Home
VX-AP250 User Manual
Contents
1. 104 set remoteAP set hwtxretries set swtxretries set rtsthreshold set shortpreamble set shortslottime set sntpserver set softwareretry set spurlmmunityLvl set ssid set ssidsuppress set SuperG set systemname set telnet set timeout set tzone set updateparam set watchdog set wds set wep set wlanstate set wirelessmode set 80211d set http set HttpPort set https set HttpsPort set syslog set syslogSeverity set syslogServer set manageOnlyLan set roguedetect Appendix C Windows TCP IP 105 Wireless Access Point User Guide set rogueinteval set rogueband set roguetype set roguesnmp set roguelegal set autoConfig set autoResponse set autoChangeName set autoSetResp set autoUpdate set autoUpgradeOnly set autoUpdatelnterval set ftpServer set fwPathname set ftpLogin set ftpPassword set activeCurrentProfile set profileName set profileVlanld set APPrimaryProfile set WDSPrimaryProfile Set securityMode set Accounting set Accountingport Set keyValue set keyLength Set keyIndex set UAM set UAMMethod set UAMLoginURL set UAMLoginFailURL set macAuth Set Minutes of every Rogue AP Detection Range 3 99 Set Rogue AP Detection band s Set Auto Update Interval 1 31days 106 set snmpMode set snmpCommunity set snmpAccessRight set snmpAnyStaMode set snmpStationIPAddr set trapMode set trapVersion set trapSendMode set trapRecvlp set description set
2. Tr D IP Address MAC Address IEEE Standard Description 172 31 2 58 Q0C002778877 802 11b g Pe Detail Info Web Management Set IP Address Exit Figure 6 Management utility Screen Wireless Access Points The main panel displays a list of all Wireless Access Points found on the network For each Access Point the following data is shown Server Name The Server Name is shown on a sticker on the base of the device IP address The IP address for the Wireless Access Point MAC Address The hardware or physical address of the Wireless Access Point IEEE Standard The wireless standard or standards used by the Wireless Access Point e g 802 11b 802 11g FW Version The current Firmware version installed in the Wireless Access Point Description Any extra information for the Wireless Access Point entered by the administrator Note If the desired Wireless Access Point is not listed check that the device is installed and ON then update the list by clicking the Refresh button Buttons Refresh Click this button to update the Wireless Access Point device listing after changing the name or IP Address Detail Info When clicked additional information about the selected Access Point will be displayed Web Management Use this button to connect to the Wireless Access Point s Web based management interface Set IP Address Click this button if you want to change the IP Add
3. Disable the selected profile Select the primary profile for 802 11b and 802 11g 2 4 GHz band AP mode Only enabled profiles are listed The SSID associated with this profile will be broadcast if the Broadcast SSID setting on the Basic screen is enabled 802 11b g Bridge Mode Isolation None Select the primary profile for 802 11b and 802 11g 2 4 GHz band Bridge Mode This setting determines the SSID and security settings used for the Bridge connection to the remote AP If this option is selected wireless clients using different profiles different SSIDs are not isolated from each other so they will be able to communicate with each other Isolate all If this option is selected wireless clients using different profiles different SSIDs are isolated from each other so they will NOT be able to communicate with each other They will still be able to communicate with other clients using the same profile unless the Wireless Separation setting on the Advanced screen has been enabled Use VLAN This option is only useful if the hubs switches on your LAN sup port the VLAN 802 1Q standard When VLAN is used you must select the desired VLAN for each security profile when configuring the profile If VLAN is not selected the VLAN setting for each profile is ignored Click the Configure VLAN button to configure the IDs used by each VLAN See below for further details 17 Wireless Access Point Us
4. Cancel Help Figure 59 SNMP Screen Data SNMP Screen General Enable SNMP Community Access Rights Managers Any Station Only this station Traps Disable Broadcast Send to Trap version Use this to enable or disable SNMP as required Enter the community string usually either Public or Private Select the desired option e Read only Data can be read but not changed e Read Write Data can be read and setting changed The IP address of the manager station is not checked The IP address is checked and must match the address you enter in the IP address field provided If selected you must enter the IP address of the required station Traps are not used Select this to have Traps broadcast on your network This makes them available to any PC Select this to have Trap messages sent to the specified PC only If selected you must enter the IP Address of the desired PC Select the desired option as supported by your SNMP Management program TI Wireless Access Point User Guide Upgrade Firmware The firmware software in the Wireless Access Point can be upgraded using your Web Browser You must first download the upgrade file and then select Upgrade Firmware in the Manage ment section of the menu You will see a screen like the following UTEG Locate and select the upgrade file from your hard disk Browse Cancel Help Figure 60 Firmware Upgrade Screen To p
5. No This displays the current channel used by the Access Point 39 Wireless Access Point User Guide Advanced Settings Clicking the Advanced link on the menu will result in a screen like the following Basic Rate Options Parameters 802 11b Basic Rate Selection 802 115 1 2 5 5 11 Mbps lt Wireless Separation T Worldwide Mode 802 11d Disassociated Timeout 5 Minutes 1 99 Fragmentation Length 2346 256 2346 Default 2346 Beacon Interval 100 20 1000 Default 100 RTS CTS Threshold 346 256 2346 Default 2346 Preamble Type Long Output Power Level Fut gt Antenna Selection Primary gt Protection Type CTS only RTS CTS Short Slot Time Enable Disable Protection Mode Auto gt Protection Rate Mbps Save Cancel Help Figure 22 Advanced Settings Data Advanced Settings Screen Basic Rate Basic Rate Options Wireless Separation Worldwide Mode 802 11d The Basic Rate is used for broadcasting It does not determine the data transmission rate which is determined by the Mode setting on the Basic screen Select the desired option Do NOT select the 802 11g or ODFM options unless ALL of your wireless clients support this 802 11b clients will not be able to connect to the Access Point if either of these modes is selected If enabled then each Wireless station using the Access Point is invisible to other Wir
6. P N 9560N90101 Copyright O 2005 AII Rights Reserved Document Version 1 34 All trademarks and trade names are the properties of their respective owners Chapter Introduction This Chapter provides an overview of the Wireless Access Point s features and capabilities Congratulations on the purchase of your new Wireless Access Point The Wireless Access Point links your 802 11g or 802 11b Wireless Stations to your wired LAN The Wireless stations and devices on the wired LAN are then on the same network and can communicate with each other regardless whether they are connected to the network via a wireless or wired connection Wireless Access Point A Wired Lan Figure 1 Wireless Access Point The auto sensing capability of the Wireless Access Point allows packet transmission up to 54Mbps for maximum throughput or automatic speed reduction to lower speeds when the environment does not permit maximum throughput Features of your Wireless Access Point The Wireless Access Point incorporates many advanced features carefully designed to provide sophisticated functions while being easy to use e Standards Compliant The Wireless Router complies with the IEEE802 11g DSSS specifications for Wireless LANs e Supports both 802 11b and 802 11g Wireless Stations The 802 11g standard provides for backward compatibility with the 802 11b standard so both 802 11b and 802 11g Wireless stations can be used simultaneously
7. broadcast transmissions are not encrypted e TKIP 64 bit WEP Unicast point to point transmissions are encrypted using TKIP and multicast broadcast transmis sions are encrypted using 64 bit WEP e TKIP 128 bit WEP Unicast point to point transmissions are encrypted using TKIP and multicast broadcast transmis sions are encrypted using 128 bit WEP e AES CCMP CCMP is the most common sub type of AES Advanced Encryption System Most systems will simply say AES If selected both Unicast point to point and multicast broadcast transmissions are encrypted using AES s AES TKIP If selected Unicast point to point uses AES CCMP and multicast broadcast transmissions are encrypted using TKIP This refers to the key used for point to point transmissions Enable this if you want the keys to be updated regularly This field determines how often Pairwise keys are dynamically updated Enter the desired value This refers to the key used for broadcast transmissions Enable this if you want the keys to be updated regularly This field determines how often the Group key is dynamically updated Enter the desired value If enabled the Group key will be updated whenever any member leaves the group or disassociates from the Access Point Radius Accounting Enable this if you want this Access Point to send accounting data to the Radius Server If enabled the port used by your Radius Server must be ent
8. e 108Mbps Wireless Connections On both the 2 4GHz 802 11b amp 802 11g and 5GHz 802 1 1a bands 108Mbps connections are available to compatible clients e Bridge Mode Support The Wireless Access Point can operate in Bridge Mode con necting to another Access Point Both PTP Point to Point and PTMP Point to Multi Wireless Access Point User Guide Point Bridge modes are supported And you can even use both Bridge Mode and Access Point Mode simultaneously Client Repeater Access Point The Wireless Access Point can operate as a Client or Repeater Access Point sending all traffic received to another Access Point Simple Configuration If the default settings are unsuitable they can be changed quickly and easily DHCP Client Support Dynamic Host Configuration Protocol provides a dynamic IP address to PCs and other devices upon request The Wireless Access Point can act as a DHCP Client and obtain an IP address and related information from your existing DHPC Server Upgradeable Firmware Firmware is stored in a flash memory and can be upgraded easily using only your Web Browser Security Features Security Profiles For maximum flexibility wireless security settings are stored in Security Profiles Up to 8 Security profiles can be defined and up to 4 used as any time Multiple SSIDs Because each Security Profile has it own SSID and up to 4 Security Profiles can be active simultaneously multiple SSIDs are supported Diffe
9. no need to change the TCP IP of each PC Just configure the Wireless Access Point to match your existing LAN The following sections provide details about checking the TCP IP settings for various types of Windows should that be necessary TCP IP Settings Windows 9x ME 1 Select Control Panel Network You should see a screen like the following Network 21 x Configuration Identification Access Control The following network components are installed ry NetBEUI gt PCI Fast Ethernet Adapter NetBEUI gt Dial Up Adapter f NetBEUI gt Dial Up Adapter 2 VPN Supporti Y TCP IP PCI Fast Ethemet Adapter M TCP IP gt Dial Up Adapter nf TCP IP gt Dial Up Adapter 2 VPN Support File and printer sharing for NetWare Networks v 4 gt Add Remove Properties Figure 62 Network Configuration 2 Select the TCP IP protocol for your network card 3 Click on the Properties button You should then see a screen like the following 85 Wireless Access Point User Guide TCP IP Properties L2 xJ Bindings Advanced NetBIOS DNS Configuration Gateway WINS Configuration IP Address An IP address can be automatically assigned to this computer If your network does not automatically assign IP addresses ask your network administrator for an address and then type itin the space below C Specify an IP address Figure 63 IP Address Win 95 Ensure your TCP IP
10. s Ifa compatible AP is found its configuration is cop led If more than one compatible AP exists the first one found is used e Some data cannot be copied o The IP address is not copied and will not change o The operating mode Repeater Bridge etc is not copied and will not change Note This checkbox is automatically disabled so the Auto configuration is only performed once 71 Wireless Access Point User Guide Respond to Auto configuration request by other AP If checked this AP will respond to Auto Configuration requests it receives If not checked Auto Configuration requests will be ignored Provide login name and password If enabled the login name and password on this AP is sup plied the the AP making the Auto configuration request If disabled the AP making the Auto configuration request will keep its existing login name and password Provide Respond to Auto configuration setting Auto Update Check for Firmware upgrade If enabled the Respond to Auto configuration setting on this AP is supplied the the AP making the Auto configuration request If disabled the AP making the Auto configuration request will keep its existing setting If enabled this AP will check to see if a Firmware FW upgrade is available on the specified FTP Server If enabled e Enter the desired time interval in days between checks e Select the desired option for installation see
11. used by PCs on your LAN WINS Enable WINS If your LAN has a WINS server you can enable this to have this AP register with the WINS server 35 Wireless Access Point User Guide WINS Server Enter the name or IP address of your WINS server Name IP Address 36 Setup Wireless Screens There are two 2 configuration screens available e Basic Settings e Advanced Basic Settings Screen The settings on this screen must match the settings used by Wireless Stations Click Basic on the menu to view a screen like the following MICE Wireless Mode 802 116 and 802 119 AP Mode Access Point Repeater AP MAC Address iv Broadcast SSID Bridge Mode None disable PTP Bridge AP MAC Address F In PTMP mode only allow specified APs WUE Channel No Automatic Current Channel No 1 Cancel Help Figure 21 Basic Settings Screen Data Basic Settings Screen Operation Wireless Mode Select the desired option Disable select this if for some reason you do not this AP to transmit or receive at all 802 11b and 802 11g this is the default and will allow connec tions by both 802 11b and 802 1g wireless stations 802 11b if selected only 802 11b connections are allowed 802 11g wireless stations will only be able to connect if they are fully backward compatible with the 802 11b standard 802 11g only 802 11g connections are allowed If you only have 802 11g selecting this
12. 2 4 GHz Profile03 wireless None 2 4 GHz Profile04 wireless None 2 4 GHz Profile05 wireless None 2 4 GHz ProfileO6 wireless None 2 4 GHz Enable Configure Disable Indicates profile is currently enabled 802 11b g AP Mode wireless wireless lt 802 11b g Bridge Mode wireless wireless lt These settings have no effect unless the appropriate mode is enabled If enabled the selected Profile SSID is used for the beacon Profile SSID Isolation No isolation solate all Profiles SSIDs from each other Use VLAN 802 1Q standard Configure VLAN Save Cancel Help Figure 10 Security Profiles Screen 16 Setup Data Security Profiles Screen Profile Profile List All available profiles are listed For each profile the following data is displayed ME If displayed before the name of the profile this indicates the profile is currently enabled If not displayed the profile is cur rently disabled e Profile Name The current profile name is displayed e SSID The current SSID associated with this profile e Security System The current security system e g WPA PSK is displayed e Band The Wireless Band 2 4 GHz 5GHz for this profile is dis played Profiles may be assigned to either or both Wireless Bands Buttons e Enable Enable the selected profile Primary Profile 802 11b g AP Mode e Configure Change the settings for the selected profile e Disable
