9160 G2 Wireless Gateway User Manual November 2, 2009 ISO 9001 Certified Quality Management System P/N 8100117.
© Copyright 2009 by Psion Teklogix Inc. 2100 Meadowvale Boulevard, Mississauga, Ontario, Canada L5N 7J9 http://www.psionteklogix.com This document and the information it contains is the property of Psion Teklogix Inc., is issued in strict confidence, and is not to be reproduced or copied, in whole or in part, except for the sole purpose of promoting the sale of Psion Teklogix manufactured goods and services.
Return-To-Factory Warranty Psion Teklogix Inc. provides a return to factory warranty on this product for a period of twelve (12) months in accordance with the Statement of Limited Warranty and Limitation of Liability provided at: www.psionteklogix.com/warranty The warranty on Psion Teklogix manufactured equipment does not extend to any product that has been tampered with, altered, or repaired by any person other than an employee of an authorized Psion Teklogix service organization.
Restriction On Hazardous Substances (RoHS) Directive 2002/95/EC What is RoHS? The European Union has mandated that high environmental standards be met in the design and manufacture of electronic and electrical products sold in Europe, to reduce hazardous substances from entering the environment. The “Restriction on Hazardous Substances Directive (RoHS)” prescribes the maximum trace levels of lead, cadmium, mercury, hexavalent chromium, and flame retardants PBB and PBDE that may be contained in a product.
TABLE OF CONTENTS Approvals and Safety Summary . . . . . . . . . . . . . . . . . . . . . . . . . xiii Chapter 1: Introduction 1.1 1.2 1.3 1.4 1.5 1.6 About This Manual . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3 Online Help Features, Supported Browsers, And Limitations. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6 Text Conventions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Contents 2.2 2.3 2.1.4.1 Power . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18 2.1.4.2 Antennas. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19 Connecting To External Devices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20 2.2.1 Ports . . . . . . . . . . . . . . . . . . . . . . . .
Contents 4.5.1 4.6 Default Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42 What’s Next? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .42 4.6.1 Make Sure The Access Point Is Connected To The LAN . . . . . . . . . . . . . . . . . . . . . . . 42 4.6.2 Test LAN Connectivity With Wireless Clients. . . . . . . . . . . . . .
Contents 6.7.1 6.8 Navigating To An AP By Using Its IP Address In A URL . . . . . . . . . . . . . . . . . . . . . . 61 Session Monitoring . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 62 6.8.1 Navigating to Session Monitoring . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 62 6.8.2 Understanding Session Monitoring Information . . . . . . . . . . . . . . . . . . . . . .
Contents 8.3.4.1 Update Advanced Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 81 Chapter 9: Wireless Neighborhood 9.1 9.2 9.3 9.4 Navigating To Wireless Neighborhood . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 85 Understanding Wireless Neighborhood Information. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 85 Viewing Wireless Neighborhood. . . . . . . . . . . . . . . . . .
Contents 11.2.1 Enabling Or Disabling Persistence. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .123 11.2.2 Severity . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .123 11.2.3 Depth . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .124 11.2.4 Log Relay Host For Kernel Messages . .
Contents Chapter 14: Setting Up Guest Access 14.1 Understanding The Guest Interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .155 14.2 Configuring The Guest Interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .155 14.2.1 Configuring A Guest Network On A Virtual LAN . . . . . . . . . . . . . . . . . . . . . . . . . . . . .156 14.2.2 Configuring The Welcome Screen (Captive Portal) .
Contents 19.1.1 QoS And Load Balancing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .187 19.1.2 802.11e And WMM Standards Support. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .187 19.1.3 QoS Queues And Parameters To Coordinate Traffic Flow . . . . . . . . . . . . . . . . . . . . .188 19.1.3.1 QoS Queues And Type Of Service (ToS) On Packets . . . . . . . . . . . . . . . .188 19.1.3.
Contents Chapter 22: The 9160 G2 As Base Station 22.1 Overview. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 221 22.2 Radio Protocols. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .222 22.2.1 Adaptive Polling/Contention Protocol . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .222 22.
Contents 23.4.1.3 Telnet Protocol Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .269 23.4.1.4 Function Key Mappings. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .273 23.4.2 5250 Emulation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .274 23.4.2.1 Emulation Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Contents Chapter 27: Specifications 27.1 27.2 27.3 27.4 27.5 27.6 27.7 Physical Description . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .323 Environmental Requirements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .323 AC Power Requirements. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Contents Appendix C: Troubleshooting C.1 C.2 Wireless Distribution System (WDS) Problems And Solutions. .. . .. . .. . .. . .. . .. .. . .. . .. . C-43 Cluster Recovery.. . .. . .. . .. . .. . .. . .. . .. .. . .. . .. . .. . .. . .. . .. .. . .. . .. . .. . .. . .. . .. . .. .. . .. . .. . C-44 C.2.1 Reboot Or Reset Access Point .. . .. . .. . .. . .. . .. . .. .. . .. . .. . .. . .. . .. . .. . .. .. . .. . .. . C-44 Appendix D: Glossary Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
APPROVALS AND SAFETY SUMMARY DECLARATION OF CONFORMITY Product: Application of Council Directives: Conformity Declared to Standards: 9160 G2 Wireless Gateway - RA2050, RA2060 & RA1001A EMC Directive: Low Voltage Directive: RoHS Directive: R&TTE Directive: 2004/108/EC 2006/95/EC 2002/95/EC 1999/5/EEC EN 55022: Class B EN 61000-3-2; EN 61000-3-3 EN 55024 ETSI EN 300 113-1: V1.6.1 (2006-08) EN 301 893: 2003-08 V1.2.3 EN 300 328: 2004-11 V1.6.1 EN 301 489-1/17: 2004-11 V1.5.1/ 2002-08 V1.2.
Chapter : Approvals and Safety Summary FCC Statement FCC DECLARATION OF CONFORMITY (DOC) Applicant’s Name & Address: PSION TEKLOGIX 2100 Meadowvale Blvd. Mississauga, Ontario, Canada L5N 7J9 Telephone No.: (905) 813-9900 US Representative’s Name & Address: Psion Teklogix Corp. 1810 Airport Exchange Blvd., Suite 500 Erlanger, Kentucky, 41018, USA Telephone No.: (859) 372-4329 Equipment Type/ Environment Use: Computing Devices Trade Name / Model No.
Chapter : Approvals and Safety Summary occur in a particular installation. If this equipment does cause harmful interference to radio or television reception, which is found by turning the equipment off and on, the user is encouraged to try to correct the interference by one or more of the following measures: • • • • Reorient or relocate the receiving antenna. Increase the separation between the equipment or devices. Connect the equipment to an outlet other than the receiver's.
Chapter : Approvals and Safety Summary CE Marking When used in a residential, commercial or light industrial environment, the product and its approved UK and European peripherals fulfill all requirements for CE marking. R&TTE Directive 1999/5/EC This equipment complies with the essential requirements of EU Directive 1999/5/EC (Declaration available: www.psionteklogix.com). Cet équipement est conforme aux principales caractéristiques définies dans la Directive européenne RTTE 1999/5/CE.
Chapter : Approvals and Safety Summary Psion Teklogix tímto prohlašuje, že 9160 G2 Wireless Gateway je ve shodě se základními požadavky a dalšími příslušnými ustanoveními směrnice 1995/5/ES (NV č. 426/2000 Sb.) a Prohlášení o shodě je k dispozici na www.psionteklogix.com. Toto zarízení lze provozovat v České republice na základě generální licence č. GL12/R/2000. Psion Teklogix týmto vyhlasuje, že 9160 G2 Wireless Gateway spĺňa základné požiadavky a všetky príslušné ustanovenia Smernice 1995/5/ES (NV č.
Chapter : Approvals and Safety Summary - The extension cord is properly wired, in good electrical condition, and that the wire size is larger than 16 AWG. • The 9160 G2 is designed for indoor use only; do not expose the 9160 G2 to rain or snow. The 9160 G2 Wireless Gateway Fiber Optic Option is: CLASS 1 LED PRODUCT APPAREIL À LED DE CLASSE 1 Do Not Operate In An Explosive Atmosphere Operating Psion Teklogix equipment where explosive gas is present may result in an explosion.
Chapter : Approvals and Safety Summary for terminating bonding jumpers in the country of use. Termination of the supplementary equipment earthing conductor may be made to building steel, to a metal electrical raceway system, or to any earthed item that is permanently and reliably connected to the electrical service equipment earthed. 3. Bare, covered or insulated earthing conductors are acceptable.
1 INTRODUCTION 1.1 About This Manual . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3 1.2 Online Help Features, Supported Browsers, And Limitations . . . . . . . . . . . . . . 6 1.3 Text Conventions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7 1.4 Overview Of The 9160 G2 Wireless Gateway . . . . . . . 1.4.1 Radios . . . . . . . . . . . . . . . . . . . . . . 1.4.2 Access Point Functions. . . . . . . . . . . . . . 1.4.3 Base Station Functions . . . . .
2 Psion Teklogix 9160 G2 Wireless Gateway User Manual
Chapter 1: Introduction About This Manual 1.1 About This Manual This manual describes the setup, configuration, administration, and maintenance of one or more 9160 G2 Wireless Gateways on a wireless network. Chapter 1: Introduction provides an overview of this manual and 9160 G2 Wireless Gateway features. Chapter 2: “Installation Requirements” explains the physical installation of the 9160 G2 Wireless Gateway, and how to connect to the 9160 G2 for diagnostics.
Chapter 1: Introduction About This Manual Chapter 11: “Maintenance And Monitoring” describes the maintenance and monitoring tasks for individual access points (not for cluster configurations). Chapter 12: “The Ethernet (Wired) Interface” describes how to configure the wired interface settings on the 9160 G2 Wireless Gateway. Chapter 13: “Setting The Wireless Interface” describes how to configure the wireless address and related settings on the 9160 G2 Wireless Gateway.
Chapter 1: Introduction About This Manual Chapter 22: “The 9160 G2 As Base Station” describes how to configure the 9160 G2 Wireless Gateway as either a wired or wireless Base Station, or as a Remote Radio Module (RRM). This chapter also describes narrow band radio configuration settings. Chapter 23: “Mini-Controller Configuration” describes the configuration of the 9160 G2 Wireless Gateway when used as a mini-controller. Chapter 24: “802.IQ Settings” describes the settings for the 802.
Chapter 1: Introduction Online Help Features, Supported Browsers, And Limitations 1.2 Online Help Features, Supported Browsers, And Limitations Online Help for the 9160 G2 Wireless Gateway provides information about all fields and features available on the user interface. The information in the Online Help is a subset of the information available in the full User Manual. Online Help information corresponds to each tab on the 9160 G2 Wireless Gateway Administration user interface.
Chapter 1: Introduction Text Conventions 1.3 Text Conventions Note: Notes highlight additional helpful information. Important: These statements provide particularly important instructions or additional information that is critical to the operation of the computer and other equipment. Warning: These statements provide important information that may prevent injury, damage to the equipment, or loss of data.
Chapter 1: Introduction Radios Depending on the installed radio(s), the access point is capable of operating in the following modes: • • • • • • • • • IEEE 802.11b mode. IEEE 802.11g mode. IEEE 802.11a mode. Atheros Turbo 5 GHz. Atheros Dynamic Turbo 5 GHz. Atheros Turbo 2.4 GHz. Atheros Dynamic Turbo 2.4 GHz. Extended Range. Psion Teklogix Narrow Band Polling Protocol.
Chapter 1: Introduction Access Point Functions Figure 1.2 Upgrade Firmware Web Page 1.4.2 Access Point Functions As an access point connected to a wired network, the 9160 G2 Wireless Gateway forms a communication link between Psion Teklogix RF mobile computers or wireless access point clients and a Psion Teklogix Network Controller or a host computer. It communicates over an IEEE 802.11 RF data link with mobile computers, and over a cable with the network controller or a host computer.
Chapter 1: Introduction Features and Benefits 1.5 Features and Benefits 1.5.1 IEEE Standards Support And Wi-Fi Compliance • • • 1.5.2 Wireless Features • • • • • • • • • • • 10 Support for IEEE 802.11a, IEEE 802.11b, IEEE 802.11g, IEEE 802.11i, and IEEE 802.3af wireless networking standards. Provides bandwidth of up to 54 Mbps for IEEE 802.11a or IEEE 802.11g (11 Mbps for IEEE 802.11b, 108 Mbps for Atheros 802.11a Turbo). Wi-Fi compliance required for certification.
Chapter 1: Introduction Security Features • SpectraLink Voice Priority (SVP). SpectraLink Voice Priority (SVP) is a QoS approach for Wi-Fi deployments. SVP is an open specification that is compliant with the IEEE 802.11b standard. SVP minimizes delay and prioritizes voice packets over data packets on the Wireless LAN, thus increasing the probability of better network performance. 1.5.2.1 The Psion Teklogix 802.IQ Protocol 802.
Chapter 1: Introduction Out-of-the-Box Guest Interface - EAP Types: EAP-TLS EAP-TTLS/MSCHAPv2 PEAPv0/EAP-MSCHAPv2 PEAPv1/EAP-GTC EAP-SIM • • • • • • • 1.5.4 Out-of-the-Box Guest Interface • • • 1.5.5 Advanced Encryption Standard (AES). User-based access control with local authentication server. Local user database and user life cycle management. MAC address filtering. WPA/WPA2 over WDS. Secure Sockets Shell (SSH). Secure Sockets Layer (SSL). Unique network name (SSID) for the Guest interface.
Chapter 1: Introduction Networking • Self-managed access points with automatic configuration synchronization. • The access points in a cluster periodically check that the cluster configuration is consistent, and check for the presence and availability of the other members of the cluster. The administrator can monitor this information through the user interface. Enhanced local authentication using 802.1x without additional IT setup.
Chapter 1: Introduction Maintainability 1.5.8 Maintainability • • • • • • 1.6 Status, monitoring, and tracking views of the network including session monitoring, client associations, transmit/receive statistics, and event log. Link integrity monitoring to continually verify connection to the client, regardless of network traffic activity levels. Reset configuration option. Firmware upgrade. Backup and restore of access point configuration.
2 INSTALLATION REQUIREMENTS 2.1 Choosing The Right Location . . . . . . . . . . . . . . . 2.1.1 Environment . . . . . . . . . . . . . . . . . . . 2.1.2 Maintenance . . . . . . . . . . . . . . . . . . . 2.1.3 Radios . . . . . . . . . . . . . . . . . . . . . . 2.1.4 Power And Antenna Cables . . . . . . . . . . . 2.1.4.1 Power . . . . . . . . . . . . . . . . . . 2.1.4.2 Antennas. . . . . . . . . . . . . . . . . 2.2 Connecting To External Devices . . . . . . . . . . . . . . 2.2.1 Ports . . . . . . . . . . . .
16 Psion Teklogix 9160 G2 Wireless Gateway User Manual
Chapter 2: Installation Requirements Choosing The Right Location Warning: The 9160 G2 must be installed by qualified Psion Teklogix personnel. 2.1 Choosing The Right Location Typically, Psion Teklogix conducts a site survey and then recommends the preferred locations for the 9160 G2s. These locations provide good radio coverage, minimize the distance to the host computer or network controller, and meet the environmental requirements. 2.1.
Chapter 2: Installation Requirements Maintenance Figure 2.1 9160 G2 Installation Position Mounting Slot Cable Tie Mount Mounting Hole 2.1.2 Maintenance The 9160 G2 has no internal option switches and does not require physical access; all configuration settings are done remotely (see “Navigating To Basic Settings” on page 47). Environmental and radio communication considerations do still apply. 2.1.3 Radios • • • 2.1.4 802.11g radio without integrated antenna (standard). 802.
Chapter 2: Installation Requirements Power And Antenna Cables To eliminate the need for AC wiring, the 9160 G2 Wireless Gateway is compliant with IEEE 802.3af and can be powered over its Ethernet connection. For detailed information, please see “Power Over Ethernet Requirements” on page 323. Warning: To avoid electric shock, the power cord protective grounding conductor must always be connected to ground. 2.1.4.
Chapter 2: Installation Requirements Connecting To External Devices is permitted to be made to building steel, to a metal electrical raceway system, or to any earthed item that is permanently and reliably connected to the electrical service equipment earthed. 4. Bare, covered, or insulated earthing conductors are acceptable. A covered or insulated earthing conductor shall have a continuous outer finish that is either green (Canada and USA only), or green-and-yellow (all countries). 5.
Chapter 2: Installation Requirements LAN Installation: Overview Figure 2.2 9160 G2 Port And LED Locations Operating Status LED: 1 2 3 4 5 6 AC Power Socket RS-232 Console Port 100Base-FX Fiber Optic Ethernet Port 10BaseT/100BaseT Ethernet Adaptor * Note: Older versions of the 9160 G2 do not have a fiber optic port. 2.2.2 LAN Installation: Overview Because the 9160 G2 provides Ethernet connectivity, it can be added to an existing LAN.
Chapter 2: Installation Requirements Status Indicators (LEDs) 2.2.3.1 Ethernet Cabling The maximum cable segment length allowed between repeaters for the 9160 G2 (10BaseT/100BaseT Ethernet cabling) is 100 m. 2.2.3.2 100Base-FX Fiber Optic Ethernet Port The 9160 G2 Wireless Gateway provides 100Base-FX fiber optic networking support. To use the fiber optic Ethernet port, the user must install a small form pluggable (SFP) 100Base-FX module in the 9160 G2 fiber expansion slot.
Chapter 2: Installation Requirements Connecting A Video Display Terminal Table 2.1 9160 G2 LED Functions: Front Enclosure LED Number Name Function Colour 1 Ethernet link Link indicator for 10BaseT/100BaseT: yellow* ON = good link; OFF = no link 2 Ethernet activity Ethernet LAN activity (Rx/Tx) green 3 1st 802.11 radio status 1st 802.11 radio activity (Rx/Tx) green 4 2nd 802.11 radio status 2nd 802.
3 PRELAUNCH CHECKLIST 3.1 The 9160 G2 Wireless Gateway . . . . . . . . . . . . . . . . . 3.1.1 Default Settings For The 9160 G2 Wireless Gateway . 3.1.2 What The Access Point Does Not Provide. . . . . . . 3.2 Administrator’s Computer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27 27 30 30 3.3 Wireless Client Computers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31 3.
26 Psion Teklogix 9160 G2 Wireless Gateway User Manual
Chapter 3: PreLaunch Checklist The 9160 G2 Wireless Gateway Before you plug in and boot a new Access Point, review the following sections for a quick check of required hardware components, software, client configurations, and compatibility issues. Make sure you have everything you need ready to go for a successful launch and test of your new (or extended) wireless network. 3.1 The 9160 G2 Wireless Gateway The 9160 G2 Wireless Gateway is a wireless communications hub for devices on your network.
Chapter 3: PreLaunch Checklist Default Settings For The 9160 G2 Wireless Gateway Table 3.
Chapter 3: PreLaunch Checklist Default Settings For The 9160 G2 Wireless Gateway Table 3.1 9160 G2 Default Settings Option Default Settings Related Information Radio On “Configuring 802.11 Radio Settings” on page 165 IEEE 802.11 Mode 802.11g or 802.11a+g “Configuring 802.11 Radio Settings” on page 165 802.11g Channel Auto “Configuring 802.11 Radio Settings” on page 165 Beacon Interval 100 “Configuring 802.11 Radio Settings” on page 165 DTIM Period 2 “Configuring 802.
Chapter 3: PreLaunch Checklist What The Access Point Does Not Provide Table 3.1 9160 G2 Default Settings 3.1.2 Option Default Settings Related Information Guest Login and Management Disabled “Setting Up Guest Access” on page 153 Load Balancing Disabled “Load Balancing” on page 179 WDS Settings None “Wireless Distribution System” on page 201 What The Access Point Does Not Provide The 9160 G2 Wireless Gateway is not designed to function as a Gateway to the Internet.
Chapter 3: PreLaunch Checklist Wireless Client Computers Table 3.2 Required AP Administrator Software And Hardware Required Components Description Wireless Connection to the Network After initial configuration and launch of the first access points on your new wireless network, you can make subsequent configuration changes through the Administration Web pages using a wireless connection to the “Internal” network.
Chapter 3: PreLaunch Checklist Understanding Dynamic & Static IP Addressing On The 9160 G2 Wireless Gateway Table 3.3 Required AP Client Software And Hardware Required Components Description Wi-Fi Client Adaptor Portable or built-in Wi-Fi client adaptor that supports one or more of the IEEE 802.11 modes in which you plan to run the access point. (IEEE 802.11a, 802.11b, and 802.11g are supported.) Wi-Fi client adaptors vary considerably.
Chapter 3: PreLaunch Checklist Dynamic IP Addressing Notes: If you configure both an Internal and Guest network and plan to use a dynamic addressing policy for both, separate DHCP servers must be running on each network. A DHCP server is a requirement for the Guest network. 3.4.2 Dynamic IP Addressing The 9160 G2 Wireless Gateway generally expects that a DHCP server is running on the network where the AP is deployed.
Chapter 3: PreLaunch Checklist Recovering An IP Address 3.4.4 Recovering An IP Address If you experience trouble communicating with the access point, you can recover a Static IP Address by resetting the AP configuration to the factory defaults (see “Resetting Factory Default Configuration” on page 316), or you can get a dynamically assigned address by connecting the AP to a network that has DHCP.
QUICK STEPS FOR SETUP AND LAUNCH 4 4.1 Unpack The 9160 G2 Wireless Gateway. . . . . . . . . . . . . . . . . 4.1.1 9160 G2 Wireless Gateway Hardware And Ports . . . . . . . 4.1.2 What’s Inside The 9160 G2 Wireless Gateway? . . . . . . . . 4.2 Connect The Access Point To Network And Power . . . . . . . . . . . 4.2.1 A Note About Setting Up Connections For A Guest Network 4.2.1.1 Hardware Connections For A Guest VLAN . . . . . 4.3 Power On The Access Point . . . . . . . . . . . . . . . . . . . . . . . . . .
36 Psion Teklogix 9160 G2 Wireless Gateway User Manual
Chapter 4: Quick Steps For Setup And Launch Unpack The 9160 G2 Wireless Gateway Setting up and deploying one or more 9160 G2 Wireless Gateways is in effect creating and launching a wireless network. The Basic Settings Administration Web page simplifies this process. Here is a step-by-step guide to setting up your 9160 G2 Wireless Gateways and the resulting wireless network. Familiarize yourself with the Chapter 3: “PreLaunch Checklist” if you haven’t already. The topics covered here are: • • • • • • 4.
Chapter 4: Quick Steps For Setup And Launch Connect The Access Point To Network And Power 4.2 Connect The Access Point To Network And Power The next step is to set up the network and power connections. 1. Do one of the following to create an Ethernet connection between the access point and the computer: Connect one end of an Ethernet cable to the network port on the access point and the other end to the same hub where your PC is connected. (See Figure 4.2 on page 39.
Chapter 4: Quick Steps For Setup And Launch Connect The Access Point To Network And Power Figure 4.1 Ethernet Connections Using DHCP ETHERNET CONNECTIONS WHEN USING DHCP FOR INITIAL CONFIGURATION HUB B HU LAN to AP Admin PC to Hub N LA to Administrator Computer b Hu Access Point Figure 4.
Chapter 4: Quick Steps For Setup And Launch A Note About Setting Up Connections For A Guest Network 4.2.1 A Note About Setting Up Connections For A Guest Network The 9160 G2 Wireless Gateway offers an out-of-the-box Guest Interface that allows you to configure an access point for controlled guest access to the network. The same access point can function as a bridge for two different wireless networks: a secure “Internal” LAN and a public “Guest” network.
Chapter 4: Quick Steps For Setup And Launch Viewing Basic Settings For Access Points Table 4.1 Username And Password Field Default Setting User name admin Password admin (The user name is read-only. It cannot be modified.) Enter the user name and password and click OK. 4.4.1 Viewing Basic Settings For Access Points When you first log in, the Basic Settings page for 9160 G2 Wireless Gateway administration is displayed.
Chapter 4: Quick Steps For Setup And Launch Configure ‘Basic Settings’ And Start The Wireless Network 4.5 Configure ‘Basic Settings’ And Start The Wireless Network Provide a minimal set of configuration information by defining the basic settings for your wireless network. These settings are all available on the Basic Settings page of the Administration Web interface, and are categorized into steps 1-3 on the Web page.
Chapter 4: Quick Steps For Setup And Launch Test LAN Connectivity With Wireless Clients 2. Connect a regular Ethernet cable from the access point to the LAN. 3. Connect your computer to the LAN either via Ethernet cable or wireless client card. 4.6.2 Test LAN Connectivity With Wireless Clients Test the 9160 G2 Wireless Gateway by trying to detect it and associate with it from some wireless client devices.
CONFIGURING BASIC SETTINGS 5 5.1 Navigating To Basic Settings. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 47 5.2 Review / Describe The Access Point. . . . . . . . . . . . . . . . . . . . . . . . . . 48 5.3 Provide Network Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 49 5.4 Update Basic Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 50 5.5 Basic Settings For A Standalone Access Point. . . . . . . . . . . . . . . . . . . . . 50 5.
46 Psion Teklogix 9160 G2 Wireless Gateway User Manual
Chapter 5: Configuring Basic Settings Navigating To Basic Settings 5.1 Navigating To Basic Settings To configure initial settings, click Basic Settings. If you type the IP address of the access point into your browser, the Basic Settings page is the default page that is displayed. Figure 5.1 Basic Settings Fill in the fields on the Basic Settings page as described in “Review / Describe The Access Point” on page 48.
Chapter 5: Configuring Basic Settings Review / Describe The Access Point 5.2 Review / Describe The Access Point Table 5.1 Basic Settings Screen Options Field Description IP Address Shows IP address assigned to this access point. This field is not editable because the IP address is already assigned (either via DHCP, or statically through the Ethernet (wired) settings as described in “Guest Interface Settings” on page 143). MAC Address Shows the MAC address of the access point.
Chapter 5: Configuring Basic Settings Provide Network Settings 5.3 Provide Network Settings Table 5.2 Administrator Password And Wireless Network Field Description Current Password Enter the current administrator password. You must correctly enter the current password before you are able to change it. New Password Enter a new administrator password. The characters you enter will be displayed as “ * ”characters to prevent others from seeing your password as you type.
Chapter 5: Configuring Basic Settings Update Basic Settings 5.4 Update Basic Settings When you have reviewed the new configuration, click Update to apply the settings and deploy the access points as a wireless network. 5.5 Basic Settings For A Standalone Access Point The Basic Settings tab for a standalone access point indicates only that the current mode is standalone. If you want to add the current access point to an existing cluster, navigate to the Cluster > Access Point tab.
Chapter 5: Configuring Basic Settings Viewing the User Interface with Different Colours and Style Table 5.3 Indicator Icons Icon Description The number of access points available for service on this network is indicated by the “Access Points” icon. For information about managing access points, see Chapter 6: “Managing Access Points & Clusters”. The number of client user accounts created and enabled on this network is indicated by the “User Accounts” icon.
6 MANAGING ACCESS POINTS & CLUSTERS 6.1 Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 55 6.2 Navigating To Access Points Management . . . . . . . . . . . . . . . . . . . . . . 55 6.3 Understanding Clustering . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 55 6.3.1 What Is A Cluster? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 56 6.3.2 How Many APs Can A Cluster Support? . . . . . . . . . . . . . . . . . . 56 6.3.
54 Psion Teklogix 9160 G2 Wireless Gateway User Manual
Chapter 6: Managing Access Points & Clusters Overview 6.1 Overview The 9160 G2 Wireless Gateway shows current basic configuration settings for clustered access points (location, IP address, MAC address, status, and availability) and provides a way of navigating to the full configuration for specific APs if they are cluster members. Standalone access points or those which are not members of this cluster do not show up in this listing.
Chapter 6: Managing Access Points & Clusters What Is A Cluster? a single point of administration and lets you view the deployment of access points as a single wireless network rather than a series of separate wireless devices. 6.3.1 What Is A Cluster? A cluster is a group of access points which are coordinated as a single group via 9160 G2 Wireless Gateway administration. You can have multiple clusters on the same subnet if they have different cluster “names”. 6.3.
Chapter 6: Managing Access Points & Clusters Which Settings Are/Are Not Shared As Part Of The Cluster Configuration? account seniority, cluster size, and other factors to determine which AP is best suited to the task at any given time. There is no need to track or attend to which AP is the coordinator because this status is subject to change at any time depending on the needs of the cluster.
Chapter 6: Managing Access Points & Clusters Cluster Formation • Load Balancing settings. • WDS bridges. • Ethernet (Wired) Settings. • Guest interface configuration. Settings that are not shared must be configured individually on the Administration pages for each access point. To get to the Administration pages for an access point that is a member of the current cluster, click on its IP Address link on the Cluster > Access Points page of the current AP. 6.3.
Chapter 6: Managing Access Points & Clusters Understanding Access Point Settings disable (deactivate) clustered access points, and remove access points from the cluster. You can also modify the location description for an access point. The IP address links provide a way to navigate to configuration settings and data on an access point. Standalone access points (those which are not members of the cluster) are not shown on this page. Table 6.
Chapter 6: Managing Access Points & Clusters Modifying The Location Description 6.4.1 Modifying The Location Description To make modifications to the location description: 1. Navigate to the Cluster > Access Points tab. 2. Under the Clustering Options section, type the new location of the AP in the Location field. 3. Click the Update button to apply the changes. 6.4.2 Setting The Cluster Name To set the name of the cluster you want your AP to join, do the following: 1.
Chapter 6: Managing Access Points & Clusters Stopping Clustering 6.6 Stopping Clustering To stop clustering and remove a particular access point from a cluster, do the following. 1. Go to the Administration Web pages for the access point you want to remove from the cluster. 2. Click the Cluster > Access Points tab. 3. Click the Stop Clustering button to remove the access point from the Cluster.
Chapter 6: Managing Access Points & Clusters Session Monitoring where IPAddressOfAccessPoint is the address of the particular access point you want to monitor or configure. For standalone access points, this is the only way to navigate to their configuration information. 6.
Chapter 6: Managing Access Points & Clusters Understanding Session Monitoring Information Note: A session is not the same as an association, which describes a client connection to a particular access point. A client network connection can shift from one clustered AP to another within the context of the same session. A client station can roam between APs and maintain the session. For information about monitoring associations and link integrity monitoring, see “Associated Wireless Clients” on page 128.
Chapter 6: Managing Access Points & Clusters Viewing Session Information for Access Points Table 6.2 Session Information 6.8.3 Field Description Receive Total Indicates number of total packets received by the client during the current session. Transmit Total Indicates number of total packets transmitted to the client during this session. Error Rate Indicates the percentage of time frames dropped during transmission on this access point.
7 MANAGING USER ACCOUNTS 7.1 Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 67 7.2 Navigating To User Management . . . . . . . . . . . . . 7.2.1 Viewing User Accounts . . . . . . . . . . . . . 7.2.2 Adding A User . . . . . . . . . . . . . . . . . . 7.2.3 Editing A User Account . . . . . . . . . . . . . 7.2.4 Enabling And Disabling User Accounts . . . . . 7.2.5 Enabling A User Account . . . . . . . . . . . . 7.2.6 Disabling A User Account . . . . . . . . . . . . 7.
66 Psion Teklogix 9160 G2 Wireless Gateway User Manual
Chapter 7: Managing User Accounts Overview 7.1 Overview The 9160 G2 Wireless Gateway includes user management capabilities for controlling client access to access points. User management and authentication must always be used in conjunction with the following two security modes, which require use of a RADIUS server for user authentication and management. • IEEE 802.1x mode (see “IEEE 802.1x” on page 108 in Chapter 10: “Configuring Security”).
Chapter 7: Managing User Accounts Viewing User Accounts Figure 7.1 Managing User Accounts 7.2.1 Viewing User Accounts User accounts are shown at the top of the screen under User Accounts... The Username, Real name, and Status (enabled or disabled) of the user are shown. You make modifications to an existing user account by first selecting the checkbox next to a user name and then choosing an action. (See “Editing A User Account” on page 69.) 7.2.
Chapter 7: Managing User Accounts Editing A User Account Table 7.1 New User Fields Field Description Username Provide a username. Usernames are alphanumeric strings of up to 237 characters. Do not use special characters or spaces. Real name For information purposes, provide the user’s full name. There is a 256 character limit on real names. Password Specify a password for this user. Passwords are alphanumeric strings of up to 256 characters. Do not use special characters or spaces. 2.
Chapter 7: Managing User Accounts Enabling And Disabling User Accounts Then, choose an action such Edit, Enable, Disable, or Remove. 7.2.4 Enabling And Disabling User Accounts A user account must be enabled for the user to log on as a client and use the access point. You can Enable or Disable any user account. With this feature, you can maintain a set of user accounts and authorize or prevent users from accessing the network without having to remove or re-create accounts.
Chapter 7: Managing User Accounts Restoring A User Database From A Backup File 1. Click the [backup or restore the user database] link. A File Download or Open dialog is displayed. 2. Choose the Save option on this first dialog. This brings up a file browser. Use the file browser to navigate to the directory where you want to save the file, and click OK to save the file. You can keep the default file name (wirelessUsers.ubk) or rename the backup file, but be sure to save the file with a .ubk extension. 7.
CHANNEL MANAGEMENT 8 8.1 Navigating To Channel Management . . . . . . . . . . . . . . . . . . . . . . . . . 75 8.2 Understanding Channel Management . . . . . . . . . . . . . . . . . . . . . . . . . 8.2.1 How It Works In A Nutshell . . . . . . . . . . . . . . . . . . . . . . . . . 8.2.2 For The Curious: More About Overlapping Channels . . . . . . . . . . . . 8.2.3 Example: A Network Before And After Channel Management . . . . . . . 8.3 Configuring And Viewing Channel Management Settings . . . . . . . . . .
74 Psion Teklogix 9160 G2 Wireless Gateway User Manual
Chapter 8: Channel Management Navigating To Channel Management 8.1 Navigating To Channel Management To view session monitoring information, click the Cluster > Channel Management tab. Figure 8.1 Managing Channel Assignments 8.2 Understanding Channel Management When Channel Management is enabled, the 9160 G2 Wireless Gateway automatically assigns radio channels used by clustered access points to reduce mutual interference (or interference with other access points outside of its cluster).
Chapter 8: Channel Management For The Curious: More About Overlapping Channels 8.2.2 For The Curious: More About Overlapping Channels The radio frequency (RF) broadcast Channel defines the portion of the radio spectrum that the radio on the access point uses for transmitting and receiving. The range of available channels for an access point is determined by the IEEE 802.11 mode (also referred to as band) of the access point. IEEE 802.11b/802.11g modes (802.
Chapter 8: Channel Management Configuring And Viewing Channel Management Settings With automated channel management, APs in the cluster are automatically re-assigned to non-interfering channels as shown in 8.3. Figure 8.3 With Channel Management Enabled Channel 1 (802.11b) Channel 6 (802.11b) Channel 1 (802.11b) Channel 6 (802.11b) Channel 11 (802.11b) AP1 AP4 AP2 AP3 Client Station 8.
Chapter 8: Channel Management Stopping/Starting Automatic Channel Assignment • • • 8.3.1 “Viewing Last Proposed Set Of Changes” on page 79. “Configuring Advanced Settings (Customizing/Scheduling Channel Plans)” on page 79. “Update Advanced Settings” on page 81. Stopping/Starting Automatic Channel Assignment By default, automatic channel assignment is disabled (off). • Click Start to resume automatic channel assignment.
Chapter 8: Channel Management Viewing Last Proposed Set Of Changes Table 8.1 Current Channel Settings Field Description Locked Click Locked if you want to this access point to remain on the current channel. When the “Locked” checkbox is checked (enabled) for an access point, automated channel management plans will not re-assign the AP to a different channel as a part of the optimization strategy. Instead, APs with locked channels will be factored in as requirements for the plan.
Chapter 8: Channel Management Configuring Advanced Settings (Customizing/Scheduling Channel Plans) These defaults are designed to satisfy most scenarios where you would need to implement channel management. You can use Advanced Settings to modify the interference reduction potential that triggers channel re-assignment, change the schedule for automatic updates, and re-configure the channel set used for assignments. Table 8.
Chapter 8: Channel Management Configuring Advanced Settings (Customizing/Scheduling Channel Plans) Table 8.3 Advanced Settings Field Description Apply channel modifications even when the network is busy Click to enable or disable this setting. A checkmark indicates it is enabled and channel modifications will be applied even when the network is busy. If this is not checked, channel modifications will not be applied on a busy network.
WIRELESS NEIGHBORHOOD 9 9.1 Navigating To Wireless Neighborhood . . . . . . . . . . . . . . . . . . . . . . . . 85 9.2 Understanding Wireless Neighborhood Information. . . . . . . . . . . . . . . . . . 85 9.3 Viewing Wireless Neighborhood. . . . . . . . . . . . . . . . . . . . . . . . . . . . 86 9.4 Viewing Details For A Cluster Member . . . . . . . . . . . . . . . . . . . . . . . .
84 Psion Teklogix 9160 G2 Wireless Gateway User Manual
Chapter 9: Wireless Neighborhood Navigating To Wireless Neighborhood The Wireless Neighborhood screen shows those access points within range of any access point in the cluster. This page provides a detailed view of neighboring access points, including identifying information (SSIDs and MAC addresses) for each, cluster status (which are members and non-members), and statistical information such as the channel each AP is broadcasting on, signal strength, and so forth. 9.
Chapter 9: Wireless Neighborhood Viewing Wireless Neighborhood (signal strength, channel, beacon interval). You can click on an AP to get additional statistics about the APs in radio range of the currently selected AP. The Wireless Neighborhood view can help you: • • • 9.3 Detect and locate unexpected (or rogue) access points in a wireless domain so that you can take action to limit associated risks. Verify coverage expectations.
Chapter 9: Wireless Neighborhood Viewing Wireless Neighborhood Table 9.1 Wireless Neighborhood Statistics Field Description Neighbors Access points which are neighbors of one or more of the clustered APs are listed in the left column by SSID (Network Name). An access point which is detected as a neighbor of a cluster member can also be a cluster member itself. Neighbors who are also cluster members are always shown at the top of the list with a heavy bar above and include a location indicator.
Chapter 9: Wireless Neighborhood Viewing Details For A Cluster Member 9.4 Viewing Details For A Cluster Member To view details on a cluster member AP, click on the IP address of a cluster member at the top of the page. Figure 9.2 Details For A Cluster Member AP The following table explains the details shown about the selected AP.
Chapter 9: Wireless Neighborhood Viewing Details For A Cluster Member Table 9.2 Access Point Statistics Field Description SSID The Service Set Identifier (SSID) for the access point. The SSID is an alphanumeric string of up to 32 characters that uniquely identifies a wireless local area network. It is also referred to as the Network Name. The SSID is set in Basic Settings (Chapter 5: “Configuring Basic Settings”) or in Manage > 802.11 Settings (Chapter 13: “Setting The Wireless Interface”.
CONFIGURING SECURITY 10 10.1 Understanding Security Issues On Wireless Networks . . . . . . . . . . . . . . . . 93 10.1.1 How Do I Know Which Security Mode To Use?. . . . . . . . . . . . . . 93 10.1.2 Comparison Of Security Modes For Key Management, Authentication And Encryption Algorithms . . . . . . . . . . . . . . . . . . . . . . . . . . . 94 10.1.2.1 When To Use Unencrypted (No Security). . . . . . . . . . . . . 94 10.1.2.2 When To Use Static WEP . . . . . . . . . . . . . . . . . . . . . 95 10.1.2.
92 Psion Teklogix 9160 G2 Wireless Gateway User Manual
Chapter 10: Configuring Security Understanding Security Issues On Wireless Networks The following sections describe how to configure Security settings on the 9160 G2 Wireless Gateway. 10.1 Understanding Security Issues On Wireless Networks Wireless mediums are inherently less secure than wired mediums. For example, an Ethernet NIC transmits its packets over a physical medium such as coaxial cable or twisted pair.
Chapter 10: Configuring Security Comparison Of Security Modes For Key Management, Authentication And Encryption Algorithms convenience trade-off for other scenarios where the priority is making it as easy as possible for clients to connect. (See “Does Prohibiting The Broadcast SSID Enhance Security?” on page 99) Following is a brief discussion of what factors make one mode more secure than another, a description of each mode offered, and when to use each mode. 10.1.
Chapter 10: Configuring Security Comparison Of Security Modes For Key Management, Authentication And Encryption Algorithms See Also For information on how to configure unencrypted security mode, see “None (Plain-text)” on page 102. 10.1.2.2 When To Use Static WEP Static Wired Equivalent Privacy (WEP) is a data encryption protocol for 802.11 wireless networks.
Chapter 10: Configuring Security Comparison Of Security Modes For Key Management, Authentication And Encryption Algorithms Table 10.2 IEEE 801.1x Security Mode Key Management Encryption Algorithm User Authentication IEEE 802.1x provides dynamically-generated keys that are periodically refreshed. An RC4 stream cipher is used to encrypt the frame body and cyclic redundancy checking (CRC) of each 802.11 frame. IEEE 802.
Chapter 10: Configuring Security Comparison Of Security Modes For Key Management, Authentication And Encryption Algorithms This security mode is backwards-compatible for wireless clients that support only the original WPA. Table 10.3 WPA Personal Security Mode Key Management Encryption Algorithms User Authentication WPA Personal provides dynamically-generated keys that are periodically refreshed. • Temporal Key Integrity Protocol (TKIP).
Chapter 10: Configuring Security Comparison Of Security Modes For Key Management, Authentication And Encryption Algorithms Table 10.4 WPA Enterprise Security Mode Key Management Encryption Algorithms User Authentication WPA Enterprise mode provides dynamically-generated keys that are periodically refreshed. • Temporal Key Integrity Protocol (TKIP). Remote Authentication Dial-In User Service (RADIUS) • Counter mode/CBC-MAC Protocol (CCMP) Advanced Encryption Standard (AES).
Chapter 10: Configuring Security Does Prohibiting The Broadcast SSID Enhance Security? Client stations that support CCMP can use it for their Unicast frames. If you encounter AP-to-station interoperability problems with the “Both” encryption algorithm setting, then you will need to select TKIP instead. (See next option.) 3. The third best choice is WPA Enterprise with the encryption algorithm set to TKIP. Some clients have interoperability issues with CCMP and TKIP enabled at same time.
Chapter 10: Configuring Security Configuring Security Settings 10.2 Configuring Security Settings To set the security mode, navigate to the Security tab, and update the fields as described below. Figure 10.1 Security Settings Page The following configuration information explains how to configure security modes on the access point.
Chapter 10: Configuring Security Broadcast SSID, Station Isolation, And Security Mode Table 10.5 Security Settings Field Description Broadcast SSID To enable the Broadcast SSID, select the checkbox directly beside it. By default, the access point broadcasts (allows) the Service Set Identifier (SSID) in its beacon frames. You can suppress (prohibit) this broadcast to discourage stations from automatically discovering your access point.
Chapter 10: Configuring Security Security Modes 10.2.2 Security Modes 10.2.2.1 None (Plain-text) None (or plain-text security) means any data transferred to and from the 9160 G2 Wireless Gateway is not encrypted. If you select None (Plain-text) as your Security Mode, no further options are configurable on the AP. This security mode can be useful during initial network configuration or for problem solving, but it is not recommended for regular use on the Internal network because it is not secure.
Chapter 10: Configuring Security Security Modes 10.2.2.2 Static WEP Wired Equivalent Privacy (WEP) is a data encryption protocol for 802.11 wireless networks. All wireless stations and access points on the network are configured with a static 64-bit (40-bit secret key + 24-bit initialization vector (IV)) or 128-bit (104-bit secret key + 24-bit IV) Shared Key for data encryption. You cannot mix 64-bit and 128-bit WEP keys between the access point and its client stations.
Chapter 10: Configuring Security Security Modes Table 10.6 Static WEP Security Settings Field Description Transfer Key Index Select a key index from the drop-down menu. Key indexes 1 through 4 are available. The default is 1. The Transfer Key Index indicates which WEP key the access point will use to encrypt the data it transmits.
Chapter 10: Configuring Security Security Modes Table 10.6 Static WEP Security Settings Field Description Authentication Algorithm The authentication algorithm defines the method used to determine whether a client station is allowed to associate with an access point when static WEP is the security mode. Specify the authentication algorithm you want to use by choosing one of the following from the drop-down menu: • Open System. • Shared Key. • Both.
Chapter 10: Configuring Security Security Modes • On some wireless client software (like Funk Odyssey), you can configure multiple WEP keys and define a client station “transfer key index”, and then set the stations to encrypt the data they transmit using different keys. This ensures that neighboring APs cannot decode each other’s transmissions. Example Of Using Static WEP For a simple example, suppose you configure three WEP keys on the access point.
Chapter 10: Configuring Security Security Modes Figure 10.3 Providing A Wireless Client With A WEP Key If you have a second client station, that station also needs to have one of the WEP keys defined on the AP. You could give it the same WEP key you gave to the first station. Or for a more secure solution, you could give the second station a different WEP key (key 2, for example) so that the two stations cannot decrypt each other’s transmissions.
Chapter 10: Configuring Security Security Modes Figure 10.4 Example Of Using Multiple WEP Keys And Transfer Key Index On Client Stations key 1 WEP key 3 WEP can decrypt WEP key 3 transmits in WEP key 1 Client Station 1 can decrypt WEP key 3 transmits in WEP key 2 WEP key 3 WEP key 2 Client Station 2 Access Point transmits to both stations with same WEP key (e.g., WEP key 3) 10.2.2.3 IEEE 802.1x IEEE 802.1x is the standard defining port-based authentication and infrastructure for doing key management.
Chapter 10: Configuring Security Security Modes Psion Teklogix 9160 G2 Wireless Gateway User Manual 109
Chapter 10: Configuring Security Security Modes Table 10.7 IEEE 802.1x Security Settings Field Description Use internal radius server Select one of the following from the drop-down menu: • To use the authentication server provided with the 9160 G2 Wireless Gateway, ensure the checkbox beside the Use internal radius server field is selected. If this option is selected, you do not have to provide the Radius IP and Radius Key; they are automatically provided.
Chapter 10: Configuring Security Security Modes 10.2.2.4 WPA Personal Wi-Fi Protected Access Personal is a Wi-Fi Alliance IEEE 802.11i standard, which includes Counter mode/CBC-MAC Protocol-Advanced Encryption Algorithm (CCMP-AES), and Temporal Key Integrity Protocol (TKIP) mechanisms. The Personal version of WPA employs a pre-shared key (instead of using IEEE 802.1x and EAP as is used in the Enterprise WPA security mode). The PSK is used for an initial check of credentials only.
Chapter 10: Configuring Security Security Modes Table 10.8 WPA Personal Security Settings Field Description WPA Versions Select the types of client stations you want to support: • WPA • WPA2 • Both WPA. If all client stations on the network support the original WPA but none support the newer WPA2, then select WPA. WPA2. If all client stations on the network support WPA2, we suggest using WPA2 which provides the best security per the IEEE 802.11i standard. Both.
Chapter 10: Configuring Security Security Modes Table 10.8 WPA Personal Security Settings Field Description Cipher Suites Select the cipher suite you want to use: • TKIP • CCMP (AES) • Both Temporal Key Integrity Protocol (TKIP) is the default. TKIP provides a more secure encryption solution than WEP keys. The TKIP process more frequently changes the encryption key used and better ensures that the same key will not be re-used to encrypt data (a weakness of WEP).
Chapter 10: Configuring Security Security Modes This security mode is backwards-compatible with wireless clients that support the original WPA. When configuring WPA Enterprise mode, you have a choice of whether to use the built-in RADIUS server or an external RADIUS server that you provide. The 9160 G2 Wireless Gateway built-in RADIUS server supports Protected EAP (PEAP) and MSCHAP V2. If you selected “WPA Enterprise” Security Mode, complete the settings as described in Table 10.9 on page 115.
Chapter 10: Configuring Security Security Modes Table 10.9 WPA Enterprise Security Settings Field Description WPA Versions Select the types of client stations you want to support: • WPA • WPA2 • Both WPA. If all client stations on the network support the original WPA but none support the newer WPA2, then select WPA. WPA2. If all client stations on the network support WPA2, we suggest using WPA2 which provides the best security per the IEEE 802.11i standard. Both.
Chapter 10: Configuring Security Security Modes Table 10.9 WPA Enterprise Security Settings Field Description Cipher Suites Select the cipher you want to use: • TKIP • CCMP (AES) • Both Temporal Key Integrity Protocol (TKIP) is the default. TKIP provides a more secure encryption solution than WEP keys. The TKIP process more frequently changes the encryption key used and better ensures that the same key will not be re-used to encrypt data (a weakness of WEP).
Chapter 10: Configuring Security Security Modes Table 10.9 WPA Enterprise Security Settings Field Description Use internal radius server You can choose whether to use the built-in authentication server provided with the 9160 G2 Wireless Gateway, or you can use an external radius server. • To use the authentication server provided with the 9160 G2 Wireless Gateway, ensure the checkbox beside the Use internal radius server field is selected.
Chapter 10: Configuring Security Updating Settings 10.3 Updating Settings To update Security settings: 1. Navigate to the Security tab page. 2. Configure the security settings as required. 3. Click the Update button to apply the changes.
MAINTENANCE AND MONITORING 11 11.1 Interfaces . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11.1.1 Ethernet (Wired) Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . 11.1.2 Wireless Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11.2 Event Logs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11.2.1 Enabling Or Disabling Persistence. . . . . . . . . . . . . . . . . . . . . . . 11.2.2 Severity. . . . . . . . . . .
120 Psion Teklogix 9160 G2 Wireless Gateway User Manual
Chapter 11: Maintenance And Monitoring Interfaces Important: The maintenance and monitoring tasks described here all pertain to viewing and modifying settings on specific access points; not on a cluster configuration that is automatically shared by multiple access points. Therefore, it is important to ensure that you are accessing the Administration Web pages for the particular access point you want to configure.
Chapter 11: Maintenance And Monitoring Ethernet (Wired) Settings 11.1.1 Ethernet (Wired) Settings The Internal interface includes the Ethernet MAC Address, IP Address, Subnet Mask, and Associated Network Wireless Name (SSID). The Guest interface includes the MAC Address, VLAN ID, and Associated Network Wireless Name (SSID). If you want to change any of these settings, click the Edit link. 11.1.2 Wireless Settings The Radio interface includes the radio Mode, and Channel.
Chapter 11: Maintenance And Monitoring Enabling Or Disabling Persistence Kernel Messages” on page 124). The Events tabbed page also lists the most recent events generated by this access point (see “Events Log” on page 127). Note: The 9160 G2 Wireless Gateway acquires its date and time information using the network time protocol (NTP). This data is reported in UTC format (also known as Greenwich Mean Time). You need to convert the reported time to your local time.
Chapter 11: Maintenance And Monitoring Depth If you set the Severity level to 7, all messages with a severity level between 7 and 0 will appear in the Event log. Alternatively, if you want to filter messages, you can set the Severity level to 4. In this instance, all messages with a severity level between 4 and 0 will appear in the Event log. Therefore, less severe messages and notices will be ignored. Table 11.
Chapter 11: Maintenance And Monitoring Log Relay Host For Kernel Messages You cannot view Kernel Log messages directly from the Administration Web UI for an access point. You must first set up a remote server running a syslog process and acting as a syslog “log relay host” on your network. Then, you can configure the 9160 G2 Wireless Gateway to send its syslog messages to the remote server. Using a remote server to collect access point syslog messages affords you several benefits.
Chapter 11: Maintenance And Monitoring Log Relay Host For Kernel Messages Note: The syslog process will default to use port 514. We recommend keeping this default port. However; If you choose to reconfigure the log port, make sure that the port number you assign to syslog is not being used by another process. 11.2.4.
Chapter 11: Maintenance And Monitoring Events Log 11.2.5 Events Log The Events Log shows system events on the access point such as stations associating, being authenticated, and other occurrences. The real-time Events Log is always shown on the Status, Events Administration Web UI page for the access point you are monitoring. 11.
Chapter 11: Maintenance And Monitoring Associated Wireless Clients Table 11.4 Transmit/Receive Statistics Field Description IP Address IP Address for the access point. MAC Address Media Access Control (MAC) address for the specified interface. A MAC address is a permanent, unique hardware address for any device that represents an interface to the network. The MAC address is assigned by the manufacturer. The 9160 G2 Wireless Gateway has a unique MAC address for each interface.
Chapter 11: Maintenance And Monitoring Link Integrity Monitoring Figure 11.4 Associated Client Stations 11.4.1 Link Integrity Monitoring The 9160 G2 Wireless Gateway provides link integrity monitoring to continually verify its connection to each associated client (even when there is no data exchange occurring). To do this, the AP sends data packets to clients every few seconds when no other traffic is passing.
Chapter 11: Maintenance And Monitoring Neighboring Access Points Figure 11.5 Status Of Neighboring Access Points Information provided on neighboring access points is described in Table 11.5. Table 11.5 Neighboring Access Point Statistics Field Description MAC Shows the MAC address of the neighboring access point. A MAC address is a hardware address that uniquely identifies each node of a network.
Chapter 11: Maintenance And Monitoring Neighboring Access Points Table 11.5 Neighboring Access Point Statistics Field Description Type Indicates the type of device: • AP indicates the neighboring device is an access point that supports the IEEE 802.11 Wireless Networking Framework in Infrastructure Mode. • Ad hoc indicates a neighboring station running in Ad hoc Mode. Stations set to ad hoc mode communicate with each other directly, without the use of a traditional access point.
Chapter 11: Maintenance And Monitoring Neighboring Access Points Table 11.5 Neighboring Access Point Statistics Field Description PHY This indicates the IEEE 802.11 mode being used on this access point. (For example, IEEE 802.11a, IEEE 802.11b, IEEE 802.11g.) The number shown indicates the mode according to the following map: • 4 indicates IEEE 802.11b mode • 7 indicates IEEE 802.11g mode • 8 indicates IEEE 802.
Chapter 11: Maintenance And Monitoring Neighboring Access Points Table 11.5 Neighboring Access Point Statistics Field Description ERP The Extended Rate Protocol (ERP) refers to the protocol used by IEEE 802.11g stations. This field indicates how an IEEE 802.11g client station using this access point should send data when there are IEEE 802.11b (non-ERP) stations or access points present on the same channel as the IEEE 802.11g (ERP) station. If an IEEE 802.
THE ETHERNET (WIRED) INTERFACE 12 12.1 Navigating To Ethernet (Wired) Settings . . . . . . . . . . . . . . . . . 12.1.1 DNS Hostname . . . . . . . . . . . . . . . . . . . . . . . . . 12.1.2 Guest Access . . . . . . . . . . . . . . . . . . . . . . . . . . 12.1.2.1 Configuring An Internal LAN And A Guest Network 12.1.2.2 Enabling Or Disabling Guest Access . . . . . . . . . 12.1.2.3 Specifying A Virtual Guest Network . . . . . . . . . 12.1.3 Virtual Wireless Networks . . . . . . . . . . . . . . . . . . . 12.
136 Psion Teklogix 9160 G2 Wireless Gateway User Manual
Chapter 12: The Ethernet (Wired) Interface Navigating To Ethernet (Wired) Settings Ethernet (Wired) Settings describe the configuration of your Ethernet local area network (LAN). Note: The Ethernet Settings are not shared across the cluster. These settings must be configured individually on the Administration pages for each access point.
Chapter 12: The Ethernet (Wired) Interface DNS Hostname 12.1.1 DNS Hostname Table 12.1 Setting DNS Name Field Description DNS Hostname Enter the DNS name for the access point in the textbox. This is the host name. It may be provided by your ISP or network administrator, or you can provide your own. The rules for system names are: • This name can be up to 20 characters long. • Only letters, numbers and dashes are allowed. • The name must start with a letter and end with either a letter or a number. 12.
Chapter 12: The Ethernet (Wired) Interface Guest Access 12.1.2.2 Enabling Or Disabling Guest Access The 9160 G2 Wireless Gateway ships with the Guest Access feature disabled by default. If you want to provide guest access on your AP, enable Guest access on the Ethernet (Wired) Settings tab. Table 12.2 Enabling/Disabling Guest Access Field Description Guest Access By default, the 9160 G2 Wireless Gateway ships with Guest Access disabled. • To enable Guest Access, click Enabled.
Chapter 12: The Ethernet (Wired) Interface Virtual Wireless Networks Table 12.3 Specifying A Virtual Guest Network Field Description For Guest Access Specify a virtually separate guest network on this access point: • Since the access point is using only one physical connection to your internal LAN, choose VLAN on Ethernet Port 1 from the drop-down menu. This will enable the “VLAN” settings where you must provide a VLAN ID. See “Guest Interface Settings” on page 143.
Chapter 12: The Ethernet (Wired) Interface Internal Interface Settings Table 12.5 Ethernet Settings For Internal LAN Field Description MAC Address Shows the MAC address for the Internal interface for the Ethernet port on this access point. This is a readonly field that you cannot change. VLAN ID If you choose to configure Internal and Guest networks by “VLANs”, this field will be enabled. Provide a number between 1 and 4094 for the Internal VLAN.
Chapter 12: The Ethernet (Wired) Interface Internal Interface Settings Table 12.5 Ethernet Settings For Internal LAN Field Description Connection Type You can select DHCP or Static IP. The Dynamic Host Configuration Protocol (DHCP) is a protocol specifying how a centralized server can provide network configuration information to devices on the network. A DHCP server “offers” a “lease” to the client system.
Chapter 12: The Ethernet (Wired) Interface Guest Interface Settings Table 12.5 Ethernet Settings For Internal LAN Field Description DNS Nameservers The Domain Name Service (DNS) is a system that resolves the descriptive name (domainname) of a network resource (for example, www.psionteklogix.com) to its numeric IP address (for example, 66.93.138.219). A DNS server is called a Nameserver. There are usually two Nameservers; a Primary Nameserver and a Secondary Nameserver.
SETTING THE WIRELESS INTERFACE 13 13.1 Navigating To Wireless Settings . . . . . . . . . . . . . . . . . . . . . . . . . . .147 13.2 Configuring 802.11d Regulatory Domain Support . . . . . . . . . . . . . . . . . .148 13.3 802.11h Regulatory Domain Control . . . . . . . . . . . . . . . . . . . . . . . . .148 13.4 Configuring The Radio Interface . . . . . . . . . . . . . . . . . . . . . . . . . . .149 13.5 Configuring “Internal” Wireless LAN Settings. . . . . . . . . . . . . . . . . . . .150 13.
146 Psion Teklogix 9160 G2 Wireless Gateway User Manual
Chapter 13: Setting The Wireless Interface Navigating To Wireless Settings Wireless Settings describes aspects of the local area network (LAN) related specifically to the radio device in the access point (802.11 Mode and Channel) and to the network interface to the access point (MAC address for access point and Wireless Network name, also known as SSID). The following sections describe how to configure the “Wireless” address and related settings, including 802.IQv1, on the 9160 G2 Wireless Gateway. 13.
Chapter 13: Setting The Wireless Interface Configuring 802.11d Regulatory Domain Support 13.2 Configuring 802.11d Regulatory Domain Support You can enable or disable IEEE 802.11d Regulatory Domain Support to broadcast the access point country code information as described below. Table 13.1 Enabling 802.11d Support Field Description 802.11d Regulatory Domain Support Enabling support for IEEE 802.
Chapter 13: Setting The Wireless Interface Configuring The Radio Interface There are a number of key points for the AP Developer that should be remembered in relation to the IEEE 802.11h standard: • • • • 13.4 802.11h only works for the 802.11a band. It is not required for 802.11b, nor 802.11g. If you are operating in an 802.11h enabled domain, then the channel selection of the BSS will always be “Auto”.
Chapter 13: Setting The Wireless Interface Configuring “Internal” Wireless LAN Settings Table 13.3 Radio Interface Settings Field Description Mode The Mode defines the Physical Layer (PHY) standard being used by the radio. The 9160 G2 Wireless Gateway is available as a single or dual-band access point with one or two radios. The configuration options for Mode differ depending on which product you have. Single-Band AP: For the Single-Band AP, select one of these modes: • IEEE 802.11b • IEEE 802.
Chapter 13: Setting The Wireless Interface Configuring “Guest” Network Wireless Settings Table 13.4 Wireless LAN Settings Field Description MAC Address Shows the MAC address(es) for Internal interface for this access point. This is a read-only field that you cannot change. Although this access is point is physically a single device, it can be represented on the network as two or more nodes each with a unique MAC Address.
Chapter 13: Setting The Wireless Interface Updating Wireless Settings Table 13.5 Guest Network Wireless Settings Field Description MAC Address Shows the MAC address for the Guest interface for this access point. This is a read-only field that you cannot change. Although this access is point is physically a single device, it can be represented on the network as two or more nodes each with a unique MAC Address.
14 SETTING UP GUEST ACCESS 14.1 Understanding The Guest Interface . . . . . . . . . . . . . . . . . . . . . . . . . .155 14.2 Configuring The Guest Interface . . . . . . . . . . . . . . . 14.2.1 Configuring A Guest Network On A Virtual LAN . 14.2.2 Configuring The Welcome Screen (Captive Portal) 14.3 Using The Guest Network As A Client . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .155 .156 .156 .157 14.4 Deployment Example . .
154 Psion Teklogix 9160 G2 Wireless Gateway User Manual
Chapter 14: Setting Up Guest Access Understanding The Guest Interface Out-of-the-box Guest Interface features allow you to configure the 9160 G2 Wireless Gateway for controlled guest access to an isolated network. You can configure the same access point to broadcast and function as two different wireless networks: a secure “Internal” LAN and a public “Guest” network. Guest clients can access the guest network without a username or password.
Chapter 14: Setting Up Guest Access Configuring A Guest Network On A Virtual LAN Note: Guest Interface settings are not shared among access points across the cluster. These settings must be configured individually on the Administration pages for each access point. To get to the Administration pages for an access point that is a member of the current cluster, click on its IP Address link on the Cluster, Access Points page of the current AP.
Chapter 14: Setting Up Guest Access Using The Guest Network As A Client Figure 14.1 Guest Login Screen Settings 2. Choose Enabled to activate the Welcome screen. 3. In the Welcome Screen Text field, type the text message you would like guest clients to see on the captive portal. 4. Click Update to apply the changes. 14.3 Using The Guest Network As A Client Once the guest network is configured, a client can access the guest network as follows: 1.
Chapter 14: Setting Up Guest Access Deployment Example 6. The guest client is now enabled to use the “guest” network. 14.4 Deployment Example In Figure 14.2, the dotted lines indicate dedicated guest connections. All access points and all connections (including guests) are administered from the same 9160 G2 Wireless Gateway Administration Web pages. Figure 14.
CONFIGURING VLANS 15 15.1 Navigating To Virtual Wireless Network Settings . . . . . . . . . . . . . . . . . .161 15.2 Configuring VLANs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .161 15.3 Updating Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
160 Psion Teklogix 9160 G2 Wireless Gateway User Manual
Chapter 15: Configuring VLANs Navigating To Virtual Wireless Network Settings The following sections describe how to configure multiple wireless networks on Virtual LANs (VLANs). 15.1 Navigating To Virtual Wireless Network Settings To set up multiple networks on VLANs, navigate to the Manage > VWN tab, and update the fields as described below. Figure 15.1 VWN Settings 15.
Chapter 15: Configuring VLANs Configuring VLANs necessary, check with the infrastructure support administrator regarding the VLAN and DHCP configurations.) Table 15.1 Virtual Wireless Network Settings Field Description Virtual Wireless Network You can configure up to 6 VWNs. Enabled You can enable or disable a configured network. • To enable the specified network, check the Enabled checkbox beside the appropriate VWN.
Chapter 15: Configuring VLANs Updating Settings Table 15.1 Virtual Wireless Network Settings Field Description Broadcast SSID Select the Broadcast SSID setting by selecting the Broadcast SSID checkbox. By default, the access point broadcasts (allows) the Service Set Identifier (SSID) in its beacon frames. You can suppress (prohibit) this broadcast to discourage stations from automatically discovering your access point.
CONFIGURING 802.11 RADIO SETTINGS 16 16.1 Understanding Radio Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . .167 16.2 Navigating To Radio Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . .167 16.3 Configuring Radio Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .169 16.4 Updating Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
166 Psion Teklogix 9160 G2 Wireless Gateway User Manual
Chapter 16: Configuring 802.11 Radio Settings Understanding Radio Settings The following sections describe how to configure 802.11 Radio Settings on the 9160 G2 Wireless Gateway: 16.1 Understanding Radio Settings Radio settings directly control the behaviour of the radio device in the access point, and its interaction with the physical medium; that is, how/what type of electromagnetic waves the AP emits.
Chapter 16: Configuring 802.11 Radio Settings Navigating To Radio Settings Figure 16.
Chapter 16: Configuring 802.11 Radio Settings Configuring Radio Settings 16.3 Configuring Radio Settings Table 16.1 Radio Settings Field Description Radio The 9160 G2 Wireless Gateway is available as a one-radio or two-radio access point. One-Radio AP: If you have a one-radio version of the 9160 G2 Wireless Gateway, this field is not included on the Radio tab. Two-Radio AP: If you have a two-radio version of the 9160 G2 Wireless Gateway, specify Radio One or Radio Two.
Chapter 16: Configuring 802.11 Radio Settings Configuring Radio Settings Table 16.1 Radio Settings Field Description Extended Range Atheros Extended Range (XR) is a proprietary method for implementing low rate traffic over longer distances. It is transparent to XR enabled clients and access points and is designed to be interoperable with the 802.11 standard in 802.11g and 802.11a modes. There is no support for Atheros XR in 802.11b, Atheros Turbo 5 GHz, or Atheros Dynamic Turbo 5 GHz.
Chapter 16: Configuring 802.11 Radio Settings Configuring Radio Settings Table 16.1 Radio Settings Field Description Fragmentation Threshold Specify a number between 256 and 2,346 to set the frame size threshold in bytes. The fragmentation threshold is a way of limiting the size of packets (frames) transmitted over the network. If a packet exceeds the fragmentation threshold set here, the fragmentation function will be activated and the packet will be sent as multiple 802.11 frames.
Chapter 16: Configuring 802.11 Radio Settings Configuring Radio Settings Table 16.1 Radio Settings Field Description Transmit Power Provide a percentage value to set the transmit power for this access point. The default is to have the access point transmit using 100 percent of its power. Recommendations: • For most cases, we recommend keeping the default and having the transmit power set to 100 percent.
Chapter 16: Configuring 802.11 Radio Settings Updating Settings Table 16.1 Radio Settings Field Description Enable Broadcast/Multicast Rate Limiting Enabling multicast and broadcast rate limiting can improve overall network performance by limiting the number of packets transmitted across the network. Some protocols use multicast and broadcast packets for traffic that the majority of nodes on a network are uninterested in. For example, ARP requests for other machines, DHCP or BOOTP messages.
MAC ADDRESS FILTERING 17 17.1 Navigating To MAC Filtering Settings . . . . . . . . . . . . . . . . . . . . . . . .177 17.2 Using MAC Filtering . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .178 17.3 Updating Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
176 Psion Teklogix 9160 G2 Wireless Gateway User Manual
Chapter 17: MAC Address Filtering Navigating To MAC Filtering Settings A Media Access Control (MAC) address is a hardware address that uniquely identifies each node of a network. All IEEE 802 network devices share a common 48-bit MAC address format, usually displayed as a string of 12 hexadecimal digits separated by colons, for example FE:DC:BA:09:87:65. Each wireless network interface card (NIC) used by a wireless client has a unique MAC address.
Chapter 17: MAC Address Filtering Using MAC Filtering 17.2 Using MAC Filtering This page allows you to control access to the 9160 G2 Wireless Gateway based on Media Access Control (MAC) addresses. Based on how you set the filter, you can allow only client stations with a listed MAC address or prevent access to the stations listed. For the Guest interface, MAC Filtering settings apply to both BSSes. On a two-radio AP, MAC Filtering settings apply to both radios. Table 17.
LOAD BALANCING 18 18.1 Understanding Load Balancing . . . . . . . . . . . . . . . . . . . . . . . . . . 18.1.1 Identifying Imbalance: Overworked Or Under-utilized Access Points. 18.1.2 Specifying Limits For Utilization And Client Associations . . . . . . 18.1.3 Load Balancing And QoS. . . . . . . . . . . . . . . . . . . . . . . . 18.2 Navigating To Load Balancing Settings . . . . . . . . . . . . . . . . . . . . . . . . . . .181 .181 .181 .181 .182 18.3 Configuring Load Balancing . . . . . . . . . . . .
180 Psion Teklogix 9160 G2 Wireless Gateway User Manual
Chapter 18: Load Balancing Understanding Load Balancing The 9160 G2 Wireless Gateway allows you to balance the distribution of wireless client connections across multiple access points. Using load balancing, you can prevent scenarios where a single access point in your network shows performance degradation because it is handling a disproportionate share of the wireless traffic. The following sections describe how to configure Load Balancing on your wireless network. 18.
Chapter 18: Load Balancing Navigating To Load Balancing Settings 18.2 Navigating To Load Balancing Settings On the Administration UI, navigate to the Manage > Load Balancing tab, and update the fields as described in the next section. Figure 18.1 Load Balancing Settings 18.3 Configuring Load Balancing To configure load balancing, enable Load Balancing and set limits and behaviour to be triggered by a specified utilization rate of the access point.
Chapter 18: Load Balancing Configuring Load Balancing Load Balancing settings apply to the AP load as a whole. When Guest access is enabled, the settings apply to both Internal and Guest networks together. On a two-radio access point, Load Balancing settings apply to both radios but the load of each radio is calculated independently and includes both the Internal and Guest network (when Guest access is enabled). Table 18.
Chapter 18: Load Balancing Updating Settings 18.4 Updating Settings To update load balancing settings: 1. Navigate to the Load Balancing tab page. 2. Configure the load balancing settings as required. 3. Click the Update button to apply the changes.
QUALITY OF SERVICE (QOS) 19 19.1 Understanding QoS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19.1.1 QoS And Load Balancing . . . . . . . . . . . . . . . . . . . . . . . . . . 19.1.2 802.11e And WMM Standards Support . . . . . . . . . . . . . . . . . . . 19.1.3 QoS Queues And Parameters To Coordinate Traffic Flow . . . . . . . . . 19.1.3.1 QoS Queues And Type Of Service (ToS) On Packets . . . . . . . . 19.1.3.2 EDCF Control Of Data Frames And Arbitration Interframe Spaces 19.1.3.
186 Psion Teklogix 9160 G2 Wireless Gateway User Manual
Chapter 19: Quality Of Service (QoS) Understanding QoS Quality of Service (QoS) provides you with the ability to specify parameters on multiple queues for increased throughput and better performance of differentiated wireless traffic like Voice-over-IP (VoIP), other types of audio, video, and streaming media, as well as traditional IP data over the 9160 G2 Wireless Gateway. The following sections describe how to configure Quality of Service queues on the 9160 G2 Wireless Gateway. 19.
Chapter 19: Quality Of Service (QoS) QoS Queues And Parameters To Coordinate Traffic Flow The 9160 G2 Wireless Gateway provides QoS based on the Wireless Multimedia (WMM) specification and Wireless Multimedia (WMM) standards, which are implementations of a subset of 802.11e features. Both access points and wireless clients (laptops, consumer electronics products) can be WMM-enabled. 19.1.
Chapter 19: Quality Of Service (QoS) QoS Queues And Parameters To Coordinate Traffic Flow The access point examines the ToS field in the headers of all packets that pass through the AP. Based on the value in a packet’s ToS field, the AP prioritizes the packet for transmission by assigning it to one of the queues. This process occurs automatically, regardless of whether you deliberately configure QoS or not. A different type of data is associated with each queue.
Chapter 19: Quality Of Service (QoS) QoS Queues And Parameters To Coordinate Traffic Flow from the AP to the client station (AP EDCA parameters). The other phases of the traffic flow (to and from the network) are not under control of the QoS settings on the AP. 19.1.3.2 EDCF Control Of Data Frames And Arbitration Interframe Spaces Data is transmitted over 802.11 wireless networks in frames.
Chapter 19: Quality Of Service (QoS) QoS Queues And Parameters To Coordinate Traffic Flow 19.1.3.3 Random Backoff And Minimum/Maximum Contention Windows If an access point detects that the medium is in use (busy), it uses the DCF random backoff timer to determine the amount of time to wait before attempting to access a given channel again. Each access point waits some random period of time between retries.
Chapter 19: Quality Of Service (QoS) 802.1p And DSCP Tags information. The effect of this is to increase network speed and data throughput. The size of packet bursts allowed (maximum burst length) is a configurable parameter. 19.1.3.5 Transmission Opportunity (TXOP) Interval For Client Stations The Transmission Opportunity (TXOP) is an interval of time when a Wi-Fi Multimedia (WMM) client station has the right to initiate transmissions onto the wireless medium (WM). 19.1.4 802.1p And DSCP Tags IEEE 802.
Chapter 19: Quality Of Service (QoS) 802.1p And DSCP Tags Figure 19.2 Prioritization Of Network Traffic START Is VLAN tag? YES NO Take Priority from DSCP Is VLAN priority tag (VLAN id = 0) YES NO Is priority tag = 0 NO Take priority from tag Take priority from tag YES Take Priority from DSCP 19.1.4.1 VLAN Priority Table 19.1 outlines the priority tags and their associated values taken from a VLAN tag. Table 19.
Chapter 19: Quality Of Service (QoS) Configuring QoS Queues Table 19.1 VLAN Tag Priorities VLAN ID Tag Priority 4 Video 5 Video 6 Voice 7 Voice 19.1.4.2 DSCP Priority Table 19.2 outlines the DSCP values, the associated ID, and the priority level. Table 19.2 DSCP Tag Priorities 19.
Chapter 19: Quality Of Service (QoS) Configuring QoS Queues Figure 19.3 Quality Of Service (QoS) Settings Configuring Quality of Service (QoS) on the 9160 G2 Wireless Gateway consists of setting parameters on existing queues for different types of wireless traffic, and effectively specifying minimum and maximum wait times (via Contention Windows) for transmission. The settings described here apply to data transmission behaviour on the access point only, not to that of the client stations.
Chapter 19: Quality Of Service (QoS) Configuring AP EDCA Parameters is the case on both one-radio and two-radio APs. QoS on the access point leverages existing information in the IP packet header related to Type of Service (ToS). The access point examines the ToS field in the headers of all packets that pass through the AP. Based on the value in a packet’s ToS field, the AP prioritizes the packet for transmission by assigning it to one of the queues. A different type of data is associated with each queue.
Chapter 19: Quality Of Service (QoS) Configuring AP EDCA Parameters Table 19.3 AP EDCA Parameters Field Description AIFS (Inter-Frame Space) The Arbitration Inter-Frame Spacing (AIFS) specifies a wait time (in milliseconds) for data frames. Valid values for AIFS are 1 through 255. For more information, see DCF Control of Data Frames and Interframe Spaces. For more information, see “EDCF Control Of Data Frames And Arbitration Interframe Spaces” on page 190.
Chapter 19: Quality Of Service (QoS) Enabling/Disabling Wi-Fi Multimedia Table 19.3 AP EDCA Parameters Field Description Max. Burst Length AP EDCA Parameter Only (The Max. Burst Length applies only to traffic flowing from the access point to the client station.) This value specifies (in milliseconds) the Maximum Burst Length allowed for packet bursts on the wireless network. A packet burst is a collection of multiple frames transmitted without header information.
Chapter 19: Quality Of Service (QoS) Configuring Station EDCA Parameters Table 19.4 Station EDCA Parameters Field Description Queue Queues are defined for different types of data transmitted from station-to-AP: Data 0 (Voice) Highest priority queue, minimum delay. Time-sensitive data such as VoIP and streaming media are automatically sent to this queue. Data 1(Video) Highest priority queue, minimum delay. Time-sensitive video data is automatically sent to this queue.
Chapter 19: Quality Of Service (QoS) Updating Settings Table 19.4 Station EDCA Parameters Field Description cwMax (Maximum Contention Window) The value specified here in the Maximum Contention Window is the upper limit (in milliseconds) for the doubling of the random backoff value. This doubling continues until either the data frame is sent or the Maximum Contention Window size is reached.
WIRELESS DISTRIBUTION SYSTEM 20 20.1 Understanding The Wireless Distribution System . . . . . . . . . . . . . . . 20.1.1 Using WDS To Bridge Distant Wired LANs . . . . . . . . . . . . . 20.1.2 Using WDS To Extend Network Beyond The Wired Coverage Area 20.1.3 Using WDS To Create Backup Links. . . . . . . . . . . . . . . . . 20.2 Security Considerations Related To WDS Links . . . . . . . . . . . . . . . . 20.2.1 Understanding Static WEP Data Encryption . . . . . . . . . . . . . 20.2.
202 Psion Teklogix 9160 G2 Wireless Gateway User Manual
Chapter 20: Wireless Distribution System Understanding The Wireless Distribution System The 9160 G2 Wireless Gateway lets you connect multiple access points using a Wireless Distribution System (WDS). WDS allows access points to communicate with one another wirelessly. This capability is critical in providing a seamless experience for roaming clients and for managing multiple wireless networks. It can also simplify the network infrastructure by reducing the amount of cabling required.
Chapter 20: Wireless Distribution System Using WDS To Extend Network Beyond The Wired Coverage Area Figure 20.1 Bridged Distant Wired LANs Client Station Client Station WDS Bridge “Conference Room” AP Client Station “West Wing” AP LAN Segment 2 et) ern h t E n ed ( Wir nectio Con Client Station et) ern Eth ( d n e Wir nectio Con LAN Segment 1 20.1.
Chapter 20: Wireless Distribution System Using WDS To Create Backup Links Figure 20.2 Extended Network Beyond The Wired Coverage Area Client Station Client Station WDS Bridge Client Station “East Wing” AP t) rne the E ( n ed Wir nectio Con Client Station “Poolside” AP LAN 20.1.3 Using WDS To Create Backup Links Another use for WDS bridging is the creation of backup links.
Chapter 20: Wireless Distribution System Understanding WPA (PSK) Data Encryption vector (IV)) or 128-bit (104-bit secret key + 24-bit IV) Shared Key is specified for data encryption. You can enable Static WEP on the WDS link (bridge). When WEP is enabled, all data exchanged between the two access points in a WDS link is encrypted using a fixed WEP key that you provide. Static WEP does not provide effective data protection to the level of other security modes available for service to client stations.
Chapter 20: Wireless Distribution System Configuring WDS Settings Figure 20.3 Wireless Distribution System Settings The following notes summarize some critical guidelines regarding WDS configuration. Please read all the notes before proceeding with WDS configuration. Note: When using WDS, be sure to configure WDS settings on both access points participating in the WDS link. You can have only one WDS link between any pair of access points.
Chapter 20: Wireless Distribution System Configuring WDS Settings To configure WDS on this access point, describe each AP intended to receive hand-offs and send information to this AP. Each destination AP needs the following description, as shown in Table 20.1. Table 20.1 Destination Access Point Settings Field Description Local Address Indicates the Media Access Control (MAC) addresses for this access point.
Chapter 20: Wireless Distribution System Example Of Configuring A WDS Link Table 20.1 Destination Access Point Settings Field Description Encryption If you are unconcerned about security issues on the WDS link you may decide not to set any type of encryption. Alternatively, if you have security concerns you can choose between Static WEP, and WPA (PSK). Note: The types of encryption options available here will depend on the settings you have specified on the Security tabbed page.
Chapter 20: Wireless Distribution System Updating Settings The MAC address for MyAP1 (the access point you are currently viewing) will show as the “Local Address” at the top of the page. 3. Configure a WDS interface for data exchange with MyAP2. Start by entering the MAC address for MyAP2 as the “Remote Address” and fill in the rest of the fields to specify the network (guest or internal), security, and so on. Save the settings (click Update). 4.
CONFIGURING SNMP 21 21.1 Understanding SNMP Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . .213 21.2 Navigating To SNMP Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . .214 21.3 Configuring SNMP Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . .215 21.3.1 Configuring SNMP Traps. . . . . . . . . . . . . . . . . . . . . . . . . .217 21.3.2 Updating SNMP Settings . . . . . . . . . . . . . . . . . . . . . . . . . .
212 Psion Teklogix 9160 G2 Wireless Gateway User Manual
Chapter 21: Configuring SNMP Understanding SNMP Settings The following sections describe how to configure SNMP and related settings on the 9160 G2 Wireless Gateway Enterprise-Manager API: 21.1 Understanding SNMP Settings Simple Network Management Protocol (SNMP) defines a standard for recording, storing, and sharing information about network devices. SNMP facilitates network management, troubleshooting, and maintenance.
Chapter 21: Configuring SNMP Navigating To SNMP Settings Figure 21.1 SNMP Running On A Network Network Management System (NMS) SNMP Manager (2) SNMP Manager (1) SNMP Event GET request SET request Value Returned AP running SNMP Agent (Configured to send SNMP traps) AP running SNMP Agent MIB 21.2 MIB AP running SNMP Agent MIB Navigating To SNMP Settings To configure SNMP settings, navigate to Services > SNMP, and update the fields as described below.
Chapter 21: Configuring SNMP Configuring SNMP Settings Figure 21.2 Overview OF SNMP Settings Value Returned 21.3 Configuring SNMP Settings Start/stop control of SNMP agents, community password configuration, access to MIBs, and configuration of SNMP Trap destinations is provided through the 9160 G2 Wireless Gateway, as described below.
Chapter 21: Configuring SNMP Configuring SNMP Settings Table 21.1 SNMP Settings Field Description SNMP Enabled/Disabled You can choose whether or not you want to enable SNMP on your network. By default SNMP is disabled. • To enable SNMP, click Enabled. • To disable SNMP, click Disabled. Note: If you do not enable SNMP, all remaining fields on the SNMP page will be disabled. Read-only community name for permitted GETs Enter a read-only community name.
Chapter 21: Configuring SNMP Configuring SNMP Traps Table 21.1 SNMP Settings Field Description Restrict the source of SNMP requests to only the designated hosts or subnets You can restrict the source of permitted SNMP requests. Hostname or subnet of Network Management System • To restrict the source of permitted SNMP requests, click Enabled. • To permit any source submitting an SNMP request, click Disabled.
Chapter 21: Configuring SNMP Updating SNMP Settings SNMP traps save on network resources by eliminating redundant SNMP requests.They also make it easier for SNMP Managers to troubleshoot their network. For example, if an SNMP manager is responsible for a large network that supports many devices, and each device has a large number of objects, it is impractical to request information from every object on every device.
22 THE 9160 G2 AS BASE STATION 22.1 Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .221 22.2 Radio Protocols . . . . . . . . . . . . . . . . . . . . 22.2.1 Adaptive Polling/Contention Protocol . . . 22.3 Narrow Band Menus . . . . . . . . . . . . . . . . . 22.3.1 Narrow Band Radio Configuration Settings 22.3.1.1 RA1001A Radio Parameters. . . . 22.3.2 Connectivity Options . . . . . . . . . . . . 22.3.3 Connectivity Options: Base Station Mode . 22.3.3.
220 Psion Teklogix 9160 G2 Wireless Gateway User Manual
Chapter 22: The 9160 G2 As Base Station Overview 22.1 Overview The 9160 G2 Wireless Gateway can function as either a wired or wireless Base Station, or as a Remote Radio Module (RRM), using a radio link and Psion Teklogix proprietary protocols to facilitate communications with the mobile computers (see “Radio Protocols” on page 222).
Chapter 22: The 9160 G2 As Base Station Radio Protocols are found in the Radio pages for Narrow Band radios, as described in Section 22.3.1. The parameters for the hosts are described in “Section 22.4.4 Hosts Menu” on page 246. Note: The 9160 G2 main parameters should first be set up as described in Chapter 4: “Quick Steps For Setup And Launch” and Chapter 5: “Configuring Basic Settings”. For details on the RF protocols, see the following sections. 22.
Chapter 22: The 9160 G2 As Base Station Narrow Band Radio Configuration Settings 9160 G2 is set (base station or RRM). The page displayed allows you to set the status of the 9160 G2, and to retrieve the RA1001A radio card’s permanent communications settings. Figure 22.
Chapter 22: The 9160 G2 As Base Station Narrow Band Radio Configuration Settings Radio Card Status This parameter enables or disables the Narrow Band Radio. The card may be disabled temporarily when, for testing purposes, it is required that there be no radio interference. Press the Update button to initialize the change. 22.3.1.1 RA1001A Radio Parameters The Narrow Band Radio Configuration Settings page displays the General, Frequencies, and Tuning Values parameters for the RA1001A Narrow Band radio.
Chapter 22: The 9160 G2 As Base Station Connectivity Options Figure 22.4 RA1001A Radio Frequencies 22.3.2 Connectivity Options When you select this sub-menu, the page displayed allows you to set the operating options for the 9160 G2 in either base station or RRM mode. 22.3.3 Connectivity Options: Base Station Mode When you enter the Connectivity Options sub-menu for the 9160 G2 set in base station operating mode, the Polling Protocol and Radio Parameters are displayed.
Chapter 22: The 9160 G2 As Base Station Connectivity Options: Base Station Mode Figure 22.5 Overview Of Polling Protocol And Radio Parameters Operating Mode This parameter allows you to set the operating mode of the 9160 G2 as Base Station or RRM. Auto-Startup This parameter enables polling immediately when the 9160 G2 is rebooted. If Auto-Startup is disabled, the 9160 G2 will wait until polling is initialized from the network controller.
Chapter 22: The 9160 G2 As Base Station Connectivity Options: Base Station Mode Shared Channel Shared Channel is only used in Holland to accommodate government requirements. When enabled, it imposes timing restrictions for polling. Every 2 seconds of polling is followed by 0.5 seconds of silence—no polling occurs. Further, if another carrier is detected on the channel, the 9160 G2 will cease radio transmissions on that channel until the path is clear. 22.3.3.
Chapter 22: The 9160 G2 As Base Station Connectivity Options: Base Station Mode Size of Poll Windows The value assigned to this parameter determines the largest message that can be passed between the 9160 G2 and the mobile computer in a normal poll window. The window size can be adjusted to accommodate anywhere from 5 to 32 characters. Larger windows increase the polling period and can increase the response time.
Chapter 22: The 9160 G2 As Base Station Connectivity Options: Base Station Mode Free Window Factor The value entered in this parameter determines if “free window mode” will be used. In free window mode, all mobile computers that are not assigned any other window can use the free window. Entering a value of 0 (zero) in this parameter disables free window mode. Increasing the value of this parameter increases the likelihood of a message being transmitted in the free window.
Chapter 22: The 9160 G2 As Base Station Connectivity Options: Base Station Mode 22.3.3.2 Radio Parameters Sync Delay Important: This parameter should not be changed from its factory setting without a clear understanding of the timing of the radio protocol. Sync Delay specifies the delay between the time of the base station transmission and the first response window, measured in character times.
Chapter 22: The 9160 G2 As Base Station Connectivity Options: RRM Mode Band Radio Configuration Settings page. See Figure 22.4 on page 225 for the list of associated channels and frequencies. 22.3.4 Connectivity Options: RRM Mode When you enter the Connectivity Options sub-menu for a slave 9160 G2 set in RRM operating mode, the 9160 G2 displays the RRM parameters. IP Port This parameter allows you to enter the listening port number of the 9160 G2 operating as an RRM slave.
Chapter 22: The 9160 G2 As Base Station Base Station Configuration Settings Figure 22.6 Base Station Configuration 22.4.1 Base Station Configuration Settings Base stations communicate over the radio link using Psion Teklogix proprietary protocols. Base stations can be connected to network controllers using TCP/IP over Ethernet networks.
Chapter 22: The 9160 G2 As Base Station Base Station Configuration Settings uses the Adaptive Polling/Contention RF protocol (see ‘Radio Protocols’ on page 222 for details on the protocols). The 9160 G2 controls the radio link’s operation and timing. Each base station uses a different radio channel, and mobile computers use cellular switching to roam between stations.
Chapter 22: The 9160 G2 As Base Station RRM Groups Configuration Settings Message Size Message Size determines the largest single message that can be passed to a mobile computer. The range of this parameter is between 32 and 380 characters. (Longer messages are broken into several packets.) For polling protocol base stations, the upper limit is 116. Auto-Startup When this parameter is enabled, the slave base stations will start polling when the master 9160 G2 boots up.
Chapter 22: The 9160 G2 As Base Station RRM Groups Configuration Settings Figure 22.
Chapter 22: The 9160 G2 As Base Station RRM Groups Configuration Settings 22.4.2.1 RRM Groups In this screen the user can set options for a new RRM group. Each RRM must be a member of an RRM group; there may be more than one RRM group configured in the 9160 G2. An RRM group may contain from one to four RRMs.
Chapter 22: The 9160 G2 As Base Station RRM Groups Configuration Settings Auto-Startup When this parameter is enabled, the 9160 G2 establishes communication with the RRMs in this RRM group when it boots, and starts polling automatically. When Auto-Startup is disabled, the 9160 G2 establishes communication with the RRMs in this group when it boots, but does not start polling in this RRM group until a start polling command is received from the host.
Chapter 22: The 9160 G2 As Base Station RRM Groups Configuration Settings Size of Poll Windows This textbox allows the user to specify the size of the poll windows in which the RRMs of this RRM group listen for mobile computer replies. The allowable values range from 5 to 32. The default value is 8. Maximum Message Segment Size This textbox allows the user to specify the size of the largest message segment, in bytes, that will be sent over the Psion Teklogix radio network.
Chapter 22: The 9160 G2 As Base Station RRM Groups Configuration Settings Callsign String This textbox allows the user to specify the text to be transmitted as the RRM’s callsign. The text is transmitted as Morse code. The default value is Teklogix. 22.4.2.3 Radio Parameters Because some of the radio parameters are identical for a given group of timeplexed RRMs, they may be configured by the user once on the 9160 G2; the 9160 G2 then passes them to the RRMs in the group.
Chapter 22: The 9160 G2 As Base Station RRM Groups Configuration Settings Active Channel This textbox allows the user to specify the radio channel to be used by all the RRMs in the RRM group. The allowable values range from 1 to 20. The default value is 1. 22.4.2.4 Group Parameters Combination These textboxes allow the user to specify RRM subgroups called combinations. If the coverage areas of two or more of the RRMs in this RRM group do not overlap, the nonoverlapping RRMs may poll at the same time.
Chapter 22: The 9160 G2 As Base Station Radio Link Features Configuration Settings 22.4.2.5 Remote Radio Modules This menu displays the RRMs that comprise this RRM Group, including each Description, IP address, and Port number as set in the Connectivity Options sub-menu for the 9160 G2s set in RRM operating mode (see “Connectivity Options: RRM Mode” on page 231). Each RRM may be enabled or disabled from this menu. 22.4.
Chapter 22: The 9160 G2 As Base Station Radio Link Features Configuration Settings Figure 22.
Chapter 22: The 9160 G2 As Base Station Radio Link Features Configuration Settings 22.4.3.1 Radio Link Features Operate in Cellular Mode To operate as a cellular base station, this parameter should be enabled. Note: The 9500 Communications Server must also be set to cellular mode. Poll ID In Adaptive Polling/Contention protocol for narrow band radios, Poll ID is used to assign a unique address to each base station.
Chapter 22: The 9160 G2 As Base Station Radio Link Features Configuration Settings Timeout is 60, and this parameter is set to 75%, then the timeout would be 60 min x 75% = 45 minutes. An offline mobile computer is still considered part of the system. Messages to offline mobile computers are queued at the 9160 G2. The mobile computer remains offline until it transmits an online message. Values for this parameter range from 50 to 90.
Chapter 22: The 9160 G2 As Base Station Radio Link Features Configuration Settings 3. Do not enable Auto Startup (see page 303) on any of the 9150 or 9160 G2 base stations running 802.IQ with sessions using Automatic Radio Address and Automatic Terminal Number. Expiration Period This parameter dictates how long, in days, a particular radio address or terminal number should be inactive, before the 9160 G2 declares it to be “expired”.
Chapter 22: The 9160 G2 As Base Station Hosts Menu The Radio Link Features screen provides several parameters for each Automatic Terminal Number group: a range specified by a lower terminal number and an upper terminal number, and a comment. The comment is a string of ASCII text that can be used to describe the group. Notes: When enabling Automatic Terminal Number: 1. Direct TCP Connections for TekTerm must be disabled (see page 244). 2.
Chapter 22: The 9160 G2 As Base Station Hosts Menu Figure 22.
Chapter 22: The 9160 G2 As Base Station Hosts Menu Number Of Configured Hosts The Hosts page of the Connectivity options shows the number of hosts configured on the system. Up to six hosts can be supported. Host Number This parameter indicates the assigned host number. Choosing the Host Number from the drop-down list displays the parameters that can be modified or deleted for that host. New hosts can be added by selecting an unassigned number and configuring the parameters for it.
Chapter 22: The 9160 G2 As Base Station Hosts Menu Updating Settings At any point during the host configuration process, you may Update the settings or Cancel the process by clicking on the respective button on the bottom of the page. 22.4.4.1 9010 Configuration No Online/Offline If this parameter is Enabled, the 9160 G2 base station does not notify the host if the status of a mobile computer changes between offline and online.
23 MINI-CONTROLLER CONFIGURATION 23.1 Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .253 23.2 Mini-Controller Configuration Menu . . . . . . . . . . . . . . . . . . . . . . . . .254 23.3 Hosts Menu . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .254 23.4 Host Menu Options . . . . . . . . . . . . . 23.4.1 3274 Emulation . . . . . . . . . . 23.4.1.1 Emulation Options . . . . 23.4.1.2 TESS Options . . . . . . 23.4.1.3 Telnet Protocol Options .
252 Psion Teklogix 9160 G2 Wireless Gateway User Manual
Chapter 23: Mini-Controller Configuration Overview 23.1 Overview The network controller in a Psion Teklogix system performs a number of important tasks. One of these tasks is emulation: the translation of data between the protocol of the host computer and the protocol used by Psion Teklogix mobile computers. The data which is sent from a host computer to a mobile computer to provide its display, and returned to the host as a result of operations at the mobile computer, is called a data stream.
Chapter 23: Mini-Controller Configuration Mini-Controller Configuration Menu 23.2 Mini-Controller Configuration Menu For operation as a mini-controller, the parameters in the Hosts pages should be set appropriately. From the Connectivity options list, entering Hosts will open the Configuration Settings For A Base Station’s Host page. For information on configuring radio protocol parameters, please refer to “Radio Link Features Configuration Settings” on page 241. 23.
Chapter 23: Mini-Controller Configuration Hosts Menu Figure 23.
Chapter 23: Mini-Controller Configuration Hosts Menu Number Of Configured Hosts The Hosts page of the Connectivity options shows the number of hosts configured on the system. Up to six hosts can be supported. Host Number This parameter indicates the assigned host number. Choosing the Host Number from the drop-down list displays the parameters that can be modified or deleted for that host. New hosts can be added by selecting an unassigned number and configuring the parameters for it.
Chapter 23: Mini-Controller Configuration Hosts Menu Protocols are the methods by which mobile computers communicate with host computers over various media such as Ethernet and radio-link connections. The 9160 G2 supports the TCP/IP protocol. The supported emulations are: • 9010/ TCP/IP (See below for details). • 3274 Emulation (See pages 258 to 273 for Configuration Parameters). • 5250 Emulation (See pages 274 to 288 for Configuration Parameters).
Chapter 23: Mini-Controller Configuration Host Menu Options 23.4 Host Menu Options When you choose an existing Host Number, the 9160 G2 displays that host’s configuration parameters. The 5250, 3274, and ANSI emulations have four sub-menus: the host’s Emulation Options, TESS Options, Telnet Protocol Options, and Function Key Mappings (for an overview of the page see Figure 23.1 on page 255). 23.4.1 3274 Emulation 23.4.1.
Chapter 23: Mini-Controller Configuration 3274 Emulation 23.4.1.2 TESS Options Alarm When this parameter is enabled, mobile computers beep when the word “ALARM” appears on the application screen in the location specified by the Command Region parameter (see page 268). The word “ALARM” should be a display-only field. Note: The Command Region parameter must be enabled for this parameter to work.
Chapter 23: Mini-Controller Configuration 3274 Emulation fields with reverse video and fill the field with spaces. This is effective on mobile computers that support reverse video, but on mobile computers that do not, it can make the field invisible since it is made up entirely of spaces. By default, all empty entry fields displayed at the Psion Teklogix mobile computer are highlighted by the “entry character” chosen in the mobile computer’s configuration.
Chapter 23: Mini-Controller Configuration 3274 Emulation Procedures If this parameter is enabled, the host may send TESS procedures through the 9160 G2 to the mobile computers. A TESS procedure is a group of TESS commands that can be executed by the TESS execute procedure command. Local If this parameter is enabled, the 9160 G2 allows the host to provide pages to be loaded as local TESS procedures in the mobile computers. The local procedures are selected from a menu at the mobile computer.
Chapter 23: Mini-Controller Configuration 3274 Emulation Figure 23.2 Application Screen With Print Page 1 2 3 4 5 6 7 8 9 10 11 12 13 Display Page (8 x 40) PRINT Print Page (8 x 40) Notes: 1. Unlike the Passthru option, when using Host Print no escape commands can be sent to the printer. 2. Support for printing must be enabled at the mobile computer in its Printer command under the TESS Features menu; refer to the User Manual of the relevant mobile computer for more information.
Chapter 23: Mini-Controller Configuration 3274 Emulation The 9160 G2 reduces data transmitted to the mobile computers by using the mobile computer’s capability to store a page of data for each screen it displays. The 9160 G2 maintains an image of each page stored at the mobile computer. After receiving an application screen, the 9160 G2 tries to match the screen with a stored page.
Chapter 23: Mini-Controller Configuration 3274 Emulation Table 23.1 Mode Functions And AIAG Prefix Description Mode Function 0 Display prefix, send prefix to host. 1 Do not display prefix, send prefix to host. 2 Display prefix, do not send prefix to host. 3 Do not display prefix, do not send prefix to host. +4 Add 4 to above values to cause transmit to host when all AIAG fields with 4 set are filled.
Chapter 23: Mini-Controller Configuration 3274 Emulation the host, the “AIAG Prefix” – I – is displayed on the mobile computer screen, and when this screen is completed, the prefix will be sent back to the host. Figure 23.4 AIAG Field Sent To The Mobile Computer AIAG Information From Host To Mobile Computer Screen AIAG Field Identifier Item No.
Chapter 23: Mini-Controller Configuration 3274 Emulation Table 23.2 Match Characters Character Description # Match a number. & Match a letter (either case). ^ Match an uppercase letter. _ Match a lowercase letter. | Match an alphanumeric character. " Match a letter, number or space. ? Match a punctuation character. ' Match any character. : Match all character positions in the field with the preceding character.
Chapter 23: Mini-Controller Configuration 3274 Emulation Serial I/O Serial I/O fields are special entry and fixed fields that accept input from and output to a serial port. The application program distinguishes this field as Serial I/O by preceding the field with a special character. If this character precedes a fixed field, the data will be sent to the mobile computer’s serial port. If it precedes an entry field, the field accepts data from the mobile computer’s serial port.
Chapter 23: Mini-Controller Configuration 3274 Emulation Field Overhead This parameter contains the maximum number of characters allowed between two fixed fields which still allows the 9160 G2 to join them into one field. Sometimes the 9160 G2 will join two adjacent fixed fields and then send them as one field. This reduces the overhead on the radio link. For example, if two fields were 4 characters apart and this parameter was ‘5’, then these fields would be joined into one.
Chapter 23: Mini-Controller Configuration 3274 Emulation 23.4.1.3 Telnet Protocol Options Terminal Type This parameter allows you to choose the type of mobile computer to be emulated by the 9160 G2 for this host. At present the choices of mobile computer for 3274 Emulation are the IBM 3278-2 and IBM 3278-2-E. Host Port This parameter allows you to enter a host port value for the selected 3274 Emulation host connection. The default value is 23.
Chapter 23: Mini-Controller Configuration 3274 Emulation First Local Terminal Port This parameter contains the local port number from which the first mobile computer will connect on outbound telnet sessions. The default value is 10000. Local IP Address to Bind This parameter contains the IP address of the network adaptor in the 9160 G2 from which the first mobile computer will connect on outbound telnet sessions.
Chapter 23: Mini-Controller Configuration 3274 Emulation Configure LU Names One LU Name is required for each configured mobile computer. This page allows you to assign LU Names (see also LU Name Prefix, below). The LU Name must be unique and associated with the mobile computer’s Terminal Number. An LU Name can contain a maximum of 10 alphanumeric characters; lower-case characters are converted to upper-case upon entry.
Chapter 23: Mini-Controller Configuration 3274 Emulation Send IAC Break as an Attention Key If this parameter is enabled, the 9160 G2 sends the IAC Break request to the host as a 3274 Attention key. Auto-telnet This parameter enables you to disable or enable automatic connection of telnet sessions from mobile computers to this host. The choices provided are: Disable and Auto-telnet. The default value is Disable.
Chapter 23: Mini-Controller Configuration 3274 Emulation 23.4.1.4 Function Key Mappings Function key n The Function Key parameter allows you to select a code that will be sent to the host when you press a function key on the mobile computer. Each function key may be chosen from the same range of possible codes; however, each function key has a different default code. The default values are shown on this page.
Chapter 23: Mini-Controller Configuration 5250 Emulation 23.4.2 5250 Emulation 23.4.2.1 Emulation Options With IBM 5250, or IBM 3274 emulation, the 9160 G2 mini-controller converts the application data stream from the host to TESS (Teklogix Screen Subsystem) commands. Some of the parameters in this page govern the conversion of the host screens to TESS.
Chapter 23: Mini-Controller Configuration 5250 Emulation 23.4.2.2 TESS Options Field Underline Remapping You have the option to change the video attributes of displayed characters in order to highlight entry fields. Options are: None, Blink, Bold, and Reverse. Alarm If this parameter is enabled, mobile computers will beep when the word “ALARM” (in capital letters) appears on the application screen, in the location specified by the Command Region parameter (see page 284).
Chapter 23: Mini-Controller Configuration 5250 Emulation Clear If this parameter is enabled, the 9160 G2 mini-controller creates an empty entry field for an entry field that is filled with spaces. Some host applications rely on the video attributes of displayed characters to highlight fields, particularly entry fields. For example, the application screen may define all entry fields with reverse video and fill the field with spaces.
Chapter 23: Mini-Controller Configuration 5250 Emulation When the 9160 G2 is finished sending the data to the mobile computer’s printer, it will send an “ENTER” key to the host. The host must wait for the “ENTER” key before sending any more screens (including other “PASSTHRU” screens) to this mobile computer. Note: Refer to the User Manual of the relevant mobile computer for information about setting parameters on the mobile computer for pass-through.
Chapter 23: Mini-Controller Configuration 5250 Emulation Figure 23.5 Application Screen With Print Page 1 2 3 4 5 6 7 8 9 10 11 12 13 Display Page (8 x 40) PRINT Print Page (8 x 40) Notes: 1. Unlike the Passthru option, when using Host Print no escape commands can be sent to the printer. 2. Support for printing must be enabled at the mobile computer in its Printer command under the TESS Features menu; refer to the User Manual of the relevant mobile computer for more information.
Chapter 23: Mini-Controller Configuration 5250 Emulation The 9160 G2 reduces data transmitted to the mobile computers by using the mobile computer’s capability to store a page of data for each screen it displays. The 9160 G2 maintains an image of each page stored at the mobile computer. After receiving an application screen, the 9160 G2 tries to match the screen with a stored page.
Chapter 23: Mini-Controller Configuration 5250 Emulation Table 23.3 Mode Functions And AIAG Prefix Description Mode Function 0 Display prefix, send prefix to host. 1 Do not display prefix, send prefix to host. 2 Display prefix, do not send prefix to host. 3 Do not display prefix, do not send prefix to host. +4 Add 4 to above values to cause transmit to host when all AIAG fields with 4 set are filled.
Chapter 23: Mini-Controller Configuration 5250 Emulation the host, the “AIAG Prefix” – I – is displayed on the mobile computer screen, and when this screen is completed, the prefix will be sent back to the host. Figure 23.7 AIAG Field Sent To The Mobile Computer AIAG Information From Host To Mobile Computer Screen AIAG Field Identifier Item No.
Chapter 23: Mini-Controller Configuration 5250 Emulation Table 23.4 Match Characters Character Description # Match a number. & Match a letter (either case). ^ Match an uppercase letter. _ Match a lowercase letter. | Match an alphanumeric character. " Match a letter, number or space. ? Match a punctuation character. ' Match any character. : Match all character positions in the field with the preceding character.
Chapter 23: Mini-Controller Configuration 5250 Emulation Serial I/O Serial I/O fields are special entry and fixed fields that accept input from and output to a serial port. The application program distinguishes this field as Serial I/O by preceding the field with a special character. If this character precedes a fixed field, the data will be sent to the mobile computer’s serial port. If it precedes an entry field, the field accepts data from the mobile computer’s serial port.
Chapter 23: Mini-Controller Configuration 5250 Emulation Field Overhead This parameter contains the maximum number of characters allowed between two fixed fields which still allows the 9160 G2 to join them into one field. Sometimes the 9160 G2 will join two adjacent fixed fields and then send them as one field. This reduces the overhead on the radio link. For example, if two fields were 4 characters apart and this parameter was ‘5’, then these fields would be joined into one.
Chapter 23: Mini-Controller Configuration 5250 Emulation 23.4.2.3 Telnet Protocol Options Terminal Type This parameter allows you to choose the type of mobile computer to be emulated by the 9160 G2 for this host. At present the choices of mobile computer for 5250 Emulation are: the IBM 5251-11, IBM 5555-B01, and IBM 3179-2. Host Port This parameter allows you to enter a host port value for the selected 5250 Emulation host connection. The default value is 23.
Chapter 23: Mini-Controller Configuration 5250 Emulation Local IP Address to Bind This parameter contains the IP address of the network adaptor from which the first mobile computer will connect on outbound telnet sessions. First Terminal Listen Port This parameter specifies the first port number at which the 9160 G2 will listen for telnet connection requests to the mobile computers. To enable this parameter, the value must be a minimum of 1024. To disable the listen port, the value must be 0.
Chapter 23: Mini-Controller Configuration 5250 Emulation domain-name server. Any host name which can be used at the mobile computer’s TCP> prompt may be used here. Auto-telnet Without User Action If this is enabled, the controller will immediately open a connection to the host for each mobile computer that is initialized, without the user pressing the [ENTER] key.
Chapter 23: Mini-Controller Configuration 5250 Emulation Device Name Prefix If no LU Name is specified for a mobile computer, the 9160 G2 will append the Terminal Number (as five digits, with leading zeros if necessary) to the LU Prefix to create the full LU Name. 23.4.2.4 Function Key Mappings Function key n The Function Key parameter allows you to select a code that will be sent to the host when you press a function key on the mobile computer.
Chapter 23: Mini-Controller Configuration ANSI Emulation 23.4.3 ANSI Emulation 23.4.3.1 Emulation Options Maximum Screen Size The Maximum Screen Size allows you to set the maximum required screen size in mobile computers, by rows and columns. This feature ensures the optimal use of memory when using the page saving option (see “Page Saving” on page 291). The range is a minimum setting of 24 x 80 to a maximum setting of 60 x 132. The default setting is 24 x 80.
Chapter 23: Mini-Controller Configuration ANSI Emulation Escape Timeout The Escape Timeout is the length of time (in ticks, or 60ths of a second) that the 9160 G2 will hold an “ESC” received from the host, and consider the next received byte to be part of an escape sequence. The range is 0 to 255, with a default value of 12. When this timeout has elapsed, the host will have to send another “ESC” character to start an escape sequence.
Chapter 23: Mini-Controller Configuration ANSI Emulation Function Key Remapping If this parameter is enabled, the 9160 G2 remaps the function keys for this host connection as defined in the Function Key Remapping page (page 299). Arrow Key Remapping If this parameter is enabled, the 9160 G2 remaps the arrow keys for this host connection as defined in the Function Key Remapping page (page 299).
Chapter 23: Mini-Controller Configuration ANSI Emulation RLE If this parameter is enabled, the 9160 G2 uses run-length encoding (RLE) on the data it sends across the radio link. RLE compresses repeated characters going from the host to the mobile computer. If repeated characters are found in the data stream, the first one is sent, followed by a short escape sequence (3 or 4 characters) which tells the mobile computer how many times to repeat this character.
Chapter 23: Mini-Controller Configuration ANSI Emulation 23.4.3.2 Telnet Protocol Options Terminal Type This parameter specifies the type of mobile computer to be emulated by the 9160 G2. The characters entered in the textbox can be any ASCII string acceptable to the host, with a maximum of 32 characters. The default value is VT100. Host Port This parameter specifies the value for the host port for the selected ANSI host connection. The default value is 23.
Chapter 23: Mini-Controller Configuration ANSI Emulation Local IP Address to Bind This parameter specifies the IP address of the 9160 G2 interface that connects to this host. It is used along with the local port numbers to create a unique socket for each terminal session. First Terminal Listen Port This parameter specifies the first port number at which the 9160 G2 will listen for telnet connection requests to the mobile computers. To enable this parameter, the value must be a minimum of 1024.
Chapter 23: Mini-Controller Configuration ANSI Emulation 23.4.3.3 Auto-Telnet/Auto-login Auto-telnet/login Enable This parameter enables you to disable or enable automatic connection of telnet sessions from mobile computers to this host. The choices provided are: DISABLE; AUTOTELNET; AUTO-TELNET/LOGIN. The default value is DISABLE. When Auto-telnet is disabled, telnet sessions from the mobile computers to the host must be initiated manually from the mobile computers.
Chapter 23: Mini-Controller Configuration ANSI Emulation Auto-telnet Host This parameter contains the host name or IP address for the host to which the 9160 G2 connects Auto-telnet sessions. Note: A host name placed in this textbox must be “resolvable” by the 9160 G2: the 9160 G2 must be able to obtain an IP address for it. For example, the host name may correspond to an entry in the 9160 G2 host table, or the 9160 G2 may be able to query a domain-name server.
Chapter 23: Mini-Controller Configuration ANSI Emulation it sends the user ID specified in the Auto-Login User ID parameter to the host. The characters can be any ASCII string, with a maximum of 32 characters. The default text is gin: Note: The match string should be as short as possible, yet long enough to uniquely identify the user-ID prompt. Do not include multi-part words separated by space characters, since some hosts send out characters other than space characters to present a space on the screen.
Chapter 23: Mini-Controller Configuration ANSI Emulation Auto-telnet Without User Action Timing Delay When this is enabled, the Auto-telnet Without User Action option can be delayed by a specified time in milliseconds between connect attempts. Maximum Of Auto-telnet Retries The number of connection attempts to be made automatically before giving up.
Chapter 23: Mini-Controller Configuration ANSI Emulation 23.4.3.4 Function Key Mappings Function key n The Function Key parameter allows you to select a code that will be sent to the host when you press a function key on the mobile computer. Each function key may be chosen from the same range of possible codes; however, each function key has a different default code. The default values are shown on the screen above.
24 802.IQ SETTINGS 24.1 802.IQ Features . . . . . . . . . . . . . . 24.1.1 802.IQ v1/v2 Common Features 24.1.2 802.IQ v1 Features . . . . . . . 24.1.3 802.IQ v2 Features Menu . . . . 24.2 Updating 802.IQ Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Psion Teklogix 9160 G2 Wireless Gateway User Manual . . . . . . . .
302 Psion Teklogix 9160 G2 Wireless Gateway User Manual
Chapter 24: 802.IQ Settings 802.IQ Features 24.1 802.IQ Features 802.IQ is a Psion Teklogix proprietary enhanced 802.11 protocol that enables mobile computers to operate in a wireless LAN in a network that supports both TCP/IP and 802.IQ protocols simultaneously. 802.IQ protocol is available in two versions: 802.IQ v1 and 802.IQ v2. The 9160 G2 Wireless Gateway can support both versions of the protocol at the same time (mobile computers must use only one). 802.
Chapter 24: 802.IQ Settings 802.IQ v1/v2 Common Features was rebooted and, if so, how to recover. If the controller was rebooted, the mobile computer closes all sessions and fully re-initializes. If the base station was rebooted, or if the mobile computer moved to a different 9160 G2, a warm initialize is done (no data will be lost). The Beacon Period parameter acceptable value ranges from 1 to 20 seconds. The default value is 2.
Chapter 24: 802.IQ Settings 802.IQ v1/v2 Common Features Figure 24.1 Overview Of 802.
Chapter 24: 802.IQ Settings 802.IQ v1 Features 24.1.2 802.IQ v1 Features The 802.IQ v1 Features menus are entered from the 802.IQ tab of the Connectivity options (see Figure 24.1 on page 305). Enabled This parameter enables or disables the 802.IQ v1 feature. The default value is disabled. Initial RTT The parameter Initial RTT (Round-Trip Time) is used to help determine the elapsed time, in milliseconds, between an access point transmission and a terminal acknowledgement.
Chapter 24: 802.IQ Settings 802.IQ v2 Features Menu 802.IQ v1 Beacon Interfaces Choose the interface on which the beacons are sent out. The available interfaces are: Wired, WLAN0, WLAN1, WDS0 WDS1, WDS2, WDS3. 24.1.3 802.IQ v2 Features Menu The 802.IQ v2 Features menus are entered from the 802.IQ tab of the Connectivity options (see Figure 24.1 on page 305). Enabled This parameter enables or disables the 802.IQv2 protocol. The default value is disabled.
NETWORK TIME PROTOCOL SERVER 25 25.1 Navigating To Time Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 311 25.2 Enabling Or Disabling A Network Time Protocol (NTP) Server. . . . . . . . . . .312 25.3 Updating Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
310 Psion Teklogix 9160 G2 Wireless Gateway User Manual
Chapter 25: Network Time Protocol Server Navigating To Time Settings The Network Time Protocol (NTP) is an Internet standard protocol that synchronizes computer clock times on your network. NTP servers transmit Coordinated Universal Time (UTC, also known as Greenwich Mean Time) to their client systems. NTP sends periodic time requests to servers, using the returned time stamp to adjust its clock, including adjustments for time zone.
Chapter 25: Network Time Protocol Server Enabling Or Disabling A Network Time Protocol (NTP) Server 25.2 Enabling Or Disabling A Network Time Protocol (NTP) Server To configure your access point to use a network time protocol (NTP) server, first enable the use of NTP, and then select the NTP server you want to use. (To shut down NTP service on the network, disable NTP on the access point. Table 25.1 NTP Settings Field Description Local Time The current local time is shown at every update.
26 BACK UP & RESTORE CONFIGURATION 26.1 Navigating To The AP’s Configuration Settings . . . . . . . . . . . . . . . . . . .315 26.2 Resetting Factory Default Configuration . . . . . . . . . . . . . . . . . . . . . . .316 26.3 Saving The Current Configuration To A Backup File . . . . . . . . . . . . . . . .316 26.4 Restoring The Configuration From A Previously Saved File . . . . . . . . . . . .316 26.5 Rebooting The Access Point . . . . . . . . . . . . . . . . . . . . . . . . . . . . .317 26.
314 Psion Teklogix 9160 G2 Wireless Gateway User Manual
Chapter 26: Back Up & Restore Configuration Navigating To The AP’s Configuration Settings You can save a copy of the current settings on the 9160 G2 Wireless Gateway to a backup configuration file. The backup file can be used at a later date to restore the access point to the previously saved configuration. 26.1 Navigating To The AP’s Configuration Settings To manage the configuration of an access point, navigate to the Maintenance > Configuration tab and use the interface as described below. Figure 26.
Chapter 26: Back Up & Restore Configuration Resetting Factory Default Configuration 26.2 Resetting Factory Default Configuration If you are experiencing problems with the 9160 G2 Wireless Gateway and have tried all other troubleshooting measures, use the Reset Configuration function. This will restore factory defaults and clear all settings, including settings such as a new password or wireless settings. 1. Click the Maintenance > Configuration tab. 2. Click the Reset button.
Chapter 26: Back Up & Restore Configuration Rebooting The Access Point For example, a 9160 G2 model “9160 Wireless Gateway” will not restore a configuration file saved from a 9160 G2 model “9160 Wireless Gateway (Dual Radio)”. 2. Click the Restore button. The access point will reboot. Note: When you click Restore, the access point will reboot. A “reboot” confirmation dialog and follow-on “rebooting” status message will be displayed. Please wait for the reboot process to complete (a minute or two).
Chapter 26: Back Up & Restore Configuration Update Note: You must do this for each access point; you cannot upgrade firmware automatically across the cluster. Keep in mind that a successful firmware upgrade restores the access point configuration to the factory defaults. (See “Default Settings For The 9160 G2 Wireless Gateway” on page 27.) To upgrade the firmware on a particular access point: 1. Navigate to Maintenance > Upgrade on the Administration Web pages for that access point.
Chapter 26: Back Up & Restore Configuration Verifying The Firmware Upgrade Important: The firmware upgrade process begins once you click Update and then OK in the popup confirmation window. The upgrade process may take several minutes during which time the access point will be unavailable. Do not power down the access point while the upgrade is in process. When the upgrade is complete, the access point will restart and resume normal operation using the factory default configuration settings. 26.6.
SPECIFICATIONS 27 27.1 Physical Description . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .323 27.2 Environmental Requirements . . . . . . . . . . . . . . . . . . . . . . . . . . . . .323 27.3 AC Power Requirements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .323 27.4 Power Over Ethernet Requirements . . . . . . . . . . . . . . . . . . . . . . . . .323 27.5 Processor And Memory . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .324 27.6 Network Interfaces . .
322 Psion Teklogix 9160 G2 Wireless Gateway User Manual
Chapter 27: Specifications Physical Description Note: Performance specifications are nominal and subject to change without notice. 27.1 27.2 27.3 Physical Description Enclosure: Jet black in colour, FR2000 bay blend material Dimensions: < 30 x 20 x 12.5 cm (11.8 x 7.9 x 4.9 in.) Weight: < 2.25 kg (5.0 lbs.) (excludes radios, antennas, and options) Environmental Requirements Operating Temperature: 0°C to 45°C (32°F to 113°F) Operating Rel.
Chapter 27: Specifications Processor And Memory 27.5 Power Supplies: 2.5W (Assume η=0.8 at full 12.5 watt from Ethernet) Dual 802.11b radios: 4W Main Logic Board: 6W Processor And Memory Intel IXP420 processor running at 266 MHz 8 MB Flash ROM 32 MB SDRAM 27.6 Network Interfaces On-Board Ethernet: 10BaseT/100BaseT (10/100 Mb/s) card with auto-negotiation, half and full duplex. Data rate is auto-sensed. 27.7 Radios Mini-PCI card 802.11A/G radio without integrated antenna Mini-PCI card 802.
Chapter 27: Specifications Radios Type III PC Card Form Factor Transmit Power 1W or 0.5W Frequency Range 403-422 MHz, 419-435 MHz, 435-451 MHz, 450-470 MHz, 464-480 MHz, 480-496 MHz, 496-512 MHz Rx Sensitivity < -110dBm @ 19.2kbps (4 level FSK) Data Rates 4800 bps, 9600 bps, 19.
APPENDIX A PORT PINOUTS AND CABLE DIAGRAMS A.1 Console Port Pin No. Name Function Direction 3 TD Transmit Data Out 2 RD Receive Data In 5 SG Signal Ground – 4* DTR Data Terminal Ready Out 7* RTS Request to Send Out * always pulled high A.2 Serial Cable Descriptions Cable No.
Appendix A: Port Pinouts And Cable Diagrams Serial Cable Descriptions Console Port Cable No.
Appendix A: Port Pinouts And Cable Diagrams RJ-45 Connector Pinouts (10BaseT/100BaseT Ethernet) A.3 RJ-45 Connector Pinouts (10BaseT/100BaseT Ethernet) 9160 G2 using AC 9160 G2 using Power over Ethernet* Contact Signal Contact Signal 1 TD+ 1 TD+ 2 TD– 2 TD– 3 RD+ 3 RD+ 4 Not used 4 5 Not used 5 6 RD– 6 7 Not used 7 8 Not used 8 RD– * The 9160 G2 can also accept 48 VDC power bias on the data line pairs (1,2) and (3,6) from such systems providing power over Ethernet.
APPENDIX B SECURITY SETTINGS ON WIRELESS CLIENTS/RADIUS SERVER B.1 Network Infrastructure; Choosing Between Built-in Or External Authentication Server . 7 B.1.1 Using The Built-in Authentication Server (EAP-PEAP) . . . . . . . . . . . . . . . 8 B.1.2 Using An External RADIUS Server With EAP-TLS Certificates Or EAP-PEAP . . 8 B.2 Make Sure The Wireless Client Software Is Up-to-Date . . . . . . . . . . . . . . . . . 8 B.3 Accessing The Microsoft Windows Wireless Client Security Settings . . . . . . . . . .
Appendix B: Security Settings on Wireless Clients/RADIUS Server B-6 Psion Teklogix 9160 G2 Wireless Gateway User Manual
Appendix B: Security Settings on Wireless Clients/RADIUS Server Network Infrastructure; Choosing Between Built-in Or External Authentication Server Typically, users will configure security on their wireless clients for access to many different networks (access points). The list of “Available Networks” will change depending on the location of the client and which APs are online and detectable in that location.
Appendix B: Security Settings on Wireless Clients/RADIUS Server Using The Built-in Authentication Server (EAP-PEAP) network. Rather than try to predict and address the details of every possible scenario, this document provides general guidelines about each type of client configuration supported by the 9160 G2 Wireless Gateway. B.1.
Appendix B: Security Settings on Wireless Clients/RADIUS Server Accessing The Microsoft Windows Wireless Client Security Settings Even many client cards currently available do not ship from the factory with the latest drivers. B.3 Accessing The Microsoft Windows Wireless Client Security Settings Generally, on Windows XP there are two ways to get to the security properties for a wireless client: 1.
Appendix B: Security Settings on Wireless Clients/RADIUS Server Accessing The Microsoft Windows Wireless Client Security Settings List of available networks will change depending on client location. Each network (or access point) that that is detected by the client shows up in this list. (“Refresh” updates the list with current information.) For each network you want to connect to, configure security settings on the client to match the security mode being used by that network.
Appendix B: Security Settings on Wireless Clients/RADIUS Server Configuring A Client To Access An Unsecure Network (No Security) Use this dialog for configuring all the different types of client security described in the following sections. Make sure that the Wireless Network Properties dialog you are working in pertains to the Network Name (SSID) for the network you want to reach on the wireless client you are configuring. B.
Appendix B: Security Settings on Wireless Clients/RADIUS Server Configuring Static WEP Security On A Client To configure the client to not use any security, bring up the client Network Properties dialog, and configure the following settings. Set Network Authentication to Open Set Data Encryption to Disabled Table B.1 Association Settings B.
Appendix B: Security Settings on Wireless Clients/RADIUS Server Configuring Static WEP Security On A Client If you configured the 9160 G2 Wireless Gateway to use Static WEP security mode. . . . . . then configure WEP security on each client as follows.
Appendix B: Security Settings on Wireless Clients/RADIUS Server Configuring Static WEP Security On A Client Table B.2 Association Settings Network Authentication Open or Shared, depending on how you configured this option on the access point. Note: When the Authentication Algorithm on the access point is set to Both, clients set to either Shared or Open can associate with the AP. Clients configured to use WEP in Shared mode must have a valid WEP key in order to associate with the AP.
Appendix B: Security Settings on Wireless Clients/RADIUS Server Configuring IEEE 802.1x Security On A Client B.6 Configuring IEEE 802.1x Security On A Client IEEE 802.1x is the standard defining port-based authentication and infrastructure for doing key management. Extensible Authentication Protocol (EAP) messages are sent over an IEEE 802.11 wireless network using a protocol called EAP Encapsulation Over LANs (EAPOL). IEEE 802.1x provides dynamically-generated keys that are periodically refreshed.
Appendix B: Security Settings on Wireless Clients/RADIUS Server IEEE 802.1x Client Using EAP/PEAP . . . then configure IEEE 802.1x security with PEAP authentication on each client as follows: Choose Open Enable (click to check) IEEE 8021x authentication Choose WEP Data Encryption mode . . .
Appendix B: Security Settings on Wireless Clients/RADIUS Server IEEE 802.1x Client Using EAP/PEAP Disable Validate server certificate Choose Secured password (EAP-MSCHAP v2) . . . then click Configure Disable option to automatically use Windows logon name and password 4 3 1. Configure the following settings on the Association tab on the Network Properties dialog. Table B.
Appendix B: Security Settings on Wireless Clients/RADIUS Server IEEE 802.1x Client Using EAP/TLS Certificate 3. Click Properties to bring up the Protected EAP Properties dialog and configure the following settings. Table B.6 Protected EAP Properties Settings Validate Server Certificate Disable this option (click to uncheck the box). Note: This example assumes you are using the Built-in Authentication server on the AP.
Appendix B: Security Settings on Wireless Clients/RADIUS Server IEEE 802.1x Client Using EAP/TLS Certificate “How to Configure a Certificate Server” at http://support.microsoft.com/default.aspx?scid=kb;en-us;318710#3. To use this type of security, you must do the following: 1. Add the 9160 G2 Wireless Gateway to the list of RADIUS server clients. (See “Configuring An External RADIUS Server To Recognize The 9160 G2” on page B-31.) 2.
Appendix B: Security Settings on Wireless Clients/RADIUS Server IEEE 802.1x Client Using EAP/TLS Certificate Enable (click to check) IEEE 8021x authentication Choose Open Choose WEP Choose Smart Card/Certificate Data Encryption mode . . .
Appendix B: Security Settings on Wireless Clients/RADIUS Server IEEE 802.1x Client Using EAP/TLS Certificate 1. Configure the following settings on the Association tab on the Network Properties dialog. Table B.7 Association Settings Network Authentication Open Data Encryption WEP Note: An RC4 stream cipher is used to encrypt the frame body and cyclic redundancy checking (CRC) of each IEEE 802.11 frame.
Appendix B: Security Settings on Wireless Clients/RADIUS Server Configuring WPA/WPA2 Enterprise (RADIUS) Security On A Client B.7 Configuring WPA/WPA2 Enterprise (RADIUS) Security On A Client Wi-Fi Protected Access 2 (WPA2) with Remote Authentication Dial-In User Service (RADIUS) is an implementation of the Wi-Fi Alliance IEEE 802.11h standard, which includes Advanced Encryption Standard (AES), Counter mode/CBC-MAC Protocol (CCMP), and Temporal Key Integrity Protocol (TKIP) mechanisms.
Appendix B: Security Settings on Wireless Clients/RADIUS Server WPA/WPA2 Enterprise (RADIUS) Client Using EAP/PEAP Note: The following example assumes you are using the Built-in Authentication server that comes with the 9160 G2 Wireless Gateway. If you are setting up EAP/PEAP on a client of an AP that is using an external RADIUS server, the client configuration process will differ somewhat from this example especially with regard to certificate validation.
Appendix B: Security Settings on Wireless Clients/RADIUS Server WPA/WPA2 Enterprise (RADIUS) Client Using EAP/PEAP Choose WPA Choose either TKIP or AES for the Data Encryption mode 1 Disable Validate server certificate Choose Protected EAP (PEAP) . . . then, click Properties 2 Choose Secured password (EAP-MSCHAP v2) . . .
Appendix B: Security Settings on Wireless Clients/RADIUS Server WPA/WPA2 Enterprise (RADIUS) Client Using EAP/PEAP 1. Configure the following settings on the Association and Authentication tabs on the Network Properties dialog. Table B.10 Association Settings Network Authentication WPA Data Encryption TKIP or AES depending on how this option is configured on the access point.
Appendix B: Security Settings on Wireless Clients/RADIUS Server WPA/WPA2 Enterprise (RADIUS) Client Using EAP-TLS Certificate Logging On To The Wireless Network With A WPA/WPA2 Enterprise (RADIUS) PEAP Client “WPA/WPA2 Enterprise (RADIUS)” PEAP clients should now be able to associate with the access point. Client users will be prompted for a user name and password to authenticate with the network. B.7.
Appendix B: Security Settings on Wireless Clients/RADIUS Server WPA/WPA2 Enterprise (RADIUS) Client Using EAP-TLS Certificate If you configured the 9160 G2 Wireless Gateway to use WPA/WPA2 Enterprise (RADIUS) security mode with an external RADIUS server . . . . . . then configure WPA security with certificate authentication on each client as follows. Choose WPA 1 Choose either TKIP or AES for the Data Encryption mode Choose Smart Card or other Certificate and enable Authenticate as computer .... . . .
Appendix B: Security Settings on Wireless Clients/RADIUS Server WPA/WPA2 Enterprise (RADIUS) Client Using EAP-TLS Certificate Enable (click to check) Validate server certificate Select (check) the name of certificate on this client (downloaded from RADIUS server in a prerequisite procedure) 3 1. Configure the following settings on the Association tab on the Network Properties dialog. Table B.
Appendix B: Security Settings on Wireless Clients/RADIUS Server Configuring WPA/WPA2 Personal (PSK) Security On A Client Table B.15 Smart Card Or Other Certificate Properties Settings Validate Server Certificate Enable this option (click to check the box). Certificates In the certificate list shown, select the certificate for this client. Click OK on all dialogs to close and save your changes. 4.
Appendix B: Security Settings on Wireless Clients/RADIUS Server Configuring WPA/WPA2 Personal (PSK) Security On A Client . . . then configure WPA/WPA2 Personal (PSK) security on each client as follows. Choose WPA-PSK. Choose either TKIP or AES for the Data Encryption mode. Enter a network key that matches the one specified on the access point (and confirm by re-typing). Table B.
Appendix B: Security Settings on Wireless Clients/RADIUS Server Configuring An External RADIUS Server To Recognize The 9160 G2 Click OK on the Wireless Network Properties dialog to close it and save your changes. Connecting To The Wireless Network With A WPA-PSK Client WPA-PSK clients should now be able to associate and authenticate with the access point. As a client, you will not be prompted for a key.
Appendix B: Security Settings on Wireless Clients/RADIUS Server Configuring An External RADIUS Server To Recognize The 9160 G2 follow you will provide the access point IP address to the RADIUS server. The RADIUS Key provided on the AP is the “shared secret” you will provide to the RADIUS server. Note: The RADIUS server is identified by its IP address and UDP port numbers for the different services it provides.
Appendix B: Security Settings on Wireless Clients/RADIUS Server Configuring An External RADIUS Server To Recognize The 9160 G2 1. Log on to the system hosting your RADIUS server and bring up the Internet Authentication Service. 2. In the left panel, right click on RADIUS Clients node and choose New > Radius Client from the popup menu. 3.
Appendix B: Security Settings on Wireless Clients/RADIUS Server Configuring An External RADIUS Server To Recognize The 9160 G2 4. For the Shared secret enter the RADIUS Key you provided to the access point (on the Security page). Re-type the key to confirm.
Appendix B: Security Settings on Wireless Clients/RADIUS Server Obtaining A TLS-EAP Certificate For A Client 5. Click Finish. The access point is now displayed as a client of the Authentication Server. B.10 Obtaining A TLS-EAP Certificate For A Client Note: If you want to use IEEE 802.
Appendix B: Security Settings on Wireless Clients/RADIUS Server Obtaining A TLS-EAP Certificate For A Client Wireless clients configured to use either “WPA/WPA2 Enterprise (RADIUS)” or “IEEE 802.1x” security modes with an external RADIUS server that supports TLS-EAP certificates must obtain a TLS certificate from the RADIUS server. This is an initial one-time step that must be completed on each client that uses either of these modes with certificates.
Appendix B: Security Settings on Wireless Clients/RADIUS Server Obtaining A TLS-EAP Certificate For A Client The Welcome screen for the Certificate Server is displayed in the browser. 3. Click Request a certificate to get the logon prompt for the RADIUS server. 4. Provide a valid user name and password to access the RADIUS server. Note: The user name and password you need to provide here is for access to the RADIUS server, for which you will already have user accounts configured at this point.
Appendix B: Security Settings on Wireless Clients/RADIUS Server Obtaining A TLS-EAP Certificate For A Client 5. Click User Certificate on the next page displayed. 6. Click Yes on the dialog displayed to install the certificate. 7. Click Submit to complete and click Yes to confirm the submittal on the popup dialog.
Appendix B: Security Settings on Wireless Clients/RADIUS Server Obtaining A TLS-EAP Certificate For A Client 8. Click Install this certificate to install the newly issued certificate on your client station. (Also, click Yes on the popup windows to confirm the install and to add the certificate to the Root Store.) A success message is displayed indicating the certificate is now installed on the client.
Appendix B: Security Settings on Wireless Clients/RADIUS Server Configuring RADIUS Server For VLAN tags B.11 Configuring RADIUS Server For VLAN tags A VLAN is a grouping of ports on a switch or a grouping of ports on different switches. Dynamic VLANs allow you to assign a user to a VLAN, and switches dynamically use this information to configure the port on the switch automatically. Selection of the VLAN is usually based on the identity of the user.
APPENDIX C TROUBLESHOOTING C.1 Wireless Distribution System (WDS) Problems And Solutions . . . . . . . . . . . . . 43 C.2 Cluster Recovery . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44 C.2.1 Reboot Or Reset Access Point . . . . . . . . . . . . . . . . . . . . . . . . . . .
Appendix C: Troubleshooting C-42 Psion Teklogix 9160 G2 Wireless Gateway User Manual
Appendix C: Troubleshooting Wireless Distribution System (WDS) Problems And Solutions This section provides information about how to solve common problems you might encounter in the course of updating network configurations on networks served by multiple, clustered access points. C.1 Wireless Distribution System (WDS) Problems And Solutions If you are having trouble configuring a WDS link, be sure you have read the notes and cautions in “Configuring WDS Settings” on page 206.
Appendix C: Troubleshooting Cluster Recovery C.2 Cluster Recovery In cases where the access points in a cluster become out of sync or an access point cannot join or be removed from a cluster, the following methods for cluster recovery are recommended. C.2.1 Reboot Or Reset Access Point These recovery methods are given in the order you should try them.
APPENDIX D GLOSSARY 0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 0-9 802 IEEE 802 (IEEE Std. 802-2001) is a family of standards for peer-to-peer communication over a LAN. These technologies use a shared-medium, with information broadcast for all stations to receive. The basic communications capabilities provided are packet-based. The basic unit of transmission is a sequence of data octets (8-bits), which can be of any length within a range that is dependent on the type of LAN.
Appendix D: Glossary 802.3 802.3 IEEE 802.3 (IEEE Std. 802.3-2002) defines the MAC layer for networks that use CSMA/CA. Ethernet is an example of such a network. 802.11 IEEE 802.11 (IEEE Std. 802.11-1999) is a medium access control (MAC) and physical layer (PHY) specification for wireless connectivity for fixed, portable, and moving stations within a local area. It uses direct sequence spread spectrum (DSSS) in the 2.4 GHz ISM band and supports raw data rates of 1 and 2 Mbps.
Appendix D: Glossary 802.11e tables, acceptable channels, and power levels for each country are provided. Enabling support for IEEE 802.11d on the access point causes the AP to broadcast which country it is operating in as a part of its beacons. Client stations then use this information. This is particularly important for AP operation in the 5GHz IEEE 802.11a bands because use of these frequencies varies a great deal from one country to another. 802.11e IEEE 802.
Appendix D: Glossary 802.11i 802.11i IEEE 802.11i is a comprehensive IEEE standard for security in a wireless local area network (WLAN) that describes Wi-Fi Protected Access 2 (WPA2). It defines enhancements to the MAC Layer to counter the some of the weaknesses of WEP. It incorporates stronger encryption techniques than the original Wi-Fi Protected Access (WPA), such as Advanced Encryption Standard (AES). The original WPA, which can be considered a subset of 802.
Appendix D: Glossary 802.1Q To be compliant with this standard, layer 2 switches must be capable of grouping incoming LAN packets into separate traffic classes. 802.1Q IEEE 802.1Q is the IEEE standard for Virtual Local Area Networks (VLANs) specific to wireless technologies. (See http://www.ieee802.org/1/pages/802.1Q.html.) The standard addresses the problem of how to break large networks into smaller parts to prevent broadcast and multicast data traffic from consuming more bandwidth than is necessary.
Appendix D: Glossary AES AES The Advanced Encryption Standard (AES) is a symmetric 128-bit block data encryption technique developed to replace DES encryption. AES works at multiple network layers simultaneously. Further information is available on the NIST Web site. Atheros XR (Extended Range) Atheros Extended Range (XR) is a proprietary method for implementing low rate traffic over longer distances.
Appendix D: Glossary Bridge • • • The Basic Rate Set is a bitmap that lists the rates that the WLAN supports. The optional Parameter Sets indicates features of the specific signalling methods in use (such as frequency hopping spread spectrum, direct sequence spread spectrum, etc.). The optional Traffic Indication Map (TIM) identifies stations, using power saving mode, that have data frames queued for them.
Appendix D: Glossary CCMP C CCMP Counter mode/CBC-MAC Protocol (CCMP) is an encryption method for 802.11h that uses AES. It employs a CCM mode of operation, combining the Cipher Block Chaining Counter mode (CBC-CTR) and the Cipher Block Chaining Message Authentication Code (CBCMAC) for encryption and message integrity. AES-CCMP requires a hardware coprocessor to operate. CGI The Common Gateway Interface (CGI) is a standard for running external programs from an HTTP server.
Appendix D: Glossary CTS The CSMA/CA protocol used by 802.11 networks is a variation on CSMA/CD (used by Ethernet networks). In CSMA/CD the emphasis is on collision detection whereas with CSMA/CA the emphasis is on collision avoidance. CTS A clear to send (CTS) message is a signal sent by an IEEE 802.11 client station in response to an request to send (RTS) message. The CTS message indicates that the channel is clear for the sender of the RTS message to begin data transfer.
Appendix D: Glossary DOM A domain name identifies one or more IP addresses. Conversely, an IP address may map to more than one domain name. A domain name has a suffix that indicates which top level domain (TLD) it belongs to. Every country has its own top-level domain, for example .de for Germany, .fr for France, .jp for Japan, .tw for Taiwan, .uk for the United Kingdom, .us for the U.S.A., and so on. There are also .com for commercial bodies, .edu for educational institutions, .
Appendix D: Glossary EDCF Variations on EAP include EAP Cisco Wireless (LEAP), Protected EAP (PEAP), EAP-TLS, and EAP Tunnelled TLS (EAP-TTLS). EDCF Enhanced Distribution Control Function is an extension of DCF. EDCF, a component of the IEEE Wireless Multimedia (WMM) standard, provides prioritized access to the wireless medium.
Appendix D: Glossary Frame Legacy IEEE 802.11b devices cannot detect the ERP-OFDM signals used by IEEE 802.11g stations, and this can result in collisions between data frames from IEEE 802.11b and IEEE 802.11g stations. If there is a mix of 802.11b and 802.11g nodes on the same channel, the IEEE 802.11g stations detect this via an ERP flag on the access point and enable request to send (RTS) and clear to send (CTS) protection before sending data. See also CSMA/CA protocol.
Appendix D: Glossary HTML H HTML The Hypertext Markup Language (HTML) defines the structure of a document on the World Wide Web. It uses tags and attributes to hint about a layout for the document. An HTML document starts with an tag and ends with a tag. A properly formatted document also contains a
... section, which contains the metadata to define the document, and a ... section, which contains its content.Appendix D: Glossary IBSS IBSS An independent basic service set (IBSS) is an Ad hoc Mode Wireless Networking Framework in which stations communicate directly with each other. IEEE The Institute of Electrical and Electronic Engineers (IEEE) is an international standards body that develops and establishes industry standards for a broad range of technologies, including the 802 family of networking and wireless standards. (See 802, 802.1x, 802.11, 802.11a, 802.11b, 802.11e, 802.11f, 802.11g, and 802.11h.
Appendix D: Glossary IP Address The current version of IP is IPv4. A new version, called IPv6 or IPng, is under development. IPv6 is an attempt to solve the shortage of IP addresses. IP Address Systems are defined by their IP address, a four-byte (octet) number uniquely defining each host on the Internet. It is usually shown in form 192.168.2.254. This is called dotted-decimal notation. An IP address is partitioned into two portions: the network prefix and a host number on that network.
Appendix D: Glossary ISP ISP An Internet Service Provider (ISP) is a company that provides access to the Internet to individuals and companies. It may provide related services such as virtual hosting, network consulting, Web design, etc. J Jitter Jitter is the difference between the latency (or delay) in packet transmission from one node to another across a network. If packets are not transmitted at a consistent rate (including Latency), QoS for some types of data can be affected.
Appendix D: Glossary LDAP LDAP The Lightweight Directory Access Protocol (LDAP) is a protocol for accessing on-line directory services. It is used to provide an authentication mechanism. It is based on the X.500 standard, but less complex. Lease Time The Lease Time specifies the period of time the DHCP Server gives its clients an IP Address and other required information. When the lease expires, the client must request a new lease.
Appendix D: Glossary MIB a PC and that access point with an Ethernet cable rather than having to use a crossover cable). MIB Management Information Base (MIB) is a virtual database of objects used for network management. SNMP agents along with other SNMP tools can be used to monitor any network device defined in the MIB.
Appendix D: Glossary Network Address maps all internal IP addresses in outbound requests to its own address and converts all inbound requests to the correct internal host. NAT serves three main purposes: it provides security by obscurity by hiding internal IP addresses, enables the use of a wide range of internal IP addresses without fear of conflict with the addresses used by other organizations, and it allows the use of a single Internet connection. Network Address See IP Address.
Appendix D: Glossary Packet • • • • • Layer 3, the Network layer, defines the how to determine the best path for information traversing the network. Packets and logical IP Addresses operate on the network layer. Layer 4, the Transport layer, defines connection oriented protocols such as TCP and UDP. Layer 5, the Session layer, defines protocols for initiating, maintaining, and ending communication and transactions across the network.
Appendix D: Glossary PID Ethernet and the 802.11 family are protocols with physical layer components. PID The Process Identifier (PID) is an integer used by Linux to uniquely identify a process. A PID is returned by the fork() system call. It can be used by wait() or kill() to perform actions on the given process.
Appendix D: Glossary PSK PSK Pre-Shared Key (PSK), see Shared Key. Public Key A public key is used in public key cryptography to encrypt a message which can only be decrypted with the recipient's private or secret key. Public key encryption is also called asymmetric encryption, because it uses two keys, or Diffie-Hellman encryption. Also see Shared Key.
Appendix D: Glossary Router and into range of different base station service areas. IEEE 802.11f defines a standard by which APs can communicate information about client associations and disassociations in support of roaming clients. Router A router is a network device which forwards packets between networks. It is connected to at least two networks, commonly between two local area networks (LANs) or between a LAN and a wide-area network (WAN), for example, the Internet.
Appendix D: Glossary RTS Threshold RTS Threshold The RTS threshold specifies the packet size of a request to send (RTS) transmission. This helps control traffic flow through the access point, and is especially useful for performance tuning on an access point with a many clients. S Shared Key A shared key is used in conventional encryption where one key is used both for encryption and decryption. It is also called secret-key or symmetric-key encryption. Also see Public Key.
Appendix D: Glossary STP STP The Spanning Tree Protocol (STP) is an IEEE 802.1 standard protocol (related to network management) for MAC bridges that manages path redundancy and prevents undesirable loops in the network created by multiple active paths between client stations. Loops occur when there are multiple routes between access points. STP creates a tree that spans all of the switches in an extended network, forcing redundant paths into a standby or blocked state.
Appendix D: Glossary TCP SVP SpectraLink Voice Priority (SVP) is a QoS approach to Wi-Fi deployments. SVP is an open specification that is compliant with the IEEE 802.11b standard. SVP minimizes delay and prioritizes voice packets over data packets on the Wireless LAN, thus increasing the probability of better network performance. T TCP The Transmission Control Protocol (TCP) is built on top of Internet Protocol (IP).
Appendix D: Glossary ToS ToS TCP/IP packet headers include a 3-to-5 bit Type of Service (ToS) field set by the application developer that indicates the appropriate type of service for the data in the packet. The way the bits are set determines whether the packet is queued for sending with minimum delay, maximum throughput, low cost, or mid-way “best-effort” settings depending upon the requirements of the data.
Appendix D: Glossary UTC on another computer). The first part of the URL indicates what protocol to use and the second part specifies the IP address or the domain name where that resource is located. For example, ftp://ftp.devicescape.com/downloads/myfile.tar.gz specifies a file that should be fetched using the FTP protocol; http://www.devicescape.com/index.html specifies a Web page that should be fetched using the HTTP protocol. UTC Coordinated Universal Time (UTC) is also known as Greenwich Mean Time.
Appendix D: Glossary WDS WDS A Wireless Distribution System (WDS) allows the creation of a completely wireless infrastructure. Typically, an Access Point is connected to a wired LAN. WDS allows access points to be connected wirelessly. The access points can function as wireless repeaters or bridges. WEP Wired Equivalent Privacy (WEP) is a data encryption protocol for 802.11 wireless networks.
Appendix D: Glossary WMM WMM Wireless Multimedia (WMM) is a IEEE technology standard designed to improve the quality of audio, video and multimedia applications on a wireless network. Both access points and wireless clients (laptops, consumer electronics products) can be WMM-enabled. WMM features are based on is a subset of the WLAN IEEE 802.11e draft specification.
Appendix D: Glossary XML X XML The Extensible Markup Language (XML) is a specification developed by the W3C. XML is a simple, flexible text format derived from Standard Generalized Markup Language (SGML), designed especially for electronic publishing.
INDEX A access point clustering 55 Ethernet (wired) settings 135 guest network 153 load balancing 179 MAC filtering 175 monitoring 119 QoS 185 radio 165 security 91 user management 65 WDS bridging 201 wireless settings 145 Active Channel RA1001A parameters 230 RRM Group 240 Actively Negotiate with Host 3274 Telnet Protocol 270 5250 Telnet Protocol 286 Adaptive polling/contention protocol 222 administrator password on Basic Settings 49 platform 30 AIAG 3274 Emulation 263 5250 Emulation 279 Alarm 3274 Emulat
Index links, WDS 205 user accounts database 70 Barcode 3274 Emulation 267 5250 Emulation 283 base station Auto-Startup 226, 234 Base Station Number 233 configuration 219–249 Connectivity Menus 231–249 First Terminal 256 First Terminal, 9010 /TCP/IP host 248 Host Number 248, 256 Hosts 246–249 IP Address 233 Last Terminal, 9010 /TCP/IP host 248 Last Terminalhost 256 Message Size 234 Monitor Poll, 9010/TCP/IP host 249 Name 233 narrow band radio menus 222–231 No Online/Offline, 9010/TCP/IP host 249 Operating M
Index DNS Hostname, Ethernet Settings 138 DSCP Priority 193 tags 192 DTIM period, configuring 169 RRM group 238 Combination, RRM Group 240 Command Region 3274 Emulation 268 5250 Emulation 284 configuration mini-controller 251–299 Configure Device Names 3274 Telnet Protocol 287 Configure LU Names 3274 Telnet Protocol 271 connecting ANSI-compatible terminals 23 console 23 Ethernet 21 video display terminal 23 Connectivity Menus 246, 249 Connectivity Options Base Station Mode 225 RRM Mode 231 connectors RJ-4
Index Events 122 events log 122 monitoring 122 Expiration Period, Radio Link Features 245 extended service set with WDS bridging 203 external devices 20 F factory defaults described 27 features overview 10 fiber optic Ethernet port 22 Field Overhead 3274 Emulation 268 5250 Emulation 284 Field Underline Remapping 5250 Emulation 275 Firefox 23 First Local Terminal Port ANSI Telnet Protocol 293 3274 Telnet Protocol 270 5250 Telnet Protocol 285 First Terminal 248, 256 First Terminal Listen Port ANSI Telnet P
Index configuring 169 IEEE 802.11g configuring 169 Initial RTT, 802.
Index Polling Protocol Parameters 227 Port parameter 231 Radio Parameters 230 2 level modulation 230 4 level modulation 230 Neighbor 85 neighboring access points 129 networking, features overview 13 network interfaces 324 No Online/Offline, 9010/TCP/IP emulation 249 NTP server configuring access point to use 312 Number of Poll Windows RRM group 237 Poll Windows, narrow band radio 227 Retries RRM group 238 Retries, narrow band radio 228 O omnidirectional antenna 19 online/offline messages 249 Operate in C
Index protocol adaptive polling/contention 222 radio adaptive polling/contention 222 cellular switching 221 timeplexing 221 Q QoS See quality of service 185 quality of service 185 queues, configuring for QoS 194 R radio Automatic Radio Address Assignment Range 244 Automatic Terminal Number 245, 246 beacon interval 169 channel managed of clustered APs 73 configuring one or two radio AP 169 configuring settings 169 DTIM period 169 Expiration Period 245 fragmentation threshold 169 IEEE 802.
Index RRM mode 231 RTS threshold, configuring 169 S safety approvals xv instructions xvii SDRAM 324 security authentication server C-31 certificates on client C-35 comparison of modes 94 configuring 91–118 configuring on the access point 100 configuring on wireless clients C-5 features overview 11 guest network 102 IEEE 802.
Index terminal range,Hosts menu (9010 emulation) 248 text conventions 7 Threshold ANSI Emulation 290 time, configuring AP to use NTP server 312 timeplexing 221 Time settings 311 Time Zone 312 TLS-EAP configuring on IEEE 802.
Index Beacon Period 303 protocol overview 303 Terminal Offline Timeout 304 802.IQv1 Beacon Interfaces 307 description 303 Features Menu 307 Forward 802.IQ Packets Only 306 Initial RTT 306 Protocol Type ID 306 802.IQv2 Beacon UDP Port 307 description 303 Features Menu 307 802.1p tags 192 802.11A/G radio 324 802.11 Advanced Settings (Radio Settings page) 167, 173 802.11G radio 324 802.