background image

Command Line Interface

6-48

6

interface wireless

This command enters wireless interface configuration mode.

Syntax

interface

 

wireless a

a

 - 802.11a radio interface.

Default Setting 

None

Command Mode 

Global Configuration 

Example 

To specify the wireless interface, enter the following command:

description 

This command adds a description to a the wireless interface. Use the 

no

 form to 

remove the description.

Syntax

description

 <

string

>

no description

string

 - Comment or a description for this interface. 

(Range: 1-80 characters)

Default Setting 

None

Command Mode 

Interface Configuration (Wireless)

Example

Outdoor Bridge(config)#interface wireless a
Outdoor Bridge(if-wireless a)#

Outdoor Bridge(config)#interface wireless a
Outdoor Bridge(if-wireless a)#description RD-AP#3
Outdoor Bridge(if-wireless a)#

Summary of Contents for WB2011

Page 1: ...User Guide...

Page 2: ......

Page 3: ...User Guide Guide Outdoor 5 GHz Wireless Bridge IEEE 802 11a Wireless Bridge...

Page 4: ...WB2011 F1 1 1 0 E102004 R01...

Page 5: ...strap or take other suitable measures to prevent electrostatic discharge when handling this equipment 2 When connecting this device to a power outlet connect the field ground lead on the tri pole powe...

Page 6: ...y This unit cannot be powered from IT supplies If your supplies are of IT type this unit must be powered by 230 V 2P T via an isolation transformer ratio 1 1 with the secondary connection point labell...

Page 7: ...t P rou uniquement Ce groupe ne peut pas tre aliment par un dispositif imp dance la terre Si vos alimentations sont du type imp dance la terre ce groupe doit tre aliment par une tension de 230 V 2 P T...

Page 8: ...ben Die Netzsteckdose mu in der N he des Ger ts und leicht zug nglich sein Die Stromversorgung des Ger ts kann nur durch Herausziehen des Ger tenetzkabels aus der Netzsteckdose unterbrochen werden Der...

Page 9: ...rence 2 5 Weather Conditions 2 5 Ethernet Cabling 2 6 Grounding 2 6 Chapter 3 Hardware Installation 3 1 Testing Basic Link Operation 3 1 Mount the Unit 3 1 Using the Pole Mounting Bracket 3 1 Using th...

Page 10: ...sing the CLI 6 1 Telnet Connection 6 1 Entering Commands 6 2 Keywords and Arguments 6 2 Minimum Abbreviation 6 2 Command Completion 6 2 Getting Help on Commands 6 2 Partial Keyword Lookup 6 3 Negating...

Page 11: ...p 6 22 SNMP Commands 6 23 snmp server community 6 23 snmp server contact 6 24 snmp server enable server 6 25 snmp server host 6 25 snmp server location 6 26 show snmp 6 26 Flash File Commands 6 27 boo...

Page 12: ...ip dhcp 6 45 shutdown 6 46 show interface ethernet 6 46 Wireless Interface Commands 6 47 interface wireless 6 48 description 6 48 speed 6 49 channel 6 49 turbo 6 50 beacon interval 6 50 dtim period 6...

Page 13: ...Cables and Pinouts C 1 Twisted Pair Cable Assignments C 1 10 100BASE TX Pin Assignments C 1 Straight Through Wiring C 2 Crossover Wiring C 2 8 Pin DIN Connector Pinout C 3 8 Pin DIN to RJ 45 Cable Wir...

Page 14: ...Contents x...

Page 15: ...a wired link may be difficult or expensive to deploy The wireless connection provides data rates of up to 108 Mbps In addition both wireless bridge models offer full network management capabilities th...

Page 16: ...n including the original packing materials Use them again to repack the product in case there is a need to return it Hardware Description Component Description Ethernet Port Also Supplies Power RSSI C...

Page 17: ...ppears as an Ethernet node and performs a bridging function by moving packets from the wired LAN to the remote end of the wireless bridge link Power Injector Module The wireless bridge receives power...

Page 18: ...or outside with the wireless bridge unit Receive Signal Strength Indicator RSSI BNC Connector The RSSI connector provides an output voltage that is proportional to the received radio signal strength A...

Page 19: ...s A point to point configuration can provide a moderate data rate 36 Mbps link over a long range Point to Multipoint Configuration A WB2011 wireless bridge can use an omnidirectional antenna to connec...

Page 20: ...s Ethernet cable connection to the power injector module Includes wall and pole mount bracket kits Security through 64 128 152 bit Wired Equivalent Protection WEP or 128 bit Advanced Encryption Standa...

Page 21: ...iguration from the Exec level prompt Feature Parameter Default Identification System Name Outdoor Bridge Administration User Name admin Password null General HTTP Server Enabled HTTP Server Port 80 TC...

Page 22: ...802 11a Status Enabled Turbo Mode Disabled Radio Channel Default to first channel Auto Channel Select Enabled Transmit Power Full Maximum Data Rate 54 Mbps Beacon Interval 100 TUs Data Beacon Rate DT...

Page 23: ...and information for planning your wireless bridge links Note The planning and installation of the wireless bridge requires professional personnel that are trained in the installation of radio transmit...

Page 24: ...the first Fresnel Zone of the radio link For a radio link not to be affected by obstacles along its path no object including the ground must intrude within 60 of the first Fresnel Zone The following...

Page 25: ...nimum height required depends on the distance of the link obstacles that may be in the path topology of the terrain and the curvature of the earth for links over 3 miles For long distance links a mast...

Page 26: ...evation that is 12 m 39 ft higher than bulding A To mount an anntena at the required height on building B a mast or pole of only 1 3 m 4 3 ft is needed Warning Never construct a radio mast pole or tow...

Page 27: ...e is an important part of wireless link planning Interference is caused by other radio transmissions using the same or an adjacent channel frequency You should first scan your proposed site using a sp...

Page 28: ...gnificant effect on the radio signal However a build up of snow or ice on antennas may cause the link to fail In this case the snow or ice has to be cleared from the antennas to restore operation of t...

Page 29: ...the wireless bridge involves these steps 1 Mount the unit on a wall pole mast or tower using the appropriate mounting bracket 2 If using an external antenna mount the antenna nearby on the same suppor...

Page 30: ...cket may need to be rotated around the pole during the alignment process 3 Use the included nuts to tightly secure the wireless bridge to the bracket Be sure to take account of the antenna polarizatio...

Page 31: ...27 cm wide can be threaded through the main part of the bracket to secure it to a larger diameter pole without using the U shaped part of the bracket This method is illustrated in the following figure...

Page 32: ...ing a WB2011 Master bridge unit in a point to multipoint configuration you need to mount the external antenna and connect it to the bridge Perform these steps 1 Mount the external antenna to the same...

Page 33: ...ssors Connect the Power Injector To connect the wireless bridge to a power source Caution Do not install the power injector outdoors The unit is for indoor installation only Note The wireless bridge s...

Page 34: ...bridge uses an omnidirectional antenna which does not require alignment but Slave bridges still need to be correctly aligned with the Master bridge antennna Point to Point Configurations In a point t...

Page 35: ...it is receiving the strongest signal from the central main lobe To align the antennas in the link using the RSSI output voltage start with one antenna fixed and then perform the following procedure on...

Page 36: ...e may not be a central lobe peak in the voltage because vertical alignment is too far off only two similar peaks for the side lobes are detected In this case fix the antenna halfway between the two pe...

Page 37: ...ion using a PC that has IP settings compatible with this subnet for example 192 168 1 2 and connecting it directly to the wireless bridge When the basic configuration is completed you can set new IP s...

Page 38: ...o use the CLI to assign an IP address that is compatible with your network Type configure to enter configuration mode then type interface ethernet to access the Ethernet interface configuration mode F...

Page 39: ...on IP configuration and basic WEP encryption for wireless security The wireless bridge can be managed by any computer using a web browser Internet Explorer 5 0 or above or Netscape Navigator 6 2 or ab...

Page 40: ...Initial Configuration 4 4 4 Launching the Setup Wizard To perform initial configuration click Setup Wizard on the home page then click on the Next button to start the process...

Page 41: ...ode with a data rate of up to 108 Mbps Normal mode supports 13 channels Turbo mode supports only 5 channels Default Disable 802 11a Radio Channel Set the operating radio channel number Default 56ch 5...

Page 42: ...or a gateway that can route traffic between these segments Then enter the IP address for the primary and secondary Domain Name Servers DNS servers to be used for host name to IP address resolution DHC...