13. 4 for details 11 Wireless Access Point User Guide Setup using a Web Browser Your Browser must support JavaScript The configuration program has been tested on the following browsers Netscape V4 08 or later Internet Explorer V4 or later Setup Procedure Before commencing install the Wireless Access Point in your LAN as described previously 1 Check the Wireless Access Point to determine its Default Name This is shown on a label on the base or rear and is in the following format SCXxxxxx Where xxxxxx is a set of 6 Hex characters 0 9 and A F Use a PC which is already connected to your LAN either by a wired connection or an other Access Point e Until the Wireless Access Point is configured establishing a Wireless connection to it may be not possible s If your LAN contains a Router or Routers ensure the PC used for configuration is on the same LAN segment as the Wireless Access Point Start your Web browser In the Address box enter HTTP and the Default Name of the Wireless Access Point e g HTTP SC2D631A You should then see a login prompt which will ask for a User Name and Password Enter admin for the User Name and password for the Password These are the default values The password can and should be changed Always enter the current user name and password as set on the Admin Login screen Enter Network Password 3 3 xl D gt Flease type your user name and password Site s
14. GHz x E Wireless Security System Em System SIT 502 1x Settings Radius Server Address l Radius Port 18 12 Client Login Name SC000012 Shared Key WEP Key Size 64 bit 7 C Dynamic WEP key EAP TLS PEAP etc F Key Exchange with lifetime of 20 minutes P Static WEP Key EAP MD5 WEP Key hex WEP Key Index l 1 z Radius Accounting C Enable Radius Accounting Radius Accounting Port 1813 F Update Report every s Minutes miren seem Current Status Disabled uthentication Loniigure_ UUI Current Status Disabled Configure Back Lsm Cancel Help Figure 19 802 1x Wireless Security 32 Data 802 1x Screen Setup 802 1x Radius Server Address Radius Port Client Login Name Shared Key WEP Key Size Dynamic WEP Key Key Exchange Static WEP Key EAP MD5 WEP Key WEP Key Index Radius Accounting Enter the name or IP address of the Radius Server on your network Enter the port number used for connections to the Radius Server This read only field displays the current login name which is the same as the name of the Access Point The Radius Server must be configured to accept this login This is used for the Client Login on the Radius Server Enter the key value to match the Radius Server Select the desired option e 64 Bit Keys are 10 Hex 5 ASCII characters e 128 Bit Keys are 26 Hex 13 ASCII characters e 152Bit Keys are 32 Hex 16 ASCII
15. If using Client Repeater mode you cannot use Bridge Mode Repeater AP MAC Address This is not required unless the AP Mode is Client Repeater In this mode you must provide the MAC address of the other AP in this field You can either enter the MAC address directly or if the other AP is on line and broadcasting its SSID you can click the Select AP button and select from a list of available APs Broadcast SSID If Disabled no SSID is broadcasted If enabled you must select the security profile whose SSID is to be broadcasted This can be done by the Security Profiles screen The SSID will then be broadcast to all Wireless Stations Stations which have no SSID or a null value can then adopt the correct SSID for connec tions to this Access Point 38 Setup Bridge Mode Both Bridge mode and AP mode can be used simultaneously unless AP mode is Client Repeater Select the desired Bridge mode e None disable Disable Bridge mode Use this if you want to act a AP only e Point to Point Bridge PTP Bridge to a single AP You must provide the MAC address of the other AP in the PTP Bridge AP MAC Address field e Point to Multi Point Bridge PTMP Select this only if this AP is the Master for a group of Bridge mode APs The other Bridge mode APs must be set to Point to Point Bridge mode us ing this AP s MAC address They then send all traffic to this Master If required you can specify
16. Properties Windows XP 91 Wireless Access Point User Guide 5 Ensure your TCP IP settings are correct Using DHCP To use DHCP select the radio button Obtain an IP Address automatically This is the default Windows setting To work correctly you need a DHCP server on your LAN Using a fixed IP Address Use the following IP Address If your PC is already configured for a fixed specified IP address no changes are required The Administrator should configure the Wireless Access Point with a fixed IP address from the same address range used on the PCs 92 Appendix D About Wireless LANs Overview Wireless networks have their own terminology and technical language Understanding these terms is essential in order to configure and operate a Wireless LAN Wireless LAN Terminolog Modes Wireless LANs can work in either of two 2 modes e Ad hoc e Infrastructure Ad hoc Mode Ad hoc mode does not require an Access Point or a wired Ethernet LAN Wireless Sta tions e g notebook PCs with wireless cards to communicate directly with each other Infrastructure Mode In Infrastructure Mode one or more Access Points are used to connect Wireless Stations e g Notebook PCs with wireless cards to a wired Ethernet LAN The Wireless Stations can then access all LAN resources Access Points can only function in Infrastructure mode and can communicate only with Wireless Stations which are Motel se
17. The default password is password It is recommended that this be changed using this screen ET User Name admin l Change Admin Password New Password Repeat New Password Admin Allow Admin connections via wired Ethernet only Connections l t Enable HTTP Admin connections HTTP Port Number 80 Enable HTTPS secure HTTP Admin connnections HTTPS Port Number 443 Enable Management via Telnet Cancel Help Figure 54 Admin Login Screen Data Admin Login Screen Login User Name Enter the login name for the Administrator 69 Wireless Access Point User Guide Change Admin Password If you wish to change the Admin password check this field and enter the new login password in the fields below New Password Enter the desired login password Repeat New Password Admin Connections Allow Admin connections via wired Ethernet only Re enter the desired login password If checked then Admin connections via the Wireless interface will not be accepted Enable HTTP Enable this to allow admin connections via HTTP If enabled you must provide a port number in the field below Either HTTP or HTTPS must be enabled HTTP Port Number Enter the port number to be used for HTTP connections to this device The default value is 80 Enable HTTPS Enable this to allow admin connections via HTTPS secure HTTP If enabled you must provide a port number in the field below Either HTTP or HTTPS must be enabl
18. Wireless Access Point to act as a Wireless Bridge Both Point to Point and Multi Point Bridge modes are supported Wireless Access Point User Guide Package Contents The following items should be included e Wireless Access Point e Power Adapter e Quick Start Guide e CD ROM containing the on line manual and setup utility If any of the above items are damaged or missing please contact your dealer immediately Physical Details Front Panel LEDs Status Power Wireless LAN O Status O Power LAN Wireless LAN Figure 2 Front Panel On Error condition Off Normal operation Blinking During start up and when the Firmware is being upgraded On Normal operation Off No power On The LAN Ethernet port is active Off No active connection on the LAN Ethernet port Flashing Data is being transmitted or received via the corresponding LAN Ethernet port On Idle Off Error Wireless connection is not available Flashing Data is being transmitted or received via the Wireless access point Data includes network traffic as well as user data Introduction Rear Panel ETHERNET CONSOLE POWER Figure 3 Rear Panel Antenna One antenna aerial is supplied Best results are usually obtained with the antenna in a vertical position Console port DB9 female RS232 port Reset Button This button has two 2 functions e Reboot When pressed and released the Wireless Access
19. Wireless Access Point has a range of around 150 meters 450 feet The range is reduced and transmission speed is lower if there are any obstructions between wireless devices CONS S0 REN Figure 4 Installation Diagram 2 Useastandard LAN cable to connect the Ethernet port on the Wireless Access Point to a 10 100BaseT hub on your LAN Installation Connect the supplied power adapter to the Wireless Access Point and a convenient power outlet and power up NOTE If you wish to use PoE Power over Ethernet refer to the following section Check the LEDs e The Status LED should flash then turn OFF e The Power Wireless LAN and LAN LEDs should be ON For more information refer to Front Panel LEDs in Chapter 1 Using PoE Power over Ethernet The Wireless Access Point supports PoE Power over Ethernet To use PoE l 2 Do not connect the supplied power adapter to the Wireless Access Point Connect one end of a standard category 5 LAN cable to the Ethernet port on the Wire less Access Point Connect the other end of the LAN cable to the powered Ethernet port on a suitable PoE Adapter 24V DC 500mA Connect the unpowered Ethernet port on the PoE adapter to your Hub or switch Connect the power supply to the PoE adapter and power up Check the LEDs on the Wireless Access Point to see it is drawing power via the Ethernet connection PoE Adapter Ethernet To Hub Powered Unpowered Access Poin
20. characters Click this if you want the WEP keys to be automatically gener ated e The key exchange will be negotiated The most widely supported protocol is EAP TLS e The following Key Exchange setting determines how often the keys are changed e Both Dynamic and Static keys can be used simultaneously allowing clients using either method to use the Access Point This setting if only available if using Dynamic WEP Keys If you want the Dynamic WEP keys to be updated regularly enable this and enter the desired lifetime in minutes Enable this if some wireless clients use a fixed static WEP key using EAP MD5 Note that both Dynamic and Static keys can be used simultane ously allowing clients using either method to use the Access Point Enter the WEP key according to the WEP Key Size setting above Wireless stations must use the same key Select the desired index value Wireless stations must use the same key index Enable this if you want this Access Point to send accounting data to the Radius Server If enabled the port used by your Radius Server must be entered in the Radius Accounting Port field Update Report every If Radius accounting is enabled you can enable this and enter the desired update interval This Access Point will then send updates according to the specified time period 33 Wireless Access Point User Guide Radius MAC The current status is displayed Authentication Cl
21. dhcpMode set wdsMacList set enableWirelessClient set isolationType set winsEnable set winsServerAddr set wirelessSeparate set sdSet set sdAdd set sdDel start wlan stop wlan timeofday version Appendix C Windows TCP IP 107
22. enter the server s address for the IP address Click Next New Scope Wizard x Domain Name and DNS Servers The Domain Name System DNS maps and translates domain names used by clients on your network You can specify the parent domain you want the client computers on your network to use for DNS name resolution Parent domain Wireless yourdomain tld To configure scope clients to use DNS servers on your network enter the IP addresses for those servers Server name IP address S Add 192 168 0 250 Remove EM Figure 28 DNS Screen 11 If you don t want a WINS server just click Next 12 Select Yes I want to activate this scope now Click Next then Finish 13 Right click on the server and select Authorize It may take a few minutes to complete 48 PC and Server Configuration Certificate Authority Setup 1 Select Start Programs Administrative Tools Certification Authority 2 Right click Policy Settings and select New Certificate to Issue f amp Certification Authority Action vew e gt gn 3 ES i9 Tree Certification Authority Local Gers Recovery Agent File Recovery B amp a WirelessCA Galpasic EFS Encrypting File System LJ Revoked Certificates ADomain Controller Client Authentication Server Authentic C Issued Certificates Gaweb Server Server Authentication Pending Requests ix Computer Client Authentication Server Auth
23. from 192 168 6 51 s 32 time lt i ms TTL 64 Reply from 192 168 51 2 i TTL 64 Reply from 192 168 51 bytes 32 time lt i ms TTL 64 Figure 61 Ping If your PC uses a Fixed Static IP address ensure that it is using an IP Address which is compatible with the Wireless Access Point If no DHCP Server is found the Wireless Access Point will default to an IP Address and Mask of 192 168 0 228 and 255 255 255 0 On Windows PCs you can use Control Panel Network to check the Properties for the TCP IP protocol My PC can t connect to the LAN via the Wireless Access Point 83 Wireless Access Point User Guide Solution 2 Check the following The SSID and WEP settings on the PC match the settings on the Wire less Access Point On the PC the wireless mode is set to Infrastructure If using the Access Control feature the PC s name and address is in the Trusted Stations list If using 802 1x mode ensure the PC s 802 1x software is configured correctly See Chapter 4 for details of setup for the Windows XP 802 1x client If using a different client refer to the vendor s documentation 84 Appendix C Windows TCP IP Overview Normally no changes need to be made e By default the Wireless Access Point will act as a DHCP client automatically obtaining a suitable IP Address and related information from your DHCP Server e If using Fixed specified IP addresses on your LAN instead of a DHCP Server there is
24. key derived from this key Other Wireless Stations must use the same key WPA Encryption Select the desired option Other Wireless Stations must use the same method e TKIP Unicast point to point transmissions are encrypted using TKIP and multicast broadcast transmissions are not encrypted e TKIP 64 bit WEP Unicast point to point transmissions are encrypted using TKIP and multicast broadcast trans missions are encrypted using 64 bit WEP e TKIP 128 bit WEP Unicast point to point transmis sions are encrypted using TKIP and multicast broadcast transmissions are encrypted using 128 bit WEP e AES CCMP CCMP is the most common sub type of AES Advanced Encryption System Most systems will 27 Wireless Access Point User Guide Pairwise Key Update Key Lifetime Group Key Update Key Lifetime Update Group key when any membership terminates simply say AES If selected both Unicast point to point and multicast broadcast transmissions are encrypted using AES s AES TKIP If selected Unicast point to point uses AES CCMP and multicast broadcast transmissions are en crypted using TKIP This refers to the key used for point to point transmissions Enable this if you want the keys to be updated regularly This field determines how often Pairwise keys are dynamically updated Enter the desired value This refers to the key used for broadcast transmissions Enable this if you wa
25. must have matching key values Passphrase Use this to generate a key or keys instead of entering them directly Enter a word or group of printable characters in the Passphrase box and click the Generate Key button to automatically configure the WEP Key s Radius MAC The current status is displayed iniaa Click the Configure button to configure this feature if required UAM The current status is displayed Click the Configure button to configure this feature if required 26 Setup Security Settings WPA PSK Like WEP data is encrypted before transmission WPA is more secure than WEP and should be used if possible The PSK Pre shared Key must be entered on each Wireless station The 256Bit encryption key is derived from the PSK and changes frequently Profile Security System Security Settings Radius MAC Authentication UAM Profile Name wireless SSID vi reless Wireless Band 24 GHz gt Wireless Security System WPA PSK Pre shared Key Network Key WPA Encryption TKIP Key Updates Pairwise Key Update Key Lifetime p minutes I Group Key Update Key Lifetime Bo minutes I Update Group Key when any membership terminates Current Status Disabled Gonfigure Current Status Disabled Configure Back __Save Cancel Help Figure 17 WPA PSK Wireless Security Data WPA PSK Screen WPA PSK Network Key Enter the key value Data is encrypted using a 256Bit
26. next item e Provide the FTP server information Install Select the desired option e Install FW if different version found If selected then if the firmware file at the specified loca tion is different to the current installed version the FW will be installed This allows Downgrades installing an older version of the FW to replace the current version e Install later version only If selected then the firmware file at the specified location will only be installed if it is a later version FTP Server address Enter the address domain name or IP address of the FTP Server Firmware pathname Enter the full path including the FW filename to the the FW file on the FTP Server FTP Login Name Enter the login name required to gain access to the FTP Server FTP Password Enter the password for the login name above 72 Other Settings amp Features Config File This screen allows you to Backup download the configuration file and to restore upload a previously saved configuration file You can also set the Wireless Access Point back to its factory default settings To reach this screen select Config File in the Management section of the menu ECCT Save a copy of current settings Backup NDS Restore saved settings from a file File Browse Restore BIEVER Rever to factory default settings Setto Defaults Help Figure 56 Config File Screen Data Conf
27. option may provide a performance im provement over using the default setting Dynamic Super 802 11g 108Mbps This uses Packet Bursting FastFrame Compression and Channel Bonding using 2 chan nels to increase throughput Only clients supporting the Atheros Super G mode can connect at 108Mbps and they will only use 37 Wireless Access Point User Guide this speed when necessary However this option is backward compatible with 802 11b and standard 802 11g e Static Super 802 11g 108Mbps This uses Packet Bursting FastFrame Compression and Channel Bonding using 2 chan nels to increase throughput Because Channel Bonding is always used this method is NOT compatible with 802 11b and standard 802 11g Only clients supporting the Atheros Super G mode can connect at 108Mbps they will always connect at this speed Select this op tion only if all wireless stations support this Atheros Super G mode AP Mode Both Bridge mode and AP mode can be used simultaneously unless AP mode is Client Repeater Select the desired AP mode e None disable Disable AP mode Use this if you want to act a Bridge only e Access Point operate as a normal Access Point e Client Repeater act as a client or repeater for another Access Point If selected you must provide the address MAC address of the other AP in the Repeater AP MAC Address field In this mode all traffic is sent to the specified AP Note
28. provided to prevent unauthorized users from modifying the configuration data and settings Advanced Features Auto Configuration The Wireless Access Point can perform self configuration by copying the configuration data from another Access Point This feature is enabled by de fault Introduction Auto Update The Wireless Access Point can automatically update its firmware by downloading and installing new firmware from your FTP server Command Line Interface If desired the command line interface CLI can be used for configuration This provides the possibility of creating scripts to perform common con figuration changes NetBIOS amp WINS Support Support for both NetBIOS broadcast and WINS Win dows Internet Naming Service allows the Wireless Access Point to easily fit into your existing Windows network Radius Accounting Support If you have a Radius Server you can use it to provide accounting data on Wireless clients Syslog Support 1f you have a Syslog Server the Wireless Access Point can send its log data to your Syslog Server SNMP Support SNMP Simple Network Management Protocol is supported allowing you to use a SNMP program to manage the Wireless Access Point UAM Support The Wireless Access Point supports UAM Universal Access Method making it suitable for use in Internet cafes and other sites where user access time must be accounted for WDS Support Support for WDS Wireless Distribution System allows the
29. settings are correct as follows Using DHCP To use DHCP select the radio button Obtain an IP Address automatically This is the default Windows settings To operate correctly you need a DHCP server on your LAN Using Specify an IP Address If your PC is already configured for a fixed specified IP address no changes are required The Administrator should configure the Wireless Access Point with a fixed IP address from the same address range used on the PCs 86 Appendix B Troubleshooting Checking TCP IP Settings Windows NT4 0 1 Select Control Panel Network and on the Protocols tab select the TCP IP protocol as shown below Network L2 x Identification Services Protocols Adapters Bindings Network Protocols Y NetBEUI Protocol Y NWLink IPX SPX Compatible Transport Y NwLink NetBIOS Add Remove Properties Update Description 1 Transport Control Protocol Internet Protocol The default wide area network protocol that provides communication across diverse interconnected networks Figure 64 Windows NT4 0 TCP IP 2 Click the Properties button to see a screen like the one below Microsoft TCP IP Properties 2l xi IP Address DNS WINS Address DHCP Relay Routing An IP address can be automatically assigned to this network card by a DHCP server If your network does not have a DHCP server ask your network administrator for an address and then type it in the s
30. the MAC addresses of the APs which are allowed to connect to this AP in PTMP mode To specify the allowed APs Enable the checkbox In PTMP mode only allow specified APs Click the button Set PTMP APs On the resulting sub screen enter the MAC addresses of the allowed APs PTP Bridge AP MAC Address This is not required unless the Bridge Mode is Point to Point Bridge PTP In this case you must enter the MAC address of the other AP in this field In PTMP mode only allow specified APs This is only functional if using Point to Multi Point Bridge PTMP mode If enabled you can specify the MAC addresses of the APs which are allowed to connect to this AP To specify the allowed APs 1 Enable this checkbox 2 Click the button Set PTMP APs 3 On the resulting sub screen enter the MAC addresses of the allowed APs Set PTMP APs Parameters Channel No Use this to open a sub window where you can specify the MAC addresses of the APs which are allowed to connect to this AP This is only functional if using Point to Multi Point Bridge PTMP mode and you have enabled the checkbox In PTMP mode only allow specified APs e If Automatic is selected the Access Point will select the best available Channel e If you experience interference shown by lost connections and or slow data transfers you may need to experiment with manually setting different channels to see which is the best Current Channel
31. you won t be prompted for it again F UAM Universal Access Method Internal Web based Authentication External Web based Authentication Login URL Login Failure URL Radius Server Address Radius Port 1812 Client Login Name C123488 Shared Key Cancel Help Figure 15 UAM Screen Data UAM Screen Enable Enable this if you wish to use this feature See the section above for details of using UAM Internal If selected then when a user first tries to access the Internet they will Web based be blocked and re directed to the built in login page The logon data is Authentication then sent to the Radius Server for authentication 24 Setup External If selected then when a user first tries to access the Internet they will Web based be blocked and re directed to the URL below This needs to be on Authentication your own local Web Server The page must also link back to the built in login page on this device to complete the login procedure Login URL Enter the URL of the page on your local Web Server you wish users to see when they attempt to access the Internet but are not logged in Login Failure Enter the URL of the page on your local Web Server you wish users to URL see if their login fails This may be the same URL as the Login URL Security Settings WEP This is the 802 11b standard Data is encrypted before transmission but the encryption system is not very strong Prof
32. 0 Domain Controller Setup 1 Run dcpromo exe from the command prompt 2 Follow all of the default prompts ensure that DNS is installed and enabled during installa tion Services Installation Select the Control Panel Add Remove Programs Click Add Remove Windows Components from the left side 3 Ensure that the following components are activated selected e Certificate Services After enabling this you will see a warning that the computer cannot be renamed and joined after installing certificate services Select Yes to select certificate services and continue e World Wide Web Server Select World Wide Web Server on the Internet Information Services IIS component e From the Networking Services category select Dynamic Host Configuration Protocol DHCP and Internet Authentication Service DNS should already be selected and in stalled 45 Wireless Access Point User Guide Windows Components Wizard Windows Components You can add or remove components of Windows 2000 gj Accessories and Utilities M E Certificate Services O amp Cluster Service M GP Indexing Service a Intemet Information Services MISI ime He oem Figure 23 Components Screen 4 Click Next 5 Select the Enterprise root CA and click Next Windows Components Wizard Certification Authority Type There are four types of certification authorities Figure 24 Certification Screen 6 Enter the information fo
33. 802 119 802 11b WPA Wireless Access Point User s Guide TABLE OF CONTENTS CHAPTER 1 INTRODUCTION ssssssssssssssssssssssseees sees seene enesenn eenn 1 Features of your Wireless Access POint sccssscssscssscscscscscscesecesecsscsscessccssessssesessees 1 Package Contents eee eee eee eee ee seen ense entes tnt n etas tn senses tosta sse ta sens reseso oaeo suse asias 4 Physical ci ie M M 4 CHAPTER 2 INSTALLATION censere en enses enano tata sine ta tasa tots e rore 6 Requirements eere eese eee eee ee teiner erio tns NEOA EOE tasses sse ta sensns estos ees suse ta snue 6 Procedure CHAPTER 3 ACCESS POINT SETUP eeeeeeee esee eee esee testae tasas insta tns ne tasas tasas tassa tn snes 9 OVEDVIOW ge T 9 Setup using the Windows Utility seves eee eese eese esee ee seen eats etna en sees etna s ense tna 9 Setup using a Web Browser eee esee eee eee eren etes etes tn sons to netos etas e ease ense tas e ease te sete stan 12 Access Control essc esseinssrioosooss se seses vassen eses vseeno soye saoi coson sS Vo soas Sieis rsr roS 14 Security POTS M 16 Security Profile Screen ssssscssscscsssscsessssccssscsecssccecssecssessscssscsssssessssssessssssssssesesees 19 SYSLEMSCLEEM PR MT 35 LT SS e ilie AT 37 Basic Settings Screen ccscccscscssscscssccsscsss
34. 802 1x Settings Radius Server Address l Radius Port 18 12 Client Login Name SC000012 Shared Key E WPA Encryption TKIP B Key Updates Pairwise Key Update Key Lifetime po minutes F Group Key Update Key Lifetime po minutes T Update Group Key when any membership terminates Radius Accounting C Enable Radius Accounting Radius Accounting Port 18 13 F Update Report every s Minutes ne vrae Current Status Disabled utnentication ENS SAUE Current Status Disabled Configure Back lL Sas Cancel Help Figure 18 WPA 802 1x Wireless Security 29 Wireless Access Point User Guide Data WPA 802 1x Screen WPA 802 1x Radius Server Address Radius Port Client Login Name Shared Key WPA Encryption Pairwise Key Update Key Lifetime Group Key Update Key Lifetime Update Group key when any member ship terminates Enter the name or IP address of the Radius Server on your network Enter the port number used for connections to the Radius Server This read only field displays the current login name which is the same as the name of the Access Point The Radius Server must be configured to accept this login This is used for the Client Login on the Radius Server Enter the key value to match the Radius Server Select the desired option Other Wireless Stations must use the same method e TKIP Unicast point to point transmissions are encrypted using TKIP and multicast
35. FICATIONS cccsssssssssssssessssessessssessesessessesessersesessessesesserseseserseeess 79 Wireless Access Point cscccscccscscssssscsscssccssscssccsecssessecesecssssscssecssessscsssesssssssssessesesees 79 APPENDIX B TROUBLESHOOTING cssssscssssssssssessesecsessesecnessenessesessessesessesseseenessesees 83 guia P 83 General Problems ETT LEE 83 APPENDIX C WINDOWS TCP IB 5c e een ecec eet econ er vosa ot eo seio etos dee eoa va oe ere ones es ose nein qe 85 Ogg waa PCR 85 Checking TCP IP Settings Windows 9x ME eere eee eee eene seen enata tns rere 85 Checking TCP IP Settings Windows NT4 0 eere eee eee ente een enne tn tn nann 87 Checking TCP IP Settings Windows 2000 eere eese eee ee eese en enne en tenen anna 89 Checking TCP IP Settings Windows XP eee esee esee essen enean sensn enses tns 91 APPENDIX D ABOUT WIRELESS LANS eeeeeeee eese esee en eta ena ttt ta snae totas teta tasas tasas 93 dau eR 93 Wireless LAN Terminology s sss sss vesse vesse seves ss eee sees sons e asta a etas e ease ease ease ease ennenen 93 APPENDIX E COMMAND LINE INTERFACE 4 esee esee etna enata enata tns enne 96 QV EL T PE 96 Command H 12 9 TT eere eee ee esee esee ee eene ense ease sissoo s seta stesse sone toss ease petes sense ena 97
36. O ProfileO6 wireless Disable None 24 GHz Disabled 0 Profile07 wireless Disable None 24 GHz Disabled 0 Profile08 wireless Disable None 2 4 GHz Disabled O E Refresh Close Figure 51 Profile Screen For each profile the following data is displayed Name The name you gave to this profile if you didn t change the name the default name is used SSID The SSID assigned to this profile Broadcast SSID Indicates whether or not the SSID is broadcast Band The Wireless band 2 4 GHz or 5 GHz used by this profile Status Indicates whether or not this profile is enabled or currently used Clients The number of wireless stations currently using accessing this Access Point using this profile If the profile is disabled this will always be zero 66 Activity Log Operation and Status This screen is displayed when the Log button on the Status screen is clicked 2004 2004 2004 2004 2004 2004 2004 2004 2004 2004 2004 2004 2004 2004 2004 2004 2004 2004 2004 2004 2004 2004 2004 Jan Jan Jan Jan Jan Jan Jan Jan Jan Jan Jan Jan Jan Jan Jan Jan Jan Jan Jan Jan Jan Jan Jan K K K K RR KM K K K K hoa KM M K K RR KM M K RR K Ka oo oo oo oo oo oo oo 00 00 04 04 04 04 04 04 04 04 04 04 04 04 04 04 Data Activity Log Data Current Time Curre
37. Point will reboot restart e Reset to Factory Defaults This button can also be used to clear ALL data and restore ALL settings to the factory default values To Clear All Data and restore the factory default values 1 Power Off the Access Point 2 Hold the Reset Button down while you Power On the Access Point 3 Continue holding the Reset Button until the Status Red LED blinks TWICE 4 Release the Reset Button The factory default configuration has now been restored and the Access Point is ready for use Ethernet Use a standard LAN cable RJ45 connectors to connect this port to a 10BaseT or 100BaseT hub on your LAN Power port Connect the supplied power adapter here Chapter 2 Installation This Chapter covers the physical installation of the Wireless Access Point Requirements Requirements e TCP IP network e Ethernet cable with RJ 45 connectors e Installed Wireless network adapter for each PC that will be wirelessly connected to the network Procedure 1 Select a suitable location for the installation of your Wireless Access Point To maximize reliability and performance follow these guidelines e Usean elevated location such as wall mounting or above a cubicle e Place the Wireless Access Point near the center of your wireless coverage area s Ifpossible ensure there are no thick walls or metal shielding between the Wireless Access Point and Wireless stations Under ideal conditions the
38. Points is 5 Channels e g use Channels and 6 or 6 and 11 s In Infrastructure mode Wireless Stations normally scan all Channels looking for an Access Point If more than one Access Point can be used the one with the strongest signal is utilized This can only happen within an ESS e If using Ad hoc mode no Access Point all Wireless stations should be set to use the same Channel However most Wireless stations will still scan all Channels to see if there is an existing Ad hoc group they can join WEP WEP Wired Equivalent Privacy is a standard for encrypting data before it is transmitted This is desirable because it is impossible to prevent snoopers from receiving any data which is transmitted by your Wireless Stations But if the data is encrypted then it is meaningless unless the receiver can decrypt it If WEP is used the Wireless Stations and the Wireless Access Point must have the same settings WPA PSK Like WEP data is encrypted before transmission WPA is more secure than WEP and should be used if possible The PSK Pre shared Key must be entered on each Wireless station The 256Bit encryption key is derived from the PSK and changes frequently WPA 802 1x WPA 802 1x This version of WPA requires a Radius Server on your LAN to provide the client authentication according to the 802 1x standard Data transmissions are encrypted using the WPA standard If this option is used e The Access Point must h
39. Wireless Access Point and some possible solutions to them If you follow the suggested steps and the Wireless Access Point still does not function properly contact your dealer for further advice General Problems Problem 1 Solution 1 Problem 2 Can t connect to the Wireless Access Point to configure it Check the following e The Wireless Access Point is properly installed LAN connections are OK and it is powered ON Check the LEDs for port status e Ensure that your PC and the Wireless Access Point are on the same network segment If you don t have a router this must be the case e If your PC is set to Obtain an IP Address automatically DHCP client restart it e You can use the following method to determine the IP address of the Wireless Access Point and then try to connect using the IP address in stead of the name To Find the Access Point s IP Address 1 Open a MS DOS Prompt or Command Prompt Window 2 Use the Ping command to ping the Wireless Access Point Enter ping followed by the Default Name of the Wireless Access Point e g ping SC003318 3 Check the output of the ping command to determine the IP address of the Wireless Access Point as shown below 2 PDdosnt Microsoft Windows 2000 Version 5 00 2195 CC Copyright 1985 2088 Microsoft Corp C2 gt ping sc463318 Pinging sc 3318 192 168 80 51 with 32 bytes of data Reply from 192 168 6 51 bytes 32 time lt i ms TTL 64 Reply
40. a unique SSID Wireless Band Select the wireless band or bands for this profile If your Wireless Access Point only has a single band then only 1 option is available Security Settings Select the desired option and then enter the settings for the selected method The available options are None No security is used Anyone using the correct SSID can connect to your network WEP The 802 11b standard Data is encrypted before transmission but the encryption system is not very strong WPA PSK Like WEP data is encrypted before transmission WPA is more secure than WEP and should be used if possible The PSK Pre shared Key must be entered on each Wireless station The 256Bit encryption key is derived from the PSK and changes fre quently WPA 802 1x This version of WPA requires a Radius Server on your LAN to provide the client authentication according to the 802 1x standard Data transmissions are encrypted using the WPA standard If this option is selected 19 Wireless Access Point User Guide This Access Point must have a client login on the Radius Server Each user must have a user login on the Radius Server Each user s wireless client must support 802 1x and provide the login data when re quired All data transmission is encrypted using the WPA standard Keys are automatically generated so no key input is required e 802 1x This uses the 802 1x standard for client authentication and WEP for data
41. age on the Access Point 23 Wireless Access Point User Guide 3 On the Access Points UAM screen select External Web based Authentication and enter the URL for the welcome page on your Web server Add users on your RADIUS server as required and allow access by these users 5 Client PCs must have the correct Wireless settings in order to associate with the Wireless Access Point 6 When an associated client tries to use HTTP TCP port 80 connections they will be re directed to the welcome page on your Web Server They must then click the link or button in order to reach the Access Point s login page 7 The client user must then enter the user name and password as defined on the Radius Server You must provide some system to let users know the correct name and password to use 8 If the user name and password is correct Internet access is allowed Otherwise the user remains on the login page e Clients which pass the authentication are listed as xx xx xx xx xx xx WEB au thentication in the log table and station status would show as Authenticated on the station list table e faclient fails authentication txx xx xx xx xx xx WEB authentication failed is shown in the log and station status is shown as Authenticating on the station list table UAM Screen The UAM screen will look different depending on the current security setting If you have already provided the address of your Radius server
42. ate templates Name Intended Purposes Client Authentication Server Authenticatior Domain Controller Client Authentication Server Authenticatior Enrollment Agent Computer Certificate Request Agent IPSEC 1 3 6 1 55 8 2 2 LZ lt Back Cancel Figure 34 Certificate Template Screen 10 Ensure that your certificate authority is checked then click Next 11 Review the policy change information and click Finish 12 Click Start Run type cmd and press enter Enter secedit refreshpolicy machine policy This command may take a few minutes to take effect 51 Wireless Access Point User Guide Internet Authentication Service Radius Setup 1 2 B QU sb Qv 9 Select Start Programs Administrative Tools Internet Authentication Service Right click on Clients and select New Client Internet Authentication Service Action deu flm Tree Internet Authentication Service Local ENS C Remot ay Remot Export List Help Figure 35 Service Screen Enter a name for the access point click Next Enter the address or name of the Wireless Access Point and set the shared secret as entered on the Security Settings of the Wireless Access Point Click Finish Right click on Remote Access Policies select New Remote Access Policy Assuming you are using EAP TLS name the policy eap t 1s and click Next Click Add If you don t want to set any restric
43. ave a client login on the Radius Server e ach user must have a user login on the Radius Server e ach user s wireless client must support 802 1x and provide the authentication data when required This is normally done via a digital certificate so no user action is required e All data transmission is encrypted using the WPA standard Keys are automatically generated so no key input is required 94 Appendix B Troubleshooting 802 1x This uses the 802 1x standard for client authentication and WEP for data encryption If possi ble you should use WPA 802 1x instead because WPA encryption is much stronger than WEP encryption If this option is used e The Access Point must have a client login on the Radius Server e ach user must have a user login on the Radius Server e Each user s wireless client must support 802 1x and provide the login data when required e All data transmission is encrypted using the WEP standard You only have to select the WEP key size the WEP key is automatically generated 95 Appendix E Command Line Interface Overview If desired the Command Line Interface CLI can be used for configuration This creates the possibility of creating scripts to perform common configuration changes The CLI requires either a Telnet connection or a physical connection from your PC to the serial port RS232 port on the Wireless Access Point Using the CLI Telnet 1 Start your Telnet clie
44. button You will then see the Trusted Wireless Stations screen described below Read from File To upload a list of Trusted Stations from a file on your PC click this button Write to File To download the current list of Trusted Stations from the Access Point to a file on your PC click this button 14 Setup Trusted Wireless Stations To change the list of trusted wireless stations use the Modify List button on the Access Control screen You will see a screen like the sample below Trusted Wireless Stations Other Wireless Stations 00 04 23 73 19 61 unknown Edit Select All Select None Name E Address Physica MAC address Add Clear Figure 9 Trusted Wireless Stations Data Trusted Wireless Stations Trusted Wireless This lists any Wireless Stations which you have designated as Stations Trusted Other Wireless This list any Wireless Stations detected by the Access Point which Stations you have not designated as Trusted Name The name assigned to the Trusted Wireless Station Use this when adding or editing a Trusted Station Address The MAC physical address of the Trusted Wireless Station Use this when adding or editing a Trusted Station Buttons Add a Trusted Wireless Station to the list move from the Other Stations list e Select an entry or entries in the Other Stations list and click the button e Enter the Address MAC or physical address of t
45. cel Help Figure 58 Rogue AP Detection Screen Data Rogue AP Screen Enable Detection Enable Detection To use this feature enable the Enable Rogue AP Detection checkbox and select the desired wireless band and time interval Scan Select the desired Wireless band to scan to Rogue APs and enter the desired time interval between each scan Detection generates If using SNMP checking this option will cause a SNMP trap SNMP Trap to be generated whenever a Rogue AP is detected If not using SNMP do not enable this option Rogue Detection No Security If checked then any AP operating with security disabled is considered to be a Rogue AP Not in Legal AP List If checked then any AP not listed in the Legal AP List is considered to be a Rogue AP If checked you must maintain the Legal AP List Define Legal AP List Click this button to open a sub screen where you can modify the Legal AP List This list must contain all known APs so must be kept up to date 76 Other Settings amp Features SNMP Simple Network Management Protocol is only useful if you have a SNMP program on your PC To reach this screen select SVMP in the Management section of the menu General Managers Traps I Enable SNMP Community bli Access Rights Read riti Managers Any Station Only this Station p p p Ifo Disable Broadcast e Sendto fo fo fo fo Trap Version Version 1 gt
46. cff3496 Realm 802 119 Access Point User Name i Password Save this password in your password list Cancel Figure 7 Password Dialog 6 You will then see the Status screen which displays the current settings and status No data input is possible on this screen See Chapter 5 for details of the Status screen 12 Setup 7 From the menu check the following screens and configure as necessary for your envi ronment Details of these screens and settings are described in the following sections of this chapter e Access Control MAC level access control e Security Profiles Wireless security e System Identification location and Network settings e Wireless Basic amp Advanced 8 You may also wish to set the admin password and administration connection options These are on the Admin Login screen accessed from the Management menu See Chapter 6 for details of the screens and features available on the Management menu 9 Use the Apply Restart button on the menu to apply your changes and restart the Wireless Access Point Setup is now complete Wireless stations must now be set to match the Wireless Access Point See Chapter 4 for details If you can t connect It is likely that your PC s IP address is incompatible with the Wireless Access Point s IP address This can happen if your LAN does not have a DHCP Server The default IP address of the Wireless Access Point is 192 168 0 228 with a Netw
47. d client tries to use HTTP TCP port 80 connections they will be re directed to a user login page 5 Theclient user must then enter the user name and password as defined on the Radius Server You must provide some system to let users know the correct name and password to use 6 Ifthe user name and password is correct Internet access is allowed Otherwise the user remains on the login page e Clients which pass the authentication are listed as xx xx xx xx xx xx WEB au thentication in the log table and station status would show as Authenticated on the station list table e Ifa client fails authentication xx xx xx xx xx xx WEB authentication failed shown in the log and station status is shown as Authenticating on the sta tion list table UAM authentication External 1 Ensure the Wireless Access Point can login to your Radius Server e Adda RADIUS client on RADIUS server using the IP address or name of the Wire less Access Point and the same shared key as entered on the Wireless Access Point e Ensure the Wireless Access Point has the correct address port number and shared key for login to your Radius Server These parameters are entered either on the Secu rity page or the UAM sub screen depending on the security method used 2 On your Web Server create a suitable welcome page The welcome page must have a link or button to allow the user to input their user name and password on the uamlogon htm p
48. ded to prevent older 802 11b devices from interfering with 802 11g transmissions Older 802 11b devices may not be able to detect that a 802 11g transmission is in progress Normally this should be left at Auto Select the desired option The default is 11 Mbps 41 Chapter 4 PC and Server Configuration This Chapter details the PC Configuration required for each PC on the local LAN Overview All Wireless Stations need to have settings which match the Wireless Access Point These settings depend on the mode in which the Access Point is being used e If using WEP or WPA PSK it is only necessary to ensure that each Wireless station s settings match those of the Wireless Access Point as described below e For WPA 802 1x and 802 1x modes configuration is much more complex The Radius Server must be configured correctly and setup of each Wireless station is also more com plex Using WEP For each of the following items each Wireless Station must have the same settings as the Wireless Access Point Mode On each PC the mode must be set to Infrastructure SSID ESSID This must match the value used on the Wireless Access Point The default value is wireless Note The SSID is case sensitive Wireless e Each Wireless station must be set to use WEP data encryption Security e The Key size 64 bit 128 bit 152 bit must be set to match the Access Point e The keys values on the PC must match the key va
49. e Log This will make it easier to read new messages 67 Wireless Access Point User Guide Station List This screen is displayed when the Stations button on the Status screen is clicked Name MAC Address Mode SSID Status unknown 00 04 23 73 19 61 802 11b and 802 11g wireless Allow Refresh Figure 53 Station List Screen Data Station List Screen Station List Name The name of each Wireless Station is displayed If the name is not know unknown is displayed for the name MAC Address The MAC physical address of each Wireless Station is displayed Mode The mode of each Wireless Station SSID This displays the SSID used the Wireless station Because the Wire less Access Point supports multiple SSIDs different PCs could connect using different SSIDs Status This indicates the current status of each Wireless Station Refresh Button Update the data on screen Chapter 6 Access Point Management This Chapter explains when and how to use the Wireless Access Point s Management Features Overview This Chapter covers the following features available on the Wireless Access Point s Man agement menu e Admin Login e Auto Config Update e Config File e Log Settings e Rogue APs e SNMP e Upgrade Firmware Admin Login Screen The Admin Login screen allows you to assign a password to the Wireless Access Point This password limits access to the configuration interface
50. e using Windows XP e You are connecting to a Windows 2000 server for authentication e You already have a login User name and password on the Windows 2000 server Client Certificate Setup 1 Connect to a network which doesn t require port authentication 2 Start your Web Browser In the Address box enter the IP address of the Windows 2000 Server followed by certsrv e g http 192 168 0 2 certsrv 3 You will be prompted for a user name and password Enter the User name and Password assigned to you by your network administrator and click OK Connect to 192 168 0 2 G x Connecting to 192 168 0 2 User name Password C Remember my password Figure 39 Connect Screen 4 Onthe first screen below select Request a certificate click Next 23 Wireless Access Point User Guide Microsoft Certificate Services Microsoft Internet Explorer BAR Fie Edit View Favorites Tools Help Q ex T o x a Lel P Search Sg Favorites media e Address amp http 192 168 0 2 certsrv Microsoft Certificate Services WirelessCA Welcome You use this web site to request a certificate for your web browser e mail client or other secure program Once you acquire a certificate you will be able to securely identify yourself to other people over the web sign your e mail messages encrypt your e mail messages and more depending upon the type of certificate you request Select a task ORetrieve the CA certificate
51. ed HTTPS Port Number Enter the port number to be used for HTTPS connections to this device The default value is 443 Enable Telnet If desired you can enable this option If enabled you will able to connect to this AP using a Telnet client You will have to provide the same login data user name password as for a HTTP Web connection 70 Other Settings amp Features Auto Config Update The Auto Config Update screen provides two 2 features e Auto Config The Access Point will configure itself by copying data from another compatible Access Point e Auto Update The Access Point will update it Firmware by downloading the Firmware file from your FTP Server asken r Perform Auto Configuration on this AP next restart C Respond to Auto configuration request by other AP Iv Provide admin login name and password P Provide Respond to Auto configuration setting F Check for Firmware upgrade every 1 days Install FW if different version found amp Install later version only FTP Server address l oi Firmware pathname 2 J FTP Login Name 25 FTP Password ae Cancel Help Figure 55 Auto Config Update Screen Data Auto Config Update Screen Admin Connections Perform Auto Configu If checked this AP will perform Auto Configuration the next ration on this AP next time it restarts restart e The wired LAN NOT the Wireless LAN will be searched for compatible APs
52. eless stations In most business situations this setting should be Disabled Enable this setting if you wish to use this mode and your Wireless stations support this mode 40 Setup Parameters Disassociated Timeout Fragmentation Beacon Interval RTS CTS Threshold Preamble Type Output Power Level Antenna Selection 802 11b Protection Type Short Slot Time Protection Mode Protection Rate This determines how quickly a Wireless Station will be consid ered Disassociated with this AP when no traffic is received Enter the desired time period Enter the preferred setting between 256 and 2346 Normally this can be left at the default value Enter the preferred setting between 20 and 1000 Normally this can be left at the default value Enter the preferred setting between 256 and 2346 Normally this can be left at the default value Select the desired option The default is Long The Short setting takes less time when used in a good environment Select the desired power output Higher levels will give a greater range but are also more likely to cause interference with other devices If your Access Point has only 1 antenna there is only 1 option available If your Access Point has 2 antennae select the option which gives the best results in your location Select the desired option The default is CTS only Enable or disable this setting as required The Protection system is inten
53. encryp tion If possible you should use WPA 802 1x instead because WPA encryption is much stronger than WEP encryption If this option is selected This Access Point must have a client login on the Radius Server Each user must have a user login on the Radius Server Each user s wireless client must support 802 1x and provide the login data when re quired All data transmission is encrypted using the WEP standard You only have to select the WEP key size the WEP key is automatically generated 20 Setup Security Settings None SAU Profile Name wireless SSID wireless Wireless Band 24 GHz gt Security System Wireless Security System ttm 1 Security Settings aCCITERUAISE Current Status Disabled Authentication Configure SLUF Current Status Disabled Configure Back C sv Cancel Help Figure 13 Wireless Security None No security is used Anyone using the correct SSID can connect to your network The only settings available from this screen are Radius MAC Authentication and UAM Universal Access Method Radius MAC Authentication Radius MAC Authentication provides for MAC address checking which is centralized on your Radius server If you don t have a Radius Server you cannot use this feature Using MAC authentication 1 Ensure the Wireless Access Point can login to your Radius Server e Adda RADIUS client on the RADIUS server using the IP address or name of the Wirel
54. entic Failed Requests Fuser Encrypting File System Secure Email LIUM alo rrie de Authority Certificate to Issue Code Signing Microsoft Trust List Signi View U Refresh Export List Help Creates a new object in this container Figure 29 Certificate Authority Screen 3 Select Authenticated Session and Smartcard Logon select more than one by holding down the Ctrl key Click OK Select Certificate Template i 2 xl Select a certificate template to issue certificates User Signature Only Secure Email Clier Smartcard User Secure Email Clier Authenticated Session Client Authenticatic Smartcard Logon Client Authenticatic Code Signing Trust List Signing Microsoft Trust List Fnrnllment nent Fertifinate Renuest gt Figure 30 Template Screen 4 Select Start Programs Administrative Tools Active Directory Users and Computers 5 Right click on your active directory domain and select Properties 49 Wireless Access Point User Guide active Directory Users and Computers Figure 31 Active Directory Screen 6 Select the Group Policy tab choose Default Domain Policy then click Edit i wireless yourdomain tid Properties Jp Uowm f OK Cancel Apply Figure 32 Group Policy Tab 7 Select Computer Configuration Windows Settings Security Settings Public Key Policies right click Automatic Certificate Request Settings New Automatic Cer
55. er Guide VLAN Configuration Screen This screen is accessed via the Configure VLAN button on the Security Profiles screen e The settings on this screen will be ignored unless the Use VLAN option on the Security Profiles screen is selected e If using the VLAN option these setting determine which VLAN traffic is assigned to Profile VLANID Profile VLAN ID wireless Profieo5s Profieo2 Profile Profileo3 proie T X Profleo Profleog IDs must be in the range 1 4095 Save Cancel Help Close Figure 11 VLAN Configuration Data VLAN Configuation Screen Profile Each profile is listed by name VLAN ID Enter the ID for the required VLAN All traffic using this profile will be assigned to this VLAN 18 Setup Security Profile Screen This screen is displayed when you select a Profile on the Security Profiles screen and click the Configure button MELEE Profile Name wireless SSID wireless Wireless Band 24 GHz gt Security l e System Wireless Security System None Security Settings BEGIEI LE Current Status Disabled Authentication Configure STOR Current Status Disabled Configure Back Css Cancel Help Figure 12 Security Profile Screen Profile Data Enter the desired settings for each of the following Profile Name Enter a suitable name for this profile SSID Enter the desired SSID Each profile must have
56. ered in the Radius Accounting Port field 30 Setup Update Report If Radius accounting is enabled you can enable this and enter the every desired update interval This Access Point will then send updates according to the specified time period Radius MAC The current status is displayed This will always be Disabled Authentication because Radius MAC Authentication is not available with WPA 802 1x The Configure button for this feature will also be disabled UAM The current status is displayed This will always be Disabled because UAM is not available with WPA 802 1x The Configure button for this feature will also be disabled 31 Wireless Access Point User Guide Security Settings 802 1x This uses the 802 1x standard for client authentication and WEP for data encryption If possi ble you should use WPA 802 1x instead because WPA encryption is much stronger than WEP encryption If this option is selected This Access Point must have a client login on the Radius Server Each user must have a user login on the Radius Server Normally a Certificate is used to authenticate each user See Chapter4 for details of user configuration Each user s wireless client must support 802 1x AII data transmission is encrypted using the WEP standard You only have to select the WEP key size the WEP key is automatically generated MELEE Profile Name wireless SSID m reless Wireless Band 24
57. erform the Firmware Upgrade 1 Click the Browse button and navigate to the location of the upgrade file 2 Select the upgrade file Its name will appear in the Upgrade File field 3 Click the Upgrade button to commence the firmware upgrade TES The Wireless Access Point is unavailable during the upgrade process and must restart when the up Note grade is completed Any connections to or through the Wireless Access Point will be lost 78 Appendix A A Specifications Wireless Access Point Hardware Specifications CPU AR2312 Radio on Chip AR2112 DRAM 8 Mbytes Flash ROM 2 Mbytes LAN port 1 x Auto MDIX RJ 45 for 10 100Mbps Ethernet Wireless Interface Embedded Atheros solution Network Standard IEEE 802 11b Wi Fi and IEEE 802 11g compliance OFDM 802 11b CCK 11 Mbps 5 5 Mbps DQPSK 2 Mbps DBPSK 1 Mbps Operating Frequencies 2 412 2 497 GHz Operating Channels 802 11g 11 for North America 13 for Europe ETSI 14 for Japan 802 11b 11 for North America 13 for Europe ETSI 14 for Japan Operating temperature 0 C to 40 C Storage temperature 20 C to 70 C Power Adapter 24VDC 500ma Dimensions 141mm W x 100mm D x 27mm H Wireless Specifications Receive Sensitivity at 11Mbps min 85dBm Receive Sensitivity at 5 5Mbps min 89dBm Receive Sensitivity at 2Mbps min 90dBm Receive Sensitivity at IMbps min 93dBm Ma
58. ess Access Point and the same shared key as entered on the Wireless Access Point e Ensure the Wireless Access Point has the correct address port number and shared key for login to your Radius Server These parameters are entered either on the Security page or the Radius based MAC authentication sub screen depending on the security method used e Onthe Access Point enable the Radius based MAC authentication feature on the screen below 2 Add Users on the Radius server as required The username must be the MAC address of the Wireless client you wish to allow and the password must be blank 3 When clients try to associate with the Access Point their MAC address is passed to the Radius Server for authentication e fsuccessful xx xx xx xx xx xx MAC authentication is entered in the log and client station status would show as authenticated on the station list table e Ifnot successful xx xx xx xx xx xx MAC authentication failed is en tered in the log and station status is shown as authenticating on the station list table 21 Wireless Access Point User Guide Radius based MAC authentication Screen This screen will look different depending on the current security setting If you have already provided the address of your Radius server you won t be prompted for it again Otherwise you must enter the details of your Radius Server on this screen C Enable Radius based MAC authentication Radius Se
59. essssssscsssssssscesecsscssscssscssssssssssssesesssessscssesees 37 Advanced Settings Leere eee ee eee esee ee seen eese tne tn setas etas ta seta sense ease ta sete sete sees tns so nae 40 CHAPTER 4 PC AND SERVER CONFIGURATION ee ses ette ene ene en euet eroe 42 OVeEVIeW i taedia iueeces ecd ete es edt eao lose eb ab Ines qni bla doen aD PEU SEES Lene eoi De Da Da easa 42 USING WEP c serseri one i eA OSEE TEE 42 LOTTA e E ud LT 43 Using WPA 802 1 44 802 1x Server Setup Windows 2000 Server essesessesseseosoesessossesoossesoosossessossessossesose 45 802 1x Client Setup on Windows XP eerte esee ee sees eene te tinens tn sensn serere Using 802 1x Mode without WPA eere estes essen en seen ense tn tinea stata eneore CHAPTER 5 OPERATION AND STATUS Operati n rr M Status Screen eee erect eeentne CHAPTER 6 ACCESS POINT MANAGEMENT ecce ener teen etn seene essen tenens teen 69 OV OL VIEW Ae 69 Admin Login Screen sccscsscssssssssessscssssscesscscnscsssnsssssnsscesscssessessesssssnesssssessessessesseses 69 Auto Config Update ccsccscsssescssessscssssscesscssescsssnessssnessesssssssssessessnesssssessessessoseeses 71 Confis gie E 73 Log Settings Syslog RR 75 ROSCA ducc 76 SNMP kanais annes nE a E E E E R 77 Upgrade Firm Te MH 78 APPENDIX A SPECI
60. et Protocol The default wide area network protocol that provides communication across diverse interconnected networks Show icon in taskbar when connected OK Cancel Figure 66 Network Configuration Win 2000 3 Select the TCP IP protocol for your network card Click on the Properties button You should then see a screen like the following Internet Protocol TCP IP Properties BE General You can get IP settings assigned automatically if your network supports this capability Otherwise you need to ask your network administrator for the appropriate IP settings Obtain an IP address automatically C Use the following IP address IP address S Subnet mask Default gateway l Obtain DNS server address automatically C Use the following DNS server addresses Preferred DNS server Alternate DNS server Figure 67 TCP IP Properties Win 2000 89 Wireless Access Point User Guide 5 Ensure your TCP IP settings are correct Using DHCP To use DHCP select the radio button Obtain an IP Address automatically This is the default Windows setting This is the default Windows settings To work correctly you need a DHCP server on your LAN Using a fixed IP Address Use the following IP Address If your PC is already configured for a fixed specified IP address no changes are required The Administrator should configure the Wireless Access Point with a fi
61. et shortpreamble get shortslottime get sntpserver get softwareretry get spurlmmunityLvl get ssid get ssidsuppress get station get SuperG get systemname get telnet get timeout get tzone get updateparam get uptime get watchdog get wds get wep get wirelessmode get 80211d get http get HttpPort get https get HttpsPort get syslog get syslogSeverity get syslogServer get manageOnlyLan get roguedetect get rogueinteval Display Minutes of every Rogue AP Detection Range 3 99 100 get rogueband get roguetype get roguesnmp get roguelegal get autoConfig get autoResponse get autoChangeName get autoSetResp get autoUpdate get autoUpgradeOnly get autoUpdatelnterval get ftpServer get fwPathname get ftpLogin get ftpPassword get activeCurrentProfile get profileName get profileVlanld get APPrimaryProfile get WDSPrimaryProfile get securityMode get Accounting get Accountingport get keyValue get keyLength get keyIndex get UAM get UAMMethod get UAMLoginURL get UAMLoginFailURL get macAuth get snmpMode Appendix C Windows TCP IP Display Rogue AP Detection band s Display Auto Update Interval 1 31days 101 Wireless Access Point User Guide get snmpCommunity get snmpAccessRight get snmpAnyStaMode get snmpStationIPAddr get trapMode get trapVersion get trapSendMode get trapRecvip get wdsMacList get enableWirelessClient get isolationType get winsEnable ge
62. eway get gbeaconrate get gdraft5 get groupkeyupdate get hardware get hostipaddr get ipaddr get ipmask get keyentrymethod get keysource get login get minimumrate get nameaddr get nf get noiselmmunityLvl get ofdmTrigHigh get ofdmTrigLow get ofdmWeakSigDet get overRidetxpower get operationMode get power get quietAckCtsAllow get quietDuration get quietOffset get radiusname get radiusport get rate get remoteAp get hwtxretries Appendix C Windows TCP IP Display ANI Parameter for FirStepLevel Display Fragment Threshold Display Radio Frequency MHz Display Gateway IP Address Display 11g Beacon Rate Display 11g Draft 5 0 compatibility Display Group Key Update Interval in Seconds Display Noise Floor Display ANI Parameter for Noise Immunity Level Display Higher Trigger Threshold for OFDM Phy Errors for ANI Control Display Lower Trigger Threshold for OFDM Phy Errors for ANI Control Display ANI Parameter for OFDM Weak Signal Detection Display Tx power override Display Operation Mode Display Transmit Power Setting Display if Ack Cts frames are allowed during quiet period Display Duration of quiet period Display Offset of quiet period into the beacon period Display RADIUS server name or IP address Display RADIUS port number Display Data Rate Display Remote Ap s Mac Address Display HW Transmit Retry Limit 99 Wireless Access Point User Guide get swtxretries get rtsthreshold g
63. ff and on the user is encouraged to try to correct the interference by one of the following measures e Reorient or relocate the receiving antenna e Increase the separation between the equipment and receiver e Connect the equipment into an outlet on a circuit different from that to which the receiver is connected e Consult the dealer or an experienced radio TV technician for help To assure continued compliance any changes or modifications not expressly approved by the party responsible for compliance could void the user s authority to operate this equipment Example use only shielded interface cables when connecting to computer or peripheral devices FCC Radiation Exposure Statement This equipment complies with FCC RF radiation exposure limits set forth for an uncontrolled environment This equipment should be installed and operated with a minimum distance of 20 centimeters between the radiator and your body This device complies with Part 15 of the FCC Rules Operation is subject to the following two conditions 1 This device may not cause harmful interference and 2 this device must accept any interference received including interference that may cause undesired operation This transmitter must not be co located or operating in conjunction with any other antenna or transmitter 82 Appendix B Troubleshooting Overview This chapter covers some common problems that may be encountered while using the
64. h only one 1 AP at any time Disassociation The number of Disassociation packets received Disassociation breaks the existing connection between the AP and the client Reassociation The number of Reassociation packets received Reassociation is the service that enables an established association between AP and client to be transferred from one AP to another or the same AP Wireless MSDU Number of valid Data packets transmitted to or received from Wireless Stations at application level Data Number of valid Data packets transmitted to or received from Wireless Stations at driver level 64 Operation and Status Multicast Packets Number of Broadcast packets transmitted to or received from Wireless Stations using Multicast transmission Management Number of Management packets transmitted to or received from Wireless Stations Control Number of Control packets transmitted to or received from Wire less Stations 65 Wireless Access Point User Guide Profile Status The Profile Status screen is displayed when the Profile Status button on the Status screen is clicked Name SSID eer Security Band Status Clients wireless wireless Enable one 24 GHz Enabled 1 Profile02 wireless Disable None 24 GHz Disabled O Profile03 wireless Disable None 2 4 GHz Disabled 0 Profile04 wireless Disable None 2 4 GHz Disabled O IProfile05 wireless Disable one 24 GHz Disabled
65. he wireless station and click the Add button gt gt Delete a Trusted Wireless Station from the list move to the Other Stations list e Select an entry or entries in the Trusted Stations list e Click the gt gt button Select All Select all of the Stations listed in the Other Stations list Select None De select any Stations currently selected in the Other Stations list 15 Wireless Access Point User Guide Edit To change an existing entry in the Trusted Stations list select it and click this button 1 Select the Station in the Trusted Station list 2 Click the Edit button The address will be copied to the Address field and the Add button will change to Update 3 Edit the address MAC or physical address as required 4 Click Update to save your changes Add To add a Trusted Station which is not in the Other Wireless Stations list enter the required data and click this button Clear Clear the Name and Address fields Security Profiles Security Profiles contain the SSID and all the security settings for Wireless connections to this Access Point e Up to eight 8 Security Profiles can be defined s Up to four 4 Security Profiles can be enabled at one time allowing up to 4 different SSIDs to be used simultaneously Profiles Primary Profile Isolation Profile Name SSID Security Band None 2 4 G Profile02 wireless None
66. ick the Configure button to configure this feature if required UAM The current status is displayed Click the Configure button to configure this feature if required 34 Setup Click System on the menu to view a screen like the following EL Access Point Name Sco00012 Description Country or Domain E Select One MAC Address 00 C0 02 00 00 12 IA CPICEEN c DHCP Client C Fixed IP Address IPaddress 172 s 191 Subnet Mask 255 e m Gateway 172 3 DNS 172 13 2 MESE Enable WINS WINS Server Name IP Address 172 31 2 239 Cancel Help Figure 20 System Screen Data System Screen Identification Access Point Enter a suitable name for this Access Point Name Description If desired you can enter a description for the Access Point Country Domain Select the country or domain matching your current location IP Address DHCP Client Select this option if you have a DHCP Server on your LAN and you wish the Access Point to obtain an IP address automatically Fixed If selected the following data must be entered s IP Address The IP Address of this device Enter an unused IP address from the address range on your LAN e Subnet Mask The Network Mask associated with the IP Address above Enter the value used by other devices on your LAN e Gateway The IP Address of your Gateway or Router Enter the value used by other devices on your LAN s DNS Enter the DNS Domain Name Server
67. ig File Screen Backup Save a copy of cur rent settings Restore Restore saved settings from a file Once you have the Access Point working properly you should back up the settings to a file on your computer You can later restore the Access Point s settings from this file if necessary To create a backup file of the current settings e Click Back Up e Ifyou don t have your browser set up to save downloaded files automatically locate where you want to save the file rename it if you like and click Save To restore settings from a backup file 1 Click Browse 2 Locate and select the previously saved backup file 3 Click Restore 73 Wireless Access Point User Guide Defaults Revert to factory default settings To erase the current settings and restore the original factory default settings click Set to Defaults button Note e This will terminate the current connection The Access Point will be unavailable until it has restarted e By default the Access Point will act as a DHCP client and automatically obtain an IP address You will need to deter mine its new IP address in order to re connect 74 Other Settings amp Features Log Settings Syslog If you have a Syslog Server on your LAN this screen allows you to configure the Access Point to send log data to your Syslog Server See c Disable C Broadcast C Sendto specified Syslog Server Syslog Server Address Name lP Min
68. ile Security System Security Settings Radius MAC Authentication UAM Profile Name wireless SSID vi reless Wireless Band 24 GHz lt Wireless Security System V WEP Data Encryption ea bit z Authentication Open System J WEP Keys Keyinput Hex 0 9and A F ASCII Key te Kev 7 6 Key 3 C Kev d 0 Passphase Current Status Disabled Configure Current Status Disabled Configure Back L Save _Cancel Help Figure 16 WEP Wireless Security 25 Wireless Access Point User Guide Data WEP Screen WEP Data Select the desired option and ensure your Wireless stations have the Encryption same setting e 64 Bit Encryption Keys are 10 Hex 5 ASCII characters s 128 Bit Encryption Keys are 26 Hex 13 ASCII characters e 152 Bit Encryption Keys are 32 Hex 16 ASCII characters Authentication Normally you can leave this at Automatic so that Wireless Stations can use either method Open System or Shared Key If you wish to use a particular method select the appropriate value Open System or Shared Key All Wireless stations must then be set to use the same method Key Input Select Hex or ASCII depending on your input method All keys are converted to Hex ASCII input is only for convenience Key Value Enter the key values you wish to use The default key selected by the radio button is required The other keys are optional Other stations
69. imum Severity Level 3 Error Cancel Help Figure 57 Log Settings Syslog Screen Data Log Settings Screen Syslog Server Select the desired Option e Disable Syslog server is not used e Broadcast Syslog data is broadcast Use this option if different PCs act as the Syslog server at different times e Send to specified Syslog Server Select this if the same PC is always used as the Syslog server If selected you must enter the server address in the field provided Syslog Server Address Enter the name or IP address of your Syslog Server Minimum Severity Level Select the desired severity level Events with a severtiy level equal to or higher i e lower number than the selected level will be logged 75 Wireless Access Point User Guide A Rouge AP is an Access Point which should not be in use and so can be considered to be providing unauthorized access to your LAN This Access Point can assist to locate 2 types of Rogue APs s APs which have Wireless security disabled e APs which are not in the list of valid APs which you have provided When a Rogue AP is located it is recorded in the log If using SNMP you can also choose to have detection of a Rogue AP generate an SNMP trap ELE Enable Rogue AP Detection Detection 4 GHz band Y every 3 minutes 3 99 F Detection generates SNMP Trap Detect Now M No Security EE NE I Notin Legal AP List Define Legal AP List Can
70. lick this to open a sub window which displays further details about each security profile Log Click this to open a sub window where you can view the activity log Stations Click this to open a sub window where you can view the list of all current Wireless Stations using the Access Point 63 Wireless Access Point User Guide Statistics Screen This screen is displayed when the 2 4GHz Statistics button on the Status screen is clicked It shows details of the traffic flowing through the Wireless Access Point Up Time 2 4GHz Wireless 00 07 39 Authentication Deauthentication Association Disassociation Reassociation 0 y 0 0 y Received Transmitted IMSDU 0 3418 Data 0 3050 Multicast 0 3061 Management 46154 485 Control 0 0 Refresh Figure 50 Statistics Screen Data Statistics Screen System Up Time System Up Time This indicates how long the system has been running since the last restart or reboot 2 4GHz Wireless Authentication The number of Authentication packets received Authentication is the process of identification between the AP and the client Deauthentication The number of Deauthentication packets received Deauthentica tion is the process of ending an existing authentication relationship Association The number of Association packets received Association creates a connection between the AP and the client Usually clients associ ate wit
71. lp Qe x a A Search J Favorites media e Address S http 192 168 0 2 certsrv certfnsh asp Microsoft Certificate Serv Certificate Issued The certificate you requested was issued to you Install this certificate Figure 43 Certificate Issued Screen You will receive a confirmation message Click Yes 57 Wireless Access Point User Guide 9 Root Certificate Store Do you want to ADD the following certificate to the Root Store Subject WirelessCA Systems Wireless Widgets College Park MD US ca yourdomain tld Issuer Self Issued Time Validity Thursday October 11 2001 through Saturday October 11 2003 Serial Number 76E7A8D0 B63756A3 4F77E081 551337C7 Thumbprint sha1 ESEC3FSD BA9B678E 79C055A8 51017043 BE7A0CB7 Thumbprint md5 6F171E64 D438B251 A4242464 CD8E6189 Figure 44 Root Certificate Screen Certificate setup is now complete 802 1x Authentication Setup 1 Open the properties for the wireless connection by selecting Start Control Panel Network Connections Right Click on the Wireless Network Connection and select Properties Select the Authentication Tab and ensure that Enable network access control using IEEE 802 1X is selected and Smart Card or other Certificate is selected from the EAP type Wireless Network Connection Properties PR General Wireless Networks Authentication Advanced Select this option to provide authenticated
72. lues on the Access Point Note On some systems the key sizes may be shown as 40bit 104bit and 128bit instead of 64 bit 128 bit and 152bit This difference arises be cause the key input by the user is 24 bits less than the key size used for encryption PC and Server Configuration Using WPA PSK For each of the following items each Wireless Station must have the same settings as the Wireless Access Point Mode On each PC the mode must be set to Infrastructure SSID ESSID This must match the value used on the Wireless Access Point The default value is wireless Note The SSID is case sensitive Wireless On each client Wireless security must be set to WPA PSK Security e The Pre shared Key entered on the Access Point must also be entered on each Wireless client e The Encryption method e g TKIP AES must be set to match the Access Point 43 Wireless Access Point User Guide Using WPA 802 1x This is the most secure and most complex system 802 1x mode provides greater security and centralized management but it is more complex to configure Wireless Station Configuration For each of the following items each Wireless Station must have the same settings as the Wireless Access Point Mode On each PC the mode must be set to Infrastructure SSID ESSID This must match the value used on the Wireless Access Point The default value is wireless Note The SSID is case sensiti
73. n AP Client Repeater AP Peer to Peer Bridge Point to Multi Point Bridge Bridge mode can be used simultaneously with Common AP mode Security Open shared WPA and WPA PSK authentication 802 1x support EAP TLS EAP TTLS PEAP Block inter wireless station communication Block SSID broadcast Management Web based configuration RADIUS Accounting RADIUS On feature RADIUS Accounting update CLI Message Log Access Control list file support Configuration file Backup Restore Statistics support Device discovery program Windows Utility Other Features DHCP client WINS client Rogue AP detection Auto config Auto firmware update Firmware Upgrade HTTP FTP network protocol download 81 Wireless Access Point User Guide FCC Statement This equipment has been tested and found to comply with the limits for a Class B digital device pursuant to Part 15 of the FCC Rules These limits are designed to provide reasonable protection against harmful interference in a residential installation This equipment generates uses and can radiate radio frequency energy and if not installed and used in accordance with the instructions may cause harmful interference to radio communica tions However there is no guarantee that interference will not occur in a particular installation If this equipment does cause harmful interference to radio or television reception which can be determined by turning the equipment o
74. nections all other traffic is ignored If the user has not been authenticated Internet access is blocked and the user is re directed to another web page Typically this web page is on your Web server and explains how to pay for and obtain Internet access To use UAM you need a Radius Server for Authentication The Radius Server Setup must be completed before you can use UAM The required setup depends on whether you are using Internal or External authentication e Internal authentication uses the web page built into the Wireless Access Point e External authentication uses a web page on your Web server Generally you should use External authentication as this allows you to provide relevant and helpful information to users UAM authentication Internal 1 Ensure the Wireless Access Point can login to your Radius Server e Adda RADIUS client on RADIUS server using the IP address or name of the Wire less Access Point and the same shared key as entered on the Wireless Access Point e Ensure the Wireless Access Point has the correct address port number and shared key for login to your Radius Server These parameters are entered either on the Secu rity page or the UAM sub screen depending on the security method used Add users on your RADIUS server as required and allow access by these users 3 Client PCs must have the correct Wireless settings in order to associate with the Wireles Access Point 4 When an associate
75. network access for wired and wireless Ethernet networks Enable network access control using IEEE 802 1 EAP type 7 Lard of other Cettific ate Authenticate as computer when computer information is available C Authenticate as guest when user or computer information is unavailable Figure 45 Authentication Tab Encryption Settings The Encryption settings must match the APs Access Points on the Wireless network you wish to join Windows XP will detect any available Wireless networks and allow you to configure each network independently 58 PC and Server Configuration e Your network administrator can advise you of the correct settings for each network 802 1x networks typically use EAP TLS This is a dynamic key system so there is no need to enter key values Enabling Encryption To enable encryption for a wireless network follow this procedure 1 Click on the Wireless Networks tab 4 Wireless Network Connection Properties PR ERE General Wireless Networks Authentication Advanced Use Windows to configure my wireless network settings Available networks To connect to an available network click Configure i misslairA L rest a nes Preferred networks Automatically connect to available networks in the order listed below T umd Move up L misslair amp misslair Learn about setting up wireless network configuration Figure 46 Wireless Networks Sc
76. nput by the user is 24 bits less than the key size used for encryption 61 Chapter 5 Operation and Status This Chapter details the operation of the Wireless Access Point and the status screens Operation Once both the Wireless Access Point and the PCs are configured operation is automatic However you may need to perform the following operations on a regular basis e If using the Access Control feature update the Trusted PC database as required See Access Control in Chapter 3 for details e If using 802 1x mode update the User Login data on the Windows 2000 Server and configure the client PCs as required Use the Status link on the main menu to view this screen tt 923 Access Point Name MAC Address Domain Firmware Version IP Address Subnet Mask Gateway DHCP Client TCPIIP WS Channel Frequency Wireless Mode AP Mode Bridge Mode SC000012 00 C0 02 00 00 12 Unspecified Version 2 0 Release 09 172 31 2 191 255 255 2550 172 31 2 252 Enabled 1 Automatic 802 11b and 802 11g Access Point None disable 2 4 GHz Statistics Security Profiles Name SSID Status wireless wireless Enabled Profile02 wireless Disabled Profile03 wireless Disabled Profile04 wireless Disabled Profile05 wireless Disabled Profile06 wireless Disabled Profile07 wireless Disabled Profile08 wireless Disabled Pr
77. nt and establish a connection to the Access Point e g Telnet 192 168 0 228 You will be prompted for the user name and password Enter the same login name and password as used for the HTTP Web interface The default values are admin for the User Name and password for the Password Once connected you can use any of the commands listed in the following Command Reference Using the CLI Serial Port 1 Use a standard serial port cable to connect your PC to the serial RS232 port on the Wireless Access point Start your communications program For example in Windows use HyperTerminal This program may not be installed If so you can install it using Start Settings Control Panel Add or Remove Programs Then select Windows Setup or Add Remove Windows Com ponents depending on your version of Windows Configure the connection properties e Name use a suitable name such as AP e Port or Connect Using Select the Serial Port that the cable is connected to Do not select your modem e Port Settings Use 9600 N 8 1 with hardware flow control as shown below 96 Appendix C Windows TCP IP COM2 Properties Hardware Figure 70 CLI Port Settings 4 Use the Connect command to start the connection 5 You will be prompted for a user name and password Enter the current user name and password for the AP you are connecting to The default values are admin for
78. nt the keys to be updated regularly This field determines how often the Group key is dynamically updated Enter the desired value If enabled the Group key will be updated whenever any member leaves the group or disassociates from the Access Point Radius MAC The current status is displayed This will always be Disabled Authentication because Radius MAC Authentication is not available with WPA PSK The Configure button for this feature will also be disabled UAM The current status is displayed This will always be Disabled because UAM is not available with WPA PSK The Configure button for this feature will also be disabled 28 Setup Security Settings WPA 802 1x This version of WPA requires a Radius Server on your LAN to provide the client authentica tion according to the 802 1x standard Data transmissions are encrypted using the WPA standard If this option is selected e This Access Point must have a client login on the Radius Server s Each user must have a user login on the Radius Server Normally a Certificate is used to authenticate each user See Chapter 4 for details of user configuration e Each user s wireless client must support 802 1x e All data transmission is encrypted using the WPA standard Keys are automatically generated so no key input is required RAU Profile Name wireless SSID wireless Wireless Band 24 GHz B B Wireless Security System VSE System ELSE WPA
79. nttime 2004 Jan 1 04 54 36 GMT oo 21 21 27 27 38 38 38 38 07 07 07 28 28 28 31 31 36 36 47 47 47 475 DO GMT AP activated 0i GMT 00 04 23 73 19 61 authenticated 01 GMT 00 04 23 73 19 61 associated 32 GMT 00 C0 02 03 05 66 authenticated 32 GMT 00 C0 02 03 05 66 associated 35 GMT 00 04 23 73 19 61 disconnected Idle Timeout 35 GMT 00 04 23 73 19 61 disassociated 36 GMT 00 04 23 73 19 61 authenticated 36 GMT 00 04 23 73 19 61 associated 30 GMT 00 04 23 73 19 61 disassociated 49 GMT 00 04 23 73 19 61 authenticated 49 GMT 00 04 23 73 19 61 associated 22 GMT 00 0C 43 71 01 12 authenticated 22 GMT 00 0C 43 71 01 12 associated 45 GMT 00 0C 43 71 01 12 disassociated 23 GMT 00 0E 35 09 4D 65 authenticated 23 GMT 00 0E 35 09 4D 65 associated 34 GMT 00 0E 35 09 4D 65 disconnected Idle Timeout 34 GMT 00 0E 35 09 4D 65 disassociated 26 GMT 00 04 23 73 19 61 disconnected Idle Timeout 26 GMT 00 04 23 73 19 61 disassociated 26 GMT 00 04 23 73 19 61 authenticated 26 GMT 00 04 23 73 19 61 associated Refresh Save to File Clear Log Figure 52 Activity Log Screen The system date and time is displayed Log Buttons Refresh The Log shows details of the connections to the Wireless Access Point Update the data on screen Save to file Save the log to a file on your pc Clear Log This will delete all data currently in th
80. ofile Status Log Stations Help Figure 49 Status Screen 62 Data Status Screen Access Point Access Point Name Operation and Status The current name will be displayed MAC Address The MAC physical address of the Wireless Access Point Domain The region or domain as selected on the System screen Firmware Version The version of the firmware currently installed TCP IP IP Address The IP Address of the Wireless Access Point Subnet Mask The Network Mask Subnet Mask for the IP Address above Gateway Enter the Gateway for the LAN segment to which the Wireless Access Point is attached the same value as the PCs on that LAN segment DHCP Client This indicates whether the current IP address was obtained from a DHCP Server on your network It will display Enabled or Disabled Wireless Channel Frequency The Channel currently in use is displayed Wireless Mode The current mode e g 802 11g is displayed AP Mode The current Access Point mode is displayed Bridge Mode The current Bridge mode is displayed Security Profiles Name This displays the current name of each security profile SSID This displays the SSID associated with the profile Status This indicates whether or not the profile is enabled Buttons Statistics Click this to open a sub window where you can view Statistics on data transmitted or received by the Access Point Profile Status C
81. or certificate revocation list Request a certificate O Check on a pending certificate 8B Internet v Figure 40 Wireless CA Screen 5 Select User certificate request and select User Certificate the click Next Microsoft Certificate Services Microsoft Internet Explorer DAR Fie Edit View Favorites Tools Help Qe x E JO search Sg Favorites meda 2 Address amp http 192 168 0 2 certsrv certrqus asp Microsoft Certificate Services Choose Request Type Please select the type of request you would like to make 9 User certificate request O Advanced request 4B Internet Figure 41 Request Type Screen 6 Click Submit 56 8 PC and Server Configuration 4 Microsoft Certificate Services Microsoft Internet Explorer DAR Fie Edit View Favorites Tools Help AN Qs T ix a H Search Sr Favorites Media Address S http 192 168 0 2 certsrvicertrqbi asp type 0 Links gt Microsoft Certificate Services VirelessCA User Certificate Identifying Information All the necessary identifying information has already been collected You may now submit your request More Options gt gt 0 8B Internet Figure 42 Identifying Information Screen A message will be displayed then the certificate will be returned to you Click Install this certificate Microsoft Certificate Services Microsoft Internet Explorer File Edit View Favorites Tools He
82. ork Mask of 255 255 255 0 If your PC s IP address is not compatible with this you must change your PC s IP address to an unused value in the range 192 168 0 1 192 168 0 254 with a Network Mask of 255 255 255 0 See Appendix C Windows TCP IP for details for this procedure 13 Wireless Access Point User Guide Access Control This feature can be used to block access to your LAN by unknown or untrusted wireless stations Click Access Control on the menu to view a screen like the following EUI M Enable Access Control by MAC Address Trusted Stations Mac Address Connected Modify List Read from File Write to File Save Cancel Help Figure 8 Access Control Screen Data Access Control Screen Enable Use this checkbox to Enable or Disable this feature as desired Warning Ensure your own PC is in the Trusted Wireless Stations list before enabling this feature Trusted Stations This table lists any Wireless Stations you have designated as Trusted If you have not added any stations this table will be empty For each Wireless station the following data is displayed e MAC Address the MAC or physical address of each Wire less station e Connected this indicates whether or not the Wireless station is currently associates with this Access Point Buttons Modify List To change the list of Trusted Stations Add Edit or Delete a Wireless Station or Stations click this
83. pace below Adapter PCI Fast Ethernet Adapter Y l Obtain an IP address from a DHCP server C Specify an IP address DK Cancel Apply Figure 65 Windows NT4 0 IP Address 87 Wireless Access Point User Guide 3 Select the network card for your LAN 4 Select the appropriate radio button Obtain an IP address from a DHCP Server or Specify an IP Address as explained below Obtain an IP address from a DHCP Server This is the default Windows settings To operate correctly you need a DHCP server on your LAN Using Specify an IP Address If your PC is already configured for a fixed specified IP address no changes are required The Administrator should configure the Wireless Access Point with a fixed IP address from the same address range used on the PCs 88 Appendix B Troubleshooting Checking TCP IP Settings Windows 2000 1 Select Control Panel Network and Dial up Connection 2 Right click the Local Area Connection icon and select Properties You should see a screen like the following Local Area Connection Properties x General Connect using 89 Siemens SpeedSteam PEI 107100 0 Configure Components checked are used by this connection 8 Client for Microsoft Networks a File and Printer Sharing for Microsoft Networks Internet Protocol TCP IP Install Uninstall Properties Description Transmission Control Protocol Intern
84. r the Certificate Authority and click Next 46 PC and Server Configuration Windows Components Wizard CA Identifying Information Enter information to identify this CA CA name WirelessCA Organization Organization Organizational unit s ystems City Oakland State or province ca Country region us E mail Jed yourdomain td CA description Wireless CA Valid for 2 Years v Expires 21772005 6 39 PM BEES Figure 25 CA Screen 7 Click Next if you don t want to change the CA s configuration data 8 Installation will warn you that Internet Information Services are running and must be stopped before continuing Click Ok then Finish DHCP server configuration 1 Click on the Start Programs Administrative Tools DHCP 2 Right click on the server entry as shown and select New Scope Action view Tree DHCP a Pie Display Statistics Configure the DHCP Server fore a DHCP server can issue IP dresses you must create a scope and orize the DHCP server New Multicast Scope Reconcile All Scopes Authorize cope is a range of IP addresses that is Define User Classes signed to computers requesting a Define Vendor Classes namic IP address Authorization is a Set Predefined Options curity precaution that ensures that only thorized DHCP servers run on your Ak Tasks jtwork View L 0 add a new
85. reen Select the wireless network from the Available Networks list and click Configure 3 Select and enter the correct values as advised by your Network Administrator For example to use EAP TLS you would enable Data encryption and click the checkbox for the setting The key is provided for me automatically as shown below 59 Wireless Access Point User Guide Wireless Network Properties Se x CN Network key Sey format Key length Key index advanced Figure 47 Properties Screen Setup for Windows XP and 802 1x client is now complete 60 PC and Server Configuration Using 802 1x Mode without WPA This is very similar to using WPA 802 1x The only difference is that on your client you must NOT enable the setting The key is pro vided for me automatically Instead you must enter the WEP key manually ensuring it matches the WEP key used on the Access Point Wireless Network Properties Network name S5ID misslair Wireless network key WEP This network requires 4 key for the following Data encryption WEP enabled C Network Authentication Shared mode C The key is provided for me automatically This is a computer to computer ad hoc network wireless access points are not used Figure 48 Properties Screen Note On some systems the 64 bit WEP key is shown as 40 bit and the 128 bit WEP key is shown as 104 bit This difference arises because the key i
86. rent clients can connect to the Wireless Access Point using different SSIDs with different security set tings Multiple SSID Isolation If desired PCs and devices connecting using different SSIDs can be isolated from each other VLAN Support The 802 1Q VLAN standard is supported allowing traffic from differ ent sources to be segmented Combined with the multiple SSID feature this provides a powerful tool to control access to your LAN WEP support Support for WEP Wired Equivalent Privacy is included Both 64 Bit and 128 Bit keys are supported WPA support Support for WPA is included WPA is more secure than WEP and should be used if possible Both TKIP and AES encryption methods are supported 802 1x Support Support for 802 1x mode is included providing for the industrial strength wireless security of 802 1x authentication and authorization Radius Client Support The Wireless Access Point can login to your existing Radius Server as a Radius client Radius MAC Authentication You can centralize the checking of Wireless Station MAC addresses by using a Radius Server Rogue AP Detection The Wireless Access Point can detect unauthorized Rouge Access Points on your LAN Access Control The Access Control feature can check the MAC address of Wireless clients to ensure that only trusted Wireless Stations can use the Wireless Access Point to gain access to your LAN Password protected Configuration Optional password protection is
87. ress of the Wireless Access Point Exit Exit the Management utility program by clicking this button 10 Setup Setup Procedure Select the desired Wireless Access Point Click the Set IP Address button 3 If prompted enter the user name and password The default values are admin for the User Name and password for the Password 4 Ensure the P address Network Mask and Gateway are correct for your LAN Save any changes 5 Click the Web Management button to connect to the selected Wireless Access Point using your Web Browser If prompted enter the User Name and Password again 6 Check the following screens and configure as necessary for your environment Use the online help guide if necessary The latter sections in this Chapter also provide more details about each of these screens e Access Control MAC level access control e Security Profiles Wireless security e System Identification location and Network settings e Wireless Basic amp Advanced 7 You may also wish to set the admin password and administration connection options These are on the Admin Login screen accessed from the Management menu See Chapter 6 for details of the screens and features available on the Management menu 8 Usethe Apply Restart button on the menu to apply your changes and restart the Wireless Access Point Setup is now complete Wireless stations must now be set to match the Wireless Access Point See Chapter
88. rver Address Radius Port 1812 Client Login Name SC123488 Shared Key Save Cancel Help Figure 14 Radius based MAC Authentication Screen Data Radius based MAC Authentication Screen Enable Enable this if you wish to Radius based MAC authentication Radius Server Address If this field is visible enter the name or IP address of the Radius Server on your network Radius Port If this field is visible enter the port number used for connections to the Radius Server Client Login Name If this field is visible it displays the name used for the Client Login on the Radius Server This Login name must be created on the Radius Server Shared Key If this field is visible it is used for the Client Login on the Radius Server Enter the key value to match the value on the Radius Server WEP Key If this field is visible it is for the WEP key used to encrypt data transmissions to the Radius Server Enter the desired key value in HEX and ensure the Radius Server has the same value WEP Key Index If this field is visible select the desired key index Any value can be used provided it matches the value on the Radius Server 22 Setup UAM UAM Universal Access Method is intended for use in Internet cafes Hot Spots and other sites where the Access Point is used to provide Internet Access If enabled then HTTP TCP port 80 connections are checked UAM only works on HTTP con
89. scope on the Action menu Delete k New Scope Refresh o authorize this DHCP server on the Properties tion menu click Authorize Figure 26 DHCP Screen 3 Click Next when the New Scope Wizard Begins 4 Enter the name and description for the scope click Next Help create anew scope 5 Define the IP address range Change the subnet mask if necessary Click Next 47 Wireless Access Point User Guide New Scope Wizard x IP ddress Range You define the scope address range by identifying a set of consecutive IP addresses Enter the range of addresses that the scope distributes Start IP address 192 168 0 100 End IP address 132 168 0 200 A subnet mask defines how many bits of an IP address to use for the network subnet IDs and how many bits to use for the host ID You can specify the subnet mask by length or as an IP address Length 24 Subnet mask 255 255 255 q lt Back Cancel Figure 27 IP Address Screen 6 Add exclusions in the address fields if required If no exclusions are required leave it blank Click Next Change the Lease Duration time if preferred Click Next Select Yes I want to configure these options now and click Next 9 Enter the router address for the current subnet The router address may be left blank if there is no router Click Next 10 For the Parent domain enter the domain you specified for the domain controller setup and
90. sh 53 Wireless Access Point User Guide Remote Access Login for Users 1 Select Start Programs Administrative Tools Active Directory Users and Computers Double click on the user who you want to enable 3 Select the Dial in tab and enable Allow access Click OK alex Properties Terminal Services Profile Exchange General E mail Addresses Exchange Features General Address Account Profile Telephones Organization Member Of Dialin Environment Sessions Remote control r Remote Access Permission Dial in or VPN Allow access C Deny access Control access through Remote Access Policy Verify Galler1D m Callback Options No Callback Set by Caller Routing and Remote Access Service only C Always Callback to Assign a Static IP Address 3 E Apply Static Routes Define routes to enable for this Dial in TOUET connection Cancel Apply Help Figure 38 Dial in Screen PC and Server Configuration 802 1x Client Setup on Windows XP Windows XP ships with a complete 802 1x client implementation If using Windows 2000 you can install SP3 Service Pack 3 to gain the same functionality If you don t have either of these systems you must use the 802 1x client software provided with your wireless adapter Refer to your vendor s documentation for setup instructions The following instructions assume that e You ar
91. t Figure 5 Using PoE Power over Ethernet Chapter 3 Access Point Setup This Chapter provides details of the Setup process for Basic Operation of your Wireless Access Point Overview This chapter describes the setup procedure to make the Wireless Access Point a valid device on your LAN and to function as an Access Point for your Wireless Stations Wireless Stations may also require configuration For details see Chapter 4 Wireless Station Configuration The Wireless Access Point can be configured using either the supplied Windows utility or your Web Browser Setup using the Windows Utilit A simple Windows setup utility is supplied on the CD ROM This utility can be used to assign a suitable IP address to the Wireless Access Point Using this utility is recommended because it can locate the Wireless Access Point even if it has an invalid IP address Installation 1 Insert the supplied CD ROM in your drive 2 Ifthe utility does not start automatically run the SETUP program in the root folder 3 Follow the prompts to complete the installation Main Screen e Start the program by using the icon created by the setup program e When running the program searches the network for all active Wireless Access Points then lists them on screen as shown by the example below Wireless Access Point User Guide BE Access Point Management B Wireless Access Point Management Utility Version 1 1 Wireless Access Points
92. t to Infrastructure mode SSID ESSID BSS SSID A group of Wireless Stations and a single Access Point all using the same ID SSID form a Basic Service Set BSS Using the same SSID is essential Devices with different SSIDs are unable to communi cate with each other However some Access Points allow connections from Wireless Stations which have their SSID set to any or whose SSID is blank null ESS ESSID A group of Wireless Stations and multiple Access Points all using the same ID ESSID form an Extended Service Set ESS Different Access Points within an ESS can use different Channels To reduce interference it is recommended that adjacent Access Points SHOULD use different channels Wireless Access Point User Guide As Wireless Stations are physically moved through the area covered by an ESS they will automatically change to the Access Point which has the least interference or best perform ance This capability is called Roaming Access Points do not have or require Roaming capabilities Channels The Wireless Channel sets the radio frequency used for communication e Access Points use a fixed Channel You can select the Channel used This allows you to choose a Channel which provides the least interference and best performance s If using multiple Access Points it is better if adjacent Access Points use different Chan nels to reduce interference The recommended Channel spacing between adjacent Access
93. t winsserveraddr get wirelessSeparate get description get dhcpmode get wlanstate help Lebradeb ns ping radar reboot rm run quit set 11gonly set 11goptimize set 11goverlapbss 102 set acl set aging set antenna set authentication set autochannelselect set basic11b set basic11g set beaconinterval set burstSeqThreshold set burstTime set calibration set cckTrigHigh set cckTrigLow set cckWeakSigThr set channel set cipher set compproc set compwinsize set countrycode set ctsmode set ctsrate set ctstype set domainsuffix set dtim set enableANI Set encryption Set extendedchanmode Set factorydefault set firStepLvl Set fragmentthreshold set frequency set gateway Appendix C Windows TCP IP Set Data Beacon Rate DTIM Set Radio Frequency MHz Set Gateway IP Address 103 Wireless Access Point User Guide set gbeaconrate set groupkeyupdate set gdraft5 set hostipaddr set ipaddr set ipmask set keyentrymethod set keysource set login set minimumrate set nameaddress set noiselmmunityLvl set ofdmTrigHigh set ofdmTrigLow set ofdmWeakSigDet set overRidetxpower Set operationMode Set password Set passphrase set power set quietAckCtsAllow set quietDuration set quietOffset set radiusname set radiusport set radiussecret set rate set rate set rate set rate set rate set regulatorydomain Set Group Key Update Interval in Seconds
94. the User Name and password for the Password 6 You will then see the prompt and can then use any of the commands listed in the follow ing Command Reference Command Reference The following commands are available fms ress eo o E 97 Wireless Access Point User Guide get 11gonly get 11goptimize get 11goverlapbss get acl get aging get antenna get association get authentication get autochannelselect get basic11b get basic11g get beaconinterval get burstSeqThreshold get burstTime get calibration get cckTrigHigh get cckTrigLow get cckWeakSigThr get channel get cipher get compproc get compwinsize get config get countrycode get ctsmode get ctsrate get ctstype get domainsuffix get dtim get enableANI get encryption get extendedchanmode Display Higher Trigger Threshold for CCK Phy Errors for ANI Control Display Lower Trigger Threshold for CCK Phy Errors for ANI Control Display ANI Parameter for CCK Weak Signal Detection Threshold Display Radio Channel Display Encryption cipher Display Compression scheme Display Current AP Configuration Display Country Code Display CTS mode Display CTS rate Display CTS type Display Domain Name Server suffix Display Compression Window Size Display Data Beacon Rate DTIM Display Adaptive Noise Immunity Control On Off Display Encryption Mode Display Extended Channel Mode 98 get firStepLvl get fragmentthreshold get frequency get gat
95. tificate Request 50 PC and Server Configuration gf Group Policy T me vow gt Blan 2 Tree Default Domain Policy swpa dell2k swpa sercomm com tw P 5 E Computer Configuration a Software Settings B Windows Settings 21 Scripts Startup Shutdown B Security Settings H Account Policies 29 Local Policies E dej Event Log E 9 Restricted Groups ca System Services E 9 Registry 9 File System B Public Key Policies e Encrypted Data Recovery Agents c Rada 4 Trusted Root Certification Authorities ew Automatic Certificate Request Z3 Enterprise Trust B IP Security Policies on Active Directory 1 Administrative Templates B5 c User Configuration H E Software Settings m Windows Settings m Administrative Templates ertificate Request Settings Create a new Automatic Certificate Request object and add it to the Security Configuration Editor Pstart C GB Se Clpbosrdoa m enie Directory Saran Policy ERE ET dedi 2 56 PM Figure 33 Group Policy Screen 8 When the Certificate Request Wizard appears click Next 9 Select Computer then click Next Automatic Certificate Request Setup Wizard x Certificate Template S The next time a computer logs on a certificate based on the template you selectis ESY provided certificate template is a set of predefined properties for certificates issued to computers Select a template from the following list Certific
96. tions and a condition is required select Day And Time Restrictions and click Add Select Attribute x 21 x Select the type of attribute to add and then click the Add button Attribute types Called Station d Phone number dialed by user Calling Station Id Phone number from which call originated Client Friendly Name Friendly name for the RADIUS client IAS Client IP Address IP address of RADIUS client I amp S only Client Vendor Manufacturer of RADIUS proxy or NAS I Day And Time Restrictions Time periods and days of week during wh Framed Protocol The protocol to be used NAS Identifier String identifying the NAS originating the r NAS IP Address IP address of the NAS originating the requ NAS Port Type Type of physical port used by the NAS ori Service Type Type of service user has requested Tunnel Type Tunneling protocols to be used Windows Groups Windows groups that user belongs to Figure 36 Attribute Screen Click Permitted then OK Select Next 10 Select Grant remote access permission Click Next 52 PC and Server Configuration 11 Click Edit Profile and select the Authentication tab Enable Extensible Authentication Protocol and select Smart Card or other Certificate Deselect other authentication meth ods listed Click OK r Edit Dial in Profile Smart Card or other Certificate hi Figure 37 Authentication Screen 12 Select No if you don t want to view the help for EAP Click Fini
97. ve 802 1x Each client must obtain a Certificate which is used for authentication for Authentication the Radius Server 802 1x Typically EAP TLS is used This is a dynamic key system so keys do Encryption NOT have to be entered on each Wireless station However you can also use a static WEP key EAP MD5 the Wireless Access Point supports both methods simultaneously Radius Server Configuration If using WPA 802 1x mode the Radius Server on your network must be configured as follow e It must provide and accept Certificates for user authentication e There must be a Client Login for the Wireless Access Point itself e The Wireless Access Point will use its Default Name as its Client Login name How ever your Radius server may ignore this and use the IP address instead e The Shared Key set on the Security Screen of the Access Point must match the Shared Secret value on the Radius Server e Encryption settings must be correct 44 PC and Server Configuration 802 1x Server Setup Windows 2000 Server This section describes using Microsoft Internet Authentication Server as the Radius Server since it is the most common Radius Server available that supports the EAP TLS authentication method The following services on the Windows 2000 Domain Controller PDC are also required e dhcpd e dns e rras e webserver IIS e Radius Server Internet Authentication Service e Certificate Authority Windows 200
98. xed IP address from the same address range used on the PCs 90 Appendix B Troubleshooting Checking TCP IP Settings Windows XP 1 Select Control Panel Network Connection 2 Rightclick the Local Area Connection and choose Properties You should see a screen like the following 1 Local Area Connection Properties General Authentication Advanced Connect using Bg Siemens SpeedStream PCI 10 100 This connection uses the following items S Client for Microsoft Networks mr File and Printer Sharing for Microsoft Networks dal QoS Packet Scheduler Internet Protocol TCP IP Install Ininstall Properties Description Transmission Control Protocol Intemet Protocol The default wide area network protocol that provides communication across diverse interconnected networks C Show icon in notification area when connected Figure 68 Network Configuration Windows XP 3 Select the TCP IP protocol for your network card Click on the Properties button You should then see a screen like the following Internet Protocol TCP IP Properties a General Altemate Configuration You can get IP settings assigned automatically if your network supports this capability Otherwise you need to ask your network administrator for the appropriate IP settings Obtain DNS server address automatically Use the following DNS server addresses Figure 69 TCP IP
99. ximum Receive Level min 5dBm Transmit Power 18 dBm Modulation Direct Sequence Spread Spectrum BPSK QPSK CCK Throughput Up to 19 Mbps 79 Wireless Access Point User Guide Operating Range 802 11b Indoors e 30 Meters 100ft 11Mbps e 50 Meters 165ft 9 5 5Mbps e 70 Meters 230ft 2Mbps e 9 Meters 300ft 1Mbps Outdoors e 152 Meters 500ft 11Mbps e 270 Meters 885ft 5 5Mbps e 396 Meters 1300ft 2 Mbps e 457 Meters 1500ft 1 Mbps 802 11g Indoors e 30 Meters 98ft 9 54Mbps e 33 Meters 108ft 9 48Mbps e 37 Meters 121ft 9 36Mbps e 46 Meters 151ft 9 24Mbps e 62 Meters 203ft 18Mbps e 68 Meters 223ft 12Mbps e 78 Meters 256ft 9 9Mbps e 92 Meters 302ft 9 6Mbps Outdoors e 100 Meters 328ft 9 54Mbps e 295 Meters 968ft 11Mbps e 420 Meters 1378ft 6 Mbps Software Specifications Feature Details Wireless Access point support Roaming supported IEEE 802 11g 11b compliance Super G up to 108Mbps Auto Sensing Open System Share Key authentication Wireless Channels Support Automatic Wireless Channel Selection Antenna selection Tx Power Adjustment Country Selection Preamble Type long or short support RTS Threshold Adjustment Fragmentation Threshold Adjustment 80 Appendix A Specifications Beacon Interval Adjustment SSID assignment Operation Mode Commo
Download Pdf Manuals
Related Search
Related Contents
Baumatic BTM25SS Convection Microwave Oven im w-410-bagr _revised 取扱説明書 - ソニー製品情報 manual de responsabilidade técnica - CRMV-SP CW-P SERIES PROGRAMMABLE AC POWER SOURCE PROGRESSO - Centrale termice CX E3シリーズ - 三菱電機インフォメーションネットワーク株式会社 Copyright © All rights reserved.
Failed to retrieve file