 802 11a Normal Mode 6 9 12 18 24 36 48 54 Mbps per channel Turbo Mode 12...

Page 109: ...pe 5 25 5 35 GHz middle band Taiwan 5 725 5 825 GHz high band Taiwan 802 11b 2 4 2 4835 GHz US Canada ETSI 2 4 2 497 GHz Japan 2 400 2 4835 GHz Taiwan Power Adapter Input 100 240 AC 50 60 Hz Output 48...

Page 110: ...tification FCC Part 15C 15 247 15 207 2 4 GHz FCC part 15E 15 407 5 GHz RSS 210 Canada EN 301 893 EN 300 328 EN 301 489 1 EN 301 489 17 MPT RCR std 33 D33 1 13 Channel T66 Channel 14 Safety cCSAus CSA...

Page 111: ...87 87 QPSK 12 Mbps 86 86 86 86 QPSK 18 Mbps 84 84 84 84 16 QAM 24 Mbps 82 81 81 81 16 QAM 36 Mbps 80 79 78 78 64 QAM 48 Mbps 73 73 73 73 64QAM 54 Mbps 70 70 69 67 IEEE 802 11g Data Rate Sensitivity dB...

Page 112: ...20 20 20 36 Mbps 18 17 17 18 48 Mbps 17 17 17 17 54 Mbps 12 17 17 16 IEEE 802 11g Maximum Output Power GHz dBm Data Rate 2 412 2 417 2 467 2 472 6 Mbps 20 20 20 9 Mbps 20 20 20 12 Mbps 20 20 20 18 Mbp...

Page 113: ...Distance Ranges Environment 108 Mbps 72 Mbps 54 Mbps 48 Mbps 36 Mbps 24 Mbps 18 Mbps 12 Mbps 9 Mbps 6 Mbps Outdoors1 30 m 99 ft 40 m 131 ft 85 m 279 ft 250 m 820 ft 310 m 1016 ft 400 m 1311 ft 445 m 1...

Page 114: ...tion algorithm that implements symmetric key cryptography AES provides very strong encryption using a completely different ciphering algorithm to TKIP and WEP Authentication The process to verify the...

Page 115: ...ice Set ESS More than one wireless cell can be configured with the same Service Set Identifier to allow mobile users can roam between different cells with the Extended Service Set Extensible Authentic...

Page 116: ...the wireless signaling required to ensure the successful handover of wireless clients roaming between different 802 11f compliant access points Local Area Network LAN A group of interconnected comput...

Page 117: ...NOT be enabled Service Set Identifier SSID An identifier that is attached to packets sent over the wireless LAN and functions as a password for joining a particular radio cell i e Basic Service Set B...

Page 118: ...adio spectrum Virtual LAN VLAN A Virtual LAN is a collection of network nodes that share the same collision domain regardless of their physical location or connection point in the network A VLAN serve...

Page 119: ...configuring 7 42 community string 6 40 7 42 configuration settings saving or restoring 6 32 7 57 configuration initial setup 5 1 console port 1 4 connecting 2 2 pin assignments B 3 required settings...

Page 120: ...frastructure wireless bridge 4 5 wireless repeater 4 6 initial setup 5 1 installation hardware 2 1 3 1 location considerations 3 1 mounting 2 1 IP address BOOTP DHCP 7 91 7 92 configuring 5 2 6 5 7 91...

Page 121: ...ommunity string 7 42 enabling traps 6 40 7 43 trap destination 6 40 7 44 trap manager 6 40 7 44 SNTP 6 36 7 35 enabling client 6 36 7 35 server 6 36 7 35 software displaying version 6 30 6 86 7 25 dow...

Page 122: ...on 6 52 7 134 native ID 6 52 W WEP 6 74 configuring 6 74 shared key 6 75 7 123 Wi Fi Multimedia See WMM Wi Fi Protected Access See WPA Wired Equivalent Protection See WEP WPA 6 79 pre shared key 6 82...

Reviews: