CHAPTER 8. Security 8.2.2.3 Manual configuration (Move) A user can change the classification of an unauthorized AP that is detected by the WI or that is classified according to the rule configured by a user. Configuration using CLI Go to configure wi device configuration mode of CLI. 1) WEC8500# configure terminal WEC8500/configure# wi WEC8500/configure/wi# device WEC8500/configure/wi/device# By using the MAC of an unauthorized AP to change, execute the move command.
CHAPTER 8. Security 1) In the AP list screen, go to the detail view screen by clicking a MAC address. Figure 165. List Window to Manually Change Classification 2) In the AP detail screen, change the classification and click Apply, then the configuration is changed. Figure 166. Classification Change Window in AP Detail Screen © SAMSUNG Electronics Co., Ltd.
CHAPTER 8. Security 8.2.2.4 Manual configuration (Remove) A user can manually change the status of an unauthorized AP to ‘Removed’, that is detected by the WIDS or that is classified according to the rule configured by a user. Configuration using CLI 1) Go to configure wi device configuration mode of CLI. WEC8500# configure terminal WEC8500/configure# wi WEC8500/configure/wi# device WEC8500/configure/wi/device# 2) By using the MAC of an unauthorized AP to change, execute the remove command.
CHAPTER 8. Security 2) If you change the setting of REMOVE MANUALLY to ‘On’ in the AP detail screen and click Apply, the AP status is changed to ‘Removed’. Figure 168. Manual Remove Change Window in AP Detail Screen 8.2.2.5 Unauthorized AP detection option Operator can enable or disable the AP detection option pre-defined in the system. Configuration using CLI 1) Go to configure wi device ap configuration mode.
CHAPTER 8. Security The description of OPTION parameter is as follows: Parameter Description ap-blacklist-check Allocates Rogue ID = 101 by checking a rogue included in the black list. managed_ssid_invalid_security Allocates Rogue ID = 102 for an AP that uses a managed SSID and its managed client is in the association status.
CHAPTER 8. Security 8.2.2.6 Unauthorized client detection option Operator can enable or disable the client detection option pre-defined in the system. Configuration using CLI 1) Go to configure wi device client configuration mode. WEC8500# configure terminal WEC8500/configure# wi WEC8500/configure/wi# rogue WEC8500/configure/wi/device# client WEC8500/configure/wi/device /client# 2) Configure the unauthorized client detection option by using the following command.
CHAPTER 8. Security 3) To check the changed configuration, use the following command. show wi device client current-config Configuration using Web UI In the menu bar of , select and then select the menu in the sub-menus. And then, operator can change the setting by selecting at the upper tab and clicking Apply. In the configuration screen, operator can check Option and click Apply for configuration. Figure 170.
CHAPTER 8. Security Parameter Description CHANNEL Authorized channel number (e.g. add 2, 3, 4) 4) To check the changed configuration, execute the following command. show wi current-config Configuration using Web UI In the menu bar of , select and then select the menu in the sub-menus. And then, operator can configure the SERVICE STATE and Valid Channel List in the screen.
CHAPTER 8. Security 2) 3) 4) 5) Configure the AP black-list. ap-blacklist [MAC] Parameter Description MAC MAC address that will be used as AP black-list Configure the station black-list. client-black-list [MAC] Parameter Description MAC MAC address that will be used as a black-list of the station Configure the Managed Organizationally Unique Identifier (OUI). oui-whitelist [OUI] Parameter Description OUI First 3 bytes of station MAC address Configure the Managed/Neighbor AP.
CHAPTER 8. Security Configuration using Web UI In the menu bar of , select and then select the menu in the sub-menus. And then, operator can configure and search by using the upper tab in the screen. 1) In the [AP Blacklist] tab, operator can add an AP blacklist by entering a MAC and click Add. Operator can also delete it by using Delete. Figure 172.
CHAPTER 8. Security 3) In the [Station Blacklist] tab, operator can add a station blacklist by entering a MAC and click Add. Operator can also delete it by using Delete. Figure 174. Station blacklist Search/Configuration Window 4) In the [Managed Station] tab, operator can search Managed Station. Figure 175. Managed Station Search Window © SAMSUNG Electronics Co., Ltd.
CHAPTER 8. Security 5) In the [Managed OUI] tab, operator can add a Managed OUI by entering an OUI and click Add. Operator can also delete it by using Delete. 6) In the [Managed SSID] tab, you can check the SSID that the WLAN is using. Figure 176. Managed SSID Window © SAMSUNG Electronics Co., Ltd.
CHAPTER 8. Security 7) If you click Add in the [Managed/Neighbor AP] tab, operator can go to the Managed/ Neighbor AP list addition screen and can add a Managed/Neighbor AP list. Operator can also delete it by using Delete. [Managed/Neighbor AP] tab main screen Figure 177. Managed/Neighbor AP Search/Configuration Window Managed/Neighbor AP list addition screen Figure 178. Managed/Neighbor AP List Addition Window 8.2.2.
CHAPTER 8. Security 2) Configure a threshold. allowed-limit [OPTION] [COUNT] Parameter OPTION Description - 80211-auth-req: Authentication requests threshold per second - 80211-probe-req: Probe requests threshold per second - 80211-deauth-req: De-authentication requests threshold per second - 80211-assoc-fail: Association failures threshold per second - 80211-auth-fail: Authentication failures threshold per second - 8021x-auth-fail: 802.
CHAPTER 8. Security 8.2.3 Enabling Blocking Function The setting of enabling the blocking function is as follows: Configuration using CLI 1) Go to configure mode of CLI. WEC8500# configure terminal 2) Enable the blocking function. WEC8500/configure# wids containment enable 3) To check the configuration information, execute the following command.
CHAPTER 8. Security 8.2.4.1 Configuring Manual Blocking To configure manual blocking, execute the command as follows: Configuration using CLI 1) Go to configure wids containment configuration mode of CLI. WEC8500# configure terminal WEC8500/configure# wids WEC8500/configure/wids# containment WEC8500/configure/wids/containment# 2) Configure manual blocking. manual[TARGET] enable[MAC] Parameter Description TARGET Select either AP or station which is the target for manual blocking.
CHAPTER 8. Security 2) After selecting a station in the station list, possible to block by using the containment. Figure 182. List Window for Blocking Station 8.2.4.2 Configuring Automatic Blocking To configure automatic blocking, execute the command as follows: Configuration using CLI 1) Go to configure wids containment configuration mode of CLI.
CHAPTER 8. Security Parameter Description rogue-ap-with-managed-ssid If the honeypot is detected, it is automatically blocked. unmanaged-ap If the unmanaged AP is detected, it is automatically blocked. 3) To check the configuration of automatic blocking, it is possible to use the following command: show wids containment current-config Configuration using Web UI In the menu bar of , select and then select menus in the sub-menus.
CHAPTER 8. Security 8.3 Captive Portal The W-EP WLAN system provides the Captive Portal function. A guest user can receive a normal service after connected to a specific WLAN (SSID) and going through user authentication. 8.3.1 Configuring Guest Authentication Configuration using CLI To configure guest authentication, go to the Configure mode and execute the command. Go to configure security captive-portal configuration mode of CLI.
CHAPTER 8. Security Parameter Description - radius-local: Uses the internal authentication if the RADIUS server authentication is failed. 5) For RADIUS authentication, the operator can configure the primary and secondary servers by using a profile ID.
CHAPTER 8. Security The operator can check and delete a guest created in the menu. Figure 185. Guest User List Window In the menu, the operator can select Auth Type and also PRIMARY RADIUS and SECONDARY RADIUS servers. Figure 186. Guest Auth Configuration Window 8.3.2 Configuring Guest ACL To operate the captive portal services, redirection must be basically performed and if a drop occurs by the Pre-Auth ACL of the WLAN, the redirection is performed.
CHAPTER 8. Security WEC8500/configure/fqm-mode# access-list ip guest_acl permit 90.90.100.120 255.255.255.255 eq 80 any eq * os-aware * WEC8500/configure/fqm-mode# access-list ip guest_acl permit any eq * 90.90.100.120 255.255.255.255 eq 80 os-aware * WEC8500/configure/fqm-mode# access-list ip guest_acl permit any eq * any eq * os-aware * WEC8500/configure/fqm-mode# access-list ip guest_acl permit 192.168.10.10 255.255.255.
CHAPTER 8. Security 8.3.3 Configuring Web Authentication To provide the web authentication service, the security L3 item of the WLAN and the web authentication of the captive portal must be configured. Configuration using CLI [WLAN Configuration] To configure web authentication in the WLAN, execute the command as follows: 1) Go to configure WLAN configuration mode of CLI. WEC8500# configure terminal WEC8500/configure# wlan 1 2) Configure a guest flag (default: disabled).
CHAPTER 8. Security Parameter Description URL URL to which the guest is redirected 7) To check the configuration, use the ‘show wlan security detail’ command. WEC8500# show wlan security detail 1 [Captive Portal Configuration] 1) Go to configure security captive-portal configuration mode of CLI.
CHAPTER 8. Security 4) To check the configuration, use the ‘show security captive-portal web-auth’ command. WEC8500# show security captive-portal web-auth Configuration using Web UI In the menu bar of , select and then select the menu in the sub-menus. In the WLANs screen, select WLAN ID and enable the option. Figure 189. WLAN Guest Configuration Window Go to the of the tab.
CHAPTER 8. Security 8.3.4 Configuring Web Authentication on MAC Authentication Failure To provide the service of Web Authentication on MAC Authentication Failure, the MAC Authentication of security L2 of the WLAN must be enabled and the web policy of L3 and the web authentication of the captive portal must be configured.
CHAPTER 8. Security 6) To change the redirection of the basic captive portal configuration to another address, configure an overriding URL. redirect-URL-override [URL] Parameter Description URL URL to which the guest is redirected 7) To check the configuration, use the ‘show wlan security detail’ command. WEC8500# show wlan security detail 1 [Captive Portal Configuration] 1) Go to configure security captive-portal configuration mode of CLI.
CHAPTER 8. Security Parameter Description FLAG Operation after authentication - redirect: Redirect to a specified URL - request: Redirect to a requested URL URL URL specified as the operation after authentication 4) To check the configuration, use the ‘show security captive-portal web-auth’ command. WEC8500# show security captive-portal web-auth Configuration using Web UI In the menu bar of , select and then select the menu in the sub-menus.
CHAPTER 8. Security Figure 194. WLAN Web Policy Configuration Window In the menu, the operator can select web authentication method. The operator can also configure Redirect as the operation after authentication. Figure 195. Web Auth Configuration Window © SAMSUNG Electronics Co., Ltd.
CHAPTER 8. Security 8.3.5 Configuring Web Pass-through The APC provides the web pass-through function to move to a specific address all the time when the user uses the web. Configuration using CLI [WLAN Configuration] To configure web pass-through in the WLAN, execute the command as follows: 1) Go to configure WLAN configuration mode of CLI. WEC8500# configure terminal WEC8500/configure# wlan 1 2) Configure a guest flag (default: disabled).
CHAPTER 8. Security Parameter Description URL URL to which the guest is redirected 7) To check the configuration, use the ‘show wlan security detail’ command. WEC8500# show wlan security detail 1 Configuration using Web UI In the menu bar of , select and then select the menu in the sub-menus. In the WLANs screen, select WLAN ID and enable the option. Figure 196. WLAN Guest Configuration Window Go to the of the tab.
CHAPTER 8. Security 8.3.6 Configuring One Time Redirection To provide the One Time Redirection service, the security L3 of the WLAN must be configured. Configuration using CLI [WLAN Configuration] To configure one time redirection in the WLAN, execute the command as follows: 1) Go to configure WLAN configuration mode of CLI. WEC8500# configure terminal WEC8500/configure# wlan 1 2) Configure a guest flag (default: disabled).
CHAPTER 8. Security Parameter Description URL URL to which the guest is redirected 7) To check the configuration, use the ‘show wlan security detail’ command. WEC8500# show wlan security detail 1 Configuration using Web UI In the menu bar of , select and then select the menu in the sub-menus. In the WLANs screen, select WLAN ID and enable the option. Figure 198. WLAN Guest Configuration Window Go to the of the tab.
CHAPTER 8. Security 8.3.7 Redirection Address Format The Captive Portal attempts at first redirection for the request of the web service of the station.
CHAPTER 8. Security 8.4 NAT and Firewall Configuration The APC provides the NAT and firewall function to provide stable network to a WLAN user. 8.4.1 Firewall Configuration Configuration using CLI [Firewall Configuration] 1) Go to configure mode of CLI. WEC8500# configure terminal 2) Configure the accelerator function of a firewall. WEC8500/configure# firewall enable [Firewall Configuration using Access List] 1) Go to configure mode of CLI. WEC8500# configure terminal 2) Create an access-list.
CHAPTER 8. Security In the menu bar of , select and then select the menu in the sub-menus. You can configure an interface for which a firewall will be applied by clicking the button of Interface window. Figure 201. Firewall configuration (2) 8.4.2 Access List Configuration Configuration using CLI 1) Go to configure mode of CLI. WEC8500# configure terminal WEC8500/configure# 2) Create an access-list.
CHAPTER 8. Security Configuration using Web UI In the menu bar of , select and then select the < menu in the sub-menus. Click the button to configure the firewall Policy. Figure 202. Access-list configuration 8.4.3 NAT Configuration Configuration using CLI [SNAT Configuration using Access List] To add Source NAT (SNAT) using an access-list, execute the command as follows: 1) Go to configure mode of CLI.
CHAPTER 8. Security [SNAT Configuration using Static IP] To add SNAT using a static IP, execute the command as follows: 1) Go to configure mode of CLI. WEC8500# configure terminal 2) Configure a NAT to the interface. WEC8500/configure# interface vlan1.30 WEC8500/configure/interface vlan1.30#ip nat outside WEC8500/configure/interface vlan1.30#exit 3) Configure a NAT rule using a static IP. WEC8500/configure# ip nat outside source static 10.10.10.10 30.30.30.
CHAPTER 8. Security [DNAT Configuration using Static IP] To add DNAT using a static IP, execute the command as follows: 1) Go to configure mode of CLI. WEC8500# configure terminal 2) Configure a NAT to the interface. WEC8500/configure# interface vlan1.30 WEC8500/configure/interface vlan1.30#ip nat outside WEC8500/configure/interface vlan1.30#exit 3) Configure a NAT rule using a static IP (A port can be also specified for DNAT). WEC8500/configure# ip nat outside destination static tcp 10.10.10.
CHAPTER 8. Security 2) Click the button in the Translation Rule window and configure the Translation Rule. Select NAT TYPE as either SNAT or DANT. Select STATIC checkbox to configure Static and configure the values of Original IP Addr: Port and Translated IP Addr: Port. Figure 204. NAT configuration (2) To proceed with NAT configuration, you must create an access list first. © SAMSUNG Electronics Co., Ltd.
CHAPTER 8. Security 8.5 MAC Filter The W-EP wireless LAN system provides the MAC filter function. A user may experience connection restriction due to MAC filtering when connecting to a specific WLAN (SSID). Configuration using CLI To configure a MAC list for connection control by the MAC filter, execute the command as follows: 1) Go to configure security configuration mode of CLI. WEC8500# configure terminal WEC8500/configure# security 2) Creates a MAC filter list.
CHAPTER 8. Security 6) Parameter Description MAC_FILTER_ID MAC FILTER ID (range: 1-20) You can check the configured information below. show security mac-filter summary WEC8500# show security mac-filter detail Configuration using Web UI In the menu bar of , select and then select the menu in the sub-menus. You can create a MAC filter table for station access control by clicking the button. Figure 205.
CHAPTER 8. Security 2) Configure the policy in the Edit configuration screen by selecting the index of MAC filter list. Figure 207. MAC entry configuration(2) 3) Select a WLAN for which the MAC filter will be applied. Check a MAC FILTER ID to apply in the Security > L2 configuration screen. To apply the configuration, click the button. Figure 208. MAC entry configuration(3) © SAMSUNG Electronics Co., Ltd.
CHAPTER 8. Security 8.6 Operator Authentication through Interoperation with TACACS+ Server A W-EP wireless LAN system provides an operator authentication function by interoperating with an external TACACS+ server. 8.6.1 Configuring External TACACS+ Server A W-EP wireless LAN system provides an operator authentication function by interoperating with an external TACACS+ server and the procedure detailed below is carried out for interoperation with a TACACS+ server. 8.6.1.
CHAPTER 8. Security Parameter PORT_NUMBER Description Port number of the TACACS+ server (range: 1-65,535, default value: 49) 5) Configure the items related to retransmissions in TACACS+ communications. You can use default values without changing configuration.
CHAPTER 8. Security 9) You can view configuration information by using the ‘show security tacacs server config’ and ‘show security tacacs server detail [SERVER ID]’ commands. Configuration using Web UI In the menu bar of , select , and then select in the submenus. If you click the button in the TACACS+ initial window, you can add a TACACS+ server. The server addition window is shown below. Figure 209.
CHAPTER 8. Security 8.6.2 Configuring Authentication Type of Operator Account The steps for configuring the authentication type of the operator account are as follows: Configuration using CLI 1) Go to configure mode of CLI. WEC8500# configure terminal WEC8500/configure# 2) Configure the type of operator account authentication.
CHAPTER 8. Security 8.7 Role Based Access Control The W-EP WLAN system can manage the user's access authority depending on a designated role. It can designate ACL, limit the bandwidth, designate the interface, or manage redirecting URL, etc. by user. 8.7.1 Configuring Role Profile The W-EP WLAN system can designate the configuration of ACL, QoS, VLAN, and URL and manage as a profile. To provide a service of a role desired to a specific user or a user group, it can use a role profile. 8.7.1.
CHAPTER 8. Security Configuration using Web UI Configuration > Security > Role Based Access Control > Role Profile Example: Figure 211. Role Profile Configuration Figure 212. Role Profile Add Configuration 8.7.2 Configuring Derivation Profile The W-EP WLAN system can edit conditions to allocate roles and manage by profile. It can manage a role by user depending on the edited conditions. 8.7.2.
CHAPTER 8.
CHAPTER 8. Security Figure 215. Derivation Profile Configuration Figure 216. Derivation Profile Add Configuration 8.7.2.
CHAPTER 8. Security Configuration using Web UI Configuration > WLANs > Security > Radius Example: Figure 217. Wlan Derivation Profile Configuration 8.7.3 Configuring ACL Profile The W-EP WLAN system can manage ACL to apply to a user if the AP of the remote group operates as local bridge. © SAMSUNG Electronics Co., Ltd.
CHAPTER 8. Security 8.7.3.
CHAPTER 8. Security Figure 219. Acl Profile Add Configuration Figure 220. Acl Profile Edit Configuration 8.7.3.
CHAPTER 8. Security Configuration using Web UI Configuration > AP Groups > Remote AP Group > ACL Profile Change the configuration of the ACL PROFILE NAME and then press Apply. After that, press Send To APs to transmit the ACL profile and the relevant settings to APs. Example: Figure 221. Remote Ap Group-Alc Profile Configuration © SAMSUNG Electronics Co., Ltd.
CHAPTER 8. Security 8.7.4 Configuration Synchronization (Remote AP Group) The W-EP WLAN system provides a function of synchronizing the configuration of the AP of the remote group and ACL if the AP of the remote group operates as a local bridge. 8.7.4.1 Requesting Synchronization If the remote AP operates with the local switching mode, the configuration of the ACL between APC and AP must be synchronized.
CHAPTER 8. Security Configuration using Web UI Configuration > Security > Role Based Access Control > ACL Profile ‘Send To APs’ Figure 222. ACL Configuration Synchronization - All Configuration > AP Groups > Remote AP Group > ACL Profile ‘Send To APs’ Figure 223. ACL Configuration Synchronization - Remote Group © SAMSUNG Electronics Co., Ltd.
CHAPTER 8. Security Configuration > Access Points > Remote AP ‘Send To APs’ Figure 224. ACL Configuration Synchronization - Remote AP © SAMSUNG Electronics Co., Ltd.
CHAPTER 8. Security 8.8 External BYOD Server The W-EP WLAN system provides a function of interoperating with the external BYOD server. To use the BYOD function, a separate BYOD server is necessary. Employees and guest users can receive a service after being connected to a specific WLAN (SSID) and going through authentication. (The external BYOD server now supported is only AirCuve BYOD.) 8.8.
CHAPTER 8. Security Configuration using Web UI In the menu bar of , select and then select in the sub-menus. Figure 225. External BYOD Server Configuration Window 1) 2) 3) 4) 5) 6) Service Enable the function of interoperating with the external BYOD server. Server IP Address 1 Enter the IP address of the BYOD server. Enter the Airfront IP upon the interoperation with AirCuve BYOD Suite.
CHAPTER 8. Security 8.8.2 Captive Portal Configuration To use the external BYOD service, the External Web Authentication of the Captive Portal is necessary to be configured. The Captive Portal service must configure ACL basically and apply the ACL to L3 security of the WLAN. Below is an example of how to configure the captive portal to use the BYOD service. Configuration using CLI 1) Configuring PreAuthentication ACL PRE-AUTH ACL must have the basic permit rules for the HTTP port to DNS and web servers.
CHAPTER 8. Security 3) Configuring Web Authentication Type WEC8500/configure/security/captive-portal # web-auth WEC8500/configure/security/captive-portal/web-auth#auth-type external WEC8500/configure/security/captive-portal/web-auth#external-url http://90.90.100.120/pc/zero_page.jsp Configuration using Web UI 1) Configuring PreAuthentication ACL PRE-AUTH ACL must have the basic permit rules for the HTTP port to DNS and web servers.
CHAPTER 8. Security 3) Configuring Web Authentication Type To use the External BYOD function, External Web Auth must be configured. Designate the type as External in Security > Captive Portal > Web Authentication and designate the external BYOD server as URL. © SAMSUNG Electronics Co., Ltd.
CHAPTER 9. IP Application CHAPTER 9. IP Application In this chapter, the IP application functions available in the APC and each configuration method are described. 9.1 DNS The DNS is a network service that interprets a domain or host name into an IP address. The APC gets DNS information from a DNS server and provides the DNS relay function that relays the DNS server and a client. If a wireless terminal connected to the APC configures the APC as a DNS server, it can receive the DNS service.
CHAPTER 9. IP Application Configuration using Web UI In the menu bar of , select and then select the menu in the sub-menus. Figure 226. DNS client You can enable or disable a DNS client using the QUERY of a DNS SERVER item. In the 1ST DNS SERVER, 2ND DNS SERVER, and 3RD DNS SERVER boxes, you can configure 3 name servers. 9.1.2 DNS Proxy Configuration You can configure the DNS relay function or a cache for relay.
CHAPTER 9. IP Application Configuration using Web UI In the menu bar of , select and then select the menu in the sub-menus. Figure 227. DNS proxy The DNS Relay item supports DNS Proxy configuration. In the SERVICE, you can enable or disable a DNS proxy and configure the cache size of the DNS proxy in the CACHING SIZE. If the cache size is 0, disable the cache. © SAMSUNG Electronics Co., Ltd.
CHAPTER 9. IP Application 9.2 NTP The Network Time Protocol (NTP) is a protocol used to receive time from a configured server and synchronize the local time. The APC can operate as a NTP server and a client. If you configure the APC as a NTP client, it receives the Coordinated Universal Time (UTC) information from the configured NTP server and synchronizes the local time. In addition, if you configure the APC as a NTP server, it transmits a local time when it receives a NTP request from a NTP client.
CHAPTER 9. IP Application Parameter Description INDEX Server index (range: 1-5) Configure the version of a server that a NTP client will refer to. (Use a default value 1 if it is not configured.) ntp client server-addr hostname version [1-4]: Enable no ntp client server-addr hostname version [1-4]: Disable [Configuring based on IP address] Enable or disable. ntp client server-addr ip : Enable no ntp client server-addr ip
CHAPTER 9. IP Application [NTP Server Configuration] The NTP server configuration is as follows: 1) Go to configure mode of CLI. WEC8500# configure terminal 2) Configure a NTP server. ntp server enable: Configures a NTP server. no ntp server enable: Disables a NTP server. [Checking NTP Configuration Status] To check the status of a NTP client or server, enter the ‘show ntp’ command.
CHAPTER 9. IP Application 9.3 FTP/sFTP The FTP is a network service for file transmission. The APC support the client and server function for FTP and sFTP (Secure FTP). Configuration using CLI [SFTP Server Configuration] The secure FTP server configuration is as follows: 1) Go to configure mode of CLI. WEC8500# configure terminal 2) Enable or disable the sFTP server. sftp-server enable: Enable no sftp-server enable: Disable 3) Enter as follows to change a user’s ID and password.
CHAPTER 9. IP Application 4) To change the idle timeout, enter the command below. The unit of timeout is minutes and the default value is 15 minutes. ftp-server idle-timeout [timeout] 5) To check the status of FTP server, enter the ‘show ftp-server’ command. [Using as Client] Using the following commands, you can download or upload a file using a FTP/sFTP client. file download file upload A usage example is provided below.
CHAPTER 9. IP Application Configuration using Web UI To configure the FTP/SFTP server configuration, in the menu bar of , select and then select the menu in the sub-menus. Figure 229. FTP/SFTP server configuration The FTP and SFTP can be configured using the Enable/Disable radio box.
CHAPTER 9. IP Application 9.4 Telnet/SSH The telnet or Secure Shell (SSH) is an Internet protocol that helps login to another computer in a network or connects to a virtual remote system. Using telnet or SSH, you can connect to another computer while staying at a current computer. Because the SSH can access a remote system and transmit an encrypted message by using public key-based encryption method, it provides better security.
CHAPTER 9. IP Application [Checking Server Configuration Status] To check the status of telnet or ssh server, enter the following command. You can retrieve the configured port number as well as server status. show ssh-server: Retrieves the status of SSH server show telnet-server: Retrieves the status of telnet server [Using as Client] By using the APC as a telnet or SSH client, you can connect to a server. Enter as follows in CLI.
CHAPTER 9. IP Application 9.5 Utilities The APC provides the functions such as ping, traceroute, or tcpdump to check a network and its problems. [ping] Used to check network connection status. ping [IP_ADDRESS] [traceroute] Used to check a route path. traceroute [IP_ADDRESS] [tcpdump] Used to check the packet of a specific interface. tcpdump [INTERFACE_NAME] © SAMSUNG Electronics Co., Ltd.
CHAPTER 10. System Management CHAPTER 10. System Management In this chapter, the various functions used by an operator to manage the system and troubleshooting method are described. In addition, the configurations required for system operation such as system configuration management, resource management, alarm management, and package management, etc. and checking methods are described. 10.1 SNMP Configuration 10.1.
CHAPTER 10. System Management Configuration using Web UI In the menu bar of , select and then select the menu in the sub-menus. When you click the button in the Community window, the community creation window is displayed. When you enter a configuration value and click the button, the configuration is applied. Figure 231. Adding SNMP community 10.1.
CHAPTER 10. System Management Configuration using Web UI In the menu bar of , select and then select the menu in the sub-menus. When you click the button in the Trap Receiver window, the trap creation window is displayed. When you enter a configuration value and click the button, the configuration is applied. Figure 232. SNMP trap configuration © SAMSUNG Electronics Co., Ltd.
CHAPTER 10. System Management 10.2 System Management 10.2.1 Retrieving System Information Retrieving with CLI By using the ‘show system info’ command, you can check the system configuration information of the APC system such as version information, memory information, disk information, temperature sensor and fan status, etc.
CHAPTER 10. System Management The execution results of the command in WEC8050 are as follows: WEC8050# show system info ----------------------------------------------------Item System Info ----------------------------------------------------System Info : model type WEC8050 system description Samsung AP Controller board version 0.0 cpld version 0.
CHAPTER 10. System Management [Fan Status] For WEC8500: Parameter Description Fan [0]~[3] Fan operation status (OK, NOK) For WEC8050: Parameter Description Fan [0]~[1] Fan operation status (OK, NOK) [Power Supply Status] The WEC8500 has dual detachable power module as shown below. Parameter Description Power Supply [0]~[1] Whether a power module is equipped (Equipped, Not Equipped) Status Power module operation status (OK, NOK) The WEC8050 has only one power module as shown below.
CHAPTER 10. System Management Retrieving with Web UI In the menu bar of , select and then select the menu in the sub-menus. It provides a wide range of information, status retrieving event and alarm retrieving function of the WEC8500 system. Figure 233. System information © SAMSUNG Electronics Co., Ltd.
CHAPTER 10. System Management It provides various information, status retrieving event and alarm retrieving function of the WEC8050 system. © SAMSUNG Electronics Co., Ltd.
CHAPTER 10. System Management 10.2.2 System Reboot There is a command that can reboot the system. Rebooting can be reserved and you can cancel or retrieve the reservation. Configuration using CLI Use the ‘reboot’ command to reboot the system. WEC8500# reboot Use the ‘reboot in HH:MM:SS’ command to reserve system reboot. Once the reservation is completed, the system is rebooted after a specified time (HH:MM:SS).
CHAPTER 10. System Management [AP] Figure 235. Reboot (AP) © SAMSUNG Electronics Co., Ltd.
CHAPTER 10. System Management 10.3 System Resource Management 10.3.1 Retrieving System Status Retrieving with CLI By using the ‘show system’ command, you can check the status of each system resource such as CPU load, memory usage, disk usage, Fan RPM level, or system temperature, etc. show system cpu: Retrieves CPU load. If there are several cores, the CPU load of each core is displayed. show system memory: Retrieves memory usage. show system disk: Retrieves disk usage.
CHAPTER 10. System Management ----------------------------------------------------------------Detail CPU usage (%) control plane [23.29] [25.71] [16.90] data plane [00.01] [00.00] [00.
CHAPTER 10.
CHAPTER 10. System Management 10.3.2 Retrieving and Configuring Threshold If each resource of the system exceeds its configured threshold, there occurs an alarm. The APC helps an operator check and configure each threshold. Configuration using CLI To check each threshold, use the below command.
CHAPTER 10. System Management 10.4 Managing Alarm and Event The system alarms and events are saved into a system log and transmitted to an external server according to the filtering policy. An alarm is managed in terms of occurrence and release and an event is managed in the report format. The alarm and event are managed according to group or level. Each group or level is classified into the following item. You can select an item to retrieve.
CHAPTER 10. System Management 10.4.1 Retrieving Current Alarm All the system alarms are basically recorded into a system log.
CHAPTER 10. System Management 10.4.2 Retrieving History Retrieving with CLI The APC retrieves the history of alarm and event using the following command.
CHAPTER 10. System Management Configuration using Web UI In the menu bar of , select and then select the menu in the sub-menus. It provides status retrieving event and alarm retrieving function. Figure 238. History © SAMSUNG Electronics Co., Ltd.
CHAPTER 10. System Management 10.4.3 External Transmission Configuration All the alarms and events in the system are transmitted to outside through the SNMP trap and syslog. If the alarm filter information is configured, only filtered alarm is transmitted to an external management server. 10.4.4 Alarm Filter and Level Configuration An alarm filter can be configured per group or level (severity). The filtered alarms are transmitted to an external server through the SNMP trap and syslog.
CHAPTER 10. System Management Configuration using Web UI In the menu bar of , select and then select the menu in the sub-menus. You can retrieve the configuration related to alarm filter and alarm level. Figure 239. Configuring alarm filter and level © SAMSUNG Electronics Co., Ltd.
CHAPTER 10. System Management 10.5 Managing Traffic Performance You can manage the traffic performance statistics information and accumulated data for the APC system and the interface of each AP. 10.5.1 Managing History Information When the traffic performance information management is enabled, the APC system creates history information at every 5 minute. But, if the FTP server information is not configured, the history information is not transmitted to outside although it is created.
CHAPTER 10. System Management Stopping information collection 1) Go to configure mode of CLI. WEC8500# configure terminal 2) ‘Disable’ the traffic performance information management. WEC8500/configure# no stats-report enable 3) To check the configured information, use the ‘show stats-report conf’ command. 10.5.2 Managing Real-time Information Collection 1) Go to configure mode of CLI. WEC8500# configure terminal WEC8500/configure# 2) To collect real-time information, execute the following command.
CHAPTER 10. System Management 10.6 Managing License Key The Samsung Electronics Common License Method (SLM) is applied to Version 1.5 or newer of the APC system. Therefore, SLM licensing is applied to new websites that are installed using Version 1.5 or later. However, if Version 1.4 is upgraded to Version 1.5, the existing license key is used without any modification. The existing license which is not SLM must be installed and used also in the case of expanding or reissuing the APC system.
CHAPTER 10. System Management Installation Only two activation keys can be installed/registered in an APC system.
CHAPTER 10. System Management Configuration using Web UI In the menu bar of , select and then select the menu in the sub-menus. In the figure below, the ‘SLM License Key Status’ shows the installation and application statuses of SLM activation keys. In the ‘License Control’ section, the operator can select an activation key stored in their PC and install it in the system. In addition, the operator can also deactivate an installed activation key.
CHAPTER 10. System Management 10.6.2 Managing Old License Key An old license key can differ in regard to the number of manageable APs, whether to support the VQM function, whether to support the firewall function, and the period of use of a function. A license key is unique for each system and it consists of encrypted 53 characters. A license key is distributed in a file or text format. Installation APC system can install/register only one official license key and one temporary license key.
CHAPTER 10. System Management Parameter Description LICENSE_KEY Issued license key IP_ADDRESS IP address PORT_NUMBER Port number ID login ID PASSWORD Password PATH Server path [Deleting License Key] You can delete a license key directly. no install-key [LICENSE_KEY] Parameter Description LICENSE_KEY License key to delete [Retrieving License Key Information] To check the license key information, use the ‘show system license-key’ command.
CHAPTER 10. System Management Configuration using Web UI In the menu bar of , select and then select the menu in the sub-menus. From the APC Version 1.5 and later, in respect of old license keys, the web UI does not provide input/deletion functions and shows only whether they are installed properly.
CHAPTER 10. System Management 10.7 Syslog Configuration The system log (syslog) configuration is required to transmit an event, alarm, and system log information to a target syslog server. You can configure maximum two target syslog servers in the system and you can configure the IP address and port number independently. In addition, because you can configure a filter level, only filtered log information is transmitted to the syslog server.
CHAPTER 10. System Management Configuration using Web UI In the menu bar of , select and then select the menu in the sub-menus. It provides syslog related configuration and retrieving function. Figure 242. Syslog window © SAMSUNG Electronics Co., Ltd.
CHAPTER 10. System Management 10.8 Upgrade The APC provides the upgrade function and version checking function that applies a new version of package when it is distributed. 10.8.1 Checking Package Version You can check the version of a current system by using the following command. show version The following shows the execution results of the command: WEC8500# show version Samsung package version information Primary (currently running) ver : 1.4.4.
CHAPTER 10. System Management A usage example is provided below. When the upgrade is completed, the system is rebooted to apply the package. When executing the package upgrade command, the message recommending to save the configuration file is displayed. If you save the current configuration, operator can use it for any future version downgrade. If there is a configuration file saved during previous upgrade, the message asking whether you are going to use the file is displayed.
CHAPTER 10. System Management 4) After system rebooting, check if the new package is applied to the system. WEC8500# show reboot cause Reboot Cause: Block: Upgrade/ Code: Package Upgrade WEC8500# show version Samsung package version information Primary (currently running) ver : 0.7.1.R buildTime : Mon Aug 20 11:35:43 2012 builder : gampul buildDir : /data/nome/ymkim/apc_0817 Backup ver : 0.7.1.
CHAPTER 10. System Management 10.9 Configuration Management The APC supports the following functions for configuration management. Saves the current configuration information. Exports/imports the current configuration information (import/export).
CHAPTER 10. System Management Configuration using Web UI In the menu bar of , select and then select the menu in the sub-menus. Figure 244. DB Backup/Restore In the DB backup/restore window, enter FILE NAME and click the button to create the configuration information as a file or apply an external configuration information file. The STATUS shows the execution results of backup/restore function. © SAMSUNG Electronics Co., Ltd.
CHAPTER 10. System Management 10.10 Debug and Diagnosis 10.10.1 Process The APC can retrieve the status of an active process in the system and an error associated with each process. Retrieving the Process Status WEC8500# show processes Processes Info.
CHAPTER 10. System Management Checking process error log You can check the log of errors that occurred in a current process WEC8500# show processes log id date ----- -------------------2509. 2012-12-21 15:59:50 2510. 2012-12-21 15:59:50 2511. 2012-12-21 15:59:50 2511. 2012-12-21 15:59:50 2512. 2012-12-21 15:59:50 2513. 2012-12-21 15:59:50 2514. 2012-12-21 15:59:50 2515. 2012-12-21 15:59:50 2516. 2012-12-21 15:59:50 2517. 2012-12-21 15:59:50 2518. 2012-12-21 15:59:50 2519. 2012-12-21 15:59:50 2520.
CHAPTER 10. System Management 10.10.2 Retrieving Crash Information When a critical problem occurs in the system platform during operation, the APC saves important system information at that time to provide the crash information that can be used for post mortem analysis. The crash information includes the Crash Detect and Report (CDR) information that has the context about the crash status and the core dump information that has the memory dump about the crash status of a user process. 10.10.2.
CHAPTER 10. System Management If no parameter is entered, the most recent reboot information is retrieved.
CHAPTER 10. System Management 10.10.2.2 Retrieving Core Dump Information Use the ‘show debug coredump summary’ command to retrieve the status of core dump.
CHAPTER 10. System Management 10.11 File Management The APC provides the file management functions of copying, moving, or retrieving a file and also file download and upload. In addition, it checks the integrity of a package file and provides version retrieving method. To use a file related command, go to the file mode first. The command is basically used as follows: 1) Go to the file mode of CLI. WEC8500# file WEC8500/file# 2) Use each command. The following commands are used in the file mode.
CHAPTER 10. System Management To change a directory, use the ‘cd [TARGET_DIR]’ command. WEC8500/file# cd etc WEC8500/file# pwd disk:/etc Parameter Description TARGET_DIR Name of a directory to change 10.11.2 Retrieving Directory List To retrieve a file or directory in a specific directory, use the ‘ls’ command. If you enter only ‘ls’, all the contents in the current directory are displayed. To check only a specific directory, enter the ‘ls [TARGET_DIR]’ command. A usage example is provided below.
CHAPTER 10. System Management 10.11.3 Revising File To copy a file, use the ‘copy [SRC_FILENAME] [DES_FILENAME]’ command. The below command copies the ‘test’ file into ‘disk:/test2’. WEC8500/file# copy test disk:/test2 To delete a file, use the ‘remove [FILENAME]’ command. If you enter the below command and enter ‘y’, the ‘test2’ file is deleted. WEC8500/file# remove test2 ‘disk:/test2’ Do you really want to remove it ? (y/n) y To change a filename, use the ‘move [SRC_FILENAME] [DES_FILENAME]’ command.
CHAPTER 10. System Management 10.11.5 File Download and Upload A file is downloaded or uploaded through FTP protocol. To download a file, use the ‘download’ command. An example of downloading the ‘test’ file from ‘192.168.1.1’ to ‘disk:/test’ is shown below. WEC8500/file# download guest guest 192.168.1.1 test disk:/test To upload a file, use the ‘upload’ command. An example of uploading the ‘disk:/uploadtest’ file to ‘192.168.1.1’ is shown below. WEC8500/file# upload uploadtest guest guest 192.168.1.
CHAPTER 10. System Management Retrieving the information of a package file A package file includes the information such as version information, model information, package build information, etc. To check the content of a package file, use the ‘version’ command. [Retrieving the information of APC package file] WEC8500/file# version package/wec8500_0.3.0.R.bin ===================================================== Model : WEC8500 Version : 0.3.0.
CHAPTER 10. System Management 10.11.7 Retrieving Storage Media The WEC8500 supports a disk and USB memory as a storage media. And the WEC8050 supports only a disk as a storage media. Both current directory-based relative path and absolute path are all supported during command execution and the path of each device is shown in the below table. Device Disk Path disk:/ Description Uses the system disk as a storage media. (basic path) USB memory usb [N]:/ Uses a USB memory as a storage media.
CHAPTER 10. System Management 10.11.8 Managing File in Web UI 10.11.8.1 File Uploading and Downloading In the menu bar of , select < Administration > and then select the menu in the sub-menus. Path selection menu Figure 245.
CHAPTER 10. System Management Deleting a file After selecting the checkbox of a file to delete, click the button. Changing a filename After selecting the checkbox of a file to change its name, click the button. Then a popup window is displayed. In the popup window, enter a file name to change. Downloading a file After selecting the checkbox of a file to download, click the button.
CHAPTER 10. System Management When the operator configures an encoding method, the APC system automatically converts the encoding method of the file and allows the exported file to the WEC to be properly displayed in the PC. In addition, if the file stored in the PC is imported to the system through the WEC, it is properly processed in the system.
CHAPTER 10. System Management 10.11.9 Statistics Function It provides the statistics calculation function for statistics for group optimization. It collects statistics for each statistical item by AP/radio, radio, WLAN (SSID), device type, and RF and again by time interval. The time intervals include 5 minutes, one hour, and 24 hours and the statistical value calculated by time is displayed when the statistics items are retrieved in WEC and CLI.
CHAPTER 10. System Management 7) Retrieve call statistics by WLAN. WEC8500# show network-stats statistics voip wlan 8) Retrieve call statistics by device type. WEC8500# show network-stats statistics voip device Configuration using Web UI In the menu bar of , select and then select <802.11a/n/ac> in the sub-menus. © SAMSUNG Electronics Co., Ltd.
CHAPTER 10. System Management In the menu bar of , select and then select <802.11a/n/ac> in the sub-menus. Radio Frequency (RF) Statistics The statistics of RF show the statistics by channel for Channel-Utilization and Air-Quality and by radio for Rx(Tx)-Utilization and Noise-Level. They show the minimum, maximum, and average values and error count exceeding the threshold by 5 min., one hour, 24 hours, and total period.
CHAPTER 10. System Management 2) enable-alert: Configure whether an alert occurs regarding Channel-Utilization, AirQuality, and Noise-Level. ex.) air-quality alert ../network-stats/alert/rf-value/enable-alert# air-quality enable ../network-stats/alert/rf-value/enable-alert# no air-quality enable 3) threshold: Configure the alert threshold of each RF value by radio. ex.) air-quality 5G threshold 90 ..
CHAPTER 10. System Management Configuration using Web UI In the menu bar of , select and then select < Statistics> <802.11a/n/ac> in the submenus. Data Traffic Statistics Data traffic statistics on the air section. Possible to retrieve in a unit of AP. The statistics provide information on Control, User Data, Tx/Rx, Unicast/Muticast/Broadcast, Background/Best Effort/Video/Voice, and Peak-rate (Kbps) as detailed items.
CHAPTER 10. System Management Configuration using CLI 1) Check the configuration of the data traffic statistics and if the status is set to be disabled, set to be enabled.
CHAPTER 10. System Management Station Statistics They provide the statistics of the network optimization to check service, tracking, debugging, status transition, etc. of a station. Main statistics items provided include station latency upon connection and handover, attempt count, statistics by failure reason, RSSI, success rate, data rate by AP, Disassoc/Deauth statistics, statistics by reason, handover path statistics, kickout statistics by AP, number of users, scanning statistics by AP, etc.
CHAPTER 10. System Management 3) Configure the alert period (Duration). network-stats alert station alert-duration [VALUE] Parameter Description VALUE 30~60 Min. (default: 30 min) APC/configure# network-stats alert station alert-duration 40 Alert Duration: 40 4) Configure the alert boundary value of the assoc. success rate.
CHAPTER 10. System Management 7) Configure the alert boundary value of the disassoc. attempt count. network-stats alert station alert-disassoc-try [VALUE] Parameter Description VALUE 2~1000 (default: 30) APC/configure# network-stats alert station alert-disassoc-try 40 Disassoc Try Alert Threshold: 40 8) Configure the alert boundary value of the handover success rate.
CHAPTER 10. System Management Checking Statistical Information Using CLI 1) Check the station association latency (by AP/Device/Radio/WLAN). ex.
CHAPTER 10. System Management 3) Check the statistics by station association failure reason (by AP/Device/Radio/WLAN). ex.
CHAPTER 10. System Management 4) Check the station association RSSI MIN/MAX/AVG statistics (by AP/Device/Radio/WLAN). ex.) by WLAN APC# show network-stats statistics station association rssi wlan 1 [WLAN ID (1)] Reason Total 5Min 1Hour 1Day ====================================================================== ======== Minimum 0 0 0 0 Maximum 0 0 0 0 Average 0 0 0 0 5) Check the station association success rate statistics (by AP/Device/Radio/WLAN). ex.
CHAPTER 10. System Management Reason Total 5Min 1Hour 1Day ====================================================================== ======== 802.11b/g_1M 0 0 0 0 802.11b/g_2M 0 0 0 0 802.11b/g_5.5M 0 0 0 0 802.11b/g_11M 0 0 0 0 802.11b/g_TxFailedCount Reason Total 5Min 1Hour 1Day ====================================================================== ======== 802.11b/g_1M 0 0 0 0 802.11b/g_2M 0 0 0 0 802.11b/g_5.5M 0 0 0 0 802.11b/g_11M 0 0 0 0 802.
CHAPTER 10. System Management 802.11g_RxCount Reason Total 5Min 1Hour 1Day ====================================================================== ======== 802.11g_6M 0 0 0 0 802.11g_9M 0 0 0 0 802.11g_12M 0 0 0 0 802.11g_18M 0 0 0 0 802.11g_24M 0 0 0 0 802.11g_36M 0 0 0 0 802.11g_48M 0 0 0 0 802.
CHAPTER 10.
CHAPTER 10.
CHAPTER 10.
CHAPTER 10. System Management ====================================================================== ======== 802.11b/g_1M 0 0 0 0 802.11b/g_2M 0 0 0 0 802.11b/g_5.5M 0 0 0 0 802.11b/g_11M 0 0 0 0 802.11b/g_TxFailedCount Reason Total 5Min 1Hour 1Day ====================================================================== ======== 802.11b/g_1M 0 0 0 0 802.11b/g_2M 0 0 0 0 802.11b/g_5.5M 0 0 0 0 802.11b/g_11M 0 0 0 0 802.
CHAPTER 10. System Management 802.11g_RxCount Reason Total 5Min 1Hour 1Day ====================================================================== ======== 802.11g_6M 0 0 0 0 802.11g_9M 0 0 0 0 802.11g_12M 0 0 0 0 802.11g_18M 0 0 0 0 802.11g_24M 0 0 0 0 802.11g_36M 0 0 0 0 802.11g_48M 0 0 0 0 802.
CHAPTER 10.
CHAPTER 10.
CHAPTER 10.
CHAPTER 10. System Management 7) Check the statistics by station disassoc./Deauth reason (by AP/Device/Radio/WLAN). ex.
CHAPTER 10.
CHAPTER 10.
CHAPTER 10.
CHAPTER 10.
CHAPTER 10. System Management [5 Min] Station Station Station Station [1 Hour] Station Station Station Station [1 Day] Station Station Station Station 9) H/O H/O H/O H/O Latency Latency Latency Latency Minimum....................... Maximum....................... Average....................... Total Count................... 0 ms 0 ms 0 ms 0 H/O H/O H/O H/O Latency Latency Latency Latency Minimum....................... Maximum....................... Average....................... Total Count........
CHAPTER 10.
CHAPTER 10. System Management 12) Check the statistics of the station handover success rate (by AP/Device/Radio/WLAN). ex.) by WLAN APC# show network-stats statistics station hand-over success-rate wlan 1 Station H/O Success Rate [WLAN ID (1)]: [Total] Station Station Station Station [5 Min] Station Station Station Station [1 Hour] Station Station Station Station [1 Day] Station Station Station Station H/O H/O H/O H/O Succ Succ Succ Succ Try.............................. Success.........................
CHAPTER 10.
CHAPTER 10. System Management destAp(30)[destAp/statsCnt] destAp(31)[destAp/statsCnt] destAp(32)[destAp/statsCnt] 0/ 0/ 0/ 0 0 0 0/ 0/ 0/ 0 0 0 0/ 0/ 0/ 0 0 0 0/ 0/ 0/ 0 0 0 14) Check the station kickout statistics (by AP/Radio). ex.
CHAPTER 10. System Management 16) Check the station scanning count statistics (by AP/Radio). ex.) by AP/Radio APC# show network-stats statistics station scan 1 [AP ID (1), Radio 5-GHz] Reason Total 5Min 1Hour 1Day ====================================================================== ======== ScanStat 0 0 0 0 [AP ID (1), Radio 2.
CHAPTER 10. System Management AP Total Transmission Failure Mgmt Frame Count ... AP Total Retry Success Mgmt Frame Count .......... [RADIO 2.4-GHz] AP Total Transmitted Success Data Frame Count .... AP Total Transmission Failure Data Frame Count ... AP Total Retry Success Data Frame Count .......... AP Total Transmitted Success Mgmt Frame Count .... AP Total Transmission Failure Mgmt Frame Count ... AP Total Retry Success Mgmt Frame Count ..........
CHAPTER 10. System Management Alert checking: [Monitoring] > [Network Quality] > Alert List Checking Statistical Value of Network Network Statistics Root Path: [Monitoring] > [Statistics] > [Network Quality] 1) Check the station association latency and success rate (by AP/Device/Radio/WLAN). ex.) by WLAN [Monitoring] > [Statistics] > [Network Quality] > [by WLAN] > [Association/Handover] > General © SAMSUNG Electronics Co., Ltd.
CHAPTER 10. System Management 2) Check the station association and handover statistics (by AP/Device/Radio/WLAN). ex.) by WLAN [Monitoring] > [Statistics] > [Network Quality] > [by WLAN] > [Association/Handover] > General 3) Check the station handover latency and success rate (by AP/Device/Radio/WLAN). ex.) by WLAN [Monitoring] > [Statistics] > [Network Quality] > [by WLAN] > [Association/Handover] > General 4) Check the number of users connecting to the station (by AP/Radio/WLAN). ex.
CHAPTER 10. System Management 6) Check the statistics by cause of station association and handover failure (by AP/Device/Radio/WLAN). ex.) by WLAN [Monitoring] > [Statistics] > [Network Quality] > [by WLAN] > [Association/Handover] > Cause of Failure ※ Check the association/handover statistics by using the tab on the top of the right. © SAMSUNG Electronics Co., Ltd.
CHAPTER 10. System Management 7) Check the statistics of disassoc. and deauth count (by AP/Device/Radio/WLAN). ex.) by WLAN [Monitoring] > [Statistics] > [Network Quality] > [by WLAN] > [Association/Handover] > Disassoc/Deauth ※ Check the disassoc/deauth statistics by station/system by using the tab on the top of the right. 8) Check the statistics of disassoc. count of the UE by cause (by AP/Device/Radio/ WLAN). ex.
CHAPTER 10. System Management 9) Check the statistics of disassoc. count of the UE by status (by AP/Device/Radio/ WLAN). ex.) by WLAN [Monitoring] > [Statistics] > [Network Quality] > [by WLAN] > [Association/Handover] > Disassoc/Deauth ※ Check the disassoc/deauth statistics by station/system by using the tab on the top of the right. © SAMSUNG Electronics Co., Ltd.
CHAPTER 10. System Management 10) Check the statistics of disassoc. count of the UE by status (by AP/Radio). ex.) by AP/Radio [Monitoring] > [Statistics] > [Network Quality] > [by AP] > [802.11a/n/ac] > Transmission Speed ※ To change a radio, press 'Convert Radio' button by using the tab on the top of the right. © SAMSUNG Electronics Co., Ltd.
CHAPTER 10. System Management 11) Check the statistics of disassoc. count of the UE by status (by AP/Radio). ex.) by AP/Radio [Monitoring] > [Statistics] > [Network Quality] > [by AP] > [802.11a/n/ac] > Handover Trace ※ To change a radio, press 'Convert Radio' button by using the tab on the top of the right. © SAMSUNG Electronics Co., Ltd.
CHAPTER 10. System Management 12) Check the statistics of scan count of the UE (by AP/Radio). ex.) by AP/Radio [Monitoring] > [Statistics] > [Network Quality] > [by AP] > [802.11a/n/ac] > [Association/Handover] > RSSI/SKO ※ To change a radio, press 'Convert Radio' button by using the tab on the top of the right. 13) Check the statistics of extracted UEs (by AP/Radio). ex.) by AP/Radio [Monitoring] > [Statistics] > [Network Quality] > [by AP] > [802.
ANNEX A. CLI Command Structure ANNEX A. CLI Command Structure The structure of CLI command is as follows. A.
ANNEX A.
ANNEX A.
ANNEX A.
ANNEX A.
ANNEX A.
ANNEX A.
ANNEX A.
ANNEX A.
ANNEX A.
ANNEX A.
ANNEX A.
ANNEX A.
ANNEX A.
ANNEX A.
ANNEX A.
ANNEX A.
ANNEX A.
ANNEX A.
ANNEX A.
ANNEX A.
ANNEX A.
ANNEX A.
ANNEX A.
ANNEX A.
ANNEX A.
ANNEX A.
ANNEX A.
ANNEX A.
ANNEX A. CLI Command Structure | | | | | | | | | | | | | | | | | | | |-- metric | |-- route-type | |-- tag |-- set | |-- dampening | |-- ip | |-- metric | |-- metric-type | |-- tag © SAMSUNG Electronics Co., Ltd.
ANNEX A. CLI Command Structure A.
ANNEX A.
ANNEX A.
ANNEX A.
ANNEX A.
ANNEX A.
ANNEX A.
ANNEX A.
ANNEX A.
ANNEX A.
ANNEX A.
ANNEX A.
ANNEX A. CLI Command Structure A.
ANNEX A.
ANNEX A. CLI Command Structure A.
ANNEX A.
ANNEX A. CLI Command Structure | | | | | | | | | | | | | | | | | | | | | | | | | | | | |-- shared-memory | |-- clear | |-- add-ap | |-- del-ap | |-- findApIdListWithWlanProfileId | |-- findWlanIdWithApgIdAndWlanProfileId | |-- findWlanIdWithApIdAndWlanProfileId | |-- findWlanProfileIdWithApIdAndWlanId | |-- findWlanIdSetListWithApgId | |-- findWlanIdSetListWithAp |-- wlan | |-- reject-probe | | |-- rssi | | |-- time © SAMSUNG Electronics Co., Ltd.
ANNEX A. CLI Command Structure A.5 file |-- file | |-- download | |-- upload | |-- copy | |-- remove | |-- move | |-- ls | |-- pwd | |-- cd | |-- dump | |-- df | |-- verify | |-- version A.6 Etc |-- reboot |-- save | |-- local |-- factory-reset |-- export |-- import |-- ping |-- traceroute |-- tcpdump |-- telnet |-- ssh © SAMSUNG Electronics Co., Ltd.
ANNEX B. Open Source Announcement (WEC8500/WEC8050) ANNEX B. Open Source Announcement (WEC8500/WEC8050) Some software components of this product incorporate source code covered under the GNU General Public License (GPL), the GNU Lesser General Public License (LGPL) and BSD License etc. Acknowledgement: This product includes software developed by the OpenSSL Project for use in the OpenSSL Toolkit. (http://www.openssl.
ANNEX B. Open Source Announcement (WEC8500/WEC8050) Open Source Software License libssh2 BSD License Net SNMP-net-snmp BSD License OpenSSH BSD License Pure-FTPd BSD License Telnet BSD License ISC DHCP DHCP License Free Radius GPL 2.0 Dproxy-Caching DNS Proxy GPL 2.0 IP Utils GPL 2.0 IPwatchD GPL 2.0 NTP-The Network Time Protocol GPL 2.0 TFTP Server and Client GPL 2.0 Traceroute for Linux GPL 2.0 Sys V Init GPL 2.0 Linux Kernel GPL 2.0 NetHogs-‘net top’ per process GPL 2.
ANNEX B. Open Source Announcement (WEC8500/WEC8050) Apache License Version 2.0, January 2004 http://www.apache.org/licenses/ TERMS AND CONDITIONS FOR USE, REPRODUCTION, AND DISTRIBUTION 1. Definitions. “License” shall mean the terms and conditions for use, reproduction, and distribution as defined by Sections 1 through 9 of this document. “Licensor” shall mean the copyright owner or entity authorized by the copyright owner that is granting the License.
ANNEX B.
ANNEX B. Open Source Announcement (WEC8500/WEC8050) within a NOTICE text file distributed as part of the Derivative Works; within the Source form or documentation, if provided along with the Derivative Works; or, within a display generated by the Derivative Works, if and wherever such third-party notices normally appear. The contents of the NOTICE file are for informational purposes only and do not modify the License.
ANNEX B. Open Source Announcement (WEC8500/WEC8050) 9. Accepting Warranty or Additional Liability. While redistributing the Work or Derivative Works thereof, You may choose to offer, and charge a fee for, acceptance of support, warranty, indemnity, or other liability obligations and/or rights consistent with this License.
ANNEX B. Open Source Announcement (WEC8500/WEC8050) BSD 2.0 License Copyright(c) , All rights reserved. Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer.
ANNEX B. Open Source Announcement (WEC8500/WEC8050) DHCP License Copyright(c) 2004 by Internet Systems Consortium, Inc. (“ISC”) Copyright(c) 1996-2003 by Internet Software Consortium Permission to use, copy, modify, and distribute this software for any purpose with or without fee is hereby granted, provided that the above copyright notice and this permission notice appear in all copies.
ANNEX B. Open Source Announcement (WEC8500/WEC8050) To protect your rights, we need to make restrictions that forbid anyone to deny you these rights or to ask you to surrender the rights. These restrictions translate to certain responsibilities for you if you distribute copies of the software, or if you modify it. For example, if you distribute copies of such a program, whether gratis or for a fee, you must give the recipients all the rights that you have.
ANNEX B. Open Source Announcement (WEC8500/WEC8050) You may charge a fee for the physical act of transferring a copy, and you may at your option offer warranty protection in exchange for a fee.
ANNEX B. Open Source Announcement (WEC8500/WEC8050) c) 4) 5) 6) 7) Accompany it with the information you received as to the offer to distribute corresponding source code. (This alternative is allowed only for noncommercial distribution and only if you received the program in object code or executable form with such an offer, in accord with Subsection b above.) The source code for a work means the preferred form of the work for making modifications to it.
ANNEX B. Open Source Announcement (WEC8500/WEC8050) If any portion of this section is held invalid or unenforceable under any particular circumstance, the balance of the section is intended to apply and the section as a whole is intended to apply in other circumstances.
ANNEX B. Open Source Announcement (WEC8500/WEC8050) NO WARRANTY 11) BECAUSE THE PROGRAM IS LICENSED FREE OF CHARGE, THERE IS NO WARRANTY FOR THE PROGRAM, TO THE EXTENT PERMITTED BY APPLICABLE LAW. EXCEPT WHEN OTHERWISE STATED IN WRITING THE COPYRIGHT HOLDERS AND/OR OTHER PARTIES PROVIDE THE PROGRAM “AS IS” WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESSED OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE.
ANNEX B. Open Source Announcement (WEC8500/WEC8050) You should have received a copy of the GNU General Public License along with this program; if not, write to the Free Software Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 021101301 USA. Also add information on how to contact you by electronic and paper mail.
ANNEX B. Open Source Announcement (WEC8500/WEC8050) GNU LESSER GENERAL PUBLIC LICENSE Version 2.1, February 1999 Copyright(c) 1991, 1999 Free Software Foundation, Inc. 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA Everyone is permitted to copy and distribute verbatim copies of this license document, but changing it is not allowed. [This is the first released version of the Lesser GPL. It also counts as the successor of the GNU Library Public License, version 2, hence the version number 2.1.
ANNEX B. Open Source Announcement (WEC8500/WEC8050) Also, if the library is modified by someone else and passed on, the recipients should know that what they have is not the original version, so that the original author’s reputation will not be affected by problems that might be introduced by others. Finally, software patents pose a constant threat to the existence of any free program.
ANNEX B. Open Source Announcement (WEC8500/WEC8050) TERMS AND CONDITIONS FOR COPYING, DISTRIBUTION AND MODIFICATION 0) This License Agreement applies to any software library or other program which contains a notice placed by the copyright holder or other authorized party saying it may be distributed under the terms of this Lesser General Public License (also called “this License”). Each licensee is addressed as “you”.
ANNEX B. Open Source Announcement (WEC8500/WEC8050) d) If a facility in the modified Library refers to a function or a table of data to be supplied by an application program that uses the facility, other than as an argument passed when the facility is invoked, then you must make a good faith effort to ensure that, in the event an application does not supply such function or table, the facility still operates, and performs whatever part of its purpose remains meaningful.
ANNEX B. Open Source Announcement (WEC8500/WEC8050) 5) A program that contains no derivative of any portion of the Library, but is designed to work with the Library by being compiled or linked with it, is called a “work that uses the Library”. Such a work, in isolation, is not a derivative work of the Library, and therefore falls outside the scope of this License.
ANNEX B. Open Source Announcement (WEC8500/WEC8050) b) Use a suitable shared library mechanism for linking with the Library. A suitable mechanism is one that (1) uses at run time a copy of the library already present on the user’s computer system, rather than copying library functions into the executable, and (2) will operate properly with a modified version of the library, if the user installs one, as long as the modified version is interface-compatible with the version that the work was made with.
ANNEX B. Open Source Announcement (WEC8500/WEC8050) 9) You are not required to accept this License, since you have not signed it. However, nothing else grants you permission to modify or distribute the Library or its derivative works. These actions are prohibited by law if you do not accept this License.
ANNEX B. Open Source Announcement (WEC8500/WEC8050) 13) The Free Software Foundation may publish revised and/or new versions of the Lesser General Public License from time to time. Such new versions will be similar in spirit to the present version, but may differ in detail to address new problems or concerns. Each version is given a distinguishing version number.
ANNEX B. Open Source Announcement (WEC8500/WEC8050) How to Apply These Terms to Your New Libraries If you develop a new library, and you want it to be of the greatest possible use to the public, we recommend making it free software that everyone can redistribute and change. You can do so by permitting redistribution under these terms (or, alternatively, under the terms of the ordinary General Public License). To apply these terms, attach the following notices to the library.
ANNEX B. Open Source Announcement (WEC8500/WEC8050) libsmi license Copyright(c) 1999-2002 Frank Strauss, Technical University of Braunschweig. This software is copyrighted by Frank Strauss, the Technical University of Braunschweig, and other parties. The following terms apply to all files associated with the software unless explicitly disclaimed in individual files.
ANNEX B. Open Source Announcement (WEC8500/WEC8050) libxml2 License Except where otherwise noted in the source code (e.g. the files hash.c, list.c and the trio files, which are covered by a similar licence but with different Copyright notices) all the files are: Copyright(c) 1998-2003 Daniel Veillard. All Rights Reserved.
ANNEX B.
ANNEX B. Open Source Announcement (WEC8500/WEC8050) LICENSE ISSUES The OpenSSL toolkit stays under a dual license, i.e. both the conditions of the OpenSSL License and the original SSLeay license apply to the toolkit. See below for the actual license texts. Actually both licenses are BSD-style Open Source licenses. In case of any license issues related to OpenSSL please contact openssl-core@openssl.org. OpenSSL License Copyright(c) 1998-2004 The OpenSSL Project. All rights reserved.
ANNEX B. Open Source Announcement (WEC8500/WEC8050) Original SSLeay License Copyright(c) 1995-1998 Eric Young (eay@cryptsoft.com) All rights reserved. This package is an SSL implementation written by Eric Young (eay@cryptsoft.com). The implementation was written so as to conform with Netscapes SSL. This library is free for commercial and non-commercial use as long as the following conditions are adheared to.
ANNEX B. Open Source Announcement (WEC8500/WEC8050) The license and distribution terms for any publically available version or derivative of this code cannot be changed. i.e. this code cannot simply be copied and put under another distribution license [including the GNU Public Licence.] The zlib/libpng License Copyright(c) This software is provided ‘as-is’, without any express or implied warranty.
ANNEX C. Open Source Announcement (WEA302/WEA303/ WEA312/WEA313/WEA403/WEA412) ANNEX C. Open Source Announcement (WEA302/WEA303/ WEA312/WEA313/WEA403/WEA412) Some software components of this product incorporate source code covered under the GNU General Public License (GPL), the GNU Lesser General Public License (LGPL) and BSD License etc. Acknowledgement: This product includes software developed by the OpenSSL Project for use in the OpenSSL Toolkit. (http://www.openssl.
ANNEX C. Open Source Announcement (WEA302/WEA303/ WEA312/WEA313/WEA403/WEA412) Open Source Software License ICS DHCP BSD License mini_httpd-small HTTP server BSD License netkit-routed BSD License WIDE Project BSD License The libpcap project BSD License net-snmp BSD License OpenSSH BSD License Radvd BSD License ISC DHCP DHCP License RedBoot eCos license version 2.0 Bridge-Utils GPL 2.0 BusyBox GPL 2.0 GNU Core Utils GPL 2.0 Free Radius GPL 2.0 GNU grep GPL 2.
ANNEX C. Open Source Announcement (WEA302/WEA303/ WEA312/WEA313/WEA403/WEA412) Open Source Software License IGMPproxy GPL 2.0 inadyn GPL 2.0 iproute2 GPL 2.0 IPTables GPL 2.0 NTFS-3G driver GPL 2.0 NX-ROUTED GPL 2.0 pppoe GPL 2.0 TspctPlugin GPL 2.0 Zebra GPL 2.0 Netfilter GPL 2.0 Bash GPL 2.0 GNU awk GPL 2.0 inetutils GPL 2.0 GNU sed GPL 2.0 Iperf Iperf License Atheros-based WiFi Hardware Abstraction Layer Kaffe ISC License libnl LGPL 2.1 LZMA SDK LGPL 2.
ANNEX C. Open Source Announcement (WEA302/WEA303/ WEA312/WEA313/WEA403/WEA412) BSD 2.0 License Copyright(c) , All rights reserved. Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer.
ANNEX C. Open Source Announcement (WEA302/WEA303/ WEA312/WEA313/WEA403/WEA412) Internet Systems Consortium, Inc. 950 Charter Street Redwood City, CA 94063 info@isc.org http://www.isc.org/ Full eCos license This is the full text of the license as found on files within eCos covered by the eCos license. It should be read in conjuction with the GNU General Public License (GPL) on which it depends. This file is part of eCos, the Embedded Configurable Operating System.
ANNEX C. Open Source Announcement (WEA302/WEA303/ WEA312/WEA313/WEA403/WEA412) GNU GENERAL PUBLIC LICENSE Version 2, June 1991 Copyright(c) 1989, 1991 Free Software Foundation, Inc. 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA Everyone is permitted to copy and distribute verbatim copies of this license document, but changing it is not allowed. Preamble The licenses for most software are designed to take away your freedom to share and change it.
