background image

June 30, 2006

Confidential

Page 30 of 147

Document Number BDTM10001-A05 Standard

BelAir100 User Guide

System Settings

These commands save and restore the country of operation, the alarm type 

mask and the alarm severity mask to persistent storage. The parameters are 

automatically activated the next time the system reboots.
Note: To restore the node parameters, you must be logged in as 

root

Example 1

/#cd system
/system# save node_config

Example 2

/#cd system
/system# restore node_config

Remote Back Up and 

Restore of the 

Configuration Database

To provide support for business continuity after a catastrophic event, the 

configuration data of a BelAir100 unit can be:
• backed up and saved to a remote server
• restored from a previously backed up copy
You can use either TFTP or FTP to communicate with the remote server. By 

default, TFTP is used.

Remote Backup of Configuration Data

To save your configuration data to external storage, you must:

1 Save your current configuration:

config-save

2 Upload the backup copy to a remote server:

config-save backup remoteip <ipaddr> remotefile <name>
[{tftp|ftp [user <usrname> password <pword>]}]]

Both of the previous steps are combined by using the following command:

config-save active remoteip <ipaddr> remotefile <name>
[{tftp|ftp [user <usrname> password <pword>]}]]

For example: 

config-save active remoteip 10.1.1.1 remotefile Node100.backup.2.0.0.20_2004_04_12

If you specify FTP, you can also specify the user name and password. The default 

FTP user name is 

anonymous

 and the default FTP password is 

root@<nodeip>

where <nodeip> is the IP address of node making the request. If you do not 

use the default FTP username, the FTP server must be configured to accept 

your username and password. Refer to the 

BelAir100 System Command Line 

Interface Guide

 for a complete description of the 

config-save

 command.

Summary of Contents for BA100

Page 1: ...er Support 613 254 7070 1 877 BelAir1 235 2471 techsupport belairnetworks com Copyright 2006 by BelAir Networks The information contained in this document is confidential and proprietary to BelAir Networks Errors and Omissions Excepted Specification may be subject to change All trademarks are the property of their respective owners BelAir100 User Guide ...

Page 2: ...n Commands 32 Access Radio Configuration 40 Backhaul Link Configuration 46 Wireless Security 59 Managing Access Radio SSIDs 76 Layer 2 Network Configuration 82 Using Layer 2 Tunnels 87 Quality of Service Settings 91 BelAir100 Statistics 97 Performing a Software Upgrade 98 BelAir100 Network Example 106 For More Information 110 Technical Support 113 Definitions and Acronyms 124 Appendix A Node Confi...

Page 3: ...or a CLI command for example IP address Text in indicates optional parameters for a CLI command Text in refers to a list of possible entries with as the separator Parameters in indicate that at least one of the parameters must entered For radio mode commands the n parameter as in brm n specifies the particular radio that the command applies to Related Documentation The following titles are BelAir ...

Page 4: ...ance and most flexible dual radio wireless mesh node Available in both multiple point to point and point to multipoint BelAir100C backhaul variants the BelAir100 is equally at home in high capacity high performance networks and low cost hotzones It can be deployed as a standalone device providing indoor or outdoor coverage or as part of a larger mesh with any combination of BelAir200 BelAir100 Bel...

Page 5: ...onfiguration the BelAir100 unit provides access to mobile users through 802 11b or 802 11g radio links at 2 4 GHz or through 802 11a radio links at 5 GHz As shown in Figure 2 the typical deployment scenario is to use both BelAir100 units and BelAir200 units to illuminate a building from the outside to provide coverage throughout the building The BelAir100 can also provide outdoor coverage and act ...

Page 6: ...s access to the BelAir100 up to two backhaul radios using enhanced performance 802 11a links The backhaul radios provide backhaul links for the radio mesh one Line and Power Module LPM providing a wireline interface to the Internet Two types of LPM are available The electrical LPM provides a 10 100 Base TX Ethernet interface The optical LPM provides a 100Base FX Fast Ethernet interface internal ac...

Page 7: ...2 View At the layer 2 data link layer the BelAir100 acts as a bridge and layer 2 switch See Figure 4 The layer 2 switch ports are connected to the BelAir100 input output devices such as the access radio and backhaul radios The BelAir100 layer 2 switch forwards layer 2 frames to the output of one or multiple ports based on the information contained in the frame header Figure 4 BelAir100 Layer 2 Vie...

Page 8: ...meters and enable other interfaces such as SNMP Command Line Interface The CLI allows you to configure and display all the parameters of a BelAir100 unit including system parameters system configuration and status radio module configuration and status user accounts BelAir100 traffic statistics layer 2 functionality such as those related to bridging and VLANs alarm system configuration and alarms h...

Page 9: ...tions The SNMP community names and trap destinations can be created through either the CLI or the Web interface The SNMP CLI commands are described in detail in the BelAir100 System Command Line Interface Guide Integrating the BelAir100 with a Pre deployed NMS In addition to providing support for the SNMP MIBs described in Table 2 BelAir Networks provides a number of enterprise MIB definitions tha...

Page 10: ...erface You can access the Web interface using either secure HTTP HTTPS or HTTP Both HTTP and HTTPS are enabled when each BelAir100 node is shipped Note By default the BelAir100 Web interface has an associated time out value If the interface is inactive for 30 minutes then you are disconnected from the interface To reconnect to the interface you need to log in again See BelAir100 System Command Lin...

Page 11: ...nterface and access the main page using HTTPS or HTTP do the following steps 1 Open your Web browser and specify the IP address of the BelAir100 node you want to access The default IP address of each BelAir100 node is 10 1 1 10 A Login page is displayed 2 Enter a valid user name such as root and a valid password Note The specified password is case sensitive If successful the BelAir100 Web interfac...

Page 12: ...ods through the BelAir100 radio interface by connecting directly to the Ethernet port on the BelAir100 CAUTION Do not connect the BelAir100 to an operational data network before you configure its desired IP network parameters This may cause traffic disruptions due to potentially duplicated IP addresses In all cases the BelAir100 unit must connect to an isolated LAN or to a desktop or laptop PC con...

Page 13: ...ir100 IP address Each BelAir100 can have up to eight simultaneous Telnet or ssh sessions If you are configuring the BelAir100 for the first time you must use the BelAir100 default IP address 10 1 1 10 The BelAir100 prompts you for your user name and password The default super user account is root The default password is admin123 If the login is successful the BelAir100 prompt is displayed The defa...

Page 14: ...elected mode Their list can be displayed using the help command Table 4 on page 14 describes the modes that are supported Table 4 Command Line Interface Modes Mode Description root mode The top or root level of the CLI commands Mostly display show commands Administration SYSTEM System and node configuration and administration SNMP Configure the Simple Network Management Protocol SNMP parameters SY...

Page 15: ...age 19 When a given mode is enabled only the commands pertaining to that mode are available The list of available commands can be obtained by entering the help command Users may execute commands from other modes than the current one by prefixing the desired command with the slash character followed by the mode s name For instance entering system snmp snmp community 4 community name snmpcom4 ipaddr...

Page 16: ...nambiguously the CLI presents you with a list of possible completions For instance entering show snmp tab produces the following output Available commands Syntax show snmp community config Syntax show snmp trap config Execution of the Last Typed Command You may repeat the last command by entering the key twice followed by carriage return Executing the Previous Commands You may browse through the c...

Page 17: ...ask all dcom eqpt sw qos env secu sys set alarm severity mask all critical major minor warning info show alarm mask show phyinv show temperature internal show temperature limit upper show temperature limit lower show battery present show battery voltage When a keyword is typed all possible commands starting from that keyword are displayed Example system help system Syntax system switch name contac...

Page 18: ...M10001 A05 Standard BelAir100 User Guide Command Line Interface Basics Example system help reb Syntax reboot force Description Directs the node to reboot Terminating your CLI Session You can terminate your own CLI session at any time by entering the exit command ...

Page 19: ...cd and mode commands the history command the whoami command the ping command A normal user can execute any CLI command except those reserved for the super user The super user can execute any CLI command CLI Commands for the following functions are reserved for the super user user administration session access and control SNMP setup and configuring SNMP access first time configuration country code ...

Page 20: ...t be at least six characters long Note 2 The specified group is case sensitive If you use a RADIUS server to authenticate users as they login you must specify the user s privilege level in the RADIUS Reply Message field Specifically the Reply Message field must contain in plain text one of the following root NORMAL or OBSERVER These entries in RADIUS are case sensitive so make sure the user privil...

Page 21: ...specified password is case sensitive and must be at least six characters long Changes the super user account require that you provide the super user password Note 2 The specified group is case sensitive Example In the following example the user guest begins their session in radio mode and their password is changed to guest123 moduser guest p guest123 d radio Displaying the Available User Accounts ...

Page 22: ...eans that the BelAir100 uses the locally stored password and user account information to authenticate the user This is the default setting The radius setting means that the BelAir100 uses a RADIUS server to authenticate the user To use this command you must be in system mode Example authentication login radius Adding RADIUS Servers add radius server IP address port shared secret interface NAS IP a...

Page 23: ...dress parameter The timeout parameter specifies the interval in seconds after which the RADIUS client considers that the remote server has timed out if a reply is not received The default value is 10 seconds Note Make sure the user s privilege level are correctly specified in the RADIUS Reply Message field Refer to Adding User Accounts on page 20 Examples add radius server 172 16 1 25 1812 radius ...

Page 24: ...001 A05 Standard BelAir100 User Guide User Administration Example system show authentication login Authentication Login is radius Radius Authentication server table Index 1 Radius Server Address 10 1 1 2 UDP port number 1812 Radius Client Address 0 0 0 0 Timeout 10 ...

Page 25: ...and Line Interface Guide Displaying the BelAir100 Node and IP Parameters show system configuration This command displays the system s configuration To use this command you must be in system mode Example show system configuration BelAir System configuration Software version BA50c 4 1 0 Default IP Addr Config Mode Manual Switch name Switch Contact Switch Location Switch base MAC address 00 0d 67 00 ...

Page 26: ...00 uses internal IP addresses in the range of 192 168 1 x 192 168 2 x and 192 168 3 x As a result users should not configure the BelAir100 to use any IP addresses within these ranges To use this command you must be in system mode Example cd system system system default ipaddr 10 6 4 135 subnet mask 255 255 255 0 default interface eth1 Displaying the Static IP Routing Tables By default the routing ...

Page 27: ...nt date 2004 02 10 06 52 20 Manual Date Configuration set date YYYY MM DD This command sets the current date The value must be formatted as follows YYYY is the year MM is the month DD is the date You must enter the exact date format as specified that is four digits for the year and two digits for the month and day Example cd system system set date 2004 02 10 Manual Time Configuration set time hh m...

Page 28: ...command lets you set the IP address of the external SNTP server Example cd system system set sntp ip address 10 1 1 2 Enabling and Disabling Time Synchronization set sntp enable disable This command enables or disables the SNTP client When the SNTP client is enabled the BelAir100 s clock is reset to use Universal Time UTC Example cd system system set sntp enable Displaying Inventory and Status Par...

Page 29: ... and can restore the configuration Refer to Local Back Up of the Configuration Database on page 29 Saving and Restoring Node Configuration Parameters on page 29 Create a backup of the configuration database and store it remotely on a TFTP server This option consists of aggregating all of the local configuration files and other critical system files The aggregate file is then moved to a remote loca...

Page 30: ...e server By default TFTP is used Remote Backup of Configuration Data To save your configuration data to external storage you must 1 Save your current configuration config save 2 Upload the backup copy to a remote server config save backup remoteip ipaddr remotefile name tftp ftp user usrname password pword Both of the previous steps are combined by using the following command config save active re...

Page 31: ... request If you do not use the default FTP username the FTP server must be configured to accept your username and password You can use a backup copy that was created with a different version of software than the current software installed on the unit To do so use the config restore command with the force option If you use the force option then you must do step 4 on page 31 after you reboot the sys...

Page 32: ...0 To configure parameters that are specific to backhaul radios including the different types of backhaul links see Backhaul Link Configuration on page 46 Other aspects of radio configuration and operation are described in Wireless Security on page 59 Managing Access Radio SSIDs on page 76 For full details on radio module configuration see the BelAir100 Radio Command Line Interface Guide Displaying...

Page 33: ...yed as follows a dot means that the encryption setting is disabled for that particular SSID the word yes means that the encryption setting is enabled for that particular SSID a dash means that information is not available Example 2 cd radio radio show brm1 config Radio State enable Channel 149 Link Identifier BRM3 Trial Link Topology Star SS Link Provisioned 1 Privacy disabled key Antenna external...

Page 34: ...d channel DFS radar radar holdoff time required type detected remaining 056 primary no unknown no n a 056 secondary no unknown no n a Remote Node Information Last heard from 0 secs ago Remote Radio RSSI 0 dBm Antenna type external Module brm1 MAC address 00 0d 67 ff ff ff Remote Node Name Location MAC address 00 00 00 00 00 00 SwVersion 3 2 0 2005 06 2 Example 2 The following example shows a typic...

Page 35: ...o or an access radio Example cd radio radio show arm1 mac configuration rts threshold 2347 fragment threshold 2346 short retries 8 long retries 4 auth response timeout 500 assoc response timeout 500 Radio Mode or Disabling a Radio show arm n brm n mode set arm n brm n radio state enable disable set brm n mode ap client disable set arm n mode ap disable The show command displays the operating mode ...

