MSR 2000 Wireless Mesh Router CLI Configuration Guide Version AOS-1.3.
Copyright 2006 Azalea Networks All rights reserved. Printed in the USA. January 2006 Azalea Networks reserves the right to change, modify, revise this publication without notices Trademarks Copyright 2006 by Azalea Networks, Inc. All right reserved. Azalea, the Azalea logo, and MSR2000 are trademarks of Azalea Networks, Inc. All other brand and product names are registered trademarks or trademarks of their respective holders.
Contents Scope................................................................................................................................7 Audience..........................................................................................................................7 Related Documents..........................................................................................................7 Azalea CLI Modes...............................................................................................
Configuring DHCP Relay Parameters.......................................................................54 Enabling DHCP Relay on specific BSSs...................................................................55 Show DHCP Relay Information................................................................................55 Configuring NAT...........................................................................................................56 Show the configuration of NAT...................................
List of Figures Figure 1 CLI Modes in Azalea Image..................................................................................8 Figure 2 list Command Examples......................................................................................10 Figure 3 Output of help command.....................................................................................13 Figure 4 Example of ? command.......................................................................................
List of Tables Table 1 CLI Mode Information..........................................................................................10 Table 2 CLI Mode Information (no command).................................................................12 Table 3 Short-Cut Keys and their actions..........................................................................14 Table 4 System Information for Initial Setup....................................................................15 Table 5 Configuring a host name....
Chapter 1.............................About this Guide This chapter covers the following topics: • • • Scope Audience Related Documents Scope This document provides the configuration instructions and examples for the MSR2000 outdoor wireless mesh router. It contains information on current features and protocols supported by MSR2000. Note: The command examples and outputs are created with an MSR2000 router and is for demonstration purposes only.
Chapter 2 Configuration Fundamentals This section covers the following main topics: • • • Azalea CLI Modes Basic Configuration Information Software Image Upgrade Azalea CLI Modes • • • • • • CLI Modes The List Command CLI Navigation Deleting Command Lines in the Configuration Obtaining Help Entering and Editing Commands CLI Modes Azalea CLI is organized into multiple modes that allow navigation between different protocols and interface.
When you login, you are in the User EXEC mode where you can enter a limited number of commands, mostly show commands. In this mode, you can not make or change any configuration. You can only view system information or execute limited commands. In EXEC mode, the enable command prompts you for your password to allow you into Privileged EXEC mode. Privileged EXEC mode has commands to view configuration, manage configuration files, run diagnostics, enable or disable debug operations, reboot the router.
The LIST Command The LIST command allows a user to list all available commands for the current mode. Command Syntax Command Mode Purpose List command All modes The LIST command lists all commands that may be entered in the current mode. The following are examples of using the list command: MSR2000(config)# interface fast-ethernet 0 MSR2000(config-if-ethernet)# list end exit help interface fast-ethernet <0-1> ip address A.B.C.D/M ip address dhcp list mode access mode gateway mode gateway A.B.C.
commands. From every other modes except the EXEC and Privileged EXEC modes, use the exit command.
Deleting Command Lines in the Configuration File Each command enters a command line in the Azalea MSR2000 running configuration file and the “no” form of the command removes the command line form the running configuration file. To disable a command, use the “no” form of that command. The majority of the commands in Azalea CLI have a “no” command that disables the command or re-enable a disabled function.
Obtaining Help CLI mode enables several ways for you to obtain help and list the available commands in that mode for a specific keyword. To obtain a list of keywords and a brief functional description of those keywords at any CLI mode, do either of the following. • Type help at the prompt • Type ? at the prompt or after a keyword. Figure 3 illustrated the output that appears when you type help at any modes prompt. The output tells your how to use ? to get help.
To obtain a list of available options for a keyword or partial keyword, use the ?. In figure 4, the keywords are listed on the left with a brief description of the commands on the right. The output is the same if you enter the help.
CTRL-N CTRL-P CTRL-U CTRL-W CTRL-Z Esc B Esc F Esc D Return to more recent commands in the history buffer after recalling commands with CRTL-P or the up arrow key. Recalls commands, beginning with the last command. Deletes the line. Deletes the previous word. Ends continuous scrolling of command output. Moves the cursor back one word. Moves the cursor forward one word. Deletes all characters form the cursor to the end of the word.
To configure a host name, use the following command in the CONFIGUREATION mode: Table 5 Configuring a host name Command Syntax hostname Command Mode CONFIGURATION no hostname Purpose Allows you to set the host name of the MSR2000. Enter a new host name in the form of an alphanumeric string. Remove the hostname, it goes back to default. Default hostname = MSR2000 Password Configuration MSR2000 has a default password configured, the default password is public.
Use any of the following commands to display information about the configuration file: Table 8 Display running configuration and startup configuration Command Syntax show startup-config Command Mode Privileged EXEC show running-config Privileged EXEC Purpose Displays the configuration information stored in the internal memory. Displays current configuration information on the system.
Software Image Upgrade MSR2000 is shipped with an Azalea firmware; however, you may upgrade the firmware or load a different version of Azalea firmware. Table 10 Upgrade firmware Command Syntax upgrade [FTP | URL] Command Mode Privileged EXEC mode Purpose Upgrade operation has two methods to upgrade image to MSR2000 For best result, use upgrade command to transfer the system firmware to MSR2000 MSR2000# upgrade ftp 192.168.1.107 /tftpboot/AOS-v1.2.1.
Chapter 3 Physical Interfaces This chapter contains information on defining and configuring and physical interfaces on the MSR2000, it has the following sections: • • • Interface Modes Configuring Fast-Ethernet Interfaces Configuring Dot11Radio Interfaces Interface Modes The MSR2000 contains physical and logical interfaces in both Layer 2 and Layer 3 modes.
devices mode gateway mtu <256-1500> Set this fast-ethernet interface as a WAN interface, for connecting with a wired network. The gateway IP parameter is optional; if specified, the router will use it as the default gateway. INTERFACE FAST-ETHERNET Set Maximum Transmission Unit (MTU)2 size, 1500 is default Setting of MTU is optional and should be done with care.
DHCP: disabled DHCP client: disabled index 1 metric 1 mtu 1500 HWaddr: 00:17:7b:18:18:30 inet 192.168.1.162/24 broadcast 192.168.1.
only have one radio in client mode. Common settings Radio Interface supports two type of hard-ware mode: 802.11a and 802.11g (backwardcompatible with 802.11b) and each mode is associated with country codes and specific radio channels. The channel settings on the wireless device correspond to the frequencies available in the regulatory domain. The following table outlines the physical, layer-2 settings that may configured on each radio interface. These settings apply in both access and backhaul modes.
Setting of antenna is optional and should be done with care.
cts-protection <0-3> INTERFACE DOT11RADIO Enable or disable CTS protection on this radio interface. cts-protection 0 no cts-protection 0: Automatically enable/disable CTS using OLBC detection3 (Default) cts-protection 1 Always enable CTS protection cts-protection 2 Always disable CTS protection cts-protection 3 Automatically enable/disable CTS without using OLBC detection4 mtu <256-2274> INTERFACE DOT11RADIO Setting of cts-protection is optional and should be done with care.
interface from this radio MSR2000 CLI Configuration Guide 25
wds auto INTERFACE DOT11RADIO Disable auto WDS on this radio interface. no wds auto wds-unicast-rate [rate] Enable automatic WDS provisioning on this radio interface and enter the auto WDS configuration mode; this command is mutually exclusive with the wds <0-5> command.6 INTERFACE DOT11RADIO Set the forced unicast rate of this radio interface’s WDS links; once set, WDS links will attempt to consistently use the specified transmission rate.
Viewing the dot11radio interface information The “show run” command displays the intended configuration of the dot11radio interface, while the “show interface dot11radio” command displays the current state of the interface. MSR2000# show run ... ! interface dot11radio 0 wireless-mode a 48 US mode backhaul max-auto-wds 5 wds-unicast-rate 60 ! ...
Chapter 4 Logical Interfaces (WDS) Wireless Distribution System (WDS) is the underlying technology that allows MSR2000 routers to communicate each other and form the backhaul links of the mesh network. A WDS link is formed between two routers by creating logical WDS interfaces on each router, either through manual configuration or through automatic discovery9. Each logical WDS interface is bound to a physical Dot11Radio interface.
mtu <256-2274> INTERFACE DOT11RADIO WDS no mtu Configure MTU size of WDS interface Restore default MTU size (1500) Setting of MTU is optional and should be done with care.
Radio1MWds0 Radio1MWds1 FastEthernet0 FastEthernet1 10.4.6.1/28 10.5.6.1/28 192.168.1.136/24 unassigned up up up administratively down In the above list, two physical radio interfaces and two physical fast-ethernet interfaces were included. In addition, one auto WDS13 logical interface bound to Dot11Radio0 (Radio0AWds0), two manual WDS interfaces bound to Dot11Radio0 (Radio0MWds0-1), and two manual WDS interfaces bound to Dot11Radio1 (Radio1MWds0-1) were displayed.
Chapter 5 Access and BSS Configuration When a Dot11Radio interface is put into Access mode, BSSs configured for that interface becomes virtual APs that client devices may associate with. Each BSS is bound to a physical dot11radio interface; therefore, BSSs are configured within the ‘interface dot11radio’ mode. The MSR2000 supports up to four BSSs on each radio interface. Basic BSS configuration The following table outlines the basic settings for each BSS.
all other clients. mac-address accept-all no mac-address ignore-broadcast-ssid Restore to default configuration (accept all MAC addresses) INTERFACE DOT11RADIO BSS no ignore-broadcast-ssid max-rate Disable broadcasting of this BSS’s SSID Enable broadcasting of this BSS’s SSID (Default) INTERFACE DOT11RADIO BSS Select the maximum allowed transmission rate for this BSS in units of 100kbps. Available rates: 10, 20, 55, 110, 60, 90, 120, 180, 240, 360, 480, 540.
The rate is specified in units of 100kbps; the available rates are: 10, 20, 55, 110, 60, 90, 120, 180, 240, 360, 480, 540 no unicast-rate Disables unicast rate setting for this BSS; radio interfaces will automatically select transmission rates (default setting) 802.11 Security Configuration The 802.11 security standard defines a suite of wireless security protocols and implementations. It provides open and shared key authentication, is compatible with WPA /WPA2, and interoperates with 802.1x.
Figure 11 Output of BSS under dot11radio interface MSR2000 CLI Configuration Guide 34
Chapter 6 Client Mode Configuration When a Dot11Radio interface is configured for client mode, an 802.11 client station configured under that interface can associate to any matching 802.11 access points as any other 802.11 client. The access point can be BSSs provided by other MSR2000s or an AP from other vendors. On each MSR2000 router, only one radio interface can operate in client mode and have station configured.
access-point ssid INTERFACE DOT11RADIO STATION no access-point ssid SSID of the access point that this client station wants to associate with. Default is no SSID. Remove access-point SSID configuration. SSID: 802.11 Service Set ID access-point bssid INTERFACE DOT11RADIO STATION no access-point bssid access-point bssid-filter acceptable prefix Remove the setting of BSSID for an access point.
With automatic scanning configured, the client will automatically search for an AP with matching criteria. The search criteria include SSID, BSSID prefix. And the search will start after it is first started or after an existing connection is discontinued. Default is no scanning. Disable automatic scanning no scanning automatic scanning channel-list INTERFACE DOT11RADIO STATION Configure a list of channels that you allow the client to look at when doing access point scanning.
scanning threshold rssi INTERFACE DOT11RADIO STATION Configure the RSSI value threshold to trigger a new scan. If the current RSSI is lower than configured threshold, the client will start a new scan. : a number between 0 and 100. 0 means no such trigger. Default value is 15. RSSI stands for Received Signal Strength Index Restore the default RSSI threshold value.
Chapter 7 Radio Frequency Management Radio Frequency Management (RFM) is an advanced feature of MSR2000 that allows automatic discovery and quality monitoring of wireless mesh links. RFM automatically scans for neighboring MSR2000 routers and create automatic WDS interfaces. With RFM, multiple MSR2000 routers can form a mesh network without any manually configured WDS interfaces.
The link quality parameters monitored by RFM include RSSI, SNR, overall quality15, and data rate.
Command Syntax show log rf-management Command Mode Privileged EXEC Purpose Display the debug log of RFM (see debug command above) show rf-management activeneighbors Privileged EXEC Display a list of neighboring MSR2000 routers and radios discovered by RFM show rf-management interface Privileged EXEC Display a list of WDS interfaces currently monitored by RFM; may include both auto and manual WDS interfaces.
Chapter 8 Configuring Routing This chapter contains information on configuring Static Routing and AWR on the MSR2000, it has the following sections: • • Static Routing AWR Static Routing Static routing allows the network administrator full control over the topology and data forwarding behavior of the network. The administrator constructs the routing table for a router by specifying a route for each destination network.
the other MSR2000 nodes in the network, the clients associated to these nodes, and to the internet gateway. AWR ensures high-performance data forwarding in a wireless mesh environment by minimizing the number of hops used in data communication, regardless of whether that communication is within the mesh network itself, or between a host in the network and the internet.
show ip awr database Privileged EXEC Display the routing data currently tracked by the AWR protocol show ip awr neighbor Privileged EXEC Display the list of IP addresses of neighboring MSR2000 routers Viewing routing information. MSR2000# show ip route Codes: K - kernel route, C - connected, S - static, H - host, A - AWR, > - selected route, * - FIB route A>* A>* A>* A>* A>* A>* C>* H>* A C>* H>* A>* A>* A>* A>* C>* A>* A>* A>* C>* A H>* A>* A>* C>* H>* A A>* A>* C>* H>* A A>* A>* 0.0.0.
Chapter 9 Configuring Motrix Roaming This chapter contains information on configuring the Motrix Roaming Service on the MSR2000. Motrix Protocol Overview Motrix is the roaming service MSR2000 provides to support the seamless roaming of wireless clients across different mesh network subnets. Such support is necessary because every MSR2000 is a layer-3 router and each BSS within the mesh network is associated with a single layer-3 subnet.
Motrix Configuration This section covers the following main topics: • • Configuring motrix service Show motrix configuration 1) The MAC-IP list The most important configuration information needed by the Motrix service is a list that tracks the MAC address of every virtual AP (or BSS) within the mesh network. Each list entry is a mapping that associates the BSS’s MAC address with its router loopback IP address.
and remove its configuration enable disable SERVICE Activate the Motrix roaming ROAMING-MOTRIX service17 Temporarily disable the Motrix Roaming service mac-ip-list SERVICE Add an entry to the MAC-IP list ROAMING-MOTRIX no mac-ip-list Clear all entries of the MAC-IP list no mac-ip-list Remove an entry from the MAC-IP list HH:HH:HH:HH:HH:HH: The MAC address of a BSS in the network station-list
Displaying Motrix Configuration and Status Table 17 Display roaming status Command Syntax show log motrix Command Mode Privileged EXEC Purpose Display the debug log of Motrix (see debug command above) show ip mobility motrix Privileged EXEC show ip mobility motrix mac-ip-list Privileged EXEC show ip mobility stations Privileged EXEC Display Motrix configuration and status Display the MAC-IP list used by Motrix Display the list of clients/stations that are Home associated or roaming from other MSR20
Total number of stations: 2 MAC: 00:40:96:a2:be:e3 IP: 172.16.20.242 State: Roam Associated Time since last (re)association: 448(s) Associated interface: Dot11Radio0(00:0b:6b:36:a1:0a) Previous AP: 00:0b:6b:37:ab:53 Home AP: 00:0b:6b:37:ab:53/172.16.20.1 No tunnel MAC: 00:14:78:72:10:01 IP: 0.0.0.0 State: Home Associated Time since last (re)association: 7(s) Associated interface: Dot11Radio0(00:0b:6b:36:a1:0a) Previous AP: 00:00:00:00:00:00 No tunnel Tunnel from gateway 192.168.15.
Chapter 10 DHCP and NAT This chapter contains information on configuring the DHCP and NAT services on the MSR2000, it has the following sections: • • • • DHCP Protocol Overview Configuring DHCP Server Configuring DHCP Relay Configuring NAT DHCP Protocol Overview Dynamic Host Configuration Protocol (DHCP) is a communications protocol that lets network administrators manage and automate the assignment of Internet Protocol (IP) addresses in an organization's network.
disable default-lease-time <0-31536000> IP DHCP SERVER IP DHCP SERVER no default-lease-time dns [DNS-list] Set this parameter to the default value of 86400 seconds (1 day) IP DHCP SERVER no dns max-lease-time <0-31536000> Enter DNS addresses that will be included in a DHCP lease. Multiple DNS servers may be specified by separating them with commas (,).
no pool [NAME] Remove an existing DHCP pool NAME: An alphanumeric string that identifies the DHCP pool domain-name [name] IP DHCP SERVER POOL no domain-name Set the domain name to be included in DHCP leases for this pool Do not include any domain name information in DHCP leases for this pool name: A domain name such as “azaleanet.com” gateway IP DHCP SERVER POOL no gateway Set the gateway IP to be included in DHCP leases for this pool Do not include gateway in DHCP leases A.B.C.
Both begin and end IP should be a valid IPv4 unicast address. Attaching DHCP pools to BSSs Different BSSs may use different DHCP pools.
domain-name azaleanet.com dns 10.13.28.12,10.13.31.12 max-lease-time 100000 ! ! MSR2000# show dhcp server all domain-name: azaleanet.com DNS servers: 10.13.28.12,10.13.31.12 default-lease-time: 86400 (unit: seconds) max-lease-time: 100000 (unit: seconds) ! ! MSR2000# show dhcp server default-lease-time default-lease-time: 86400 (unit: seconds) ! ! MSR2000# show dhcp server dns DNS servers: 10.13.28.12,10.13.31.
disable IP DHCP RELAY Temporarily stop the DHCP relay service dhcp-servers [SERVER-list] IP DHCP RELAY Configure a list of DHCP servers to which the DHCP requests would be relayed. Multiple servers may be specified by separating them with commas (,). no dhcp-servers Clear the DHCP server list Enabling DHCP Relay on specific BSSs Not all BSSs have to use DHCP relay; some may use DHCP pools or no DHCP service at all.
Figure 17 Output of DHCP Relay configuration Configuring NAT Network Address Translation (NAT) is an Internet standard that enables a local-area network (LAN) to use one set of IP addresses for internal traffic and a second set of addresses for external traffic. A NAT box located where the LAN meets the Internet makes all necessary IP address translations. This chapter contains the information of configuring NAT on the MSR2000. The service NAT runs only in the mesh gateway.
Chapter 11 802.11 Security This chapter describes how to configure security policies as defined by the 802.11i standard on the MSR2000 router. It contains the following sections: • • • • • • 802.11 security standard overview MAC-based access control configuration RADIUS AAA Configuration Security Profile Configuration BSS security WDS security 802.11 standard overview The 802.11 security standard defines a suite of wireless security protocols and implementations.
mac-list aaa mac-addr 00:00:11:11:11:11 mac-addr 00:00:11:11:11:12 mac-addr 00:00:11:11:11:13 mac-addr 00:00:11:11:11:14 mac-list bbb mac-addr 00:00:22:22:22:22 mac-addr 00:00:22:22:22:23 mac-addr 00:00:22:22:22:24 ! MSR2000# show mac-list mac-list aaa mac-addr 00:00:11:11:11:11 mac-addr 00:00:11:11:11:12 mac-addr 00:00:11:11:11:13 mac-addr 00:00:11:11:11:14 mac-list bbb mac-addr 00:00:22:22:22:22 mac-addr 00:00:22:22:22:23 mac-addr 00:00:22:22:22:24 RADIUS AAA Configuration This section describes how to e
server auth SERVER GROUP Add a authentication server to server group no server auth Remove authentication server from server group server acct Add a accounting server to server group no server acct Remove a accounting server from server group Notes: 1.
Security-Profile Configuration This section describes the authentication types and encryption methods that you can configure on the router. Security profile on MSR defines all security policy supported by router software. Now router supports WEP, WPA, WPA2 and 8021X security suites. This block is only a definition of security policy, and it will take effect after attached in BSS or WDS. You can add multi profile for the same methods, and that will be flexible to change security policy on router for user.
security-profile wpa2 CONFIGURATION no security-profile wpa2 encryption-mode-cipher ccmp Remove a WPA2 profile from current configuration SECURITYPROFILE WPA2 encryption-mode-cipher tkip no encryption-mode-cipher wpa2-type 8021x <8021x-profile-name> SECURITYPROFILE WPA2 Enable 8021X authentication for WPA2 profile Remove 8021X authentication from WPA2 profile CONFIGURATION no security-profile 8021x<8021x-profilename> eap-reauth-period <0-65535> Enable CCMP e
security-profile wep wep2 wep-key 1 "abcde" wep-key 2 "1234567890123" wep-key 3 "1234567890abcdef" wep-key 4 1234567890 security-profile wep wep3 wep-key 3 abcdefabcdefabcdefabcdefab security-profile wep wep4 MSR2000# show security-profile wep security-profile wep wep1 wep-key 1 1234567890abcdef1234567890 wep-key 2 "abcde" wep-key 3 "abcdefabcdefa" wep-key 4 abcdefabcdefabcdefabcdefabcdefab security-profile wep wep2 wep-key 1 "abcde" wep-key 2 "1234567890123" wep-key 3 "1234567890abcdef" wep-key 4 123456789
security-profile 8021x 8021xprofile eap-reauth-period 3600 security-profile 8021x 8021x1 MSR2000# BSS Security Configuration This section describes how to apply security profiles and MAC lists to the router’s BSS configurations.
show interface dot11radio <0|1> bss accept-macs Privileged EXEC Show attached accept macs address on SSID of the Radio show interface dot11radio <0|1> bss deny-macs Privileged EXEC Show attached deny macs address on SSID of the Radio show interface dot11radio0 bss wep- Privileged EXEC keys Show BSS WEP configuration MSR2000# show interface dot11radio 0 bss Azalea accept-macs accept mac list: 00:00:22:22:22:22, 00:00:22:22:22:23, 00:00:22:22:22:24, MSR2000# show interface dot11ra
Notes: 1. Open: Open authentication allows any clients to authenticate and then attempts to communicate with the router. 2. Shared-key : a) Shared Key authentication seeks to authenticate clients as either a member of those who know a shared secret key or a member of those who do not. b) Shared Key authentication can be used if and only if WEP has been selected. c) Not recommended because of known security flaws. 3.
Chapter 12 QoS Configuration Traffic over-subscription is a common cause for the instability of network links; if many links in the mesh network is over-subscribed, the performance of the overall network becomes unstable. In order to avoid over-subscribing any individual WDS link, we strongly recommend enabling QoS to control and limit the traffic flows injected into the network. This chapter contains information on defining and configuring QoS on MSR2000.
Configuring QoS Classes The QoS class is targeted to let user specify acceptable bandwidth of one WDS link. For each QoS class, user must specify one maximal bandwidth value and one minimal bandwidth value. Use the following commands to configure QoS classes. Table 33 Configuring QoS Classes Command Syntax class Command Mode QOS Purpose Create/configure one QoS class. The class name is unique identifier for all QoS classes.
attached, it will automatically apply the default QoS class to these ManualWDS interfaces. But, it needs to further note that all of the special ManualWDS interface share the maximal and minimal bandwidth indicated by the default QoS class. Max bandwidth of the default class is 30/(wdsnumber+1) Mbps and and Min bandwidth is minimal value of 2M and 30/(wdsnumber+1)*25%Mbps, where wdsnumber is the amount of auto WDS interfaces and ManualWDS interfaces over which .QoS service is started.
! …… ! qos enable class band1 maxbw 200 minbw 100 class band2 maxbw 150 minbw 60 class band3 maxbw 100 minbw 40 ! MSR2000 CLI Configuration Guide 69
Chapter 13 Configuring SNMP This section describes commands used to configure the Simple Network Management Protocol (SNMP) Agent on the MSR2000 for the purposes of network monitoring and management. Configuring SNMP Community To set the community string for controlling access to the Management Information Base (MIB) on the SNMP Agent, use the snmp-server community command. The no form of this command removes the specified community string.
Configuring SNMPv3 users MSR2000 also supports SNMPv3, which introduces the concept of users. The following commands controls the SNMPv3 user database on each MSR2000 router: Table 37 Configuring SNMPv3 users Command Syntax snmp-server v3user Command Mode CONFIGURATION no snmp-server v3 user Purpose Configure a new or existing SNMPv3 user account.
Chapter 14 Other commands and utilities This chapter contains other commands and troubleshooting utilities on the MSR2000, it has the following sections: • • • • Save & Reboot Ping & Traceroute Telnet Client & Server Auto Recovery Save & Reboot Save Azalea Networks recommends that you save your configuration often.
Command ping a very common method for troubleshooting the accessibility of devices. It uses a series of Internet Control Message Protocol (ICMP) Echo messages to determine: • Whether a remote host is active or inactive. • The round-trip delay in communicating with the host. • Packet loss. Command ping first sends an echo request packet to an address, then waits for a reply, the reply will be recorded with latency. The default ping packet is 6, Ctrl+c can terminate ping.
PING 192.168.15.11 (192.168.15.11): 56 data bytes --- 192.168.15.11 ping statistics --6 packets transmitted, 0 packets received, 100% packet loss MSR2000# traceroute 192.168.15.126 traceroute to 192.168.15.126 (192.168.15.126), 30 hops max, 40 byte packets 1 192.168.15.126 (192.168.15.126) 7.134 ms 1.323 ms 0.821 ms MSR2000# Figure 24 Output of ping & traceroute information Telnet Client & Server MSR2000 can play role as Telnet Client and Telnet Server.
Table 42 Auto Recovery configuration Command Syntax service recovery enable Command Mode CONFIGURATION SERVICE RECOVERY Purpose Enter Auto Recovery configuration mode Administratively activate Auto Recovery disable SERVICE RECOVERY SERVICE RECOVERY Administratively disable Auto Recovery portal ip no portal ip
Chapter 15 MIBs and RFCs Supported MIBs The following is a list of Management Information Bases (MIBs) supported by Azalea Firmware • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • RFC 1213 Network Management of TCP/IP-based internet: MIB-II RFC 1157 Simple Network Management Protocol RFC 1573 Interfaces Group MIB RFC 2012 SNMPv2 Management Information Base for the TCP RFC 2013 SNMPv2 Management Information Base for the User Datagram Protocol RFC 2271 An Architecture for Describing SNMP Man
Chapter 16 List of Commands A B C D E G H I aaa Accept-point bssid HH:HH:HH:HH:HH:HH access-point bssid-filter acceptable-prefix HH:HH:HH:HH:HH:HH access-point ssid WORD antenna {0|1|2} authentication-algorithm {open|shared-key} authentication open [{wep WEP-LIST-NAME default-key <1-4> | key-management {wpa|wpa2} PROFILE-NAME}] bss WORD clear counters interface {dot11radio<0-1> {wdsauto|wdsmanu} <05>|fast-ethernet <0-1>} clear log {awr|cli|hostapd|rf-management|motrix} configure terminal copy runn
L M N List mac-add HH:HH:HH:HH:HH:HH mac-access-control-type {deny|accept|accept-all} mac-list WORD max-auto-wds <1-6> max-lease-time <0-31536000> max-rate RATE max-station-allowed <0-240> mode {access|backhaul|client} mode {access|gateway A.B.C.D/M|none} mtu <256-1500> mtu <256-2274> network {A.B.C.D|A.B.C.
P Q R S interval| threshold rssi} no security-profile {8021x|wep|wepa|wpa2} WORD no service roaming-motrix no server A.B.C.D no shutdown no snmp-server community COMMUNITY no snmp-server host A.B.C.D no snmp-server v3user USERNAME no station WORD no station-isolation no station-inactivity-limit no station-inactivity-policy no tx-power-reduction no unicast-rate no wds {<0-5>|auto} no wds-unicast-rate no wep-default-key no wep-key <1-4> no wireless-mode node-id <1-255> ping A.B.C.
setup factory setup point {US|CN|JP} <1-255> A.B.C.D A.B.C.D/M setup portal {US|CN|JP} <1-255> {A.B.C.D/M|dhcp} [nat-off] show aaa show arp [
T U W switch image telnet WORD [PORT] time <2005-2008> <1-12> <1-31> <0-23> <0-59> <0-59> traceroute WORD unicast-rate RATE upgrade ftp A.B.C.
Chapter 17 Roaming Client Compatibility This chapter contains a list of 802.11 clients that have been verified to be 802.11conforming clients (send re-association request when roaming) as well as a list of nonconforming-clients (always send association request when roaming). For details on the Motrix roaming service, please refer to Chapter 9. Client hardware verified to be 802.