ANNEX C. Open Source Announcement (WEA302/WEA303/ WEA312/WEA313/WEA403/WEA412) The precise terms and conditions for copying, distribution and modification follow. TERMS AND CONDITIONS FOR COPYING, DISTRIBUTION AND MODIFICATION 0) This License applies to any program or other work which contains a notice placed by the copyright holder saying it may be distributed under the terms of this General Public License.
ANNEX C. Open Source Announcement (WEA302/WEA303/ WEA312/WEA313/WEA403/WEA412) Thus, it is not the intent of this section to claim rights or contest your rights to work written entirely by you; rather, the intent is to exercise the right to control the distribution of derivative or collective works based on the Program.
ANNEX C. Open Source Announcement (WEA302/WEA303/ WEA312/WEA313/WEA403/WEA412) 6) Each time you redistribute the Program (or any work based on the Program), the recipient automatically receives a license from the original licensor to copy, distribute or modify the Program subject to these terms and conditions. You may not impose any further restrictions on the recipients’ exercise of the rights granted herein. You are not responsible for enforcing compliance by third parties to this License.
ANNEX C. Open Source Announcement (WEA302/WEA303/ WEA312/WEA313/WEA403/WEA412) 10) If you wish to incorporate parts of the Program into other free programs whose distribution conditions are different, write to the author to ask for permission. For software which is copyrighted by the Free Software Foundation, write to the Free Software Foundation; we sometimes make exceptions for this.
ANNEX C. Open Source Announcement (WEA302/WEA303/ WEA312/WEA313/WEA403/WEA412) How to Apply These Terms to Your New Programs If you develop a new program, and you want it to be of the greatest possible use to the public, the best way to achieve this is to make it free software which everyone can redistribute and change under these terms. To do so, attach the following notices to the program.
ANNEX C. Open Source Announcement (WEA302/WEA303/ WEA312/WEA313/WEA403/WEA412) Iperf License Copyright(c) 1999-2007, The Board of Trustees of the University of Illinois All Rights Reserved. Iperf performance test Mark Gates Ajay Tirumala Jim Ferguson Jon Dugan Feng Qin Kevin Gibbs John Estabrook National Laboratory for Applied Network Research National Center for Supercomputing Applications University of Illinois at Urbana-Champaign http://www.ncsa.uiuc.
ANNEX C. Open Source Announcement (WEA302/WEA303/ WEA312/WEA313/WEA403/WEA412) GNU LESSER GENERAL PUBLIC LICENSE Version 2.1, February 1999 Copyright(c) 1991, 1999 Free Software Foundation, Inc. 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA Everyone is permitted to copy and distribute verbatim copies of this license document, but changing it is not allowed. [This is the first released version of the Lesser GPL.
ANNEX C. Open Source Announcement (WEA302/WEA303/ WEA312/WEA313/WEA403/WEA412) Finally, software patents pose a constant threat to the existence of any free program. We wish to make sure that a company cannot effectively restrict the users of a free program by obtaining a restrictive license from a patent holder. Therefore, we insist that any patent license obtained for a version of the library must be consistent with the full freedom of use specified in this license.
ANNEX C. Open Source Announcement (WEA302/WEA303/ WEA312/WEA313/WEA403/WEA412) TERMS AND CONDITIONS FOR COPYING, DISTRIBUTION AND MODIFICATION 0) This License Agreement applies to any software library or other program which contains a notice placed by the copyright holder or other authorized party saying it may be distributed under the terms of this Lesser General Public License (also called “this License”). Each licensee is addressed as “you”.
ANNEX C. Open Source Announcement (WEA302/WEA303/ WEA312/WEA313/WEA403/WEA412) d) If a facility in the modified Library refers to a function or a table of data to be supplied by an application program that uses the facility, other than as an argument passed when the facility is invoked, then you must make a good faith effort to ensure that, in the event an application does not supply such function or table, the facility still operates, and performs whatever part of its purpose remains meaningful.
ANNEX C. Open Source Announcement (WEA302/WEA303/ WEA312/WEA313/WEA403/WEA412) 5) A program that contains no derivative of any portion of the Library, but is designed to work with the Library by being compiled or linked with it, is called a “work that uses the Library”. Such a work, in isolation, is not a derivative work of the Library, and therefore falls outside the scope of this License.
ANNEX C. Open Source Announcement (WEA302/WEA303/ WEA312/WEA313/WEA403/WEA412) b) Use a suitable shared library mechanism for linking with the Library.
ANNEX C. Open Source Announcement (WEA302/WEA303/ WEA312/WEA313/WEA403/WEA412) 9) You are not required to accept this License, since you have not signed it. However, nothing else grants you permission to modify or distribute the Library or its derivative works. These actions are prohibited by law if you do not accept this License.
ANNEX C. Open Source Announcement (WEA302/WEA303/ WEA312/WEA313/WEA403/WEA412) 14) If you wish to incorporate parts of the Library into other free programs whose distribution conditions are incompatible with these, write to the author to ask for permission. For software which is copyrighted by the Free Software Foundation, write to the Free Software Foundation; we sometimes make exceptions for this.
ANNEX C. Open Source Announcement (WEA302/WEA303/ WEA312/WEA313/WEA403/WEA412) How to Apply These Terms to Your New Libraries If you develop a new library, and you want it to be of the greatest possible use to the public, we recommend making it free software that everyone can redistribute and change. You can do so by permitting redistribution under these terms (or, alternatively, under the terms of the ordinary General Public License). To apply these terms, attach the following notices to the library.
ANNEX C. Open Source Announcement (WEA302/WEA303/ WEA312/WEA313/WEA403/WEA412) LICENSE ISSUES The OpenSSL toolkit stays under a dual license, i.e. both the conditions of the OpenSSL License and the original SSLeay license apply to the toolkit. See below for the actual license texts. Actually both licenses are BSD-style Open Source licenses. In case of any license issues related to OpenSSL please contact openssl-core@openssl.org. OpenSSL License Copyright(c) 1998-2004 The OpenSSL Project.
ANNEX C. Open Source Announcement (WEA302/WEA303/ WEA312/WEA313/WEA403/WEA412) Original SSLeay License Copyright(c) 1995-1998 Eric Young (eay@cryptsoft.com) All rights reserved. This package is an SSL implementation written by Eric Young (eay@cryptsoft.com). The implementation was written so as to conform with Netscapes SSL. This library is free for commercial and non-commercial use as long as the following conditions are adheared to.
ANNEX C. Open Source Announcement (WEA302/WEA303/ WEA312/WEA313/WEA403/WEA412) OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. The license and distribution terms for any publically available version or derivative of this code cannot be changed. i.e.
ANNEX C. Open Source Announcement (WEA302/WEA303/ WEA312/WEA313/WEA403/WEA412) The license that applies to the changes permits you to distribute the changes to the Vim maintainer without fee or restriction, and permits the Vim maintainer to include the changes in the official version of Vim without fee or restriction. You keep the changes for at least three years after last distributing the corresponding modified Vim.
ABBREVIATION ABBREVIATION A ACL Access Control List AES Advanced Encryption Standard ALG Application Layer Gateway AP Access Point APC Access Point Controller BPDU Bridge Protocol Data Unit CAC Call Admission Control CAPWAP Control And Provisioning Wireless Access Point CCM Counter mode encryption with CBC-MAC CCMP Counter mode encryption with CBC-MAC Protocol CCTV Closed Circuit Television CDR Crash Detect and Report CHDC Coverage Hole Detection and Control CLI Command Line Int
ABBREVIATION E EAP Extensible Authentication Protocol EAPOL EAP over LANs EDCA Enhanced Distributed Channel Access FFT Fast Fourier Transform FIFO First-In-First-Out FMC Fixed Mobile Convergence FTP File Transfer Protocol GARP GbE GI Gratuitous Address Resolution Protocol Giga Bit Ethernet Guard Interval HO Handover IGMP IP IPWATCHD IV Internet Group Management Protocol Internet Protocol IP WATCH Deamon Initial Vector LACP LAN LED LSA Link Aggregation Control Protocol Local Area Networ
ABBREVIATION O OKC OSPF OUI Opportunistic Key Caching Open Shortest Path First Organizationally Unique Identifier PHY PIM-SM PoE PMK PSK Physical layer Protocol Independent Multicast-Sparse Mode Power over Ethernet Pairwise Master Key Pre-Shared Key QoS Quality of Service RADIUS Remote Authentication Dial-In User Service RF Radio Frequency RPM Revolution Per Minute RRM Radio Resource Management RSSI Received Signal Strength Indication RSTP Rapid Spanning-Tree Protocol RTP Real-time Trans
ABBREVIATION V VAP Virtual Access Point VATS Voice-Aware Traffic Scheduling VLAN Virtual Local Area Network VoIP Voice over IP VPN Virtual Private Network VQM Voice Quality Monitoring VRRP Virtual Router Redundancy Protocol WAN Wide Area Network WDS Wireless Distribution Service WEM Wireless Enterprise WLAN Manager WEP Wired Equivalent Privacy Wi-Fi Wireless Fidelity WIDS Wireless Intrusion Detection System WIPS Wireless Intrusion Prevention System WLAN Wireless Local Area Netw
WEC8500/WEC8050 (APC) Operation Manual © 2013~2014 Samsung Electronics Co., Ltd. All rights reserved. Information in this manual is proprietary to SAMSUNG Electronics Co., Ltd. No information contained here may be copied, translated, transcribed or duplicated by any form without the prior written consent of SAMSUNG. Information in this manual is subject to change without notice. © SAMSUNG Electronics Co., Ltd.