Access / One® Network Syslog Messages Format The following format is used for all Access/One Network syslog messages:
Access / One® Network Severity Levels The following severity levels are assigned to syslog messages (shown here in descending order from the most severe): ◗ EMERGENCY ◗ ALERT ◗ CRITICAL ◗ ERROR ◗ WARNING ◗ NOTICE ◗ INFORM ◗ DEBUG Assigning a severity level informs the system to automatically log all messages in that level, and all messages above that level (messages below the assigned level are not logged). Message Listing The following tables list syslog messages by subsystem.
Access / One® Network Severity Syslog Message WARNING CLI login failed, invalid password. WARNING Too many invalid login attempts. NOTICE Telnet user logged in, user:XXXXX. NOTICE CLI user logged in, user:XXXXX. NOTICE Telnet user logged out, user:XXXXX. NOTICE CLI user logged out, user:XXXXX. NOTICE Super user logged in. Wireless Subsystem Severity Syslog Message EMERGENCY Failed to start the radio. EMERGENCY AP/STA features not enabled. EMERGENCY Error while starting the module.
Access / One® Network Severity B 176 Syslog Message ERROR Reassociation fails, not authenticated, ssid:XXXXX,vlan:[id=x tag=x], mac:xx.xx.xx.xx.xx.xx. ERROR Association fails, already associated, ssid:XXXXX,vlan:[id=x tag=x], mac:xx.xx.xx.xx.xx.xx. ERROR Reassociation fails, already associated, ssid:XXXXX,vlan:[id=x tag=x], mac:xx.xx.xx.xx.xx.xx. ERROR Association fails, can't authenticate during scan, ssid:ssid:XXXXX, vlan:[id=x tag=x], mac:xx.xx.xx.xx.xx.xx.
Access / One® Network Severity Syslog Message ERROR Association fails, module is not ready, mac:xx:xx:xx:xx:xx:xx. ERROR Reassociation fails, module is not ready, mac:xx:xx:xx:xx:xx:xx. WARNING Authentication[3] fails, auth:shared, wlanmode:X, mac:xx.xx.xx.xx.xx.xx. WARNING Unsupported 802.11 authentication request, auth:LEAP, wlanmode:X, mac:xx.xx.xx.xx.xx.xx. WARNING Unsupported 802.11 authentication request, auth:x(hex), wlanmode:X, mac:xx.xx.xx.xx.xx.xx.
Access / One® Network B 178 Severity Syslog Message NOTICE Stack ID is available, stackId:XXXXXX. NOTICE The unit/Radio x will operate as - Network Connect. NOTICE The unit/Radio x will operate as - Client Connect. NOTICE The unit/Radio x will switch to - Client Connect. NOTICE Added station, mac:xx.xx.xx.xx.xx.xx. NOTICE Deauthentication completed, mac:xx.xx.xx.xx.xx.xx. NOTICE Association with AP done, response NOT sent, wlanmode:X, ssid:XXXX, mac:xx:xx:xx:xx:xx:xx.
Access / One® Network Severity Syslog Message NOTICE Authentication failed, type=XXX, reason=XXXX, mac:xx:xx:xx:xx:xx:xx. NOTICE Authentication done, type=XXX, mac:xx:xx:xx:xx:xx:xx. NOTICE Device will switch to Access Point. Management Subsystem Severity Syslog Message WARNING Fan failed. WARNING Temperature alarm on. WARNING DHCP Bind failed. WARNING Image load failed. NOTICE xx.xx.xx.xx detected rogue device [xx:xx:xx:xx:xx:xx] with RSSI [xxxx] channel [xxxx] SSID [XXXXX].
Access / One® Network Severity B 180 Syslog Message NOTICE Include list updated. INFORM Load image file XXXXX from XXXXXX. INFORM Image load is done. INFORM Received DHCP, IP - xx.xx.xx.xx, Gateway - xx.xx.xx.xx.
Access / One® Network Supported MIBs MIBs that are supported with Access/One Network include the following: Strix Private MIBs STRIX-PRODUCTS.mib Define the object identifiers assigned to various Strix hardware platforms. STRIX-CONFIG-SYSTEM.mib Configuration MIB for system wide parameters, including Usernames and Passwords, DHCP, DNS, SNTP, FTP, CoS, Trusted IPs, Syslog, and RADIUS accounting. STRIX-CONFIG-WIFI.mib Configuration MIB for 802.
Access / One® Network STRIX-ENT-TRAPS.mib List of traps that Strix devices can generate. STRIX-CONFIG-TRAPS.mib Configuration MIB for enabling and disabling specific traps per trap manager. STRIX-ACCESSONE-CAPABILITY.mib Indicates the level of support implemented by an SNMP agent on the Access/ One Network with respect to standard MIBs.
Access / One® Network Glossary of Terms 802.11a A supplement to the IEEE 802.11 wireless LAN (WLAN) specification that describes transmission through the physical layer (PHY) based on orthogonal frequency division multiplexing (OFDM), at a frequency of 5 GHz and data rates of up to 54 Mbps. See also, OFDM. 802.1D The IEEE LAN specification for remote media access control (MAC) bridging. 802.11g A supplement to the IEEE 802.
Access / One® Network 802.11x An IEEE specification that defines wireless LAN (WLAN) data link and physical layers. The specification includes data link layer media access control (MAC) sub-layer, and two sub-layers of the physical (PHY) layer-a frequency-hopping spread-spectrum (FHSS). See also, FHSS. 802.2 IEEE specification that describes the logical link control (LLC) encapsulation common to all 802 series LANs. 802.
Access / One® Network baud rate The number of pulses of a signal that occur in one second. Thus, baud rate is the speed at which digital signal pulses travel. Beacon A uniframe system packet broadcast by the AP to keep the network synchronized. A beacon Includes the Net_ID (ESSID), the AP address, the broadcast destination addresses, a time stamp, a DTIM (Delivery Traffic Indicator Maps) and the TIM (Traffic Indicator Message). bit rate The transmission rate of binary symbols ('0' and '1').
Access / One® Network DHCP (Dynamic Host Configuration Protocol) A method for dynamically assigning IP addresses to devices on a network. Issues IP addresses automatically within a specified range to devices such as PCs when they are first powered up. The device retains the use of the IP address for a specific license period defined by the system administrator. EAP (Extensible Authentication Protocol) A general point-to-point protocol that supports multiple authentication mechanisms.
Access / One® Network FHSS (Frequency-Hopping Spread-Spectrum) One of two types of spread-spectrum radio technology used in wireless LAN (WLAN) transmissions. The FHSS technique modulates the data signal with a narrowband carrier signal that “hops” in a predictable sequence from frequency to frequency as a function of time over a wide band of frequencies.
Access / One® Network IAPP (InterAP Protocol) A protocol being developed as the 802.11f version of the IEEE 802.11 wireless LAN (WLAN) specification to support interoperability, mobility, handover, and coordination among Access Points (APs). Implemented on top of IP, IAPP uses UDP/IP and Sub-network Access Protocol (SNAP) as transfer protocols. See also, 802.11x. IAS (Internet Authentication Service) Microsoft's RADIUS server. See also, RADIUS.
Access / One® Network MD5 (Message Direct algorithm 5) A one-way hashing algorithm used in many authentication algorithms to derive cryptographic keys. MD5 takes a message of an arbitrary length and creates a 128-bit message digest. See also, authentication. MIB (Management Information Base) A set of parameters an SNMP management station can query or establish in the SNMP agent of a network device (for example, a router).
Access / One® Network OFDM (Orthogonal Frequency Division Multiplexing) A technique that splits a wide frequency band into a number of narrow frequency bands and sends data across the sub-channels. The 802.11a and 802.11g standards are based on OFDM. See also, 802.11a and 802.11g. open system authentication The IEEE 802.11 default authentication method.
Access / One® Network PKCS (Public-Key Cryptography Standards) A group of specifications produced by RSA and secure systems developers, and first published in 1991. Among many other features and functions, the standards define syntax for digital certificates, certificate signing requests and key exchanges. PKI (Public-Key Infrastructure) Software that enables users of an insecure public network such as the Internet to exchange information securely and privately.
Access / One® Network PPTP (Point-to-Point Tunneling Protocol) A protocol from Microsoft that is used to create a virtual private network (VPN) over the Internet. It uses Microsoft's Pointto-Point Encryption (MPPE), which is based on RSA's RC4. It only uses static keys and should not be used to secure WLANs. See also, VPN. pre-master secret A key generated during the handshake process in Transport Layer Security (TLS) protocol negotiations and used to derive a master secret. See also, TLS.
Access / One® Network RADIUS (Remote Authentication Dial-In User Service) A client-server security protocol described in RFC 2865 and RFC 2866. Developed to authenticate, authorize, and account for dial-up users, RADIUS has been widely extended to broadband and enterprise networking. The RADIUS server stores user profiles, which include passwords and authorization attributes. See also, authentication and authorization. RC4 (River Cipher 4) A common encryption algorithm, designed by RSA.
Access / One® Network RSN (Robust Security Network) A secure wireless LAN (WLAN) based on the developing IEEE 802.11i standard. See also, 802.11i. shared secret A static key distributed by an out-of-band mechanism to both the sender and receiver. Also known as a shared key or pre-shared key (PSK), a shared secret is used as input to a one-way hash algorithm.
Access / One® Network SSID (Service Set Identifier) The unique name shared among all devices in a wireless LAN (WLAN). station In IEEE 802.11 networks, any device that contains an IEEE 802.11-compliant media access control and physical layers. See also, 802.11x. TKIP (Temporal Key Integrity Protocol) A wireless encryption protocol that fixes the known problems in the Wired-Equivalent Privacy (WEP) protocol for existing 802.11 products.
Access / One® Network Tunneling A technology that enables one network to send its data via another network's connections. Tunneling works by encapsulating a network protocol within packets carried by the second network. For example, Microsoft's PPTP technology enables organizations to use the Internet to transmit data across a Virtual Private Network (VPN). It does this by embedding its own network protocol within the TCP/IP packets carried by the Internet. See also, PPTP and VPN.
Access / One® Network VPN (Virtual Private Network) A virtual private network (VPN) is a way to use a public telecommunication infrastructure, such as the Internet, to provide remote offices or individual users with secure access to their organization's network. A VPN works by using the shared public infrastructure while maintaining privacy through security procedures and tunneling protocols such as the Layer Two Tunneling Protocol (L2TP).
Access / One® Network XML (eXtensible Markup Language) A simpler and easier-to-use subset of the Standard Generalized Markup Language (SGML), with unlimited, self-defining markup symbols (tags). Developed by the World Wide Web Consortium (W3C), the XML specification provides a flexible way to create common information formats and share both the format and the data on the Internet, Intranets, and elsewhere.
Access / One® Network Index Numerics 802.11a 97 802.11g 98 A about this user’s guide 1 access control list 106 accessone.bin 36 accessone_m.
Access / One® Network D data input 64 data rate 151 data trust level 113 date and time 88, 145 daylight saving time 89 default gateway 78 deployment 8 details pane 38 device information 164 DHCP server 23 options 24 DNS server 79 DTIM 154 dual radio 18 dynamic operation 14 E elevation 140 encryption 14, 17, 104 Ethernet segments 20 explosive device proximity 7 exporting CSV 118 F IX f 42 factory defaults 19, 135 file name 146 file type 136 file version 136 firmware downloading 36 updating 35 firmware u
Access / One® Network lightning protection 18 load firmware 136 load firmware on network 68 logical mesh view 19 long distances 150 longitude 140 M Manage function 65, 134 Management Information Base 20 Manager/One 18 accessing for the first time 31 an overview 43 auto-discovered 63 choice of layouts 45 commands 60 details pane 56 exporting inventory 63 factory default 62 general layout 44 icon view 49 installing 27 intuitive mouse-over 18 inventory 63 launching 29 legends 61 list view 49 logical mesh view
Access / One® Network Wireless Client Query 122 mouse-over 18, 64 multi-version environment 35 N Network Connect 17, 109, 156 network management 15, 65, 73, 141 general 141 SNMP 142 network name 139 network scenarios metro 5 transportation 10 Network Server 14 network topology 79 node commands update network membership 131 update node names 130 notes 3 notices 6 European Community 6 Industry Canada 6 non-modification 6 RF exposure 6 VCCI 6 NTP setting up 33 Windows 2000 33 O IX operating environment 91,
Access / One® Network ping 30 PoE 20 power 151 power settings 167 power supply 7 Power-over-Eternet 20 printing an inventory 117 prioritising traffic 15 priority assignment 171 Priority/One 20, 81, 144 product images 4 protection mode 99, 152 protection rate 153 protection type 153 public safety 18, 22, 97, 149, 152, 170 R radio parameters 95, 147 radio statistics 160 RADIUS accounting 21, 84, 144 reboot 137 reboot network 68 rebooting 4 registry editor 33 remote management 20 remote network server 70 excl
Access / One® Network load firmware 129 reboot 129 subnet management 127 Super G 22 support 167, 171 symbols used in this guide 3 Syslog 85 syslog 21, 144 system 71, 138 network management 141 TCP/IP settings 143 user login 139 system and security 19 Ethernet segments 20 factory defaults 19 GPS positioning 19 inventory control 19 network server 20 PoE 20 Power-over-Ethernet 20 Priority/One 20 RADIUS accounting 21 remote management 20 syslog 21 system logging 21 system and securityzero configuration 21 syste
Access / One® Network W warnings 7, 3 antenna placement 8 battery 8 electrical power 7 general safety 7 grounding the unit 8 lightning activity 7 warranty 171 welcome 5 WEP 21 why choose Access/One Network 8 Wi-Fi 146 radio parameters 147 Windows 2000 33 wireless 22 channel coordination 22 channel list 22 client query 22 Super G 22 WLAN associations 22 wireless client monitor 162 wireless mode 150 wireless neighbors 161 Wireless Workgroups 17 WLAN associations 22 WPA 21 Z zero configuration 21 IX Index
Access / One® Network IX 206 Index