6 CONFIGURING RADIO SETTINGS 16.1 16.2 16.3 16.4 Understanding Radio Settings Navigating To Radio Settings Configuring Radio Settings . Updating Settings. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Chapter 16: Configuring Radio Settings Understanding Radio Settings The following sections describe how to configure Radio Settings on the 9160 Wireless Gateway: 16.1 Understanding Radio Settings Radio settings directly control the behaviour of the radio device in the access point, and its interaction with the physical medium; that is, how/what type of electromagnetic waves the AP emits.
Chapter 16: Configuring Radio Settings Navigating To Radio Settings 16.2 Navigating To Radio Settings To specify radio settings, navigate to Advanced, Radio tab, and update the fields as described in Table 16.1 on page 157.
Chapter 16: Configuring Radio Settings Configuring Radio Settings 16.3 Configuring Radio Settings Field Description Radio The 9160 Wireless Gateway is available as a one-radio or two-radio access point. One-Radio AP: If you have a one-radio version of the 9160 Wireless Gateway, this field is not included on the Radio tab. Two-Radio AP: If you have a two-radio version of the 9160 Wireless Gateway, specify Radio One or Radio Two.
Chapter 16: Configuring Radio Settings Configuring Radio Settings Field Description Beacon Interval Beacon frames are transmitted by an access point at regular intervals to announce the existence of the wireless network. The default behaviour is to send a beacon frame once every 100 milliseconds (or 10 per second). The Beacon Interval value is set in milliseconds. Enter a value from 20 to 2000. DTIM Period The Delivery Traffic Information Map (DTIM) message is an element included in some Beacon frames.
Chapter 16: Configuring Radio Settings Configuring Radio Settings Field Description RTS Threshold Specify an RTS Threshold value between 0 and 2347. The RTS threshold specifies the packet size of a request to send (RTS) transmission. This helps control traffic flow through the access point, especially one with a lot of clients. If you specify a low threshold value, RTS packets will be sent more frequently. This will consume more bandwidth and reduce the throughput of the packet.
Chapter 16: Configuring Radio Settings Updating Settings 16.4 Updating Settings To apply your changes, click Update. Note: 160 If you are using the two-radio version of the 9160 Wireless Gateway, keep in mind that both Radio One and Radio Two are configured on this tab. The displayed settings apply to either Radio One or Radio Two, depending on which radio you choose in the Radio field (first field on tab).
MAC ADDRESS FILTERING 17 17.1 Navigating To MAC Filtering Settings. . . . . . . . . . . . . . . . . . . 163 17.2 Using MAC Filtering. . . . . . . . . . . . . . . . . . . . . . . . . . . . 164 17.3 Updating Settings. . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Chapter 17: MAC Address Filtering Navigating To MAC Filtering Settings A Media Access Control (MAC) address is a hardware address that uniquely identifies each node of a network. All IEEE 802 network devices share a common 48-bit MAC address format, usually displayed as a string of 12 hexadecimal digits separated by colons, for example FE:DC:BA:09:87:65. Each wireless network interface card (NIC) used by a wireless client has a unique MAC address.
Chapter 17: MAC Address Filtering Using MAC Filtering 17.2 Using MAC Filtering This page allows you to control access to the 9160 Wireless Gateway based on Media Access Control (MAC) addresses. Based on how you set the filter, you can allow only client stations with a listed MAC address or prevent access to the stations listed. For the Guest interface, MAC Filtering settings apply to both BSSes. On a two-radio AP, MAC Filtering settings apply to both radios.
LOAD BALANCING 18 18.1 Understanding Load Balancing . . . . . . . . . . . . . . . . . . . . . . . 167 18.1.1 Identifying Imbalance: Overworked Or Under-utilized Access Points 167 18.1.2 Specifying Limits For Utilization And Client Associations . . . . . .167 18.1.3 Load Balancing And QoS . . . . . . . . . . . . . . . . . . . . . . .168 18.2 Navigating To Load Balancing Settings . . . . . . . . . . . . . . . . . . 168 18.3 Configuring Load Balancing . . . . . . . . . . . . . . . . . . . . . . . . 169 18.
Chapter 18: Load Balancing Understanding Load Balancing The 9160 Wireless Gateway allows you to balance the distribution of wireless client connections across multiple access points. Using load balancing, you can prevent scenarios where a single access point in your network shows performance degradation because it is handling a disproportionate share of the wireless traffic. The following sections describe how to configure Load Balancing on your wireless network. 18.
Chapter 18: Load Balancing Load Balancing And QoS 18.1.3 Load Balancing And QoS Load balancing also plays a part in contributing to Quality of Service (QoS) for Voice Over IP (VoIP) and other such time-sensitive applications competing for bandwidth and timely access to the air waves on a wireless network. For more information about configuring your network for QoS, see Chapter 19: “Quality of Service (QoS)”. 18.
Chapter 18: Load Balancing Configuring Load Balancing 18.3 Configuring Load Balancing To configure load balancing, enable Load Balancing and set limits and behaviour to be triggered by a specified utilization rate of the access point. Notes: To view the current Utilization Rates for access points, click Cluster, Sessions on the Administration Web pages. (See Chapter 8: “Session Monitoring”.
Chapter 18: Load Balancing Updating Settings Field Description Utilization for Disassociation Utilization rate limits relate to wireless bandwidth utilization. Provide a bandwidth utilization rate percentage limit for this access point to indicate when to disassociate current clients. When the utilization rate exceeds the specified limit, a client currently associated with this access point will be disconnected.
QUALITY OF SERVICE (QOS) 19 19.1 Understanding QoS. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 173 19.1.1 QoS And Load Balancing . . . . . . . . . . . . . . . . . . . . .173 19.1.2 802.11e And WMM Standards Support . . . . . . . . . . . . . .173 19.1.3 QoS Queues And Parameters To Coordinate Traffic Flow . . . .174 19.2 Configuring QoS Queues. . . . . . . . . . . . . . . . . . . . . . . . . . 178 19.2.1 Configuring AP EDCA Parameters . . . . . . . . . . . . . . . .180 19.2.
Chapter 19: Quality of Service (QoS) Understanding QoS Quality of Service (QoS) provides you with the ability to specify parameters on multiple queues for increased throughput and better performance of differentiated wireless traffic like Voice-over-IP (VoIP), other types of audio, video, and streaming media, as well as traditional IP data over the 9160 Wireless Gateway. The following sections describe how to configure Quality of Service queues on the 9160 Wireless Gateway. 19.
Chapter 19: Quality of Service (QoS) QoS Queues And Parameters To Coordinate Traffic Flow As with all IEEE 802.11 working group standards, the goal is to provide a standard way of implementing QoS features so that components from different companies are interoperable. The 9160 Wireless Gateway provides QoS based on the Wireless Multimedia (WMM) specification and Wireless Multimedia (WMM) standards, which are implementations of a subset of 802.11e features.
Chapter 19: Quality of Service (QoS) QoS Queues And Parameters To Coordinate Traffic Flow For example, the ToS for FTP data packets is likely to be set for maximum throughput since the critical consideration for FTP is the ability to transmit relatively large amounts of data in one go. Interactive feedback is a nice-to-have in this situation but certainly less critical. VoIP data packets are set for minimum delay because that is a critical factor in quality and performance for that type of data.
Chapter 19: Quality of Service (QoS) QoS Queues And Parameters To Coordinate Traffic Flow Note: Wireless traffic travels: • Downstream from the access point to the client station. • Upstream from client station to access point. • Upstream from access point to network. • Downstream from network to access point.
Chapter 19: Quality of Service (QoS) QoS Queues And Parameters To Coordinate Traffic Flow Management and control frames wait a minimum amount of time for transmission; they wait a short interframe space (SIF). These wait times are built-in to 802.11 as infrastructure support and are not configurable. The 9160 Wireless Gateway supports the Enhanced Distribution Coordination Function (EDCF) as defined by the 802.11e standard.
Chapter 19: Quality of Service (QoS) Configuring QoS Queues The random backoff used by the access point is a configurable parameter. To describe the random delay, a “Minimum Contention Window” (MinCW) and a “Maximum Contention Window” (MaxCW) is defined. • The value specified for the Minimum Contention Window is the upper limit of a range for the initial random backoff wait time.
Chapter 19: Quality of Service (QoS) Configuring QoS Queues Configuring Quality of Service (QoS) on the 9160 Wireless Gateway consists of setting parameters on existing queues for different types of wireless traffic, and effectively specifying minimum and maximum wait times (via Contention Windows) for transmission. The settings described here apply to data transmission behaviour on the access point only, not to that of the client stations.
Chapter 19: Quality of Service (QoS) Configuring AP EDCA Parameters 19.2.1 Configuring AP EDCA Parameters AP Enhanced Distributed Channel Access (EDCA) Parameters affect traffic flowing from the access point to the client station. Field Description Queue Queues are defined for different types of data transmitted from AP-to-station: Data 0 (Voice) High priority queue, minimum delay. Time-sensitive data such as VoIP and streaming media are automatically sent to this queue.
Chapter 19: Quality of Service (QoS) Configuring AP EDCA Parameters Field Description cwMin (Minimum Contention Window) This parameter is input to the algorithm that determines the initial random backoff wait time (“window”) for retry of a transmission. The value specified here in the Minimum Contention Window is the upper limit (in milliseconds) of a range from which the initial random backoff wait time is determined.
Chapter 19: Quality of Service (QoS) Enabling/Disabling Wi-Fi Multimedia 19.2.2 Enabling/Disabling Wi-Fi Multimedia By default, Wi-Fi MultiMedia (WMM) is enabled on the access point. With WMM enabled, QoS prioritization and coordination of wireless medium access is on.
Chapter 19: Quality of Service (QoS) Configuring Station EDCA Parameters 19.2.3 Configuring Station EDCA Parameters Station Enhanced Distributed Channel Access (EDCA) Parameters affect traffic flowing from the client station to the access point. Field Description Queue Queues are defined for different types of data transmitted from station-to-AP: Data 0 (Voice) Highest priority queue, minimum delay. Time-sensitive data such as VoIP and streaming media are automatically sent to this queue.
Chapter 19: Quality of Service (QoS) Updating Settings Field Description cwMin (Minimum Contention Window) This parameter is input to the algorithm that determines the initial random backoff wait time (“window”) for retry of a transmission. The value specified here in the Minimum Contention Window is the upper limit (in milliseconds) of a range from which the initial random backoff wait time is determined. The first random number generated will be a number between 0 and the number specified here.
WIRELESS DISTRIBUTION SYSTEM 20 20.1 Understanding The Wireless Distribution System . . . . . . . . . . . . . 187 20.1.1 Using WDS To Bridge Distant Wired LANs . . . . . . . . . . . . .187 20.1.2 Using WDS To Extend Network Beyond The Wired Coverage Area188 20.1.3 Backup Links and Unwanted Loops In WDS Bridges . . . . . . . .189 20.1.4 Security Considerations Related To WDS Bridges . . . . . . . . . .190 20.2 Configuring WDS Settings . . . . . . . . . . . . . . . . . . . . . . . . . 190 20.2.
Chapter 20: Wireless Distribution System Understanding The Wireless Distribution System The 9160 Wireless Gateway lets you connect multiple access points using a Wireless Distribution System (WDS). WDS allows access points to communicate with one another wirelessly in a standardized way. This capability is critical in providing a seamless experience for roaming clients and for managing multiple wireless networks. It can also simplify the network infrastructure by reducing the amount of cabling required.
Chapter 20: Wireless Distribution System Using WDS To Extend Network Beyond The Wired Coverage Area Client Station Client Station WDS Bridge “Conference Room” AP Client Station “West Wing” AP t) erne Eth ( d e Wir nection Con LAN Segment 2 Client Station t) erne Eth ed ( tion r i W nec Con LAN Segment 1 Figure 20.1 Bridged Distant Wired LANs 20.1.
Chapter 20: Wireless Distribution System Backup Links and Unwanted Loops In WDS Bridges Client Station Client Station WDS Bridge Client Station “East Wing” AP Client Station “Poolside” AP et) ern Eth ( d e Wir nection Con LAN Figure 20.2 Extended Network Beyond The Wired Coverage Area 20.1.3 Backup Links and Unwanted Loops In WDS Bridges Another use for WDS bridging, the creation of backup links, is not supported in this release of the 9160 Wireless Gateway.
Chapter 20: Wireless Distribution System Security Considerations Related To WDS Bridges 20.1.4 Security Considerations Related To WDS Bridges Static Wired Equivalent Privacy (WEP) is a data encryption protocol for 802.11 wireless networks. Both access points in a given WDS link must be configured with the same security settings.
Chapter 20: Wireless Distribution System Configuring WDS Settings Figure 20.3 Wireless Distribution System Settings The following notes summarize some critical guidelines regarding WDS configuration. Please read all the notes before proceeding with WDS configuration. Notes: • The only security mode available on the WDS link is Static WEP, which is not particularly secure. Therefore, we recommend using WDS to bridge the Guest network only for this release.
Chapter 20: Wireless Distribution System Configuring WDS Settings • When using WDS, be sure to configure WDS settings on both access points participating in the WDS link. • You can have only one WDS link between any pair of access points. That is, a remote MAC address may appear only once on the WDS page for a particular access point. • Both access points participating in a WDS link must be on the same Radio channel and using the same IEEE 802.11 mode.
Chapter 20: Wireless Distribution System Configuring WDS Settings Field Description Radio The 9160 Wireless Gateway is available as a one-radio or two-radio access point. One-Radio AP: On the one-radio version of the 9160 Wireless Gateway, this field is not included on the WDS tab. Two-Radio AP: For each WDS link on a two-radio AP, select Radio One or Radio Two. The rest of the settings for the link apply to the radio selected in this field.
Chapter 20: Wireless Distribution System Example Of Configuring A WDS Link Field Description WEP Specify whether you want Wired Equivalent Privacy (WEP) encryption enabled for the WDS link. • Enabled • Disabled Wired Equivalent Privacy (WEP) is a data encryption protocol for 802.11 wireless networks. Both access points on the WDS link must be configured with the same security settings.
Chapter 20: Wireless Distribution System Updating Settings 2. Navigate to the WDS tab on MyAP1 Administration Web pages. The MAC address for MyAP1 (the access point you are currently viewing) will show as the “Local Address” at the top of the page. 3. Configure a WDS interface for data exchange with MyAP2. Start by entering the MAC address for MyAP2 as the “Remote Address” and fill in the rest of the fields to specify the network (guest or internal), security, and so on. Save the settings (click Update). 4.
NETWORK TIME PROTOCOL SERVER 21 21.1 Navigating To Time Protocol Settings . . . . . . . . . . . . . . . . . . . 199 21.2 Enabling Or Disabling A Network Time Protocol (NTP) Server . . . . . 200 21.3 Updating Settings. . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Chapter 21: Network Time Protocol Server Navigating To Time Protocol Settings The Network Time Protocol (NTP) is an Internet standard protocol that synchronizes computer clock times on your network. NTP servers transmit Coordinated Universal Time (UTC, also known as Greenwich Mean Time) to their client systems. NTP sends periodic time requests to servers, using the returned time stamp to adjust its clock. The timestamp will be used to indicate the date and time of each event in log messages. See http://www.
Chapter 21: Network Time Protocol Server Enabling Or Disabling A Network Time Protocol (NTP) Server 21.2 Enabling Or Disabling A Network Time Protocol (NTP) Server To configure your access point to use a network time protocol (NTP) server, first enable the use of NTP, and then select the NTP server you want to use. (To shut down NTP service on the network, disable NTP on the access point.
THE ADMINISTRATOR PASSWORD 22 22.1 Navigating To Administrator Password Setting . . . . . . . . . . . . . . 203 22.2 Setting The Administrator Password. . . . . . . . . . . . . . . . . . . . 203 22.3 Updating Settings. . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Chapter 22: The Administrator Password Navigating To Administrator Password Setting The administrator password controls access to the Administration Web pages for the 9160 Wireless Gateway. This setting is also available on the Basic Settings administration page. When you set the administration password in either place and apply the change, the new password is updated and shared by all access points in the cluster.
Chapter 22: The Administrator Password Updating Settings Field Description Existing Password Enter the current administrator password. (The factory default password is admin .) The text you enter will be displayed as “ * ” characters to prevent others from seeing your password as you type. New Password Enter a new administrator password. The Administrator password must be an alphanumeric string of up to 8 characters. Do not use special characters or spaces.
MAINTENANCE AND MONITORING 23 23.1 Interfaces . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 207 23.1.1 Ethernet (Wired) Settings . . . . . . . . . . . . . . . . . . . . . .208 23.1.2 Wireless Settings . . . . . . . . . . . . . . . . . . . . . . . . . .208 23.2 Event Logs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 208 23.2.1 Log Relay Host For Kernel Messages. . . . . . . . . . . . . . . .209 23.2.1.1 Understanding Remote Logging. . . . . . . . . . . . . .
Chapter 23: Maintenance And Monitoring Interfaces Important: The maintenance and monitoring tasks described here all pertain to viewing and modifying settings on specific access points; not on a cluster configuration that is automatically shared by multiple access points. Therefore, it is important to ensure that you are accessing the Administration Web pages for the particular access point you want to configure.
Chapter 23: Maintenance And Monitoring Ethernet (Wired) Settings 23.1.1 Ethernet (Wired) Settings The Internal interface includes the Ethernet MAC Address, IP Address, Subnet Mask, and Associated Network Wireless Name (SSID). The Guest interface includes the MAC Address, VLAN ID, and Associated Network Wireless Name (SSID). If you want to change any of these settings, click the Configure link. 23.1.2 Wireless Settings The Radio interface includes settings for radio Mode, and Channel.
Chapter 23: Maintenance And Monitoring Log Relay Host For Kernel Messages This page lists the most recent events generated by this access point (see “Events Log” on page 212). This page also gives you the option of enabling a remote “log relay host” to capture all system events and errors in a Kernel Log. (This requires setting up a remote relay host first. See “Log Relay Host For Kernel Messages” on page 209).
Chapter 23: Maintenance And Monitoring Log Relay Host For Kernel Messages 23.2.1.2 Setting Up The Log Relay Host To use Kernel Log relaying, you must configure a remote server to receive the syslog messages. This procedure will vary depending on the type of machine you use as the remote log host. The following is an example of how to configure a remote Linux server using the syslog daemon. Example Of Using Linux syslogd The following steps activate the syslog daemon on a Linux server.
Chapter 23: Maintenance And Monitoring Log Relay Host For Kernel Messages 23.2.1.3 Enabling Or Disabling The Log Relay Host On The Status, Events Page To enable and configure Log Relaying on the Status, Events page, set the Log Relay options as described below and then click Update. Field Description Log Relay Host Enabled Choose to either enable or disable use of the Log Relay Host: • Enabled • Disabled If you select Enabled, the Relay Host and Relay Port fields are editable.
Chapter 23: Maintenance And Monitoring Events Log 23.2.2 Events Log The Events Log shows system events on the access point such as stations associating, being authenticated, and other occurrences. The real-time Events Log is always shown on the Status, Events Administration Web UI page for the access point you are monitoring. 23.
Chapter 23: Maintenance And Monitoring Transmit/Receive Statistics Field Description IP Address IP Address for the access point. MAC Address Media Access Control (MAC) address for the specified interface. A MAC address is a permanent, unique hardware address for any device that represents an interface to the network. The MAC address is assigned by the manufacturer. The 9160 Wireless Gateway has a unique MAC address for each interface.
Chapter 23: Maintenance And Monitoring Associated Wireless Clients 23.4 Associated Wireless Clients To view the client stations associated with a particular access point, navigate to Status, Client Associations on the Administration Web pages for the access point you want to monitor. The associated stations are displayed, along with information about packet traffic transmitted and received for each station. 23.4.
Chapter 23: Maintenance And Monitoring What Is The Difference Between An Association And A Session? 23.4.2 What Is The Difference Between An Association And A Session? An association describes a client connection to a particular access point. A session describes a client connection to the network. A client network connection can shift from one clustered AP to another within the context of the same session. A client station can roam between APs and maintain the session.
Chapter 23: Maintenance And Monitoring Neighboring Access Points Information provided on neighboring access points is described in Table 23.3. Field Description MAC Address Shows the MAC address of the neighboring access point. A MAC address is a hardware address that uniquely identifies each node of a network. Radio Two-Radio APs If the access point that is “doing the detecting” of neighboring APs is a two-radio access point, the Radio field is included.
Chapter 23: Maintenance And Monitoring Neighboring Access Points Field Description Privacy Indicates whether there is any security on the neighboring device. • Off indicates that the Security mode on the neighboring device is set to “plain-text” mode (no security). • On indicates that the neighboring device has some security in place. Security is configured on the AP at Advanced, Security. For more information on security settings, see Chapter 13: “Configuring Security”.
Chapter 23: Maintenance And Monitoring Rebooting The Access Point 23.6 Rebooting The Access Point For maintenance purposes or as a troubleshooting measure, you can reboot the 9160 Wireless Gateway as follows. 1. Click the Advanced, Reboot tab. 2. Click the Reboot button. The AP reboots. 23.7 Resetting The Configuration To Factory Defaults If you are experiencing extreme problems with the 9160 Wireless Gateway and have tried all other troubleshooting measures, use the Reset Configuration function.
Chapter 23: Maintenance And Monitoring Upgrading The Firmware 2. Click the Reset button. Factory defaults are restored. Note: Keep in mind that if you do reset the configuration from this page, you are doing so for this access point only; not for other access points in the cluster. For information on the factory default settings, see “Default Settings For The 9160 Wireless Gateway” on page 23. 23.
Chapter 23: Maintenance And Monitoring Upgrading The Firmware If you encounter this scenario, the solution is to use a wired client to gain access to the access point: • Create a wired Ethernet connection from a PC to the access point. • Bring up the Administration UI. Repeat the upgrade process using with the wired client. Note: You must do this per access point; you cannot upgrade firmware automatically across the cluster.
Chapter 23: Maintenance And Monitoring Update 2. If you know the path to the New Firmware Image file, enter it in the textbox. Otherwise, click the Browse button and locate the firmware image file. Note: The firmware upgrade file supplied must be in the format .upgrade.tar. Do not attempt to use .bin files or files of other formats for the upgrade; these will not work. 23.8.1 Update Click Update to apply the new firmware image.
BACKING UP THE CONFIGURATION 24 24.1 Navigating To Backup And Restore Settings . . . . . . . . . . . . . . . 225 24.2 Backing Up Configuration Settings For An Access Point . . . . . . . . . 225 24.3 Restoring Access Point Settings To A Previous Configuration . . . . . .
Chapter 24: Backing Up The Configuration Navigating To Backup And Restore Settings You can save a copy of the current settings on the 9160 Wireless Gateway to a backup configuration file. The backup file can be used at a later date to restore the access point to the previously saved configuration. 24.1 Navigating To Backup And Restore Settings To backup or restore a configuration for an access point, navigate to the Advanced, Backup and Restore tab and use the interface as described below. 24.
Chapter 24: Backing Up The Configuration Restoring Access Point Settings To A Previous Configuration You can keep the default file name (apconfig.cbk) or rename the backup file, but be sure to save the file with a .cbk extension. 24.3 Restoring Access Point Settings To A Previous Configuration To restore the configuration on an access point to previously saved settings: 1.
25 SPECIFICATIONS 25.1 25.2 25.3 25.4 25.5 25.6 25.7 Physical Description . . . . . . . . Environmental Requirements . . . AC Power Requirements . . . . . . Power Over Ethernet Requirements Processor And Memory . . . . . . Network Interfaces . . . . . . . . . Mini-PCI Card Radios . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Chapter 25: Specifications Physical Description Note: Performance specifications are nominal and subject to change without notice. 25.1 Physical Description Enclosure: Dimensions: Weight: Jet black in colour, FR2000 bay blend material < 30 x 20 x 12.5 cm (11.8 x 7.9 x 4.9 in.) < 2.25 kg (5.0 lbs.) (excludes radios, antennas, and options) 25.2 Environmental Requirements Operating Temperature: 0°C to 55°C (32°F to 131°F) Operating Rel.
Chapter 25: Specifications Power Over Ethernet Requirements 25.4 Power Over Ethernet Requirements Compliant with IEEE 802.3af (disabled when AC power is connected). Input voltage: 37 - 57 VDC On-board Power Supplies: 2.5W (Assume η=0.8 at full 12.5 watt from Ethernet) Dual 802.11b radios: 4W Main Logic Board: 6W 25.5 Processor And Memory Intel IXP420 processor running at 266 MHz 8 MB Flash ROM 32 MB SDRAM 25.
APPENDIX A SUPPORT SERVICES AND WORLDWIDE OFFICES Psion Teklogix provides a complete range of product support services to its customers worldwide. These services include technical support and product repairs. A.1 Technical Support Technical Support for Mobile Computing Products is provided via e-mail through the Psion Teklogix customer and partner extranets. To reach the website, go to www.psionteklogix.com and click on the appropriate Teknet link on the home page.
Appendix A: Support Services And Worldwide Offices A.3 Worldwide Offices COMPANY HEADQUARTERS AND CANADIAN SERVICE CENTRE Psion Teklogix Inc. 2100 Meadowvale Blvd. Mississauga, Ontario Canada L5N 7J9 Tel:+1 905 813 9900 Fax:+1 905 812 6300 E-mail:salescdn@psion.com NORTH AMERICAN HEADQUARTERS AND U.S. SERVICE CENTRE Psion Teklogix Corp. 1810 Airport Exchange Boulevard Suite 500 Erlanger, Kentucky USA 41018 Tel:+1 859 371 6006 Fax:+1 859 371 6422 E-mail:salesusa@psion.
APPENDIX B PORT PINOUTS AND CABLE DIAGRAMS B.1 Console Port Pin No.
Appendix B: Port Pinouts And Cable Diagrams Serial Cable Descriptions B.2 Serial Cable Descriptions Cable No. Function Connection Standard Length 19387 9160 to Console Direct 6 feet Console Port Cable No.
Appendix B: Port Pinouts And Cable Diagrams RJ-45 Connector Pinouts (10BaseT/100BaseT Ethernet) B.3 RJ-45 Connector Pinouts (10BaseT/100BaseT Ethernet) 9160 using AC Contact Signal 9160 using Power over Ethernet* Contact Signal 1 TD+ 1 TD+ 2 TD– 2 TD– 3 RD+ 3 RD+ 4 Not used 4 5 Not used 5 6 RD– 6 7 Not used 7 8 Not used 8 RD– * The 9160 can also accept 48 VDC power bias on the data line pairs (1,2) and (3,6) from such systems providing power over Ethernet.
APPENDIX C CONFIGURING SECURITY SETTINGS ON WIRELESS CLIENTS C.1 Network Infrastructure And Choosing Between Built-in Or External Authentication Server. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . C-4 C.1.1 Using The Built-in Authentication Server (EAP-PEAP) . . . . . .C-4 C.1.2 Using An External RADIUS Server With EAP-TLS Certificates Or EAP-PEAP . . . . . . . . . . . . . . . . . . . . . . . . . . . . .C-4 C.2 Make Sure The Wireless Client Software Is Up-to-Date . . . . . . . . . .
Appendix C: Configuring Security Settings On Wireless Clients Typically, users will configure security on their wireless clients for access to many different networks (access points). The list of “Available Networks” will change depending on the location of the client and which APs are online and detectable in that location.
Appendix C: Configuring Security Settings On Wireless Clients Network Infrastructure And Choosing Between Built-in Or External Authentication Server C.
Appendix C: Configuring Security Settings On Wireless Clients Make Sure The Wireless Client Software Is Up-to-Date • “IEEE 802.1x Client Using EAP/TLS Certificate” on page C-14. • “WPA/WPA2 Enterprise (RADIUS) Client Using EAP-TLS Certificate” on page C-23. • “Configuring An External RADIUS Server To Recognize The 9160 Wireless Gateway” on page C-30. • “Obtaining A TLS-EAP Certificate For A Client” on page C-34.
Appendix C: Configuring Security Settings On Wireless Clients Accessing The Microsoft Windows Wireless Client Security Settings • From the Network Tasks menu on the left, click View Network Connections to bring up the Network Connections window. • Select the Wireless Network Connection you want to configure, rightmouse click and choose View available wireless networks.
Appendix C: Configuring Security Settings On Wireless Clients Configuring A Client To Access An Unsecure Network (Plain-text Mode) Use this dialog for configuring all the different types of client security described in the following sections. Make sure that the Wireless Network Properties dialog you are working in pertains to the Network Name (SSID) for the network you want to reach on the wireless client you are configuring. C.
Appendix C: Configuring Security Settings On Wireless Clients Configuring Static WEP Security On A Client To configure the client to not use any security, bring up the client Network Properties dialog, and configure the following settings. Set Network Authentication to Open Set Data Encryption to Disabled Network Authentication Open Data Encryption Disabled Table C.1 Association Settings C.
Appendix C: Configuring Security Settings On Wireless Clients Configuring Static WEP Security On A Client If you configured the 9160 Wireless Gateway to use Static WEP security mode . . . . . . then configure WEP security on each client as follows.
Appendix C: Configuring Security Settings On Wireless Clients Configuring Static WEP Security On A Client Network Authentication Open or Shared, depending on how you configured this option on the access point. Note: When the Authentication Algorithm on the access point is set to Both, clients set to either Shared or Open can associate with the AP. Clients configured to use WEP in Shared mode must have a valid WEP key in order to associate with the AP.
Appendix C: Configuring Security Settings On Wireless Clients Configuring IEEE 802.1x Security On A Client C.6 Configuring IEEE 802.1x Security On A Client IEEE 802.1x is the standard defining port-based authentication and infrastructure for doing key management. Extensible Authentication Protocol (EAP) messages are sent over an IEEE 802.11 wireless network using a protocol called EAP Encapsulation Over LANs (EAPOL). IEEE 802.1x provides dynamically-generated keys that are periodically refreshed.
Appendix C: Configuring Security Settings On Wireless Clients IEEE 802.1x Client Using EAP/PEAP If you configured the 9160 Wireless Gateway to use IEEE 802.1x security mode . . . . . . then configure IEEE 802.1x security with PEAP authentication on each client as follows: Choose Open Choose WEP Data Encryption mode Enable (click to check) IEEE 8021x authentication . . .
Appendix C: Configuring Security Settings On Wireless Clients IEEE 802.1x Client Using EAP/PEAP Disable (click to uncheck) Validate server certificate Choose Secured password (EAP-MSCHAP v2) . . . then click Configure Disable (click to uncheck) option to automatically use Windows logon name and password 4 3 1. Configure the following settings on the Association tab on the Network Properties dialog.
Appendix C: Configuring Security Settings On Wireless Clients IEEE 802.1x Client Using EAP/TLS Certificate 3. Click Properties to bring up the Protected EAP Properties dialog and configure the following settings. Disable this option (click to uncheck the box). Validate Server Certificate Note: This example assumes you are using the Built-in Authentication server on the AP.
Appendix C: Configuring Security Settings On Wireless Clients IEEE 802.1x Client Using EAP/TLS Certificate Some good starting points available on the Web for the Microsoft Windows PKI software are: “How to Install/Uninstall a Public Key Certificate Authority for Windows 2000” at http://support.microsoft.com/default.aspx?scid=kb;en-us;231881 , and “How to Configure a Certificate Server” at http://support.microsoft.com/default.aspx?scid=kb;en-us;318710#3.
Appendix C: Configuring Security Settings On Wireless Clients IEEE 802.1x Client Using EAP/TLS Certificate If you configured the 9160 Wireless Gateway to use IEEE 802.1x security mode with an external RADIUS server . . . . . . then configure IEEE 802.
Appendix C: Configuring Security Settings On Wireless Clients IEEE 802.1x Client Using EAP/TLS Certificate Enable (click to check) Validate server certificate Select (check) the name of certificate on this client (downloaded from RADIUS server in a prerequisite procedure) 3 1. Configure the following settings on the Association tab on the Network Properties dialog.
Appendix C: Configuring Security Settings On Wireless Clients Configuring WPA/WPA2 Enterprise (RADIUS) Security On A Client 3. Click Properties to bring up the Smart Card or other Certificate Properties dialog and enable the Validate server certificate option. Validate Server Certificate Enable this option (click to check the box). Certificates In the certificate list shown, select the certificate for this client. Table C.
Appendix C: Configuring Security Settings On Wireless Clients WPA/WPA2 Enterprise (RADIUS) Client Using EAP/PEAP The 9160 Wireless Gateway Built-in Authentication Server supports Protected Extensible Authentication Protocol (EAP) known as “EAP/PEAP” and Microsoft Challenge Handshake Authentication Protocol Version 2 (MSCHAP V2), which provides authentication for point-to-point (PPP) connections between a Windowsbased computer and network devices such as access points.
Appendix C: Configuring Security Settings On Wireless Clients WPA/WPA2 Enterprise (RADIUS) Client Using EAP/PEAP If you configured the 9160 Wireless Gateway to use WPA/WPA2 Enterprise (RADIUS) security mode and to use either the Built-in Authentication Server or an external RADIUS server that uses EAP/PEAP . . .
Appendix C: Configuring Security Settings On Wireless Clients WPA/WPA2 Enterprise (RADIUS) Client Using EAP/PEAP First set up user accounts on the access point (Cluster, User Management). . . . . . . then configure WPA security with PEAP authentication on each client as follows. Choose WPA 1 Choose either TKIP or AES for the Data Encryption mode Choose Protected EAP (PEAP) . . .
Appendix C: Configuring Security Settings On Wireless Clients WPA/WPA2 Enterprise (RADIUS) Client Using EAP/PEAP Disable (click to uncheck) Validate server certificate Choose Secured password (EAP-MSCHAP v2) . . . then click Configure Disable (click to uncheck) this option 3 4 1. Configure the following settings on the Association and Authentication tabs on the Network Properties dialog.
Appendix C: Configuring Security Settings On Wireless Clients WPA/WPA2 Enterprise (RADIUS) Client Using EAP-TLS Certificate 3. Click Properties to bring up the Protected EAP Properties dialog and configure the following settings. Validate Server Certificate Disable this option (click to uncheck the box). Select Authentication Method Choose Secured password (EAP-MSCHAP v2). Note: This example assumes you are using the Built-in Authentication server on the AP.
Appendix C: Configuring Security Settings On Wireless Clients WPA/WPA2 Enterprise (RADIUS) Client Using EAP-TLS Certificate ing a Certificate Authority (CA), server configured on your network. It is beyond the scope of this document to describe these configuration of the RADIUS server, PKI, and CA server. Consult the documentation for those products.
Appendix C: Configuring Security Settings On Wireless Clients WPA/WPA2 Enterprise (RADIUS) Client Using EAP-TLS Certificate If you configured the 9160 Wireless Gateway to use WPA/WPA2 Enterprise (RADIUS) security mode with an external RADIUS server . . . . . . then configure WPA security with certificate authentication on each client as follows. Choose WPA 1 Choose Smart Card or other Choose either TKIP or AES for the Certificate and enable Authenticate Data Encryption mode as computer .... . . .
Appendix C: Configuring Security Settings On Wireless Clients WPA/WPA2 Enterprise (RADIUS) Client Using EAP-TLS Certificate Enable (click to check) Validate server certificate Select (check) the name of certificate on this client (downloaded from RADIUS server in a prerequisite procedure) 3 1. Configure the following settings on the Association tab on the Network Properties dialog. Network Authentication WPA Data Encryption TKIP or AES depending on how this option is configured on the access point.
Appendix C: Configuring Security Settings On Wireless Clients Configuring WPA/WPA2 Personal (PSK) Security On A Client 3. Click Properties to bring up the Smart Card or other Certificate Properties dialog and enable the Validate server certificate option. Validate Server Certificate Enable this option (click to check the box). Certificates In the certificate list shown, select the certificate for this client. Table C.
Appendix C: Configuring Security Settings On Wireless Clients Configuring WPA/WPA2 Personal (PSK) Security On A Client If you configured the 9160 Wireless Gateway to use WPA/WPA2 Personal (PSK) security mode . . . . . . then configure WPA/WPA2 Personal (PSK) security on each client as follows. Choose WPA-PSK Choose either TKIP or AES for the Data Encryption mode Enter a network key that matches the one specified on the access point (and confirm by re-typing).
Appendix C: Configuring Security Settings On Wireless Clients Configuring WPA/WPA2 Personal (PSK) Security On A Client Network Authentication WPA-PSK Data Encryption TKIP or AES depending on how this option is configured on the access point. Note: When the Cipher Suite on the access point is set to “Both”, then TKIP clients with a valid TKIP key and AES clients with a valid CCMP (AES) key can associate with the access point. For more information, see Online Help on the access point.
Appendix C: Configuring Security Settings On Wireless Clients Configuring An External RADIUS Server To Recognize The 9160 Wireless Gateway C.9 Configuring An External RADIUS Server To Recognize The 9160 Wireless Gateway An external Remote Authentication Dial-in User Server (RADIUS) running on the network can support EAP-TLS smart card/certificate distribution to clients in a Public Key Infrastructure (PKI), as well as EAP-PEAP user account setup and authentication.
Appendix C: Configuring Security Settings On Wireless Clients Configuring An External RADIUS Server To Recognize The 9160 Wireless Gateway Note: The RADIUS server is identified by its IP address and UDP port numbers for the different services it provides. On the current release of the 9160 Wireless Gateway, the RADIUS server User Datagram Protocol (UDP) ports used by the access point are not configurable.
Appendix C: Configuring Security Settings On Wireless Clients Configuring An External RADIUS Server To Recognize The 9160 Wireless Gateway 1. Log on to the system hosting your RADIUS server and bring up the Internet Authentication Service. 2. In the left panel, right click on RADIUS Clients node and choose New, Radius Client from the popup menu. 3.
Appendix C: Configuring Security Settings On Wireless Clients Configuring An External RADIUS Server To Recognize The 9160 Wireless Gateway 4. For the Shared secret enter the RADIUS Key you provided to the access point (on the Advanced, Security page). Re-type the key to confirm.
Appendix C: Configuring Security Settings On Wireless Clients Obtaining A TLS-EAP Certificate For A Client 5. Click Finish. The access point is now displayed as a client of the Authentication Server. C.10 Obtaining A TLS-EAP Certificate For A Client Note: If you want to use IEEE 802.
Appendix C: Configuring Security Settings On Wireless Clients Obtaining A TLS-EAP Certificate For A Client Wireless clients configured to use either “WPA/WPA2 Enterprise (RADIUS)” or “IEEE 802.1x” security modes with an external RADIUS server that supports TLSEAP certificates must obtain a TLS certificate from the RADIUS server. This is an initial one-time step that must be completed on each client that uses either of these modes with certificates.
Appendix C: Configuring Security Settings On Wireless Clients Obtaining A TLS-EAP Certificate For A Client The Welcome screen for the Certificate Server is displayed in the browser. 3. Click Request a certificate to get the logon prompt for the RADIUS server. 4. Provide a valid user name and password to access the RADIUS server. Note: The user name and password you need to provide here is for access to the RADIUS server, for which you will already have user accounts configured at this point.
Appendix C: Configuring Security Settings On Wireless Clients Obtaining A TLS-EAP Certificate For A Client 5. Click User Certificate on the next page displayed. 6. Click Yes on the dialog displayed to install the certificate. 7. Click Submit to complete and click Yes to confirm the submittal on the popup dialog.
Appendix C: Configuring Security Settings On Wireless Clients Obtaining A TLS-EAP Certificate For A Client 8. Click Install this certificate to install the newly issued certificate on your client station. (Also, click Yes on the popup windows to confirm the install and to add the certificate to the Root Store.) A success message is displayed indicating the certificate is now installed on the client.
APPENDIX D TROUBLESHOOTING D.1 Wireless Distribution System (WDS) Problems And Solutions . . . . . . D-3 D.2 Cluster Recovery . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . D-4 D.2.1 Reboot Or Reset Access Point . . . . . . . . . . . . . . . . . . D-4 D.2.2 Stop Clustering And Reset Each Access Point In The Cluster . .
Appendix D: Troubleshooting Wireless Distribution System (WDS) Problems And Solutions This section provides information about how to solve common problems you might encounter in the course of updating network configurations on networks served by multiple, clustered access points. D.1 Wireless Distribution System (WDS) Problems And Solutions If you are having trouble configuring a WDS link, be sure you have read the notes and cautions in “Configuring WDS Settings” on page 190.
Appendix D: Troubleshooting Cluster Recovery Any two access points can be connected by only a single path; either a WDS bridge (wireless) or an Ethernet connection (wired), but not both. Do not create “backup” links. If you can trace more than one path between any pair of APs going through any combination of Ethernet or WDS links, you have a loop. You can only extend or bridge either the Internal or Guest network but not both. D.
Appendix D: Troubleshooting Stop Clustering And Reset Each Access Point In The Cluster D.2.2 Stop Clustering And Reset Each Access Point In The Cluster If the previous reboot or reset methods do not solve the problem, do the following to stop clustering and reset all APs. 1. Stop clustering on each access point in the cluster. To do this, enter the Stop Clustering URL in the address bar of your Web browser as follows: http://IPAddressOfAccessPoint/stop_clustering.
Appendix D: Troubleshooting Stop Clustering And Reset Each Access Point In The Cluster 2. Reset each access point. To do this, go to the Administration Web pages of the access point you want to reset by entering its URL into the address bar of your Web browser: http://IPAddressOfAccessPoint/ Where IPAddres0sOfAccessPoint is the IP address of the access point you want to reset. On the Administration UI left-hand tabs, click Advanced, Reset Configuration to bring up the Reset page.
Appendix D: Troubleshooting Stop Clustering And Reset Each Access Point In The Cluster 3. Refresh the cluster view as follows. On the Administration Web pages for any one of the access points, click Cluster, Access Points to bring up the Access Points cluster management page and click the Refresh button. At this point you should see all previous cluster members displayed in the list. Before proceeding to the last step, verify that the cluster has reformed by making sure all access points are listed.
APPENDIX E GLOSSARY 0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 0-9 802 IEEE 802 (IEEE Std. 802-2001) is a family of standards for peer-to-peer communication over a LAN. These technologies use a shared-medium, with information broadcast for all stations to receive. The basic communications capabilities provided are packet-based. The basic unit of transmission is a sequence of data octets (8-bits), which can be of any length within a range that is dependent on the type of LAN.
Appendix E: Glossary 802.3 802.3 IEEE 802.3 (IEEE Std. 802.3-2002) defines the MAC layer for networks that use CSMA/CA. Ethernet is an example of such a network. 802.11 IEEE 802.11 (IEEE Std. 802.11-1999) is a medium access control (MAC) and physical layer (PHY) specification for wireless connectivity for fixed, portable, and moving stations within a local area. It uses direct sequence spread spectrum (DSSS) in the 2.4 GHz ISM band and supports raw data rates of 1 and 2 Mbps.
Appendix E: Glossary 802.11d 802.11d IEEE 802.11d defines standard rules for the operation of IEEE 802.11 wireless LANs in any country without reconfiguration. PHY requirements such as provides frequency hopping tables, acceptable channels, and power levels for each country are provided. Enabling support for IEEE 802.11d on the access point causes the AP to broadcast which country it is operating in as a part of its beacons. Client stations then use this information.
Appendix E: Glossary 802.11k enhancements to the MAC Layer to counter the some of the weaknesses of WEP. It incorporates stronger encryption techniques than the original Wi-Fi Protected Access (WPA), such as Advanced Encryption Standard (AES). The original WPA, which can be considered a subset of 802.11i, uses Temporal Key Integrity Protocol (TKIP) for encryption. WPA2 is backwards-compatible with products that support the original WPA IEEE 802.11i / WPA2 was finalized and ratified in June of 2004. 802.
Appendix E: Glossary Ad hoc Mode When one access point is connected to wired network and supports a set of wireless stations, it is referred to as a basic service set (BSS). An extended service set (ESS) is created by combining two or more BSSs. Ad hoc Mode Ad hoc mode is a Wireless Networking Framework in which stations communicate directly with each other. It is useful for quickly establishing a network in situations where formal infrastructure is not required.
Appendix E: Glossary Bridge • The Beacon interval defines the amount of time between transmitting beacon frames. Before entering power save mode, a station needs the beacon interval to know when to wake up to receive the beacon. • The Capability Information lists requirements of stations that want to join the WLAN. For example, it indicates that all stations must use WEP. • The Service Set Identifier (SSID). • The Basic Rate Set is a bitmap that lists the rates that the WLAN supports.
Appendix E: Glossary BSS BSS A basic service set (BSS) is an Infrastructure Mode Wireless Networking Framework with a single access point. Also see extended service set (ESS) and independent basic service set (IBSS). BSSID In Infrastructure Mode, the Basic Service Set Identifier (BSSID) is the 48-bit MAC address of the wireless interface of the Access Point. C CCMP Counter mode/CBC-MAC Protocol (CCMP) is an encryption method for 802.11i that uses AES.
Appendix E: Glossary CSMA/CA Telecommunications Standards Institute (ETSI), the Korean Communications Commission, or the Telecom Engineering Center (TELEC). CSMA/CA Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA) is a low-level network arbitration/contention protocol. A station listens to the media and attempts to transmit a packet when the channel is quiet. When it detects that the channel is idle, the station transmits the packet.
Appendix E: Glossary DHCP DHCP The Dynamic Host Configuration Protocol (DHCP) is a protocol specifying how a central server can dynamically provide network configuration information to clients. A DHCP server “offers” a “lease” (for a pre-configured period of time—see Lease Time) to the client system. The information supplied includes the client's IP addresses and netmask plus the address of its DNS servers and Gateway.
Appendix E: Glossary DTIM DTIM The Delivery Traffic Information Map (DTIM) message is an element included in some Beacon frames. It indicates which stations, currently sleeping in low-power mode, have data buffered on the Access Point awaiting pick-up. Part of the DTIM message indicates how frequently stations must check for buffered data. Dynamic IP Address See IP Address.
Appendix E: Glossary Ethernet Ethernet Ethernet is a local-area network (LAN) architecture supporting data transfer rates of 10 Mbps to 1 Gbps. The Ethernet specification is the basis for the IEEE 802.3 standard, which specifies the physical and lower software layers. It uses the CSMA/CA access method to handle simultaneous demands. Ethernet supports data rates of 10 Mbps, Fast Ethernet supports 100 Mbps, and Gigabit Ethernet supports 1 Gbps.
Appendix E: Glossary Gateway source and destination MAC address, a control field with protocol version, frame type, frame sequence number, frame body (with the actual information to be transmitted) and frame check sequence for error detection. A Frame is similar in concept to a Packet, the difference being that a packet operates on the Network layer (layer 3 in the OSI model) whereas a frame operates on the Data-Link layer (layer 2 in the OSI model).
Appendix E: Glossary HTTP HTTP The Hypertext Transfer Protocol (HTTP) defines how messages are formatted and transmitted on the World Wide Web. An HTTP message consists of a URL and a command (GET, HEAD, POST, etc.), a request followed by a response. I IAPP The Inter Access Point Protocol (IAPP) is an IEEE standard (802.11f) that defines communication between the access points in a “distribution system”.
Appendix E: Glossary Intrusion Detection Intrusion Detection The Intrusion Detection System (IDS) inspects all inbound network activity and reports suspicious patterns that may indicate a network or system attack from someone attempting to break into the system. It reports access attempts using unsupported or known insecure protocols. IP The Internet Protocol (IP) specifies the format of packets, also called datagrams, and the addressing scheme.
Appendix E: Glossary IPSec A Dynamic IP Address is an IP address that is automatically assigned to a host by a DHCP server or similar mechanism. It is called dynamic because you may be assigned a different IP address each time you establish a connection. A Static IP Address is an IP address that is hard-wired for a specific host. A static address is usually required for any host that is running a server, for example, a Web server.
Appendix E: Glossary Latency L Latency Latency, also known as delay, is the amount of time it takes to transmit a Packet from sender to receiver. Latency can occur when data is transmitted from the access point to a client and vice versa. It can also occur when data is transmitted from access point to the Internet and vice versa. Latency is caused by fixed network factors such as the time it takes to encode and decode a packet, and also by variable network factors such as a busy or overloaded network.
