User's Manual
Table Of Contents
- Chapter 1 Introduction
 - Chapter 2 Mesh Point CLI and Administrative Access
 - Chapter 3 Networking and Radio Configuration
- 3.1 Network Interfaces
 - 3.2 Network Bridging
- 3.2.1 Bridging Configuration
 - 3.2.2 FastPath Mesh Bridging
 - 3.2.3 Fine-tuning FastPath Mesh Network Performance
- 3.2.3.1 Selecting the FastPath Mesh Multicast Transmit Mode
 - 3.2.3.2 Setting the FastPath Mesh Packet Interval
 - 3.2.3.3 Setting the FastPath Mesh Transmit Control Level
 - 3.2.3.4 Setting Multicast Video Clamping Thresholds
 - 3.2.3.5 Setting Mesh Routing Reactivity
 - 3.2.3.6 Setting Mesh Packet Time To Live
 - 3.2.3.7 Viewing Current Mesh Performance Parameters
 - 3.2.3.8 Frame Processor Parameters
 
 - 3.2.4 STP Bridging
 
 - 3.3 Global Radio Settings
 - 3.4 Individual Radio Settings
- 3.4.1 Radio Band, Short Preamble, Guard Interval
 - 3.4.2 Channel Selection
 - 3.4.3 Distance, Beacon Interval, Noise Immunity
 - 3.4.4 Network Type, Antenna Gain, Tx Power
 - 3.4.5 MIMO
 - 3.4.6 STBC
 - 3.4.7 Channel Lock and Other Channel Selection Features
 - 3.4.8 DFS, TDWR, and Channel Exclusion
 - 3.4.9 Radio BSS Settings
- 3.4.9.1 BSS Radio, BSS Name and SSID
 - 3.4.9.2 WDS Bridging or AP Infrastructure Configuration
 - 3.4.9.3 BSS State, SSID Advertising and Drop Probe Requests
 - 3.4.9.4 BSS STA Idle Timeout and 802.11g-Only Settings
 - 3.4.9.5 BSS Unicast Transmission Rate Settings
 - 3.4.9.6 BSS WMM QoS Setting
 - 3.4.9.7 BSS Fragmentation and RTS Thresholds
 - 3.4.9.8 BSS DTIM Beacon Countdown
 - 3.4.9.9 BSS VLANs Settings
 - 3.4.9.10 BSS Fortress Security Zone
 - 3.4.9.11 FastPath Mesh BSS Cost Offset
 - 3.4.9.12 BSS Multicast Settings
 - 3.4.9.13 Bridging MTU and Beacon Encryption
 - 3.4.9.14 BSS Description
 - 3.4.9.15 BSS Wi-Fi Security Configuration
 
 - 3.4.10 Antenna Tracking / Rate Monitoring
 - 3.4.11 ES210 Mesh Point STA Settings and Operation
- 3.4.11.1 STA Radio, Name, SSID and SSID Roaming
 - 3.4.11.2 STA State
 - 3.4.11.3 STA Unicast Transmission Rate Settings
 - 3.4.11.4 STA Background Scanning
 - 3.4.11.5 STA WMM QoS Setting
 - 3.4.11.6 STA Fragmentation and RTS Thresholds
 - 3.4.11.7 STA Multicast Rate
 - 3.4.11.8 STA Description
 - 3.4.11.9 STA Wi-Fi Security Configuration
 - 3.4.11.10 Editing or Deleting a STA Interface Connection
 - 3.4.11.11 Establishing a STA Interface Connection
 - 3.4.11.12 ES210 Station Access Control Lists
 
 
 - 3.5 Local Area Network Configuration
 - 3.6 Time and Location Configuration
 - 3.7 GPS and Location Configuration
 - 3.8 DHCP and DNS Services
 - 3.9 Ethernet Interfaces
 - 3.10 Quality of Service
 - 3.11 VLANs Implementation
 - 3.12 ES210 Mesh Point Serial Port Settings
 - 3.13 Mesh Viewer Protocol Settings
 
 - Chapter 4 Network Security, Authentication and Auditing
- 4.1 Fortress Security Settings
- 4.1.1 Operating Mode
 - 4.1.2 FIPS Settings
 - 4.1.3 MSP Encryption Algorithm
 - 4.1.4 Encrypted Data Compression
 - 4.1.5 MSP Key Establishment
 - 4.1.6 MSP Re-Key Interval
 - 4.1.7 Key Beacon Interval
 - 4.1.8 Fortress Legacy Devices
 - 4.1.9 Encrypted Zone Cleartext Traffic
 - 4.1.10 Encrypted Zone Management Settings
 - 4.1.11 Authorized Wireless Client Management Settings
 - 4.1.12 Turning Mesh Point GUI Access Off and On
 - 4.1.13 SSH Access to the Mesh Point CLI
 - 4.1.14 Blackout Mode
 - 4.1.15 Allow Cached Credentials
 - 4.1.16 Fortress Access ID
 
 - 4.2 Digital Certificates
 - 4.3 Access Control Entries
 - 4.4 Internet Protocol Security
 - 4.5 Authentication and Timeouts
- 4.5.1 Authentication Servers
 - 4.5.2 Internal Authentication Server
- 4.5.2.1 Basic Internal Authentication Server Settings
 - 4.5.2.2 Certificate Authority Settings
 - 4.5.2.3 Global User and Device Authentication Settings
 - 4.5.2.4 Local 802.1X Authentication Settings
 - 4.5.2.5 OCSP Authentication Server Settings
 - 4.5.2.6 OCSP Cache Settings and Management
 - 4.5.2.7 Internal Authentication Server Access Control Lists
 
 - 4.5.3 User Authentication
 - 4.5.4 Client Device Authentication
 - 4.5.5 Session Idle Timeouts
 
 - 4.6 ACLs and Cleartext Devices
 - 4.7 Remote Audit Logging
 - 4.8 Wireless Schedules
 
 - 4.1 Fortress Security Settings
 - Chapter 5 System Options, Maintenance and Licensing
 - Chapter 6 System and Network Monitoring
 - Index
 - Glossary
 
Fortress ES-Series CLI Guide: Network Security, Authentication and Auditing
139
For -length, optionally specify the number of bytes to 
comprise the key, from 
16
 to 
128. 
If you omit this value, the 
default key length is 32 bytes.
The -generate switch always 
results in a hex key. 
Record the resulting PSK. You must also configure a matching 
key on the specified IPsec peer.
You can view the IP addresses of the IPsec peers for which 
PSKs are configured using 
show ipsec-psk:
# show ipsec-psk
IPsec PSKs configured for the following peers:
 172.28.128.208
 172.28.128.209
 172.28.128.210
 172.28.128.211
 172.28.128.212
 172.28.128.213
6 IPsec PSKs configured
To delete IPsec peer PSKs:
# del ipsec-psk -all|-peer 
<peerIPaddr>
4.4.5 IPsec Access Control Lists
An additional level of security can be provided in the Mesh 
Point’s IPsec implementation via the IPsec ACL. 
The function is enabled when at least one ACL entry is 
configured. It is disabled by default: no ACL entries are 
present.
When the ACL is enabled, the Mesh Point compares the X.509 
digital certificates of 802.1X authentication servers against the 
filter criteria in the ACEs contained in the ACL, in the specified 
Priority order. If no match is found, access is denied. If a 
match is found, access is allowed or denied according to the 
ACL entry’s 
Access rule.
You can configure up to 100 IPsec ACL entries to be applied in 
the specified priority.
The ACEs available for inclusion on the ACL are created using
add ace,
 and edited using update ace (see Section 4.3). 
Once Access Control Entries have been created, they can be 
added to the ACL using 
add ipsec-acl. 
# add ipsec-acl -name 
<ACEname>
 -access allow|deny -priority 1-100
Name identifies the ACE that you want to add to the ACL. View 
a list of available ACE names with 
show ace (see Section 4.3). 
Priority establishes the order in which the ACL entry will be 
applied, from 
1
 to 
100
, relative to other configured ACL entries. 
Priority values must be unique. Entries with lower priority 