Page 36: ...e has an associated antenna gain For the show command the output displays the current and possible antenna types the associated antenna gain in dBi for each type and the maximum allowable transmit power for that antenna The displayed values vary depending on the country of operation For the set command you must set the antenna type to match the gain of the antenna installed in your unit Use the sh...

Page 37: ... the same as the primary channel If you change the channel number from the default value and if you do not specify a secondary channel then your secondary channel is set to be the same as your primary channel DFS behaves the same way regardless of whether your secondary channel is the same as the primary channel or whether your secondary channel is 0 Refer to your RF plan and site survey to determ...

Page 38: ...If your unit contains a radio with part numbers B2CC011AA B2CC011AB B2CC043AA or B2CC033AA then the range of value is limited to be valid for your country of operation physical channel in use and type of antenna that is installed The default setting is to have the radio transmit at maximum power Use the system show phyinv command to display the radio s part number Note After you change the transmi...

Page 39: ...ration The show command displays various parameters associated with DFS The default value of the secondary channel is 0 instructing DFS to operate as if the secondary channel is the same as the primary channel The set command suppresses any use of DFS by the set country country_code command When disabled with this command DFS remains disabled for all radio channels until re enabled by this command...

Page 40: ...parameters that are common to both access radios and backhaul radios see Common Radio Module Configuration Commands on page 32 For full details on radio module configuration see the BelAir100 Radio Command Line Interface Guide Client Information You can display information about the clients that are associated or that were recently associated to the AP Displaying the Number of Associated Clients s...

Page 41: ...e auth client is authorized for Open or WEP privacy eapAuth client is authorized for dot1x WPA1 or WPA2 privacy pskErr Possible wrong WPAPSK key configured on client radto For dot1x WPA1 or WPA2 Problems connecting to radius server possibly because of a network problem cltto For dot1x WPA1 or WPA2 Problems sending EAP packets to client Table 5 Output Field Descriptions Continued Field Description ...

Page 42: ... Discover message with a DHCP Offer message This packet tells the client its IP address The client should then send a DHCP Request message to verify the IP address req Client has sent the DHCP Request message to the server and is waiting for a a DHCP Ack message to confirm the assigned IP address decl Server has declined the client s DHCP request Verify the server settings ack Client has sent a DH...

Page 43: ...m n client associated command In the resulting output the age parameter shows the time since the access radio last received a data frame from the client and the state parameter shows authenticated 2 if the client is no longer associated Example cd radio radio show arm1 client 35 details id 35 address 00 40 96 38 2e 03 state associated 5 age 594 secs rssi 82 dBm Access Radio Transmission Rates If y...

Page 44: ...ailable for each setting Example 1 cd radio radio show arm1 profile Profile B only Example 2 cd radio radio show arm1 profile Profile Mixed Table 6 Access Radio Profile Settings 802 11b Settings 802 11b Settings Mixed 802 11b and g Rate Mb s Rate Mb s Rate Mb s 1 basic 1 basic 1 basic 2 basic 2 basic 2 basic 5 5 basic 5 5 basic 5 5 basic 11 basic 6 basic 6 non basic 11 basic 11 basic 12 basic 12 n...

Page 45: ...such that clients that associate with the access radio have the greatest throughput All rates becomes basic The custom rates setting allows you to customize the radio rate settings listed previously The rates parameter is a comma separated list of rates If a rate is excluded from the list then that rate is disabled and the radio cannot operate at that rate You can also specify a rate with basic Ra...

Page 46: ... are available in radio mode Other aspects of radio configuration and operation are described in Wireless Security on page 59 Managing Access Radio SSIDs on page 76 To configure parameters that are specific to access radios see Access Radio Configuration on page 40 To configure parameters that are common to both access radios and backhaul radios see Common Radio Module Configuration Commands on pa...

Page 47: ...eate these types of links the BelAir node must contain a radio with part number B2CC033AA MP to MP links allow you to create a full mesh topology with up to eight BelAir nodes forming a cluster Typically a mesh cluster contains up to seven BelAir nodes and a mesh portal that can be a BelAir200 BelAir100 BelAir100C or BelAir100S node The mesh portal connects the cluster to the rest of the network A...

Page 48: ...PC The set command is only available if you are logged in as root This command applies only if your unit contains a radio with part numbers B2CC034AA or B2CC034AB or B3CC033AA Use the system show phyinv command to display the radio s part number TPC that automatically adjusts the transmit power of a backhaul radio based on communications with the backhaul radio at the other end of a link The backh...

Page 49: ...link identifier The following command configures the radio for a basic 5 GHz P to P link topology without privacy set brm n link identifier lnk_id topology p2p The link_id parameter is case sensitive and can be up to 32 alphanumeric characters For P to P links BelAir Networks recommends that the link identifier describes the link that is the nodes it connects All Other Backhaul Radios These types ...

Page 50: ...ink The link_id parameter is case sensitive and can be up to 32 alphanumeric characters For MP to MP links the link identifier is also known as a mesh identifier It is the same for all members of a particular mesh cluster Example radio set brm1 link topology mesh identifier BelAir mesh 5 GHz P to MP Links set arm n brm n link identifier lnk_id topology star role bs ss index lnk_idx This command le...

Page 51: ... Portal State no Isolate RSTP yes Privacy enabled key 1234567890abcdef Example 2 radio show arm1 link detail Link Identifier BelAir Networks Mesh Link Topology Mesh enabled Portal State no Isolate RSTP yes Privacy enabled key 1234567890abcdef Link RadioMAC State RSSI Radio NodeIP Rx Pkts Tx Pkts 1 00 0d 67 00 4c 9e fwd 38 arm1 10 1 3 101 223139 97301 Example 3 radio show brm1 link provisioned Curr...

Page 52: ... intended for use mainly on units that are part of a mesh cluster Example radio show arm1 traffic limit Radio traffic limit is 4000 kBit s Displaying the Mesh Topology show arm n brm n mesh topology This command displays the operating parameters of the node you are currently accessing and all the links connected to it The output consists of three areas as follows a list of operating parameters of ...

Page 53: ...ode 2 has an RSSI value of 67 dBm Row 2 column 1 shows 65 meaning that according to Node 2 the link to Node 1 has an RSSI value of 65 dBm A slight variance in the RSSI value as seen from both ends is normal because one radio receiver may be slightly more sensitive than the other or the associated antenna gain may be slightly different Managing the Mesh Blacklist show arm n brm n blacklist add arm ...

Page 54: ...configured with the local mesh point s current mesh or link identifier but with a different channel the local mesh point s previously saved mesh or link identifier either on the same or different channel either the current or previously saved mesh or link identifier on either the same or different channel but with a different encryption scheme The output may show undef as the type of privacy meani...

Page 55: ...recommends that you do not change this setting unless advised to do so by BelAir Networks technical support staff An improper settings of this parameter may result in subsequent RSTP topology issues Managing the Mesh Accept List show arm n brm n mesh accept accept arm n brm n mesh For a 2 4 GHz mesh cluster you can use these commands only with the mesh portal For a 5 GHz mesh cluster you can used ...

Page 56: ...dress of the remote backhaul radio of an established backhaul link Its default value is null 00 00 00 00 00 00 indicating no established link It is dynamically set when the backhaul radio associates itself with another backhaul radio with matching SSID physical channel and complementary mode The currently associated backhaul radio MAC address can be displayed with the following command show brm n ...

Page 57: ...ed backhaul radio the current associated backhaul radio MAC address can be discarded so that the pre configured peer can become associated To do so use the following command discard brm n associated mac address Example radio discard brm1 associated mac address radio show associated mac address 00 00 00 00 00 00 Changing the Peer Backhaul Radio MAC Address To change the value of the peer backhaul r...

Page 58: ...6c radio show brm1 associated mac address 00 0d 67 00 11 6c Break the existing association backhaul link radio discard brm1 peer mac address radio show brm1 peer mac address 00 00 00 00 00 00 radio show brm1 associated mac address 00 00 00 00 00 00 A few seconds later another BRM becomes associated radio show brm1 associated mac address 00 0d 67 00 21 8f Accept the new associated BRM copy the cont...

Page 59: ...ou use depends on your security needs and your network configuration If multiple SSIDs are configured each SSID can be configured with its own security options The authentication options are instruct the Access Point to connect to a Remote Authentication Dial In User Service RADIUS server in your network that keeps a list of accepted clients RADIUS is a standard for user authentication For this op...

Page 60: ...echanism for encryption WPA1 provides much stronger security than WEP or dot1x WPA2 provides the strongest level of protection because it uses the AES encryption CAUTION dot1x WPA1 or WPA2 can only be used with wireless clients that support these standards both the operating system and the network card For clients that only support WEP select a combination with WEP Note A network is as secure as i...

Page 61: ...acters exclamation mark bar semicolon question mark double quotation mark When disabling WEP encryption key index 1 is used by default The ssid_index parameter must be a valid SSID index The default value is 1 Example 1 cd radio radio show arm1 wep encryption wep psk key 0x0102030405 state disabled Example 2 cd radio radio set arm1 wep encryption psk 0x0123456789 enabled Example 3 cd radio radio s...

Page 62: ...eated first The ip address parameter specifies the IP address of the RADIUS server The port parameter specifies the UDP port number of the RADIUS server typically 1812 The shared secret parameter specifies the password for access to the RADIUS server The NAS IP address parameter specifies the Network Access Server NAS IP address for the BelAir100 RADIUS client It is used when the unit is configure...

Page 63: ...t RADIUS accounting is disabled Setting and Displaying the RADIUS Re authentication Time show arm n radius reauth time ssidx ssid_index set arm n radius reauth time seconds ssidx ssid_index These commands let you manage the RADIUS re authentication time You can set a RADIUS re authentication time This forces the BelAir100 to check all connected clients with the RADIUS server that is make sure they...

Page 64: ...MAC address Including an Accounting Session Identifier in Access request Packets show arm n radius account session id ssidx ssid_index set arm n radius account session id enable disable ssidx ssid_index These commands let you manage whether to include or not an accounting session identifier in access request packets The session identifier is automatically generated by the system 802 1X Authenticat...

Page 65: ...roup key is not changed This is the default when 802 1X is enabled If rekey is set to n seconds the group key is changed after that time period If rekey is set to n kpackets the group key is changed after that many thousand packets The ssid_index parameter must be a valid SSID index The default value is 1 Example 1 cd radio radio show arm1 dot1x dot1x wepkey bits104 rekey method no state disabled ...

Page 66: ...cimal or ASCII string and must not contain the following characters exclamation mark bar semicolon question mark double quotation mark You can also use WPA1 with a RADIUS server by specifying eap instead of a pre shared key In this case at least one RADIUS server must be pre configured The rekey parameter allows you to specify Group Key Rekey options to improve security These options allow you to ...

Page 67: ...any other changes set arm1 wpa1 update yes enabled WPA2 Authentication show arm n wpa2 ssidx ssid_index set arm n wpa2 eap psk secret string ssidx ssid_index enabled disabled These commands let you manage WPA2 authentication It is only available if your unit contains a radio with part numbers B2CC011AA B2CC011AB B2CC043AA or B2CC033AA Use the system show phyinv command to display the radio s part ...

Page 68: ... WPA2 key Wireless Client Access Control List You should only use this option as an extra security measure if you cannot or prefer not to set up a RADIUS server your network provides access to network clients which do not support 802 1X WPA authentication In both cases it is recommended that you enable pre shared key encryption WEP WPA1 or WPA2 show arm n acl ssidx ssid_index add arm n acl mac add...

Page 69: ...nage authentication response time out value of a backhaul radio or an access radio The authentication response time out is the amount of time to wait for the next frame in the IEEE 802 11 authentication sequence The time out parameter has a range of 0 to 2147483647 and is specified in time units One time unit is 1024 microseconds Example 1 cd radio radio show brm1 mac auth response time out 500 Ex...

Page 70: ... a different encryption key However the backhaul radios at both ends of a link must use the same key type and value The type can be either WEP or TKIP If you use the WEP type the key must be a string of either exactly 5 ASCII characters for 40 64 bit encryption or exactly 13 ASCII characters for 104 128 bit encryption You can only use the following ASCII characters for a backhaul radio WEP key 0 t...

Page 71: ...router s in your network 2 Disable wireless bridging for each of the access radios in your network 3 Disable inter AP wireless client communications a Add the previously determined gateway MAC address or addresses to the access radio s white list This allows wireless clients to communicate with the Internet The white list typically contains the MAC address of the gateway interfaces b Enable secure...

Page 72: ...another access radio ARM B The secure port mode prevents this By default wireless bridging is enabled Example 1 cd radio radio show arm1 wireless bridge enabled Example 2 cd radio radio set arm1 wireless bridge disabled Disabling Inter AP Wireless Client Communication Disabling inter AP wireless client communications involves setting up an access radio white list and secure port mode for each acce...

Page 73: ...he white list takes effect only when the access radio secure port mode is enabled Example cd radio radio add arm1 secure mac address 00 0d c7 a0 11 23 Managing the Access Radio Secure Port Mode show arm n secure port ssidx ssid_index set arm n secure port enabled disabled ssidx ssid_index These commands let you manage access radio secure port mode The ssidx ssid_index parameter applies only if you...

Page 74: ...ce of interference and capacity degradation for the network being deployed The following commands assist you in detecting unauthorized rogue wireless access points show arm n rogue ap show brm n rf_survey These commands display several information items for every access point visible to a BelAir100 s radio using a particular channel The displayed information can help you identify and locate rogue ...

Page 75: ...fra yes abc_ltd 01 0d 67 00 01 21 11 45 0 infra yes abc_ltd In the previous example four of the devices visible to the access radio have SSIDs abc_ltd indicating the network being deployed with BelAir equipment A fifth device has an SSID tsunami indicating a potential rogue access point By examining the MAC address you can interpret that the rogue is a Cisco access point The rogue is transmitting ...

Page 76: ...alue A private SSID means that there is no beacon dataframe Instead the association is managed through a client s probe and response dataframe session SSID 1 is usually a public SSID but its behavior can be configured All other SSIDs are always private SSID 1 also always has an enabled BSSID Finally you can use the commands described in this chapter to map an SSID to a VLAN Adding or Modifying an ...

Page 77: ...is present in the beacon dataframe Note Because normal and broadcast are considered the same any display of the SSID type shows normal A suppress setting means that the access radio does not respond to a broadcast probe request and that SSID information element is present in the beacon dataframe but has a length of 0 and a null value If you have a radio with part number B2CC000AA or B2CC000AB The ...

Page 78: ...dio during manufacturing If the embedded data is unavailable then the additional BSSID are generated by incrementing the third least significant byte of the primary BSSID For example if the primary BSSID is 00 0D 67 00 12 34 then the second BSSID is 00 0D 67 01 12 34 and the third BSSID is 00 0D 67 02 12 34 Configuring a Suppressed SSID with a BSSID Do the following steps 1 If necessary configure ...

Page 79: ...ameter must be a valid SSID index The default value is 1 Table 8 explains the various fields in the resultant output Table 8 Output Field Descriptions Field Description IP Client s IP address s indicates static IP addressing identity 802 1X client identity Present for dot1x or WPA SSIDs auth Authentication state of the client unauth default or initial state auth client is authorized for Open or WE...

Page 80: ...P Discover message with a DHCP Offer message This packet tells the client its IP address The client should then send a DHCP Request message to verify the IP address req Client has sent the DHCP Request message to the server and is waiting for a a DHCP Ack message to confirm the assigned IP address decl Server has declined the client s DHCP request Verify the server settings ack Client has sent a D...

Page 81: ...r Guide Managing Access Radio SSIDs Example cd radio radio show arm1 client associated Total associated clients 2 id ss vlan mac addr IP identity rssi auth dhcp 12 2 500 00 0D 88 EF B2 3D 10 1 50 108 mrussell 61 eapAuth arpRes 11 2 500 00 0D 88 EF B2 3E 10 1 60 108 s anonymous 62 eapAuth arpRes ...

Page 82: ... Using Layer 2 Bridging on page 82 Using Virtual LANs on page 83 Managing Egress Node Traffic on page 85 Using Layer 2 Tunnels on page 87 BelAir100 Layer 2 Switch Port Assignment The following command displays the port assignment and status of the layer 2 switch show interface config all Example show interface config all Index Name Module IfaceType MTU AdminStat OperStat EncapType Physical 1 eth0 ...

Page 83: ...ng broadcast traffic from the VLAN and including only those devices that must communicate with each other You can provide security by forcing traffic between VLANs through a routing device For the BelAir100 an unlimited number of VLANs can be created for client traffic Up to four management VLANs can be configured VLANs can be implemented based on client SSID as described in Managing Access Radio ...

Page 84: ...ified client is discarded by the BelAir200 if the mapped VLAN is not previously configured Note DHCP servers usually have the ability to assign a default route to DHCP clients BelAir Networks recommends that you configure your DHCP server to not supply any default routes This avoids the possibility of the DHCP server providing two different default routes to two different IP interfaces on the same...

Page 85: ...gged in as root These commands let you convert the VLAN tagging of traffic entering or leaving the LPM port of an egress node If you specify a VLAN ID untagged VLAN packets coming from the LPM port of an egress node are converted to tagged packets with the specified VLAN ID Similarly packets that are tagged with the specified VLAN ID are sent to the LPM port of the egress node as untagged VLAN pac...

Page 86: ...LAN IDs By default the list is empty meaning that all traffic is allowed to enter or leave the LPM port of the egress node If you add a VLAN ID to the list then only traffic belonging to that VLAN can enter or leave the LPLM port of the egress node If you add the keyword untagged to the list then only untagged traffic can enter or leave the LPLM port of the egress node ...

Page 87: ...bile client MAC addresses especially for customers using DOCSIS technology in their access network Figure 5 shows how wireless mobility is implemented with L2TP When a wireless client transmits an 802 11 frame the BelAir Access Point AP converts it to an Ethernet frame with VLAN information encapsulates it within an IP packet and then sends the packet to a Tunnel End Point TEP The TEP is usually p...

Page 88: ... 11frame and then transmits it to the wireless client When a mobile wireless client moves to a new AP its traffic travels through a different Layer 2 tunnel The traffic is encapsulated and sent to TEP as before The VLAN aware Ethernet switch then updates its MAC address table as required with the information for the wireless client s new AP Any subsequent frames sent to the wireless client are the...

Page 89: ...l end point IP addresses may be manually configured or obtained by DHCP If a VLAN interface is specified it must be previously configured Refer to Using Virtual LANs on page 83 The mode parameter is used when the unit is connected to other units through backhaul links In this case you may want the unit to act as an egress point and put access traffic from itself and the other nodes into the tunnel...

Page 90: ...map vlan command instructs the node to forward traffic to the specified tunnel You can specify either traffic associated with a specific VLAN or traffic that is not tagged for any VLAN All packets that meet this criteria received by any of the node s radios are forwarded through the tunnel If the tunnel is not configured or not active all corresponding packets are dropped If you specify untagged t...

Page 91: ...e the associated commands on each possible BelAir unit in the path of that VLAN Prioritization Each BelAir node supports four traffic priority queues numbered 0 to 3 Queue 3 has the highest priority while queue 0 has the lowest priority Table 9 describes each queue All traffic that is not associated to a VLAN has priority 1 This means that until you create VLANs all traffic has priority 1 Table 9 ...

Page 92: ...ty value regardless of the VLAN ID to the specified priority queue Note Settings made with the map vlan command have precedence over settings made with this command Table 10 shows how User Priority values are processed to priority queues by default To unmap a previously set priority use the map up command to map that priority back to the default priority queue as shown in Table 10 Prioritizing Tra...

Page 93: ...d uses traditional non WMM features to communicate with them Managing the QoS Priority Scheme set arm n brm n qosschedule edca spq lspq show arm n brm n qosschedule To use these commands you must be in radio mode These commands apply only if your unit contains a radio with part numbers B2CC011AA B2CC011AB B2CC043AA or B2CC033AA Use the system show phyinv command to display the radio s part number ...

Page 94: ... based on the UP field value Selecting dscp means that traffic is sent to the four BelAir priority queues based on the DSCP field value Selecting both means that traffic is sent to the four BelAir priority queues based on the highest priority value of either the UP field or the DSCP field By default QoS mapping is set to both Table 11 shows the mapping of the UP value and the DSCP value to the pri...

Page 95: ...y of all current QOS settings including the Spectralink Voice Priority SVP classification settings if applicable how User Priority bits are currently mapped to the priority queues Example cd qos qos show qos config Qos Global Configuration Qos Status Enabled SVP Status Enabled Qos Global UP to Queue Mapping UP Value 0 Queue 1 UP Value 1 Queue 0 UP Value 2 Queue 0 UP Value 3 Queue 1 UP Value 4 Queu...

Page 96: ...rioritization Settings show qos user priority map To use this command you must be in qos mode The show qos user priority map command displays how User Priority bits are currently mapped to the priority queues Example cd qos qos show qos user priority map Qos Global UP to Queue Mapping UP Value 0 Queue 0 UP Value 1 Queue 1 UP Value 2 Queue 1 UP Value 3 Queue 1 UP Value 4 Queue 1 UP Value 5 Queue 1 ...

Page 97: ...tatistics show arm n brm n mac statistics This command displays the MAC statistics of a backhaul radio or an access radio Example cd radio radio show arm1 mac statistics transmit fragment count 627 multicast transmit fragment count 203 failed count 1552 retry count 0 multiple retry count 424 frame duplicate count 0 rts success count 0 rts failure count 0 ack failure count 1552 received fragment co...

Page 98: ...ne release can be structurally different than in other releases For example the configuration database in Release 6 0 is structurally different than in previous releases Because of this downgrading a software load from Release 6 0 to the previous release requires much effort BelAir Networks strongly recommends that you fully verify the configuration and operation of an upgraded unit before you com...

Page 99: ... new software load is downloaded to the standby software load bank If A is active then the new software load is downloaded to bank B If B is active then the new software load is downloaded to bank A 4 Verify the new software downloaded successfully 5 Activate the new software load from the standby software load bank containing the new load by rebooting the node The new load is promoted to active a...

Page 100: ...s activated at the next reboot can be displayed with the following command cd system show next load Downloading a New Software Load You can download a new software image from a remote server with the following command cd system upgrade load remoteip serverIPaddress remotepath serverSubDir tftp ftp user usrname password pword Note This command is only available if you are logged in as root The comm...

Page 101: ... load into the standby software load bank If you reboot the node the software in the active software load bank is used See Figure 7 CAUTION Because the software upgrade process was interrupted the software in the standby software load bank may no longer be suitable to reboot the system Do not set it to be the next active load unless you first commit the current active software load or complete a n...

Page 102: ...activation process Note Rebooting a unit as part of a software upgrade can take significantly longer up to 20 minutes depending on the unit s configuration Verifying the New Software Load BelAir Networks recommends that you fully verify the configuration and operation of an upgraded unit before you commit the new load Use the following steps as guidelines 1 Fully verify the unit s configuration an...

Page 103: ...the adjacent bank at the time of execution However changes to the active load s configuration after the commit command is executed are not automatically stored in the standby bank To keep both banks synchronized you must use the commit command after every configuration change of the active load Backing Out from a Software Upgrade It is possible to back out from a software upgrade in case its effec...

Page 104: ...software load with the following command cd system show loads 2 Set the old software load to be the next active load with the following command cd system set next load A B If you have just upgraded the software you must set the unit to reboot with the currently standby load For example if the old software load is in bank A as shown inFigure 9 and the new software load is in bank B then you must ac...

Page 105: ...on 4 Run the commit command Running the commit command is not necessary if the system is already executing the old software load because you have decided for example to back out of the upgrade before activating the new load In this case the content of the old software load which is active overwrites the contents of the new undesired software load Displaying the Status of the Software Upgrade The s...

Page 106: ...etwork you first need to configure the IP parameters for each BelAir200 unit and the BelAir100 unit as described in section Configuration of IP Parameters on page 107 At this stage you should also determine the MAC addresses of the backhaul radios You will need this piece of information to configure the backhaul radio links The next step is to configure each unit s country of operation which in th...

Page 107: ... remote end MAC address Lastly change the IP settings that is the IP address and the static routing tables if needed cd system system default ipaddr 172 16 100 1 subnet mask 255 255 255 0 Reboot for the IP settings to take effect reboot You must execute similar procedures for each of the other units BA200 B and BA100 A Configuring the Remaining Parameters After rebooting login again to each unit u...

Page 108: ... radio set brm1 key wep abcdefg012345 5 Enable backhaul privacy radio set brm1 privacy enabled Bridge functionality is automatically enabled so you do not need to enter bridge commands Also the Spanning Tree Protocol is not required because there are no loops in this network Configuration Commands for BA200 B 1 Configure the country of operation cd system system set country ca system save node_con...

Page 109: ... system system set country ca system save node_config system reboot 2 Configure the SSID and privacy for the access radio cd radio radio set arm1 ssid BA100 A 1 ssidx 1 vlan 230 radio set arm1 wep encryption psk 3132333435 enabled ssidx 1 radio config save 3 Configure the backhaul radio namely the BA100 end of the BA200B BA100A link cd radio radio set brm1 channel 61 radio set brm1 mode client rad...

Page 110: ... More Information Getting Started When you are Use these documents Planning a new implementation Determining how many units you will need to deploy Determining the location of each unit Determining and installing the support infrastructure unit mounting structures cabling etc BelAir Products Deployment Guidelines Infrastructure requirements Pre configuring the BelAir units Installing BelAir units ...

Page 111: ...e BelAir100 System CLI Guide Using CLI the web interface or SNMP type interfaces to configure the BelAir100 unit Looking up BelAir100 System configuration details Access interfaces SNMP SSL SSH Traffic interfaces Ethernet System logs statistics BelAir100 System CLI Guide Using CLI the web interface or SNMP type interfaces to configure the radios Looking up BelAir100 radio configuration details Bel...

Page 112: ...r More Information On the Road and in the Field Table 14 More Information On the Road and in the Field When you are Use these documents In the field deploying a BelAir100 network Troubleshooting and in need of technical support Technical Support chapters found at the end of every BelAir technical document ...

Page 113: ...e support center at www support belairnetworks com 4 Finally if your issue is not resolved contact BelAir Networks 613 254 7070 1 877 BelAir1 235 2471 techsupport belairnetworks com Warranty and Limitations To review BelAir s product warranty refer to the chapter called Warranty and Limitations in the Installation Guide Troubleshooting The BelAir100 provides the following tools to determine the so...

Page 114: ...lowing severity critical major minor warning and information Displaying Active Alarms show alarms max_num_of_alarms type all dcomm eqpt sw qos env secu sys severity all critical major minor warning info This command allows you to display up to N active alarms filtered by alarm type or alarm severity If the alarm severity is to be specified then the alarm type must also be specified but can be spec...

Page 115: ...cal major minor warning info log_idx This command allows you to display up to the last N reported alarms filtered by alarm type or alarm severity If the alarm severity is to be specified then the alarm type must also be specified but can be specified as all if no filtering by type is desired The type and severity specifications can have multiple values separated by a vertical bar For example speci...

Page 116: ...owing example displays the next two most recent alarms system show alarm history 2 type all severity all 4 Displaying 5 alarm history entries Id Date Time UTC Severity Status Ignored Entity Type Description 4 2006 01 23 19 36 54 minor Set No scm eqpt SNTP server not available 3 2006 01 23 19 36 29 warning Set No brm3 eqpt Battery missing Example 3 In the following example only two alarms are displ...

Page 117: ...n have multiple values separated by a vertical bar For example specifying mask critical major minor means that all critical major and minor alarms generate SYSLOG and SNMP trap notifications provided they are not blocked by the alarm type mask Displaying the Alarm Mask show alarm mask This command displays the current alarm type and severity masks In the displayed masks any alarm type or severity ...

Page 118: ...Trigger condition System has lost contact with the SNTP server Severity Minor 7 Text Software download in progress Trigger condition User entered the upgrade command to start software upgrade Severity Warning 8 Text Software download failed Trigger condition A software download operation has failed Severity Warning 12 Text System management software started Trigger condition Management software ha...

Page 119: ...tive Severity Minor 23 Text Battery active voltage low Trigger condition Low battery voltage detected and main power has failed Severity Major 24 Text Battery charging voltage critically low Trigger condition Battery voltage has dropped below critical level while main power is still active Severity Minor 25 Text Battery active voltage critically low Trigger condition Battery voltage has dropped be...

Page 120: ...ger condition Detect an RAI signal from the n T1 interface Severity Major 34 Text T1 d RED link failure Trigger condition Any of the LOS LOF AIS or RAI condition detected Severity Major 46 Text Mesh link down Trigger condition One of the links in the multipoint to multipoint topology has lost connectivity Severity Info 49 Text Manual reboot Trigger condition User entered card reboot command instea...

Page 121: ...ystem Command Line Interface Guide Displaying the SYSLOG Configuration show syslog config This command displays the SYSLOG configuration Example show syslog config 51 Text Communication failure Trigger condition System has lost communication with a card Severity Critical 52 Text Link down Trigger condition One of the links in the star topology has lost connectivity Severity Critical 53 Text Link d...

Page 122: ...current CLI session for display as they are generated If you continue to use the current CLI session the SYSLOG messages are interleaved with regular command input and output This command affects only the current CLI session A new CLI session does not have this option enabled This feature allows the SYSLOG messages to be displayed in one CLI session while another CLI session is used for regular co...

Page 123: ...els Example cd syslog syslog loglevel error In the preceding example after the command is issued the unit generates error critical alert and emerg messages Enabling or Disabling Logging logging enable disable This command is only available if you are logged in as root This command enables or disables the logging feature Once enabled the BelAir100 sends the specified SYSLOG messages to the remote S...

Page 124: ...s and use the frames to maintain a loop free network BRM Backhaul Radio Module BSS Basic Service Set A set of 802 11 compliant stations that operate as a fully connected wireless network CIST Common and Internal Spanning Tree Client A device that uses the services of a wireless access point to connect to a network CLI Command Line Interface DHCP Dynamic Host Configuration Protocol IP Internet Prot...

Page 125: ...outing Table Manager SNMP Simple Network Management Protocol SNTP Simple Network Time Protocol SSID Service Set Identifier also referred to as Network Name or Id A unique identifier used to identify a radio network and which stations must use to be able to communicate with each other or to an access point TKIP Temporal Key Integrity Protocol an optional IEEE 802 11 function that offers frame trans...

Page 126: ...keys Unit part number located on the sticker affixed to the unit __________________________ Unit serial number located on the sticker affixed to the unit __________________________ Super user password ____________________________ System Name ______________ Location ____________ Contact _______________ Base MAC Address ______________ IP Address _____________Subnet ______________ Gateway ___________...

Page 127: ...2 ________________ 3 ________________ 4 ________________ ______________ Y or N Y or N ______________ 4 ________________ Y or N 1 ________________ 2 ________________ 3 ________________ 4 ________________ ______________ Y or N Y or N ______________ 5 ________________ Y or N 1 ________________ 2 ________________ 3 ________________ 4 ________________ ______________ Y or N Y or N ______________ 6 _____...

Page 128: ...SSID ____________________________ Phys Ch __________ Key Id Type Wep or TKIP Key Value 5 or 13 ASCII characters if WEP or 16 ASCII characters if TKIP 1 ____________________ _____________________________________________________________________ Key Id Type Wep or TKIP Key Value 5 or 13 ASCII characters if WEP or 16 ASCII characters if TKIP 1 ____________________ _____________________________________...

Page 129: ... have failed The Reset Dongle is used when there is no way of communicating to the unit Resetting to Factory Defaults with a CLI Command If you are logged in as root and have access to system commands you can reset the unit to the factory defaults CAUTION By performing the following procedure all local configuration data will be replaced by default factory settings You will not be able to recover ...

Page 130: ...re all local configuration data will be replaced by default factory settings You will not be able to recover any local configuration data To reset the BelAir100 configuration to factory defaults do the following steps 1 Ensure that the unit to be reset has been powered up at least 5 minutes 2 With a Phillips screwdriver remove the plastic cover of the BelAir100 See Figure 12 on page 131 There are ...

Page 131: ...t Dongle into the unit battery connector jack See Figure 13 Figure 13 Installing a Reset Dongle 4 Wait until the power indicator LED turns from green to amber indicating that the unit is rebooting Once the LED turns amber remove the Reset Dongle The default factory default configuration is activated after the reboot 5 Re install the cover removed in step 2 using the appropriate screws ...

Page 132: ...er Setting management IP address 10 1 1 10 24 Static sub network mask 255 255 255 0 management interface VLAN1 Table 18 Default Country of Operation Parameter Setting country us Table 19 Default System Identification Parameter Setting system name none system location none system contact none Table 20 Default Services Parameter Setting HTTP server enabled secure HTTP server enabled Telnet server en...

Page 133: ...11 mesh identifier BelAirNetworks privacy disabled encryption key 0x00000000000000000000000000000000 mesh point type multipoint mesh portal no traffic limit disabled Table 22 Default ARM Settings if equipped Parameter Setting physical channel number 11 receive antenna in use main receive antenna diversity disabled transmit power level 27 dBm beacon period 100 milliseconds RTS threshold 2347 fragme...

Page 134: ...sabled no encryption MSSID disabled SSID 1 BelAir Networks Access Radio Table 23 Default BRM Settings Parameter Setting mode disabled physical channel number BRM1 if equipped BRM2 if equipped 54 prim channel 0 sec channel 66 prim channel 0 sec channel SSID BRM1 if equipped BRM2 if equipped BelAir Backhaul Radio 1 BelAir Backhaul Radio 2 privacy disabled no encryption antenna selection external pee...

Page 135: ...iation response timeout 500 milliseconds Table 24 BRM Default Key Settings Key Number Type Key Value ASCII String 1 WEP 1234567890123 Table 23 Default BRM Settings Continued Parameter Setting Table 25 Default QoS Settings Parameter Setting Prioritization based on UP bits UP 1 and 2 to queue 0 lowest priority UP 0 and 3 to queue 1 UP 4 and 5 to queue 2 UP 6 and 7 to queue 3 highest priority Table 2...

Page 136: ...guration Terminal Set up The configuration terminal can be a desktop or laptop PC configured to communicate on the same IP sub network as the BelAir100 Required Equipment You need a no 2 Phillips screwdriver to access the unit s connectors If your unit is equipped with an electrical Ethernet interface you need a cross connect RJ45 Ethernet cable If your unit is equipped with an optical Ethernet in...

Page 137: ...nto the BelAir100 s Ethernet port and the other end into your configuration terminal If your unit has an optical Ethernet interface refer to Figure 16 and do the following sub steps a Carefully remove all caps and dust covers protecting the ends of the dual LC connector on the optical cable b Remove the cover protecting BelAir100 optical Ethernet port c Remove the dust protector on the BelAir100 d...

Page 138: ...ocument Number BDTM10001 A05 Standard BelAir100 User Guide Connecting to the Ethernet Interface Figure 16 Connection Setup for BelAir100 with an Optical Ethernet Interface Configuration Terminal Media Converter BelAir100 100 BASE TX 100 BASE FX ...

Page 139: ...NMP Interface 8 Integrating the BelAir100 with a Pre deployed NMS 9 BelAir100 Web Interface 10 Supported Web Browsers and Platforms 10 Accessing the Web Interface 10 Accessing the System Page with Secure HTTP or with HTTP 11 Command Line Interface Basics 12 Connecting to the BelAir100 12 Starting a CLI Session 13 Command Modes 14 Abbreviating Commands 15 Command History 16 Special CLI Keys 16 Help...

Page 140: ...bles 26 Configuring the System Date and Time 27 Displaying System Date and Time 27 Manual Date Configuration 27 Manual Time Configuration 27 Obtaining Time from a Time Server 28 Displaying Inventory and Status Parameters 28 Displaying Unit Inventory Information 28 Displaying BelAir100 Status Parameters 28 Saving and Restoring the BelAir100 Configuration 29 Local Back Up of the Configuration Databa...

Page 141: ...l 48 5 GHz P to P Links 49 2 4 GHz MP to MP Links 50 5 GHz MP to MP Links 50 5 GHz P to MP Links 50 Additional MP to MP Link Commands 51 Displaying MP Link Information 51 Enabling or Disabling MP Functionality 51 Managing Bandwidth 52 Displaying the Mesh Topology 52 Managing the Mesh Blacklist 53 Doing a Mesh Survey 54 Mesh Portal Attribute 55 Managing RSTP BPDUs 55 Managing the Mesh Accept List 5...

Page 142: ... Backhaul Radios 70 Controlling Inter client Communication 71 Determining the MAC Address of the Internet gateway 71 Disabling or Enabling Access Radio Wireless Bridging 72 Disabling Inter AP Wireless Client Communication 72 Detecting Rogue Access Points 74 Managing Access Radio SSIDs 76 Adding or Modifying an SSID 76 Managing Basic SSIDs 78 Deleting a SSID 78 Displaying the List of Available SSID...

Page 143: ...g or Disabling Wireless Multi media 93 Managing the QoS Priority Scheme 93 Managing the QoS Mapping Scheme 93 Resetting the QoS Configuration 94 Resetting the QoS Configuration for a VLAN 95 Displaying a Summary of QoS Settings 95 Displaying the VLAN QoS Settings 95 Displaying the Prioritization Settings 96 BelAir100 Statistics 97 Radio Statistics 97 Wireless Communication Statistics 97 Wireless S...

Page 144: ...ns 113 Troubleshooting 113 Alarm and Event Reporting 113 Alarm Types and Severity 114 Displaying Active Alarms 114 Displaying the Alarm History 115 Setting the Alarm Type Mask 116 Setting the Alarm Severity Mask 117 Displaying the Alarm Mask 117 Alarm Definitions 117 Using SYSLOG 121 Displaying the SYSLOG Configuration 121 Configuring the SYSLOG Server IP Address 122 Sending SYSLOG Messages to a C...

Page 145: ...le Block Diagram 6 Figure 4 BelAir100 Layer 2 View Typical Configuration 7 Figure 5 Wireless Mobility using L2TP 87 Figure 6 Active and Standby Software Loads 99 Figure 7 Software Upgrade Step 3 Downloading the New Software Load101 Figure 8 Software Upgrade Step 7 Commit the Software Load 103 Figure 9 Backing Out from an Uncommitted Software Upgrade 104 Figure 10 Simple BelAir200 and BelAir100 Net...

Page 146: ...ng 92 Table 11 UP and DSCP Value to Priority Queue Processing 94 Table 12 More Information Getting Started 110 Table 13 More Information Working Out Details 111 Table 14 More Information On the Road and in the Field 112 Table 15 BelAir100 Alarm Types 114 Table 16 BelAir User Interface Alarms 117 Table 17 Default OAM IP Addressing 132 Table 18 Default Country of Operation 132 Table 19 Default Syste...

Page 147: ... 613 254 7070 BelAir100 User Guide June 30 2006 Confidential Page 147 of 147 Document Number BDTM10001 A05 Standard General Information info belairnetworks com Sales sales belairnetworks com Technical Support techsupport belairnetworks com Visit us on the web at www belairnetworks com 147 ...

Reviews: