User's Manual
Table Of Contents
- Chapter 1 Introduction
 - Chapter 2 Mesh Point CLI and Administrative Access
 - Chapter 3 Networking and Radio Configuration
- 3.1 Network Interfaces
 - 3.2 Network Bridging
- 3.2.1 Bridging Configuration
 - 3.2.2 FastPath Mesh Bridging
 - 3.2.3 Fine-tuning FastPath Mesh Network Performance
- 3.2.3.1 Selecting the FastPath Mesh Multicast Transmit Mode
 - 3.2.3.2 Setting the FastPath Mesh Packet Interval
 - 3.2.3.3 Setting the FastPath Mesh Transmit Control Level
 - 3.2.3.4 Setting Multicast Video Clamping Thresholds
 - 3.2.3.5 Setting Mesh Routing Reactivity
 - 3.2.3.6 Setting Mesh Packet Time To Live
 - 3.2.3.7 Viewing Current Mesh Performance Parameters
 - 3.2.3.8 Frame Processor Parameters
 
 - 3.2.4 STP Bridging
 
 - 3.3 Global Radio Settings
 - 3.4 Individual Radio Settings
- 3.4.1 Radio Band, Short Preamble, Guard Interval
 - 3.4.2 Channel Selection
 - 3.4.3 Distance, Beacon Interval, Noise Immunity
 - 3.4.4 Network Type, Antenna Gain, Tx Power
 - 3.4.5 MIMO
 - 3.4.6 STBC
 - 3.4.7 Channel Lock and Other Channel Selection Features
 - 3.4.8 DFS, TDWR, and Channel Exclusion
 - 3.4.9 Radio BSS Settings
- 3.4.9.1 BSS Radio, BSS Name and SSID
 - 3.4.9.2 WDS Bridging or AP Infrastructure Configuration
 - 3.4.9.3 BSS State, SSID Advertising and Drop Probe Requests
 - 3.4.9.4 BSS STA Idle Timeout and 802.11g-Only Settings
 - 3.4.9.5 BSS Unicast Transmission Rate Settings
 - 3.4.9.6 BSS WMM QoS Setting
 - 3.4.9.7 BSS Fragmentation and RTS Thresholds
 - 3.4.9.8 BSS DTIM Beacon Countdown
 - 3.4.9.9 BSS VLANs Settings
 - 3.4.9.10 BSS Fortress Security Zone
 - 3.4.9.11 FastPath Mesh BSS Cost Offset
 - 3.4.9.12 BSS Multicast Settings
 - 3.4.9.13 Bridging MTU and Beacon Encryption
 - 3.4.9.14 BSS Description
 - 3.4.9.15 BSS Wi-Fi Security Configuration
 
 - 3.4.10 Antenna Tracking / Rate Monitoring
 - 3.4.11 ES210 Mesh Point STA Settings and Operation
- 3.4.11.1 STA Radio, Name, SSID and SSID Roaming
 - 3.4.11.2 STA State
 - 3.4.11.3 STA Unicast Transmission Rate Settings
 - 3.4.11.4 STA Background Scanning
 - 3.4.11.5 STA WMM QoS Setting
 - 3.4.11.6 STA Fragmentation and RTS Thresholds
 - 3.4.11.7 STA Multicast Rate
 - 3.4.11.8 STA Description
 - 3.4.11.9 STA Wi-Fi Security Configuration
 - 3.4.11.10 Editing or Deleting a STA Interface Connection
 - 3.4.11.11 Establishing a STA Interface Connection
 - 3.4.11.12 ES210 Station Access Control Lists
 
 
 - 3.5 Local Area Network Configuration
 - 3.6 Time and Location Configuration
 - 3.7 GPS and Location Configuration
 - 3.8 DHCP and DNS Services
 - 3.9 Ethernet Interfaces
 - 3.10 Quality of Service
 - 3.11 VLANs Implementation
 - 3.12 ES210 Mesh Point Serial Port Settings
 - 3.13 Mesh Viewer Protocol Settings
 
 - Chapter 4 Network Security, Authentication and Auditing
- 4.1 Fortress Security Settings
- 4.1.1 Operating Mode
 - 4.1.2 FIPS Settings
 - 4.1.3 MSP Encryption Algorithm
 - 4.1.4 Encrypted Data Compression
 - 4.1.5 MSP Key Establishment
 - 4.1.6 MSP Re-Key Interval
 - 4.1.7 Key Beacon Interval
 - 4.1.8 Fortress Legacy Devices
 - 4.1.9 Encrypted Zone Cleartext Traffic
 - 4.1.10 Encrypted Zone Management Settings
 - 4.1.11 Authorized Wireless Client Management Settings
 - 4.1.12 Turning Mesh Point GUI Access Off and On
 - 4.1.13 SSH Access to the Mesh Point CLI
 - 4.1.14 Blackout Mode
 - 4.1.15 Allow Cached Credentials
 - 4.1.16 Fortress Access ID
 
 - 4.2 Digital Certificates
 - 4.3 Access Control Entries
 - 4.4 Internet Protocol Security
 - 4.5 Authentication and Timeouts
- 4.5.1 Authentication Servers
 - 4.5.2 Internal Authentication Server
- 4.5.2.1 Basic Internal Authentication Server Settings
 - 4.5.2.2 Certificate Authority Settings
 - 4.5.2.3 Global User and Device Authentication Settings
 - 4.5.2.4 Local 802.1X Authentication Settings
 - 4.5.2.5 OCSP Authentication Server Settings
 - 4.5.2.6 OCSP Cache Settings and Management
 - 4.5.2.7 Internal Authentication Server Access Control Lists
 
 - 4.5.3 User Authentication
 - 4.5.4 Client Device Authentication
 - 4.5.5 Session Idle Timeouts
 
 - 4.6 ACLs and Cleartext Devices
 - 4.7 Remote Audit Logging
 - 4.8 Wireless Schedules
 
 - 4.1 Fortress Security Settings
 - Chapter 5 System Options, Maintenance and Licensing
 - Chapter 6 System and Network Monitoring
 - Index
 - Glossary
 
Fortress ES-Series CLI Guide: System Options, Maintenance and Licensing
183
Hop 1 00:14:8c:32:41:40 (FD00:0:8895:8895:214:8CFF:FE32:4140 - Car2-MAC-4140-IP-20) 1072ms cost=7407 (MESH2)
Hop 2 00:14:8c:31:be:40 (FD00:0:8895:8895:214:8CFF:FE31:BE40 - Car1-MAC-BE40-IP-10) 4167ms cost=7407 (MESH2)
Hop 3 00:10:60:17:53:bc (*) 4168ms cost=0 (Ethernet2)
Total cost = 14814Total cost = 3400
NOTE: The Mesh
Path trace tool is
intended for use only
when FastPath Mesh is
enabled on the Mesh
Point.
The results are similar to traceroute, except that traceroute 
uses OSI Layer 3, and meshpath uses OSI Layer 2. The 
meshpath results display the total end-to-end cost to reach a 
particular node in a FastPath Mesh network, along with each 
hop and its associated cost. 
You must be logged on to an 
administrator
-level or a 
maintenance-level account to execute meshpath (refer to 
Section 2.2).
5.10 Copying Running Configurations 
CAUTION:  You
must only use
copy running-config to
copy configurations to a
Mesh Point of the same
model from which the
configuration file was
created. 
Once a Mesh Point has been configured, you can use that 
Mesh Point’s configuration to set up other Mesh Points in the 
network using 
copy running-config
. 
This command creates a text file that contains all of the 
configuration information for the current Mesh Point, and 
copies it to the specified SCP (Secure Copy) server using 
SSH2 (Secure Shell 2) for in-transit encryption and 
authentication. You can then
 use this file to configure additional 
network Mesh Points. 
Sensitive information in the configuration file is protected by 
use of an encryption key. Generate a configuration file with 
copy running-config:
# copy running-config -from 
<local>
 -to 
<remote-url>
 -encKey 
<keyText>
 -host 
<hostname>
-user 
<username>
 -password 
<password>
 -excludenetworkconf
The 
-from 
<local> parameter indicates that the configuration 
file will be created from the currently running local 
configuration. The file is generated on the local Mesh Point, 
and also transferred to the location specified by the 
-to 
<remote-url> parameter. The remote URL can be either a fully 
qualified domain name (FQDN), or an IP address. 
You must specify an encryption key (
-encKey), a text string of 
8–32 characters used to encrypt the sensitive information in 
the file.
Enter the hostname (
-host) of the target node (the Mesh Point 
where the file will be copied), and the username (
-user) and 
-password required by the SCP server. 
If you include the 
-excludenetworkconf switch, basic network 
parameters (hostname, IP addresses, etc.) will be omitted from 
the configuration file, allowing the file to be installed on a 










