background image

16

Introduction

SNMP Management

In addition to the HTTP and the CLI interfaces, you can also manage and configure an AP using the Simple Network 
Management Protocol (SNMP). Note that this requires an SNMP manager program, like HP Openview or Castlerock’s 
SNMPc. 
The AP supports several Management Information Base (MIB) files that describe the parameters that can be viewed 
and/or configured over SNMP:

MIB-II (RFC 1213)

Bridge MIB (RFC 1493)

Ethernet-like MIB (RFC 1643)

802.11 MIB

ORiNOCO Enterprise MIB

Proxim provides these MIB files on the CD included with each Access Point. You need to compile one or more of the 
above MIBs into your SNMP program’s database before you can manage an Access Point using SNMP. Refer to the 
documentation that came with your SNMP manager for instructions on how to compile MIBs.
The Enterprise MIB defines the read and read-write objects that can be viewed or configured using SNMP. These 
objects correspond to most of the settings and statistics that are available with the other management interfaces. Refer 
to the Enterprise MIB for more information; the MIB can be opened with any text editor, such as Microsoft Word, 
Notepad, or WordPad.

SNMPv3 Secure Management

SNMPv3 is one of two available secure management options on the AP; the other secure management option is 
HTTPS (HTTP connection over Secure Socket Layer). SNMPv3 is based on the existing SNMP framework, but 
addresses security requirements for device and network management. 
The security threats addressed by Secure Management are:

Modification of information

: An entity could alter an in-transit message generated by an authorized entity in such a 

way as to effect unauthorized management operations, including the setting of object values.  The essence of this 
threat is that an unauthorized entity could change any management parameter, including those related to 
configuration, operations, and accounting

Masquerade

: Management operations that are not authorized for some entity may be attempted by that entity by 

assuming the identity of an authorized entity. 

Message stream modification

: SNMP is designed to operate over a connectionless transport protocol.  There is a 

threat that SNMP messages could be reordered, delayed, or replayed (duplicated) to effect unauthorized 
management operations.  For example, a message to reboot a device could be copied and replayed later. 

Disclosure

: An entity could observe exchanges between a manager and an agent and thereby could learn of 

notifiable events and the values of managed objects.  For example, the observation of a set command that 
changes passwords would enable an attacker to learn the new passwords.

To address the security threats listed above, SNMPv3 provides the following when secure management is enabled:

Authentication: Provides data integrity and data origin authentication.

Privacy (a.k.a Encryption): Protects against disclosure of message payload.

Access Control: Controls and authorizes access to managed objects

The default SNMPv3 username is 

administrator

, with SHA authentication, and DES privacy protocol.

NOTE

The remainder of this guide describes how to configure an AP using the HTTP Web interface or the CLI 
interface. For information on how to manage devices using SNMP, refer to the documentation that came with 
your SNMP program. Also, refer to the MIB files for information on the parameters available via SNMP.

Summary of Contents for ORiNOCO AP-700

Page 1: ...ORiNOCO AP 700 User Guide...

Page 2: ...1998 2002 The OpenSSL Project All rights reserved The names OpenSSL Toolkit and OpenSSL Project must not be used to refer to endorse or promote the products or for any other purpose related to the pro...

Page 3: ...Hardware Description 17 Dual Band Range Extender Antenna Description 18 Antenna Diversity Options 18 Prerequisites 18 Product Package 19 System Requirements 19 Hardware Installation 20 Cabling the AP...

Page 4: ...the AP Using the HTTP HTTPS Interface 37 System 39 Dynamic DNS Support 39 Access Point System Naming Convention 39 Network 40 IP Configuration 40 DHCP Server 41 DHCP Relay Agent 42 DHCP Server IP Add...

Page 5: ...ng 66 Ethernet Protocol 66 Static MAC 67 Static MAC Filter Examples 68 Advanced 69 TCP UDP Port 70 Adding TCP UDP Port Filters 70 Editing TCP UDP Port Filters 70 Alarms 71 Groups 71 Severity Levels 73...

Page 6: ...n 94 Adding or Modifying a VLAN 94 Security Profiles 95 Configuring Security Profiles 95 Rogue Scan 99 Multi Band Scanning 99 Continuous Scanning Mode 99 Background Scanning Mode 99 RogueScan Data Col...

Page 7: ...122 HTTP File Transfer Guidelines 122 Image Error Checking during File Transfer 122 Update AP via TFTP 123 Update AP via HTTP 124 Retrieve File via TFTP 126 Retrieve File via HTTP 127 Reboot 129 Reset...

Page 8: ...Reset to Factory Default Procedure 137 Forced Reload Procedure 137 Download a New Image Using ScanTool 138 Download a New Image Using the Bootloader CLI 139 Setting IP Address using Serial Port 140 Ha...

Page 9: ...asswords 155 Set Network Names for the Wireless Interface 156 Enable 802 11d Support and Set the Country Code 157 Enable and Configure TX Power Control for the Wireless Interface s 157 Configure SSID...

Page 10: ...less Distribution System WDS Security Table Parameters 176 Ethernet Interface Parameters 177 Management Parameters 177 Secure Management Parameters 177 SNMP Parameters 177 HTTP web browser Parameters...

Page 11: ...tax 190 Sample CLI Batch File 190 Reboot Behavior 191 CLI Batch File Error Log 191 B ASCII Character Chart 192 C Specifications 193 Software Features 193 Number of Stations per BSS 193 Management Func...

Page 12: ...12 802 11g Channel Frequencies 198 Wireless Communication Range 199 D Technical Support 200...

Page 13: ...or loss of data and tells you how to avoid the problem Introduction to Wireless Networking An AP extends the capability of an existing Ethernet network to devices on a wireless network Wireless device...

Page 14: ...ave matching security settings to communicate The Access Points cells should overlap to ensure that there are no gaps in coverage and to ensure that the roaming client will always have a connection av...

Page 15: ...P HTTPS Interface Command Line Interface SNMP Management HTTP HTTPS Interface The HTTP Interface Web browser Interface provides easy access to configuration settings and network statistics from any co...

Page 16: ...nsit message generated by an authorized entity in such a way as to effect unauthorized management operations including the setting of object values The essence of this threat is that an unauthorized e...

Page 17: ...dded radio an 802 11a b g radio that supports the following operational modes 802 11b only mode 802 11g only mode 802 11bg mode 802 11a only mode The AP 700 can be powered through either Active Ethern...

Page 18: ...network HTTP Password Each Access Point requires a read write password to access the web interface The default password is public CLI Password Each Access Point requires a read write password to acces...

Page 19: ...tact your reseller or Technical Support see Technical Support for contact information System Requirements To begin using an AP you must have the following minimum requirements A 10Base T Ethernet or 1...

Page 20: ...ct cables to the AP 700 as follows 1 Plug the power cord into the power jack the left port and connect the unit to an AC power outlet 100 240V 50 60Hz 2 If using active Ethernet connect power to the u...

Page 21: ...f the security cover into the hole on the rear panel of the AP 700 to the left of the connectors 2 Use two screws to screw the right side of the security cover to the RS 232 screw holes on the rear pa...

Page 22: ...edures to mount the Dual Band REA to a wall or ceiling and to install it on the AP 700 Wall Mount Installation Perform the following steps to wall mount the Dual Band REA 1 Detach the Antenna Body fro...

Page 23: ...the T Bar and adjust swivel it to lock on the T Bar Attaching Antenna s to the AP 700 Perform the following steps to attach a Dual Band REA to the AP 700 1 Press down near the center of the compartme...

Page 24: ...ectors in the AP 700 labeled 1 through 2 When connecting one REA to the radio use connector 1 The second REA for the radio should be connected to connector 2 Figure 2 6 AP 700 Antenna Connectors 3 If...

Page 25: ...st Configuration Protocol DHCP server during boot up If your network contains a DHCP server you can run ScanTool to find out what IP address the AP has been assigned If your network does not contain a...

Page 26: ...the Scan List click the Rescan button to update the display If the unit still does not appear in the list see Troubleshooting for suggestions Note that after rebooting an Access Point it may take up...

Page 27: ...lly The Setup Wizard provides step by step instructions for how to configure the Access Point s basic operating parameter such as Network Name IP parameters system parameters and management passwords...

Page 28: ...d side of the screen Click the link that corresponds to the parameters you want to configure to be taken to that particular configuration screen Note that clicking a link in the navigation panel will...

Page 29: ...Channel Select is disabled you can specify the Access Point s channel If you decide to manually set the unit s channel ensure that nearby devices do not use the same frequency Available Channels vary...

Page 30: ...or configuration and AP Image upgrades The Solarwinds TFTP server software is located on the ORiNOCO AP Installation CD ROM You can also download the latest TFTP software from Solarwind s Web site at...

Page 31: ...s downloaded to the Access Point 6 When the download is complete type reboot 0 and press Enter NOTE See Command Line Interface CLI for more information Additional Hardware Features Installing the AP i...

Page 32: ...oint draws power from Active Ethernet Also see Hardware Specifications NOTE The AP s 802 3af compliant Active Ethernet module is backwards compatible with all ORiNOCO Active Ethernet hubs that do not...

Page 33: ...33 Getting Started Blinking Amber The AP is reloading n a n a Solid Red Power On Self Test POST running n a n a Blinking Red Rebooting n a n a...

Page 34: ...nced Configuration for information on configuration options that are available within the Access Point s HTTP interface See Monitor Information for information on the statistics displayed within the A...

Page 35: ...r 2 If necessary disable the Internet proxy settings For Internet Explorer users follow these steps Select Tools Internet Options Click the Connections tab Click LAN Settings If necessary remove the c...

Page 36: ...en Each section of the System Status screen provides the following information System Status This area provides system level information including the unit s IP address and contact information See Sys...

Page 37: ...urity features such as MAC Access Control WPA WEP Encryption and 802 1x Configure Rogue Scan and define the Scan Cycle Time Configure up to 16 VLAN and SSID pairs and assign Security and RADIUS Profil...

Reviews: