HP ProCurve Wireless Access Point 10ag Installation and Configuration Guide
© Copyright 2007 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. This document contains proprietary information, which is protected by copyright. No part of this document may be photocopied, reproduced, or translated into another language without the prior written consent of HewlettPackard.
Contents 1 Introducing the ProCurve Wireless Access Point 10ag Package Contents . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-3 Front of the Access Point . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-4 LEDs on the Front Panel . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-5 Back of the Access Point . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-6 LAN Port . .
Step 5. Connect the Access Point to a Power Source . . . . . . . . . . . . . 2-12 Step 6. Connect the Network Cable . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-13 Using the RJ-45 Connectors . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-13 3 Getting Started With Access Point Configuration Introducing the Management Web Interface . . . . . . . . . . . . . . . . . . . . . . . . 3-1 Logging On to the Web Interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Configuring Advanced Wireless Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-25 Setting the SNMP Community Names . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-27 Supported MIB Browsers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-28 5 Managing the Access Point Viewing Device Information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-1 Changing the Management Password . . . . . . . . . . . . . . . . . . . . . . . . .
Connectors . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . A-2 Safety . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . A-2 EMC Compliance (Class B) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . A-2 Radio Signal Certification . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . A-2 Immunity . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Règlement d'Industry Canada . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . C-11 NCC Statement . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . C-11 Telec Label . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . C-11 CE Statement . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . C-12 Europe - EU Declaration of Conformity . . . . . . . . . . . . . . . . . . .
vi
1 The ProCurve Wireless Access Point 10ag is a dual-radio 802.11b/g and 802.11a access point that offers maximum flexibility in deployment and optimum throughput for high-density usage areas. Designed for small office/ home office (SOHO) environments, it provides high-speed, reliable wireless networking and comprehensive security and management features. ProCurve Wireless Access Point 10ag NA (J9140A) ProCurve Wireless Access Point 10ag WW (J9141A) The Access Point 10ag has one 10/100Base-TX RJ-45 port.
Introducing the ProCurve Wireless Access Point 10ag Introducing the ProCurve Wireless Access Point 10ag This chapter describes the Access Point 10ag, including: ■ Package Contents ■ Front of the Access Point ■ Back of the Access Point ■ Access Point Features Throughout this manual, the ProCurve Access Point 10ag will be referred to as the ‘access point’.
Introducing the ProCurve Wireless Access Point 10ag Package Contents Before installing and using the access point, verify that the package you received is complete.
Introducing the ProCurve Wireless Access Point 10ag Front of the Access Point Introducing the ProCurve Wireless Access Point 10ag Front of the Access Point ProCurve Wireless Access Point 10ag Power LED 1-4 Wireless LED Ethernet LED
Introducing the ProCurve Wireless Access Point 10ag Front of the Access Point Table 1-1. Access Point LEDs LED Label State Meaning Power Green The access point is receiving power. Off The access point is NOT receiving power. If the power adapter is connected to a power source, verify that the power jack is connected properly to the power connector on the back panel of the access point. Blinking amber Reset to factory default is in progress.
Introducing the ProCurve Wireless Access Point 10ag Introducing the ProCurve Wireless Access Point 10ag Back of the Access Point Back of the Access Point ProCurve Wireless Access Point 10ag Reset to Default button DC power connector Network port 10/100Base-TX RJ-45 port and PoE input LAN Port The access point includes one 10/100Base-TX port.
Introducing the ProCurve Wireless Access Point 10ag Back of the Access Point Note that if the access point is connected to a PoE source device (through the LAN port) and a local power source (through the AC power adapter) at the same time, PoE will be disabled automatically. Reset to Default Button Use the Reset to Default button to reboot the access point or to restore the access point to factory default settings.
Introducing the ProCurve Wireless Access Point 10ag Introducing the ProCurve Wireless Access Point 10ag Access Point Features Access Point Features The wireless features of the Access Point 10ag include: ■ dual-radio design with IEEE 802.11g/b and IEEE 802.11a radios ■ supports up to 54 Mbps data rate on the wireless interface ■ supports10/100Mbps data rate on the Ethernet interface with auto MDI/ MDIX ■ worldwide roaming for 802.
2 Installing the Access Point The access point is easy to install. This chapter provides information on the requirements for installing the access point and guides you through the steps required for the proper installation of the device. Topics covered include: Before You Begin ■ Installation Precautions ■ Installation Procedures Before You Begin Before starting with the installation, make sure that you have the required items for the installation ready.
Installing the Access Point Installation Precautions Wireless Station Requirements For wireless stations on the network to be able to communicate with the access point, they must have at least the following: ■ An operating system that supports TCP/IP networking protocols (for example, Windows 95/98/NT/Me/2000/XP, UNIX, Mac OS 8.5 or later). ■ An 802.11g, 802.11b, or 802.
Installing the Access Point Summary of Installation Tasks ■ When using either the AC power adapter or PoE power, do not install the access point in an environment where the operating ambient temperature might exceed 40°C (104°F). ■ Make sure the air flow around the sides of the access point is not restricted. Summary of Installation Tasks 1. Preconfigure the access point (page 2-4). The access point ships with a default IP address of 192.168.0.11 and a subnet mask of 255.255.255.0.
Installing the Access Point Installation Procedures At this point, your access point is fully installed. See the rest of this chapter if you need more detailed information on any of these installation steps. Installation Procedures Step 1. Preconfigure the Access Point Installing the Access Point In its factory default configuration, the access point is assigned a static IP address of 192.168.1.11 and a subnet mask of 255.255.255.0 (the built-in DHCP client is disabled).
Installing the Access Point Installation Procedures 4. Note Click Internet Protocol (IP), and then click Properties. Remember to write down your computer's current IP address settings. You will need to change them back after you configure the IP address settings of the access point. On the General tab of the Internet Protocol (IP) Properties window, click Use the following IP address. 6. In IP address, type an IP address that is on the same range as the default IP address (192.168.1.
Installing the Access Point Installing the Access Point Installation Procedures 3. In User Name, type admin. 4. In Password, type password. The Web interface appears, showing the Information page. 5. On the menu, click Basic Settings. 6. Configure the IP address settings. 7. Note 2-6 • (Recommended) If you want to assign a fixed IP address to the access point, select Disable in DHCP Client, and then enter the IP Address, IP Subnet Mask, and Default Gateway that you want to assign to it.
Installing the Access Point Installation Procedures 8. Click Apply. You have completed configuring your access point's IP address settings so that it can work on your network. Remember to change your computer's IP address settings to its original settings. Disconnect the access point from the management computer. You are now ready to find a suitable location for the access point and to connect the access point to the network.
Installing the Access Point Installation Procedures Step 2. Prepare the Installation Site Cabling Infrastructure Ensure that the cabling infrastructure meets the necessary network specifications. Refer to Table 2-1 for cable types and lengths. For more information, refer to Appendix B, “Access Point Port and Network Cables” on page B-1. Table 2-1.
Installing the Access Point Installation Procedures wireless PC in a BSS can communicate with any computer in its wireless group, or access other computers or network resources in the wired LAN through the access point. The infrastructure configuration extends the accessibility of wireless PCs to the wired LAN and can be used for access to central network resources, or for connections between mobile workers, as shown in the following figure. Figure 2-1.
Installing the Access Point Installation Procedures Step 3. Verify the Access Point Completes Initialization Before deploying the access point to its network location, you should first verify that it is working properly by plugging it into a power source, or connecting it to a switch that provides Power over Ethernet, and verifying that it completes its system initialization. Installing the Access Point 1.
Installing the Access Point Installation Procedures 2. Check the LEDs on the access point as described below. Wireless LEDs Ethernet LED When the access point is powered on, it performs its system initialization. The system initialization takes between 30 seconds and one minute to complete.
Installing the Access Point Installation Procedures Step 4. Position the Access Point Installing the Access Point Unplug the access point from its power source, and then place it in the network location that you have chosen. The access point can be installed on a flat surface (for example, on a desktop) or wall-mounted (mounting kit not included).
Installing the Access Point Installation Procedures Step 6. Connect the Network Cable Connect the network cable, described under ““Cabling Infrastructure” on page 2-8, from the network device or your patch panel to the LAN port on the access point. Using the RJ-45 Connectors If the 10/100Base-TX link LED does not go on when the network cable is connected to the port, see “Diagnosing with the LEDs” in Chapter 5, “Troubleshooting”.
Installing the Access Point Installing the Access Point Installation Procedures 2-14
3 Getting Started With Access Point Configuration This chapter is a guide for logging on to the the Web interface and provides a summary of the essential configuration tasks you need to perform to get the access point up and running on your network.
Getting Started With Access Point Configuration Introducing the Management Web Interface The Web browser that you will use for administration must have JavaScript enabled to support the interactive features of the Web interface. It must also support HTTP uploads to use the firmware upgrade feature.
Getting Started With Access Point Configuration Introducing the Management Web Interface Figure 3-1. Information Page (Web Interface Home Page) Menu Note The Web interface does not have a Log Off button. To end your Web interface session safely, HP recommends closing the Web browser. The Web interface provides logical window groups for easy access to common setup, management, and advanced configuration features.
Getting Started With Access Point Configuration Introducing the Management Web Interface Figure 3-2. Web Interface Elements Menu Information Pane The Web interface has two primary sections: Getting Started With Access Point Configuration ■ ■ 3-4 The menu: Located on the left-hand side of the page, the menu contains links to the primary configuration options on the Web interface.
Getting Started With Access Point Configuration Tasks for Your First Web Browser Interface Session Tasks for Your First Web Browser Interface Session The first time you access the Web browser interface, there are a number of basic tasks that you should perform. Table 3-1 lists these essential tasks. For specific instructions on the how perform the procedure, refer to the page number listed in the right column.
Getting Started With Access Point Configuration Default Configuration Parameters Table 3-2. Parameter Default Description Username admin The name of the manager. Password password The password for the manager. IP Address 192.168.1.11 IP address compatible with your network. Subnet Mask 255.255.255.0 Subnet mask compatible with your network. Default Gateway not set IP address of the next-hop gateway node for network traffic that needs to be able to reach off-subnet destinations.
4 Setting Up the Access Point This chapter provides information on how configure the access point’s network, wireless, and security settings to ensure its proper operation on the network. It also describes how to configure advanced options, such as the wireless radio settings and the built-in SNMP agent.
Setting Up the Access Point Configuring Basic Settings Figure 4-1. Basic Settings Page Setting Up the Access Point To configure the access point’s basic settings: Note 4-2 1. On the menu, click Basic Settings. 2. Configure the IP address settings. • Assign an IP address (recommended) – If you want to assign a fixed IP address to the access point, select Disable in DHCP Client, and then enter the IP Address, IP Subnet Mask, and Default Gateway that you want to assign to it.
Setting Up the Access Point Configuring Basic Wireless Settings Notes 3. If your network requires network devices to support the Spanning Tree Protocol (for example, if your network requires STP for redundancy), select the Enable button. 4. In Country/Region, select the country or region where you are installing the access point (if you have not done so earlier). ■ The Country/Region option is unavailable in Access Point 10ag NA. The country is fixed to USA.
Setting Up the Access Point Configuring Basic Wireless Settings Figure 4-2. Basic Wireless Settings Page Creating a Wireless Profile Setting Up the Access Point Note 4-4 The access point ships with one preconfigured wireless profile for 802.11a.
Setting Up the Access Point Configuring Basic Wireless Settings Figure 4-3. Add Wireless Profile Page To create a new wireless profile: 1. On the menu, click Wireless Settings under Setup. The SSID List page appears. 2. Click Add. The Wireless Settings page appears. 3. In Wireless Network Name (SSID), type a unique SSID (not used on your network) that you want to assign to the wireless profile. 4.