Appendix E: Glossary LLC LLC The Logical Link Control (LLC) layer controls frame synchronization, flow control, and error checking. It is a higher level protocol over the PHY layer, working in conjunction with the MAC layer. M MAC The Media Access Control (MAC) layer handles moving data packets between NICs across a shared channel. It is a higher level protocol over the PHY layer. It provides an arbitration mechanism in an attempt to prevent signals from colliding.
Appendix E: Glossary MTU MTU The Maximum Transmission Unit is the largest physical packet size, measured in bytes, that a network can transmit. Any messages larger than the MTU are fragmented into smaller packets before being sent. Multicast A Multicast sends the same message to a select group of recipients. Sending an email message to a mailing list is an example of multicasting.
Appendix E: Glossary NIC NIC A Network Interface Card is an adaptor or expansion board inserted into a computer to provide a physical connection to a network. Most NICs are designed for a particular type of network, protocol, and media, for example, Ethernet or wireless. NTP The Network Time Protocol assures accurate synchronization of the system clocks in a network of computers. NTP servers transmit Coordinated Universal Time (UTC, also known as Greenwich Mean Time) to their client systems.
Appendix E: Glossary Packet • Layer 5, the Session layer, defines protocols for initiating, maintaining, and ending communication and transactions across the network. Some common examples of protocols that operate on this layer are network file system (NFS) and structured query language (SQL).
Appendix E: Glossary PID hardware means of sending and receiving data on a medium, including defining cables, NICs, and physical aspects. Ethernet and the 802.11 family are protocols with physical layer components. PID The Process Identifier (PID) is an integer used by Linux to uniquely identify a process. A PID is returned by the fork() system call. It can be used by wait() or kill() to perform actions on the given process.
Appendix E: Glossary PSK server. Proxy servers have two main purposes: improve performance by spreading requests over several machines and filter requests to prevent access to specific servers or services. PSK Pre-Shared Key (PSK), see Shared Key. Public Key A public key is used in public key cryptography to encrypt a message which can only be decrypted with the recipient's private or secret key.
Appendix E: Glossary RC4 RC4 A symmetric stream cipher provided by RSA Security. It is a variable key-size stream cipher with byte-oriented operations. It allows keys up to 2048 bits in length. Roaming In IEEE 802.11 parlance, roaming clients are mobile client stations or devices on a wireless network (WLAN) that require use of more than one Access Point (AP) as they move out of and into range of different base station service areas. IEEE 802.
Appendix E: Glossary RTS RTP typically runs on top of the UDP protocol, but can support other transport protocols as well. RTS A request to send (RTS) message is a signal sent by a client station to the access point, asking permission to send a data packet and to prevent other wireless client stations from grabbing the radio waves. This message is a part of the IEEE 802.11 CSMA/CA protocol. (See also RTS Threshold and CTS.
Appendix E: Glossary Static IP Address Static IP Address See IP Address. STP The Spanning Tree Protocol (STP) an IEEE 802.1 standard protocol (related to network management) for MAC bridges that manages path redundancy and prevents undesirable loops in the network created by multiple active paths between client stations. Loops occur when there multiple routes between access points.
Appendix E: Glossary Supported Rate Set Supported Rate Set The supported rate set defines the transmission rates that are available on this wireless network. A station may be able to receive data at any of the rates listed in this set. All stations must be able to receive data at the rates listed in the Basic Rate Set. T TCP The Transmission Control Protocol (TCP) is built on top of Internet Protocol (IP).
Appendix E: Glossary ToS ToS TCP/IP packet headers include a 3-to-5 bit Type of Service (ToS) field set by the application developer that indicates the appropriate type of service for the data in the packet. The way the bits are set determines whether the packet is queued for sending with minimum delay, maximum throughput, low cost, or mid-way “best-effort” settings depending upon the requirements of the data.
Appendix E: Glossary VLAN document (possibly stored on another computer). The first part of the URL indicates what protocol to use and the second part specifies the IP address or the domain name where that resource is located. For example, ftp://ftp.devicescape.com/downloads/myfile.tar.gz specifies a file that should be fetched using the FTP protocol; http://www.devicescape.com/index.html specifies a Web page that should be fetched using the HTTP protocol.
Appendix E: Glossary WDS WDS A Wireless Distribution System (WDS) allows the creation of a completely wireless infrastructure. Typically, an Access Point is connected to a wired LAN. WDS allows access points to be connected wirelessly. The access points can function as wireless repeaters or bridges. WEP Wired Equivalent Privacy (WEP) is a data encryption protocol for 802.11 wireless networks.
Appendix E: Glossary WLAN WLAN Wireless Local Area Network (WLAN) is a LAN that uses high-frequency radio waves rather than wires to communicate between its nodes. WMM Wireless Multimedia (WMM) is a IEEE technology standard designed to improve the quality of audio, video and multimedia applications on a wireless network. Both access points and wireless clients (laptops, consumer electronics products) can be WMM-enabled. WMM features are based on is a subset of the WLAN IEEE 802.11e draft specification.
Appendix E: Glossary WRAP WRAP Wireless Robust Authentication Protocol (WRAP) is an encryption method for 802.11i that uses AES but another encryption mode (OCB) for encryption and integrity. X XML The Extensible Markup Language (XML) is a specification developed by the W3C. XML is a simple, flexible text format derived from Standard Generalized Markup Language (SGML), which is defined in ISO 8879:1986, designed especially for electronic publishing.
INDEX A beacon interval, configuring 157 bridges, WDS 187 broadcast modes 7 access point administrator password 201 clustering 56 configuration policy 50 ethernet (wired) settings 97 guest network 141 load balancing 165 MAC filtering 161 monitoring 205 QoS 171 radio 153 security 113 standalone 58 time protocol 197 user management 65 WDS bridging 185 wireless settings 105 administrator password 203 on Basic Settings 49 C platform 26 ANSI, connecting terminals 20 antenna requirements 17, 18 approvals xvi
Index security 60 size 56 size and membership 59 troubleshooting D-4 types of access points supported 56 understanding 56 cluster neighbors 91 configuration policy setting 50 connecting ANSI compatible terminals 20 console 20 Ethernet 19 video display terminal 20 connectors RJ-45 B-3 console port cable No.
Index configuring 157 IEEE 802.
Index connections 34 requirements 16, 230 Power Over Ethernet specifications 230 processor 230 progress bar for cluster auto-synch 60 comparison of modes 116 configuring on the access point 124 configuring on wireless clients C-1 features overview 9 IEEE 802.
Index transmit power, configuring 157 troubleshooting startup problems 44 Turbo broadcast mode, not recommended client configuration C-27 configuring 133 when to use 119 8 U 10BaseT Ethernet 19, B-3 100BaseT Ethernet 19, B-3 upgrading the firmware 219 user accounts backing up and restoring 71 for built-in authentication server 65 user authentication configuring on IEEE 802.