Wireless Array The Command Line Interface This section covers the commands and the command structure used by the Wireless Array’s Command Line Interface (CLI), and provides a procedure for establishing an SSH connection to the Array. Topics discussed include: “Establishing a Secure Shell (SSH) Connection” on page 377. “Getting Started with the CLI” on page 379. “Top Level Commands” on page 381. “Configuration Commands” on page 390. “Sample Configuration Tasks” on page 426.
Wireless Array network administrator assign a reserved address to the Array for ease of access in the future. 2. • If the network does not use DHCP, use the factory default address 10.0.2.1 to access either the Gigabit 1 or Gigabit 2 Ethernet port. You may need to change the IP address of the port on your computer that is connected to the Array — change that port’s IP address so that it is on the same 10.0.2.xx subnet as the Array port.
Wireless Array Getting Started with the CLI The root command prompt (Root Command Prompt) is the first prompt you see after logging in to the CLI. If you are at a level other than the root command prompt you can return to this prompt at any time by using the exit command to step back through each command prompt level. The root command prompt you see in the CLI window is determined by the host name you assigned to your Array.
Wireless Array ? Command This command is available at any prompt and provides either FULL or PARTIAL help. Using the ? (question mark) command when you are ready to enter an argument will display all the possible arguments (full help). Partial help is provided when you enter an abbreviated argument and you want to know what arguments will match your input. Figure 186.
Wireless Array Top Level Commands This section offers an at-a-glance view of all top level commands — organized alphabetically. Top level commands are defined here as commands that are directly accessible from the root command prompt (Xirrus_Wi-Fi_Array#). The root command prompt is based on the host name assigned to your Array. When inputting commands, be aware that all commands are case-sensitive.
Wireless Array Command show Description Display information about the selected item. See “show Commands” on page 385. statistics Display statistical data about the Array. See “statistics Commands” on page 388. uptime Display the elapsed time since the last boot. configure Commands The following table shows the second level commands that are available with the top level configure command [Xirrus_Wi-Fi_Array(config)#].
Wireless Array Command Description filter Define protocol filter parameters. group Define user groups with parameter settings help Description of the interactive Help system. history List history of commands that have been executed. hostname Host name for this Array. interface Select the interface to configure. load location management more netflow no quit radius-server reboot Load running configuration from flash Location name for this Array.
Wireless Array Command show Display current information about the selected item. snmp Enable, disable or configure SNMP. ssid statistics 384 Description Configure the SSID parameters. Display statistics. syslog Enable, disable or configure the Syslog Server. uptime Display time since the last boot. vlan Configure VLAN parameters. wifi-tag Configure VLAN parameters.
Wireless Array show Commands The following table shows the second level commands that are available with the top level show command [Xirrus_Wi-Fi_Array# show]. Command acl admin Description Display the Access Control List. Display the administrator list or login information. array-info Display system information. associatedstations Display stations that have associated to the Array. boot-env capabilities cdp channel-list Display Boot loader environment variables.
Wireless Array Command error-numbers ethernet Display the detailed error number in error messages. Display Ethernet interface summary information. external-radius Display summary information for the external RADIUS server settings. factory-config Display the Array factory configuration information. filters iap Display filter information. Display IAP configuration information. internal-radius Display the users defined for the embedded RADIUS server.
Wireless Array Command spanning-tree spectrumanalyzer ssid Description Display spanning tree information. Display spectrum analyzer measurements. Display SSID summary information. stations Display station information. statistics Display statistics. syslog Display the system log. syslog-settings Display the system log (Syslog) settings. temperature Display the current board temperatures. unassociatedstations Display unassociated station information. vlan Display VLAN information.
Wireless Array statistics Commands The following table shows the second level commands that are available with the top level statistics command [Xirrus_Wi-Fi_Array# statistics]. Command ethernet Ethernet Name eth0, gig1, gig2 filter filter-list iap 388 Description Display statistical data for all Ethernet interfaces. Display statistical data for the defined Ethernet interface (either eth0, gig1 or gig2). FORMAT: statistics gig1 Display statistics for defined filters (if any).
Wireless Array Command Description wds Display statistical data for the defined active WDS (Wireless Distribution System) links. FORMAT: statistics wds 1 Display configuration or status information.
Wireless Array Configuration Commands All configuration commands are accessed by using the configure command at the root command prompt (Xirrus_Wi-Fi_Array#). This section provides a brief description of each command and presents sample formats where deemed necessary. The commands are organized alphabetically. When inputting commands, be aware that all commands are case-sensitive.
Wireless Array admin The admin command [Xirrus_Wi-Fi_Array(config-admin)#] is used to configure the Administrator List. Command Description add Add a user to the Administrator List. FORMAT: admin add [userID] del Delete a user to the Administrator List. FORMAT: admin del [userID] edit Modify user in the Administrator List. FORMAT: admin edit [userID] radius reset Define a RADIUS server to be used for authenticating administrators.
Wireless Array cdp The cdp command [Xirrus_Wi-Fi_Array(config)# cdp] is used to configure the Cisco Discovery Protocol. Command 392 Description disable Disable the Cisco Discovery Protocol FORMAT: cdp disable enable Enable the Cisco Discovery Protocol FORMAT: cdp enable hold-time Select CDP message hold time before messages received from neighbors expire. FORMAT: cdp hold-time [# seconds] interval The Array sends out CDP announcements at this interval.
Wireless Array clear The clear command [Xirrus_Wi-Fi_Array(config)# clear] is used to clear requested elements. Command authentication Description Deauthenticate a station. FORMAT: clear station [authenticated station] history Clear the history of CLI commands executed. FORMAT: clear history screen Clear the screen where you’re viewing CLI output. FORMAT: clear syslog statistics Clear the statistics for a requested interface.
Wireless Array cluster The cluster command [Xirrus_Wi-Fi_Array(config)# cluster] is used to create and operate clusters. Clusters allow you to configure multiple Arrays at the same time. Using CLI (or WMI), you may define a set of Arrays that are members of the cluster. Then you may switch the Array to Cluster operating mode for a selected cluster, which sends all successive configuration commands issued via CLI or WMI to all of the member Arrays.
Wireless Array Command operate reset Description Enter Cluster operation mode. All configuration commands are applied to all of the selected cluster’s member Arrays until you give the end command (see above). FORMAT: cluster operate [cluster-name] Delete all clusters. FORMAT: cluster reset contact-info The contact-info command [Xirrus_Wi-Fi_Array(config)# contact-info] is used for managing administrator contact information.
Wireless Array date-time The date-time command [Xirrus_Wi-Fi_Array(config-date-time)#] is used to configure the date and time parameters. Your Array supports the Network Time Protocol (NTP) in order to ensure that the Array’s internal time is accurate. NTP is set to UTC time by default; however, you can set the time zone so that your Array will display local time. This is done by defining an offset from the UTC value.
Wireless Array dhcp-server The dhcp-server command [Xirrus_Wi-Fi_Array(config-dhcp-server)#] is used to add, delete and modify DHCP pools. Command Description add Add a DHCP pool. FORMAT: dhcp-server add [dhcp pool] del Delete a DHCP pool. FORMAT: dhcp-server del [dhcp pool] edit Edit a DHCP pool FORMAT: dhcp-server edit [dhcp pool] reset Delete all DHCP pools.
Wireless Array dns The dns command [Xirrus_Wi-Fi_Array(config-dns)#] is used to configure your DNS parameters. Command 398 Description domain Enter your domain name. FORMAT: dns domain [www.mydomain.com] server1 Enter the IP address of the primary DNS server. FORMAT: dns server1 [1.2.3.4] server2 Enter the IP address of the secondary DNS server. FORMAT: dns server1 [2.3.4.5] server3 Enter the IP address of the tertiary DNS server. FORMAT: dns server1 [3.4.5.
Wireless Array file The file command [Xirrus_Wi-Fi_Array(config-file)#] is used to manage files. Command active-image backup-image check-image chkdsk copy cp dir erase format Description Validate and commit a new array software image. Validate and commit a new backup software image. Validate a new array software image. Check flash file system. Copy a file to another file. FORMAT: file copy [sourcefile destinationfile] List the contents of a directory.
Wireless Array Command Description remote-config When the Array boots up, it fetches the specified configuration file from the TFTP server defined in the file remote-server command, and uses this configuration. This must be an Array configuration file with a .conf extension. A partial configuration file may be used. For instance, if you wish to use a single configuration file for all of your Arrays but don't want to have the same IP address for each Array, you may remove the ipaddr line from the file.
Wireless Array Command Description scp Copy a file to or from a remote system. You may specify the port to use. tftp Open a TFTP connection with a remote server. FORMAT: file tftp host { |} [port ] [user {anonymous | password } ] { put [] | get [] } Note: Any time you transfer any kind of software image file for the Array, it must be transferred in binary mode, or the file may be corrupted.
Wireless Array filter The filter command [Xirrus_Wi-Fi_Array(config-filter)#] is used to manage protocol filters and filter lists. Command add add-list del del-list edit 402 Description Add a filter. Details about the air cleaner feature are after the end of this table. FORMAT: filter add [air-cleaner |name] Add a filter list. FORMAT: filter add-list [name] Delete a filter. FORMAT: filter del [name] Delete a filter list. FORMAT: filter del-list [name] Edit a filter.
Wireless Array Command Description off Disable a filter list. FORMAT: filter off on Enable a filter list. FORMAT: filter on reset stateful Delete all protocol filters and filter lists. FORMAT: filter reset Enable or disable stateful filtering (firewall). FORMAT: Stateful [enable | disable | on |off] Air Cleaner The air cleaner feature offers a number of predetermined filter rules that eliminate a great deal of unnecessary wireless traffic, resulting in improved performance.
Wireless Array operation. If you find that there is a particular type of multicast or broadcast traffic that you want to allow, just add a specific allow filter for it before the deny filter in this list that would normally block it. Add or delete any of the Multicast rules as necessary for a specific site. Remember that the order of the rules is important. Figure 188. Air Cleaner Filter Rules Explanations of some sample rules are below. 404 Air-cleaner-Arp.
Wireless Array Air-cleaner-Mcast.1 drops all multicast traffic with a destination MAC address starting with 01. This filters out a lot of IP multicast traffic that starts with 224. Air-cleaner-Mcast.2 drops all multicast traffic with a destination MAC address starting with 33. A lot of IPv6 traffic and other multicast traffic is blocked by this filter. Air-cleaner-Mcast.3 drops all multicast traffic with a destination MAC address starting with 09.
Wireless Array group The group command [Xirrus_Wi-Fi_Array(config)# group] is used to create and configure user groups. User groups allow administrators to assign specific network parameters to users through RADIUS privileges rather than having to map users to a specific SSID. Groups provide flexible control over user privileges without the need to create large numbers of SSIDs. For more information, see “Groups” on page 264. Command Description add Create a new user group.
Wireless Array interface The interface command [Xirrus_Wi-Fi_Array(config)# interface] is used to select the interface that you want to configure. To see a listing of the commands that are available for each interface, use the ? command at the selected interface prompt. For example, using the ? command at the Xirrus_Wi-Fi_Array(config-gig1}# prompt displays a listing of all commands for the gig1 interface. Command Description console Select the console interface.
Wireless Array load The load command [Xirrus_Wi-Fi_Array(config)# load] loads a configuration file. Command Description factory.conf Load the factory settings configuration file. FORMAT: load [factory.conf] lastboot.conf Load the configuration file from the last boot-up. FORMAT: load [lastboot.conf] [myfile].conf If you have saved a configuration, enter its name to load it. FORMAT: load [myfile.conf] saved.conf Load the configuration file with the last saved settings. FORMAT: load [saved.
Wireless Array management The management command [Xirrus_Wi-Fi_Array(config)# management] enters management mode, where you may configure management parameters. Command Description Enter management mode.
Wireless Array more The more command [Xirrus_Wi-Fi_Array(config)# more] is used to turn terminal pagination ON or OFF. Command 410 Description off Turn OFF terminal pagination. FORMAT: more off on Turn ON terminal pagination.
Wireless Array netflow The netflow command [Xirrus_Wi-Fi_Array(config-netflow)#] is used to enable or disable, or configure sending IP flow information (traffic statistics) to the collector you specify. Command Description disable Disable netflow. FORMAT: netflow disable enable Enable netflow. FORMAT: netflow enable off Disable netflow. FORMAT: netflow off on Enable netflow. FORMAT: netflow on collector Set the netflow collector IP address or fully qualified domain name (host.domain).
Wireless Array no The no command [Xirrus_Wi-Fi_Array(config)# no] is used to disable a selected element or set the element to its default value. Command acl dot11a dot11bg https Disable the Access Control List. FORMAT: no acl Disable all 802.11an IAPs (radios). FORMAT: no dot11a Disable all 802.11bgn IAPs (radios). FORMAT: no dot11bg Disable https access. FORMAT: no https intrude-detect Disable intrusion detection. FORMAT: no intrude-detect management Disable management on all Ethernet interfaces.
Wireless Array Command snmp ssh Description Disable SNMP features. FORMAT: no snmp Disable ssh access. FORMAT: no ssh syslog Disable the Syslog services. FORMAT: no syslog telnet Disable Telnet access. FORMAT: no telnet ETH-NAME Disable the selected Ethernet interface (eth0, gig1 or gig2). You cannot disable the console interface. with this command.
Wireless Array quit The quit command [Xirrus_Wi-Fi_Array(config)# quit] is used to exit the Command Line Interface. Command Description Exit the Command Line Interface. FORMAT: quit If you have made any configuration changes and your changes have not been saved, you are prompted to save your changes to Flash. At the prompt, answer Yes to save your changes, or answer No to discard your changes.
Wireless Array reboot The reboot command [Xirrus_Wi-Fi_Array(config)# reboot] is used to reboot the Array. If you have unsaved changes, the command will notify you and give you a chance to cancel the reboot. Command Description Reboot the Array. FORMAT: reboot delay Reboot the Array after a delay of 1 to 60 seconds. FORMAT: reboot delay [n] reset The reset command [Xirrus_Wi-Fi_Array(config)# reset] is used to reset all settings to their default values then reboot the Array.
Wireless Array restore The restore command [Xirrus_Wi-Fi_Array(config)# restore] is used to restore configuration to a version that was previously saved locally. 416 Command Description ? Use this to display the list of available config files. FORMAT: restore ? Enter the name of the locally saved configuration to restore.
Wireless Array run-tests The run-tests command [Xirrus_Wi-Fi_Array(run-tests)#] is used to enter runtests mode, which allows you to perform a range of tests on the Array. Command Description Enter run-tests mode. FORMAT: run-tests iperf Execute iperf utility. FORMAT: run-tests iperf kill-beacons Turn off beacons for selected single IAP. FORMAT: run-tests kill-beacons [off | iap-name] kill-proberesponses led Turn off probe responses for selected single IAP.
Wireless Array Command radius-ping Description Special ping utility to test the connection to a RADIUS server.
Wireless Array Command telnet Description Execute telnet utility. FORMAT: run-tests telnet [hostname | ip-addr] [command-line-switches (optional)] traceroute Execute traceroute utility. FORMAT: run-tests traceroute [host-name | ip-addr] security The security command [Xirrus_Wi-Fi_Array(config-security)#] is used to establish the security parameters for the Array. Command Description wep Set the WEP encryption parameters. FORMAT: security wep wpa Set the WEP encryption parameters.
Wireless Array snmp The snmp command [Xirrus_Wi-Fi_Array(config-snmp)#] is used to enable, disable, or configure SNMP. Command v2 Enable SNMP v2. FORMAT: snmp v2 v3 Enable SNMP v3. FORMAT: snmp v3 trap 420 Description Configure traps for SNMP. Up to four trap destinations may be configured, and you may specify whether to send traps for authentication failure.
Wireless Array ssid The ssid command [Xirrus_Wi-Fi_Array(config-ssid)#] is used to establish your SSID parameters. Command Description add Add an SSID. FORMAT: ssid add [newssid] del Delete an SSID. FORMAT: ssid del [oldssid] edit Edit an existing SSID. FORMAT: ssid edit [existingssid] reset Delete all SSIDs and restore the default SSID.
Wireless Array syslog The syslog command [Xirrus_Wi-Fi_Array(config-syslog)#] is used to enable, disable, or configure the Syslog server. Command console Enable or disable the display of Syslog messages on the console, and set the level to be displayed. All messages at this level and lower (i.e., more severe) will be displayed. FORMAT: syslog console [on/off] level [0-7] disable Disable the Syslog server. FORMAT: syslog disable email Disable the Syslog server.
Wireless Array Command Description off Disable the Syslog server. FORMAT: syslog off on Enable the Syslog server. FORMAT: syslog on primary secondary Set the IP address of the primary Syslog server and/or the severity level of messages to be logged. FORMAT: syslog primary [1.2.3.4] level [0-7] Set the IP address of the secondary (backup) Syslog server and/or the severity level of messages to be logged. FORMAT: syslog primary [1.2.3.
Wireless Array vlan The vlan command [Xirrus_Wi-Fi_Array(config-vlan)#] is used to establish your VLAN parameters. Command add default-route delete edit native-vlan 424 Description Add a VLAN. FORMAT: vlan add [newvlan] Assign a VLAN for the default route (for outbound management traffic). FORMAT: vlan default-route [defaultroute] Delete a VLAN. FORMAT: vlan delete [oldvlan] Modify an existing VLAN. FORMAT: vlan edit [existingvlan] Assign a native VLAN (traffic is untagged).
Wireless Array wifi-tag The wifi-tag command [Xirrus_Wi-Fi_Array(config-wifi-tag)#] is used to enable or disable Wi-Fi tag capabilities. When enabled, the Array listens for and collects information about Wi-Fi RFID tags sent on the designated channels. See also “WiFi Tag” on page 188. Command Description disable Disable wifi-tag. FORMAT: wifi-tag disable enable Enable wifi-tag. FORMAT: wifi-tag enable off Disable wifi-tag. FORMAT: wifi-tag off on Enable wifi-tag.
Wireless Array Sample Configuration Tasks This section provides examples of some of the common configuration tasks used with the Wireless Array, including: “Configuring a Simple Open Global SSID” on page 427. “Configuring a Global SSID using WPA-PEAP” on page 428. “Configuring an SSID-Specific SSID using WPA-PEAP” on page 429. “Enabling Global IAPs” on page 430. “Disabling Global IAPs” on page 431. “Enabling a Specific IAP” on page 432. “Disabling a Specific IAP” on page 433.
Wireless Array Configuring a Simple Open Global SSID This example shows you how to configure a simple open global SSID. Figure 189.
Wireless Array Configuring a Global SSID using WPA-PEAP This example shows you how to configure a global SSID using WPA-PEAP encryption in conjunction with the Array’s Internal RADIUS server. Figure 190.
Wireless Array Configuring an SSID-Specific SSID using WPA-PEAP This example shows you how to configure an SSID-specific SSID using WPAPEAP encryption in conjunction with the Array’s Internal RADIUS server. Figure 191.
Wireless Array Enabling Global IAPs This example shows you how to enable all IAPs (radios), regardless of the wireless technology they use. Figure 192.
Wireless Array Disabling Global IAPs This example shows you how to disable all IAPs (radios), regardless of the wireless technology they use. Figure 193.
Wireless Array Enabling a Specific IAP This example shows you how to enable a specific IAP (radio). In this example, the IAP that is being enabled is a1 (the first IAP in the summary list). Figure 194.
Wireless Array Disabling a Specific IAP This example shows you how to disable a specific IAP (radio). In this example, the IAP that is being disabled is a2 (the second IAP in the summary list). Figure 195.
Wireless Array Setting Cell Size Auto-Configuration for All IAPs This example shows how to set the cell size for all enabled IAPs to be autoconfigured (auto). (See “Fine Tuning Cell Sizes” on page 31.) The auto_cell option may be used with global_settings, global_a_settings, or global_bg_settings. It sets the cell size of the specified IAPs to auto, and it launches an autoconfiguration to adjust the sizes.
Wireless Array Setting the Cell Size for All IAPs This example shows you how to establish the cell size for all IAPs (radios), regardless of the wireless technology they use. Be aware that if the intrude-detect feature is enabled on the monitor radio the cell size cannot be set globally — you must first disable the intrude-detect feature on the monitor radio. In this example, the cell size is being set to small for all IAPs. You have the option of setting IAP cell sizes to small, medium, large, or max.
Wireless Array Setting the Cell Size for a Specific IAP This example shows you how to establish the cell size for a specific IAP (radio). In this example, the cell size for a2 is being set to medium. You have the option of setting IAP cell sizes to small, medium, large, or max (the default is max). See also, “Fine Tuning Cell Sizes” on page 31. Figure 198.
Wireless Array Configuring VLANs on an Open SSID This example shows you how to configure VLANs on an Open SSID. Setting the default route enables the Array to send management traffic, such as Syslog messages and SNMP information to a destination behind a router. Figure 199.
Wireless Array Configuring Radio Assurance Mode (Loopback Tests) The Array uses its built-in monitor radio to monitor other radios in the Array. Tests include sending probes on all channels and checking for a response, and checking whether beacons are received from the other radio. If a problem is detected, corrective actions are taken to recover. Loopback mode operation is described in detail in “Array Monitor and Radio Assurance Capabilities” on page 460.
Wireless Array Figure 200.
Wireless Array 440 The Command Line Interface
Wireless Array Appendices Appendices 441
Wireless Array Page is intentionally blank 442 Appendices
Wireless Array Appendix A: Quick Reference Guide This section contains product reference information. Use this section to locate the information you need quickly and efficiently. Topics include: “Factory Default Settings” on page 443. “Keyboard Shortcuts” on page 449. Factory Default Settings The following tables show the Wireless Array’s factory default settings.
Wireless Array Gigabit 1 and Gigabit 2 Setting Default Value Enabled Yes DHCP Bind Yes Default IP Address 10.0.2.1 Default IP Mask 255.255.255.0 Default Gateway None Auto Negotiate On Duplex Full Speed 1000 Mbps MTU Size 1500 Management Enabled Yes Server Settings NTP Setting Default Value Enabled No Primary time.nist.gov Secondary pool.ntp.
Wireless Array Setting Local Syslog Level Maximum Internal Records Primary Server Default Value Information 500 None Primary Syslog Level Secondary Server Secondary Syslog Level Information None Information SNMP Setting Enabled Default Value Yes Read-Only Community String xirrus_read_only Read-Write Community String xirrus Trap Host null (no setting) Trap Port 162 Authorization Fail Port On DHCP Setting Enabled Default Value No Maximum Lease Time 300 minutes Default Lease Time 300 min
Wireless Array Setting NAT Default Value Disabled IP Gateway None DNS Domain None DNS Server (1 to 3) None Default SSID Setting Default Value ID xirrus VLAN None Encryption Off Encryption Type QoS None 2 Enabled Yes Broadcast On Security Global Settings - Encryption Setting Enabled Yes WEP Keys null (all 4 keys) WEP Key Length null (all 4 keys) Default Key ID 446 Default Value 1
Wireless Array Setting Default Value WPA Enabled No TKIP Enabled Yes AES Enabled Yes EAP Enabled Yes PSK Enabled No Pass Phrase null Group Rekey Disabled External RADIUS (Global) Setting Enabled Default Value Yes Primary Server None Primary Port 1812 Primary Secret Secondary Server Secondary Port Secondary Secret Time Out (before primary server is retired) Accounting Interval xirrus null (no IP address) 1812 null (no secret) 600 seconds Disabled 300 seconds Primary Server None Pr
Wireless Array Setting Primary Secret Default Value null (no secret) Secondary Server None Secondary Port 1813 Secondary Secret null (no secret) Internal RADIUS Setting Enabled Default Value No The user database is cleared upon reset to the factory defaults. For the Internal RADIUS Server you have a maximum of 1,000 entries.
Wireless Array Setting Serial Default Value On Serial timeout 300 seconds Management over IAPs http timeout Off 300 seconds Keyboard Shortcuts The following table shows the most common keyboard shortcuts used by the Command Line Interface. Action Shortcut Cut selected data and place it on the clipboard. Ctrl + X Copy selected data to the clipboard. Ctrl + C Paste data from the clipboard into a document (at the insertion point). Ctrl + V Go to top of screen.
Wireless Array Use this Space for Your Notes 450
Wireless Array Appendix B: Technical Support This appendix provides valuable support information that can help you resolve technical difficulties. Before contacting Xirrus, review all topics below and try to determine if your problem resides with the Wireless Array or your network infrastructure.
Wireless Array The Wireless Array should only be used with Wi-Fi certified client devices. See Also Contact Information Multiple SSIDs Security VLAN Support Frequently Asked Questions This section answers some of the most frequently asked questions, organized by functional area. Multiple SSIDs Q. What Are BSSIDs and SSIDs? A. BSSID (Basic Service Set Identifier) refers to an individual access point radio and its associated clients.
Wireless Array A. The creation of different wireless network names allows system administrators to separate types of users with different requirements. The following policies can be tied to an SSID: Minimum security required to join this SSID. The wireless Quality of Service (QoS) desired for this SSID. The wired VLAN associated with this SSID.
Wireless Array 6. If desired (optional), you can select which radios this SSID will not be available on — the default is to make this SSID available on all radios. 7. Click on the Save changes to flash if you wish to make your changes permanent. 8. If you need to edit any of the SSID settings, you can do so from the SSID Management page. See Also Contact Information General Hints and Tips Security SSIDs SSID Management VLAN Support Security Q. How do I know my management session is secure? A.
Wireless Array Configuration auditing Do not change approved configuration settings. The optional Xirrus Management System (XMS) offers powerful management features for small or large Wireless Array deployments, and can audit your configuration settings automatically. In addition, using the XMS eliminates the need for an FTP server. Q. Which wireless data encryption method should I use? A. Wireless data encryption prevents eavesdropping on data being transmitted or received over the airwaves.
Wireless Array older wireless clients). Because AES is the strongest encryption standard currently available, it is highly recommended for Enterprise networks. Any of the above encryption modes can be used (and can be used at the same time). TKIP encryption does not support high throughput rates, per the IEEE 802.11n. TKIP should never be used for WDS links on XN arrays. Q. Which user authentication method should I use? A. User authentication ensures that users are who they say they are.
Wireless Array network. Access Control Lists work well when there are a limited number of users — in this case, enter the MAC addresses of each user in the Allow list. In the event of a lost or stolen MAC adapter, enter the affected MAC address in the Deny list. Q. Why do I need to authenticate my Wireless Array units? A. When deploying multiple Wireless Arrays, you may need to define which units are part of which wireless network (for example, if you are establishing more than one network).
Wireless Array VLANs are defined and implemented using the wired network switches that are VLAN capable. Packets are tagged for transmission on a particular VLAN according to the IEEE 802.1Q standard, with VLAN switches processing packets according to the tag. Q. What would I use VLANs for? A. Logically separating different types of users, systems, applications, or other logical division aids in performance and management of different network devices.
Wireless Array Contact Information General Hints and Tips Multiple SSIDs Security 459
Wireless Array Array Monitor and Radio Assurance Capabilities All models of the Wireless Array have integrated monitoring capabilities to check that the Array’s radios are functioning correctly, and act as a threat sensor to detect and prevent intrusion from rogue access points. Enabling Monitoring on the Array Any radio IAP abgn2 may be set to monitor the Array or to be a normal IAP radio.
Wireless Array Radio Assurance The Array is capable of performing continuous, comprehensive tests on its radios to assure that they are operating properly. Testing is enabled using the Radio Assurance Mode setting on the Advanced RF Settings window (Step 2 in “Advanced RF Settings” on page 313). When this mode is enabled, the monitor radio performs loopback tests on the Array. Radio Assurance Mode requires Intrusion Detection to be set to Standard (See Step 1 in “Advanced RF Settings” on page 313).
Wireless Array Radio Assurance Options If the monitor detects a problem with an Array radio as described above, it will take action according to the preference that you have specified in the Radio Assurance Mode setting on the Advanced RF Settings window (see Step 2 page 315): 462 Failure alerts only — The Array will issue alerts in the Syslog, but will not initiate repairs or reboots.
Wireless Array RADIUS Vendor Specific Attribute (VSA) for Xirrus A RADIUS VSA is defined for Xirrus Arrays to control administrator privileges settings for user accounts. The RADIUS VSA is used by Arrays to define the following attribute for administrator accounts: Array administrators — the Xirrus-Admin-Role attribute sets the privilege level for this account. Set the value to the string defined in Privilege Level Name as described in “About Creating Admin Accounts on the RADIUS Server” on page 218.
Wireless Array Upgrading the Array via CLI If you are experiencing difficulties communicating with the Array using the Web Management Interface, the Array provides lower-level facilities that may be used to accomplish an upgrade via the CLI and the Xirrus Boot Loader (XBL). 1. Download the latest software update from the Xirrus FTP site using your Enhanced Care FTP username and password. If you do not have an FTP username and password, contact Xirrus Customer Service for assistance (support@xirrus.com).
Wireless Array Boot your Array and watch the progress messages. When Press space bar to exit to bootloader: is displayed, press the space bar. The rest of this procedure is performed using the bootloader. The following steps assume that you are running DHCP on your local network. 5. Type dhcp and hit return. This instructs the Array to obtain a DHCP address and use it during this boot in the bootloader environment. 6. Type dir and hit return to see what's currently in the compact flash. 7.
Wireless Array L1 cache | Data: 32 KB Inst: 32 KB Status : Enabled Watchdog | Enabled (5 secs) I2C Bus | 400 KHz DTT | CPU:34C RF0:34C RF1:34C RF2:27C RF3:29C RTC | Wed 2007-Nov-05 6:43:14 GMT System DDR | 256 MB, Unbuffered Non-ECC (2T) L2 cache | 256 KB, Enabled FLASH | 4 MB, CRC: OK FPGA | 2 Devices programmed Packet DDR | 256 MB, Unbuffered Non-ECC, Enabled Network | Mot FEC Mot TSEC1 [Primary] Mot TSEC2 IDE Bus 0 | OK CFCard | 122 MB, Model: Hitachi XXM2.3.
Wireless Array XBL>del * [CFCard] Delete : 2 file(s) deleted XBL>update server 192.168.39.102 xs-3.0-0425.bin [TFTP ] Device : Mot TSEC1 1000BT Full Duplex [TFTP ] Client : 192.168.39.195 [TFTP ] Server : 192.168.39.102 [TFTP ] File : xs-3.0-0425.bin [TFTP ] Address : 0x1000000 [TFTP ] Loading : ################################################## [TFTP ] Loading : ################################################## [TFTP ] Loading : ###### done [TFTP ] Complete: 12.9 sec, 2.
Wireless Array L2 cache | 256 KB, Enabled FLASH | 4 MB, CRC: OK FPGA | 2 Devices programmed Packet DDR | 256 MB, Unbuffered Non-ECC, Enabled Network | Mot FEC Mot TSEC1 [Primary] Mot TSEC2 IDE Bus 0 | OK CFCard | 122 MB, Model: Hitachi XXM2.3.0 Environment| 4 KB, Initialized In: serial Out: serial Err: serial Press space bar to exit to bootloader: [CFCard] File : xs*.bin [CFCard] Address : 0x1000000 [CFCard] Loading : ############################################### done [CFCard] Complete: 26.9 sec, 1.
Wireless Array Contact Information Xirrus, Inc. is located in Thousand Oaks, California, just 55 minutes northwest of downtown Los Angeles and 40 minutes southeast of Santa Barbara. Xirrus, Inc. 2101 Corporate Center Drive Thousand Oaks, CA 91320 USA Tel: Fax: 1.805.262.1600 1.800.947.7871 Toll Free in the US 1.866.462.3980 www.xirrus.com support.xirrus.
Wireless Array 470
Wireless Array Appendix C: Notices This appendix contains the following information: “Notices” on page 471 “EU Directive 1999/5/EC Compliance Information” on page 475 “Compliance Information (Non-EU)” on page 482 “Safety Warnings” on page 483 “Translated Safety Warnings” on page 484 “Software License and Product Warranty Agreement” on page 485 “Hardware Warranty Agreement” on page 491 Notices Wi-Fi Alliance Certification www.wi-fi.
Wireless Array determined by turning the equipment off and on, the user is encouraged to try to correct the interference by one or more of the following safety measures: Reorient or relocate the receiving antenna. Increase the separation between the equipment and the receiver. Connect the equipment into an outlet on a circuit different from that to which the receiver is connected. Consult the dealer or an experienced wireless technician for help.
Wireless Array Battery Warning ! Caution! The Array contains a battery which is not to be replaced by the customer. Danger of Explosion exists if the battery is incorrectly replaced. Replace only with the same or equivalent type recommended by the manufacturer. Dispose of used batteries according to the manufacturer's instructions. UL Statement Use only with listed ITE product.
Wireless Array Caution : (i) the device for operation in the band 5150-5250 MHz is only for indoor use to reduce the potential for harmful interference to co-channel mobile satellite systems; (ii) high-power radars are allocated as primary users (i.e. priority users) of the bands 5250-5350 MHz and 5650-5850 MHz and that these radars could cause interference and/or damage to LE-LAN devices.
Wireless Array EU Directive 1999/5/EC Compliance Information This section contains compliance information for the Xirrus Wireless Array family of products. The compliance information contained in this section is relevant to the European Union and other countries that have implemented the EU Directive 1999/5/EC. Declaration of Conformity Cesky [Czech] Toto zahzeni je v souladu se základnimi požadavky a ostatnimi odpovidajcimi ustano veni mi Směrnice 1999/5/EC.
Wireless Array ĺslenska [Icelandic] Þetta tæki er samkvæmt grunnkröfum og öðrum viðeigandi ákvæðum Tilskipunar 1999/5/EC. Italiano [Italian] Questo apparato é conforme ai requisiti essenziali ed agli altri principi sanciti dalla Direttiva 1999/5/CE. Latviski [Latvian] Šī iekārta atbilst Direktīvas 1999/5/EK būtiskajā prasībām un citiem ar to saistītajiem noteikumiem. Lietuvių [Lithuanian] Šis įrenginys tenkina 1995/5/EB Direktyvos esminius reikalavimus ir kitas šios direktyvos nuostatas.
Wireless Array Slovensky [Slovak] Toto zariadenie je v zhode so základnými požadavkami a inými prislušnými nariadeniami direktiv: 1999/5/EC. Suomi [Finnish] Tämä laite täyttää direktiivin 1999/5//EY olennaiset vaatimukset ja on siinä asetettujen muiden laitetta koskevien määräysten mukainen. Svenska [Swedish] Denna utrustning är i överensstämmelse med de väsentliga kraven och andra relevanta bestämmelser i Direktiv 1999/5/EC.
Wireless Array WEEE Compliance 478 Natural resources were used in the production of this equipment. This equipment may contain hazardous substances that could impact the health of the environment. In order to avoid harm to the environment and consumption of natural resources, we encourage you to use appropriate take-back systems when disposing of this equipment.
Wireless Array National Restrictions In the majority of the EU and other European countries, the 2.4 GHz and 5 GHz bands have been made available for the use of Wireless LANs. The following table provides an overview of the regulatory requirements in general that are applicable for the 2.4 GHz and 5 GHz bands. Frequency Band (MHz) Max Power Level (EIRP) (mW) Indoor Outdoor 2400–2483.
Wireless Array Les liasons sans fil pour une utilisation en extérieur d’une distance supérieure à 300 mèters doivent être notifiées à l’Institut Belge des services Postaux et des Télécommunications (IBPT). Visitez www.bipt.be pour de plus amples détails. Greece A license from EETT is required for the outdoor operation in the 5470 MHz to 5725 MHz band. Xirrus recommends checking www.eett.gr for more details.
Wireless Array Antennas The Xirrus Wireless Array employs integrated antennas that cannot be removed and which are not user accessible. Nevertheless, as regulatory limits are not the same throughout the EU, users may need to adjust the conducted power setting for the radio to meet the EIRP limits applicable in their country or region. Adjustments can be made from the product’s management interface — either Web Management Interface (WMI) or Command Line Interface (CLI).
Wireless Array Compliance Information (Non-EU) This section contains compliance information for the Xirrus Wireless Array family of products. The compliance information contained in this section is relevant to the listed countries (outside of the European Union and other countries that have implemented the EU Directive 1999/5/EC).
Wireless Array Safety Warnings ! Safety Warnings ! Explosive Device Proximity Warning ! Lightning Activity Warning ! Circuit Breaker Warning Read all user documentation before powering this device. All Xirrus interconnected equipment should be contained indoors. This product is not suitable for outdoor operation. Please verify the integrity of the system ground prior to installing Xirrus equipment. Additionally, verify that the ambient operating temperature does not exceed 40°C.
Wireless Array Translated Safety Warnings Avertissements de Sécurité 484 ! Sécurité ! Proximité d'appareils explosifs ! Foudre ! Disjoncteur Lisez l'ensemble de la documentation utilisateur avant de mettre cet appareil sous tension. Tous les équipements Xirrus interconnectés doivent être installés en intérieur. Ce produit n'est pas conçu pour être utilisé en extérieur. Veuillez vérifier l'intégrité de la terre du système avant d'installer des équipements Xirrus.
Wireless Array Software License and Product Warranty Agreement THIS SOFTWARE LICENSE AGREEMENT (THE “AGREEMENT”) IS A LEGAL AGREEMENT BETWEEN YOU (“CUSTOMER”) AND LICENSOR (AS DEFINED BELOW) AND GOVERNS THE USE OF THE SOFTWARE INSTALLED ON THE PRODUCT (AS DEFINED BELOW).
Wireless Array the Product in accordance with the accompanying Documentation and for no other purpose. 2.2 Ownership. The license granted under Sections 2.1 above with respect to the Software does not constitute a transfer or sale of Licensor's or its suppliers' ownership interest in or to the Software, which is solely licensed to Customer. The Software is protected by both national and international intellectual property laws and treaties.
Wireless Array 3.0 LIMITED WARRANTY AND LIMITATION OF LIABILITY 3.1 Limited Warranty & Exclusions. Licensor warrants that the Software will perform in substantial accordance with the specifications therefore set forth in the Documentation for a period of ninety [90] days after Customer's acceptance of the terms of this Agreement with respect to the Software (“Warranty Period”).
Wireless Array 3.4 Limitation of Liability. (a) TOTAL LIABILITY. NOTWITHSTANDING ANYTHING ELSE HEREIN, ALL LIABILITY OF LICENSOR AND ITS SUPPLIERS UNDER THIS AGREEMENT SHALL BE LIMITED TO THE AMOUNT PAID BY CUSTOMER FOR THE RELEVANT SOFTWARE, OR PORTION THEREOF, THAT GAVE RISE TO SUCH LIABILITY OR ONE HUNDRED UNITED STATES DOLLARS (US$100), WHICHEVER IS GREATER. THE LIABILITY OF LICENSOR AND ITS SUPPLIERS UNDER THIS SECTION SHALL BE CUMULATIVE AND NOT PER INCIDENT. (b) DAMAGES.
Wireless Array protective of a party's right in such Confidential Information as those set forth herein. 4.2 Return of Materials. Customer agrees to (i) destroy all Confidential Information (including deleting any and all copies contained on any of Customer's Designated Hardware or the Product) within fifteen (15) days of the date of termination of this Agreement or (ii) if requested by Licensor, return, any Confidential Information to Licensor within thirty (30) days of Licensor's written request. 5.
Wireless Array 6. MISCELLANEOUS If Customer is a corporation, partnership or similar entity, then the license to the Software and Documentation that is granted under this Agreement is expressly conditioned upon and Customer represents and warrants to Licensor that the person accepting the terms of this Agreement is authorized to bind such entity to the terms and conditions herein.
Wireless Array Hardware Warranty Agreement PLEASE READ THIS AGREEMENT CAREFULLY BEFORE USING THIS PRODUCT BY USING THIS PRODUCT, YOU ACKNOWLEDGE THAT YOU HAVE READ AND UNDERSTOOD ALL THE TERMS AND CONDITIONS OF THIS AGREEMENT AND THAT YOU ARE CONSENTING TO BE BOUND BY THIS AGREEMENT. IF YOU DO NOT AGREE TO ALL OF THE TERMS OF THIS AGREEMENT, RETURN THE UNUSED PRODUCT TO THE PLACE OF PURCHASE FOR A FULL REFUND. LIMITED WARRANTY.
Wireless Array whether in contract, tort (including negligence), or otherwise, exceed the price paid by Customer. The foregoing limitations shall apply even if the above-stated warranty fails of its essential purpose. SOME STATES DO NOT ALLOW LIMITATION OR EXCLUSION OF LIABILITY FOR CONSEQUENTIAL OR INCIDENTAL DAMAGES. The above warranty DOES NOT apply to any evaluation Equipment made available for testing or demonstration purposes. All such Equipment is provided AS IS without any warranty whatsoever.
Wireless Array Glossary of Terms 802.11a A supplement to the IEEE 802.11 WLAN specification that describes radio transmissions at a frequency of 5 GHz and data rates of up to 54 Mbps. 802.11b A supplement to the IEEE 802.11 WLAN specification that describes radio transmissions at a frequency of 2.4 GHz and data rates of up to 11 Mbps. 802.11d A supplement to the Media Access Control (MAC) layer in 802.11 to promote worldwide use of 802.11 WLANs.
Wireless Array authentication The process that a station, device, or user employs to announce its identify to the network which validates it. IEEE 802.11 specifies two forms of authentication, open system and shared key. bandwidth Specifies the amount of the frequency spectrum that is usable for data transfer. In other words, it identifies the maximum data rate a signal can attain on the medium without encountering significant attenuation (loss of power).
Wireless Array cell The basic geographical unit of a cellular communications system. Service coverage of a given area is based on an interlocking network of cells, each with a radio base station (transmitter/receiver) at its center. The size of each cell is determined by the terrain and forecasted number of users. channel A specific portion of the radio spectrum — the channels allotted to one of the wireless networking protocols. For example, 802.11b and 802.11g use 14 channels in the 2.
Wireless Array domain The main name/Internet address of a user's Internet site as registered with the InterNIC organization, which handles domain registration on the Internet. For example, the “domain” address for Xirrus is: http://www.xirrus.com, broken down as follows: http:// represents the Hyper Text Teleprocessing Protocol used by all Web pages. www is a reference to the World Wide Web. xirrus refers to the company. com specifies that the domain belongs to a commercial enterprise.
Wireless Array encryption Any procedure used in cryptography to translate data into a form that can be decrypted and read only by its intended receiver. Fast Ethernet A version of standard Ethernet that runs at 100 Mbps rather than 10 Mbps. FCC (Federal Communications Commission) US wireless regulatory authority. The FCC was established by the Communications Act of 1934 and is charged with regulating Interstate and International communications by radio, television, wire, satellite and cable.
Wireless Array host name The unique name that identifies a computer on a network. On the Internet, the host name is in the form comp.xyz.net. If there is only one Internet site the host name is the same as the domain name. One computer can have more than one host name if it hosts more than one Internet site (for example, home.xyz.net and comp.xyz.net). In this case, comp and home are the host names and xyz.net is the domain name. IPsec A Layer 3 authentication and encryption protocol. Used to secure VPNs.
Wireless Array packet Data sent over a network is broken down into many small pieces — packets — by the Transmission Control Protocol layer of TCP/IP. Each packet contains the address of its destination as well the data. Packets may be sent on any number of routes to their destination, where they are reassembled into the original data. This system is optimal for connectionless networks, such as the Internet, where there are no fixed connections between two locations.
Wireless Array public key In cryptography, one of a pair of keys (one public and one private) that are created with the same algorithm for encrypting and decrypting messages and digital signatures. The public key is made publicly available for encryption and decryption. QoS (Quality of Service) QoS can be used to describe any number of ways in which a network provider prioritizes or guarantees a service's performance.
Wireless Array SSH (Secure SHell) Developed by SSH Communications Security, Secure Shell is a program to log into another computer over a network, to execute commands in a remote machine, and to move files from one machine to another. The Array only allows SSH-2 connections. SSH-2 provides strong authentication and secure communications over insecure channels. SSH-2 protects a network from attacks, such as IP spoofing, IP source routing, and DNS spoofing.
Wireless Array VLAN (Virtual LAN) A group of devices that communicate as a single network, even though they are physically located on different LAN segments. Because VLANs are based on logical rather than physical connections, they are extremely flexible. A device that is moved to another location can remain on the same VLAN without any hardware reconfiguration.
Wireless Array Wi-Fi Alliance A nonprofit international association formed in 1999 to certify interoperability of wireless Local Area Network products based on IEEE 802.11 specification. The goal of the Wi-Fi Alliance's members is to enhance the user experience through product interoperability. Wireless Array A high capacity wireless networking device consisting of multiple radios arranged in a circular array. WPA (Wi-Fi Protected Access) A Wi-Fi Alliance standard that contains a subset of the IEEE 802.
Wireless Array 504 Glossary of Terms
Wireless Array Index Numerics 11n see IEEE 802.11n 35 802.11a 3, 5, 274, 293 802.11a/b/g 26 802.11a/b/g/n 15 802.11a/n 15, 63, 249 802.11b 3, 5, 298 802.11b/g 274, 298 802.11b/g/n 15, 63, 249 802.11e 16 802.11g 3, 5, 298 802.11i 5, 71, 161 802.11n 5 see IEEE 802.11n 35 WMI page 304 802.11p 16 802.11q 16 802.
Wireless Array ARP table window 109 Array 28, 62, 63, 84, 161, 171 connecting 62 dismounting 62 management 359 mounting 62 powering up 63 securing 62 Web Management Interface 84 ArrayOS upgrade 362 Arrays managing in clusters 352 associated users 28 assurance network server connectivity 112, 225 assurance (radio loopback testing) 313 assurance, station see station assurance 320 attack (DoS) see DoS attack 332 attack (impersonation) see impersonation attack 333 authentication 16 of admin via RADIUS 218 autho
Wireless Array cell size configuration 313 certificate about 212, 225 authority 212, 225 error 212, 225 install Xirrus authority 225 X.
Wireless Array security 419 show 385 snmp 420 ssid 421 statistics 388 syslog 422 vlan 424 Community String 445 configuration 159, 454 express setup 161 reset to factory defaults 366 configuration changes applying 92 configuration files automatic update from remote server 363 download 364 update from local file 364 update from remote file 364 connection tracking window 110 connectivity servers, see network assurance 112, 225 Console port login via 218 Contact Information 469 contact information 469 coverage
Wireless Array E EAP 446, 454 EAP-MDS 16 EAP-PEAP 454 EAP-TLS 16, 46, 454 EAP-TTLS 16, 46, 454 EDCF 280 Encryption 446, 454 encryption 16 encryption method recommended (WPA2 with AES) 210 setting 211 support of multiple methods 210 encryption method (encryption mode) Open, WEP, WPA, WPA2, WPABoth 209 encryption standard AES, TKIP, both 210 setting 211 Enterprise 1, 3, 454 WLAN 3 Enterprise Class Management 5 Enterprise Class Security 5 ESS 452 ESSID 452 Ethernet 59, 62, 63, 66, 71, 161 event log IDS (intru
Wireless Array group 264 CLI command 394, 406 VLAN overrides dynamic VLAN 267 group limits and interactions 268 Group Rekey 446 guard interval short, for IEEE 802.11n 40 GUI see WMI 373 H help button, bottom of page 91 button, left frame 88 Help button 84 help button 91 host name 71, 84, 161, 181 hs.
Wireless Array intrusion detection (IDS) viewing event log 157 Intrusion Detection (IDS/IPS) 328 IP Address 28, 71, 84, 92, 119, 161, 171, 181, 190, 194, 359, 444 IP Subnet Mask 71 IPS see Intrusion Detection 328 IPv6 filtering 291 K key upgrade 363 key features 14 Keyboard Shortcuts 449 keyboard shortcuts 449 known setting rogues 120 L lastboot.
Wireless Array maximum lease 444 Maximum Lease Time 444 Megabit 71 menu behavior WMI 375 Message Integrity Check 454 messages syslog counters 89 MIC 16, 454 MIMO (Multiple-In Multiple-Out) 36 mode cluster operating mode 355 monitoring intrusion detection 119 see intrusion detection 331 mounting 62 mounting plate 62 mounting the unit 62 MTU 171 size 171 multiple data streams 38 N NAT table - see connection tracking 110 neighbors, CDP 111 Netflow 187 netflow CLI command 411 network interfaces 169 settings 17
Wireless Array security 46 switch failover 42 WDS 53 PoGE 23 see Power over Gigabit Ethernet 12 PoGE Power Injectors 1 port failover 42 port requirements 48 power outlet 23 Power over Gigabit Ethernet 2, 23, 45, 59 Power over Gigabit Ethernet (PoGE) 12 power planning 45 pre-shared key 46, 56, 454 Print button 84 print button 91 probe see Netflow 187 product installation 23, 441 product overview 5 product specifications 22 PSK 56, 446 PuTTY 23, 52, 71, 161, 454 PuTTy 24 Q QoS 16, 249, 446, 452, 500 conflict
Wireless Array remote TFTP server automatic update of boot image, configuration 363 Reset 359, 444 reset configuration to factory defaults 366 restore command 416 restrictions date/time 268 stations 268 traffic 268 RF intrusion detection 313 spectrum management 313 RF Analysis Manager see RAM 18 RF configuration 313 RF management see channel 313 RF Performance Manager see RPM 16 RF resilience 313 RF Security Manager see RSM 17 roaming 15, 106, 291 see fast roaming 273 Rogue AP 5, 52, 119, 240, 454 rogue AP
Wireless Array Services 184, 452 servicing the unit 441 settings 161 setup, express 161 sharp cell 313 setting in WMI 317 short retry limit 280 signal processing MIMO 36 skin changing WMI appearance 373 SNMP 5, 13, 71, 161, 171, 184, 194, 445 required for XMS 194, 195 software upgrade license key 363 software image upgrading via CLI 464 Software Upgrade 359 software upgrade 362 spatial multiplexing 38 specifications 22 spectrum (RF) management 313 speed 3, 66, 171 11 Mbps 3 54 Mbps 3 splash page web page re
Wireless Array System Configuration Reset 359 System Log 190 system log viewing window 150, 156 System Reboot 359 System Tools 359 system tools 360 Trap Host 445 trap port 194, 445 tunneled fast roaming 291 Tunnels 204 tunnels see VTun 199, 203 T U tag, WiFi 188 T-bar 62 T-bar clips 62 TCP port requirements 48 technical support contact information 469 frequently asked questions 452 Telnet 209, 448, 454 Temporal Key Integrity Protocol 454 TFTP server automatic update of boot image, configuration 363 Time
Wireless Array overridden by group 267 group (vs.
Wireless Array WPA 5, 56, 71, 161, 208, 249, 446, 454 WPA (Wi-Fi Protected Access) and WPA2 encryption method 210 WPA2 5 WPR see web page redirect 368 wpr.pl 368, 369 XN4 1, 5 XN8 1, 5 XP PoGE Power Injectors 1 XP1, XP8 see Power over Gigabit Ethernet 12 XPS 23 XRP 15, 106, 291 xs_current.conf 364 xs_diagnostic.log 367 X X.
High Performance Wireless Networks 1.800.947.7871 Toll Free in the US +1.805.262.1600 Sales +1.805.262.1601 Fax 2101 Corporate Center Drive Thousand Oaks, CA 91320, USA © 201 Xirrus, Inc. All Rights Reserved. The Xirrus logo is a registered trademark of Xirrus, Inc. All other trademarks are the property of their respective owners. Content subject to change without notice. To learn more visit: xirrus.com or email info@xirrus.