Edge-Core WA6202AM EU User's Guide

Browse online or download User's Guide for WLAN access points Edge-Core WA6202AM EU. Edge-Core WA6202AM WLAN access point User Manual

  • Download
  • Add to my manuals
  • Print
  • Page
    / 332
  • Table of contents
  • TROUBLESHOOTING
  • BOOKMARKS
  • Rated. / 5. Based on customer reviews

Summary of Contents

Page 1 - Powered by Accton

www.edge-core.comUser GuidePowered by AcctonWA6202AWA6202AM2.4 GHz / 5 GHz Dual Band OutdoorAccess Point / Bridge

Page 2

vi• L’appareil fonctionne à une tension extrêmement basse de sécurité qui est conforme à la norme IEC 60950. Ces conditions ne sont maintenues que si

Page 3 - User Guide

System Configuration6-466Configuring SNMPv3 UsersThe access point allows up to 10 SNMP v3 users to be configured. Each user must be defined by a uniqu

Page 4 - 149100034900E

SNMP6-476CLI Commands for Configuring SNMPv3 Users – Use the snmp-server engine-id command to define the SNMP v3 engine before assigning users to grou

Page 5 - Compliances

System Configuration6-486Configuring SNMPv3 Trap FiltersSNMP v3 users can be configured to receive notification messages from the access point. An SNM

Page 6 - Community

SNMP6-496To add more subtree IDs to the filter, return to the SNMP Trap Filters page and click the Edit button. In the Edit page, click the New button

Page 7

System Configuration6-506CLI Commands for Configuring SNMPv3 Trap Filters – To create a notification filter, use the snmp-server filter command from t

Page 8 - Safety Compliance

SNMP6-516When you click on the New or Edit button in the SNMP Targets page, a new page opens where the target parameters are configured. Define the pa

Page 9 - Power Cord Set

System Configuration6-526Radio InterfaceThe IEEE 802.11a and 802.11g interfaces include configuration options for radio signal characteristics and wir

Page 10

Radio Interface6-536Radio Settings A (802.11a)The IEEE 802.11a interface operates within the 5 GHz band, at up to 54 Mbps in normal mode or up to 108

Page 11 - (Germany):

System Configuration6-546Configuring VAP Radio SettingsTo configure VAP radio settings, select the Radio Settings page.

Page 12 - <BASEC> tragen

Radio Interface6-556Default VLAN ID – The VLAN ID assigned to wireless clients associated to the VAP interface that are not assigned to a specific VLA

Page 13 - Table of Contents

viiBitte unbedingt vor dem Einbauen des Geräts die folgenden Sicherheitsanweisungen durchlesen (Germany):WARNUNG: Die Installation und der Ausbau des

Page 14

System Configuration6-566CLI Commands for the Configuring the VAPs – From the global configuration mode, enter the interface wireless a command to acc

Page 15

Radio Interface6-576The access point can be configured to periodically scan all radio channels and find other access points within range. A database o

Page 16

System Configuration6-586using the rogue-ap scan command. To view the database of detected access points, use the show rogue-ap command from the Exec

Page 17

Radio Interface6-596Configuring Common Radio SettingsTo configure common radio settings, select the Radio Settings page, and scroll down to below the

Page 18

System Configuration6-606Radio Channel – The radio channel that the access point uses to communicate with wireless clients. When multiple access point

Page 19

Radio Interface6-616are within regulatory power limits for the country of operation. (Default: Integrated antenna; ID: 0000. If there is no integrated

Page 20

System Configuration6-626Antenna Location – Selects the mounting location of the antenna in use; either “Indoor” or “Outdoor.” Selecting the correct l

Page 21 - Chapter 1: Introduction

Radio Interface6-636try setting the fragment size to send smaller fragments. This will speed up the retransmission of smaller frames. However, it is m

Page 22 - Hardware Description

System Configuration6-646CLI Commands for the Common Radio Settings – From the global configuration mode, enter the interface wireless a command to ac

Page 23 - LED Indicators

Radio Interface6-656types of traffic, WMM allows the priority levels to be configured to match any network-wide QoS policy. WMM also specifies a proto

Page 24 - Introduction

viiiStromkabel. Dies muss von dem Land, in dem es benutzt wird geprüft werden: U.S.A und Canada Der Cord muß das UL gepruft und war das CSA beglaubigt

Page 25 - External Antenna Options

System Configuration6-666Figure 6-1. WMM Backoff Wait TimesFor high-priority traffic, the AIFSN and CW values are smaller. The smaller values equate

Page 26 - Power Injector Module

Radio Interface6-676WMM – Sets the WMM operational mode on the access point. When enabled, the parameters for each AC queue will be employed on the ac

Page 27 - Water Tight Test Point

System Configuration6-686CLI Commands for WMM – Enter interface wireless mode and type wmm required for clients that want to associate with the access

Page 28 - Features and Benefits

Radio Interface6-696To view the current 802.11a radio settings for the VAP interface, use the show interface wireless a [0-3] command.Enterprise AP#sh

Page 29 - Access Point Topologies

System Configuration6-706Radio Settings G (802.11g)The IEEE 802.11g standard operates within the 2.4 GHz band at up to 54 Mbps. Also note that because

Page 30 - Infrastructure Wireless LAN

Radio Interface6-716Most of the 802.11g commands are identical to those used by the 802.11a interface. For information on the these commands, refer to

Page 31

System Configuration6-726Radio Channel – The radio channel that the access point uses to communicate with wireless clients. When multiple access point

Page 32 - Point-to-Point Configuration

Radio Interface6-736CLI Commands for the 802.11g Wireless Interface – From the global configuration mode, enter the interface wireless g command to ac

Page 33 - Bridge Link Topologies

System Configuration6-746A summary of wireless security considerations is listed in the following table.Note: You must enable data encryption through

Page 34 - Network Configuration

Radio Interface6-756The access point can simultaneously support clients using various different security mechanisms. The configuration for these secur

Page 35 - Data Rates

ixTable of ContentsChapter 1: Introduction 1-1Radio Characteristics 1-1Package Checklist 1-2Hardware Description 1-2LED Indicators 1-3Integrated

Page 36 - Antenna Height

System Configuration6-766Dynamic WEP and 802.1x WPAInterface Detail Settings:Authentication: WPAEncryption: EnableWPA Configuration: SupportedCipher S

Page 37

Radio Interface6-776Note: If you choose to configure RADIUS MAC authentication together with 802.1X, the RADIUS MAC address authentication occurs prio

Page 38 - Bridge Link Planning

System Configuration6-786Enable – Enables radio communications on the VAP interface. (Default: Disabled)Note: You must first enable VAP interface 0 be

Page 39 - Weather Conditions

Radio Interface6-796• Alphanumeric: Enter keys as 5 alphanumeric characters for 64 bit keys, 13 alphanumeric characters for 128 bit keys, or 16 alphan

Page 40 - Grounding

System Configuration6-806Note: To use 802.1X on wireless clients requires a network card driver and 802.1X client software that supports the EAP authe

Page 41 - Mount the Unit

Radio Interface6-816Enterprise AP(config)#interface wireless g 7-88Enter Wireless configuration commands, one per line.Enterprise AP(if-wireless g)#ke

Page 42 - Mounting on a Pole

System Configuration6-826CLI Commands for WEP over 802.1X Security – Use the vap command to access each VAP interface to configure the security settin

Page 43

Radio Interface6-836to enable data encryption. To view the current security settings, use the show interface wireless a [0-3] or show interface wirele

Page 44 - Mounting to a Wall

System Configuration6-846the access point and all wireless clients. The PSK mode uses the same TKIP packet encryption and key management as WPA in the

Page 45 - Connect External Antennas

Radio Interface6-856information form a Security Association that the access point names and holds in a cache. • Preauthentication: Each time a client

Page 46 - Connect Cables to the Unit

xContentsMounting to a Wall 4-4Connect External Antennas 4-5Connect Cables to the Unit 4-6Connect the Power Injector 4-7Align Antennas 4-8Chapter

Page 47 - Grounding Screw

System Configuration6-866The WPA configuration parameters are described below:Encryption – You must enable data encryption in order to enable all type

Page 48 - Align Antennas

Radio Interface6-876The configuration settings for WPA are summarized below:CLI Commands for WPA Using Pre-shared Key Security – From the VAP interfac

Page 49

System Configuration6-886CLI Commands for WPA Over 802.1X Security – From the VAP interface configuration mode, use the auth wpa required command to s

Page 50 - Hardware Installation

Radio Interface6-896Open the Security page, and click More for one of the VAP interfaces.You can enable 802.1X as optionally supported or as required

Page 51 - Required Connections

System Configuration6-906CLI Commands for 802.1X Authentication – Use the 802.1X supported command from the VAP interface mode to enable 802.1X authen

Page 52 - Initial Configuration Steps

Status Information6-916AP System Configuration – The AP System Configuration table displays the basic system configuration settings:• System Up Time:

Page 53 - Logging In

System Configuration6-926• Bootrom Version: Show the bootrom version number.• Hardware Version: Shows the hardware version number.AP Wireless Configur

Page 54 - Initial Configuration

Status Information6-936Station StatusThe Station Status window shows the wireless clients currently associated with the access point.The Station Confi

Page 55

System Configuration6-946• Static – The client is using static WEP keys for encryption.CLI Commands for Displaying Station Status – To view status of

Page 56 - Advanced Configuration

Status Information6-956Event LogsThe Event Logs window shows the log messages generated by the access point and stored in memory.The Event Logs table

Page 57 - System Identification

xiContentsChapter 7: Command Line Interface 7-1Using the Command Line Interface 7-1Accessing the CLI 7-1Console Connection 7-1Telnet Connection 7

Page 58

System Configuration6-966CLI Commands for Displaying the Logging Status – From the global configuration mode, use the show logging command.CLI Command

Page 59 - TCP / IP Settings

Status Information6-976STP StatusThe STP Status window shows the STP status for each port.• ID: Displays the port ID number.• Priority: The priority d

Page 60

System Configuration6-986

Page 61

7-1Chapter 7: Command Line InterfaceUsing the Command Line InterfaceAccessing the CLIWhen accessing the management interface for the over a direct con

Page 62

Command Line Interface7-27If your corporate network is connected to another network outside your office or to the Internet, you need to apply for a re

Page 63

Entering Commands7-37Command CompletionIf you terminate input with a Tab key, the CLI will print the remaining characters of a partial keyword up to t

Page 64

Command Line Interface7-47Partial Keyword LookupIf you terminate a partial keyword with a question mark, alternatives that match the initial letters a

Page 65 - SSH Settings

Entering Commands7-57Exec CommandsWhen you open a new console session on an access point, the system enters Exec command mode. Only a limited number o

Page 66 - Authentication

Command Line Interface7-67Command Line ProcessingCommands are not case sensitive. You can abbreviate commands and parameters as long as they contain e

Page 67

General Commands7-77The access mode shown in the following tables is indicated by these abbreviations: Exec (Executive Mode), GC (Global Configuration

Page 68

xiiContentsshow version 7-24show config 7-24show hardware 7-28System Logging Commands 7-28logging on 7-29logging host 7-29logging console 7-30l

Page 69

Command Line Interface7-87configureThis command activates Global Configuration mode. You must enter this mode to modify most of the settings on the ac

Page 70

General Commands7-97Example This example shows how to return to the Exec mode from the Interface Configuration mode, and then quit the CLI session:pin

Page 71 - Filter Control

Command Line Interface7-107resetThis command restarts the system or restores the factory default settings.Syntax reset <board | configuration> •

Page 72

System Management Commands7-117show lineThis command displays the console port’s configuration settings.Command Mode ExecExampleThe console port setti

Page 73

Command Line Interface7-127countryThis command configures the access point’s country code, which identifies the country of operation and sets the auth

Page 74

System Management Commands7-137Default Setting US - for units sold in the United States99 (no country set) - for units sold in other countriesCommand

Page 75 - WDS Settings

Command Line Interface7-147• The available Country Code settings can be displayed by using the country ? command.Example promptThis command customizes

Page 76

System Management Commands7-157Command Mode Global ConfigurationExample usernameThis command configures the user name for management access.Syntax use

Page 77

Command Line Interface7-167ip ssh-server enable This command enables the Secure Shell server. Use the no form to disable the server.Syntax ip ssh-serv

Page 78

System Management Commands7-177ip telnet-server enable This command enables the Telnet server. Use the no form to disable the server.Syntax ip telnet-

Page 79

xiiiContentsdelete 7-57dir 7-58show bootfile 7-58RADIUS Client 7-59radius-server address 7-59radius-server port 7-60radius-server key 7-60radius-

Page 80

Command Line Interface7-187ip http serverThis command allows this device to be monitored or configured from a browser. Use the no form to disable this

Page 81 - AP Management

System Management Commands7-197ip https portUse this command to specify the UDP port number used for HTTPS/SSL connection to the access point’s Web in

Page 82 - Administration

Command Line Interface7-207Syntax ip https serverno ip https serverDefault Setting EnabledCommand Mode Global ConfigurationCommand Usage • Both HTTP a

Page 83 - Upgrading Firmware

System Management Commands7-217APmgmtIPThis command specifies the client IP addresses that are allowed management access to the access point through v

Page 84

Command Line Interface7-227APmgmtUIThis command enables and disables management access to the access point through SNMP, Telnet and web interfaces.Cau

Page 85

System Management Commands7-237show systemThis command displays basic system configuration settings.Default SettingNoneCommand Mode ExecExampleEnterpr

Page 86

Command Line Interface7-247show versionThis command displays the software version for the system.Command Mode ExecExample show configThis command disp

Page 87 - System Log

System Management Commands7-257Hardware Version Information===========================================Hardware version R01A===========================

Page 88

Command Line Interface7-267Logging Information=====================================================Syslog State : DisabledLogging Consol

Page 89 - Configuring SNTP

System Management Commands7-277 dot11InterfaceAGFail Enabled dot11InterfaceBFail Enabled dot11StationAssociation Enabled dot11Sta

Page 90

xivContentsbridge stp forwarding-delay 7-84bridge stp hello-time 7-84bridge stp max-age 7-85bridge stp priority 7-85bridge-link path-cost 7-86bri

Page 91

Command Line Interface7-287show hardwareThis command displays the hardware version of the system.Command Mode ExecExample System Logging CommandsThese

Page 92

System Logging Commands7-297logging onThis command controls logging of error messages; i.e., sending debug or error messages to memory. The no form di

Page 93

Command Line Interface7-307Example logging consoleThis command initiates logging of error messages to the console. Use the no form to disable logging

Page 94

System Logging Commands7-317Command Usage Messages sent include the selected level down to Emergency level.Example logging facility-typeThis command s

Page 95

Command Line Interface7-327Command Usage The command specifies the facility type tag sent in syslog messages. (See RFC 3164.) This type has no effect

Page 96

System Clock Commands7-337show event-logThis command displays log messages stored in the access point’s memory.Syntaxshow event-logCommand Mode ExecEx

Page 97

Command Line Interface7-347sntp-server ipThis command sets the IP address of the servers to which SNTP time requests are issued. Use the this command

Page 98

System Clock Commands7-357Command Mode Global ConfigurationCommand Usage The time acquired from time servers is used to record accurate dates and time

Page 99

Command Line Interface7-367sntp-server daylight-savingThis command sets the start and end dates for daylight savings time. Use the no form to disable

Page 100 - Configuring SNMPv3 Users

System Clock Commands7-377Command Usage This command sets the local time zone relative to the Coordinated Universal Time (UTC, formerly Greenwich Mean

Page 101

xvContentsrogue-ap authenticate 7-115rogue-ap duration 7-116rogue-ap interval 7-116rogue-ap scan 7-117show rogue-ap 7-118Wireless Security Comman

Page 102 - System Configuration

Command Line Interface7-387DHCP Relay CommandsDynamic Host Configuration Protocol (DHCP) can dynamically allocate an IP address and other configuratio

Page 103

DHCP Relay Commands7-397dhcp-relayThis command configures the primary and secondary DHCP server addresses.Syntaxdhcp-relay <primary | secondary>

Page 104 - Configuring SNMPv3 Targets

Command Line Interface7-407SNMP CommandsControls access to this access point from management stations using the Simple Network Management Protocol (SN

Page 105

SNMP Commands7-417snmp-server communityThis command defines the community access string for the Simple Network Management Protocol. Use the no form to

Page 106 - Radio Interface

Command Line Interface7-427Command Mode Global ConfigurationExample Related Commandssnmp-server location (7-42)snmp-server locationThis command sets t

Page 107 - Radio Settings A (802.11a)

SNMP Commands7-437Command Mode Global ConfigurationCommand Usage • This command enables both authentication failure notifications and link-up-down not

Page 108

Command Line Interface7-447Command Usage The snmp-server host command is used in conjunction with the snmp-server enable server command to enable SNMP

Page 109

SNMP Commands7-457- iappStationRoamedTo - A client station has roamed to another access point (identified by its IP address).- localMacAddrAuthFail -

Page 110

Command Line Interface7-467Command Mode Global ConfigurationCommand Usage • This command is used in conjunction with the snmp-server user command. • E

Page 111

SNMP Commands7-477- RWAuth - A read/write group using authentication, but no data encryption. Users in this group send SNMP messages that use an MD5 k

Page 113

xviContentsAppendix C: Specifications C-1General Specifications C-1Sensitivity C-4Transmit Power C-5Antenna Specifications C-618 dBi High Gain Di

Page 114 - Turbo Mode

Command Line Interface7-487snmp-server targetsThis command configures SNMP v3 notification targets. Use the no form to delete an SNMP v3 target.Syntax

Page 115

SNMP Commands7-497snmp-server filterThis command configures SNMP v3 notification filters. Use the no form to delete an SNMP v3 filter or remove a subt

Page 116

Command Line Interface7-507snmp-server filter-assignmentsThis command assigns SNMP v3 notification filters to targets. Use the no form to remove an SN

Page 117

SNMP Commands7-517Example show snmp usersThis command displays the SNMP v3 users and settings.Syntax show snmp usersCommand ModeExecExample show snmp

Page 118 - Configuring Wi-Fi Multimedia

Command Line Interface7-527Example show snmp targetThis command displays the SNMP v3 notification target settings.Syntaxshow snmp targetCommand Mode E

Page 119

SNMP Commands7-537show snmp filter-assignmentsThis command displays the SNMP v3 notification filter assignments.Syntaxshow snmp filter-assignmentsComm

Page 120

Command Line Interface7-547show snmpThis command displays the SNMP configuration settings.Command Mode ExecExampleEnterprise AP#show snmpSNMP Informat

Page 121

Flash/File Commands7-557Flash/File CommandsThese commands are used to manage the system code or configuration files.bootfileThis command specifies the

Page 122

Command Line Interface7-567copy This command copies a boot file, code image, or configuration file between the access point’s flash memory and a FTP/T

Page 123

Flash/File Commands7-577The following example shows how to download a configuration file: deleteThis command deletes a file or image.Syntaxdelete <

Page 124 - Radio Settings G (802.11g)

1-1Chapter 1: IntroductionThe Dual-band Outdoor Access Point / Bridge system consists of two models that provide point-to-point or point-to-multipoint

Page 125

Command Line Interface7-587dirThis command displays a list of files in flash memory.Command Mode ExecCommand Usage File information is shown below:Exa

Page 126

RADIUS Client7-597RADIUS ClientRemote Authentication Dial-in User Service (RADIUS) is a logon authentication protocol that uses software running on a

Page 127 - Security

Command Line Interface7-607Command Mode Global ConfigurationExample radius-server portThis command sets the RADIUS server network port. Syntaxradius-s

Page 128

RADIUS Client7-617radius-server retransmitThis command sets the number of retries. Syntaxradius-server [secondary] retransmit number_of_retries• secon

Page 129

Command Line Interface7-627radius-server port-accountingThis command sets the RADIUS Accounting server network port. Syntaxradius-server [secondary] p

Page 130

RADIUS Client7-637Example radius-server radius-mac-formatThis command sets the format for specifying MAC addresses on the RADIUS server.Syntaxradius-s

Page 131 - Enabling the VAPs

Command Line Interface7-647show radiusThis command displays the current settings for the RADIUS server.Default SettingNoneCommand Mode ExecExample Ent

Page 132

802.1X Authentication7-657802.1X AuthenticationThe access point supports IEEE 802.1X access control for wireless clients. This control feature prevent

Page 133

Command Line Interface7-667Command ModeGlobal ConfigurationCommand Usage• When 802.1X is disabled, the access point does not support 802.1X authentica

Page 134

802.1X Authentication7-677802.1x-supplicant userThis command sets the user name and password used for authentication of the access point when operatin

Page 135

Introduction1-21Package ChecklistThe Dual-band Outdoor Access Point / Bridge package includes:• One Wireless Dual-band Access Point (WA6202A or WA620

Page 136

Command Line Interface7-687show authenticationThis command shows all 802.1X authentication settings, as well as the address filter table.Command ModeE

Page 137 - Wi-Fi Protected Access (WPA)

MAC Address Authentication7-697MAC Address Authentication Use these commands to define MAC authentication on the access point. For local MAC authentic

Page 138

Command Line Interface7-707Related Commandsaddress filter entry (7-70)802.1x-supplicant user (7-67)address filter entryThis command enters a MAC addre

Page 139

MAC Address Authentication7-717Command ModeGlobal ConfigurationExampleRelated Commands802.1x-supplicant user (7-67)mac-authentication serverThis comma

Page 140

Command Line Interface7-727Default0 (disabled)Command ModeGlobal ConfigurationExampleFiltering CommandsThe commands described in this section are used

Page 141

Filtering Commands7-737filter local-bridgeThis command disables communication between wireless clients. Use the no form to disable this filtering.Synt

Page 142 - Configuring 802.1X

Command Line Interface7-747filter uplink enableThis command enables filtering of MAC addresses from the Ethernet port.Syntax[no] filter uplink enableD

Page 143

Filtering Commands7-757Global ConfigurationCommand UsageThis command is used in conjunction with the filter ethernet-type protocol command to determin

Page 144 - Status Information

Command Line Interface7-767show filtersThis command shows the filter options and protocol entries in the filter table. Command ModeExecExampleWDS Brid

Page 145

WDS Bridge Commands7-777bridge modeThis command selects between Master and Slave mode.Syntaxbridge mode <master | slave>• master - Operates as a

Page 146

LED Indicators1-31LED IndicatorsThe access point includes eight status LED indicators, as indicated in the following figure. The following table descr

Page 147 - Station Status

Command Line Interface7-787configured as the “root bridge” in the wireless network. The root bridge is the unit connected to the main core of the wire

Page 148

WDS Bridge Commands7-797Default Setting NoneCommand Mode Interface Configuration (Wireless)Command Usage Every bridge (except the root bridge) in the

Page 149 - Event Logs

Command Line Interface7-807bridge dynamic-entry age-timeThis command sets the time for aging out dynamic entries in the WDS forwarding table.Syntaxbri

Page 150

WDS Bridge Commands7-817show bridge filter-entryThis command displays current entries in the WDS forwarding table.Command Mode ExecExample show bridge

Page 151 - STP Status

Command Line Interface7-827Example Enterprise AP#show bridge link wireless aInterface Wireless A WDS Information====================================AP

Page 152

Spanning Tree Commands7-837Spanning Tree CommandsThe commands described in this section are used to set the MAC address table aging time and spanning

Page 153 - Chapter 7: Co

Command Line Interface7-847bridge stp forwarding-delayUse this command to configure the spanning tree bridge forward time globally for the wireless br

Page 154 - Entering Commands

Spanning Tree Commands7-857Example bridge stp max-ageUse this command to configure the spanning tree bridge maximum age globally for the wireless brid

Page 155 - Showing Commands

Command Line Interface7-867Command Mode Global ConfigurationCommand Usage Bridge priority is used in selecting the root device, root port, and designa

Page 156 - Enterprise AP#show s

Spanning Tree Commands7-877Default Setting 128Command Mode Interface ConfigurationCommand Usage • This command defines the priority for the use of a p

Page 157 - Configuration Commands

Introduction1-41The 11a and 11b/g LEDs operate in two display modes, which are configurable through the management interface. The RSSI mode is for ali

Page 158 - Command Groups

Command Line Interface7-887Ethernet Interface Commands The commands described in this section configure connection parameters for the Ethernet port an

Page 159 - General Commands

Ethernet Interface Commands7-897dns serverThis command specifies the address for the primary or secondary domain name server to be used for name-to-ad

Page 160 - Command Line Interface

Command Line Interface7-907Command Mode Interface Configuration (Ethernet)Command Usage • DHCP is enabled by default. To manually configure a new IP a

Page 161

Ethernet Interface Commands7-917• When you use this command, the access point will begin broadcasting DHCP client requests. The current IP address (i.

Page 162

Command Line Interface7-927shutdown This command disables the Ethernet interface. To restart a disabled interface, use the no form.Syntax shutdownno s

Page 163 - System Management Commands

Wireless Interface Commands7-937Example Wireless Interface CommandsThe commands described in this section configure connection parameters for the wire

Page 164

Command Line Interface7-947beacon-interval Configures the rate at which beacon signals are transmitted from the access pointIC-W 7-103dtim-period Conf

Page 165

Wireless Interface Commands7-957interface wirelessThis command enters wireless interface configuration mode.Syntaxinterface wireless <a | g>• a

Page 166

Command Line Interface7-967speedThis command configures the maximum data rate at which the access point transmits unicast packets. Syntaxspeed <spe

Page 167

Wireless Interface Commands7-977Command Usage • The normal 802.11a wireless operation mode provides connections up to 54 Mbps. Turbo Mode is an enhanc

Page 168

Integrated High-Gain Antenna1-51Integrated High-Gain AntennaThe WA6202A unit includes an integrated high-gain (17 dBi) flat-panel antenna for 5 GHz op

Page 169

Command Line Interface7-987channelThis command configures the radio channel through which the access point communicates with wireless clients. Syntaxc

Page 170

Wireless Interface Commands7-997Default Setting fullCommand Mode Interface Configuration (Wireless)Command Usage • The “min” keyword indicates minimum

Page 171

Command Line Interface7-1007ExamplepreambleThis command sets the length of the signal preamble that is used at the start of a 802.11b/g data transmiss

Page 172

Wireless Interface Commands7-1017antenna controlThis command selects the use of two diversity antennas or a single antenna for the radio interface.Syn

Page 173 - APmgmtIP

Command Line Interface7-1027Command ModeInterface Configuration (Wireless)Command Usage• See “External Antenna Options” on page 1-5 for a list of the

Page 174 - APmgmtUI

Wireless Interface Commands7-1037beacon-interval This command configures the rate at which beacon signals are transmitted from the access point. Synta

Page 175

Command Line Interface7-1047will save all broadcast/multicast frames for the Basic Service Set (BSS) and forward them after every second beacon.• Usin

Page 176

Wireless Interface Commands7-1057rts-thresholdThis command sets the packet size threshold at which a Request to Send (RTS) signal must be sent to the

Page 177

Command Line Interface7-1067super-a This command enables Atheros proprietary Super A performance enhancements. Use the no form to disable this functio

Page 178

Wireless Interface Commands7-1077description This command adds a description to a the wireless interface. Use the no form to remove the description.Sy

Page 179

Introduction1-61Ethernet PortThe wireless bridge has one 10BASE-T/100BASE-TX 8-pin DIN port that connects to the power injector module using the inclu

Page 180 - System Logging Commands

Command Line Interface7-1087closed-systemThis command prohibits access to clients without a pre-configured SSID. Use the no form to disable this featu

Page 181

Wireless Interface Commands7-1097assoc-timeout-intervalThis command configures the idle time interval (when no frames are sent) after which the client

Page 182

Command Line Interface7-1107Default Setting Interface enabledCommand Mode Interface Configuration (Wireless-VAP)Command UsageYou must first enable VAP

Page 183

Wireless Interface Commands7-1117show interface wirelessThis command displays the status for the wireless interface.Syntaxshow interface wireless <

Page 184

Command Line Interface7-1127----------------802.1x---------------------------------------------------802.1x : DISABLEDBroadca

Page 185 - System Clock Commands

Wireless Interface Commands7-1137show stationThis command shows the wireless clients associated with the access point.Command Mode ExecExample Enterpr

Page 186

Command Line Interface7-1147Rogue AP Detection CommandsA “rogue AP” is either an access point that is not authorized to participate in the wireless ne

Page 187

Rogue AP Detection Commands7-1157• A “rogue AP” is either an access point that is not authorized to participate in the wireless network, or an access

Page 188

Command Line Interface7-1167rogue-ap durationThis command sets the scan duration for detecting access points.Syntaxrogue-ap duration <milliseconds&

Page 189

Rogue AP Detection Commands7-1177Example Related Commandsrogue-ap duration (7-116)rogue-ap scanThis command starts an immediate scan for access points

Page 190 - DHCP Relay Commands

Grounding Point1-71The power injector module automatically adjusts to any AC voltage between 100-240 volts at 50 or 60 Hz. No voltage range settings a

Page 191

Command Line Interface7-1187show rogue-apThis command displays the current rogue AP database.Command Mode ExecExample Wireless Security CommandsThe co

Page 192 - SNMP Commands

Wireless Security Commands7-1197authThis command configures authentication for the VAP interface.Syntaxauth <open-system | shared-key | wpa | wpa-p

Page 193

Command Line Interface7-1207• To use WEP shared-key authentication, set the authentication type to “shared-key” and define at least one static WEP key

Page 194

Wireless Security Commands7-1217ExampleRelated Commandsencryption (7-121)key (7-122)encryption This command enables data encryption for wireless commu

Page 195

Command Line Interface7-1227key This command sets the keys used for WEP encryption. Use the no form to delete a configured key.Syntaxkey <index>

Page 196

Wireless Security Commands7-1237transmit-keyThis command sets the index of the key to be used for encrypting data frames for broadcast or multicast tr

Page 197

Command Line Interface7-1247cipher-suite This command defines the cipher algorithm used to encrypt the global key for broadcast and multicast traffic

Page 198

Wireless Security Commands7-1257• AES-CCMP (Advanced Encryption Standard Counter-Mode/CBCMAC Protocol): WPA2 is backward compatible with WPA, includin

Page 199

Command Line Interface7-1267Example wpa-pre-shared-key This command defines a Wi-Fi Protected Access (WPA/WPA2) Pre-shared-key.Syntaxwpa-pre-shared-ke

Page 200

Wireless Security Commands7-1277Command Mode Interface Configuration (Wireless-VAP)Command Usage • WPA2 provides fast roaming for authenticated client

Page 201

Introduction1-81System ConfigurationAt each location where a unit is installed, it must be connected to the local network using the power injector mod

Page 202

Command Line Interface7-1287known to be already authenticated, so it proceeds directly to key exchange and association.• To support pre-authentication

Page 203

Link Integrity Commands7-1297link-integrity ping-detectThis command enables link integrity detection. Use the no form to disable link integrity detect

Page 204

Command Line Interface7-1307link-integrity ping-intervalThis command configures the time between each Ping sent to the link host. Syntaxlink-integrity

Page 205

Link Integrity Commands7-1317Command Mode Global ConfigurationExample show link-integrityThis command displays the current link integrity configuratio

Page 206

Command Line Interface7-1327IAPP CommandsThe command described in this section enables the protocol signaling required to ensure the successful handov

Page 207 - Flash/File Commands

VLAN Commands7-1337VLAN CommandsThe access point can enable the support of VLAN-tagged traffic passing between wireless clients and the wired network.

Page 208

Command Line Interface7-1347• Traffic entering the Ethernet port must be tagged with a VLAN ID that matches the access point’s native VLAN ID, or with

Page 209

WMM Commands7-1357Default Setting 1Command Mode Interface Configuration (Wireless-VAP)Command Usage • To implement the default VLAN ID setting for VAP

Page 210

Command Line Interface7-1367wmmThis command sets the WMM operational mode on the access point. Use the no form to disable WMM.Syntax[no] wmm <suppo

Page 211 - RADIUS Client

WMM Commands7-1377interpretability with other wired network QoS policies. While the four ACs are specified for specific types of traffic, WMM allows t

Page 212

2-1Chapter 2: Network Configuration The Dual-band Outdoor Access Point / Bridge system provides access point and bridging services through either the

Page 213

Command Line Interface7-1387• admission_control - The admission control mode for the access category. When enabled, clients are blocked from using the

Page 214

A-1Appendix A: TroubleshootingCheck the following items before you contact local Technical Support.1. If wireless clients cannot access the network, c

Page 215

TroubleshootingA-2A3. If you cannot access the on-board configuration program via a serial port connection:• Be sure you have set the terminal emulato

Page 216

B-1Appendix B: Cables and PinoutsTwisted-Pair Cable Assignments For 10/100BASE-TX connections, a twisted-pair cable must have two pairs of wires. Each

Page 217 - 802.1X Authentication

Cables and PinoutsB-2BStraight-Through WiringBecause the 10/100 Mbps port on the access point uses an MDI pin configuration, you must use “straight-th

Page 218 - 802.1x-supplicant enable

Twisted-Pair Cable AssignmentsB-3BCrossover WiringBecause the 10/100 Mbps port on the access point uses an MDI pin configuration, you must use “crosso

Page 219 - 802.1x-supplicant user

Cables and PinoutsB-4B8-Pin DIN to RJ-45 Cable WiringTo construct an extended Ethernet cable to connect from the power injector’s RJ-45 Output port to

Page 220

C-1Appendix C: SpecificationsGeneral SpecificationsMaximum Channels802.11a:US & Canada: 13 (normal mode), 5 (turbo mode)Japan: 4 (normal mode), 1

Page 221 - MAC Address Authentication

SpecificationsC-2COperating Frequency802.11a:5.15 ~ 5.25 GHz (lower band) US/Canada, Japan5.25 ~ 5.35 GHz (middle band) US/Canada5.725 ~ 5.825 GHz (up

Page 222

General SpecificationsC-3CWireless Radio/Regulatory CertificationETSI 300 328 (11b/g), 301 893 (11a Full range), 301 489 (DC power)FCC Part 15C 15.247

Page 223

User Guide2.4 GHz / 5 GHz Wireless Access Point/BridgeWA6202AIEEE 802.11g and 802.11a Dual-band Access Point / Bridgewith Integrated 5 GHz High-Gain A

Page 224 - Filtering Commands

Network Configuration2-22Infrastructure Wireless LANThe access point function of the wireless bridge provides access to a wired LAN for 802.11a/b/g wi

Page 225

SpecificationsC-4CSensitivityTable C-1 Sensitivity 802.11aIEEE 802.11a Sensitivity (GHz - dBm)Modulation/Rates 5.15-5.250 5.25-5.350 5.50-5.700 5.725

Page 226

Transmit PowerC-5CTransmit Power Table C-4 Transmit Power 802.11aIEEE 802.11a Maximum Output Power (GHz - dBm)Data Rate 5.15-5.250 5.25-5.350 5.50-5.

Page 227

SpecificationsC-6CAntenna Specifications18 dBi High Gain Directional Panel (2.4GHz)Model NumberACC04-050090Frequency Range2.4 - 2.5 GHzGain18 dBiVSWR1

Page 228 - WDS Bridge Commands

Antenna SpecificationsC-7C8 dBi Omnidirectional (2.4 GHz)Model NumberACC04-05028AFrequency Range2.400~2.500 GHzGain8 dBiVSWR2.0 : 1 maxPolarizationLin

Page 229

SpecificationsC-8C10 dBi Sector (2.4 GHz)Model NumberACC04-053830AFrequency range2.4~2.5 GHzGain10 dBiVSWR1.5 : 1 maxPolarizationLinear, verticalHPBWL

Page 230

Antenna SpecificationsC-9C8 dBi Omnidirectional (2.4 GHz)Model NumberACC04-05427AFrequency range2.4~2.5 GHzGain8 dBiVSWR2.0 : 1 maxPolarizationLinear,

Page 231

SpecificationsC-10C8 dBi Omnidirectional (5 GHz)Model NumberACC04-090380Frequency range5.47~5.875 GHzGain8 dBiVSWR2.0 : 1 maxPolarizationLinear, verti

Page 232

Antenna SpecificationsC-11C12.5~13.5 dBi 60-Degree Sector (5 GHz)Model NumberACC04-200010Frequency range4.9~5.875 GHzGain12.5~13.5 dBiVSWR2.0 : 1 maxP

Page 233

SpecificationsC-12C8 dBi Omnidirectional (5 GHz)Model NumberACC04-200180Frequency Range5.5~5.825 GHzGain8 dBiVSWR2.0 : 1 maxPolarizationLinear, vertic

Page 234

Antenna SpecificationsC-13C23 dBi High-Gain Panel (5 GHz)Model NumberACC04-20212AFrequency range5.725 ~5.875 GHzGain23 dBiVSWR1.5 : 1 maxPolarizationL

Page 235 - Spanning Tree Commands

Access Point Topologies2-32Infrastructure Wireless LAN for Roaming Wireless PCsThe Basic Service Set (BSS) defines the communications domain for each

Page 236

SpecificationsC-14C8 dBi Omnidirectional (5 GHz)Model NumberACC04-202130Frequency range5.15~ 5.35 GHzGain8 dBiVSWR2.0 : 1 maxPolarizationLinear, verti

Page 237

Antenna SpecificationsC-15C8 dBi Omnidirectional (5 GHz)Model NumberACC04-200180Frequency range4.9~5.35 GHzGain8 dBiVSWR2.0 : 1 maxPolarizationLinear,

Page 238

SpecificationsC-16C

Page 239

D-1D-1Appendix D: Montieren der BridgeDie Bridge kann auf folgenden Oberflächentypen montiert werden:•Mast• Wand oder elektrischer Kasten (NEMA Enclos

Page 240 - Ethernet Interface Commands

Montieren der BridgeD-2D3. Stecken Sie die Ränder der V-förmigen Halterung in die Aussparungen in der rechteckigen Platte und ziehen Sie die Muttern f

Page 241

Verwenden der Halterung für WandmontageD-3D5. Befestigen Sie die Bridge mit Halter an der am Mast angebrachten Platte.Befestigen Sie die drahtlose Bri

Page 242

Montieren der BridgeD-4D2. Halten Sie die Halterung an der gewünschten Stelle an und markieren Sie die Positionen der drei Löcher für die Montageschra

Page 243

Anschließen der externen AntennenD-5D5. Verbinden Sie das Ethernet-Kabel (und das Netzkabel, falls erforderlich) mit den Anschlüssen auf der Vordersei

Page 244

Montieren der BridgeD-6D\Anschließen der Kabel an das Gerät1. Verbinden Sie das Ethernet-Kabel mit dem Ethernet-Port der drahtlosen Bridge.2. Umwickel

Page 245 - Wireless Interface Commands

Anschließen des PoE InjectorsD-7DAnschließen des PoE InjectorsSo schließen Sie die drahtlose Bridge an eine Stromquelle an:Achtung: Installieren Sie

Page 246

Network Configuration2-42Bridge Link TopologiesThe IEEE 802.11 standard defines a WIreless Distribution System (WDS) for bridge connections between BS

Page 247

Montieren der BridgeD-8D1. Stecken Sie den Netzleitungsstecker direkt in den standardmäßigen Netzanschluss des Injector-Moduls.2. Verbinden Sie das an

Page 248

Glossary-1Glossary10BASE-TIEEE 802.3 specification for 10 Mbps Ethernet over two pairs of Category 3 or better UTP cable.100BASE-TXIEEE 802.3u specifi

Page 249

Glossary-2GlossaryBroadcast KeyBroadcast keys are sent to stations using 802.1X dynamic keying. Dynamic broadcast key rotation is often used to allow

Page 250

Glossary-3GlossaryIEEE 802.11bA wireless standard that supports wireless communications in the 2.4 GHz band using Direct Sequence Spread Spectrum (DSS

Page 251

Glossary-4GlossaryPower over Ethernet (PoE)A specification for providing both power and data to low-power network devices using a single Category 5 Et

Page 252

Glossary-5GlossaryTemporal Key Integrity Protocol (TKIP)A data encryption method designed as a replacement for WEP. TKIP avoids the problems of WEP st

Page 253

Glossary-6Glossary

Page 254

Index-1Numerics802.11g 7-95AAES 6-84authentication 6-12cipher suite 6-86, 7-120closed system 7-108configuring 6-12MAC address 6-13, 7-69, 7-70type 6-7

Page 255

IndexIndex-2firmwaredisplaying version 6-30, 7-24upgrading 6-29, 6-31, 7-56fragmentation 7-104Ggateway address 5-2, 6-6, 7-1, 7-89Hhardware version, d

Page 256

IndexIndex-3RSSI BNC 1-7RTSthreshold 6-63, 7-105SSecure Socket Layer See SSLsecurity, options 6-73session key 6-88shared key 6-79, 7-122Simple Network

Page 257

Bridge Link Topologies2-52Point-to-Multipoint ConfigurationA WA6202AM wireless bridge can use an omnidirectional or sector antenna to connect to as ma

Page 258

IndexIndex-4

Page 260

Model Number: WA6202A / WA6202AMPub. Number: 149100034900E E112006-DT-R01

Page 261

Network Configuration2-62

Page 262

3-1Chapter 3: Bridge Link PlanningThe Dual-band Outdoor Access Point / Bridge supports fixed point-to-point or point-to-multipoint wireless links. A s

Page 263

Bridge Link Planning3-23If there are obstacles in the radio path, there may still be a radio link but the quality and strength of the signal will be a

Page 264

Radio Path Planning3-33.Note that to avoid any obstruction along the path, the height of the object must be added to the minimum clearance required fo

Page 265

Bridge Link Planning3-43(7.5 ft) mast or pole must be contructed on its roof to achieve the required antenna height. Building B is only three stories

Page 266 - Rogue AP Detection Commands

Ethernet Cabling3-53Radio InterferenceThe avoidance of radio interference is an important part of wireless link planning. Interference is caused by ot

Page 267

WA6202AWA6202AMF4.3.3.6 E112006-DT-R01149100034900E

Page 268

Bridge Link Planning3-63• Determine if conduits, bracing, or other structures are required for safety or protection of the cable• For lightning protec

Page 269

4-14-1Chapter 4: Hardware InstallationBefore mounting antennas to set up your wireless bridge links, be sure you have selected appropriate locations f

Page 270 - Wireless Security Commands

Hardware Installation4-24The bridge’s mounting bracket has four parts. One rectangular plate that is used for pole and wall mounting, one square plate

Page 271

Mount the Unit4-344. Attach the bridge with its mounting plate to the bracket already fixed to the pole.5. Use the included nuts to secure the wireles

Page 272

Hardware Installation4-44Be sure to take account of the antenna polarization direction; all antennas in a link must be mounted with the same polarizat

Page 273

Connect External Antennas4-54Connect External AntennasWhen deploying a WA6202AM unit for a bridge link or access point operation, you need to mount ex

Page 274

Hardware Installation4-64Connect Cables to the UnitWarning: Do not connect or disconnect cables or otherwise work with the bridge during periods of li

Page 275

Connect the Power Injector4-74Connect the Power InjectorTo connect the wireless bridge to a power source:Caution: Do not install the power injector o

Page 276

Hardware Installation4-841. Insert the power cable plug directly into the standard AC receptacle on the power injector.2. Plug the other end of the po

Page 277

Align Antennas4-94The signal strength LEDs indicate the received radio signal strength for a particular bridge link. The more LEDs that turn on, the s

Page 278

iCompliancesFederal Communication Commission Interference StatementThis equipment has been tested and found to comply with the limits for a Class B di

Page 279

Hardware Installation4-1041. Pan the antenna horizontally back and forth while checking the LEDs. If using the pole-mounting bracket with the unit, yo

Page 280 - Link Integrity Commands

5-1Chapter 5: Initial ConfigurationThe Dual-band Outdoor Access Point / Bridge offers a variety of management options, including a web-based interface

Page 281

Initial Configuration5-25For a description of how to use the CLI, see “Using the Command Line Interface” on page 7-1. For a list of all the CLI comman

Page 282

Logging In5-35Setting the Country Code – Units sold in the United States are configured by default to use only radio channels 1-11 in 802.11b or 802.1

Page 283

Initial Configuration5-45The home page displays the Main Menu.

Page 284 - IAPP Commands

6-1Chapter 6: System ConfigurationBefore continuing with advanced configuration, first complete the initial configuration steps described in Chapter 5

Page 285 - VLAN Commands

System Configuration6-26Advanced ConfigurationThe Advanced Configuration pages include the following options.Table 6-1. MenuMenu Description PageSys

Page 286

Advanced Configuration6-36System IdentificationThe system name for the access point can be left at its default setting. However, modifying this parame

Page 287 - WMM Commands

System Configuration6-46CLI Commands for System Identification – Enter the global configuration mode, and use the system name command to specify a new

Page 288

Advanced Configuration6-56TCP / IP SettingsConfiguring the access point with an IP address expands your ability to manage the access point. A number o

Page 289

iiVCCI NoticeThis is a class A product based on the standard of the Voluntary Control Council for Interference by Information Technology Equipment (VC

Page 290

System Configuration6-66• IP Address: The IP address of the access point. Valid IP addresses consist of four decimal numbers, 0 to 255, separated by p

Page 291 - Appendix A: Troubleshooting

Advanced Configuration6-76RADIUSRemote Authentication Dial-in User Service (RADIUS) is an authentication protocol that uses software running on a cent

Page 292 - Troubleshooting

System Configuration6-86

Page 293 - 10/100BASE-TX Pin Assignments

Advanced Configuration6-96MAC Address Format – MAC addresses can be specified in one of four formats, using no delimeter, with a single dash delimeter

Page 294 - Straight-Through Wiring

System Configuration6-106CLI Commands for RADIUS – From the global configuration mode, use the radius-server address command to specify the address of

Page 295 - 8-Pin DIN Connector Pinout

Advanced Configuration6-116SSH SettingsTelnet is a remote management tool that can be used to configure the access point from anywhere in the network.

Page 296 - Cables and Pinouts

System Configuration6-126CLI Commands for SSH – To enable the SSH server, use the ip ssh-server enable command from the CLI Ethernet interface configu

Page 297 - Appendix C: Specifications

Advanced Configuration6-136MAC Authentication – You can configure a list of the MAC addresses for wireless clients that are authorized to access the n

Page 298 - Specifications

System Configuration6-146802.1X Supplicant – The access point can also operate in a 802.1X supplicant mode. This enables the access point itself to be

Page 299 - General Specifications

Advanced Configuration6-156CLI Commands for Local MAC Authentication – Use the mac-authentication server command from the global configuration mode to

Page 300 - Sensitivity

iii• This device employs a radar detection feature required for European Community operation in the 5 GHz band. This feature is automatically enabled

Page 301 - Transmit Power

System Configuration6-166CLI Commands for RADIUS MAC Authentication – Use the mac-authentication server command from the global configuration mode to

Page 302 - Panel (2.4GHz)

Advanced Configuration6-176Filter ControlThe access point can employ network traffic frame filtering to control access to network resources and increa

Page 303

System Configuration6-186Uplink Port MAC Address Filtering Status – Prevents traffic with specified source MAC addresses from being forwarded to wirel

Page 304 - 10 dBi Sector (2.4 GHz)

Advanced Configuration6-196VLANThe access point can employ VLAN tagging support to control access to network resources and increase security. VLANs se

Page 305

System Configuration6-206When setting up VLAN IDs for each user on the RADIUS server, be sure to use the RADIUS attributes and values as indicated in

Page 306 - 8 dBi Omnidirectional (5 GHz)

Advanced Configuration6-216WDS SettingsEach access point radio interface can be configured to operate in a bridge or repeater mode, which allows it to

Page 307

System Configuration6-226• Bridge: Operates as a bridge to other access points. The “Parent” link to the root bridge must be configured. Up to five ot

Page 308

Advanced Configuration6-236Spanning Tree Protocol – STP uses a distributed algorithm to select a bridging device (STP-compliant switch, bridge or rout

Page 309

System Configuration6-246the root device. All ports connected to designated bridging devices are assigned as designated ports. After determining the l

Page 310

Advanced Configuration6-256• Link Path Cost – This parameter is used by the STP to determine the best path between devices. Therefore, lower values sh

Page 311

ivSafety CompliancePower Cord SafetyPlease read the following safety information carefully before installing the device:Warning:Installation and remov

Page 312

System Configuration6-266CLI Commands for STP Settings – If the role of a radio interface is set to Repeater, Bridge or Root Bridge, STP can be enable

Page 313 - V-förmige Halterung

Advanced Configuration6-276AP ManagementThe Web, Telnet, and SNMP management interfaces are enabled and open to all IP addresses by default. To provid

Page 314 - Montieren der Bridge

System Configuration6-286• Multiple IP: Specifies an address range as defined by the entered IP address and subnet mask. For example, IP address 192.1

Page 315

Advanced Configuration6-296Setting the Timeout IntervalYou can set the timeout interval for web access to the unit, after which the user will have to

Page 316

System Configuration6-306Before upgrading new software, verify that the access point is connected to the network and has been configured with a compat

Page 317

Advanced Configuration6-316Firmware Upgrade Local – Downloads an operation code image file from the web management station to the access point using H

Page 318

System Configuration6-326Upon uploading a new configuration file you will be prompted to either restore factory settings, or reboot the unit.CLI Comma

Page 319 - Erdungsleitung

Advanced Configuration6-336System Log The access point can be configured to send event and error messages to a System Log Server. The system clock can

Page 320

System Configuration6-346Logging Level – Sets the minimum severity level for event logging. (Default: Informational)The system allows you to limit the

Page 321 - Glossary

Advanced Configuration6-356CLI Commands for System Logging – To enable logging on the access point, use the logging on command from the global configu

Page 322

vVeuillez lire à fond l'information de la sécurité suivante avant d'installer l’appareil:AVERTISSEMENT: L’installation et la dépose de ce gr

Page 323

System Configuration6-366Note: The access point also allows you to disable SNTP and set the system clock manually. Set Time Zone – SNTP uses Coordinat

Page 324

Advanced Configuration6-376CLI Commands for the System Clock – The following example shows how to manually set the system time when SNTP server suppor

Page 325

System Configuration6-386The RSSI controls allow the external connector to be disabled and the receive signal for each WDS port displayed.

Page 326

Advanced Configuration6-396RSSI:• Auto Refresh – Enables or disables the refreshing of RSSI information.• RSSI Value – The displayed RSSI value for a

Page 327

System Configuration6-406SNMPSimple Network Management Protocol (SNMP) is a communication protocol designed specifically for managing devices on a net

Page 328

SNMP6-416Configuring SNMP and Trap Message ParametersThe access point SNMP agent must be enabled to function (for versions 1, 2c, and 3 clients). Man

Page 329

System Configuration6-426Community Name (Read/Write) – Defines the SNMP community access string that has read/write access. Authorized management stat

Page 330

SNMP6-436Trap Configuration – Allows selection of specific SNMP notifications to send. The following items are available:• sysSystemUp - The access po

Page 331

System Configuration6-446• dot11StationDisassociate - A client station no longer associates with the network.• dot11StationAuthenticateFail - A client

Page 332 - E112006-DT-R01

SNMP6-456To view the current SNMP settings, use the show snmp command.Enterprise AP#show snmp 7-54SNMP Information====================================

Comments to this Manuals

No comments