Setting Up the Access Point Configuring Basic Wireless Settings 7. In Data Rate, select the maximum speed at which the access point can transmit traffic for this wireless profile. If you want the access point to automatically use the optimum data rate for the associated wireless stations, select Best. 8. Click Apply. A confirmation message appears. 9. Click OK to finish creating the wireless profile. Editing a Wireless Profile To edit an existing wireless profile: 1.
Setting Up the Access Point Configuring the Security Settings Configuring the Security Settings Unlike wired networks, anyone with a compatible wireless card can receive your wireless data transmissions well beyond your walls. Operating an unsecured wireless network creates an opportunity for outsiders to eavesdrop on your network traffic or to enter your network to access your computers and files. For this reason, use the security features of your wireless equipment.
In addition, user data is transmitted over the air without being encrypted, and is subject to being intercepted by client stations anywhere within range that want to eavesdrop on the wireless network. Wireless network security requires attention to three main areas: ■ Authentication: Verifying that stations attempting to connect to the network are authorized users before granting access to the network.
Setting Up the Access Point Configuring the Security Settings The Access Point 10ag supports all EAP type tested by the WiFi Alliance; TLS, TTLS, PEAP0/MSCHAPv2, PEAP1/GTC and SIM. EAP types which do not provide key management (like MD5) are not suitable for wireless networks. 802.1X authentication can be used with WEP, TKIP and AES encryption ciphers. It is possible to use a combination of both MAC authentication and 802.1X authentication simultaneously on the same WLAN.
Setting Up the Access Point Configuring the Security Settings Deciding Which Security Profile to Use Table 4-1 shows a summary of available security profiles. Use this table as a reference when deciding on which security profile best suits your network. Remember that certain security profiles may require additional software or hardware. 802.1X, for example, requires a RADIUS server to be configured on the network. Additionally, not all wireless network cards support WPA.
Setting Up the Access Point Configuring the Security Settings Note The security profile for each SSID must be set separately. For example, if you set wireless-a to use WPA2, it will only be be applied to wireless-a. If you want other SSIDs to use WPA2 as well, you need to configure each one separately. Caution! When access point configuration parameters are changed, wireless stations may be temporarily disconnected until the new configuration parameter is enabled.
Setting Up the Access Point Configuring the Security Settings Figure 4-5. No Security (Default) Page To use no security (not recommended): 1. On the menu, click Security Settings. The Security Settings page appears. 2. In SSID, select the SSID for which you want to set the security profile. 3. Under Security Options, click None. 4. Click Apply to save your changes. Repeat this procedure for every SSID that you want to use no security.
Setting Up the Access Point Configuring the Security Settings Caution! WEP has been found to be seriously flawed and is not be recommended for a high level of network security. For more robust wireless security, the access point provides Wi-Fi Protected Access (WPA or WPA2) for improved data encryption and user authentication. Figure 4-6. WEP Options To use WEP: On the menu, click Security Settings. The Security Settings page appears. 2.
Setting Up the Access Point Configuring the Security Settings Caution! Shared Key mode is seriously flawed, in that it utilizes the static WEP encryption key (transmitted openly) for station authentication. This allows the WEP encryption key to be easily discovered by anyone who might eavesdrop on the wireless network. If static WEP is configured, it is recommended to select Open System authentication. • Encryption Strength: Set the length of the encryption key that will be used.
Setting Up the Access Point Configuring the Security Settings Figure 4-7. WPA-PSK (TKIP) Options To use WPA-PSK (TKIP): 1. On the menu, click Security Settings. The Security Settings page appears. 2. In SSID, select the SSID for which you want to set the security profile. 3. Under Security Options, click WPA-PSK (TKIP). 4. In the Password Phrase box under Security Options (WPA-PSK), enter a string of at least 8 characters to a maximum of 63 characters.
Setting Up the Access Point Configuring the Security Settings Figure 4-8. WPA2-PSK (AES) Options To use WPA2-PSK (AES): 1. On the menu, click Security Settings. The Security Settings page appears. 2. In SSID, select the SSID for which you want to set the security profile. 3. Under Security Options, click WPA2-PSK (AES). 4. In the Password Phrase box under Security Options (WPA-PSK), enter a string of at least 8 characters to a maximum of 63 characters.
Setting Up the Access Point Configuring the Security Settings Figure 4-9. WPA-PSK (TKIP) / WPA2-PSK (AES) Options To use WPA-PSK (TKIP) / WPA2-PSK (AES): 1. On the menu, click Security Settings. The Security Settings page appears. 2. In SSID, select the SSID for which you want to set the security profile. 3. Under Security Options, click WPA-PSK (TKIP) / WPA2-PSK (AES). 4.
Setting Up the Access Point Configuring the Security Settings Configuring WPA (TKIP) This security profile uses TKIP as the encryption cipher and 802.1X as the authentication mechanism. In this way, each station is going to utilize a unique master key to derive the encryption between the access point and station. Figure 4-10. WPA (TKIP) Options Setting Up the Access Point To use WPA (TKIP): 4-18 1. On the menu, click Security Settings. The Security Settings page appears. 2.
Setting Up the Access Point Configuring the Security Settings • 6. RADIUS Secret: Type a shared text string used to encrypt messages between the access point and the RADIUS server. Make sure that the same text string is specified on the RADIUS Accounting server. Do not use blank spaces in the string. (Maximum length: 20 characters) Click Apply to save your changes. Repeat the same procedure for each SSID to which you want to assign WPA (TKIP) as its security profile.
Setting Up the Access Point Configuring the Security Settings Configuring WPA2 (AES) This security profile uses AES as the encryption cipher and 802.1X as the authentication mechanism. In this way, each station is assigned a unique master key to derive the encryption between the access point and station, and the encryption keys can be automatically and periodically changed to further reduce the possibility of their discovery. Figure 4-11.
Setting Up the Access Point Configuring the Security Settings • 5. RADIUS Secret: Type a shared text string used to encrypt messages between the access point and the RADIUS server. Make sure that the same text string is specified on the RADIUS Accounting server. Do not use blank spaces in the string. (Maximum length: 20 characters) Click Apply to save your changes. Repeat the same procedure for each SSID to which you want to assign WPA2 (AES) as its security profile. Configuring 802.1X 802.
Setting Up the Access Point Controlling Access to the Wireless Network To use 802.1X: 1. On the menu, click Security Settings. The Security Settings page appears. 2. In SSID, select the SSID for which you want to set the security profile. 3. Under Security Options, click 8021.x. 4. Under Security Options (802.1X), configure the RADIUS server settings: 5. • RADIUS Server IP: Type the IP address of the RADIUS server on the network.
Setting Up the Access Point Controlling Access to the Wireless Network Figure 4-13. Access Control Page There are two options for setting up access control on the wireless network: Note ■ Local MAC authentication, and ■ Remote MAC authentication You can only use one type of MAC authentication at any given time. When both local and remote MAC authentication are enabled and configured, local MAC authentication will override remote MAC authentication.
Setting Up the Access Point Controlling Access to the Wireless Network To configure local MAC authentication: 1. On the menu, click Access Control. 2. In SSID, select the SSID to which you want allow the wireless station access. 3. In MAC Authentication, select Local. 4. In Access Control, select the access option that you want to configure for the wireless station. Options include: • Disable: Click to disable MAC authentication.
Setting Up the Access Point Configuring Advanced Wireless Settings Setting Up Remote MAC Authentication Configuring Advanced Wireless Settings Advanced wireless settings include options for enabling and disabling the wireless radios and Wi-Fi Multimedia (WMM). Options for fine tuning the access point’s radio operation are also available. Figure 4-14. Advanced Wireless Settings Page To configure the advanced wireless settings: On the menu, click Wireless Settings under Advanced Settings. 2.
Setting Up the Access Point Configuring Advanced Wireless Settings Setting Up the Access Point 4. 5. 4-26 Configure the following advanced wireless settings for the SSID that you selected: • RTS Threshold: Sets the packet size threshold at which a Request to Send (RTS) signal must be sent to a receiving station prior to the sending station starting communications. The access point sends RTS frames to a receiving station to negotiate the sending of a data frame.
Setting Up the Access Point Setting the SNMP Community Names Setting the SNMP Community Names You can manage the access point from a network management station running a Simple Network Management Protocol (SNMP) management application, such as ProCurve Manager. The access point SNMP agent supports SNMP versions 1 and 2c. Management access from SNMP v1 or v2c stations is controlled by community names.
Setting Up the Access Point Setting the SNMP Community Names 3. To establish a private read-write SNMP community, type a name text string to replace the default community name (private) in the Read Write text field. 4. Click Apply to save your changes and activate the new SNMP community names. Supported MIB Browsers Setting Up the Access Point In addition to ProCurve Manager, you can also use third-party management information base (MIB) browsers to manage the access point via SNMP.
5 This chapter describes management tasks that you may periodically perform, including changing the management password and upgrading the firmware.
Managing the Access Point Viewing Device Information Managing the Access Point Figure 5-1.
Managing the Access Point Changing the Management Password Mode: Shows the wireless mode in use, either g/b (802.11gb) or a (802.11a) • Channel: Shows the wireless channel on which the access point is broadcasting signal. • Security Type: Shows the security profile assigned to this wireless interface. Changing the Management Password Management access to the Web interface is controlled through an administrator password.
Managing the Access Point Changing the Management Password Managing the Access Point Figure 5-2. Change Password Page To change the default Web interface password: 1. On the menu, click Change Password. The Change Password page appears. 2. In Set Password, type your new password. Note The password is case-sensitive and must be between 1 and 32 alphanumeric characters long. 3. In Repeat New Password, type your new password again to confirm. 4. In Restore Default Password, click No. 5.
Managing the Access Point Upgrading the Firmware Do NOT press the Reset to Default button for more than four (4) seconds. Doing so will reset the access point to factory default configuration and erase all your current access point configuration. Upgrading the Firmware The upgrade function allows you to install on the Access Point any new firmware releases that may be made available. To install the new firmware, you first need to download the firmware from the HP Web site to the management computer.
Managing the Access Point Managing the Access Point Upgrading the Firmware Note Upgrading the firmware will not change the current configuration of the access point. The access point configuration is contained in a separate file that can also be transferred, for example, for archive purposes or to be used in another access point of the same model. It is recommended that you save a copy of the configuration file before upgrading your access point software.
Managing the Access Point Viewing the List of Associated Stations On the menu, click Information. 7. Check the value for Firmware Version and verify that it shows a later version than what was installed before the update. Viewing the List of Associated Stations You can view which wireless stations are associated with the access point anytime by accessing the Station List page on the Web interface. To access the page, click Station List on the menu.
Managing the Access Point Managing the Access Point Backing Up and Restoring Configuration Backing Up and Restoring Configuration To back up the current access point configuration: 1. On the menu, click Backup Settings. The Backup Settings page appears. 2. Click Backup under Save a Copy of Current Settings. A browser dialog box appears, as your browser attempts to download the configuration file from the access point. 3. Click Save. The Save As dialog box appears. 4.
Managing the Access Point Rebooting the Access Point Click OK to restore settings from the backup file and overwrite the current settings. The message Please wait... appears as the access point restores the backup configuration file. When the access point has completed the restore process, the following message appears: AP is rebooting...... PLEASE WAIT until re-directed to Information page. The browser page refreshes, and the Information page appears.
Managing the Access Point Rebooting the Access Point Managing the Access Point Figure 5-5. Reboot Page To reboot the Access Point: 1. On the menu, click Reboot AP. 2. In Reboot access point, click Yes. 3. Click Apply. A confirmation message appears. 4. Click OK. The following message appears: AP is rebooting...... PLEASE WAIT until re-directed to Information page. When the Access Point has rebooted, the logon dialog box appears. 5.
6 Troubleshooting This chapter describes how to troubleshoot your ProCurve Wireless Access Point 10ag. Note that this document describes troubleshooting mostly from a hardware perspective. This chapter describes the following: Basic Troubleshooting Tips ■ Diagnosing with the LEDs ■ Hardware Diagnostic Tests ■ Restoring Factory Default Configuration ■ HP Customer Support Services Troubleshooting ■ Basic Troubleshooting Tips Most problems are caused by the following situations.
Troubleshooting Basic Troubleshooting Tips Troubleshooting All devices connected to the Access Point 10ag should be configured to auto-negotiate. To correct this problem you have to manually set the access point’s RJ-45 port to match the duplex mode used by the attached device. ■ Faulty or loose cables. Look for loose or obviously faulty connections. If the cables appear to be OK, make sure the connections are secure. If that does not correct the problem, try a different cable. ■ Non-standard cables.
Troubleshooting Diagnosing with the LEDs Diagnosing with the LEDs Table 6-1 shows LED patterns on the access point that indicate problem conditions. 1. Check in the table for the LED pattern that you see on your access point. 2. Refer to the corresponding diagnostic tip on the next few pages. Table 6-1.
Troubleshooting Diagnosing with the LEDs Diagnostic Tips Problem Solution 1 The access point is not plugged into an active AC power source, or the access point’s AC power adapter may have failed. 1. Verify that the power cord is plugged into an active power source and to the access point's AC power adapter. Make sure these connections are secure. 2. Try power-cycling the access point by unplugging and plugging the power cord back in. 3.
Troubleshooting Diagnosing with the LEDs Tip Problem Solution 5 The 10/100Base-TX network connection is not working properly. Try the following procedures: • Verify that both ends of the cabling, at the access point and the connected device, are connected properly. • Verify the connected device and access point are both powered on and operating correctly. • Verify duplex operation (see page 6-1). • If these procedures don’t resolve the problem, try using a different cable.
Troubleshooting Hardware Diagnostic Tests Hardware Diagnostic Tests Testing the Access Point by Resetting It Troubleshooting If you believe that the access point is not operating correctly, you can reset the access point. To reset the access point, either Caution ■ Unplug and plug in the power cord (power-cycling). ■ Press the Reset button on the back of the access point for about two seconds (until the LEDs start to blink rapidly).
Troubleshooting Restoring Factory Default Configuration Testing Access Point-to-Device Network Communications You can perform the following communication tests to verify that the network is operating correctly between the access point and any connected device that can respond correctly to the communication test.
Troubleshooting Restoring Factory Default Configuration You can restore factory default configuration either by pressing the Reset to Default button on the rear panel, or by clicking the Erase button on the Backup Settings page. Note The system, password, custom default, and factory default reset functions can be disabled by the access point’s software. Troubleshooting To restore to factory default using the Reset to Default button: 1.
Troubleshooting HP Customer Support Services HP Customer Support Services If you are still having trouble with your access point, Hewlett-Packard offers support 24 hours a day, seven days a week through the use of a number of automated electronic services. See the Customer Support/Warranty booklet that came with your access point for information on how to use these services to get technical support. The ProCurve Networking Web site, http:// www.hp.
Troubleshooting HP Customer Support Services Troubleshooting — This page is intentionally unused.
Troubleshooting HP Customer Support Services Troubleshooting 6-11
A Specifications Physical Width: 178 mm Depth: 103 mm Height: 34 mm Weight: 285 g Electrical Adapter AC voltage: 100-240 volts, 0.5A, 50/60 Hz DC voltage: 12 volts, 1.25A (max) Power consumption: 15 watts (max) Environmental Operating Non-Operating Temperature: 0°C to 40°C (32°F to 104°F) PoE mode -40°C to 70°C (-40°F to 158°F) Relative humidity: (non-condensing) 15% to 95% Maximum altitude: 3.
Specifications Connectors ■ The 10/100 Mbps RJ-45 twisted-pair port is compatible with the IEEE 802.3u 100Base-TX and IEEE 802.3 Type 10Base-T standards. Note: To provide Power over Ethernet to the access point, all 4 pairs of wires must be connected for any network cable attached to this port. Safety Complies with: ■ IEC 60950-1: 2001 ■ EN 60950-1: 2002 ■ UL 60950-1 1st Ed. ■ CAN/CSA-C22.2 No. 60950-1-03 EMC Compliance (Class B) Specifications Complies with: ■ FCC Part 15.107 and 15.
Specifications Wireless 802.11b/g Radio Standard: IEEE 802.11b/g Radio Technology: Direct Sequence Spread Spectrum (DSSS) Orthogonal Frequency Division Multiplexing (OFDM) Data Rate: 1, 2, 5.5, 6, 9, 11, 12, 18, 24, 36, 48, 54 Mbps per channel Operating Frequency: 2.4 ~ 2.4835 GHz (US, Canada, Taiwan, ETSI) 2.4 ~ 2.497 GHz (Japan) Maximum Channels: FCC/IC/NCC: 1-11, ETSI: 1-13, MKK: 1-13 (802.11g), 1-14 (802.
Specifications Specifications Receiver Sensitivity A-4 Radio ProCurve AP 10ag NA (J9140A) ProCurve AP 10ag (J9141A) 802.11b (typical) 11Mbps @ -87dBm; 5.5Mbps @ -91dBm; 11Mbps @ -87dBm; 5.5Mbps @ -89dBm; 2Mbps @ -92dBm; 1Mbps @ -97dBm 2Mbps @ -91dBm; 1Mbps @ -94dBm 802.
B Access Point Port and Network Cables This appendix includes access point connector information and network cable information for cables that should be used with the Access Point 10ag, including minimum pin-out information and specifications for twisted-pair cables. Note Incorrectly wired cabling is the most common cause of problems for LAN communications. HP recommends that you work with a qualified LAN cable installer for assistance with your cabling requirements.
Access Point Port and Network Cables Twisted-Pair Cable/Connector Pin-Outs Twisted-Pair Cable/Connector Pin-Outs The access point includes one 10/100Base-TX port. This port uses the “HP Auto MDIX” feature, which means that you can use either straight-through or crossover twisted-pair cables to connect the access point to a switch.
Access Point Port and Network Cables Twisted-Pair Cable/Connector Pin-Outs Straight-Through Twisted-Pair Cable for 10 Mbps or 100 Mbps Network Connections Because the 10/100 port on the access point supports auto-MDIX operation, you can use either “straight-through” or “crossover” cable for network connections to PCs, servers, hubs, or switches. Cable Diagram Note Pins 1 and 2 on connector “A” must be wired as a twisted pair to pins 1 and 2 on connector “B”.
Access Point Port and Network Cables Twisted-Pair Cable/Connector Pin-Outs Crossover Twisted-Pair Cable for 10 Mbps or 100 Mbps Network Connection Because the 10/100 port on the access point supports auto-MDIX operation, you can use either “straight-through” or “crossover” cable for network connections to PCs, servers, hubs, or switches. Cable Diagram Note Pins 1 and 2 on connector “A” must be wired as a twisted pair to pins 3 and 6 on connector “B”.
C Safety and EMC Regulatory Statements Safety and EMC Regulatory Statements Safety Information ! Documentation reference symbol. If the product is marked with this symbol, refer to the product documentation to get more information about the product. WARNING A WARNING in the manual denotes a hazard that can cause injury or death. CAUTION A CAUTION in the manual denotes a hazard that can damage the equipment or create a non-compliant condition.
Safety and EMC Regulatory Statements Safety and EMC Regulatory Statements Safety Information Regulatory Model Identification Number For regulatory identification purposes, this product has been assigned a Regulatory Model Number (RMN). The RMN for your product is RSVLC-0702. The RMN should not be confused with the marketing name (ProCurve Wireless Access Point 10ag) or the Product Numbers J9140A (NA) and J9141A (WW).
Safety and EMC Regulatory Statements Informations concernant la sécurité ! Symbole de référence à la documentation. Si le produit est marqué de ce symbole, reportez-vous à la documentation du produit afin d'obtenir des informations plus détaillées. WARNING Dans la documentation, un WARNING indique un danger susceptible d'entraîner des dommages corporels ou la mort. CAUTION Un texte de mise en garde intitulé CAUTION indique un danger susceptible de causer des dommages à l'équipement.
Safety and EMC Regulatory Statements Safety and EMC Regulatory Statements Hinweise zur Sicherheit Hinweise zur Sicherheit ! Symbol für Dokumentationsverweis. Wenn das Produkt mit diesem Symbol markiert ist, schlagen Sie bitte in der Produktdokumentation nach, um mehr Informationen über das Produkt zu erhalten. WARNING Eine WARNING in der Dokumentation symbolisiert eine Gefahr, die Verletzungen oder sogar Todesfälle verursachen kann.
Safety and EMC Regulatory Statements Considerazioni sulla sicurezza ! Simbolo di riferimento alla documentazione. Se il prodotto è contrassegnato da questo simbolo, fare riferimento alla documentazione sul prodotto per ulteriori informazioni su di esso. WARNING La dicitura WARNING denota un pericolo che può causare lesioni o morte. CAUTION La dicitura CAUTION denota un pericolo che può danneggiare le attrezzature.
Safety and EMC Regulatory Statements Safety and EMC Regulatory Statements Consideraciones sobre seguridad Consideraciones sobre seguridad ! Símbolo de referencia a la documentación. Si el producto va marcado con este símbolo, consultar la documentación del producto a fin de obtener mayor información sobre el producto. WARNING Una WARNING en la documentación señala un riesgo que podría resultar en lesiones o la muerte.
Safety and EMC Regulatory Statements Safety Information (Japan) Safety and EMC Regulatory Statements Safety Information (Japan) C-7
Safety and EMC Regulatory Statements Safety and EMC Regulatory Statements Safety Information (China) Safety Information (China) C-8
Safety and EMC Regulatory Statements EMC Regulatory Statements Federal Communication Commission Interference Statement This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation.
Safety and EMC Regulatory Statements EMC Regulatory Statements Safety and EMC Regulatory Statements If this device is going to be operated in 5.15 ~ 5.25GHz frequency range, then it is restricted in indoor environment only. This transmitter must not be co-located or operating in conjunction with any other antenna or transmitter. We declare that the product is limited in CH1-CH11 for 2.4G band by specific firmware controlled by the manufacturer and is not user changeable.
Safety and EMC Regulatory Statements EMC Regulatory Statements Safety and EMC Regulatory Statements Règlement d'Industry Canada Les conditions de fonctionnement sont sujettes à deux conditions: 1) Ce périphérique ne doit pas causer d'interférence et. 2) Ce périphérique doit accepter toute interférence, y compris les interférences pouvant perturber le bon fonctionnement de ce périphérique.
Safety and EMC Regulatory Statements EMC Regulatory Statements Safety and EMC Regulatory Statements CE Statement Europe - EU Declaration of Conformity This device complies with the essential requirements of the R&TTE Directive 1999/5/EC.
Safety and EMC Regulatory Statements EMC Regulatory Statements This device may not be used for setting up outdoor radio links in France and in some areas the RF output power may be limited to 10 mW EIRP in the frequency range of 2454 - 2483.5 MHz.
Safety and EMC Regulatory Statements EMC Regulatory Statements Safety and EMC Regulatory Statements Èesky [Czech] Dansk [Danish] Deutsch [German] Eesti [Estonian] English Español [Spanish] Ελληνική [Greek] Français [French] Italiano [Italian] Latviski [Latvian] Lietuvių [Lithuanian] Nederlands [Dutch] Malti [Maltese] C-14 [Jméno výrobce] tímto prohlašuje, že tento [typ zaøízení] je ve shodì se základními požadavky a dalšími pøíslušnými ustanoveními smìrnice 1999/5/ES.
Safety and EMC Regulatory Statements EMC Regulatory Statements Polski [Polish] Português [Portuguese] Slovensko [Slovenian] Slovensky [Slovak] Suomi [Finnish] Svenska [Swedish] Alulírott, [gyártó neve] nyilatkozom, hogy a [... típus] megfelel a vonatkozó alapvetõ követelményeknek és az 1999/5/EC irányelv egyéb elõírásainak. Niniejszym [nazwa producenta] oświadcza, ¿e [nazwa wyrobu] jest zgodny z zasadniczymi wymogami oraz pozosta³ymi stosownymi postanowieniami Dyrektywy 1999/5/EC.
Safety and EMC Regulatory Statements Safety and EMC Regulatory Statements EMC Regulatory Statements C-16
C Open Source Licenses C-1
Open Source Licenses Contents Contents . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . C-2 Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . C-3 GPL2 (GNU General Public License, v.2) . . . . . . . . . . . . . . . . . . . . . . C-4 GPL + Linking Exception . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . C-10 ClearSilver . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Open Source Licenses Overview This appendix includes the following information: ■ Open Source licenses C-3
Open Source Licenses GPL2 (GNU General Public License, v.2) GNU GENERAL PUBLIC LICENSE Version 2, June 1991 Copyright (C) 1989, 1991 Free Software Foundation, Inc. 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA Everyone is permitted to copy and distribute verbatim copies of this license document, but changing it is not allowed. Preamble The licenses for most software are designed to take away your freedom to share and change it.
Open Source Licenses GNU GENERAL PUBLIC LICENSE TERMS AND CONDITIONS FOR COPYING, DISTRIBUTION AND MODIFICATION 0. This License applies to any program or other work which contains a notice placed by the copyright holder saying it may be distributed under the terms of this General Public License.
Open Source Licenses them as separate works. But when you distribute the same sections as part of a whole which is a work based on the Program, the distribution of the whole must be on the terms of this License, whose permissions for other licensees extend to the entire whole, and thus to each and every part regardless of who wrote it.
Open Source Licenses received copies, or rights, from you under this License will not have their licenses terminated so long as such parties remain in full compliance. 5. You are not required to accept this License, since you have not signed it. However, nothing else grants you permission to modify or distribute the Program or its derivative works. These actions are prohibited by law if you do not accept this License.
Open Source Licenses 9. The Free Software Foundation may publish revised and/or new versions of the General Public License from time to time. Such new versions will be similar in spirit to the present version, but may differ in detail to address new problems or concerns. Each version is given a distinguishing version number.
Open Source Licenses To do so, attach the following notices to the program. It is safest to attach them to the start of each source file to most effectively convey the exclusion of warranty; and each file should have at least the "copyright" line and a pointer to where the full notice is found.
Open Source Licenses GPL + Linking Exception “GPL2 (GNU General Public License, v.2)” plus an exception permitting linking the library with other software.
Open Source Licenses ClearSilver Neotonic ClearSilver is available under the following license, derived from the Apache Software License v1.1 For alternative licensing, please contact the authors at clearsilver@neotonic.com Neotonic ClearSilver Software License Version 1.0 Copyright (c) 2001 Brandon Long and Neotonic Software Corporation. All rights reserved. Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: 1.
Open Source Licenses This software consists of voluntary contributions made by many individuals on behalf of Neotonic Software Corporation. For more information on Neotonic Software Corporation, please see http:// www.neotonic.com/. Some of the concepts of this software are based on previous software developed by Scott Shambarger, Paul Clegg, and John Cwikla. The current authors wish to thank them for their efforts. Copyright © 2005 Brandon Long, All rights reserved.
Open Source Licenses Dropbear License The majority of code is written by Matt Johnston, under the following license: Copyright (c) 2002,2003 Matt Johnston All rights reserved.
Open Source Licenses atomicio.c and strlcat() (included in util.c) are from OpenSSH 3.6.1p2, and are licensed under the 2 point BSD license. loginrec is written primarily by Andre Lucas, atomicio.c by Theo de Raadt. strlcat() is (c) Todd C. Miller ===== Import code in keyimport.c is modified from PuTTY's import.c, licensed as follows: PuTTY is copyright 1997-2003 Simon Tatham.
Open Source Licenses LGPL (GNU Lesser General Public License) GNU LESSER GENERAL PUBLIC LICENSE Version 2.1, February 1999 Copyright (C) 1991, 1999 Free Software Foundation, Inc. 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA Everyone is permitted to copy and distribute verbatim copies of this license document, but changing it is not allowed. [This is the first released version of the Lesser GPL.
Open Source Licenses that what they have is not the original version, so that the original author's reputation will not be affected by problems that might be introduced by others. Finally, software patents pose a constant threat to the existence of any free program. We wish to make sure that a company cannot effectively restrict the users of a free program by obtaining a restrictive license from a patent holder.
Open Source Licenses GNU LESSER GENERAL PUBLIC LICENSE TERMS AND CONDITIONS FOR COPYING, DISTRIBUTION AND MODIFICATION 0. This License Agreement applies to any software library or other program which contains a notice placed by the copyright holder or other authorized party saying it may be distributed under the terms of this Lesser General Public License (also called "this License"). Each licensee is addressed as "you".
Open Source Licenses c) You must cause the whole of the work to be licensed at no charge to all third parties under the terms of this License.
Open Source Licenses If distribution of object code is made by offering access to copy from a designated place, then offering equivalent access to copy the source code from the same place satisfies the requirement to distribute the source code, even though third parties are not compelled to copy the source along with the object code. 5.
Open Source Licenses b) Use a suitable shared library mechanism for linking with the Library. A suitable mechanism is one that (1) uses at run time a copy of the library already present on the user's computer system, rather than copying library functions into the executable, and (2) will operate properly with a modified version of the library, if the user installs one, as long as the modified version is interface-compatible with the version that the work was made with.
Open Source Licenses 9. You are not required to accept this License, since you have not signed it. However, nothing else grants you permission to modify or distribute the Library or its derivative works. These actions are prohibited by law if you do not accept this License.
Open Source Licenses Each version is given a distinguishing version number. If the Library specifies a version number of this License which applies to it and "any later version", you have the option of following the terms and conditions either of that version or of any later version published by the Free Software Foundation. If the Library does not specify a license version number, you may choose any version ever published by the Free Software Foundation. 14.
Open Source Licenses Copyright (C) This library is free software; you can redistribute it and/or modify it under the terms of the GNU Lesser General Public License as published by the Free Software Foundation; either version 2 of the License, or (at your option) any later version.
Open Source Licenses Intel (2) Copyright (c) 2000-2003 Intel Corporation All rights reserved. Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: ❥ Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer.
Open Source Licenses MIT Permission is hereby granted, free of charge, to any person obtaining a copy of this software and associated documentation files (the "Software"), to deal in the Software without restriction, including without limitation the rights to use, copy, modify, merge, publish, distribute, sublicense, and/or sell copies of the Software, and to permit persons to whom the Software is furnished to do so, subject to the following conditions: The above copyright notice and this permission notice
Open Source Licenses BSD Copyright (c) [dates as appropriate to package] The Regents of the University of California. All rights reserved. Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: 1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer. 2.
Open Source Licenses CMU (Carnegie Mellon University) Copyright (c) 1984-2000 Carnegie Mellon University. All rights reserved. Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: 1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer. 2.
Open Source Licenses OpenSSL LICENSE ISSUES =============== The OpenSSL toolkit stays under a dual license, i.e. both the conditions of the OpenSSL License and the original SSLeay license apply to the toolkit. See below for the actual license texts. Actually both licenses are BSD-style Open Source licenses. In case of any license issues related to OpenSSL please contact openssl-core@openssl.org.
Open Source Licenses INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Open Source Licenses 4. If you include any Windows specific code (or a derivative thereof) from the apps directory (application code) you must include an acknowledgement:: "This product includes software written by Tim Hudson (tjh@cryptsoft.com)" THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
D Recycle Statements Waste Electrical and Electronic Equipment (WEEE) Statements Likvidace zařízení soukromými domácími uživateli v Evropské unii Tento symbol na produktu nebo balení označuje výrobek, který nesmí být vyhozen spolu s ostatním domácím odpadem. Povinností uživatele je předat takto označený odpad na předem určené sběrné místo pro recyklaci elektrických a elektronických zařízení.
Recycle Statements Waste Electrical and Electronic Equipment (WEEE) Statements Seadmete jäätmete kõrvaldamine eramajapidamistes Euroopa Liidus See tootel või selle pakendil olev sümbol näitab, et kõnealust toodet ei tohi koos teiste majapidamisjäätmetega kõrvaldada. Teie kohus on oma seadmete jäätmed kõrvaldada, viies need elektri- ja elektroonikaseadmete jäätmete ringlussevõtmiseks selleks ettenähtud kogumispunkti.
Recycle Statements Waste Electrical and Electronic Equipment (WEEE) Statements Készülékek magánháztartásban történő selejtezése az Európai Unió területén A készüléken, illetve a készülék csomagolásán látható azonos szimbólum annak jelzésére szolgál, hogy a készülék a selejtezés során az egyéb háztartási hulladéktól eltérő módon kezelendő. A vásárló a hulladékká vált készüléket köteles a kijelölt gyűjtőhelyre szállítani az elektromos és elektronikai készülékek újrahasznosítása céljából.
Recycle Statements Waste Electrical and Electronic Equipment (WEEE) Statements Pozbywanie się zużytego sprzętu przez użytkowników w prywatnych gospodarstwach domowych w Unii Europejskiej Ten symbol na produkcie lub jego opakowaniu oznacza, że produktu nie wolno wyrzucać do zwykłych pojemników na śmieci. Obowiązkiem użytkownika jest przekazanie zużytego sprzętu do wyznaczonego punktu zbiórki w celu recyklingu odpadów powstałych ze sprzętu elektrycznego i elektronicznego.
Recycle Statements Waste Electrical and Electronic Equipment (WEEE) Statements Bortskaffande av avfallsprodukter från användare i privathushåll inom Europeiska Unionen Om den här symbolen visas på produkten eller förpackningen betyder det att produkten inte får slängas på samma ställe som hushållssopor. I stället är det ditt ansvar att bortskaffa avfallet genom att överlämna det till ett uppsamlingsställe avsett för återvinning av avfall från elektriska och elektroniska produkter.
Recycle Statements Recycle Statements Waste Electrical and Electronic Equipment (WEEE) Statements D-6
Index C 10/100Base-TX connections, length limitations … 2-8 ports, cables used with … 2-8 10/100Base-TX port location on access point … 1-6 cables 10/100Base-TX connections … 2-8 connecting cables to the access point port … 2-13 effects of non-standard cables … 6-2 infrastructure requirements … 2-8 length limitations … 2-8 required types … 2-8 cables, twisted pair access point-to-computer connection … B-3 access point-to-switch or hub connection … B-4 category 5 … B-2 cross-over cable pin-out … B-4 MDI-X
diagnostic tests … 6-6 checking the LEDs … 6-6 end-to-end connectivity … 6-7 testing the access point only … 6-6 testing twisted-pair cabling … 6-6 M E MDI-X to MDI network cable … B-3 MDI-X to MDI-X network cable … B-4 electrical specifications, access point … A-1 EMC regulatory statements … C-9 emissions specifications, access point … A-2 environmental specifications, access point … A-1 N F Index length limitations 10/100Base-TX connections … 2-8 location for the access point, considerations … 2-8
port LEDs normal operation … 2-11 ports 10/100Base-TX, location on access point … 1-6 connecting to … 2-13 network connections … 2-13 power connector … 1-6 Power LED … 1-5 behavior during system initialization … 2-11 behaviors … 1-5 location on access point … 1-4 power source connecting the access point to … 2-12 precautionsprecautions power requirements … 2-2 preparing the installation site … 2-8 recycle statements … D-1 regulatory statements … C-9 Reset button description … 1-7 location on access point …
Index — This page is intentionally unused.
— This page is intentionally unused.