background image

Radio Interface

6-37

6

Radio Interface

The IEEE 802.11a and 802.11g interfaces include configuration options for radio 
signal characteristics and wireless security features. The configuration options are 
nearly identical, but depend on which interface is operating as the bridge band. Both 
interfaces and operating modes are covered in this section of the manual. 

The access point can operate in the following modes:

• 802.11a in bridge mode and 802.11g in access point mode
• 802.11a in access point mode and 802.11g in bridge mode
• 802.11a and 802.11g both in access point mode (no bridging)
• 802.11a only in bridge or access point mode
• 802.11g only in bridge or access point mode

Note that 802.11g is backward compatible with 802.11b and can be configured to 
support both client types or restricted to 802.11g clients only. Both wireless 
interfaces are configured independently under the following web pages:

• Radio Interface A: 802.11a 
• Radio Interface G: 802.11b/g 

Note:

The radio channel settings for the wireless bridge are limited by local 
regulations, which determine the number of channels that are available.

Summary of Contents for AWAP05O

Page 1: ...Dual Band Outdoor Access Point Bridge User Guide ...

Page 2: ......

Page 3: ...User Guide Guide Dual Band Outdoor Access Point Bridge IEEE 802 11a b g Access Point Bridge Master unit with External Antenna Options Slave unit with Integrated High Gain Antenna ...

Page 4: ...AWAP05O ZZ AWAP05OM ZZ F1 1 0 0 E072004 R01 150xxxxxxxxA ...

Page 5: ... strap or take other suitable measures to prevent electrostatic discharge when handling this equipment 2 When connecting this device to a power outlet connect the field ground lead on the tri pole power plug to a valid earth ground line to prevent electrical hazards IMPORTANT NOTE FCC Radiation Exposure Statement This equipment complies with FCC radiation exposure limits set forth for an uncontrol...

Page 6: ...y This unit cannot be powered from IT supplies If your supplies are of IT type this unit must be powered by 230 V 2P T via an isolation transformer ratio 1 1 with the secondary connection point labelled Neutral connected directly to earth ground Impédance à la terre Power Cord Set U S A and Canada The cord set must be UL approved and CSA certified The minimum specifications for the flexible cord a...

Page 7: ...re Si vos alimentations sont du type impédance à la terre ce groupe doit être alimenté par une tension de 230 V 2 P T par le biais d un transformateur d isolement à rapport 1 1 avec un point secondaire de connexion portant l appellation Neutre et avec raccordement direct à la terre masse Bitte unbedingt vor dem Einbauen des wireless bridges die folgenden Sicherheitsanweisungen durchlesen WARNUNG D...

Page 8: ...g des Geräts kann nur durch Herausziehen des Gerätenetzkabels aus der Netzsteckdose unterbrochen werden Der Betrieb dieses Geräts erfolgt unter den SELV Bedingungen Sicherheitskleinstspannung gemäß IEC 60950 Diese Bedingungen sind nur gegeben wenn auch die an das Gerät angeschlossenen Geräte unter SELV Bedingungen betrieben werden Stromkabel Dies muss von dem Land in dem es benutzt wird geprüft we...

Page 9: ...ss Point or Bridge 2 1 Infrastructure Wireless LAN 2 2 Infrastructure Wireless LAN for Roaming Wireless PCs 2 3 Bridge Link Topologies 2 4 Point to Point Configuration 2 4 Point to Multipoint Configuration 2 4 Chapter 3 Bridge Link Planning 3 1 Data Rates 3 1 Radio Path Planning 3 2 Antenna Height 3 3 Antenna Position and Orientation 3 4 Radio Interference 3 5 Weather Conditions 3 5 Ethernet Cabli...

Page 10: ...tem WDS 6 29 Bridge 6 30 Spanning Tree Protocol STP 6 33 Radio Interface 6 37 Radio Settings 802 11a 6 38 Radio Settings 802 11g 6 42 Security Bridge Mode 6 44 Security Access Point Mode 6 49 Status Information 6 60 AP Status 6 60 Station Status 6 62 Event Logs 6 64 Chapter 7 Command Line Interface 7 1 Using the Command Line Interface 7 1 Accessing the CLI 7 1 Telnet Connection 7 1 Entering Comman...

Page 11: ...m Logging Commands 7 15 logging on 7 15 logging host 7 16 logging console 7 16 logging level 7 17 logging facility type 7 17 show logging 7 18 System Clock Commands 7 18 sntp server ip 7 19 sntp server enable 7 19 sntp server date time 7 20 sntp server daylight saving 7 21 sntp server timezone 7 21 show sntp 7 22 show system 7 22 show version 7 23 SNMP Commands 7 23 snmp server community 7 24 snmp...

Page 12: ...hentication session timeout 7 40 show authentication 7 40 WDS Commands 7 41 wds channel 7 41 wds mac address 7 41 wds enable 7 42 show wds 7 42 Bridge Commands 7 44 bridge timeout 7 44 bridge stp bridge spanning tree 7 45 bridge stp bridge forward time 7 45 bridge stp bridge hello time 7 46 bridge stp bridge max age 7 46 bridge stp bridge priority 7 47 bridge stp port path cost 7 48 bridge stp por...

Page 13: ...p dhcp 7 63 shutdown 7 64 show interface ethernet 7 64 Wireless Interface Commands 7 65 interface wireless 7 66 description 7 66 ssid 7 67 closed system 7 67 speed 7 68 channel 7 68 turbo 7 69 beacon interval 7 69 dtim period 7 70 fragmentation length 7 71 rts threshold 7 71 transmit power 7 72 max association 7 73 authentication 7 73 encryption 7 74 key 7 75 transmit key 7 76 multicast cipher 7 7...

Page 14: ...ted Panel B 3 8 dBi Omnidirectional 2 4 GHz B 4 8 dBi Omnidirectional 5 GHz B 5 13 5 dBi 120 Degree Sector B 7 16 5 dBi 60 Degree Sector B 8 23 dBi High Gain Panel B 10 Appendix C Cables and Pinouts C 1 Twisted Pair Cable Assignments C 1 10 100BASE TX Pin Assignments C 2 Straight Through Wiring C 2 Crossover Wiring C 2 8 Pin DIN Connector Pinout C 3 8 Pin DIN to RJ 45 Cable Wiring C 4 Glossary Ind...

Page 15: ...ffers a fast reliable and cost effective solution for connectivity between remote Ethernet wired LANs or to provide Internet access to an isolated site The system is also easy to install and operate ideal for situations where a wired link may be difficult or expensive to deploy The wireless bridge connection provides data rates of up to 108 Mbps In addition both wireless bridge models offer full n...

Page 16: ...P05OM Outdoor pole mounting bracket kit Outdoor wall mounting bracket kit This User Guide Inform your dealer if there are any incorrect missing or damaged parts If possible retain the carton including the original packing materials Use them again to repack the product in case there is a need to return it Hardware Description Ethernet Port RSSI Connector with Protective Cap Grounding Point Screw In...

Page 17: ... The AWAP05O and AWAP05OM units both require the 2 4 GHz 8 dBi omnidirectional external antenna for 2 4 GHz operation The following table summarizes the external antenna options External antennas connect to the N type RF connectors on the wireless bridge using the provided coaxial cables Antenna Type Gain dBi HPBW Horizontal HPBW Vertical Polarization Max Range Speed 5 GHz Omnidirectional 8 360 12...

Page 18: ...power over Ethernet technology A power injector module is included in the wireless bridge package and provides two RJ 45 Ethernet ports one for connecting to the wireless bridge Output and the other for connecting to a local LAN switch Input The Input port uses an MDI i e internal straight through pin configuration You can therefore use straight through twisted pair cable to connect this port to m...

Page 19: ...eless bridge link Grounding Point Even though the wireless bridge includes its own built in lightning protection it is important that the unit is properly connected to ground A grounding screw is provided for attaching a ground wire to the unit Wall and Pole Mounting Bracket Kits The wireless bridge includes bracket kits that can be used to mount the bridge to a wall pole radio mast or part of a t...

Page 20: ...or module Includes wall and pole mount brackets Security through 64 128 152 bit Wired Equivalent Protection WEP or 128 bit Advanced Encryption Standard AES encryption Scans all available channels and selects the best channel and data rate based on the signal to noise ratio Manageable through an easy to use web browser interface command line via Telnet or SNMP network management tools System Defaul...

Page 21: ... Syslog Disabled Logging Host Disabled Logging Console Disabled IP Address Host Name 0 0 0 0 Logging Level Informational Logging Facility Type 16 Spanning Tree Status Enabled Ethernet Interface Speed and Duplex Auto Wireless Interface 802 11a Status Enabled Turbo Mode Disabled Radio Channel Default to first channel Auto Channel Select Enabled Transmit Power Full Maximum Data Rate 54 Mbps Beacon In...

Page 22: ...ed Radio Channel Default to first channel Auto Channel Select Enabled Transmit Power Full Maximum Data Rate 54 Mbps Beacon Interval 100 TUs Data Beacon Rate DTIM Interval 2 beacons RTS Threshold 2347 bytes Wireless Security 802 11b g Authentication Type Open System AES Encryption Disabled WEP Encryption Disabled WEP Key Length 128 bits WEP Key Type Hexadecimal WEP Transmit Key Number 1 WEP Keys nu...

Page 23: ...ess network cards adapters and access points can be configured as Ad hoc for departmental SOHO or enterprise LANs Infrastructure for wireless LANs Infrastructure wireless LAN for roaming wireless PCs The 802 11b and 802 11g frequency band which operates at 2 4 GHz can easily encounter interference from other 2 4 GHz devices such as other 802 11b or g wireless devices cordless phones and microwave ...

Page 24: ...in the wired LAN infrastructure through the access point The infrastructure configuration not only extends the accessibility of wireless PCs to the wired LAN but also increases the effective wireless transmission range for wireless PCs by passing their signals through one or more access points A wireless infrastructure can be used for access to a central database or for connection between mobile w...

Page 25: ...anually configured by the clients can be detected in an access point s beacon or can be obtained by querying for the identity of the nearest access point For clients that do not need to roam set the SSID for the wireless card to that used by the access point to which you want to connect A wireless infrastructure can also support roaming for mobile workers More than one access point can be configur...

Page 26: ...n only associate with the wireless bridge using a radio band set to access point mode Point to Point Configuration Two AWAP05O bridges can form a wireless point to point link using their integrated antennas A point to point configuration can provide a limited data rate 36 Mbps link over a long range up to 28 km or a high data rate 108 Mbps over a short range 1 6 km Point to Multipoint Configuratio...

Page 27: ...pologies 2 5 2 AWAP05OM Master with Omnidirectional Antenna AWAP05O Slave AWAP05O Slave AWAP05O Slave AWAP05O Slave AWAP05O Slave AWAP05O Slave AWAP05OM Master with Sector Antenna AWAP05O Slave AWAP05O AWAP05O Slave ...

Page 28: ...Network Configuration 2 6 2 ...

Page 29: ...bps 108 Mbps in turbo mode However the maximum data rate for a link decreases as the operating range increases A 28 km link can only operate up to 36 Mbps whereas a 108 Mbps connection is limited to a range of 1 6 km When you are planning each wireless bridge link take into account the maximum distance and data rates for the various antenna options A summary is provided in the following table For ...

Page 30: ...e are obstacles in the radio path there may still be a radio link but the quality and strength of the signal will be affected Calculating the maximum clearance from objects on a path is important as it directly affects the decision on antenna placement and height It is especially critical for long distance links where the radio signal could easily be lost Note For wireless links less than 500 m th...

Page 31: ... above the ground or path obstruction Note that to avoid any obstruction along the path the height of the object must be added to the minimum clearance required for a clear radio line of sight Consider the following simple example illustrated in the figure below Total Link Distance Max Clearance for 60 of First Fresnel Zone at 5 8 GHz Approximate Clearance for Earth Curvature Total Clearance Requi...

Page 32: ...gh radio mast or tower If your wireless bridge link requires a high radio mast or tower consult a professional contractor for advice Antenna Position and Orientation Once the required antenna height has been determined other factors affecting the precise position of the wireless bridge must be considered Be sure there are no other radio antennas within 2 m 6 ft of the wireless bridge Place the wir...

Page 33: ...ss bridge is tested for normal operation in temperatures from 33 C to 55 C Operating in temperatures outside of this range may cause the unit to fail Wind Velocity The wireless bridge can operate in winds up to 90 MPH and survive higher wind speeds up to 125 MPH You must consider the known maximum wind velocity and direction at the site and be sure that any supporting structure such as a pole mast...

Page 34: ...r these points The Ethernet cable length should never be longer than 100 m 328 ft Determine a building entry point for the cable Determine if conduits bracing or other structures are required for safety or protection of the cable For lightning protection at the power injector end of the cable consider using a lightning arrestor immediately before the cable enters the building Grounding It is impor...

Page 35: ...nstallation of the wireless bridge involves these steps 1 Mount the unit on a wall pole mast or tower using the mounting bracket 2 Mount external antennas on the same supporting structure as the bridge and connect them to the bridge unit 3 Connect the Ethernet cable and a grounding wire to the unit 4 Connect the power injector to the Ethernet cable a local LAN switch and an AC power source 5 Align...

Page 36: ...acket may need to be rotated around the pole during the alignment process 3 Use the included nuts to tightly secure the wireless bridge to the bracket Be sure to take account of the antenna polarization direction both antennas in a link must be mounted with the same polarization Attach bracket to pole with mounting grooves facing up Antenna Polarization Direction ...

Page 37: ...er diameter pole with out using the U shaped part of the bracket This method is illustrated in the following figure Using the Wall Mounting Bracket Perform the following steps to mount the unit to a wall using the wall mounting bracket Note The wall mounting bracket does not allow the wireless bridge s intrgrated antenna to be aligned It is intended for use with the AWAP05OM unit using an external...

Page 38: ... bridge Typically a bridge link requires a 5 GHz antenna and access point operation a 2 4 GHz antenna AWAP05O Slave units also require an external antenna for 2 4 GHz operation Perform these steps 1 Mount the external antenna to the same supporting structure as the bridge within 3 m 10 ft distance using the bracket supplied in the antenna package 2 Connect the antenna to the bridge s N type connec...

Page 39: ...h an appropriate grounding wire not included by attaching it to the grounding screw on the unit Caution Be sure that grounding is available and that it meets local and national electrical codes For additional lightning protection use lightning rods lightning arrestors or surge suppressors Connect the Power Injector To connect the wireless bridge to a power source Caution Do not install the power i...

Page 40: ...r bridge uses an omnidirectional or sector antenna which does not require alignment but Slave bridges still need to be correctly aligned with the Master bridge antennna Point to Point Configurations In a point to point configuration the alignment process requires two people at each end of the link The use of cell phones or two way radio communication may help with coordination To start you can jus...

Page 41: ... it is receiving the strongest signal from the central main lobe To align the antennas in the link using the RSSI output voltage start with one antenna fixed and then perform the following procedure on the other antenna 1 Remove the RSSI connector cover and connect a voltmeter using a cable with a male BNC connector not included Main Lobe Maximum Horizontal Scan Vertical Scan RSSI Voltage Side Lob...

Page 42: ...rizontal adjustment in that position Note Sometimes there may not be a central lobe peak in the voltage because vertical alignment is too far off only two similar peaks for the side lobes are detected In this case fix the antenna so that it is halfway between the two peaks 4 Loosen the vertical adjustment on the mounting bracket and tilt the antenna slowly up and down while checking the RSSI volta...

Page 43: ...tion using a PC that has IP settings compatible with this subnet for example 192 168 1 2 and connecting it directly to the wireless bridge When the basic configuration is completed you can set new IP settings for the wireless bridge before connecting it to your network Initial Setup through the CLI The wireless bridge provides access to the CLI through a Telnet connection You can open a Telnet ses...

Page 44: ...so use the CLI to assign an IP address that is compatible with your network Type configure to enter configuration mode then type interface ethernet to access the Ethernet interface configuration mode First type no dhcp to disable DHCP client mode Then type ip address ip address netmask gateway where ip address is the wireless bridge s IP address netmask is the network mask for the network and gate...

Page 45: ...ion IP configuration and basic WEP encryption for wireless security The wireless bridge can be managed by any computer using a web browser Internet Explorer 5 0 or above or Netscape Navigator 6 2 or above Enter the IP configured for the unit or the default IP address http 192 168 1 1 Logging In Enter the default username admin and click LOGIN there is no default password For information on configu...

Page 46: ... on the home page then click on the Next button to start the process 1 Service Set ID Enter the service set identifier in the SSID box which all wireless clients must use to associate with the access point The SSID is case sensitive and can consist of up to 32 alphanumeric characters Default DualBandOutdoor ...

Page 47: ...e radio communications for the 802 11a radio and set the operating channel 802 11a Turbo Mode If you select Enable the wireless bridge will operate in turbo mode with a data rate of up to 108 Mbps Normal mode supports 13 channels Turbo mode supports only 5 channels Default Disable ...

Page 48: ...ent station exists on another network segment then you must enter the IP address for a gateway that can route traffic between these segments Then enter the IP address for the primary and secondary Domain Name Servers DNS servers to be used for host name to IP address resolution DHCP Client With DHCP Client enabled the IP address subnet mask and default gateway can be dynamically assigned to the ac...

Page 49: ...access point Default Disabled Shared Key Setup If you select Shared Key authentication type or enable WEP then you also need to configure the shared key by selecting 64 bit or 128 bit key type and entering a hexadecimal or ASCII string of the appropriate length The key can be entered as alphanumeric characters or hexadecimal 0 9 A F e g D7 0A 9C 7F E5 Default 128 bit hexadecimal key type 64 Bit Ma...

Page 50: ...Initial Configuration 5 8 5 6 Click the OK button to restart the access point ...

Page 51: ...he home page displays click on Advanced Setup The following page will display The information in this chapter is organized to reflect the structure of the web screens for easy reference However it is recommended that you configure a user name and password as the first step under advanced configuration to control management access to the wireless bridge page 6 22 Advanced Configuration The Advanced...

Page 52: ...e trap messages 6 19 Administration Configures user name and password for management access upgrades software from local file FTP or TFTP server resets configuration settings to factory defaults and resets the wireless bridge 6 22 System Log Controls logging of error messages sets the system clock via SNTP server or manual configuration 6 25 WDS Sets the MAC addresses of other units in the wireles...

Page 53: ...ted on either radio band Allows both bands to support access point operations for wireless clients Location A text string that describes the system location Maximum length 20 characters Contact A text string that describes the system contact Maximum length 255 characters CLI Commands for System Identification Enter the global configuration mode and use the system name command to specify a new syst...

Page 54: ...d with IP settings from a Dynamic Host Configuration Protocol DHCP server However if you are not DUAL OUTDOOR configure 7 7 DUAL OUTDOOR config system name R D 7 13 DUAL OUTDOOR config snmp server location building 1 7 26 DUAL OUTDOOR config snmp server contact Paul 7 24 DUAL OUTDOOR config exit DUAL OUTDOOR show system 7 22 System Information Serial Number 0000000005 System Up time 0 days 0 hours...

Page 55: ...in Name Server DNS address are dynamically assigned to the wireless bridge by the network DHCP server Default Disable DHCP Client Disable Select this option to manually configure a static address for the wireless bridge IP Address The IP address of the wireless bridge Valid IP addresses consist of four decimal numbers 0 to 255 separated by periods Subnet Mask The mask that identifies the host addr...

Page 56: ...r Service RADIUS is an authentication protocol that uses software running on a central server to control access to RADIUS aware devices on the network An authentication server contains a database of user credentials for each user that requires access to the network A primary RADIUS server must be specified for the access point to implement IEEE 802 1x network access control and Wi Fi Protected Acc...

Page 57: ...in the string Maximum length 255 characters Timeout Number of seconds the access point waits for a reply from the RADIUS server before resending a request Range 1 60 seconds Default 5 Retransmit attempts The number of times the access point tries to resend a request to the RADIUS server before authentication fails Range 1 30 Default 3 Note For the Timeout and Retransmit attempts fields accept the ...

Page 58: ...ction or tunnel only for management traffic between the wireless bridge and a remote PPPoE server typically at an ISP Examples of management traffic that may initiated by the wireless bridge and carried over a PPPoE tunnel are RADIUS Syslog or DHCP traffic DUAL OUTDOOR config radius server address 192 168 1 25 7 31 DUAL OUTDOOR config radius server port 181 7 32 DUAL OUTDOOR config radius server k...

Page 59: ...hanumeric characters IP Allocation Mode This field specifies how IP adresses for the PPPoE tunnel are configured on the RJ 45 interface The allocation mode depends on the type of service provided by the PPPoE server If automatic mode is selected DHCP is used to allocate the IP addresses for the PPPoE connection If static addresses have been assigned to you by the service provider you must manually...