Page 43: ...Using the Web based Management Setup Wizard 4 7 4 3 Security Enable Wired Equivalent Privacy WEP encryption and set an encryption key 4 Click Finish 5 Click the OK button to restart the access point...

Page 44: ...Initial Configuration 4 8 4...

Page 45: ...e home page displays click on Advanced Setup The following page will display The information in this chapter is organized to reflect the structure of the web screens for easy reference However it is r...

Page 46: ...es software from local file FTP or TFTP server resets configuration settings to factory defaults and resets the wireless bridge 5 10 System Log Controls logging of error messages sets the system clock...

Page 47: ...eless bridge with an IP address expands your ability to manage the wireless bridge A number of wireless bridge features depend on IP addressing to operate Note You can use the web browser interface to...

Page 48: ...t Enable Select this option to obtain the IP settings for the wireless bridge from a DHCP Dynamic Host Configuration Protocol server The IP address subnet mask default gateway and Domain Name Server D...

Page 49: ...ip dhcp command to enable the DHCP client or no ip dhcp to disable it To manually configure an address specify the new IP address subnet mask and default gateway using the ip address command To specif...

Page 50: ...has an unknown VLAN ID or no VLAN tag is dropped When VLAN support is disabled the wireless bridge does not tag traffic passing to the wired network and ignores the VLAN tags on any received frames N...

Page 51: ...SNMP from a management station To implement SNMP management the wireless bridge must have an IP address and subnet mask configured either manually or dynamically Once an IP address has been configured...

Page 52: ...th 23 characters case sensitive Default public Community Name Read Write Defines the SNMP community access string that has read write access Authorized management stations are able to both retrieve an...

Page 53: ...he current SNMP settings use the show snmp command Outdoor Bridge config snmp server enable server 6 25 Outdoor Bridge config snmp server community alpha rw 6 23 Outdoor Bridge config snmp server comm...

Page 54: ...If the user name and password are not configured then anyone having access to the wireless bridge may be able to compromise wireless bridge and network security Username The name of the user The defau...

Page 55: ...ore upgrading your wireless bridge software it is recommended to save a copy of the current configuration file See copy on page 6 28 for information on saving the configuration file to a TFTP or FTP s...

Page 56: ...tter of the file name should not be a period and the maximum length for file names on the FTP TFTP server is 255 characters or 32 characters for files on the wireless bridge Valid characters A Z a z 0...

Page 57: ...synchronized with a time server so that all the messages sent to the Syslog server are stamped with the correct time and date Outdoor Bridge copy tftp file 6 28 1 Application image 2 Config file 3 Boo...

Page 58: ...wireless bridge error log can be viewed using the Event Logs window in the Status section page 5 36 The Event Logs window displays the last 128 messages logged in chronological order from the newest...

Page 59: ...pecified Primary Server The IP address of an SNTP or NTP time server that the wireless bridge attempts to poll for a time update Secondary Server The IP address of a secondary SNTP or NTP time server...

Page 60: ...show sntp command CLI Commands for the System Clock The following example shows how to manually set the system time when SNTP server support is disabled on the wireless bridge Outdoor Bridge config s...

Page 61: ...u need to specify the MAC addresses of all the Slave bridge units in the network Mode The wireless bridge software operates in a Slave or Master mode depending on the unit hardware the mode is not con...

Page 62: ...nown devices in the connected networks All the addresses are learned by monitoring traffic received by the wireless bridge and are stored in a dynamic MAC address table This information is then used t...

Page 63: ...r entries in the dynamic address table Ethernet The time after which a learned Ethernet port entry is discarded Range 60 1800 seconds Default 100 seconds Wireless 802 11a The time after which a learne...

Page 64: ...dge config exit Outdoor Bridge show bridge 6 39 Bridge Information Media Type Age Time sec EtherNet 300 WLAN_A 1000 Bridge Id 32768 037fbef192 Root Bridge Id 32768 01f47483e2 Root Path Cost 25 Root Po...

Page 65: ...t device to the root device Then it selects a designated bridging device from each LAN which incurs the lowest path cost when forwarding a packet from that LAN to the root device All ports connected t...

Page 66: ...ould receive configuration messages at regular intervals Any port that ages out STP information provided in the last configuration message becomes the designated port for the attached LAN If it is a r...

Page 67: ...s option if an interface is attached to a LAN segment that is at the end of a bridged LAN or to an end node Since end nodes cannot cause forwarding loops they can pass directly through to the spanning...

Page 68: ...39 Outdoor Bridge config bridge stp port priority 5 0 6 37 Outdoor Bridge config bridge stp port path cost 5 50 6 37 Outdoor Bridge config no bridge stp port portfast 5 6 38 Outdoor Bridge config end...

Page 69: ...Enable Enables radio communications on the wireless bridge Default Enable Description Adds a comment or description to the wireless interface Range 1 80 characters Secure Access When enabled the bridg...

Page 70: ...rea and maximum supported clients You also have to ensure that high power signals do not interfere with the operation of other radio devices in the service area Options 100 50 25 12 minimum 6 25 Defau...

Page 71: ...xceeds the RTS threshold the RTS CTS Request to Send Clear to Send mechanism will be enabled The wireless bridges contending for the medium may not be aware of each other The RTS CTS mechanism can sol...

Page 72: ...een wireless bridge units WEP uses static shared keys fixed length hexadecimal or alphanumeric strings that are manually configured on all bridges in the wireless bridge network Outdoor Bridge show in...

Page 73: ...length Note that the same size of WEP encryption key must be set on all bridge units in the wireless network Default 128 Bit Key Type Select the preferred method of entering WEP encryption keys on th...

Page 74: ...a different key to be defined for each wireless bridge link in the network Configuring AES encryption keys on the wireless bridge provides far more robust security than using WEP Also a unique AES key...

Page 75: ...commands Outdoor Bridge config interface wireless a 6 43 Enter Wireless configuration commands one per line Outdoor Bridge if wireless a encryption wep 128 6 53 Outdoor Bridge if wireless a key wep 1...

Page 76: ...iguration commands one per line Outdoor Bridge if wireless a encryption wdsaes alphanumeric 6 53 Outdoor Bridge if wireless a key wdsaes 1 agoodsecretkey 6 54 Outdoor Bridge if wireless a exit Outdoor...

Page 77: ...management agent has been up MAC Address The physical layer address for this device System Name Name assigned to this system System Contact Administrator responsible for the system System Mode Indicat...

Page 78: ...d for data encryption Radio Authentication Type Shows the bridge is set as an open system CLI Commands for Displaying System Settings To view the current wireless bridge system settings use the show s...

Page 79: ...ic methods of authentication supported for 802 11 wireless networks are open system and shared key Open system authentication accepts any client attempting to connect to the wireless bridge without ve...

Page 80: ...ociated with this message For a description of the various levels see logging level on page 5 13 Event Message The content of the log message CLI Commands for Displaying the Event Logs From the global...

Page 81: ...ortion 192 168 1 and a host portion 1 To access the wireless bridge through a Telnet session you must first set the IP address for the wireless bridge and set the default gateway if you are managing t...

Page 82: ...inimum Abbreviation The CLI will accept a minimum number of characters that uniquely identify a command For example the command configure can be entered as con If an entry is ambiguous the system will...

Page 83: ...uide describes the negation effect for all applicable commands Using Command History The CLI maintains a history of commands that have been entered You can scroll back through the history of commands...

Page 84: ...e Configuration Commands Configuration commands are used to modify wireless bridge settings These commands modify the running configuration and are saved in memory The configuration commands are organ...

Page 85: ...essing Outdoor Bridge config interface ethernet Outdoor Bridge if ethernet Keystroke Function Ctrl A Shifts cursor to start of command line Ctrl B Shifts cursor to the left one character Ctrl C Termin...

Page 86: ...configuration files 6 27 WDS Configures the Wireless Distribution System forwarding table 6 30 Bridge Configures MAC address table aging time settings and spanning tree parameters 6 33 Filtering Filt...

Page 87: ...Setting None Command Mode Exec Example Related Commands end 6 7 end This command returns to the previous configuration mode Default Setting None Command Mode Global Configuration Interface Configurat...

Page 88: ...reached The following are some results of the ping command Normal response The normal response occurs in one to ten seconds depending on network traffic Destination does not respond If the host does...

Page 89: ...s run the Power On Self Test Example This example shows how to reset the system show history This command shows the contents of the command history buffer Default Setting None Command Mode Exec Comman...

Page 90: ...or correct radio operation Exec 6 11 Device Designation prompt Customizes the command line prompt GC 6 12 system name Specifies the host name for the wireless bridge GC 6 12 snmp server contact Sets t...

Page 91: ...urg LU Slovak Republic SK Azerbaijan AZ Georgia GE Macao MO Slovenia SI Bahrain BH Germany DE Macedonia MK South Africa ZA Belarus BY Greece GR Malaysia MY Spain ES Belgium BE Guatemala GT Mexico MX S...

Page 92: ...ompt This command customizes the CLI prompt Use the no form to restore the default prompt Syntax prompt string no prompt string Any alphanumeric string to use for the CLI prompt Maximum length 255 cha...

Page 93: ...Mode Global Configuration Example password After initially logging onto the system you should set the password Remember to record it in a safe place Use the no form to reset the default password Synt...

Page 94: ...g 80 Command Mode Global Configuration Example Related Commands ip http server 6 14 ip http server This command allows this device to be monitored or configured from a browser Use the no form to disab...

Page 95: ...dge show system System Information Serial Number 0000000005 System Up time 0 days 2 hours 27 minutes 19 seconds System Name Outdoor Bridge System Location System Contact Contact System Country Code US...

Page 96: ...y You can use the logging level command to control the type of error messages that are stored in memory Example Command Function Mode Page logging on Controls logging of error messages GC 6 16 logging...

Page 97: ...cters host_ip_address The IP address of a syslog server Default Setting None Command Mode Global Configuration Example logging console This command initiates logging of error messages to the console U...

Page 98: ...ity used by the syslog server to dispatch log messages to an appropriate service Range 16 23 Default Setting 16 Command Mode Global Configuration Level Argument Description Emergency System unusable A...

Page 99: ...utdoor Bridge config logging facility 19 Outdoor Bridge config Outdoor Bridge show logging Logging Information Syslog State Disabled Logging Host State Enabled Logging Console State Disabled Server Do...

Page 100: ...ntp server enable command the sntp server ip command specifies the time servers from which the wireless bridge polls for time updates The wireless bridge will poll the time servers in the order specif...

Page 101: ...14 00 January 1 1970 Command Mode Global Configuration Example This example sets the system clock to 17 37 June 19 2003 Related Commands sntp server enable 6 20 sntp server daylight saving This comma...

Page 102: ...the local time zone relative to the Coordinated Universal Time UTC formerly Greenwich Mean Time or GMT based on the earth s prime meridian zero degrees longitude To display a time corresponding to you...

Page 103: ...e only able to retrieve MIB objects rw Specifies read write access Authorized management stations are able to both retrieve and modify MIB objects Outdoor Bridge show sntp SNTP Information Service Sta...

Page 104: ...ption the default is read only Example snmp server contact This command sets the system contact string Use the no form to remove the system contact information Syntax snmp server contact string no snm...

Page 105: ...r host 6 25 snmp server host This command specifies the recipient of an SNMP notification Use the no form to remove the specified host Syntax snmp server host host_ip_address host_name community strin...

Page 106: ...g Use the no form to remove the location string Syntax snmp server location text no snmp server location text String that describes the system location Maximum length 20 characters Default Setting Non...

Page 107: ...mum length for file names is 32 characters Valid characters A Z a z 0 9 _ If the file contains an error it cannot be set as the default file Outdoor Bridge show snmp SNMP Information Service State Ena...

Page 108: ...to from a flash memory file config Keyword that allows you to upload the configuration file from flash memory Default Setting None Command Mode Exec Command Usage The system prompts for data required...

Page 109: ...les in flash memory and the one used to boot the wireless bridge is deleted be sure you first use the bootfile command to update the application image file booted at startup before you reboot the wire...

Page 110: ...ng table Column Heading Description File Name The name of the file Type 2 Operation Code and 5 Configuration file File Size The length of the file in bytes Outdoor Bridge dir zz img bin 1099676 dflt i...

Page 111: ...ration Command Usage You can only configure one MAC address per wireless port ID The wireless MAC address for each bridge unit is printed on the label on the back of the unit Example wds enable This c...

Page 112: ...ENABLE 00 1A 2B 3C 4D 5E 03 DISABLE 00 01 02 03 04 05 04 ENABLE 00 0E 87 3B 60 51 05 DISABLE 00 00 00 00 00 00 06 DISABLE 00 00 00 00 00 00 07 DISABLE 00 00 00 00 00 00 08 DISABLE 00 00 00 00 00 00 0...

Page 113: ...e bridge timeout Sets the aging time for the address table GC 6 33 bridge stp bridge spanning tree Enables the spanning tree protocol for the bridge GC 6 34 bridge stp bridge forward time Configures t...

Page 114: ...nt switch bridge or router in your network to ensure that only one route exists between any two stations on the network and provide backup links which automatically take over when a primary link goes...

Page 115: ...time time no bridge stp bridge hello time time Time in seconds Range 1 10 seconds The maximum value is the lower of 10 or max age 2 1 Default Setting 2 seconds Command Mode Global Configuration Comma...

Page 116: ...k Example bridge stp bridge priority Use this command to configure the spanning tree priority globally for the wireless bridge Use the no form to restore the default Syntax bridge stp bridge priority...

Page 117: ...anning Tree Protocol to determine the best path between devices Therefore lower values should be assigned to ports attached to faster media and higher values assigned to ports with slower media Path c...

Page 118: ...wireless bridge Range 0 Ethernet interface 1 16 wireless interface Default Setting Disabled Command Mode Global Configuration Command Usage This command is used to enable disable the fast spanning tre...

Page 119: ...panning disabled port port Specifies the port number on the wireless bridge Range 0 Ethernet interface 1 16 wireless interface Default Setting Enabled Command Mode Global Configuration Example This ex...

Page 120: ...ridge Id 32768 037fbef192 Root Bridge Id 32768 01f47483e2 Root Path Cost 25 Root Port Id 0 Bridge Status Enabled Bridge Priority 32768 Bridge Hello Time 2 Seconds Bridge Maximum Age 20 Seconds Bridge...

Page 121: ...to be filtered Example Related Commands filter ethernet type protocol 6 41 filter ethernet type protocol This command sets a filter for a specific Ethernet type Use the no form to disable filtering f...

Page 122: ...ering based on the filtering table Example Related Commands filter ethernet type enable 6 41 show filters This command shows the filter options and protocol entries in the filter table Command Mode Ex...

Page 123: ...ess dns secondary server server address primary server Primary server used for name resolution secondary server Secondary server used for name resolution server address IP address of domain name serve...

Page 124: ...tting IP address 192 168 1 1 Netmask 255 255 255 0 Command Mode Interface Configuration Ethernet Command Usage DHCP is enabled by default To manually configure a new IP address you must first disable...

Page 125: ...ver using this command When you use this command the wireless bridge will begin broadcasting DHCP client requests The current IP address i e default or manually configured address will continue to be...

Page 126: ...isable the Ethernet port due to abnormal behavior e g excessive collisions and reenable it after the problem has been resolved You may also want to disable the Ethernet port for security reasons Examp...

Page 127: ...W 6 50 beacon interval Configures the rate at which beacon signals are transmitted from the wireless bridge IC W 6 50 dtim period Configures the rate at which stations in sleep mode must wake up to r...

Page 128: ...iption This command adds a description to a the wireless interface Use the no form to remove the description Syntax description string no description string Comment or a description for this interface...

Page 129: ...radio channel through which the local wireless bridge communicates with remote bridges Syntax channel channel auto channel Manually sets the radio channel used for communications with remote bridges R...

Page 130: ...a channel bandwidth of 20 MHz and supports the maximum number of channels permitted by local regulations e g 11 channels for the United States In Turbo Mode the channel bandwidth is increased to 40 M...

Page 131: ...rds broadcast multicast traffic This parameter is necessary to wake up remote bridges that are using Power Save mode The DTIM is the interval between two synchronous frames with broadcast multicast in...

Page 132: ...ame size If there is significant interference present or collisions due to high network utilization try setting the fragment size to send smaller fragments This will speed up the retransmission of sma...

Page 133: ...the no form to disable encryption Syntax encryption wep key length wdsaes alphanumeric hex no encryption wep The keyword that enables WEP encryption key length Size of encryption key Options 64 128 o...

Page 134: ...the keys used for WEP and AES encryption Use the no form to delete a configured key Syntax key wep index size type wep value wdsaes port id aes value no key wep index wdsaes wep The keyword that speci...

Page 135: ...ach wireless bridge link in the network must be configured to use the same AES key The AES key type value entered using the key command must be the same as the type specified in the encryption command...

Page 136: ...mand Mode Interface Configuration Wireless Command Usage The min keyword indicates minimum power 6 25 of maximum The longer the transmission distance the higher the transmission power required Power s...

Page 137: ...f wireless a Outdoor Bridge show interface wireless a Wireless Interface Information Identification Description Enterprise 802 11a Access Point Turbo Mode OFF Channel 36 Status Enable Service type WDS...

Page 138: ...connected LAN switch port to accept tagged VLAN packets with the wireless bridge s native VLAN ID Otherwise connectivity to the wireless bridge will be lost when you enable the VLAN feature The VLAN...

Page 139: ...ve VLAN ID Range 1 64 Default Setting 1 Command Mode Global Configuration Command Usage When VLANs are enabled the wireless bridge tags traffic passing to the wired network with the configured native...

Page 140: ...Command Line Interface 6 60 6...

Page 141: ...dio channel Be sure there is no other radio transmitter too close to either antenna If necessary move the antennas to another location 3 If the wireless bridge cannot be configured using Telnet a web...

Page 142: ...Troubleshooting A 2 A 5 If you forgot or lost the password Contact Technical Support...

Page 143: ...16 QAM 64 QAM Network Configuration Point to point and point to multipoint Operating Frequency 802 11a 5 15 5 25 GHz lower band US Canada 5 25 5 35 GHz middle band US Canada 5 725 5 825 GHz upper ban...

Page 144: ...midity 15 to 95 non condensing EMC Compliance Class A FCC Class A US Radio Signal Certification FCC part 15 15 407 b Safety CSA NTRL CSA 22 2 No 950 UL 1950 Standards IEEE 802 3 10BASE T IEEE 802 3u 1...

Page 145: ...ed pair cables with RJ 45 connectors that conform with FCC standards The following figure illustrates how the pins on the RJ 45 connector are numbered Be sure to hold the connectors in the same orient...

Page 146: ...injector uses an MDI pin configuration you must use crossover cable for network connections to PCs servers or other end nodes that only have MDI ports However if the device to which you are 10 100BASE...

Page 147: ...nd table 8 Pin DIN Ethernet Port Pinout Pin Signal Name 1 Transmit Data plus TD 2 Transmit Data minus TD 3 Receive Data plus RD 4 48 VDC power 5 48 VDC power 6 Receive Data minus RD 7 Return power 8 R...

Page 148: ...egory 5 or better UTP or STP cable maximum length 100 m 328 ft and be sure to connect all four wire pairs Note To construct a reliable Ethernet cable always use the proper tools or ask a professional...

Page 149: ...hering algorithm to TKIP and WEP Authentication The process to verify the identity of a client requesting network access IEEE 802 11 specifies two forms of authentication open system and shared key Ba...

Page 150: ...o uniquely identify network nodes Network Time Protocol NTP NTP provides the mechanisms to synchronize time across the network The time servers operate in a hierarchical master slave configuration in...

Page 151: ...th the 802 11 Wireless Equivalent Privacy algorithm Simple Network Management Protocol SNMP The application protocol in the Internet suite of protocols which offers network management services Simple...

Page 152: ...4 6 44 6 45 DNS 5 5 6 43 Domain Name Server See DNS downloading software 5 11 6 28 DTIM 5 26 6 51 Dynamic Host Configuration Protocol See DHCP E encryption 5 28 6 53 Ethernet port 1 3 event logs 5 36...

Page 153: ...tring 6 23 enabling traps 5 8 6 25 trap destination 5 8 6 25 trap manager 5 8 6 25 SNTP 5 15 6 20 enabling client 5 15 6 20 server 5 15 6 20 software displaying version 5 11 5 33 6 15 downloading 5 12...

Page 154: ...Index 3 Index W WEP 5 28 6 53 configuring 5 28 6 53 shared key 5 29 6 54 Wired Equivalent Protection See WEP...

Page 155: ...Index 4 Index...

Page 156: ......

Page 157: ...WB2011 E102004 R01...

Reviews: