ORiNOCO AP-2000 Access Point User Guide
Copyright © 2003-2004 Proxim Corporation. All rights reserved. Covered by one or more of the following U.S. patents: 5,231,634; 5,875,179; 6,006,090; 5,809,060; 6,075,812; 5,077,753. This user’s guide and the software described in it are copyrighted with all rights reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval system, or translated into any language in any form by any means without the written permission of Proxim Corporation.
Contents 1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .12 Document Conventions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12 Introduction to Wireless Networking . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12 Guidelines for Roaming . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Contents LED Indicators . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32 3 Viewing Status Information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .34 Logging into the HTTP Interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34 System Status . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Contents Procedure to Reset Configuration via the Serial Interface . . . . . . . . . . . . . . . . . . . . . . . . . 63 Filtering . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 64 Ethernet Protocol . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 64 Static MAC . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Contents Configuring MAC Access . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 86 Security Profiles. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 87 WEP Encryption . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 87 802.1x Authentication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Contents Help Link . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 120 7 Troubleshooting the AP-2000 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .121 Troubleshooting Concepts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 121 Symptoms and Solutions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Contents A Using the Command Line Interface (CLI). . . . . . . . . . . . . . . . . . . . . . . . . . . .132 General Notes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 132 Prerequisite Skills and Knowledge . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 132 Notation Conventions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Contents Set up Auto Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 147 Other Network Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 147 Configure the AP as a DHCP Server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 148 Configure the DNS Client . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Contents Proxy ARP Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 171 IP ARP Filtering Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 171 Broadcast Filtering Table . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 171 TCP/UDP Port Filtering . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Electrical Specifications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 185 Environmental Specifications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 185 Ethernet Interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 185 Serial Port Interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Introduction • • • • 1 Document Conventions Introduction to Wireless Networking IEEE 802.11 Specifications Management and Monitoring Capabilities Document Conventions • • • The term, AP, refers to an Access Point. The term, 802.11, is used to describe features that apply to the 802.11a, 802.11b, and 802.11g wireless standards. A Dual-radio AP is an Access Point that includes two radios; it can support one or two IEEE radio standards (depending on the type of radios installed).
Introduction Figure 1-1 Typical wireless network access infrastructure Once initialized, the network administrator can configure each unit according to the network’s requirements. The AP functions as a wireless network access point to data networks. An AP network provides: • • • • Seamless client roaming Easy installation and operation Over-the-air encryption of data High speed network links To be fully operational, the AP-2000 needs at least one wireless card installed.
Introduction IEEE 802.11 Specifications In 1997, the Institute of Electrical and Electronics Engineers (IEEE) adopted the 802.11 standard for wireless devices operating in the 2.4 GHz frequency band. This standard includes provisions for three radio technologies: direct sequence spread spectrum, frequency hopping spread spectrum, and infrared. Devices that comply with the 802.11 standard operate at a data rate of either 1 or 2 Megabits per second (Mbits/sec). In 1999, the IEEE modified the 802.
Introduction SNMP Management In addition to the HTTP and the CLI interfaces, you can also manage and configure an AP using the Simple Network Management Protocol (SNMP). Note that this requires an SNMP manager program, like HP Openview or Castlerock’s SNMPc. The AP supports several Management Information Base (MIB) files that describe the parameters that can be viewed and/or configured over SNMP: – – – – – MIB-II (RFC 1213) Bridge MIB (RFC 1493) Ethernet-like MIB (RFC 1643) 802.
2 Getting Started • • • • • • • Prerequisites Product Package System Requirements Hardware Installation Initialization Download the Latest Software Additional Hardware Features Prerequisites Before installing an AP, you need to gather certain network information. The following section identifies the information you need. NOTE Passwords must be configured with at least 6 characters in length.
Getting Started Product Package Each Dual-radio AP comes with the following: • • • • • • • • • • One ceiling or wall mounting plate Mounting hardware Metal faceplate for APs mounted in a plenum environment AP cover Processor module (with integrated Active Ethernet, if applicable) Power supply (not provided with Active Ethernet unit) AC power cord (not provided with Active Ethernet unit) 802.11b PC Card or 802.
Getting Started Hardware Installation • • • AP-2000 with Active Ethernet AP-2000 with Power Supply 5 GHz or AP-2000 11a Upgrade Kit AP-2000 with Active Ethernet 1. Slide the AP module onto the mounting bracket. Make sure it is properly seated. Figure 2-1 Insert Module into Mounting Bracket 2. Slide an 802.11b, 802.11b/g wireless card, or 802.11a card with antenna adapter (not included in the kit) into Slot A or B. NOTE: The 802.11a wireless card with antenna adapter will only fit in Slot A. 3.
Getting Started Figure 2-3 Connect an Ethernet cable from an AE hub to the AP 6. Conduct a Site Survey to determine the best location for your device. 7. Once you have chosen a final location for your unit, mount the wall bracket and the processor module and place the cover onto the unit as shown. Figure 2-4 Wall mounting the AP AP-2000 with Power Supply 1. Clip the power supply into the mounting bracket. 2. Plug the AC power cord into the power supply.
Getting Started Figure 2-5 Install the power supply 3. Slide the AP module onto the mounting bracket. Make sure it is properly seated. 4. Plug the DC connector from the power supply into the top of the AP module.
Getting Started Figure 2-7 Slide a PC Card into the AP 5. Attach one end of an Ethernet cable to the AP's Ethernet port and the other end to a network hub or switch. 6. Connect the unit to a power source. 7. Wait for the power LED to turn green before proceeding. Figure 2-8 Power LED turns green when the unit is operational 8. Conduct a Site Survey to determine the best location for your device. 9.
Getting Started 5 GHz or AP-2000 11a Upgrade Kit If you are installing this kit on a new AP (one that has not been installed yet), skip to Step 4. 1. Remove the AP from your network by unplugging the power and Ethernet cables from the unit. 2. Remove the unit from its mounting location - keep the mounting bracket with the AP. 3. Remove the outer plastic cover. Figure 2-10 Remove the AP cover NOTE The AP-2000 Upgrade Kit may be installed only in slot A of the AP-2000. 4.
Getting Started 6. Angle the antenna adapter slightly upwards, pinch the end tabs inwards and carefully slide the antenna adapter onto the mounting bracket. 7. Gently push forward while rotating the antenna downwards and clip the adapter into the small cutouts on the face of the mounting bracket. 8. Position the antenna for best reception: • at a 90° angle for flat surface mounts • at a 180° angle for wall mounts 9. Re-install the cover and mount the AP back in place. 10.
Getting Started Initialization Proxim provides two tools to simplify the initialization and configuration of an AP: • • ScanTool Setup Wizard ScanTool is included on the Installation CD; the Setup Wizard launches automatically the first time you access the HTTP interface. NOTE These initialization instructions describe how to configure an AP over an Ethernet connection using ScanTool and the HTTP interface.
Getting Started NOTE If your computer has more than one network adapter installed, you will be prompted to select the adapter that you want ScanTool to use before the Scan List appears. If prompted, select an adapter and click OK. You can change your adapter setting at any time by clicking the Select Adapter button on the Scan List screen. Note that the ScanTool Network Adapter Selection screen will not appear if your computer only has one network adapter installed. Figure 2-13 Scan List 7.
Getting Started Figure 2-14 3. 4. 5. 6. 7. Scan Tool Change Screen Set IP Address Type to Static. Enter a static IP Address for the AP in the field provided. You must assign the unit a unique address that is valid on your IP subnet. Contact your network administrator if you need assistance selecting an IP address for the unit. Enter your network’s Subnet Mask in the field provided. Enter your network’s Gateway IP Address in the field provided.
Getting Started Figure 2-15 Enter Network Password Figure 2-16 Setup Wizard 5. Click Setup Wizard to begin. If you want to configure the AP without using the Setup Wizard, click Exit and see Performing Advanced Configuration. The Setup Wizard supports the following navigation options: • Save & Next Button: Each Setup Wizard screen has a Save & Next button. Click this button to submit any changes you made to the unit’s parameters and continue to the next page.
Getting Started 8. Assign the AP new passwords to prevent unauthorized access and click Save & Next. Each management interface has its own password: — SNMP Read Password — SNMP Read-Write Password — SNMPv3 Authentication Password — SNMPv3 Privacy Password — CLI Password — HTTP (Web) Password By default, each of these passwords is set to “public”. See Passwords for more information. 9. Configure the basic wireless interface settings and click Save & Next. • The following options are available for an 802.
Getting Started Distance between APs Multicast Rate • Large 1 and 2 Mbits/sec Medium 1, 2, and 5.5 Mbits/sec Small 1, 2, 5.5 and 11 Mbits/sec Minicell 1, 2, 5.5 and 11 Mbits/sec Microcell 1, 2, 5.5 and 11 Mbits/sec The following options are available for an 802.11b/g AP: — Operational Mode: An 802.11b/g wireless interface can be configured to operate in the following modes: — 802.11b mode only — 802.11g mode only — 802.11g-wifi mode — 802.
Getting Started Setup your TFTP Server A Trivial File Transfer Protocol (TFTP) server allows you to transfer files across a network. You can upload files from the AP for backup or copying, and you can download the files for configuration and AP Image upgrades. The Solarwinds TFTP server software is located on the ORiNOCO AP Installation CD-ROM. You can also download the latest TFTP software from Solarwind’s Web site at http://www.solarwinds.net.
Getting Started Download Updates from your TFTP Server using the CLI Interface 1. 2. 3. 4. 5. Download the latest software from http://www.proxim.com. Copy the latest software updates to your TFTP server. Open the CLI interface via Telnet or a serial connection. Enter the CLI password when prompted. Enter the command: download img – Result: The download will begin. Be patient while the image is downloaded to the Access Point. 6.
Getting Started Active Ethernet An Active Ethernet-enabled AP is equipped with an 802.3af-compliant Active Ethernet module. Active Ethernet (AE) delivers both data and power to the access point over a single Ethernet cable. If you choose to use Active Ethernet, there is no difference in operation; the only difference is in the power source. – – – The Active Ethernet (AE) integrated module receives ~48 VDC over a standard Category 5 Ethernet cable.
Getting Started Related Topics The Setup Wizard helps you configure the basic AP settings required to get the unit up and running. The AP supports many other configuration and management options. The remainder of this user guide describes these options in detail. – – – – – See Performing Advanced Configuration for information on configuration options that are available within the Access Point’s HTTP interface.
Viewing Status Information • • 3 Logging into the HTTP Interface System Status Logging into the HTTP Interface Once the AP has a valid IP Address and an Ethernet connection, you may use your web browser to monitor the system status. Follow these steps to monitor an AP’s operating statistics using the HTTP interface: 1. Open a Web browser on a network computer. NOTE The HTTP interface supports the following Web browser: • Microsoft Internet Explorer 6 with Service Pack 1 or later • Netscape 6.
Viewing Status Information System Status System Status is the first screen to appear each time you connect to the HTTP interface. You can also return to this screen by clicking the Status button. Figure 3-2 System Status Screen Each section of the System Status screen provides the following information: – – System Status: This area provides system level information, including the unit’s IP address and contact information. See System for information on these settings.
Performing Advanced Configuration • • • • • • • • • • 4 Configuring the AP Using the HTTP/HTTPS Interface System: Configure specific system information such as system name and contact information. Network: Configure IP settings, DNS client, DHCP server, and Link Integrity. Interfaces: Configure the Access Point’s interfaces: Wireless and Ethernet. Also describes configuring a Wireless Distribution System (WDS).
Performing Advanced Configuration Figure 4-1 Enter Network Password Screen 5. Click the Configure button located on the left-hand side of the screen. Figure 4-2 Configure Main Screen 6. Click the tab that corresponds to the parameter you want to configure. For example, click Network to configure the Access Point’s TCP/IP settings. The parameters contained in each of the configuration categories are described later in this chapter. 7. Configure the Access Point’s parameters as necessary.
Performing Advanced Configuration System You can configure and view the following parameters within the System Configuration screen: • • • • • • • • • Name: The name assigned to the AP. System name must be between 1-31 characters. Refer to the Dynamic DNS Support and Access Point System Naming Convention sections for rules on naming the AP. Location: The location where the AP is installed. Location must be between 1-255 characters. Contact Name: The name of the person responsible for the AP.
Performing Advanced Configuration Network The Network tab contains three sub-tabs. – – – IP Configuration DHCP Server Link Integrity IP Configuration You can configure and view the following parameters within the IP Configuration screen: NOTE You must reboot the Access Point in order for any changes to the Basic IP or DNS Client parameters take effect.
Performing Advanced Configuration DHCP Server If your network does not have a DHCP Server, you can configure the AP as a DHCP server to assign dynamic IP addresses to Ethernet nodes and wireless clients. ! CAUTION Make sure there are no other DHCP servers on the network and do not enable the DHCP server without checking with your network administrator first, as it could bring down the whole network. Also, the AP must be configured with a static IP address before enabling this feature.
Performing Advanced Configuration You can configure and view the following parameters within the DHCP Server Configuration screen: • Enable DHCP Server: Place a check mark in the box provided to enable DHCP Server functionality. NOTE You cannot enable the DHCP Server functionality unless there is at least one IP Pool Table Entry configured. • • • • • • Subnet Mask: This field is read-only and reports the Access Point’s current subnet mask.
Performing Advanced Configuration Figure 4-4 Link Integrity Configuration Screen Interfaces The Interfaces tab contains the following sub-tabs: – – – Operational Mode 8Wireless-A and Wireless-B Ethernet From these sub-tabs, you configure the Access Point’s operational mode, wireless interface settings and Ethernet settings. You may also configure a Wireless Distribution System (WDS) for AP-to-AP communications.
Performing Advanced Configuration Operational Mode Operational Mode Selection You can configure and view the following parameters within the Operational Mode screen. • Operational Mode: the mode of communication between the wireless clients and the Access Point: • 802.11b only • 802.11g only • 802.11bg • 802.11a • 802.11g-wifi 9. Select the transmit power level for interface B from the Wireless-B: Transmit Power Level drop-down menu. 8 Wireless-A and Wireless-B Wireless A (802.
Performing Advanced Configuration • • • RTS/CTS Medium Reservation: This parameter affects message flow control and should not be changed under normal circumstances. Range is 0 to 2347. When set to a value between 0 and 2347, the Access Point uses the RTS/CTS mechanism for packets that are the specified size or greater. When set to 2347 (the default setting), RTS/CTS is disabled. See RTS/CTS Medium Reservation for more information.
Performing Advanced Configuration In shutdown state, AP will not transmit and receive frames from the wireless interface and will stop transmitting periodic beacons. Moreover, none of the frames received from the Ethernet interface will be forwarded to that wireless interface. Wireless service on a wireless interface of the AP can be resumed through CLI/HTTP/SNMP management interface.
Performing Advanced Configuration • • • Frequency Channel: When Auto Channel Select is enabled, this field is read-only and displays the Access Point’s current operating channel. When Auto Channel Select is disabled, you can specify the Access Point’s operating channel. If you decide to manually set the unit’s channel, ensure that nearby devices do not use the same frequency (unless you are setting up a WDS). Available Channels vary based on regulatory domain. See 802.11b Channel Frequencies.
Performing Advanced Configuration NOTE This feature is available only if you are using an Orinoco Classic Gold card.
Performing Advanced Configuration stations that may not be able to receive multicast packets at the higher rates; in this case, you should set Multicast Rate to 1 or 2 Mbits/sec. Figure 4-6 1 Mbits/s and 11 Mbits/s Multicast Rates NOTE There is an inter-dependent relationship between the Distance between APs and the Multicast Rate. In general, larger systems operate at a lower average transmit rate. The variation between Multicast Rate and Distance Between APs is presented in the following table: 1.
Performing Advanced Configuration – 802.11b/g mode: This is the default mode. Use this mode if you want to support a mix of 802.11b and 802.11g devices. – 802.11g-wifi: This mode was developed for Wi-Fi compliance testing purposes. It is similar to 802.11g only mode. In general, you should use either 802.11g only mode (if you want to support 802.11g devices only) or 802.11b/g mode to support a mix of 802.11b and 802.11g devices.
Performing Advanced Configuration Figure 4-7 WDS Example Bridging WDS Each WDS link is mapped to a logical WDS port on the AP. WDS ports behave like Ethernet ports rather than like standard wireless interfaces: on a BSS port, an Access Point learns by association and from frames; on a WDS or Ethernet port, an Access Point learns from frames only. When setting up a WDS, keep in mind the following: • • • • • • • The WDS link shares the communication bandwidth with the clients.
Performing Advanced Configuration 1. 2. 3. 4. 5. Confirm that Auto Channel Select is disabled. Write down the MAC Address of the radio that you wish to include in the Wireless Distribution System. Click on Interfaces > Wireless-A or Wireless-B. Scroll down to the Wireless Distribution System heading. Click the Edit button to update the Wireless Distribution System (WDS) Table (see Figure 4-8). Figure 4-8 WDS Edit Entry Screen The WDS Configuration screen will be displayed (see Figure 4-9).
Performing Advanced Configuration 7. If security mode is enabled, enter a value for Encryption Key 0. 8. Click OK. 9. Enter the MAC Address that you wrote down in Step 2 in one of the Partner MAC Address field of the Wireless Distribution Setup window. 10. Set the Status of the device to Enable. 11. Click OK. 12. Reboot the AP. Ethernet Select the desired speed and transmission mode from the drop-down menu.
Performing Advanced Configuration Management The Management tab contains five sub-tabs. – – – – – Passwords IP Access Table Services Automatic Configuration (AutoConfig) Hardware Configuration Reset (CHRP) Passwords The following passwords are configurable: • • • • • • SNMP Read Community Password: The password for read access to the AP using SNMP. Enter a password in both the Password field and the Confirm field. This password must be between 6 and 32 characters. The default password is “public”.
Performing Advanced Configuration Services You can configure the following management services: NOTE You must reboot the Access Point if you change the HTTP Port or Telnet Port. Secure Management Secure Management allows the use of encrypted and authenticated communication protocols such as SNMPv3, and Secure Socket Link (SSL), to manage the Access Point. • Secure Management Status: Enables the further configuration of HTTPS Access, and SNMPv3.
Performing Advanced Configuration Figure 4-10 Management Services Configuration Screen 55
Performing Advanced Configuration Telnet Configuration Settings • • • • Telnet Interface Bitmask: Select the interface (Ethernet, Wireless-Slot A, Wireless-Slot B, All Interfaces) from which you can manage the AP via telnet. This parameter can also be used to Disable telnet management. Telnet Port: The default port number for Telnet applications is 23.
Performing Advanced Configuration To manually generate or delete host keys on the AP: • • Select Create to generate a new pair of host keys. Select Delete to remove the host keys from the AP. If no host keys are present, the AP will not allows connections using SSH. When host keys are created or deleted, the AP updates the fingerprint information displayed on the Management -> Services page. ! WARNING SSH Host key creation may take 3 to 4 minutes during which time the AP may not respond.
Performing Advanced Configuration Serial Configuration Settings The serial port interface on the AP is enabled at all times. See Setting IP Address using Serial Port for information on how to access the CLI interface via the serial port. You can configure and view following parameters: – – Serial Baud Rate: Select the serial port speed (bits per second). Choose between 2400, 4800, 9600, 19200, 38400, or 57600; the default Baud Rate is 9600.
Performing Advanced Configuration Automatic Configuration (AutoConfig) The Automatic Configuration feature which allows an AP to be automatically configured by downloading a specific configuration file from a TFTP server during the boot up process. Automatic Configuration is disabled by default. The configuration process for Automatic Configuration varies depending on whether the AP is configured for dynamic or static IP.
Performing Advanced Configuration Figure 4-12 Automatic Configuration Screen Set up Automatic Configuration for Dynamic IP Perform the following procedure to enable and set up Automatic Configuration when you have a dynamic IP address for the TFTP server via DHCP. The Configuration filename and the TFTP server IP address are contained in the DHCP response when the AP gets its IP address dynamically from the DHCP server.
Performing Advanced Configuration Figure 4-13 DHCP Options: Setting the Boot Server Host Name 4. Add the Boot Server Host Name and Boot Filename parameters to the Active Options list. 5. Set the value of the Boot Server Host Name Parameter to the host name or IP Address of the TFTP server. For example: 11.0.0.7. Figure 4-14 DHCP Options: Setting the Boot Server Host Name 6. Set the value of the Bootfile Name parameter to the Configuration filename. For example: AP-Config 7.
Performing Advanced Configuration Hardware Configuration Reset (CHRP) Hardware Configuration Reset Status is a parameter that defines the hardware configuration reset behavior of the AP (i.e., what effect pressing the reload button has on an AP operating in normal operating mode). If a user loses or forgets the AP’s HTTP/Telnet/SNMP password, the reset button on the AP provides a way to reset the AP to default configuration values to gain access to the AP.
Performing Advanced Configuration Configuring Hardware Configuration Reset Perform the following procedure to configure Hardware Configuration Reset and to set the Configuration Reset Password. 1. Click Configure -> Management -> CHRD. 2. Check (enable) or uncheck (disable) the Enable Hardware Configuration Reset checkbox. 3. Change the default Configuration Reset Password in the “Configuration Reset Password” and “Confirm” fields. NOTE It is important to safely store the configuration reset password.
Performing Advanced Configuration Filtering The Access Point’s Packet Filtering features help control the amount of traffic exchanged between the wired and wireless networks. There are four sub-tabs under the Filtering tab: – – – – Ethernet Protocol Static MAC Advanced TCP/UDP Port Ethernet Protocol The Ethernet Protocol Filter blocks or forwards packets based on the Ethernet protocols they support. Follow these steps to configure the Ethernet Protocol Filter: 1.
Performing Advanced Configuration Each MAC Address or Mask is comprised of 12 hexadecimal digits (0-9, A-F) that correspond to a 48-bit identifier. (Each hexadecimal digit represents 4 bits (0 or 1).) Taken together, a MAC Address/Mask pair specifies an address or a range of MAC addresses that the AP will look for when examining packets. The AP uses Boolean logic to perform an “AND” operation between the MAC Address and the Mask at the bit level.
Performing Advanced Configuration Static MAC Filter Examples Consider a network that contains a wired server and three wireless clients.
Performing Advanced Configuration • • • Wired Mask: FF:FF:FF:FF:FF:FF Wireless MAC Address: 00:00:00:00:00:00 Wireless Mask: 00:00:00:00:00:00 Result: The Access Point does not forward any packets that have a destination address of 01:00:5E:00:32:4B to the wireless network.
Performing Advanced Configuration • Ethernet and Wireless Slot A • Wireless Slot B • Ethernet and Wireless Slot B • Wireless Slot A and B • All Interfaces 7. Click OK. Editing TCP/UDP Port Filters 1. 2. 3. 4. Click Edit under the TCP/UDP Port Filter Table heading. Make any changes to the Protocol Name or Port Number for a specific entry, if necessary. Modify the Port Type, Interface, and Status using the drop down menus, as appropriate. Select OK.
Performing Advanced Configuration Alarms This tab has three sub-tabs. – – – – Groups Alarm Host Table Syslog Rogue Access Point Detection (RAD) Groups The AP can be configured to generate and send alarms/notifications/traps as version 1 or a version 2c. Use the drop-down menu to select SNMP alarm type. There are seven alarm groups that can be enabled or disabled via the Web interface. Place a check mark in the box provided to enable a specific group.
Performing Advanced Configuration • Security Trap Group Trap Name • Description Authentication Failure oriTrapAuthenticationFailure Unauthorized Manager Detected oriTrapUnauthorizedManagerDetected RAD Scan Complete oriTrapRADScanComplete RAD Scan Results oriTrapRADScanResults Wireless Interface/Card Trap Group Trap Name • Description Wireless Card Not Present oriTrapWLCNotPresent Wireless Card Failure oriTrapWLCFailure Wireless Card Removal oriTrapWLCRemoval Incompatible Firmware oriTr
Performing Advanced Configuration • Flash Memory Corrupted oriTrapFlashMemoryCorrupted Restoring Last Known Good Configuration File oriTrapFlashMemoryRestoringLastKnownGoodConfiguration TFTP Trap Group Trap Name • Description TFTP Operation Failure oriTrapTFTPFailedOperation TFTP Operation Initiated oriTrapTFTPOperationInitiated TFTP Operation Completed oriTrapTFTPOperationCompleted Image Trap Group Trap Name Description Zero Size Image oriTrapZeroSizeImage Invalid Image oriTrapInvalidIm
Performing Advanced Configuration Severity Levels There are three severity levels for system alarms: – – – Critical Major Informational Critical alarms will often result in severe disruption in network activity or an automatic reboot of the AP Major alarms are usually activated due to a breach in the security of the system. Clients cannot be authenticated or an attempt at unauthorized access into the AP has been detected.
Performing Advanced Configuration • • • Syslog Heartbeat Status: Enables or disables the sending of heartbeat messages from the AP to the configured Syslog servers. Syslog Heartbeat Interval: Specifies the interval (in seconds) at which Syslog Heartbeat messages are sent to the configured Syslog servers. Syslog Host Table: This table specifies the IP addresses of a network servers that the AP will send Syslog messages to. Click Add to create a new entry. Click Edit to change an existing entry.
Performing Advanced Configuration Rogue Access Point Detection (RAD) The Rogue AP Detection (RAD) feature provides an additional security level for wireless LAN deployments. Rogue AP detection provides a mechanism for detecting Rogue Access Points by utilizing the coverage of the trusted Access Point deployment. The Rogue AP Scan employs background scanning using low-level 802.
Performing Advanced Configuration Points to the IP address of the management station. The Access Points on detecting a new Access Point sends a RAD Scan Result Trap to the management station. An example network deployment is shown. The Trusted AP has Rogue Access Detection enabled and the trap host is configured to be the management station. The Trusted AP on detecting the Rogue AP will send a trap to the management station with the Channel and BSSID of the Rogue Access Point.
Performing Advanced Configuration Bridge The AP is a bridge between your wired and wireless networking devices. As a bridge, the functions performed by the AP include: • • • MAC address learning Forward and filtering decision making Spanning Tree protocol used for loop avoidance Once the AP is connected to your network, it learns which devices are connected to it and records their MAC addresses in the Learn Table. The table can hold up to 10,000 entries.
Performing Advanced Configuration To block Intra BSS traffic, set Intra BSS Traffic Operation to Block. To allow Intra BSS traffic, set Intra BSS Traffic Operation to Passthru. Packet Forwarding (Pkt Fwd) The Packet Forwarding feature enables you to redirect traffic generated by wireless clients that are all associated to the same AP to a single MAC address.
Performing Advanced Configuration RADIUS Profiles Configuring RADIUS Profiles on the AP define a profile for RADIUS Servers used by the system or by a VLAN. The network administrator can define RADIUS Servers per Authentication Mode and per VLAN. The AP communicates with the RADIUS server defined in a profile to provide the following features: – – – MAC Access Control Via RADIUS Authentication 802.
Performing Advanced Configuration server used depends on whether the authentication is done for an 802.1x client or non-802.1x client. The clients in VLAN 2 are authenticated using a different set of authentication servers configured for authenticating users in VLAN 2. Authentication servers for each VLAN are configured as part of the configuration options for that VLAN. You can also configure authentication servers on a system-wide basis; these are called the default authentication servers.
Performing Advanced Configuration Adding or Modifying a RADIUS Server Profile Perform the following procedure to add a RADIUS server profile and to configure its parameters. 1. Click Add to create a new profile. To Modify an existing profile, select the profile and click Edit. To delete an existing profile, select the profile and click Delete. You cannot delete a RADIUS server profile if you are using it in an SSID. Also, the four default RADIUS server profiles cannot be deleted.
Performing Advanced Configuration • • Server Name/IP Address: Enter the server’s name or IP address. Destination Port: Enter the port number which the AP and the server will use to communicate. By default, RADIUS servers communicate on port 1812. • Server VLAN ID: Indicates the VLAN that uses this RADIUS server profile. If VLAN is disabled, the text “VLAN is disabled” will appear. • Shared Secret and Confirm Shared Secret: Enter the password shared by the RADIUS server and the AP.
Performing Advanced Configuration RADIUS Accounting Using an external RADIUS server, the AP can track and record the length of client sessions on the access point by sending RADIUS accounting messages per RFC2866. When a wireless client is successfully authenticated, RADIUS accounting is initiated by sending an “Accounting Start” request to the RADIUS server. When the wireless client session ends, an “Accounting Stop” request is sent to the RADIUS server.
Performing Advanced Configuration SSID/VLAN/Security The AP provides several security features to protect your network from unauthorized access. Virtual Local Area Networks (VLANs) are logical groupings of network hosts. Defined by software settings, other VLAN members or resources appear (to clients) to be on the same physical segment, no matter where they are attached on the logical LAN or WAN segment. They simplify traffic flow between clients and their frequently-used or restricted resources.
Performing Advanced Configuration Figure 4-23 Components of a typical VLAN VLAN Workgroups and Traffic Management Access Points that are not VLAN-capable typically transmit broadcast and multicast traffic to all wireless Network Interface Cards (NICs). This process wastes wireless bandwidth and degrades throughput performance. In comparison, VLAN-capable AP is designed to efficiently manage delivery of broadcast, multicast, and unicast traffic to wireless clients.
Performing Advanced Configuration The AP can segment users into a maximum of 16 different workgroups (32 if using two cards in a Dual-radio AP) based on an SSID/VLAN pair (also referred as a VLAN Workgroup or a Sub-network). NOTE The ability to configure up to 16 VLAN/SSID pairs and to configure a security profile per SSID is available only for 802.11b/g APs and 802.11a Upgrade Kit APs. 802.11b APs do not support multiple VLAN/SSID pairs. APs with the 802.
Performing Advanced Configuration MAC Access The MAC Access sub-tab allows you to build a list of stations, identified by their MAC addresses, authorized to access the network through the AP. The list is stored inside each AP within your network. Note that you must reboot the AP for any changes to the MAC Access Control Table to take effect. The “MAC ACL Status” parameter (configurable on the SSID/VLAN -> Wireless sub-tab) is per VLAN if VLAN Management is enabled.
Performing Advanced Configuration Security Profiles The AP supports the following Security features: • • • WEP Encryption: The original encryption technique specified by the IEEE 802.11 standard. 802.1x Authentication: An IEEE standard for client authentication. Wi-Fi Protected Access (WPA): A new standard that provides improved encryption security over WEP. WEP Encryption The IEEE 802.
Performing Advanced Configuration Authentication Process There are three main components in the authentication process. The standard refers to them as: 1. 2. 3. supplicant (client PC) authenticator (Access Point) authentication server (RADIUS server) When using Authentication Mode to 802.1x, WPA, Mixed mode (802.1x and WEP), or 802.11i, you need to configure your RADIUS server for authentication purposes.
Performing Advanced Configuration • • Dynamic Key distribution – The AP generates and maintains the keys for its clients – The AP securely delivers the appropriate keys to its clients Client/server mutual authentication – 802.1x – Pre-shared key (for networks that do not have an 802.1x solution implemented) NOTE For more information on WPA, see the Wi-Fi Alliance Web site at http://www.wi-fi.org. The AP supports the following WPA authentication modes: • • • • WPA: The AP uses 802.
Performing Advanced Configuration Configuring Security Profiles Security policies can be configured and applied on the AP as a whole, or on a per VLAN basis. When VLAN is disabled on the AP, the user can configure a security profile for each interface of the AP. When VLANs are enabled and Security per SSID is enabled, the user can configure a security profile for each VLAN.
Performing Advanced Configuration • 802.1x Station: • Authentication Mode: 802.1x • Cipher: WEP • Encryption Key Length: 64 or 128 Bits. • If 802.1x is enabled simultaneously with WEP, the 802.1x Station’s encryption key length is determined by the WEP encryption key. • WPA Station: • Authentication Mode: 802.1x • Cipher: TKIP • WPA-PSK Station: • Authentication Mode: PSK • Cipher: TKIP • PSK Passphrase: an 8-63 character user-defined phrase.
Performing Advanced Configuration Figure 4-27 Security Profile Table - Add Entries 92
Performing Advanced Configuration Wireless-A and Wireless-B Each SSID/VLAN can have its own Security Profile that defines its security mode, authentication mechanism, and encryption, so that customers can have multiple types of clients (non-WEP, WEP, 802.1x, WPA) on the same system, but separated per VLAN. Refer to the Security Profiles section for more information. These parameters are configurable from the Wireless A and Wireless B sub-tabs. Adding or Modifying an SSID/VLAN with VLAN Protocol Disabled 1.
Performing Advanced Configuration Figure 4-30 SSID/VLAN Edit Entries Screen (VLAN Protocol Disabled) 4. Enter a unique Network Name (SSID), between 1 and 32 characters. This parameter is mandatory. 5. Enter a unique VLAN ID. This parameter is mandatory. – You must specify a unique VLAN ID for each SSID on the interface. A VLAN ID is a number from -1 to 4094. A value of -1 means that an entry is “untagged.
Performing Advanced Configuration Figure 4-31 SSID, VLAN, and Security Data Configuration (VLAN Protocol Disabled) 8. Enable or disable RADIUS accounting on the VLAN/SSID under the Accounting Status drop-down menu. 9. Enable or disable RADIUS MAC authentication status on the VLAN/SSID under the RADIUS Authentication Status drop-down menu. 10. Enable or disable MAC Access Control List status on the VLAN/SSID under the MAC ACL Status drop-down menu. 11. Enter the Rekeying Interval in seconds.
Performing Advanced Configuration 13. Define the RADIUS Server Profile Configuration for the VLAN/SSID: • RADIUS MAC Authentication Profile • RADIUS EAP Authentication Profile • RADIUS Accounting Profile If 802.1x, WPA, or 802.11i security mode is used, the RADIUS EAP Authentication Profile must have a value. A RADIUS Server Profile for authentication for each VLAN shall be configured as part of the configuration options for that VLAN. RADIUS profiles are independent of VLANs.
Performing Advanced Configuration The Add Entry or Edit Entry screen appears. See Figure 4-33 below and Figure 4-34 on page 98.
Performing Advanced Configuration Figure 4-34 SSID/VLAN Edit Entries Screen (VLAN Protocol Enabled) 4. Enter a unique Network Name (SSID), between 1 and 32 characters. This parameter is mandatory. 5. Enter a unique VLAN ID. This parameter is mandatory. – You must specify a unique VLAN ID for each SSID on the interface. A VLAN ID is a number from -1 to 4094. A value of -1 means that an entry is “untagged.
Performing Advanced Configuration NOTE If you have two or more SSIDs per interface using a security Profile with a security mode of Non Secure, be aware that security being applied in the VLAN is not being applied in the wireless network. 13. Define the RADIUS Server Profile Configuration for the VLAN/SSID: • RADIUS MAC Authentication Profile • RADIUS EAP Authentication Profile • RADIUS Accounting Profile If 802.1x, WPA, or 802.
Monitoring the AP-2000 • • • • • • • • • 5 Logging into the HTTP Interface Version: Provides version information for the Access Point’s system components. ICMP: Displays statistics for Internet Control Message Protocol packets sent and received by the AP. IP/ARP Table: Displays the AP’s IP Address Resolution table. Learn Table: Displays the list of nodes that the AP has learned are on the network. IAPP: Provides statistics for the Inter-Access Point Protocol messages sent and received by the AP.
Monitoring the AP-2000 Figure 5-1 Enter Network Password Screen 5. Click the Monitor button located on the left-hand side of the screen. Figure 5-2 Monitor Main Screen 6. Click the tab that corresponds to the statistics you want to review. For example, click Learn Table to see the list of nodes that the AP has discovered on the network. 7. If applicable, click the Refresh button to update the statistics.
Monitoring the AP-2000 Version From the HTTP interface, click the Monitor button and select the Version tab. The list displayed provides you with information that may be pertinent when calling Technical Support. With this information, your Technical Support representative can verify compatibility issues and make sure the latest software are loaded. This screen displays the following information for each Access Point component: • • • • • Serial Number: The component’s serial number, if applicable.
Monitoring the AP-2000 ICMP This tab provides statistical information for both received and transmitted messages directed to the AP. Not all ICMP traffic on the network is counted in the ICMP (Internet Control Message Protocol) statistics. Figure 5-4 ICMP Monitoring Screen IP/ARP Table This tab provides information based on the Address Resolution Protocol (ARP), which relates MAC Address and IP Addresses.
Monitoring the AP-2000 Learn Table This tab displays information relating to network bridging. It reports the MAC address for each node that the device has learned is on the network and the interface on which the node was detected. There can be up 10,000 entries in the Learn Table. Figure 5-6 Learn Table IAPP This tab displays statistics relating to client handovers and communications between ORiNOCO Access Points.
Monitoring the AP-2000 RADIUS This tab provides RADIUS authentication, EAP/802.1x authentication, and accounting information for both the Primary and Backup RADIUS servers. NOTE RADIUS authentication and accounting must be enabled for this information to be valid.
Monitoring the AP-2000 Interfaces This tab displays statistics for the Ethernet and wireless interfaces. The Operational Status can be up, down, or testing.
Monitoring the AP-2000 Station Statistics This tab displays information on wireless clients attached to the AP and on Wireless Distribution System links. Enabling and Viewing Station Statistics To enable the monitoring of Stations Statistics, perform the following procedure: 1. Click on the Monitor tab on the left on the web page. 2. Click on the Station Statistics tab on the Monitor screen. 3.
Monitoring the AP-2000 • • • • • • • • • • • Interface to which the Station is connected: The interface number on which the client is connected with the AP. For WDS links this is the interface on which the link is configured. Station Type: The type of wireless client (STA or WDS). MAC Protocol: The MAC protocol for this wireless client (or WDS link partner). The possible values are 802.11a, 802.11b, 802.
Performing Commands • • • • • • • • • 6 Logging into the HTTP Interface Introduction to File Transfer via TFTP or HTTP: Describes the available file transfer methods. Update AP via TFTP: Download files from a TFTP server to the AP. Update AP via HTTP: Download files to the AP from HTTP. Retrieve File via TFTP: Upload configuration files from the AP to a TFTP server. Retrieve File via HTTP: Upload configuration files from the AP via HTTP. Reboot: Reboot the AP in the specified number of seconds.
Performing Commands Figure 6-1 Enter Network Password Screen 5. Click the Commands button located on the left-hand side of the screen. Figure 6-2 Commands Main Screen 6. Click the tab that corresponds to the command you want to issue. For example, click Reboot to restart the unit.
Performing Commands Introduction to File Transfer via TFTP or HTTP There are two methods of transferring files to or from the AP, TFTP or HTTP (or HTTPS if enabled).
Performing Commands Update AP via TFTP Use the Update AP via TFTP tab to download Configuration, AP Image, Bootloader files, and Certificate and Private Key files to the AP. A TFTP server must be running and configured to point to the directory containing the file. Figure 6-3 Update AP via TFTP Command Screen If you do not have a TFTP server installed on your system, install the TFTP server from the ORiNOCO CD. You can either install the TFTP server from the CD Wizard or run OEM-TFTP-Server.
Performing Commands Update AP via HTTP Use the Update AP via HTTP tab to download Configuration, AP Image, Bootloader files, and Certificate and Private Key files to the AP. Once on the Update AP screen, click on the via HTTP tab. Figure 6-4 Update AP via HTTP Command Screen The Update AP via HTTP tab shows version information and allows you to enter HTTP information as described below. • Select the File Type that needs to be updated from the drop-down box.
Performing Commands Figure 6-5 Warning Message Click OK to continue with the operation or Cancel to abort the operation. NOTE An HTTP file transfer using SSL may take extra time. If the operation completes successfully the following screen appears. Figure 6-6 Update AP Successful If the operation did not complete successfully the following screen appears, and the reason for the failure is displayed.
Performing Commands Retrieve File via TFTP Use the Retrieve File via TFTP tab to upload files from the AP to the TFTP server. The TFTP server must be running and configured to point to the directory to which you want to copy the uploaded file. We suggest you assign the file a meaningful name, which may include version or location information. If you don’t have a TFTP server installed on your system, install the TFTP server from the ORiNOCO CD.
Performing Commands Retrieve File via HTTP Use the Retrieve File via HTTP tab to retrieve configuration files, CLI Batch Files, or CLI Batch Logs from the AP. Select the type of file (Config, CLI Batch File, or CLI Batch Log) from the File Type drop-down menu. For more information on CLI Batch Files and CLI Batch Logs refer to CLI Batch File. Figure 6-9 Retrieve File via HTTP Command Screen A confirmation message gets displayed that asks if the user wants to proceed with retrieving the file.
Performing Commands Figure 6-11 File Download Dialog Box On clicking the Save button the following Save As window displays, where the user is prompted to choose the filename and location where the file is to be downloaded. Select an appropriate filename and location and click OK.
Performing Commands Reboot Use the Reboot tab to save configuration changes (if any) and reset the AP. Entering a value of 0 (zero) seconds causes an immediate reboot. Note that Reset, described below, does not save configuration changes. ! CAUTION Rebooting the AP will cause all users who are currently connected to lose their connection to the network until the AP has completed the restart process and resumed operation.
Performing Commands Reset Use the Reset tab to restore the AP to factory default conditions. The AP may also be reset from the RESET button located on the side of the unit. Since this will reset the Access Point’s current IP address, a new IP address must be assigned. Refer to Recovery Procedures for more information. ! CAUTION Resetting the AP to its factory default configuration will permanently overwrite all changes that have made to the unit.
Performing Commands Help Link To open Help, click the Help button on any display screen. During initialization, the AP on-line help files are downloaded to the default location: C:/Program Files/ORiNOCO/AP/HTML/index.htm. NOTE Use the forward slash character ("/") rather than the backslash character ("\") when configuring the Help Link location. NOTE Add the AP’s management IP address into the Internet Explorer list of Trusted Sites.
Troubleshooting the AP-2000 • • • • 7 Troubleshooting Concepts Symptoms and Solutions Recovery Procedures Related Applications NOTE This section helps you locate problems related to the AP device setup. For details about RADIUS, TFTP, serial communication programs (such as HyperTerminal), Telnet applications, or web browsers, please refer to the documentation that came with the application for assistance.
Troubleshooting the AP-2000 Symptoms and Solutions Connectivity Issues Connectivity issues include any problem that prevents you from powering up or connecting to the AP. AP Unit Will Not Boot - No LED Activity 1. Make sure your power source is operating. 2. Make sure all cables are connected to the AP correctly. 3. If you are using Active Ethernet, make sure you are using a Category 5, foiled, twisted pair cable to power the AP. Serial Link Does Not Work 1.
Troubleshooting the AP-2000 2. The AP only contacts a DHCP server during boot-up. If your network’s DHCP server is not available while the AP is booting, the device will retain the last IP Address it had. Reboot the AP once your DHCP server is on-line again or use the ScanTool to find the Access Point’s current IP address. 3.
Troubleshooting the AP-2000 Client Connection Problems Client Software Finds No Connection Make sure you have configured your client software with the proper Network Name and Security settings. Network Names and WEP Keys are typically allocated and maintained by your network administrator. Client PC Card Does Not Work 1. Make sure you are using the latest PC Card driver software. 2. Download and install the latest ORiNOCO client software from http://www.proxim.com. Intermittent Loss of Connection 1.
Troubleshooting the AP-2000 I have just configured the Management ID and now I can't manage the AP? – Check to ensure your password is correct. If your password is incorrect or all inbound packets do NOT have the correct tag, then a manual override is necessary. ! CAUTION The manual override process disconnects all users and resets all values to factory defaults. Active Ethernet (AE) The AP Does Not Work 1. Verify that you are using a standard UTP Category 5 cable. 2.
Troubleshooting the AP-2000 Reset to Factory Default Procedure Use this procedure to reset the network configuration values, including the Access Point’s IP address and subnet mask. The current AP Image is not deleted. Follow this procedure if you forget the Access Point’s password: 1. Press and hold the RELOAD button for 10 seconds. NOTE See RELOAD and RESET Buttons to identify the buttons. You need to use a pin or the end of a paperclip to press a button.
Troubleshooting the AP-2000 For this procedure, you will first erase the AP Image currently installed on the unit and then use either ScanTool or the Bootloader CLI (over the serial port) to set the IP address and download a new AP Image. Follow these steps: 1. While the unit is running, press the RESET button. NOTE See RELOAD and RESET Buttons to identify the buttons. You need to use a pin or the end of a paperclip to press a button. Result: The AP reboots and the indicators begin to flash.
Troubleshooting the AP-2000 11. Click OK. – Result: The Access Point will reboot and the download will begin automatically. You should see downloading activity begin after a few seconds within the TFTP server’s status screen. 12. Click OK when prompted that the device has been updated successfully to return to the Scan List screen. 13. Click Cancel to close the ScanTool. 14. When the download process is complete, configure the AP as described in Getting Started and Performing Advanced Configuration.
Troubleshooting the AP-2000 7.
Troubleshooting the AP-2000 Follow these steps to assign the AP an IP address: 1. Open your terminal emulation program (like HyperTerminal) and set the following connection properties: • Com Port: • Baud rate: 9600 • Data Bits: 8 • Stop bits: 1 • Flow Control: None • Parity: None 2. Under File -> Properties -> Settings -> ASCII Setup, enable the Send line ends with line feeds option. Result: HyperTerminal sends a line return at the end of each line of code. 3.
Troubleshooting the AP-2000 Related Applications RADIUS Authentication Server If you enabled RADIUS Authentication on the AP, make sure that your network’s RADIUS servers are operational. Otherwise, clients will not be able to log in. There are several reasons the authentication server services might be unavailable, here are two typical things to check: • • Make sure you have the proper RADIUS authentication server information setup configured in the AP.
Using the Command Line Interface (CLI) A This section describes the AP’s Command Line (CLI) Interface. CLI commands can be used to initialize, configure, and manage the Access Point. – – – CLI commands may be entered in real time through a keyboard or submitted with CLI scripts. A CLI Batch file is a user-editable configuration file that provides a user-friendly way to change the AP configuration through a file upload.
Using the Command Line Interface (CLI) • • • • • • Download vs. Upload - Downloads transfer files to the Access Point. Uploads transfer files from the Access Point. The TFTP server performs file transfers in both directions. Group - A logical collection of network parameter information. For example, the System Group is composed of several related parameters. Groups can also contain Tables. All items for a given Group can be displayed with a show CLI Command.
Using the Command Line Interface (CLI) Bootloader CLI The Bootloader CLI is a minimal subset of the normal CLI used to perform initial configuration of the AP. This interface is only accessible via the serial interface if the AP does not contain a software image or a download image command over TFTP has failed. The Bootloader CLI provides you with the ability to configure the initial setup parameters as well as download a software image to the device.
Using the Command Line Interface (CLI) CLI Command Types This guide divides CLI Commands into two categories: Operational and Parameter Controls. Operational CLI Commands These commands affect Access Point behavior, such as downloading, rebooting, and so on. After entering commands (and parameters, if any) press the Enter key to execute the Command Line.
Using the Command Line Interface (CLI) Figure A-4 Result of “s?” CLI command Example 3. Display parameters for set and show Example 3a allows you to see every possible parameter for the set (or show) commands. Notice from example 3a that the list is very long. Example 3b shows how to display a subset of the parameters based on initial parameter letters. Example 3a. Display every parameter that can be changed [Device-Name]>set ? . . . . Figure A-5 Result of “set ?” CLI command Example 3b.
Using the Command Line Interface (CLI) Example 4. Display Prompts for Successive Parameters Enter the command, a space, and then ?. Then, when the parameter prompt appears, enter the parameter value. Result: The parameter is changed and a new CLI line is echoed with the new value (in the first part of the following example, the value is the IP Address of the TFTP server).
Using the Command Line Interface (CLI) Figure A-8 Results of “help” CLI command 2. Complete command description and command usage can be provided by: [Device-Name]>help [Device-Name]> help history Shows content of Command History Buffer. The Command History Buffer stores command statements entered in the current session.
Using the Command Line Interface (CLI) upload Uploads a text-based configuration file from the AP to the TFTP Server. Executing upload with the asterisk character (“*”) will make use of the previously set/stored TFTP parameters. Executing upload without parameters will display command help and usage information. 1. Syntax to upload a file: [Device-Name]>upload Example: [Device-Name]>upload 192.168.1.100 APconfig.sys config 2.
Using the Command Line Interface (CLI) Configuring Objects that Require Reboot Certain objects supported by the Access Point require a device reboot in order for the changes to take effect. In order to inform the end-user of this behavior, the CLI provides informational messages when the user has configured an object that requires a reboot. The following messages are displayed as a result of the configuring such object or objects.
Using the Command Line Interface (CLI) Example 3 - Modify a table entry or row Use the index to be modified and the table elements you would like to modify. For example, suppose the IP Access Table has one entry and you wanted to modify the IP address: [Device-Name]>set mgmtipaccesstbl 1 ipaddr 10.0.0.11 You can also modify several elements in the table entry. Enter the index number and specific table elements you would like to modify.
Using the Command Line Interface (CLI) Example 6 - Show Individual and Table Parameters 1. View a single parameter. Syntax: [Device-Name]>show Example: [Device-Name]> show ipaddr Result: Displays the Access Point IP address. Figure A-11 Result of “show ipaddr” CLI Command 2. View all parameters in a table. Syntax: [Device-Name]> show Example:[Device-Name]> show mgmtipaccesstbl Result: Displays the IP Access Table and its entries.Using the Command Line Interface (CLI) Using Strings Since there are several string objects supported by the AP, a string delimiter is required for the strings to be interpreted correctly by the command line parser. For this CLI implementation, the single quote or double quote character can be used at the beginning and at the end of the string. For example: [Device-Name]> set sysname Lobby - Does not need quote marks [Device-Name]> set sysname “Front Lobby” - Requires quote marks.
Using the Command Line Interface (CLI) NOTE Proxim recommends changing your default passwords immediately. To perform this operation using CLI commands, refer to Change Passwords. Set Basic Configuration Parameters using CLI Commands There are a few basic configuration parameters that you may want to setup right away when you receive the AP.
Using the Command Line Interface (CLI) [Device-Name]>set snmpv3privpasswd (SNMPv3 privacy password) [Device-Name]>reboot 0 ! CAUTION Proxim strongly urges you to change the default passwords to restrict access to your network devices to authorized personnel. If you lose or forget your password settings, you can always perform the Reset to Factory Default Procedure.
Using the Command Line Interface (CLI) Examples: [Device-Name]>set wifssidtbl 3.1 ssid accesspt1 vlanid 22 ssidauth enable acctstatus enable secprofile 1 radmacprofile "MAC Authentication" radeapprofile "EAP Authentication" radacctprofile "Accounting" radmacauthstatus enable aclstatus enable set wifssidtbl 4.
Using the Command Line Interface (CLI) Download an AP Configuration File from your TFTP Server Begin by starting your TFTP program. It must be running and configured to transmit and receive.
Using the Command Line Interface (CLI) NOTE Refer to Performing Advanced Configuration for more information on these settings. Configure the AP as a DHCP Server NOTE You must have at least one entry in the DHCP Server IP Address Pool Table before you can set the DHCP Server Status to Enable.
Using the Command Line Interface (CLI) Operational Mode [Device-Name]>set wif mode mode Operational Mode 1 dot11b-only 2 dot11g-only 3 dot11bg 4 dot11a-only 5 dot11g-wifi Autochannel Select (ACS) ACS is enabled by default. Reboot after disabling or enabling ACS.
Using the Command Line Interface (CLI) Set the Multicast Rate (802.11b Only) [Device-Name]>set wif multrate <1,2,5.5,11 (Mbits/sec)> NOTE The Distance Between APs must be set before the Multicast Rate. Enable/Disable Super Mode (802.11a/g only) [Device-Name]>set wif 3 super Enable/Disable Turbo Mode (802.11a/g only) [Device-Name]>set wif 3 turbo NOTE Super mode must be enabled on the interface before Turbo mode can be enabled.
Using the Command Line Interface (CLI) Configure Secure Socket Layer (HTTPS) Enabling SSL and configuring a passphrase allows encrypted Secure Socket Layer communications to the AP through the HTTPS interface. [Device-Name]>set sslstatus The user must change the SSL passphrase when uploading a new certificate/private key pair, which will have a corresponding passphrase.
Using the Command Line Interface (CLI) Configure MAC Access Control Setup MAC (Address) Access Control [Device-Name]>set macaclstatus enable [Device-Name]>set macacloptype [Device-Name]>reboot 0 Add an Entry to the MAC Access Control Table [Device-Name]>set macacltbl macaddr status enable [Device-Name]>show macacltbl Disable or Delete an Entry in the MAC Access Control Table [Device-Name]>set macacltbl status [Device-Name]>show macacltbl NO
Using the Command Line Interface (CLI) Set RADIUS Parameters Configure RADIUS Authentication servers Perform the following command to configure a RADIUS Server and assign it to a VLAN. The RADIUS Server Profile index is specified by the index parameter and the subindex parameter specifies whether you are configuring a primary or secondary RADIUS server.
Using the Command Line Interface (CLI) Index Primary/Backup Profile Name Server Status Server Addressing Format IP Address/Host Name Destination Port VLAN Identifier MAC Address Format Response Time Maximum Retransmission Authorization Lifetime Accounting Update Interval Accounting Inactivity Timer : : : : : : : : : : : : : : 2 Primary EAP Authentication notReady ipaddr 0.0.0.
Using the Command Line Interface (CLI) Accounting Update Interval Accounting Inactivity Timer : 0 : 5 Index Primary/Backup Profile Name Server Status Server Addressing Format IP Address/Host Name Destination Port VLAN Identifier MAC Address Format Response Time Maximum Retransmission Authorization Lifetime Accounting Update Interval Accounting Inactivity Timer : : : : : : : : : : : : : : 4 Primary Management Access notReady ipaddr 0.0.0.
Using the Command Line Interface (CLI) Set Hardware Configuration Reset Parameters The Hardware Configuration Reset commands allows you to enable or disable the hardware reset functionality and to change the password to be used for configuration reset during boot up.
Using the Command Line Interface (CLI) Access Point network objects are associated with Groups.
Using the Command Line Interface (CLI) – • VLAN/SSID Parameters - Enable the configuration of multiple subnetworks based on VLAN ID and SSID pairs. – Security Profile Table - Configure Security Profiles that define allowed security modes (wireless clients), and encryption and authentication mechanisms. Other Parameters – IAPP Parameters - Enable or disable the Inter-Access Point Protocol. – SpectraLink VoIP Parameters (802.11b and bg Modes Only) - Enable or disable SpectraLink Voice over IP feature.
Using the Command Line Interface (CLI) Inventory Management Information Name Type Values System Inventory Management Subgroup N/A Access R sysinvmgmt CLI Parameter Component Table Subgroup N/A R sysinvmgmtcmptbl Component Interface Table Subgroup N/A R sysinvmgmtcmpiftbl NOTE The inventory management commands display advanced information about the AP’s installed components. You may be asked to report this information to a representative if you contact customer support.
Using the Command Line Interface (CLI) DHCP Server Parameters Name Type Values DHCP Server Group N/A DHCP Server Status Integer enable (1) (default) disable (2) delete (3) Gateway IP Address Access R RW CLI Parameter dhcp dhcpstatus IpAddress User Defined RW dhcpgw Primary DNS IP Address IpAddress User Defined RW dhcppridnsipaddr Secondary DNS IP Address User Defined RW dhcpsecdnsipaddr IpAddress Number of IP Pool Table Integer32 Entries N/A R dhcpippooltblent NOTE The DHCP Serv
Using the Command Line Interface (CLI) Link Integrity Parameters Name Type Values Link Integrity Group N/A Access Link Integrity Status Integer enable disable (default) RW linkintstatus Link Integrity Poll Interval Integer 500 - 15000 ms (in increments of 500ms) 500 ms (default) RW linkintpollint Link Integrity Poll Retransmissions Integer 0 - 255 5 (default) RW linkintpollretx R CLI Parameter linkint Link Integrity IP Target Table Name Type Values Link Integrity IP Target Table
Using the Command Line Interface (CLI) Interface Parameters Wireless Interface Parameters The wireless interface group parameter is wif. For Dual-radio APs, Slot A uses table index 3 and Slot B uses table index 4. Common Parameters to 802.11a, 802.11b, and 802.
Using the Command Line Interface (CLI) 802.11b Only Parameters Name Type Values Distance between APs Integer large (default) medium small minicell microcell Access RW distaps CLI Parameter Interference Robustness Integer enable (default) disable RW interrobust Operating Frequency Channel Integer 1 - 14; available channels vary by regulatory domain/country; see 802.11b Channel Frequencies RW channel Multicast Rate Integer 1 Mbits/sec (1) 2 Mbits/sec (2) (default) 5.
Using the Command Line Interface (CLI) 802.11b/g Only Parameters Name Type Values Wireless Operational Mode Integer dot11b-only dot11g-only dot11bg (default) dot11g-wifi Access RW mode Operating Frequency Channel Integer 1 - 14; available channels vary by regulatory domain/country; see 802.11g Channel Frequencies RW channel Supported Data Rates Octet String See Transmit Rate, below R Transmit Rate Integer32 For 802.11b-only mode: 0 (auto fallback - default) 1 Mbits/sec 2 Mbits/sec 5.
Using the Command Line Interface (CLI) Wireless Interface SSID/VLAN/Profile Parameters The Wireless Interface SSID table manages the SSID/VLAN pairs, and the Security Profile and RADIUS Profiles associated to the VLAN NOTE The ability to configure up to 16 VLAN/SSID pairs and to configure security and RADIUS profiles per SSID is available only for 802.11b/g APs and 802.11a Upgrade Kit APs. 802.11b APs do not support multiple VLAN/SSID pairs. APs with the 802.
Using the Command Line Interface (CLI) Ethernet Interface Parameters Name Type Values Ethernet Interface Group N/A Speed Integer 10halfduplex 10fullduplex 10autoduplex 100halfduplex 100fullduplex autohalfduplex autoautoduplex (default) MAC Address PhyAddress N/A Access R RW R CLI Parameter ethernet etherspeed ethermacaddr Management Parameters Secure Management Parameters Name Type Values Secure Management Integer Enable/Disable Access RW CLI Parameter securemgmtstatus SNMP Parameter
Using the Command Line Interface (CLI) HTTP Password DisplayString User Defined max 64 characters HTTP Port Integer User Defined Default = 80 W RW httppasswd httpport Help Link DisplayString User Defined RW httphelplink SSL Status Integer Enable/Disable RW sslstatus SSL Certificate Passphrase DisplayString User Defined Write-only sslpassphrase NOTE The default path for the Help files is C:/Program Files/ORiNOCO/AP/HTML/index.htm.
Using the Command Line Interface (CLI) RADIUS Based Management Access Parameters The RADIUS Based Management Access parameters allow you to enable HTTP or Telnet Radius Management Access, enable or disable local user access, and configure the local user password. The default local user ID is root and the default local user password is public. “Root” cannot be configured as a valid user for RADIUS based management access when local user access is enabled.
Using the Command Line Interface (CLI) Auto Configuration Parameters These parameters relate to the Auto Configuration feature which allows an AP to be automatically configured by downloading a specific configuration file from a TFTP server during the boot up process.
Using the Command Line Interface (CLI) Filtering Parameters Ethernet Protocol Filtering Parameters Name Type Values Ethernet Filtering Group N/A Filtering Interface Bitmask Interface Bitmask 0 or 2 - no interfaces (disable) 1 or 3 - Ethernet 4 or 6 - Wireless A 8 or 10 - Wireless B 12 = Wireless A & B 13 or 15 - all interfaces (default is 15) RW etherfltifbitmask passthru block RW etherfltoptype Access CLI Parameter Operation Type Access R CLI Parameter etherflt Ethernet Protocol Filterin
Using the Command Line Interface (CLI) Proxy ARP Parameters Name Type Values Proxy ARP Group N/A Status Integer enable disable (default) Access R RW CLI Parameter parp parpstatus IP ARP Filtering Parameters Name Type Values IP ARP Filtering Group N/A Status Integer enable disable (default) Access R RW CLI Parameter iparp iparpfltstatus IP Address IpAddress User Defined RW iparpfltipaddr Subnet Mask IpAddress User Defined RW iparpfltsubmask Broadcast Filtering Table Name Type
Using the Command Line Interface (CLI) Port Number Octet String User Defined (there are also 4 pre-defined protocols: Index 1: NetBios Name Service – 137, Index 2: NetBios Datagram Service – 138, Index 3: NetBios Session Service – 139, Index 4: SNMP Service – 161) RW portnum Protocol Name DisplayString User Defined (there are also 4 pre-defined protocols, see Port Number above) RW protoname Interface Bitmask Integer32 0 or 2 - no interfaces (disable) 1 or 3 - Ethernet 4 or 6 - Wireless A 8 or 10
Using the Command Line Interface (CLI) Syslog Lowest Priority Logged Integer 1–7 1 = LOG_ALERT 2 = LOG_CRIT 3 = LOG_ERR 4 = LOG_WARNING 5 = LOG_NOTICE 6 = LOG_INFO (default) 7 = LOG_DEBUG RW syslogpritolog Heartbeat Status Integer enable (1) disable (2) (default) RW sysloghbstatus 1 – 604800 seconds; 900 sec. (default) RW sysloghbinterval Heartbeat Interval (seconds) Integer NOTE The Heartbeat parameters are advanced settings not available via the HTTP interface.
Using the Command Line Interface (CLI) Priority Integer 0 – 255 128 (default) RW priority Path Cost Integer 1 – 65535 100 (default) RW pathcost State Integer disable blocking listening learning forwarding broken Status Integer R state enable disable RW status Access Storm Threshold Parameters Name Type Values Storm Threshold Group N/A N/A stmthres CLI Parameter Broadcast Threshold Integer 0 – 255 packets/sec (default is 0) RW stmbrdthres Multicast Threshold Integer 0 – 2
Using the Command Line Interface (CLI) NOTE The Wireless Distribution System (WDS) feature is not available for 802.11a or 802.11b/g APs at this time.
Using the Command Line Interface (CLI) Server IP Address or Name IpAddress DisplayString User defined (enter an IP address if seraddrfmt is ipaddr or a name if set to name; up to 254 characters if using a name) RW ipaddr Port (optional) Integer User Defined 1812 (default) RW port Shared Secret DisplayString User Defined 6-32 characters W Response Time (optional) Integer 1 – 10 seconds 3 (default) RW responsetm Maximum Retransmissions (optional) Integer 0–4 3 (default) RW maxretx RADI
Using the Command Line Interface (CLI) Security Profile Table The Security Profile Table allows you to configure security profiiles. A maximum of 16 security profiles are supported per wireless interface. Each security profile can be enable and configure one or more security modes (None Secure Station, WEP Station, 802.1x Station, WPA Station, WPA-PSK Station). The WEP/PSK parameters are separately configurable for each security mode.
Using the Command Line Interface (CLI) Configuring a Security Profile with WPA-PSK Security Mode set secprofiletbl secmode wpa-psk passphrase status enable Example: set secprofiletbl 6 secmode wpa-psk passphrase 12345678 status enable Configuring a Security Profile with 802.11i Security Mode set secprofiletbl secmode 802.11i rekeyint status enable Example: set secprofiletbl 7 secmode 802.11i rekeyint 900 status enable Configuring a Security Profile with 802.
Using the Command Line Interface (CLI) CLI Batch File A CLI Batch file is a user-editable configuration file that provides a user-friendly way to change the AP configuration through a file upload. The CLI Batch file is an ASCII file that facilitates Auto Configuration because it does not require the user to access one of the AP’s management interfaces to make configuration changes as is required with the proprietary TLV format configuration file.
Using the Command Line Interface (CLI) Reboot Behavior When a CLI Batch file contains a reboot command, the reboot will occur only after the entire CLI Batch file has been executed. There are two methods of uploading the CLI Batch File: • • Upload Upload and reboot (this option is to be used for a CLI Batch file containing the configuration parameters that require a reboot) CLI Batch File Error Log If there is any error during the execution of the CLI Batch file, the AP will stop executing the file.
B ASCII Character Chart You can configure WEP Encryption Keys in either Hexadecimal or ASCII format. Hexadecimal digits are 0-9 and A-F (not case sensitive). ASCII characters are 0-9, A-F, a-f (case sensitive), and punctuation marks. Each ASCII character corresponds to two hexadecimal digits. The table below lists the ASCII characters that you can use to configure WEP Encryption Keys. It also lists the Hexadecimal equivalent for each ASCII character.
C Specifications • • • Software Features Hardware Specifications Radio Specifications Software Features The tables below compare the software features available depending on the card type in the Access Point: • • • • • • • Number of Stations per BSS Management Functions Advanced Bridging Functions Medium Access Control (MAC) Functions Security Functions Network Functions Advanced Wireless Functions Number of Stations per BSS Feature AP-2000 802.
Specifications Advanced Bridging Functions 802.11b 802.11a 802.11b/g IEEE 802.1d Bridging Feature yes yes yes WDS Relay yes yes yes Roaming yes yes yes Protocol Filtering yes yes yes Multicast/Broadcast Storm Filtering yes yes yes Proxy ARP yes yes yes TCP/UDP Port Filtering yes yes yes Blocking Intra BSS Clients yes yes yes Packet Forwarding yes yes yes Medium Access Control (MAC) Functions 802.11b 802.11a Automatic Channel Selection (ACS) Feature yes yes 802.
Specifications Network Functions 802.11b 802.11a DHCP Client Feature yes yes 802.
Specifications Electrical Specifications Without Active Ethernet Module Voltage = 100 to 240 VAC (50-60 Hz) Current = 0.
Specifications 802.11a Channel Frequencies The available 802.11a Channels varies by regulatory domain and/or country. 802.11a radio certification is available in the following regions: – – – – – – FCC: U.S., Canada, and Australia ETSI: Europe and the United Kingdom TELEC: Japan SG: Singapore ASIA: China, Hong Kong, and South Korea TW: Taiwan There are five sets of frequency bands that determine the available channels depending on the regulatory domain. Some countries restrict 802.
Specifications 802.11b Channel Frequencies The available 802.11b channels vary by regulatory domain and/or country. 802.11b radio certification is available in the following regions: — — — — FCC - U.S./Canada, Mexico, and Australia ETSI - Most of Europe, including the United Kingdom and some Eastern block countries MKK - Japan IL - Israel Some countries restrict 802.11b operation to specific frequency bands.
Specifications Channel ID FCC (GHz) ETSI (GHz) TELEC (GHz) IL (GHz) 12 - 2.4671 2.467 - 13 - 2.4721 2.472 - 14 - - 2.4842 - Note 1: France is restricted to these channels. Note 2: Channel 14 is only available when using 802.11b only mode. Wireless Communication Range The range of the wireless signal is related to the composition of objects in the radio wave path and the transmit rate of the wireless communication. Communications at a lower transmit range may travel longer distances.
Specifications 802.11a (5 GHz Upgrade Kit) Range 54 Mbits/ s 48 Mbits/s 36 Mbits/s 24 Mbits/ s 18 Mbits/ s 12 Mbits/s 9 Mbits/ s 6 Mbits/ s Open Office 19 m (62 ft.) 33 m (108 ft.) 55 m (180 ft.) 74 m (243 ft.) 92 m (302 ft.) 106 m (348 ft.) 122 m (400 ft.) 131 m (430 ft.) Semi-Open Office 13 m (43 ft.) 23 m (75 ft.) 38 m (125 ft.) 51 m (167 ft.) 63 m (207 ft.) 73 m (239 ft.) 84 m (276 ft.) 90 m (295 ft.) Closed Office 9m (30 ft.) 16 m (52 ft.) 26 m (85 ft.) 35 m (115 ft.
Specifications 802.11b/g Range 54 Mbits/s 48 Mbits/s 36 Mbits/s 24 Mbits/s 18 Mbits/s 12 Mbits/s 9 Mbits/s 6 Mbits/s 11 Mbits/s 5.5 Mbits/s 2 Mbits/s 1 Mbits/s Open Office 56 m (184 ft.) 69 m (226 ft.) 107 m (351 ft.) 164 m (538 ft.) 219 m (718 ft.) 272 m (892 ft.) 292 m (958 ft.) 314 m (1030 ft.) 204 m (669 ft.) 236 m (774 ft.) 253 m (830 ft.) 338 m (1109 ft.) SemiOpen Office 38 m (125 ft.) 48 m (157 ft.) 73 m (239 ft.) 113 m (371 ft.) 151 m (495 ft.) 187 m (614 ft.
Technical Support D If you are having a problem using an AP and cannot resolve it with the information in Troubleshooting the AP-2000, gather the following information and contact ORiNOCO Technical Support: • • • • List of ORiNOCO products installed on your network; include the following: – Product names and quantity – Part numbers (P/N) – Serial numbers (S/N) List of ORiNOCO software versions installed – Check the HTTP interface’s Version screen – Include the source of the software version (e.g.
ORiNOCO AP-4000 User Guide Statement of Warranty E Warranty Coverage Proxim Corporation warrants that its Products are manufactured solely from new parts, conform substantially to specifications, and will be free of defects in material and workmanship for a Warranty Period of 1 year from the date of purchase.
Statement of Warranty Calls to the Customer Service Center for reasons other than Product failure will not be accepted unless Buyer has purchased a Proxim Service Contract or the call is made within the first thirty (30) days of the Product’s invoice date. Calls that are outside of the 30-day free support time will be charged a fee of $25.00 (US Dollars) per Support Call.
ORiNOCO AP-4000 User Guide Regulatory Information F This regulatory flyer contains the following sections: • • • • • • Information to the User Read this document prior to installation! User Documentation is provided on the CD-ROM. Informations pour l’utilisateur Lisez ce document avant l'installation ! La documentation utilisateur est fournie sur le CD-ROM. Informazioni per l’utente Legga questo documento prima dell’installazione. La documentazione nella sua lingua è contenuta nel CD-ROM.
Regulatory Information Information to the User This document provides regulatory information for the following products: • • Wireless Client products such as the PC Card. Wireless Base Station products such as the AP-200, AP-700, AP-1000, AP-4000, AP-4000 11a Upgrade Kit, AP-4000 11g Cardbus Kit, AP-600 11abg Upgrade Kit, AP-2500, AP-4000, ORiNOCO AP-600, AP-600 11g Upgrade Kit. Wireless Client and Base Station products are wireless network products based on IEEE 802.
Regulatory Information Wireless LAN and your Health Wireless LAN products, like other radio devices, emit radio frequency electromagnetic energy. The level of emitted energy however is far less than the electromagnetic energy emitted by other wireless devices like mobile phones, for example. Because Wireless LAN products operate within the guidelines found in radio frequency safety standards and recommendations, we believe that our Wireless LAN products are safe for use by consumers.
Regulatory Information Informations pour l’utilisateur Ce document fournit des informations sur les réglementations concernant les produits suivants : • • Les produits client sans fil tels que PC Card. Les produits sans fil de la Base Station tels que AP-200, AP-700, AP-1000, AP-4000, AP-4000 11a Upgrade Kit, AP-4000 11g Cardbus Kit, AP-600 11abg Upgrade Kit, AP-2500, AP-4000, ORiNOCO AP-600, AP-600 11g Upgrade Kit.
Regulatory Information Réseaux sans fil et votre santé Les produits pour un réseau sans fil, comme d’autres dispositifs radio, émettent de l’énergie électromagnétique de fréquence radio. Le niveau d’énergie émis par les dispositifs pour résaeu sans fil est toutefois beaucoup moins élevé que l’énergie électro-magnétique émise par des dispositifs comme par exemple les téléphones portables.
Regulatory Information Informazioni per l’utente Questo documento contiene informazioni legali relative ai seguenti prodotti: • • Prodotti client wireless come la PC Card. Prodotti per Base Station wireless come il AP-200, AP-700, AP-1000, AP-4000, AP-4000 11a Upgrade Kit, AP-4000 11g Cardbus Kit, AP-2500, AP-4000, ORiNOCO AP-600, AP-600 11g Upgrade Kit, AP-600 11abg Upgrade Kit. I prodotti cliente e delle Base Station sono prodotti senza fili della rete basati su IEEE 802.
Regulatory Information Wireless LAN e la salute I prodotti LAN wireless, così come altri dispositivi radio, emettono energia elettromagnetica in radiofrequenza. L'energia emessa è tuttavia molto inferiore all'energia elettromagnetica emessa da altri dispositivi wireless come, ad esempio, i telefoni cellulari.
Regulatory Information Informationen für den Benutzer Dieses Dokument enthält wichtige Informationen über folgende Produkte: • • Funk-Client-Produkte wie die PC Card. Funk-Base Stations-Produkte wie der AP-200, AP-700, AP-1000, AP-4000, AP-4000 11a Upgrade Kit, AP-4000 11g Cardbus Kit, AP-2500, AP-4000, ORiNOCO AP-600, AP-600 11g Upgrade Kit, AP-600 11abg Upgrade Kit. Funk-Client- und Funk-Base Stations-Produkte sind die drahtlosen Netzprodukte, die auf IEEE 802.
Regulatory Information Funk-LAN und gesundheitliche Sicherheit Funk-LAN-Produkte geben wie alle Hochfrequenzgeräte elektromagnetische Hochfrequenzenenergie ab. Bei Funk-LAN-Geräten ist jedoch eine deutlich geringere Emission elektromagnetischer Energie zu verzeichnen als bei anderen Funkgeräten, wie z. B. Mobiltelefonen. Da die Funk-LAN-Produkte den Richtlinien der HF-Sicherheitsstandards und -empfehlungen entsprechen, besteht beim Gebrauch von Funk-LAN-Produkten keine Gefährdung für den Kunden.
Regulatory Information Información para el usuario Este documento incluye información sobre normativas acerca de los siguientes productos: • • Productos cliente inalámbricos como la PC Card. Productos de Base Station inalámbricos como el AP-200, AP-700, AP-1000, AP-4000, AP-4000 11a Upgrade Kit, AP-4000 11g Cardbus Kit, AP-2500, AP-4000, ORiNOCO AP-600, AP-600 11g Upgrade Kit, AP-600 11abg Upgrade Kit.
Regulatory Information LAN inalámbrica y su salud Los productos de LAN inalámbrica, al igual que otros dispositivos de radiotecnología, emiten energía electromagnética de radiofrecuencia. Sin embargo, el nivel de energía que emiten es mucho menor que la energía electromagnética emitida por otros dispositivos inalámbricos, como por ejemplo los teléfonos móviles.
Regulatory Information ユーザー情報 このマニュアルでは、次の製品に関する規制情報について説明します。 ・ PC Card などの無線クライアント製品 ・ AP-200, AP-700, AP-1000, AP-4000, AP-4000 11a Upgrade Kit, AP-4000 11g Cardbus Kit, AP-2500, AP-4000, ORiNOCO AP-600, AP-600 11g Upgrade Kit, AP-600 11abg Upgrade Kit, などの無線 Base Station 製品 . 無線クライアントおよび Base Station 製品は、電気電子技術者教会 (IEEE) により定義・承認された無線 LAN 向け IEEE 802.11 標準に基づく無線ネットワーク製品です。IEEE 802.11a/802.11g 標準に準拠して設計された製品は、直交周波数分割多重 (OFDM) 無線技術を使用しています。IEEE 802.
Regulatory Information 無線 LAN と人体への影響 無線 LAN 製品は、他の無線装置と同様に、無線周波数電磁エネルギーを放出します。ただし、無線 LAN 装置が放出するエ ネルギーのレベルは、携帯電話などの無線装置が放出する電磁エネルギーより、はるかに低く抑えられています。無線 LAN 製品は、無線周波数に関する各種安全基準や推奨基準のガイドラインを反映するもので、広範な研究資料を検討している研 究者によるパネルや委員会の審議の結果策定されています。 規制に関する情報 この装置は、製品に添付のユーザーマニュアルに記載されたメーカーの指示に従って取り付け、使用する必要があります。 国ごとの無線の承認については、この冊子の無線の承認のセクションを参照してください。 ただし、建物の所有者または組織の代表者によって無線装置の使用が規制される場合もあります。たとえば、次のような場 合です。 ・ 飛行機内での無線装置の使用 ・ 他の装置やサービスに対する干渉の危険性が認められるか、または有害であると考えられる環境での使用 空港などの特定の組織または環境で無線の使用が許可されているかどうかが不明
Regulatory Information United States FCC Information Federal Communications Commission (FCC) Declaration of Conformity Products marked with the FCC logo and comply with the limits for a Class B digital device, pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation.
Regulatory Information Canada IC Information Industry Canada (IC) This device complies with the limits for a class B digital device and conforms to Industry Canada standard ICES-003. Products that contain a radio transmitter comply with Industry Canada standard RSS 210 and are labelled with IC approval number. Wireless LAN products designed according the IEEE 802.11b or IEEE 802.11g standard additionally comply with Industry Canada standard RSS 139.
Regulatory Information Europe Information • • • • • • • • • • • • • • • • • • • • • • • • • • Products labeled with the CE mark comply with EMC Directive 89/336/EEC and the Low Voltage Directive 73/23/EEC implying conformity to the following European Norms. Tous les produits portant la marque CE sont conformes à la directive EMC 89/336/EEC et à la directive 73/23/EEC sur les basses tensions qui impliquent la conformité aux normes de la Commission de la Communauté Européenne.
Regulatory Information • Proxim 802.11a Base Station products sold in Europe use a technique called Dynamic Frequency Selection (DFS) to automatically select an operating channel. The European Telecommunications Standard Institute (ETSI) requires that 802.11a devices use DFS to prevent interference with radar systems and other devices that already occupy the 5 GHz band. • Les produits de la Proxim 802.
Regulatory Information Japan Information 日本の通達 Association of Radio Industries and Businesses (ARIB) 電波産業会 (ARIB) STD-T71) 通達 このセクションは、5.15 ~ 5.25 GHz 帯域で運用されている IEEE 802.11a 準拠の送信機のみに当てはまります。使用の際に適 用される制限については、本冊子の「Radio Approvals」セクションをご覧ください。 電波産業会 (ARIB) STD-T66) 通達 このセクションは、2.4 GHz 帯域で運用されている IEEE 802.11b 準拠の送信機のみに当てはまります。この製 品は。「第二世代低電力データ通信システム」に分類され、 「電子通信企業に関する法律」および「電磁波に関 する法律」に規定されている「端末装置の技術基準」に適合しています。承認番号については、「Radio Approvals」セクションをご覧ください。 この製品は、ディレクトシーケンススペクトラム拡散 (DSSS) を採用しており、無線周波数帯は 2.
Regulatory Information South Korea Information (Product Name) PC Card AP-500 AP-600a AP-600b AP-600g AP-600abg AP-1000 AP-4000 AP-2500 AS-2000 AP-700 AP-4000 (Model Name) (Trade Name/Manufacturer) (Certification No.
Regulatory Information Radio Approvals To determine whether you are allowed to use your device in the countries listed below, please check the “contains transmitter” number that is printed on the identification label of your device. Certifications radio Pour déterminer si vous êtes autorisé à utiliser votre dispositif dans les pays indiquées ci-dessous, veuillez contrôler le “numéro de l’émetteur” imprimé sur l’étiquette d’identification de votre dispositif.
Regulatory Information Country Pays Paese Land País 国名 Radio Transmitter Approval Reference Restrictions Émetteur Radio Numéro du Permis Restrictions Trasmittente de Numero di Limitazioni Radio Approvazione Beschränkungen Radio-Übermittler Zustimmung-Nummer Restricciones Transmisor de Número de Permiso 制限 Radio 承認番号 無線送信機 Australia Alpha-1: A13QBF • For indoor use only.
Regulatory Information Country Pays Paese Land País 国名 Belgium Belgie Belgique Radio Transmitter Approval Reference Restrictions Émetteur Radio Numéro du Permis Restrictions Trasmittente de Numero di Limitazioni Radio Approvazione Beschränkungen Radio-Übermittler Zustimmung-Nummer Restricciones Transmisor de Número de Permiso 制限 Radio 承認番号 無線送信機 PC24E-H-FC CE 0122 ! PC24E-H-ET-L RTT/RL/X 113 PC24E-H-ET CE 0122 ! PC24E-11-FC/R CE 0336 ! PC24E-11-ET/R CE 0336 ! • For outdoor usage you may only us
Regulatory Information Country Pays Paese Land País 国名 Radio Transmitter Approval Reference Restrictions Émetteur Radio Numéro du Permis Restrictions Trasmittente de Numero di Limitazioni Radio Approvazione Beschränkungen Radio-Übermittler Zustimmung-Nummer Restricciones Transmisor de Número de Permiso 制限 Radio 承認番号 無線送信機 Belgium Alpha-1: C38WCW CE 0560 ! • Only indoor with integral or approved Range Extender Antenna.
Regulatory Information Country Pays Paese Land País 国名 Radio Transmitter Approval Reference Restrictions Émetteur Radio Numéro du Permis Restrictions Trasmittente de Numero di Limitazioni Radio Approvazione Beschränkungen Radio-Übermittler Zustimmung-Nummer Restricciones Transmisor de Número de Permiso 制限 Radio 承認番号 無線送信機 Belgium Belgie Belgique Alpha-1: A04LAE CE 0336 ! Alpha-1:A08NAE CE 0336 ! Brazil PC24E-H-FC • This equipment operates in secondary mode: It is not allowed to protect the equipme
Regulatory Information Country Pays Paese Land País 国名 Radio Transmitter Approval Reference Restrictions Émetteur Radio Numéro du Permis Restrictions Trasmittente de Numero di Limitazioni Radio Approvazione Beschränkungen Radio-Übermittler Zustimmung-Nummer Restricciones Transmisor de Número de Permiso 制限 Radio 承認番号 無線送信機 Canada Alpha-1: B11FNF IC: 1856B-B11FNF • Only with integral, approved Range Extender Antenna. • Pour usage avec une antenne intégrale ou amplificatrice approuvée.
Regulatory Information Country Pays Paese Land País 国名 Czech Republic Radio Transmitter Approval Reference Restrictions Émetteur Radio Numéro du Permis Restrictions Trasmittente de Numero di Limitazioni Radio Approvazione Beschränkungen Radio-Übermittler Zustimmung-Nummer Restricciones Transmisor de Número de Permiso 制限 Radio 承認番号 無線送信機 PC24E-H-ET-L 45314454 PC24E-H-ET Denmark Danmark Denmark Danmark Denmark Danmark PC24E-H-FC CE 0122 ! PC24E-H-ET-L R0167 SRD3a PC24E-H-ET CE 0122 ! PC24E-11-FC
Regulatory Information Country Pays Paese Land País 国名 Finland Suomi Radio Transmitter Approval Reference Restrictions Émetteur Radio Numéro du Permis Restrictions Trasmittente de Numero di Limitazioni Radio Approvazione Beschränkungen Radio-Übermittler Zustimmung-Nummer Restricciones Transmisor de Número de Permiso 制限 Radio 承認番号 無線送信機 PC24E-H-FC CE 0122 ! PC24E-H-ET-L R0167 SRD3a PC24E-H-ET PC24E-11-FC/R CE 0336 ! • Only indoor with integral or approved Range Extender Antenna.
Regulatory Information Country Pays Paese Land País 国名 France France Radio Transmitter Approval Reference Restrictions Émetteur Radio Numéro du Permis Restrictions Trasmittente de Numero di Limitazioni Radio Approvazione Beschränkungen Radio-Übermittler Zustimmung-Nummer Restricciones Transmisor de Número de Permiso 制限 Radio 承認番号 無線送信機 PC24E-H-FC CE 0122 ! • Restricted frequency band: On French territory PC24E-H-FC devices may only use channels 10 and 11 (2457 and 2462 MHz).
Regulatory Information Country Pays Paese Land País 国名 Radio Transmitter Approval Reference Restrictions Émetteur Radio Numéro du Permis Restrictions Trasmittente de Numero di Limitazioni Radio Approvazione Beschränkungen Radio-Übermittler Zustimmung-Nummer Restricciones Transmisor de Número de Permiso 制限 Radio 承認番号 無線送信機 France Alpha-1: B13ENE CE 0336 ! • Restricted frequency band: On French territory B13ENE devices may only use channels 10, 11, 12, and 13 (2457, 2462, 2467 and 2472 MHz).
Regulatory Information Country Pays Paese Land País 国名 Radio Transmitter Approval Reference Restrictions Émetteur Radio Numéro du Permis Restrictions Trasmittente de Numero di Limitazioni Radio Approvazione Beschränkungen Radio-Übermittler Zustimmung-Nummer Restricciones Transmisor de Número de Permiso 制限 Radio 承認番号 無線送信機 Germany G11FNF-PC Deutschland G13ENE-PC CE 0336 ! CE 0336 ! • Only indoor with integral or approved Range Extender Antenna.
Regulatory Information Country Pays Paese Land País 国名 Hong Kong Radio Transmitter Approval Reference Restrictions Émetteur Radio Numéro du Permis Restrictions Trasmittente de Numero di Limitazioni Radio Approvazione Beschränkungen Radio-Übermittler Zustimmung-Nummer Restricciones Transmisor de Número de Permiso 制限 Radio 承認番号 無線送信機 PC24E-H-FC LP400096 PC24E-H-ET LP400095 PC24E-11-FC/R Hong Kong Alpha-1: B13ENE HKTA-1039 Hong Kong Alpha-1: A09SBS HKTA-1039 Hong Kong G13ENE-PC HKTA-1039 Hong Ko
Regulatory Information Country Pays Paese Land País 国名 Iceland Ísland Radio Transmitter Approval Reference Restrictions Émetteur Radio Numéro du Permis Restrictions Trasmittente de Numero di Limitazioni Radio Approvazione Beschränkungen Radio-Übermittler Zustimmung-Nummer Restricciones Transmisor de Número de Permiso 制限 Radio 承認番号 無線送信機 PC50E-4-ET/A CE 0336 ! PC50E-8-ET/A CE 0336! A19PCE-PC CE 0560 ! • For indoor use only.
Regulatory Information Country Pays Paese Land País 国名 Radio Transmitter Approval Reference Restrictions Émetteur Radio Numéro du Permis Restrictions Trasmittente de Numero di Limitazioni Radio Approvazione Beschränkungen Radio-Übermittler Zustimmung-Nummer Restricciones Transmisor de Número de Permiso 制限 Radio 承認番号 無線送信機 Israel G05INI-PC MoC pending • Restricted frequency band: only channels 4 through 8 (2418.0-2457.0 MHz) may be used in Israel.
Regulatory Information Country Pays Paese Land País 国名 Japan 日本 Radio Transmitter Approval Reference Restrictions Émetteur Radio Numéro du Permis Restrictions Trasmittente de Numero di Limitazioni Radio Approvazione Beschränkungen Radio-Übermittler Zustimmung-Nummer Restricciones Transmisor de Número de Permiso 制限 Radio 承認番号 無線送信機 PC24E-H-FC TELEC: NYCA0010 PC24E-H-JP TELEC: NYCA0008 TELEC: GZCA0007 PC24E-H-ET-L TELEC: NYCA00024 PC24E-11-FC/R TELEC: 01NYDA1121 JATE: D01-1128JP PC24E-11-JP/R TELE
Regulatory Information Country Pays Paese Land País 国名 Radio Transmitter Approval Reference Restrictions Émetteur Radio Numéro du Permis Restrictions Trasmittente de Numero di Limitazioni Radio Approvazione Beschränkungen Radio-Übermittler Zustimmung-Nummer Restricciones Transmisor de Número de Permiso 制限 Radio 承認番号 無線送信機 Korea A04VBA-PC Korea Alpha-1: B13ENE MIC: R-LARN-03-0209 Product name: PC Card Certification date: Manufacturer: Proxim Corporation 2003.05.
Regulatory Information Country Pays Paese Land País 国名 Radio Transmitter Approval Reference Restrictions Émetteur Radio Numéro du Permis Restrictions Trasmittente de Numero di Limitazioni Radio Approvazione Beschränkungen Radio-Übermittler Zustimmung-Nummer Restricciones Transmisor de Número de Permiso 制限 Radio 承認番号 無線送信機 Liechtenstein AP-700: AP-AG-AT-01 CE 0560! Liechtenstein AP-4000: AP-AG-AT-02 CE 0560! • Only indoor with integral or approved Range Extender Antenna.
Regulatory Information Country Pays Paese Land País 国名 Radio Transmitter Approval Reference Restrictions Émetteur Radio Numéro du Permis Restrictions Trasmittente de Numero di Limitazioni Radio Approvazione Beschränkungen Radio-Übermittler Zustimmung-Nummer Restricciones Transmisor de Número de Permiso 制限 Radio 承認番号 無線送信機 Luxemburg PC50E-4-ET/A Luxembourg PC50E-8-ET/A A19PCE-PC CE 0336 ! • For indoor use only. • Pour usage intérieur uniquement.
Regulatory Information Country Pays Paese Land País 国名 Radio Transmitter Approval Reference Restrictions Émetteur Radio Numéro du Permis Restrictions Trasmittente de Numero di Limitazioni Radio Approvazione Beschränkungen Radio-Übermittler Zustimmung-Nummer Restricciones Transmisor de Número de Permiso 制限 Radio 承認番号 無線送信機 Mexico México Alpha-1: B11FNF COFETEL: PCPPRAL03-095 • On Mexican territory wireless devices may only use channel 11 (2450.0-2483.
Regulatory Information Country Pays Paese Land País 国名 Netherlands Nederland Netherlands Nederland Netherlands Nederland Radio Transmitter Approval Reference Restrictions Émetteur Radio Numéro du Permis Restrictions Trasmittente de Numero di Limitazioni Radio Approvazione Beschränkungen Radio-Übermittler Zustimmung-Nummer Restricciones Transmisor de Número de Permiso 制限 Radio 承認番号 無線送信機 PC24E-H-FC CE 0122 ! No 67 PC24E-H-ET-L R0167 SDR3a; NL99061474 HDTP/RDR/485997 PC24E-H-ET CE 0122 ! PC24E-11-
Regulatory Information Country Pays Paese Land País 国名 Radio Transmitter Approval Reference Restrictions Émetteur Radio Numéro du Permis Restrictions Trasmittente de Numero di Limitazioni Radio Approvazione Beschränkungen Radio-Übermittler Zustimmung-Nummer Restricciones Transmisor de Número de Permiso 制限 Radio 承認番号 無線送信機 New Zealand PC24E-H-FC RFS PC24E-11-FC/R ENG 3/2/RFS29 PC24E-H-ET-L RFS PC24E-H-ET Norway Norsk PC24E-11-ET/R ENG 3/2/RFS29 PC24E-H-FC CE 0122 ! PC24E-H-ET-L R0167 SRD3a P
Regulatory Information Country Pays Paese Land País 国名 Poland Radio Transmitter Approval Reference Restrictions Émetteur Radio Numéro du Permis Restrictions Trasmittente de Numero di Limitazioni Radio Approvazione Beschränkungen Radio-Übermittler Zustimmung-Nummer Restricciones Transmisor de Número de Permiso 制限 Radio 承認番号 無線送信機 PC24E-H-FC 688/2000 PC24E-H-FC/R 072/2002 PC24E-H-ET-L PC24E-H-ET Portugal PC24E-H-ET/R 072/2002 PC24E-H-FC CE 0122 ! PC24E-11-FC/R CE 0336 ! • Only indoor with integ
Regulatory Information Country Pays Paese Land País 国名 Radio Transmitter Approval Reference Restrictions Émetteur Radio Numéro du Permis Restrictions Trasmittente de Numero di Limitazioni Radio Approvazione Beschränkungen Radio-Übermittler Zustimmung-Nummer Restricciones Transmisor de Número de Permiso 制限 Radio 承認番号 無線送信機 Saudi Arabia PC24E-H-FC Reference 10/36 of 18-3-2002 PC24E-11-FC/R Reference 10/36 of 18-3-2002 PC24E-H-ET Reference 10/36 of 18-3-2002 PC24E-H-ET-L Reference 10/36 of 18-3-2002
Regulatory Information Country Pays Paese Land País 国名 South Africa Radio Transmitter Approval Reference Restrictions Émetteur Radio Numéro du Permis Restrictions Trasmittente de Numero di Limitazioni Radio Approvazione Beschränkungen Radio-Übermittler Zustimmung-Nummer Restricciones Transmisor de Número de Permiso 制限 Radio 承認番号 無線送信機 PC24E-H-FC PC24E-H-ET-L PC24E-H-ET South Africa Spain España Spain España G11FNF-PC ICASA: TA-2003/93 G13ENE-PC ICASA: TA-2003/93 PC24E-H-FC CE 0122 ! PC24E-H-ET-
Regulatory Information Country Pays Paese Land País 国名 Sweden Sverige Radio Transmitter Approval Reference Restrictions Émetteur Radio Numéro du Permis Restrictions Trasmittente de Numero di Limitazioni Radio Approvazione Beschränkungen Radio-Übermittler Zustimmung-Nummer Restricciones Transmisor de Número de Permiso 制限 Radio 承認番号 無線送信機 G11FNF-PC CE 0336 ! G13ENE-PC CE 0336 ! • Only indoor with integral or approved Range Extender Antenna.
Regulatory Information Country Pays Paese Land País 国名 Switzerland Suisse Schweiz Svizzera Radio Transmitter Approval Reference Restrictions Émetteur Radio Numéro du Permis Restrictions Trasmittente de Numero di Limitazioni Radio Approvazione Beschränkungen Radio-Übermittler Zustimmung-Nummer Restricciones Transmisor de Número de Permiso 制限 Radio 承認番号 無線送信機 G11FNF-PC CE 0336 ! G13ENE-PC CE 0336 ! Switzerland Suisse Schweiz Svizzera PC50E-4-ET/A CE 0336 ! A19PCE-PC CE 0560 ! Switzerland Suisse Sc
Regulatory Information Country Pays Paese Land País 国名 Radio Transmitter Approval Reference Restrictions Émetteur Radio Numéro du Permis Restrictions Trasmittente de Numero di Limitazioni Radio Approvazione Beschränkungen Radio-Übermittler Zustimmung-Nummer Restricciones Transmisor de Número de Permiso 制限 Radio 承認番号 無線送信機 Switzerland Suisse Schweiz Svizzera AP-700: AP-AG-AT-01 CE 0560 ! Switzerland Suisse Schweiz Svizzera AP-4000: AP-AG-AT-02 CE 0560 ! Switzerland Suisse Schweiz Svizzera Alpha-1:
Regulatory Information Country Pays Paese Land País 国名 United Kingdom United Kingdom Radio Transmitter Approval Reference Restrictions Émetteur Radio Numéro du Permis Restrictions Trasmittente de Numero di Limitazioni Radio Approvazione Beschränkungen Radio-Übermittler Zustimmung-Nummer Restricciones Transmisor de Número de Permiso 制限 Radio 承認番号 無線送信機 PC24E-H-FC CE 0122 ! PC24E-H-ET-L R0167 SRD3a PC24E-H-ET CE 0122 ! PC24E-11-FC/R CE 0336 ! PC24E-11-ET/R CE 0336 ! G11FNF-PC CE 0336 ! G13ENE-
Regulatory Information Country Pays Paese Land País 国名 Radio Transmitter Approval Reference Restrictions Émetteur Radio Numéro du Permis Restrictions Trasmittente de Numero di Limitazioni Radio Approvazione Beschränkungen Radio-Übermittler Zustimmung-Nummer Restricciones Transmisor de Número de Permiso 制限 Radio 承認番号 無線送信機 USA Alpha-1: B11FNF FCC ID: HZB-B11FNF USA Alpha-1: G11FNF FCC ID: HZB-G11FNF USA Alpha-1: A13QBF FCC ID: HZB-A13QBF • For indoor use only.
Regulatory Information 4 ou 8 indique le nombre de canaux. zz =FC ou FC/R identifie un carte universelle à 11 canaux, conforme aux normes FCC, qui opère dans la zone de 2.412 - 2.462 GHz seulement. FC/A identifie un émetteur radio IEEE 802.11a conforme aux normes FCC. ET ou ET/R identifie un émetteur radio à 13 canaux conforme aux normes de la Communauté Européene. ET/A ou ET/B ou ET/C identifie un émetteur radio IEEE 802.11a conforme aux normes de la Communauté Européene.
Regulatory Information E =wahlweise freigestellte Kennung, zum anzuzeigen, daß der Übermittler eine integrale Antenne hat. y =H oder 11 kennzeichnet einen Funksender, der hohe Datentransferraten bis zu 11, 5,5, 2 und 1 Mbps unterstützt. 4 oder 8 kennzeichnet die Zahl Funkkanälen. zz =FC oder FC/R kennzeichnet eine FCC-konforme "Worldcard" mit 11 Kanälen, die auf den Betrieb in einem Frequenzband von 2,412 - 2,462 GHz beschränkt ist. FC/A kennzeichnet einen IEEE 802.
Regulatory Information GNJ / LEJ = Japan INI = Israel VBA = Asia (China, South Korea) WCW = WORLD 無線タイプ番号の形式は、PCxxE-y-zz です。 xx =24 は、2.4 GHz 周波数帯域で使用される IEEE 802.11b 準拠の WLAN 無線製品であることを示します。 50 は、5 GHz 周波数帯域で使用される IEEE 802.11a 準拠の WLAN 無線製品であることを示します。 E = 送信機に統合アンテナが装備されていることを示すオプションの識別記号です。 y =H または 11 は、11、5.5、2 および 1 Mbps の高速データ転送をサポートする送信機であることを示します。 4 または 8 はチャンネル数を示します。 zz =FC または FC/R は、運用が 2.412 ~ 2.462 GHz 周波数帯域に制限されている、FCC 準拠の 11 チャンネル 「Worldcard」であることを示します。 FC/A は、FCC 規則に準拠した IEEE 802.