Page 60: ... config interface ethernet 7 61 Enter Ethernet configuration commands one per line DUAL OUTDOOR if ethernet ip pppoe 7 54 DUAL OUTDOOR if ethernet pppoe username mike 7 58 DUAL OUTDOOR if ethernet pppoe password 12345 7 59 DUAL OUTDOOR if ethernet pppoe service name classA 7 59 DUAL OUTDOOR if ethernet pppoe ip allocation mode static 7 54 DUAL OUTDOOR if ethernet pppoe local ip 10 7 1 200 7 57 DUA...

Page 61: ...n the access point or remotely on a central RADIUS server Default Local MAC Local MAC The MAC address of the associating station is compared against the local database stored on the access point The Local MAC Authentication section enables the local database to be set up Radius MAC The MAC address of the associating station is sent to a configured RADIUS server for authentication When using a RADI...

Page 62: ...igital certificates So although you can configure the access point to use MAC address and 802 1x authentication together it is better to choose one or the other as appropriate 802 1x Setup IEEE 802 1x is a standard framework for network access control that uses a central RADIUS server for user authentication This control feature prevents unauthorized access to the network by requiring an 802 1x cl...

Page 63: ...sh Rate Sets the interval at which the broadcast keys are refreshed for stations using 802 1x dynamic keying Range 0 1440 minutes Default 0 means disabled Session Key Refresh Rate The interval at which the access point refreshes unicast session keys for associated clients Range 0 1440 minutes Default 0 means disabled 802 1x Re authentication Refresh Rate The time period after which a connected cli...

Page 64: ...OOR config address filter default denied 7 37 DUAL OUTDOOR config address filter entry 00 70 50 cc 99 1a denied 7 38 DUAL OUTDOOR config address filter entry 00 70 50 cc 99 1b allowed DUAL OUTDOOR config address filter entry 00 70 50 cc 99 1c allowed DUAL OUTDOOR config address filter delete 00 70 50 cc 99 1c 7 38 DUAL OUTDOOR config exit DUAL OUTDOOR show authentication 7 40 Authentication Inform...

Page 65: ... 39 DUAL OUTDOOR config mac authentication session timeout 300 7 40 DUAL OUTDOOR config exit DUAL OUTDOOR show authentication 7 40 Authentication Information MAC Authentication Server REMOTE MAC Auth Session Timeout Value 300 secs 802 1x DISABLED Broadcast Key Refresh Rate 5 min Session Key Refresh Rate 5 min 802 1x Session Timeout Value 300 secs Address Filtering DENIED System Default DENY addres...

Page 66: ...resh rate 5 7 36 DUAL OUTDOOR config 802 1x session timeout 300 7 37 DUAL OUTDOOR config exit DUAL OUTDOOR show authentication 7 40 Authentication Information MAC Authentication Server REMOTE MAC Auth Session Timeout Value 300 secs 802 1x SUPPORTED Broadcast Key Refresh Rate 5 min Session Key Refresh Rate 5 min 802 1x Session Timeout Value 300 secs Address Filtering DENIED System Default DENY addr...

Page 67: ... a known VLAN ID Received traffic that has an unknown VLAN ID or no VLAN tag is dropped When VLAN support is disabled the wireless bridge does not tag traffic passing to the wired network and ignores the VLAN tags on any received frames Note Before enabling VLANs on the wireless bridge you must configure the connected LAN switch port to accept tagged VLAN packets with the wireless bridge s native ...

Page 68: ...ients through the access point However it does not affect communications between wireless clients and the wired network Disable Allows wireless to wireless communications between clients through the access point Enable Blocks wireless to wireless communications between clients through the access point AP Management Filter Controls management access to the access point from wireless clients Managem...

Page 69: ...Protocol SNMP from a management station To implement SNMP management the wireless bridge must have an IP address and subnet mask configured either manually or dynamically Once an IP address has been configured appropriate SNMP communities and trap receivers should be configured Community names are used to control management access to SNMP stations as well as to authorize SNMP stations to receive t...

Page 70: ... MIB objects Maximum length 23 characters case sensitive Community Name Read Write Defines the SNMP community access string that has read write access Authorized management stations are able to both retrieve and modify MIB objects Maximum length 23 characters case sensitive Trap Destination IP Address Specifies the recipient of SNMP notifications Enter the IP address or the host name Host Name 1 t...

Page 71: ...o view the current SNMP settings use the show snmp command DUAL OUTDOOR config snmp server enable server 7 25 DUAL OUTDOOR config snmp server community alpha rw 7 24 DUAL OUTDOOR config snmp server community beta ro DUAL OUTDOOR config snmp server host 10 1 19 23 alpha 7 25 DUAL OUTDOOR config exit DUAL OUTDOOR show snmp 7 27 SNMP Information Service State Enable Community ro Community rw Location...

Page 72: ...reless bridge and network security Note Pressing the Reset button on the back of the wireless bridge for more than five seconds resets the user name and password to the factory defaults For this reason we recommend that you protect the wireless bridge from physical access by unauthorized persons Username The name of the user The default name is admin Length 3 16 characters case sensitive New Passw...

Page 73: ...oftware verify that the wireless bridge is connected to the network and has been configured with a compatible IP address and subnet mask If you need to download from an FTP or TFTP server take the following additional steps Obtain the IP address of the FTP or TFTP server where the wireless bridge software is stored If upgrading from an FTP server be sure that you have an account configured on the ...

Page 74: ...rs or 32 characters for files on the wireless bridge Valid characters A Z a z 0 9 _ IP Address IP address or host name of FTP or TFTP server Username The user ID used for login on an FTP server Password The password used for login on an FTP server Restore Factory Settings Click the Restore button to reset the configuration settings for the wireless bridge to the factory defaults and reboot the sys...

Page 75: ... be synchronized with a time server so that all the messages sent to the Syslog server are stamped with the correct time and date DUAL OUTDOOR copy tftp file 7 29 1 Application image 2 Config file 3 Boot block image Select the type of download 1 2 3 1 1 TFTP Source file name bridge img bin TFTP Server IP 192 168 1 19 DUAL OUTDOOR dir 7 30 File Name Type File Size dflt img bin 2 1319939 bridge img ...

Page 76: ...e wireless bridge error log can be viewed using the Event Logs window in the Status section page 6 64 The Event Logs window displays the last 128 messages logged in chronological order from the newest to the oldest Log messages saved in the wireless bridge s memory are erased when the device is rebooted CLI Commands for System Logging To enable logging on the wireless bridge use the logging on com...

Page 77: ...must be specified Primary Server The IP address of an SNTP or NTP time server that the wireless bridge attempts to poll for a time update Secondary Server The IP address of a secondary SNTP or NTP time server The wireless bridge first attempts to update the time from the primary server if this fails it attempts an update from the secondary server Note The wireless bridge also allows you to disable...

Page 78: ...ngs use the show sntp command CLI Commands for the System Clock The following example shows how to manually set the system time when SNTP server support is disabled on the wireless bridge DUAL OUTDOOR config sntp server ip 10 1 0 19 7 19 DUAL OUTDOOR config sntp server enable 7 19 DUAL OUTDOOR config sntp server timezone 8 7 21 DUAL OUTDOOR config sntp server daylight saving 7 21 Enter Daylight sa...

Page 79: ...e end of the link For a Master bridge unit you need to specify the MAC addresses of all the Slave bridge units in the network Mode The wireless bridge is set to operate as a Slave or Master unit Master Mode In a point to multipoint network configuration only one wireless bridge unit must be a Master unit all others must be Slave units A Master wireless bridge provides support for up to 16 MAC addr...

Page 80: ...r all known devices in the connected networks All the addresses are learned by monitoring traffic received by the wireless bridge and are stored in a dynamic MAC address table This information is then used to forward traffic directly between the Ethernet port and the wireless interface The Bridging page allows the MAC address aging time to be set for both the Ethernet port and the bridge radio int...

Page 81: ...r entries in the dynamic address table Ethernet The time after which a learned Ethernet port entry is discarded Range 60 1800 seconds Default 100 seconds Wireless 802 11a g The time after which a learned wireless entry is discarded Range 60 1800 seconds Default 1800 seconds ...

Page 82: ...OOR config exit DUAL OUTDOOR show bridge 7 50 Bridge Information Media Type Age Time sec EtherNet 300 WLAN_A 1000 Bridge Id 32768 037fbef192 Root Bridge Id 32768 01f47483e2 Root Path Cost 25 Root Port Id 0 Bridge Status Enabled Bridge Priority 32768 Bridge Hello Time 2 Seconds Bridge Maximum Age 20 Seconds Bridge Forward Delay 15 Seconds Port Summary Id Priority Path Cost Fast Forward Status State...

Page 83: ...at device to the root device Then it selects a designated bridging device from each LAN which incurs the lowest path cost when forwarding a packet from that LAN to the root device All ports connected to designated bridging devices are assigned as designated ports After determining the lowest cost spanning tree it enables all root ports and designated ports and disables all other ports Network pack...

Page 84: ...hould receive configuration messages at regular intervals Any port that ages out STP information provided in the last configuration message becomes the designated port for the attached LAN If it is a root port a new root port is selected from among the device ports attached to the network Range 6 40 seconds Default 20 Minimum The higher of 6 or 2 x Hello Time 1 Maximum The lower of 40 or 2 x Forwa...

Page 85: ...s option if an interface is attached to a LAN segment that is at the end of a bridged LAN or to an end node Since end nodes cannot cause forwarding loops they can pass directly through to the spanning tree forwarding state Specifying fast forwarding provides quicker convergence for devices such as workstations or servers retains the current forwarding database to reduce the amount of frame floodin...

Page 86: ... 7 50 DUAL OUTDOOR config bridge stp port priority 5 0 7 48 DUAL OUTDOOR config bridge stp port path cost 5 50 7 48 DUAL OUTDOOR config no bridge stp port portfast 5 7 49 DUAL OUTDOOR config end DUAL OUTDOOR show bridge 7 50 Bridge Information Media Type Age Time sec EtherNet 300 WLAN_A 1000 Bridge Id 32768 037fbef192 Root Bridge Id 32768 01f47483e2 Root Path Cost 25 Root Port Id 0 Bridge Status E...

Page 87: ...n access point mode 802 11a in access point mode and 802 11g in bridge mode 802 11a and 802 11g both in access point mode no bridging 802 11a only in bridge or access point mode 802 11g only in bridge or access point mode Note that 802 11g is backward compatible with 802 11b and can be configured to support both client types or restricted to 802 11g clients only Both wireless interfaces are config...

Page 88: ...want to connect to the network through the access point must set their SSID to the same as that of the access point Default DualBandOutdoor Range 1 32 characters Secure Access When enabled the access point radio does not include its SSID in beacon messages Nor does it respond to probe requests from clients that do not include a fixed SSID Default Disable Turbo Mode The normal 802 11a wireless oper...

Page 89: ...from the wireless bridge The higher the transmission power the farther the transmission range Power selection is not just a trade off between coverage area and maximum supported clients You also have to ensure that high power signals do not interfere with the operation of other radio devices in the service area Options 100 50 25 12 minimum Default 100 Maximum Supported Rate The maximum data rate a...

Page 90: ...ts the packet size threshold at which a Request to Send RTS signal must be sent to a receiving station prior to the sending station starting communications The wireless bridge sends RTS frames to a receiving station to negotiate the sending of a data frame After receiving an RTS frame the station sends a CTS clear to send frame to notify the sending station that it can start sending data If the RT...

Page 91: ...terval 150 7 69 DUAL OUTDOOR if wireless a dtim period 5 7 70 DUAL OUTDOOR if wireless a fragmentation length 512 7 71 DUAL OUTDOOR if wireless a rts threshold 256 7 71 DUAL OUTDOOR if wireless a exit DUAL OUTDOOR show interface wireless a 7 81 Wireless Interface Information Identification Description RD AP 3 Service Type Access Point SSID r d Turbo Mode OFF Channel 44 Status Disable 802 11 Parame...

Page 92: ...l on neighboring access points at least five channels apart to avoid interference with each other For example in the United States you can deploy up to three access points in the same area e g channels 1 6 11 Also note that the channel for wireless clients is automatically set to the same as that used by the access point to which it is linked Range 1 11 Default 1 Auto Channel Select Enables the ac...

Page 93: ... the interface using the description command You can also use the closed system command to stop sending the SSID in beacon messages Select a radio channel or set selection to Auto using the channel command Set any other parameters as required To view the current 802 11g radio settings use the show interface wireless g command DUAL OUTDOOR config interface wireless g 7 66 Enter Wireless configurati...

Page 94: ...ic strings that are manually configured on all units in the wireless bridge network DUAL OUTDOOR show interface wireless g 7 81 Wireless Interface Information Identification Description Enterprise 802 11g Access Point Service Type Access Point SSID r d Channel 11 AUTO Status Enable 802 11 Parameters Transmit Power FULL 14 dBm Max Station Data Rate 6Mbps Fragmentation Threshold 512 bytes RTS Thresh...

Page 95: ...h Note that the same size of WEP encryption key must be set on all bridge units in the wireless network Default 128 Bit Key Type Select the preferred method of entering WEP encryption keys on the wireless bridge and enter up to four keys Hexadecimal Enter keys as 10 hexadecimal digits 0 to 9 and A to F for 64 bit keys 26 hexadecimal digits for 128 bit keys or 32 hexadecimal digits for 152 bit keys...

Page 96: ...s a different key to be defined for each wireless bridge link in the network Configuring AES encryption keys on the wireless bridge provides far more robust security than using WEP Also a unique AES key can be used for each bridge link in the wireless network instead of all bridges sharing the same WEP keys Data Encryption Setup Enable or disable the wireless bridge to use either WEP or AES for da...

Page 97: ...on command to enable AES encryption To enter AES keys use the DUAL OUTDOOR config interface wireless a 7 66 Enter Wireless configuration commands one per line DUAL OUTDOOR if wireless a encryption wep 128 7 74 DUAL OUTDOOR if wireless a key wep 1 128 ascii abcdeabcdeabc 7 75 DUAL OUTDOOR if wireless a transmit key 1 7 76 DUAL OUTDOOR if wireless a exit DUAL OUTDOOR show interface wireless a 7 81 W...

Page 98: ...L OUTDOOR if wireless a key wdsaes 1 agoodsecretkey 7 75 DUAL OUTDOOR if wireless a exit DUAL OUTDOOR show interface wireless a 7 81 Wireless Interface Information Identification Description Enterprise 802 11a Access Point Service Type WDS Bridge SSID DualBandOutdoor Turbo Mode OFF Channel 36 Status Disable 802 11 Parameters Transmit Power FULL 15 dBm Max Station Data Rate 54Mbps Fragmentation Thr...

Page 99: ...ess filtering page 6 11 Wi Fi Protected Access WPA page 6 55 The security mechanisms that may be employed depend on the level of security required the network and management resources available and the software support provided on wireless clients A summary of wireless security considerations is listed in the following table Security Mechanism Client Support Implementation Considerations WEP Built...

Page 100: ...ely WEP has been found to be seriously flawed and cannot be recommended for a high level of network security For more robust wireless security the access point provides Wi Fi Protected Access WPA for improved data encryption and user authentication WPA over 802 1x Mode Requires WPA enabled system and network card driver native support provided in Windows XP Provides robust security in WPA only mod...

Page 101: ...cess point the network has no protection and is open to all users This is the default setting Shared Key Sets the access point to use WEP shared keys If this option is selected you must configure at least one key on the access point and all clients Note To use 802 1x on wireless clients requires a network card driver and 802 1x client software that supports the EAP authentication type that you wan...

Page 102: ... to 9 and A to F for 64 bit keys 26 hexadecimal digits for 128 bit keys or 32 hexadecimal digits for 152 bit keys 802 11a radio only Alphanumeric Enter keys as 5 alphanumeric characters for 64 bit keys 13 alphanumeric characters for 128 bit keys or 16 alphanumeric characters for 152 bit keys 802 11a radio only Transmit Key Select Selects the key number to use for encryption If the clients have all...

Page 103: ...cation Any setting2 Authentication Type Open System WEP encryption Enable WPA clients only Disable Multicast Cipher WEP Shared Key 64 128 802 1x Required1 MAC Authentication Disabled Local2 1 See Authentication page 6 11 2 See Radius page 6 6 DUAL OUTDOOR config interface wireless g 7 66 Enter Wireless configuration commands one per line DUAL OUTDOOR if wireless g authentication shared 7 73 DUAL O...

Page 104: ...ngs use the show interface wireless g command not shown in example Security Closed System DISABLED Multicast cipher WEP Unicast cipher TKIP WPA clients SUPPORTED WPA Key Mgmt Mode DYNAMIC WPA PSK Key Type HEX Encryption 128 BIT ENCRYPTION Default Transmit Key 1 Static Keys Key 1 Key 2 EMPTY Key 3 EMPTY Key 4 EMPTY Authentication Type SHARED DUAL OUTDOOR DUAL OUTDOOR config interface wireless g 7 6...

Page 105: ...ual authentication between a client the access point and a RADIUS server that prevents users from accidentally joining a rogue network Only when a RADIUS server has authenticated a user s credentials will encryption keys be sent to the access point and client Note To implement WPA on wireless clients requires a WPA enabled network card driver and 802 1x client software that supports the EAP authen...

Page 106: ...lobal encryption key for multicast and broadcast traffic must be the same for all clients therefore it restricts encryption to a WEP key When access is opened to both WPA and WEP clients no authentication is provided for the WEP clients through shared keys To support authentication for WEP clients in this mixed mode configuration you can use either MAC authentication or 802 1x authentication Advan...

Page 107: ... must use the same WEP key to encrypt and decrypt radio signals WEP has many security flaws and is not recommended for transmitting highly sensitive data TKIP TKIP provides data encryption enhancements including per packet key hashing that is changing the encryption key on each packet a message integrity check an extended initialization vector with sequencing rules and a re keying mechanism AES AE...

Page 108: ...n set 802 1x to required and disable MAC authentication To view WPA pre shared key only WPA over 802 1x Authentication Type Open System WEP encryption Enable1 WPA clients only Enable WPA Mode Pre shared key Multicast Cipher WEP TKIP AES2 WPA PSK Type Hex 64 characters ASCII 8 63 characters Shared Key 64 128 152 802 1x Disabled3 MAC Authentication Disabled Local4 Authentication Type Open System WEP...

Page 109: ...ss g 7 66 Enter Wireless configuration commands one per line AP if wireless g authentication open 7 73 AP if wireless g encryption 128 7 74 AP if wireless g wpa clients required 7 77 AP if wireless g wpa mode dynamic 7 78 AP if wireless g multicast cipher TKIP 7 76 AP if wireless g end AP config 802 required 7 35 AP config no mac authentication 7 39 ...

Page 110: ...ngs System Up Time Length of time the management agent has been up MAC Address The physical layer address for this device System Name Name assigned to this system System Contact Administrator responsible for the system IP Address IP address of the management interface for this device Menu Description Page AP Status Displays configuration settings for the basic system and the wireless interfaces 6 ...

Page 111: ...for data encryption Radio Authentication Type Shows the bridge is set as an open system 802 1x Shows if IEEE 802 1x access control for wireless clients is enabled CLI Commands for Displaying System Settings To view the current wireless bridge system settings use the show system command from the Exec mode To view the current radio interface settings use the show interface wireless a command see pag...

Page 112: ... accepts any client attempting to connect to the access point without verifying its identity The shared key approach uses Wired Equivalent Privacy WEP to verify client identity by distributing a shared key to stations before attempting authentication Associated Shows if the station has been successfully associated with the access point Forwarding Allowed Shows if the station has passed authenticat...

Page 113: ...ec mode DUAL OUTDOOR show station 7 81 Station Table Information 802 11a Channel 56 No 802 11a Channel Stations 802 11g Channel 11 802 11g Channel Station Table Station Address 00 04 E2 41 C2 9D VLAN ID 0 Authenticated Associated Forwarding KeyType TRUE TRUE TRUE NONE Counters pkts Tx Rx bytes Tx Rx 4 0 1440 0 Time Associated LastAssoc LastDisAssoc LastAuth 143854 0 0 0 DUAL OUTDOOR ...

Page 114: ...associated with this message For a description of the various levels see logging level on page 6 25 Event Message The content of the log message CLI Commands for Displaying the Event Logs From the global configuration mode use the show logging command DUAL OUTDOOR show loggging 7 18 Logging Information Syslog State Enabled Logging Host State Enabled Logging Console State Enabled Server Domain name...

Page 115: ...portion 192 168 1 and a host portion 1 To access the wireless bridge through a Telnet session you must first set the IP address for the wireless bridge and set the default gateway if you are managing the wireless bridge from a different IP subnet For example After you configure the wireless bridge with an IP address you can open a Telnet session by performing these steps 1 From the remote host ent...

Page 116: ...Minimum Abbreviation The CLI will accept a minimum number of characters that uniquely identify a command For example the command configure can be entered as con If an entry is ambiguous the system will prompt for further input Command Completion If you terminate input with a Tab key the CLI will print the remaining characters of a partial keyword up to the point of ambiguity In the configure examp...

Page 117: ...guide describes the negation effect for all applicable commands Using Command History The CLI maintains a history of commands that have been entered You can scroll back through the history of commands by pressing the up arrow key Any command displayed in the history list can be executed again or first modified and then executed Using the show history command displays a longer list of recently exec...

Page 118: ...de Configuration Commands Configuration commands are used to modify wireless bridge settings These commands modify the running configuration and are saved in memory The configuration commands are organized into three different modes Global Configuration These commands modify the system level configuration and include commands such as username and password Interface Ethernet Configuration These com...

Page 119: ...cessing Outdoor Bridge config interface ethernet Outdoor Bridge if ethernet Keystroke Function Ctrl A Shifts cursor to start of command line Ctrl B Shifts cursor to the left one character Ctrl C Terminates a task and displays the command prompt Ctrl E Shifts cursor to end of command line Ctrl F Shifts cursor to the right one character Ctrl K Deletes from cursor to the end of the command line Ctrl ...

Page 120: ... 7 23 Flash File Manages code image or wireless bridge configuration files 7 27 RADIUS Configures the RADIUS client used with 802 1x authentication 7 31 Authentication Configures IEEE 802 1x port access control and address filtering 7 34 WDS Configures the Wireless Distribution System forwarding table 7 41 Bridge Configures MAC address table aging time settings and spanning tree parameters 7 44 Fi...

Page 121: ...mmand Mode Global Configuration Interface Configuration Example This example shows how to return to the Configuration mode from the Interface Configuration mode Command Function Mode Page configure Activates global configuration mode Exec 7 7 end Returns to the previous configuration mode GC IC 7 7 exit Returns to Exec mode or exits the CLI any 7 8 ping Sends ICMP echo request packets to another n...

Page 122: ...Command Mode Exec Command Usage Use the ping command to see if another site on the network can be reached The following are some results of the ping command Normal response The normal response occurs in one to ten seconds depending on network traffic Destination does not respond If the host does not respond a timeout appears in ten seconds Destination unreachable The gateway for this destination i...

Page 123: ...ommand Usage When the system is restarted it will always run the Power On Self Test Example This example shows how to reset the system show history This command shows the contents of the command history buffer Default Setting None Command Mode Exec Command Usage The history buffer size is fixed at 10 commands Use the up or down arrow keys to scroll through the commands in the history buffer Outdoo...

Page 124: ...y config exit show history Outdoor Bridge Outdoor Bridge show line Console Line Information databits 8 parity none speed 9600 stop bits 1 Outdoor Bridge Command Function Mode Page Country Setting country Sets the wireless bridge country code for correct radio operation Exec 7 11 Device Designation prompt Customizes the command line prompt GC 7 12 system name Specifies the host name for the wireles...

Page 125: ...can Republic DO Kuwait KW Qatar QA Algeria DZ Ecuador EC Latvia LV Romania RO Argentina AR Egypt EG Lebanon LB Russia RU Armenia AM Estonia EE Liechtenstein LI Saudi Arabia SA Australia AU Finland FI Lithuania LT Singapore SG Austria AT France FR Luxembourg LU Slovak Republic SK Azerbaijan AZ Georgia GE Macao MO Slovenia SI Bahrain BH Germany DE Macedonia MK South Africa ZA Belarus BY Greece GR Ma...

Page 126: ...rompt This command customizes the CLI prompt Use the no form to restore the default prompt Syntax prompt string no prompt string Any alphanumeric string to use for the CLI prompt Maximum length 255 characters Default Setting Outdoor Bridge Command Mode Global Configuration Costa Rica CR Japan JP Peru PE Uruguay UY Croatia HR Jordan JO Philippines PH Venezuela VE Cyprus CY Kazakhstan KZ Poland PL V...

Page 127: ...ters Default Setting Outdoor Bridge Command Mode Global Configuration Example username This command configures the user name for management access Syntax username name name The name of the user Length 3 16 characters case sensitive Default Setting admin Command Mode Global Configuration Example Outdoor Bridge config prompt RD2 RD2 config Outdoor Bridge config system name bridge link Outdoor Bridge...

Page 128: ...ull Command Mode Global Configuration Example ip http port This command specifies the TCP port number used by the web browser interface Use the no form to use the default port Syntax ip http port port number no ip http port port number The TCP port to be used by the browser interface Range 1024 65535 Default Setting 80 Command Mode Global Configuration Example Related Commands ip http server 7 15 ...

Page 129: ... e sending debug or error messages to memory The no form disables the logging process Syntax logging on no logging on Default Setting None Outdoor Bridge config ip http server Outdoor Bridge config Command Function Mode Page logging on Controls logging of error messages GC 7 15 logging host Adds a syslog server host IP address that will receive logging messages GC 7 16 logging console Initiates lo...

Page 130: ...Syntax logging host host_name host_ip_address no logging host host_name The name of a syslog server Range 1 20 characters host_ip_address The IP address of a syslog server Default Setting None Command Mode Global Configuration Example logging console This command initiates logging of error messages to the console Use the no form to disable logging to the console Syntax logging console no logging c...

Page 131: ...ility used by the syslog server to dispatch log messages to an appropriate service Range 16 23 Outdoor Bridge config logging console Outdoor Bridge config Level Argument Description Emergency System unusable Alert Immediate action needed Critical Critical conditions e g memory allocation or free memory error resource exhausted Error Error conditions e g invalid input default used Warning Warning c...

Page 132: ... logging Command Mode Exec Example System Clock Commands These commands are used to configure SNTP and system clock settings on the wireless bridge Outdoor Bridge config logging facility 19 Outdoor Bridge config Outdoor Bridge show logging Logging Information Syslog State Disabled Logging Host State Enabled Logging Console State Disabled Server Domain name IP none Logging Level Error Logging Facil...

Page 133: ...the wireless bridge polls for time updates The wireless bridge will poll the time servers in the order specified until a response is received Example Related Commands sntp server enable 7 19 show sntp 7 22 sntp server enable This command enables SNTP client requests for time synchronization with NTP or SNTP time servers specified by the sntp server ip command Use the no form to disable SNTP client...

Page 134: ...anuary 1 1970 Example Related Commands sntp server ip 7 19 show sntp 7 22 sntp server date time This command sets the system clock Default Setting 00 14 00 January 1 1970 Command Mode Global Configuration Example This example sets the system clock to 17 37 June 19 2003 Related Commands sntp server enable 7 19 Outdoor Bridge config sntp server enable Outdoor Bridge config Outdoor Bridge sntp server...

Page 135: ...ireless bridge s internal clock Syntax sntp server timezone hours hours Number of hours before after UTC Range 12 to 12 hours Default Setting None Command Mode Global Configuration Command Usage This command sets the local time zone relative to the Coordinated Universal Time UTC formerly Greenwich Mean Time or GMT based on the earth s prime meridian zero degrees longitude To display a time corresp...

Page 136: ...ys basic system configuration settings Default Setting None Command Mode Exec Outdoor Bridge config sntp server timezone 8 Outdoor Bridge config Outdoor Bridge show sntp SNTP Information Service State Enabled SNTP server 1 IP 137 92 140 80 SNTP server 2 IP 192 43 244 18 Current Time 08 04 Jun 20th 2003 Time Zone 8 TAIPEI BEIJING Daylight Saving Enabled from Jun 1st to Sep 1st Outdoor Bridge ...

Page 137: ...System Name Outdoor Bridge System Location System Contact Contact System Country Code US UNITED STATES MAC Address 00 30 F1 BE F4 96 IP Address 192 168 1 1 Subnet Mask 255 255 255 0 Default Gateway 0 0 0 0 VLAN State DISABLED Native VLAN ID 1 DHCP Client ENABLED HTTP Server ENABLED HTTP Server Port 80 Software Version v1 1 0 3 Outdoor Bridge Outdoor Bridge show version Version v1 1 0 1 Outdoor Bri...

Page 138: ... management stations are only able to retrieve MIB objects private Read write access Authorized management stations are able to both retrieve and modify MIB objects Command Mode Global Configuration Command Usage If you enter a community string without the ro or rw option the default is read only Example snmp server contact This command sets the system contact string Use the no form to remove the ...

Page 139: ... Command Mode Global Configuration Command Usage This command enables both authentication failure notifications and link up down notifications The snmp server host command specifies the host device that will receive SNMP notifications Example Related Commands snmp server host 7 25 snmp server host This command specifies the recipient of an SNMP notification Use the no form to remove the specified ...

Page 140: ...ers Default Setting Host Address None Community String public Command Mode Global Configuration Command Usage The snmp server host command is used in conjunction with the snmp server enable server command to enable SNMP notifications Example Related Commands snmp server enable server 7 25 snmp server location This command sets the system location string Use the no form to remove the location strin...

Page 141: ...the image file Outdoor Bridge config snmp server location building 1 Outdoor Bridge config Outdoor Bridge show snmp SNMP Information Service State Enable Community ro Community rw Location WC 19 Contact Paul Traps Enabled Host Name IP 10 1 19 23 Trap Community Outdoor Bridge Command Function Mode Page bootfile Specifies the file or image used to start up the system Exec 7 27 copy Copies a code ima...

Page 142: ...ould not contain slashes or the leading letter of the file name should not be a period and the maximum length for file names is 32 characters Valid characters A Z a z 0 9 _ If the file contains an error it cannot be set as the default file Example Outdoor Bridge bootfile bridge img bin Outdoor Bridge ...

Page 143: ...ion file from flash memory Default Setting None Command Mode Exec Command Usage The system prompts for data required to complete the copy command Only a configuration file can be uploaded to an FTP TFTP server but every type of file can be downloaded to the wireless bridge The destination file name should not contain slashes or the leading letter of the file name should not be a period and the max...

Page 144: ... to boot the wireless bridge is deleted be sure you first use the bootfile command to update the application image file booted at startup before you reboot the wireless bridge Example This example shows how to delete the test cfg configuration file from flash memory Related Commands bootfile 7 27 dir 7 30 dir This command displays a list of files in flash memory Command Mode Exec Outdoor Bridge co...

Page 145: ...dary host_ip_address host_name secondary Secondary server host_ip_address IP address of server host_name Host name of server Range 1 20 characters Column Heading Description File Name The name of the file Type 2 Operation Code and 5 Configuration file File Size The length of the file in bytes Outdoor Bridge dir zz img bin 1099676 dflt img bin 1075164 syscfg 15316 syscfg_bak 15316 1386496 bytes fre...

Page 146: ...Setting 1812 Command Mode Global Configuration Example radius server key This command sets the RADIUS encryption key Syntax radius server secondary key key_string secondary Secondary server key_string Encryption key used to authenticate logon access for client Do not use blank spaces in the string Maximum length 20 characters Default Setting DEFAULT Command Mode Global Configuration Outdoor Bridge...

Page 147: ...server timeout This command sets the interval between transmitting authentication requests to the RADIUS server Syntax radius server secondary timeout number_of_seconds secondary Secondary server number_of_seconds Number of seconds the access point waits for a reply before resending a request Range 1 60 Default Setting 5 Command Mode Global Configuration Example Outdoor Bridge config radius server...

Page 148: ...ion first define the default filtering policy using the address filter default command Then enter the MAC addresses to be filtered indicating if they are allowed or denied For RADIUS MAC authentication the MAC addresses and filtering policy must be configured on the RADIUS server Outdoor Bridge show radius Radius Server Information IP 192 168 1 25 Port 181 Key Retransmit 5 Timeout 10 Radius Second...

Page 149: ...s not initiating 802 1x access to the network is allowed after successful 802 11 association When 802 1x is required the access point enforces 802 1x authentication for all 802 11 associated stations If 802 1x authentication is not initiated by the station the access point will initiate authentication Only those stations successfully authenticated with 802 1x are allowed to access the network 802 ...

Page 150: ... specifies the interval after which the broadcast keys are changed The 802 1x session key refresh rate command specifies the interval after which unicast session keys are changed Dynamic broadcast key rotation allows the access point to generate a random group key and periodically update all key management capable wireless clients Example 802 1x session key refresh rate This command sets the inter...

Page 151: ...onds no 802 1x session timeout seconds The number of seconds Range 0 65535 Default 0 Disabled Command Mode Global Configuration Example address filter default This command sets filtering to allow or deny listed MAC addresses Syntax address filter default allowed denied allowed Only MAC addresses entered as denied in the address filtering table are denied denied Only MAC addresses entered as allowe...

Page 152: ...Command Mode The access point supports up to 1024 MAC addresses An entry in the address table may be allowed or denied access depending on the global setting configured for the address entry default command Example Related Commands address filter default 7 37 show authentication 7 40 address filter delete This command deletes a MAC address from the filter table Syntax address filter delete mac add...

Page 153: ...Authenticate the MAC address of wireless clients with the local authentication database during 802 11 association remote Authenticate the MAC address of wireless clients with the RADIUS server during 802 1x authentication Default local Command Mode Global Configuration Example Related Commands address filter entry 7 38 radius server address 7 31 show authentication 7 40 Outdoor Bridge config addre...

Page 154: ...s command shows all 802 1x authentication settings as well as the address filter table Command Mode Exec Example Outdoor Bridge config mac authentication session timeout 1 Outdoor Bridge config Outdoor Bridge show authentication Authentication Information MAC Authentication Server REMOTE MAC Auth Session Timeout Value 1 secs 802 1x SUPPORTED Broadcast Key Refresh Rate 5 min Session Key Refresh Rat...

Page 155: ... WDS forwarding table for each node in the wireless bridge network Syntax wds mac address port id mac address port id The wireless port number for the bridge link 1 for Slave units 1 16 for Master units mac address The wireless MAC address of the remote bridge unit for this link 12 hexadecimal digits in the form xx xx xx xx xx xx Default none Command Function Mode Page wds channel Selects the radi...

Page 156: ...e the no form to disable WDS forwarding for a wireless port ID Syntax no wds enable port id port id The wireless port number for the link 1 for Slave units 1 16 for Master units Default WDS forwarding disabled on all ports Command Mode Global Configuration Example show wds This command displays the current entries in the WDS forwarding table Syntax show wds Command Mode Exec Outdoor Bridge config ...

Page 157: ...BLE 00 0E 87 3B 60 51 05 DISABLE 00 00 00 00 00 00 06 DISABLE 00 00 00 00 00 00 07 DISABLE 00 00 00 00 00 00 08 DISABLE 00 00 00 00 00 00 09 DISABLE 00 00 00 00 00 00 10 DISABLE 00 00 00 00 00 00 11 DISABLE 00 00 00 00 00 00 12 DISABLE 00 00 00 00 00 00 13 DISABLE 00 00 00 00 00 00 14 DISABLE 00 00 00 00 00 00 15 DISABLE 00 00 00 00 00 00 16 DISABLE 00 00 00 00 00 00 Outdoor Bridge config ...

Page 158: ... Page bridge timeout Sets the aging time for the address table GC 7 44 bridge stp bridge spanning tree Enables the spanning tree protocol for the bridge GC 7 45 bridge stp bridge forward time Configures the spanning tree bridge forward time GC 7 45 bridge stp bridge hello time Configures the spanning tree bridge hello time GC 7 46 bridge stp bridge max age Configures the spanning tree bridge maxim...

Page 159: ...switch bridge or router in your network to ensure that only one route exists between any two stations on the network and provide backup links which automatically take over when a primary link goes down Example This example shows how to enable the Spanning Tree Protocol for the wireless bridge bridge stp bridge forward time Use this command to configure the spanning tree bridge forward time globall...

Page 160: ...hello time time no bridge stp bridge hello time time Time in seconds Range 1 10 seconds The maximum value is the lower of 10 or max age 2 1 Default Setting 2 seconds Command Mode Global Configuration Command Usage This command sets the time interval in seconds at which the root device transmits a configuration message Example bridge stp bridge max age Use this command to configure the spanning tre...

Page 161: ...xample bridge stp bridge priority Use this command to configure the spanning tree priority globally for the wireless bridge Use the no form to restore the default Syntax bridge stp bridge priority priority no bridge stp bridge priority priority Priority of the bridge Range 0 65535 Default Setting 32768 Command Mode Global Configuration Command Usage Bridge priority is used in selecting the root de...

Page 162: ...e Spanning Tree Protocol to determine the best path between devices Therefore lower values should be assigned to ports attached to faster media and higher values assigned to ports with slower media Path cost takes precedence over port priority Example bridge stp port priority Use this command to configure the priority for the specified port Use the no form to restore the default for the specified ...

Page 163: ...reless bridge Range 0 Ethernet interface 1 16 wireless interface Default Setting Disabled Command Mode Global Configuration Command Usage This command is used to enable disable the fast spanning tree mode for the selected port In this mode ports skip the Discarding and Learning states and proceed straight to Forwarding Since end nodes cannot cause forwarding loops they can be passed through the sp...

Page 164: ...ort spanning disabled port port Specifies the port number on the wireless bridge Range 0 Ethernet interface 1 16 wireless interface Default Setting Enabled Command Mode Global Configuration Example This example disables the Spanning Tree Protocol for port 5 show bridge This command displays aging time and spanning tree settings for the Ethernet and wireless interfaces Syntax show bridge Command Mo...

Page 165: ...idge Id 32768 037fbef192 Root Bridge Id 32768 01f47483e2 Root Path Cost 25 Root Port Id 0 Bridge Status Enabled Bridge Priority 32768 Bridge Hello Time 2 Seconds Bridge Maximum Age 20 Seconds Bridge Forward Delay 15 Seconds Port Summary Id Priority Path Cost Fast Forward Status State 0 128 25 Enable Enabled Forwarding Outdoor Bridge Command Function Mode Page filter ap manage Prevents access to th...

Page 166: ...are to be filtered Example Related Commands filter ethernet type protocol 7 52 filter ethernet type protocol This command sets a filter for a specific Ethernet type Use the no form to disable filtering for a specific Ethernet type Syntax filter ethernet type protocol protocol no filter ethernet type protocol protocol protocol An Ethernet protocol type Options ARP RARP Berkeley Trailer Negotiation ...

Page 167: ...PoE management tunnel connection parameters for the Ethernet port Outdoor Bridge config filter ethernet type protocol ARP Outdoor Bridge config Outdoor Bridge show filters Protocol Filter Information AP Management ENABLED Ethernet Type Filter ENABLED Enabled Protocol Filters Protocol ARP ISO 0x0806 Outdoor Bridge Command Function Mode Page ip pppoe Enables PPPoE on the Ethernet interface IC E 7 54...

Page 168: ...resses for the PPPoE tunnel are configured on this interface Syntax pppoe ip allocation mode automatic static automatic IP addresses are dynamically assigned by the ISP during PPPoE session initialization static Fixed addresses are assigned by the ISP for both the local and remote IP addresses pppoe local ip Sets local IP address for the PPPoE tunnel IC E 7 57 pppoe remote ip Sets remote IP addres...

Page 169: ...sts allocation of IP addresses for Dynamic Naming System DNS servers from the device at the remote end of the PPPoE tunnel Syntax pppoe ipcp dns no pppoe ipcp dns Default Setting Disabled Command Mode Interface Configuration Ethernet Command Usage DNS servers are used to translate host computer names into IP addresses PPPoE clients can request a primary and secondary DNS server from the network co...

Page 170: ... echo request Devices receiving an echo request must return an echo reply If a link is busy with large data transfers the echo reply may not be issued in a timely manner causing the link to timeout If you experience this kind of problem try extending the echo interval or timeout Example Related Commands pppoe lcp echo failure 7 56 pppoe lcp echo failure This command sets the Link Control Protocol ...

Page 171: ...ds pppoe lcp echo interval 7 56 pppoe local ip This command sets the local IP address for the PPPoE tunnel Syntax pppoe local ip ip address ip address IP address of the local end of the PPPoE tunnel Default Setting None Command Mode Interface Configuration Ethernet Command Usage If the pppoe ip allocation mode is set to static the local IP address must be entered with this command and the remote I...

Page 172: ... be entered with the pppoe local ip command Example Related Commands pppoe ip allocation mode 7 54 pppoe local ip 7 57 pppoe username This command sets the user name for the PPPoE tunnel Syntax pppoe username username username User name assigned by the service provider Range 1 63 alphanumeric characters Default Setting None Command Mode Interface Configuration Ethernet Command Usage You must enter...

Page 173: ...ssword with this command and a user name with the pppoe username command Example Related Commands pppoe username 7 58 pppoe service name This command sets the service name for the PPPoE tunnel Syntax pppoe service name string string Service name assigned by the service provider Range 1 63 alphanumeric characters Default Setting None Command Mode Interface Configuration Ethernet Command Usage The s...

Page 174: ...meters Example show pppoe This command shows information about the PPPoE configuration Command Mode Privileged Exec Example Outdoor Bridge if ethernet pppoe service name classA Outdoor Bridge Outdoor Bridge if ethernet pppoe restart Outdoor Bridge Outdoor Bridge show pppoe PPPoE Information State Link up Username mike Service Name classA IP Allocation Mode Static DNS Negotiation Enabled Local IP 1...

Page 175: ...ress dns secondary server server address primary server Primary server used for name resolution secondary server Secondary server used for name resolution server address IP address of domain name server Default Setting None Command Function Mode Page interface ethernet Enters Ethernet interface configuration mode GC 7 61 dns primary server Specifies the primary name server IC E 7 61 dns secondary ...

Page 176: ...etting IP address 192 168 1 1 Netmask 255 255 255 0 Command Mode Interface Configuration Ethernet Command Usage DHCP is enabled by default To manually configure a new IP address you must first disable the DHCP client with the no ip dhcp command You must assign an IP address to this device to gain management access over the network or to connect the wireless bridge to existing IP subnets You can ma...

Page 177: ...rver using this command When you use this command the wireless bridge will begin broadcasting DHCP client requests The current IP address i e default or manually configured address will continue to be effective until a DHCP reply is received Requests will be broadcast periodically by this device in an effort to learn its IP address DHCP values can include the IP address subnet mask and default gat...

Page 178: ...disable the Ethernet port due to abnormal behavior e g excessive collisions and reenable it after the problem has been resolved You may also want to disable the Ethernet port for security reasons Example The following example disables the Ethernet port show interface ethernet This command displays the status for the Ethernet interface Syntax show interface ethernet Default Setting Ethernet interfa...

Page 179: ...68 turbo Configures turbo mode to use faster data rate IC W 7 69 beacon interval Configures the rate at which beacon signals are transmitted from the wireless bridge IC W 7 69 dtim period Configures the rate at which stations in sleep mode must wake up to receive broadcast multicast transmissions IC W 7 70 fragmentation length Configures the minimum packet size that can be fragmented IC W 7 71 rts...

Page 180: ... key Sets the index of the key to be used for WEP encryption IC W 7 76 multicast cipher Defines the cipher algorithm used for multicasting IC W 7 76 wpa clients Defines whether WPA is required or optionally supported for client stations IC W 7 77 wpa mode Specifies dynamic keys or a pre shared key IC W 7 78 wpa preshared key Defines a WPA preshared key value IC W 7 79 wpa psk type Defines the type...

Page 181: ...Usage Clients that want to connect to the wireless network via an access point must set their SSIDs to the same as that of the access point Example closed system This command closes access to clients without a pre configured SSID Use the no form to disable this feature Syntax closed system no closed system Default Setting Disabled Command Mode Interface Configuration Wireless Outdoor Bridge config...

Page 182: ...maximum transmission distance is affected by the data rate The lower the data rate the longer the transmission distance Example channel This command configures the radio channel through which the local wireless bridge communicates with remote bridges Syntax channel channel auto channel Manually sets the radio channel used for communications with remote bridges Range 802 11a 36 40 44 48 52 56 60 64...

Page 183: ...f up to 108 Mbps Enabling Turbo Mode allows the wireless bridge to provide connections up to 108 Mbps In normal mode the wireless bridge provides a channel bandwidth of 20 MHz and supports the maximum number of channels permitted by local regulations e g 11 channels for the United States In Turbo Mode the channel bandwidth is increased to 40 MHz to support the increased data rate However this redu...

Page 184: ...es how often the MAC layer forwards broadcast multicast traffic This parameter is necessary to wake up remote bridges that are using Power Save mode The DTIM is the interval between two synchronous frames with broadcast multicast information The default value of 2 indicates that the wireless bridge will save all broadcast multicast frames for the Basic Service Set BSS and forward them after every ...

Page 185: ...r frame size If there is significant interference present or collisions due to high network utilization try setting the fragment size to send smaller fragments This will speed up the retransmission of smaller frames However it is more efficient to set the fragment size larger if very little or no interference is present because it requires overhead to send multiple frames Example rts threshold Thi...

Page 186: ... can solve this Hidden Node problem Example transmit power This command adjusts the power of the radio signals transmitted from the wireless bridge Syntax transmit power signal strength signal strength Signal strength transmitted from the wireless bridge Options full half quarter eighth min Default Setting full Command Mode Interface Configuration Wireless Command Usage The min keyword indicates m...

Page 187: ... Accepts the client without verifying its identity using a shared key shared Authentication is based on a shared key that has been distributed to all stations Default Setting open Command Mode Interface Configuration Wireless Command Usage Shared key authentication can only be used when WEP is enabled with the encryption command and at least one static WEP key has been defined with the key command...

Page 188: ... For more secure data transmissions enable WEP or AES encryption with this command and set at least one key with the key command AES has been designated by the National Institute of Standards and Technology as the successor to the Data Encryption Standard DES encryption algorithm and will be used by the U S government for encrypting all sensitive nonclassified information Because of its strength a...

Page 189: ... ID is 1 For Master units the ID can be from 1 to 16 aes value The AES key string For alphanumeric input use 8 to 31 characters For hexadecimal input use exactly 32 digits Default Setting None Command Mode Interface Configuration Wireless Command Usage To enable WEP encryption use the encryption command to specify the key type and length and use the key command to configure at least one key To ena...

Page 190: ...ion Wireless Command Usage If you use WEP key encryption the wireless bridge uses the transmit key to encrypt multicast and broadcast data signals that it sends to other nodes Other keys can be used for decryption of data from other nodes Example multicast cipher This command defines the cipher algorithm used for broadcasting and multicasting when using Wi Fi Protected Access WPA security Syntax m...

Page 191: ...h packet a message integrity check an extended initialization vector with sequencing rules and a re keying mechanism TKIP defends against attacks on WEP in which the unencrypted initialization vector in encrypted packets is used to calculate the WEP key TKIP changes the encryption key on each packet and rotates not just the unicast keys but the broadcast keys as well TKIP is a replacement for WEP ...

Page 192: ...ncing rules and a re keying mechanism Enterprise level User Authentication via 802 1x and EAP To strengthen user authentication WPA uses 802 1x and the Extensible Authentication Protocol EAP Used together these protocols provide strong user authentication via a central RADIUS authentication server that authenticates each user on the network before they join it WPA also employs mutual authenticatio...

Page 193: ...h the access point Example Related Commands wpa clients 7 77 wpa preshared key 7 79 wpa preshared key This command defines a Wi Fi Protected Access WPA preshared key Syntax wpa preshared key type value type Input format Options ASCII HEX value The key string For ASCII input use 5 13 alphanumeric characters for 64 128 bit strings For HEX input use 10 26 hexadecimal digits for 64 128 bit strings Com...

Page 194: ...figuration Wireless Example Related Commands wpa preshared key 7 79 shutdown This command disables the wireless interface Use the no form to restart the interface Syntax shutdown no shutdown Default Setting Interface enabled Command Mode Interface Configuration Wireless Example AP if wireless g wpa preshared key ASCII agoodsecret AP if wireless g AP if wireless a wpa preshared key ASCII agoodsecre...

Page 195: ...ess point Command Mode Exec Outdoor Bridge show interface wireless a Wireless Interface Information Identification Description Enterprise 802 11a Access Point Turbo Mode OFF Channel 36 Status Enable Service type WDS 802 11 Parameters Transmit Power FULL 15 dBm Max Station Data Rate 54Mbps Fragmentation Threshold 2346 bytes RTS Threshold 2347 bytes Beacon Interval 100 TUs DTIM Interval 2 beacons Se...

Page 196: ...onfiguration Command Usage The current 802 11 standard does not specify the signaling required between access points in order to support clients roaming from one access point to another In particular this can create a problem for clients roaming between access points from different vendors This command is used to enable or disable 802 11f handover signaling between different access points especial...

Page 197: ...AN switch port to accept tagged VLAN packets with the wireless bridge s native VLAN ID Otherwise connectivity to the wireless bridge will be lost when you enable the VLAN feature The VLAN commands supported by the wireless bridge are listed below vlan This command enables VLANs for all traffic Use the no form to disable VLANs Syntax vlan enable no vlan Default Disabled Command Mode Global Configur...

Page 198: ...d Native VLAN ID Range 1 64 Default Setting 1 Command Mode Global Configuration Command Usage When VLANs are enabled the wireless bridge tags traffic passing to the wired network with the configured native VLAN ID a number between 1 and 64 Example Related Commands vlan 7 83 Outdoor Bridge config vlan enable Reboot system now y n y Outdoor Bridge config native vlanid 3 Outdoor Bridge config ...

Page 199: ...adio channel Be sure there is no other radio transmitter too close to either antenna If necessary move the antennas to another location 3 If the wireless bridge cannot be configured using Telnet a web browser or SNMP software Be sure to have configured the wireless bridge with a valid IP address subnet mask and default gateway Check that you have a valid network connection to the wireless bridge a...

Page 200: ...Troubleshooting A 2 A 5 If you forgot or lost the password Contact Technical Support ...

Page 201: ...4 36 48 72 96 108 Mbps per channel 802 11g 6 9 11 12 18 24 36 48 54 Mbps per channel 802 11b 1 2 5 5 11 Mbps per channel Maximum Clients 64 for the 802 11b g radio Modulation Types 802 11a BPSK QPSK 16 QAM 64 QAM 802 11g CCK BPSK QPSK OFDM 802 11b CCK BPSK QPSK Network Configuration Bridge 802 11a Point to point and point to multipoint Access Point 802 11b g Infrastructure Operating Frequency 802 ...

Page 202: ... 19 8 cm x 19 8 cm x 6 33 cm 7 8 x 7 8 x 2 49 in Weight kg lbs Network Management Web browser Telnet SNMP Temperature Operating 0 to 40 C 32 to 104 F Storage 0 to 70 C 32 to 158 F Humidity 15 to 95 non condensing EMC Compliance Class A FCC Class A US DGT Taiwan Radio Signal Certification FCC Part 15 15 407 b 5 GHz FCC Part 15 247 2 4 GHz Safety CSA NTRL CSA 22 2 No 950 UL 1950 Standards IEEE 802 3...

Page 203: ... W cw Impedance 50 Ohms Connector SMA female 17 dBi Integrated Panel Antenna Link Budget 5 825 GHz Cable Loss 1 dB Fade Margin 5 dB Modulation Rates Transmit Power dBm Receive Sensitivity dBm Maximum Range km with 17 dBi Panel Normal Mode BPSK 6 Mbps 20 91 28 000 BPSK 9 Mbps 20 90 28 000 QPSK 12 Mbps 20 89 28 000 QPSK 18 Mbps 20 87 28 000 16 QAM 24 Mbps 20 84 28 000 16 QAM 36 Mbps 20 80 28 000 64 ...

Page 204: ... 000 QPSK 36 Mbps 20 84 14 000 16 QAM 48 Mbps 20 81 14 000 16 QAM 72 Mbps 20 77 14 000 64 QAM 96 Mbps 18 72 3 655 64 QAM 108 Mbps 16 67 1 632 The maximum range calculated with a 17 dBi panel antenna at the far end of the link The maximum transmit power hence range may be lowered by regulatory FCC etc EIRP effective isotropic radiated power limits 17 dBi Integrated Panel Antenna Link Budget 5 825 G...

Page 205: ...irectional Antenna Link Budget 2 483 GHz Cable Loss 0 dB Fade Margin 3 dB Modulation Rates Transmit Power dBm Receive Sensitivity dBm Maximum Range km with 2 dBi NIC BPSK 6 Mbps 20 91 7 641 BPSK 9 Mbps 20 90 6 810 QPSK 12 Mbps 20 89 6 070 QPSK 18 Mbps 20 87 4 821 16 QAM 24 Mbps 20 84 3 413 16 QAM 36 Mbps 20 80 2 154 64 QAM 48 Mbps 18 75 1 079 64 QAM 54 Mbps 16 70 0 541 The maximum range calculated...

Page 206: ...nna Link Budget 5 825 GHz Cable Loss 0 dB Fade Margin 3 dB Modulation Rates Transmit Power dBm Receive Sensitivity dBm Maximum Range km with 2 dBi NIC Normal Mode BPSK 6 Mbps 20 91 3 257 BPSK 9 Mbps 20 90 2 903 QPSK 12 Mbps 20 89 2 587 QPSK 18 Mbps 20 87 2 055 16 QAM 24 Mbps 20 84 1 455 16 QAM 36 Mbps 20 80 0 918 64 QAM 48 Mbps 18 75 0 410 64 QAM 54 Mbps 16 70 0 183 Turbo Mode BPSK 12 Mbps 20 88 2...

Page 207: ...peed 216 km hr Temperature 40 C to 80 C Humidity 95 25 C 16 QAM 72 Mbps 20 77 0 650 64 QAM 96 Mbps 18 72 0 290 64 QAM 108 Mbps 16 67 0 130 The maximum range calculated with a 2 dBi NIC antenna at the far end of the link The maximum transmit power hence range may be lowered by regulatory FCC etc EIRP effective isotropic radiated power limits 8 dBi Omnidirectional Antenna Link Budget 5 825 GHz Cable...

Page 208: ...BPSK 9 Mbps 20 90 12 967 QPSK 12 Mbps 20 89 11 557 QPSK 18 Mbps 20 87 9 180 16 QAM 24 Mbps 20 84 6 499 16 QAM 36 Mbps 20 80 4 100 64 QAM 48 Mbps 18 75 1 832 64 QAM 54 Mbps 16 70 0 818 Turbo Mode BPSK 12 Mbps 20 88 12 967 BPSK 18 Mbps 20 87 11 557 QPSK 24 Mbps 20 86 10 300 QPSK 36 Mbps 20 84 8 182 16 QAM 48 Mbps 20 81 5 792 16 QAM 72 Mbps 20 77 3 655 64 QAM 96 Mbps 18 72 1 632 64 QAM 108 Mbps 16 67...

Page 209: ...565 g 16 5 dBi 60 Degree Sector Antenna Link Budget 5 825 GHz Cable Loss 1 dB Fade Margin 5 dB Modulation Rates Transmit Power dBm Receive Sensitivity dBm Maximum Range km with 16 5 dBi Sector Normal Mode BPSK 6 Mbps 20 91 28 000 BPSK 9 Mbps 20 90 25 000 QPSK 12 Mbps 20 89 23 059 QPSK 18 Mbps 20 87 18 316 16 QAM 24 Mbps 20 84 12 967 16 QAM 36 Mbps 20 80 8 182 64 QAM 48 Mbps 18 75 3 655 64 QAM 54 M...

Page 210: ...e QPSK 36 Mbps 20 84 14 000 16 QAM 48 Mbps 20 81 11 557 16 QAM 72 Mbps 20 77 7 292 64 QAM 96 Mbps 18 72 3 257 64 QAM 108 Mbps 16 67 1 455 The maximum range calculated with a 16 5 dBi sector antenna at the far end of the link The maximum transmit power hence range may be lowered by regulatory FCC etc EIRP effective isotropic radiated power limits 16 5 dBi 60 Degree Sector Antenna Link Budget 5 825 ...

Page 211: ...000 QPSK 12 Mbps 20 89 28 000 QPSK 18 Mbps 20 87 28 000 16 QAM 24 Mbps 20 84 28 000 16 QAM 36 Mbps 20 80 28 000 64 QAM 48 Mbps 18 75 16 324 64 QAM 54 Mbps 16 70 7 292 Turbo Mode BPSK 12 Mbps 20 88 14 000 BPSK 18 Mbps 20 87 14 000 QPSK 24 Mbps 20 86 14 000 QPSK 36 Mbps 20 84 14 000 16 QAM 48 Mbps 20 81 14 000 16 QAM 72 Mbps 20 77 14 000 64 QAM 96 Mbps 18 72 14 000 64 QAM 108 Mbps 16 67 6 499 The ma...

Page 212: ...Specifications B 12 B ...

Page 213: ...fied by two different colors For example one wire might be green and the other green with white stripes Also an RJ 45 connector must be attached to both ends of the cable Caution Each wire pair must be attached to the RJ 45 connectors in a specific orientation See Straight Through Wiring on page 2 and Crossover Wiring on page 2 for an explanation The following figure illustrates how the pins on th...

Page 214: ...must use straight through cable for network connections to hubs or switches that only have MDI X ports However if the device to which you are connecting supports automatic MDI MDI X operation you can use either straight through or crossover cable Crossover Wiring Because the 10 100 Mbps port on the power injector uses an MDI pin configuration you must use crossover cable for network connections to...

Page 215: ...in the following figure and table 8 Pin DIN Ethernet Port Pinout Pin Signal Name 1 Transmit Data plus TD 2 Transmit Data minus TD 3 Receive Data plus RD 4 48 VDC power 5 48 VDC power 6 Receive Data minus RD 7 Return power 8 Return power Note The and signs represent the polarity of the wires that make up each wire pair White Orange Stripe Orange White Green Stripe Green 1 2 3 4 5 6 7 8 1 2 3 4 5 6 ...

Page 216: ...tegory 5 or better UTP or STP cable maximum length 100 m 328 ft and be sure to connect all four wire pairs Note To construct a reliable Ethernet cable always use the proper tools or ask a professional cable supplier to construct the cable White Orange Stripe Orange White Green Stripe Green 1 2 3 4 5 6 7 8 1 2 3 4 5 6 7 8 8 Pin DIN Female RJ 45 1 7 2 3 4 5 8 6 White Blue Stripe White Brown Stripe B...

Page 217: ...process to verify the identity of a client requesting network access IEEE 802 11 specifies two forms of authentication open system and shared key Backbone The core infrastructure of a network The portion of the network that transports information from one central location to another central location where it is unloaded onto a local system Basic Service Set BSS A set of 802 11 compliant stations a...

Page 218: ...d supports data rates of 6 12 24 and 54 Mbps Local Area Network LAN A group of interconnected computer and support devices MAC Address The physical layer address used to uniquely identify network nodes Network Time Protocol NTP NTP provides the mechanisms to synchronize time across the network The time servers operate in a hierarchical master slave configuration in order to synchronize local clock...

Page 219: ... key can be used to authenticate each client attached to a wireless network Shared Key authentication must be used along with the 802 11 Wireless Equivalent Privacy algorithm Simple Network Management Protocol SNMP The application protocol in the Internet suite of protocols which offers network management services Simple Network Time Protocol SNTP SNTP allows a device to set its internal clock bas...

Page 220: ...Glossary Glossary 4 ...

Page 221: ...uration initial setup 5 1 country code configuring 5 2 7 11 crossover cable C 2 CSMA CA 1 1 CTS 6 40 7 72 D data rate options B 1 default settings 1 6 device status displaying 6 60 7 22 DHCP 5 6 6 4 6 5 7 62 7 63 DNS 6 6 7 61 Domain Name Server See DNS downloading software 6 23 7 29 DTIM 6 39 7 70 Dynamic Host Configuration Protocol See DHCP E EAP 6 55 7 78 encryption 6 44 6 49 6 50 6 55 7 74 Ethe...

Page 222: ...nterface 6 39 7 68 802 11g interface 6 43 7 68 MDI RJ 45 pin configuration 1 4 multicast cipher 6 57 7 76 N network topologies infrastructure 2 2 infrastructure for roaming 2 3 O OFDM 1 1 open system 5 6 6 49 7 67 operating frequency B 1 P package checklist 1 2 password configuring 6 22 7 14 management 6 22 7 14 PoE 1 4 4 5 specifications B 2 port priority STA 7 48 Power over Ethernet See PoE powe...

Page 223: ...22 displaying station status 6 62 7 81 STP fast forwarding 6 35 straight through cable C 2 system clock setting 6 27 7 20 system log enabling 6 25 7 15 server 6 25 7 16 system software downloading from server 6 23 7 29 T Telnet for managenet access 7 1 Temporal Key Integrity Protocol See TKIP time zone 6 27 7 21 TKIP 6 55 7 76 transmit power configuring 6 39 7 72 trap destination 6 20 7 25 trap ma...

Page 224: ...Index 4 Index ...

Page 225: ......

Page 226: ...E032004 R01 150xxxxxxxxxA ...

Reviews: