Proxim Orinoco AP-2000-User Guide
Proxim Orinoco AP-2000-User Guide
Proxim Orinoco AP-2000-User Guide
User Guide
Copyright
2003-2004 Proxim Corporation. All rights reserved. Covered by one or more of the following U.S. patents: 5,231,634; 5,875,179; 6,006,090; 5,809,060; 6,075,812; 5,077,753. This users guide and the software described in it are copyrighted with all rights reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval system, or translated into any language in any form by any means without the written permission of Proxim Corporation.
Trademarks
ORiNOCO is a registered trademark, and Proxim, and the Proxim logo are trademarks of Proxim Corporation. All other trademarks mentioned herein are the property of their respective owners.
ORiNOCO AP-2000 Users Guide Software v2.5.2 P/N 68666 R1 October 2004
Contents
1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .12
Document Conventions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12 Introduction to Wireless Networking . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
Guidelines for Roaming . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
Initialization . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24
ScanTool . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24 ScanTool Instructions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24 Setup Wizard . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26 Setup Wizard Instructions. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26
Contents
LED Indicators . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32
Network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39
IP Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39 DHCP Server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 40 Link Integrity . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41
Interfaces . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42
Operational Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43 Operational Mode Selection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43 8Wireless-A and Wireless-B . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43 Wireless A (802.11a) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43 Wireless (802.11b) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 45 Wireless (802.11b/g). . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 48 Wireless Distribution System (WDS) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 49 Ethernet . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 52
Management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 53
Passwords . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 53 IP Access Table . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 53 Services . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 54 Secure Management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 54 SNMP Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 54 HTTP Access . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 54 HTTPS Access . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 54 Telnet Configuration Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 56 Secure Shell (SSH) Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 56 Serial Configuration Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 58 RADIUS Based Management Access . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 58 Automatic Configuration (AutoConfig) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 59 Auto Configuration and the CLI Batch File . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 59 Hardware Configuration Reset (CHRP). . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 62 Configuration Reset via Serial Port During Bootup . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 62 Configuring Hardware Configuration Reset . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 63
Contents
Procedure to Reset Configuration via the Serial Interface . . . . . . . . . . . . . . . . . . . . . . . . . 63
Filtering . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 64
Ethernet Protocol . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 64 Static MAC . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 64 Static MAC Filter Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 66 Advanced. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 67 TCP/UDP Port . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 67 Adding TCP/UDP Port Filters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 67 Editing TCP/UDP Port Filters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 68
Alarms . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 69
Groups . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 69 Severity Levels . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 72 Alarm Host Table . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 72 Syslog . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 72 Setting Syslog Event Notifications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 72 Configuring Syslog Event Notifications. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 72 Syslog Messages . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 73 Rogue Access Point Detection (RAD) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 74 RAD Configuration Requirements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 74 Configuring RAD. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 75
Bridge . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 76
Spanning Tree . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 76 Storm Threshold . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 76 Intra BSS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 76 Packet Forwarding (Pkt Fwd) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 77
SSID/VLAN/Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 83
Management VLAN . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 83 VLAN Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 83 Enabling/Disabling VLAN Protocol . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 85 MAC Access . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 86 5
Contents
Configuring MAC Access . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 86 Security Profiles. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 87 WEP Encryption . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 87 802.1x Authentication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 87 Wi-Fi Protected Access (WPA) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 88 Authentication Protocol Hierarchy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 89 VLANs and Security Profiles . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 89 Configuring Security Profiles . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 90 Wireless-A and Wireless-B . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 93 Adding or Modifying an SSID/VLAN with VLAN Protocol Disabled . . . . . . . . . . . . . . . . . . 93 Adding or Modifying an SSID/VLAN with VLAN Protocol Enabled . . . . . . . . . . . . . . . . . . . 96 Broadcast SSID and Closed System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 99
Update AP via TFTP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 112 Update AP via HTTP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 113 Retrieve File via TFTP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 115 Retrieve File via HTTP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 116 Reboot . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 118 Reset . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 119
Contents
Help Link . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 120
Contents
Set up Auto Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 147
Contents
Proxy ARP Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 171 IP ARP Filtering Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 171 Broadcast Filtering Table . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 171 TCP/UDP Port Filtering . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 171 Alarms Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 172 SNMP Table Host Table Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 172 Syslog Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 172 Bridge Parameters. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 173 Spanning Tree Parameters. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 173 Storm Threshold Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 174 Intra BSS Subscriber Blocking . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 174 Packet Forwarding Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 174 Security Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 175 MAC Access Control Parameter. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 175 RADIUS Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 175 Rogue Access Point Detection (RAD) Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 176 Hardware Configuration Reset . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 176 VLAN/SSID Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 176 Security Profile Table . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 177 Command Syntax and Examples of Configuring Security Profiles: . . . . . . . . . . . . . . . . . 177 Other Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 178 IAPP Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 178 SpectraLink VoIP Parameters (802.11b and bg Modes Only) . . . . . . . . . . . . . . . . . . . . . 178
Electrical Specifications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 185 Environmental Specifications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 185 Ethernet Interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 185 Serial Port Interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 185 Active Ethernet Interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 185 HTTP Interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 185
United States FCC Information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 207 Canada IC Information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 208 Europe Information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 209 Japan Information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 211 South Korea Information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 212 Radio Approvals . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 213
11
Introduction
Document Conventions Introduction to Wireless Networking IEEE 802.11 Specifications Management and Monitoring Capabilities
Document Conventions
The term, AP, refers to an Access Point. The term, 802.11, is used to describe features that apply to the 802.11a, 802.11b, and 802.11g wireless standards. A Dual-radio AP is an Access Point that includes two radios; it can support one or two IEEE radio standards (depending on the type of radios installed). The AP-2000 is a Dual-radio AP. An 802.11a AP is an Access Point that supports the IEEE 802.11a standard. An 802.11b AP is an Access Point that supports the IEEE 802.11b standard. An 802.11b/g AP is an Access Point that supports the IEEE 802.11g standard. Blue underlined text indicates a link to a topic or Web address. If you are viewing this documentation on your computer, click the blue text to jump to the linked item.
NOTE
A Note indicates important information that helps you make better use of your computer.
CAUTION
A Caution indicates either potential damage to hardware or loss of data and tells you how to avoid the problem.
12
Introduction
Figure 1-1
Once initialized, the network administrator can configure each unit according to the networks requirements. The AP functions as a wireless network access point to data networks. An AP network provides: Seamless client roaming Easy installation and operation Over-the-air encryption of data High speed network links
To be fully operational, the AP-2000 needs at least one wireless card installed.
13
Introduction
HTTP/HTTPS Interface
The HTTP Interface (Web browser Interface) provides easy access to configuration settings and network statistics from any computer on the network. You can access the HTTP Interface over your LAN (switch, hub, etc.), over the Internet, or with a crossover Ethernet cable connected directly to your computers Ethernet Port. HTTPS provides an HTTP connection over a Secure Socket Layer. HTTPS is one of two available secure management options on the AP; the other secure management option is SNMPv3. Enabling HTTPS allows the user to access the AP in a secure fashion using Secure Socket Layer (SSL) over port 443. The AP supports SSLv3 with a 128-bit encryption certificate maintained by the AP for secure communications between the AP and the HTTP client. All communications are encrypted using the server and the client-side certificate. The AP comes pre-installed with all required SSL files: default certificate, private key and SSL Certificate Passphrase installed.
14
Proxim provides these MIB files on the CD included with each Access Point. You need to compile one or more of the above MIBs into your SNMP programs database before you can manage an Access Point using SNMP. Refer to the documentation that came with your SNMP manager for instructions on how to compile MIBs. The Enterprise MIB defines the read and read-write objects that can be viewed or configured using SNMP. These objects correspond to most of the settings and statistics that are available with the other management interfaces. Refer to the Enterprise MIB for more information; the MIB can be opened with any text editor, such as Microsoft Word, Notepad, or WordPad.
To address the security threats listed above, SNMPv3 provides the following when secure management is enabled:
The default SNMPv3 username is administrator, with SHA authentication, and DES privacy protocol.
NOTE
The remainder of this guide describes how to configure an AP using the HTTP Web interface or the CLI interface. For information on how to manage devices using SNMP, refer to the documentation that came with your SNMP program. Also, refer to the MIB files for information on the parameters available via SNMP.
15
Getting Started
Prerequisites Product Package System Requirements Hardware Installation Initialization Download the Latest Software Additional Hardware Features
Prerequisites
Before installing an AP, you need to gather certain network information. The following section identifies the information you need.
NOTE
Passwords must be configured with at least 6 characters in length.
Network Name (SSID of the wireless cards) You must assign the Access Point a Primary Network Name before wireless users can communicate with it. The clients also need the same Network Name. This is not the same as the System Name, which applies only to the Access Point. The network administrator typically provides the Network Name. If you do not have a DHCP server on your network, then you need to assign the Access Point an IP address that is valid on your network. Each Access Point requires a read/write password to access the web interface. The default password is public. Each Access Point requires a read/write password to access the CLI interface. The default password is public. Each Access Point requires a password to allow get requests from an SNMP manager. The default password is public. Each Access Point requires a password to allow get and set requests from an SNMP manager. The default password is public. This password must be at least 6 characters in length. If Secure Management is enabled, each Access Point requires a password for sending authenticated SNMPv3 messages. The default password is public. The default SNMPv3 username is administrator, with SHA authentication, and DES privacy protocol. If Secure Management is enabled, each Access Point requires a password when sending encrypted SNMPv3 data. The default password is public. You need to determine what security features you will enable on the Access Point. A primary authentication server may be configured; a backup authentication server is optional. The network administrator typically provides this information. This is a password shared between the Access Point and the RADIUS authentication server (so both passwords must be the same), and is typically provided by the network administrator. This is a port number (default is 1812) and is typically provided by the network administrator. The Access Point can automatically provide IP addresses to clients as they sign on. The network administrator typically provides the IP Pool range. The network administrator typically provides this IP Address.
APs IP Address HTTP Password CLI Password SNMP Read Password SNMP Read-Write Password
SNMPv3 Privacy Password Security Settings Authentication Method Authentication Server Shared Secret
Authentication Server Authentication Port Client IP Address Pool Allocation Scheme DNS Server IP Address
16
Getting Started
Product Package
Each Dual-radio AP comes with the following: One ceiling or wall mounting plate Mounting hardware Metal faceplate for APs mounted in a plenum environment AP cover Processor module (with integrated Active Ethernet, if applicable) Power supply (not provided with Active Ethernet unit) AC power cord (not provided with Active Ethernet unit) 802.11b PC Card or 802.11b/g AP Card One Installation CD-ROM that contains the following: Software Installation Wizard ScanTool Solarwinds TFTP software HTML Help this users guide in PDF format One Access Point Quick Start Guide
If any of these items are missing or damaged, please contact your reseller or Technical Support (see Technical Support for contact information).
System Requirements
To begin using an AP, you must have the following minimum requirements: A 10Base-T Ethernet or 100Base-TX Fast Ethernet switch or hub At least one radio card designed for the AP: an 802.11b PC Card, 802.11b/g Card, 5 GHz Antenna Adapter Kit, or 11a Upgrade Kit At least one of the following IEEE 802.11-compliant devices: An 802.11a client device if you have an 802.11a AP An 802.11b or 802.11b/g client device if you have an 802.11b AP An 802.11b/g client device if you have an 802.11b/g AP An 802.11a/g client device if you have an 802.11a/g AP A computer that is connected to the same IP network as the AP and has one of the following Web browsers installed: Microsoft Internet Explorer 6 with Service Pack 1 or later and patch Q323308 Netscape 6.1 or later (The computer is required to configure the AP using the HTTP interface.)
17
Getting Started
Hardware Installation
AP-2000 with Active Ethernet AP-2000 with Power Supply 5 GHz or AP-2000 11a Upgrade Kit
Figure 2-1
2. Slide an 802.11b, 802.11b/g wireless card, or 802.11a card with antenna adapter (not included in the kit) into Slot A or B. NOTE: The 802.11a wireless card with antenna adapter will only fit in Slot A. 3. Slide an 802.11b or an 802.11b/g wireless card (included in the kit) into Slot A or B.
Figure 2-2
4. Connect power to the unit from a DC injector device, such as the ORiNOCO 1-Port Active Ethernet DC Injector hub. 5. Wait for the LED indicators to turn green before proceeding.
18
Getting Started
Figure 2-3
6. Conduct a Site Survey to determine the best location for your device. 7. Once you have chosen a final location for your unit, mount the wall bracket and the processor module and place the cover onto the unit as shown.
Figure 2-4
19
Getting Started
Figure 2-5
3. Slide the AP module onto the mounting bracket. Make sure it is properly seated. 4. Plug the DC connector from the power supply into the top of the AP module.
Figure 2-6
20
Getting Started
Figure 2-7 Slide a PC Card into the AP
5. Attach one end of an Ethernet cable to the AP's Ethernet port and the other end to a network hub or switch. 6. Connect the unit to a power source. 7. Wait for the power LED to turn green before proceeding.
Figure 2-8
8. Conduct a Site Survey to determine the best location for your device. 9. Once you have chosen a final location for your unit, mount the wall bracket and the processor module and place the cover onto the unit as shown.
Figure 2-9
21
Figure 2-10
NOTE
The AP-2000 Upgrade Kit may be installed only in slot A of the AP-2000. 4. Make sure card slot A is available. The power or Ethernet cable tie wrap may need to be cut and the cable repositioned to allow the antenna adapter to fit correctly. 5. Position the antenna adapter, card inward, facing the top of the unit (see diagram) and insert the 5 GHz card into the available card slot.
Figure 2-11
22
Getting Started
6. Angle the antenna adapter slightly upwards, pinch the end tabs inwards and carefully slide the antenna adapter onto the mounting bracket. 7. Gently push forward while rotating the antenna downwards and clip the adapter into the small cutouts on the face of the mounting bracket. 8. Position the antenna for best reception: at a 90 angle for flat surface mounts at a 180 angle for wall mounts 9. Re-install the cover and mount the AP back in place. 10. Connect the power and Ethernet cables to the AP.
Figure 2-12
Replace cover
23
Getting Started
Initialization
Proxim provides two tools to simplify the initialization and configuration of an AP: ScanTool Setup Wizard
ScanTool is included on the Installation CD; the Setup Wizard launches automatically the first time you access the HTTP interface.
NOTE
These initialization instructions describe how to configure an AP over an Ethernet connection using ScanTool and the HTTP interface. If you want to configure the unit over the serial port, see Setting IP Address using Serial Port for information on how to access the CLI over a serial connection and Using the Command Line Interface (CLI) for a list of supported commands.
ScanTool
ScanTool is a software utility that is included on the installation CD-ROM. ScanTool allows you to find the IP address of an Access Point by referencing the MAC address in a Scan List, or to assign an IP address if one has not been assigned. The tool automatically detects the Access Points installed on your network, regardless of IP address, and lets you configure each units IP settings. In addition, you can use ScanTool to download new software to an AP that does not have a valid software image installed (see Client Connection Problems). To access the HTTP interface and configure the AP, the AP must be assigned an IP address that is valid on its Ethernet network. By default, the AP is configured to obtain an IP address automatically from a network Dynamic Host Configuration Protocol (DHCP) server during boot-up. If your network contains a DHCP server, you can run ScanTool to find out what IP address the AP has been assigned. If your network does not contain a DHCP server, the Access Points IP address defaults to 10.0.0.1. In this case, you can use ScanTool to assign the AP a static IP address that is valid on your network.
ScanTool Instructions
Follow these steps to install ScanTool, initialize the Access Point, and perform initial configuration: 1. Locate the units Ethernet MAC address and write it down for future reference. The MAC address is printed on the product label. Each unit has a unique MAC address, which is assigned at the factory. 2. Confirm that the AP is connected to the same LAN subnet as the computer that you will use to configure the AP. 3. Power up, reboot, or reset the AP. Result: The unit requests an IP Address from the network DHCP server. 4. Insert the Installation CD into the CD-ROM drive of the computer that you will use to configure the AP. Result: The installation program will launch automatically. 5. Follow the on-screen instructions to install the Access Point software and documentation.
NOTE
The ORiNOCO Installation program supports the following operating systems: Windows 98SE Windows 2000 Windows NT Windows ME Windows XP 6. After the software has been installed, double-click the ScanTool icon on the Windows desktop to launch the program (if the program is not already running). Result: ScanTool scans the subnet and displays all detected Access Points. The ScanTools Scan List screen appears, as shown in the following example.
24
Getting Started
NOTE
If your computer has more than one network adapter installed, you will be prompted to select the adapter that you want ScanTool to use before the Scan List appears. If prompted, select an adapter and click OK. You can change your adapter setting at any time by clicking the Select Adapter button on the Scan List screen. Note that the ScanTool Network Adapter Selection screen will not appear if your computer only has one network adapter installed.
Figure 2-13
Scan List
7. Locate the MAC address of the AP you want to initialize within the Scan List.
NOTE
If your Access Point does not show up in the Scan List, click the Rescan button to update the display. If the unit still does not appear in the list, see Troubleshooting the AP-2000 for suggestions. Note that after rebooting an Access Point, it may take up to five minutes for the unit to appear in the Scan List. 8. Do one of the following: If the AP has been assigned an IP address by a DHCP server on the network, write down the IP address and click Cancel to close ScanTool. Proceed to Setup Wizard for information on how to access the HTTP interface using this IP address. If the AP has not been assigned an IP address (in other words, the unit is using its default IP address, 10.0.0.1), follow these steps to assign it a static IP address that is valid on your network: 1. Highlight the entry for the AP you want to configure. 2. Click the Change button. Result: the Change screen appears.
25
Getting Started
Figure 2-14 3. 4. Scan Tool Change Screen Set IP Address Type to Static. Enter a static IP Address for the AP in the field provided. You must assign the unit a unique address that is valid on your IP subnet. Contact your network administrator if you need assistance selecting an IP address for the unit. Enter your networks Subnet Mask in the field provided. Enter your networks Gateway IP Address in the field provided. Enter the SNMP Read/Write password in the Read/Write Password field (for new units, the default SNMP Read/Write password is public).
5. 6. 7.
NOTE
The TFTP Server IP Address and Image File Name fields are only available if ScanTool detects that the AP does not have a valid software image installed. See Client Connection Problems. Click OK to save your changes. Result: The Access Point will reboot automatically and any changes you made will take effect. 9. When prompted, click OK a second time to return to the Scan List screen. 10. Click Cancel to close the ScanTool. 11. Proceed to Setup Wizard for information on how to access the HTTP interface. 8.
Setup Wizard
The first time you connect to an APs HTTP interface, the Setup Wizard launches automatically. The Setup Wizard provides step-by-step instructions for how to configure the Access Points basic operating parameter, such as Network Name, IP parameters, system parameters, and management passwords.
26
Getting Started
Figure 2-15
Figure 2-16
Setup Wizard
5. Click Setup Wizard to begin. If you want to configure the AP without using the Setup Wizard, click Exit and see Performing Advanced Configuration. The Setup Wizard supports the following navigation options: Save & Next Button: Each Setup Wizard screen has a Save & Next button. Click this button to submit any changes you made to the units parameters and continue to the next page. The instructions below describe how to navigate the Setup Wizard using the Save & Next buttons. Navigation Panel: The Setup Wizard provides a navigation panel on the left-hand side of the screen. Click the link that corresponds to the parameters you want to configure to be taken to that particular configuration screen. Note that clicking a link in the navigation panel will not submit any changes you made to the units configuration on the current page. Exit: The navigation panel also includes an Exit option. Click this link to close the Setup Wizard at any time.
CAUTION
If you exit from the Setup Wizard, any changes you submitted (by clicking the Save & Next button) up to that point will be saved to the unit but will not take effect until it is rebooted.
6. Configure the System Configuration settings and click Save & Next. See System for more information. 7. Configure the Access Points Basic IP address settings, if necessary, and click Save & Next. See Basic IP Parameters for more information.
27
Getting Started
8. Assign the AP new passwords to prevent unauthorized access and click Save & Next. Each management interface has its own password: SNMP Read Password SNMP Read-Write Password SNMPv3 Authentication Password SNMPv3 Privacy Password CLI Password HTTP (Web) Password By default, each of these passwords is set to public. See Passwords for more information. 9. Configure the basic wireless interface settings and click Save & Next. The following options are available for an 802.11a AP: Primary Network Name (SSID): Enter a Network Name (between 1 and 32 characters long) for the wireless network. You must configure each wireless client to use this name as well. Additional Network Names (SSIDs): The AP supports up to 16 SSIDs and VLANs per wireless interface (radio). Refer to the Advanced Configuration chapter for information on the detailed rules on configuring multiple SSIDs, VLANs, and security modes. Auto Channel Select: By default, the AP scans the area for other Access Points and selects the best available communication channel, either a free channel (if available) or the channel with the least amount of interference. Remove the check mark to disable this option. Note that you cannot disable Auto Channel Select for 802.11a products in Europe (see Dynamic Frequency Selection (DFS) for details). Frequency Channel: When Auto Channel Select is enabled, this field is read-only and displays the Access Points current operating channel. When Auto Channel Select is disabled, you can specify the Access Points channel. If you decide to manually set the units channel, ensure that nearby devices do not use the same frequency. Available Channels vary based on regulatory domain. See 802.11a Channel Frequencies. Note that you cannot manually set the channel for 802.11a products in Europe (see Dynamic Frequency Selection (DFS) for details). Transmit Rate: Use the drop-down menu to select a specific transmit rate for the AP. Choose between 6, 9, 12, 18, 24, 36, 48, 54 Mbits/s, and Auto Fallback. The Auto Fallback feature allows the AP to select the best transmit rate based on the cell size. The following options are available for an 802.11b AP: Primary Network Name (SSID): Enter a Network Name (between 1 and 32 characters long) for the wireless network. You must configure each wireless client to use this name as well. Additional Network Names (SSIDs): The AP supports up to 16 SSIDs and VLANs per wireless interface (radio). Refer to the Advanced Configuration chapter for information on the detailed rules on configuring multiple SSIDs, VLANs, and security modes. Auto Channel Select: By default, the AP scans the area for other Access Points and selects the best available communication channel, either a free channel (if available) or the channel with the least amount of interference. Remove the check mark to disable this option. If you are setting up a Wireless Distribution System (WDS), it must be disabled. See Wireless Distribution System (WDS) for more information. Frequency Channel: When Auto Channel Select is enabled, this field is read-only and displays the Access Points current operating channel. When Auto Channel Select is disabled, you can specify the Access Points operating channel. If you decide to manually set the units channel, ensure that nearby devices do not use the same frequency (unless you are setting up a WDS). Available Channels vary based on regulatory domain. See 802.11b Channel Frequencies. Distance Between APs: Set to Large, Medium, Small, Microcell, or Minicell depending on the site survey for your system. The distance value is related to the Multicast Rate (described next). In general, a larger distance between APs means that your clients operate a slower data rates (on average). This feature is available only if you are using an Orinoco Classic Gold card. See Distance Between APs for more information. Multicast Rate: Sets the rate at which Multicast messages are sent. This value is related to the Distance Between APs parameter (described previously). The table below displays the possible Multicast Rates based on the Distance between APs. This feature is available only if you are using an Orinoco Classic Gold card. See Multicast Rate for more information.
28
Getting Started
Distance between APs Multicast Rate Large Medium Small Minicell Microcell 1 and 2 Mbits/sec 1, 2, and 5.5 Mbits/sec 1, 2, 5.5 and 11 Mbits/sec 1, 2, 5.5 and 11 Mbits/sec 1, 2, 5.5 and 11 Mbits/sec
The following options are available for an 802.11b/g AP: Operational Mode: An 802.11b/g wireless interface can be configured to operate in the following modes: 802.11b mode only 802.11g mode only 802.11g-wifi mode 802.11b/g mode (default) Primary Network Name (SSID): Enter a Network Name (between 1 and 32 characters long) for the wireless network. You must configure each wireless client to use this name as well. Additional Network Names (SSIDs): The AP supports up to 16 SSIDs and VLANs per wireless interface (radio). Refer to the Advanced Configuration chapter for information on the detailed rules on configuring multiple SSIDs, VLANs, and security modes. Auto Channel Select: By default, the AP scans the area for other Access Points and selects the best available communication channel, either a free channel (if available) or the channel with the least amount of interference. Remove the check mark to disable this option. Frequency Channel: When Auto Channel Select is enabled, this field is read-only and displays the Access Points current operating channel. When Auto Channel Select is disabled, you can specify the Access Points channel. If you decide to manually set the units channel, ensure that nearby devices do not use the same frequency. Available Channels vary based on regulatory domain. See 802.11g Channel Frequencies. Transmit Rate: Select a specific transmit rate for the AP. The values available depend on the Operational Mode. Auto Fallback is the default setting; it allows the AP to select the best transmit rate based on the cell size. For 802.11b only -- Auto Fallback, 1, 2, 5.5, 11 Mbits/sec For 802.11g only -- Auto Fallback, 6, 9, 12, 18, 24, 36, 48, 54 Mbits/sec For 802.11b/g and 802.11g-wifi-- Auto Fallback, 1, 2, 5.5, 6, 9, 11, 12, 18, 24, 36, 48, 54 Mbits/sec
NOTE
Additional advanced settings are available in the Wireless Interface Configuration screen. See Wireless A (802.11a), Wireless (802.11b), or Wireless (802.11b/g) for details. See SSID/VLAN/Security for more information on security features. 10. Review the configuration summary. If you want to make any additional changes, use the navigation panel on the left-hand side of the screen to return to an earlier screen. After making a change, click Save & Next to save the change and proceed to the next screen. 11. When finished, click Reboot on the Summary screen to restart the AP and apply your changes.
29
NOTE
If a TFTP server is not available in the network, you can perform similar file transfer operations using the HTTP interface. After the TFTP server is installed: Check to see that TFTP is configured to point to the directory containing the AP Image. Make sure you have the proper TFTP server IP address, the proper AP Image file name, and that the TFTP server is operational. Make sure the TFTP server is configured to both Transmit and Receive files, with no automatic shutdown or time-out.
Download Updates from your TFTP Server using the Web Interface
1. 2. 3. 4. 5. 6. 7. 8. 9. Download the latest software from http://www.proxim.com. Copy the latest software updates to your TFTP server. In the Web Interface, click the Commands button and select the Update AP tab. Enter the IP address of your TFTP server in the field provided. Enter the File Name (including the file extension). Enter the full directory path and file name. If the file is located in the default TFTP directory, you need enter only the file name. Select the File Type from the drop-down menu (use Img for software updates). Select Update AP & Reboot from the File Operation drop-down menu. Click Update. The Access Point will reboot automatically when the download is complete.
30
Getting Started Download Updates from your TFTP Server using the CLI Interface
1. 2. 3. 4. 5. Download the latest software from http://www.proxim.com. Copy the latest software updates to your TFTP server. Open the CLI interface via Telnet or a serial connection. Enter the CLI password when prompted. Enter the command: download <tftpaddr> <filename> img Result: The download will begin. Be patient while the image is downloaded to the Access Point. 6. When the download is complete, type reboot 0 and press Enter.
NOTE
See Using the Command Line Interface (CLI) for more information.
NOTE
The 5GHz Antenna Adapter Kit or 11a Upgrade Kit is not approved in accordance with UL-2043 for use in a plenum. The Access Point using a power supply, should not be plenum mounted. Use Active Ethernet to power the units mounted in a plenum environment.
CAUTION
Do not drop the faceplate into the card slot in the AP.
To install a second radio card, the faceplate must be removed. Gently pry the faceplate off using the tab on the faceplate.
31
NOTE
The APs 802.3af-compliant Active Ethernet module is backwards compatible with all ORiNOCO Active Ethernet hubs that do not support the IEEE 802.3af standard.
LED Indicators
The AP has four LED indicators, which exhibit the following behavior:
Ethernet Green flash with data activity Red n/a (not applicable) Red n/a n/a n/a
PC Card A Green flash with data activity Amber n/a n/a Red Red Amber
PC Card B Green flash with data activity Amber n/a n/a Red Red Amber
Indication Normal Operation Rebooting/Power On Self Test (POST) Missing or bad AP Image if amber after reboot Power On Self Test (POST) running PC Card incompatible on indicated interface PC Card failure on indicated interface Indicated interface in Administrative State. An Amber color on a wireless interface LED indicates that the Wireless Interface Status for the particular wireless interface is Shutdown (refer to Wireless Service Status).
n/a
n/a
Off
Off
32
Getting Started
Related Topics
The Setup Wizard helps you configure the basic AP settings required to get the unit up and running. The AP supports many other configuration and management options. The remainder of this user guide describes these options in detail. See Performing Advanced Configuration for information on configuration options that are available within the Access Points HTTP interface. See Monitoring the AP-2000 for information on the statistics displayed within the Access Points HTTP interface. See Performing Commands for information on the commands supported by the Access Points HTTP interface. See Troubleshooting the AP-2000 for troubleshooting suggestions. See Using the Command Line Interface (CLI) for information on the CLI interface and for a list of CLI commands.
33
NOTE
The HTTP interface supports the following Web browser: Microsoft Internet Explorer 6 with Service Pack 1 or later Netscape 6.1 or later 2. If necessary, disable the Internet proxy settings. For Internet Explorer users, follow these steps: Select Tools > Internet Options.... Click the Connections tab. Click LAN Settings.... If necessary, remove the check mark from the Use a proxy server box. Click OK twice to save your changes and return to Internet Explorer. 3. Enter the Access Points IP address in the browsers Address field and press Enter. Result: The Enter Network Password screen appears. 4. Enter the HTTP password in the Password field and click OK. Leave the User Name field blank. (By default, the HTTP password is public). Result: The System Status screen appears.
Figure 3-1
34
System Status
System Status is the first screen to appear each time you connect to the HTTP interface. You can also return to this screen by clicking the Status button.
Figure 3-2
Each section of the System Status screen provides the following information: System Status: This area provides system level information, including the units IP address and contact information. See System for information on these settings. System Alarms: System traps (if any) appear in this area. Each trap identifies a specific severity level: Critical, Major, Minor, and Informational. See Alarms for a list of possible alarms.
35
Configuring the AP Using the HTTP/HTTPS Interface System: Configure specific system information such as system name and contact information. Network: Configure IP settings, DNS client, DHCP server, and Link Integrity. Interfaces: Configure the Access Points interfaces: Wireless and Ethernet. Also describes configuring a Wireless Distribution System (WDS). Management: Configure the Access Points management Passwords, IP Access Table, and Services such as configuring secure or restricted access to the AP via SNMPv3, HTTPS, or CLI. Configure Secure Management, SSL, Secure Shell (SSH), and RADIUS Based Access Management. Set up Automatic Configuration for Static IP. Filtering: Configure Ethernet Protocol filters, Static MAC Address filters, Advanced filters, and Port filters. Alarms: Configure the Alarm (SNMP Trap) Groups, the Alarm Host Table, and the Syslog features. Bridge: Configure the Spanning Tree Protocol, Storm Threshold protection, Intra BSS traffic, and Packet Forwarding. RADIUS Profiles: Configure RADIUS features such as RADIUS Access Control and Accounting. SSID/VLAN/Security: Configure security features such as MAC Access Control, WPA, WEP Encryption, and 802.1x. Configure up to 16 VLAN and SSID pairs per wireless interface, and assign Security and RADIUS Profiles for each pair.
NOTE
The HTTP interface supports the following Web browser: Microsoft Internet Explorer 6 with Service Pack 1 or later Netscape 6.1 or later 2. If necessary, disable the Internet proxy settings. For Internet Explorer users, follow these steps: Select Tools > Internet Options.... Click the Connections tab. Click LAN Settings.... If necessary, remove the check mark from the Use a proxy server box. Click OK twice to save your changes and return to Internet Explorer. 3. Enter the Access Points IP address in the browsers Address field and press Enter. Result: The Enter Network Password screen appears. 4. Enter the HTTP password in the Password field and click OK. Leave the User Name field blank. (By default, the HTTP password is public). Result: The System Status screen appears.
36
Figure 4-1
5. Click the Configure button located on the left-hand side of the screen.
Figure 4-2
6. Click the tab that corresponds to the parameter you want to configure. For example, click Network to configure the Access Points TCP/IP settings. The parameters contained in each of the configuration categories are described later in this chapter. 7. Configure the Access Points parameters as necessary. After changing a configuration value, click OK to save the change. 8. Reboot the Access Point for all of the changes to take effect.
37
System
You can configure and view the following parameters within the System Configuration screen: Name: The name assigned to the AP. System name must be between 1-31 characters. Refer to the Dynamic DNS Support and Access Point System Naming Convention sections for rules on naming the AP. Location: The location where the AP is installed. Location must be between 1-255 characters. Contact Name: The name of the person responsible for the AP. Name must be between 1-255 characters. Contact Email: The email address of the person responsible for the AP. Email must be between 1-255 characters. Contact Phone: The telephone number of the person responsible for the AP. Phone must be between 1-255 characters. Object ID: This is a read-only field that displays the Access Points MIB definition; this information is useful if you are managing the AP using SNMP. Ethernet MAC Address: This is a read-only field that displays the unique MAC (Media Access Control) address for the Access Points Ethernet interface. The MAC address is assigned at the factory. Descriptor: This is a read-only field that reports the Access Points name, serial number, current image software version, and current bootloader software version. Up Time: This is a read-only field that displays how long the Access Point has been running since its last reboot.
Image upgrades could cause the system to boot with an older system name format that is not DNS compliant. To prevent problems with dynamic DNS after an image upgrade, the system name will automatically be converted to a DNS compliant system name. The rules of conversion of older system names are: If the length is greater than 63 then the string is truncated. (This will not happen since the system name is anyway limited to 31 bytes) All invalid characters at the beginning or end of the string are replaced with the character 'X'. All other invalid characters are replaced with hyphens.
38
Network
The Network tab contains three sub-tabs. IP Configuration DHCP Server Link Integrity
IP Configuration
You can configure and view the following parameters within the IP Configuration screen:
NOTE
You must reboot the Access Point in order for any changes to the Basic IP or DNS Client parameters take effect.
Basic IP Parameters
IP Address Assignment Type: Set this parameter to Dynamic to configure the Access Point as a Dynamic Host Configuration Protocol (DHCP) client; the Access Point will obtain IP settings from a network DHCP server automatically during boot-up. If you do not have a DHCP server or if you want to manually configure the Access Points IP settings, set this parameter to Static. IP Address: The Access Points IP address. When IP Address Assignment Type is set to Dynamic, this field is read-only and reports the units current IP address. The Access Point will default to 10.0.0.1 if it cannot obtain an address from a DHCP server. Subnet Mask: The Access Points subnet mask. When IP Address Assignment Type is set to Dynamic, this field is read-only and reports the units current subnet mask. The subnet mask will default to 255.0.0.0 if the unit cannot obtain one from a DHCP server. Gateway IP Address: The IP address of the Access Points gateway. When IP Address Assignment Type is set to Dynamic, this field is read-only and reports the IP address of the units gateway. The gateway IP address will default to 10.0.0.2 if the unit cannot obtain an address from a DHCP server.
DNS Client
If you prefer to use host names to identify network servers rather than IP addresses, you can configure the AP to act as a Domain Name Service (DNS) client. When this feature is enabled, the Access Point contacts the networks DNS server to translate a host name to the appropriate network IP address. You can use this DNS Client functionality to identify RADIUS servers by host name. See RADIUS Profiles for details. Enable DNS Client: Place a check mark in the box provided to enable DNS client functionality. Note that this option must be enabled before you can configure the other DNS Client parameters. DNS Primary Server IP Address: The IP address of the networks primary DNS server. DNS Secondary Server IP Address: The IP address of a second DNS server on the network. The Access Point will attempt to contact the secondary server if the primary server is unavailable. DNS Client Default Domain Name: The default domain name for the Access Points network (for example, proxim.com). Contact your network administrator if you need assistance setting this parameter.
Advanced
Default TTL (Time to Live): Time to Live (TTL) is a field in an IP packet that specifies how long in seconds the packet can remain active on the network. The Access Point uses the default TTL for packets it generates for which the transport layer protocol does not specify a TTL value. This parameter supports a range from 0 to 65535. By default, TTL is 64.
39
CAUTION
Make sure there are no other DHCP servers on the network and do not enable the DHCP server without checking with your network administrator first, as it could bring down the whole network. Also, the AP must be configured with a static IP address before enabling this feature.
When the DHCP Server functionality is enabled, you can create one or more IP address pools from which to assign addresses to network devices.
Figure 4-3
40
NOTE
You cannot enable the DHCP Server functionality unless there is at least one IP Pool Table Entry configured. Subnet Mask: This field is read-only and reports the Access Points current subnet mask. DHCP clients that receive dynamic addresses from the AP will be assigned this same subnet mask. Gateway IP Address: The AP will assign the specified address to its DHCP clients. Primary DNS IP Address: The AP will assign the specified address to its DHCP clients. Secondary DNS IP Address: The AP will assign the specified address to its DHCP clients. Number of IP Pool Table Entries: This is a read-only field that reports the number of IP address pools currently configured. IP Pool Table Entry: This entry specifies a range of IP addresses that the AP can assign to its wireless clients. The maximum number of entries allowed is 20. Click Add to create a new entry. Click Edit to change an existing entry. Each entry contains the following field: Start IP Address End IP Address Default Lease Time (optional): The default time value for clients to retain the assigned IP address. DHCP automatically renews IP Addresses without client notification. This parameter supports a range between 3600 and 86400 seconds. The default is 86400 seconds. Maximum Lease Time (optional): The maximum time value for clients to retain the assigned IP address. DHCP automatically renews IP Addresses without client notification. This parameter supports a range between 3600 and 86400 seconds. The default is 86400 seconds. Comment (optional) Status: IP Pools are enabled upon entry in the table. You can also disable or delete entries by changing this fields value.
NOTE
You must reboot the Access Point before changes to any of these DHCP server parameters take effect.
Link Integrity
The Link Integrity feature checks the link between the AP and the nodes on the Ethernet backbone. These nodes are listed by IP address in the Link Integrity IP Address Table. The AP periodically pings the nodes listed within the table. If the AP loses network connectivity (that is, the ping attempts fail), the AP disables its wireless interface until the connection is restored. This forces the units wireless clients to switch to another Access Point that still has a network connection. Note that this feature does not affect WDS links (if applicable). You can configure and view the following parameters within the Link Integrity Configuration screen: Enable Link Integrity: Place a check mark in the box provided to enable Link Integrity. Poll Interval (milliseconds): The interval between link integrity checks. Range is 500 - 15000 ms in increments of 500 ms; default is 500 ms. Poll Retransmissions: The number of times a poll should be retransmitted before the link is considered down. Range is 0 to 255; default is 5. Target IP Address Entry: This entry specifies the IP address of a host on the network that the AP will periodically poll to confirm connectivity. The table can hold up to five entries. By default, all five entries are set to 0.0.0.0. Click Edit to update one or more entries. Each entry contains the following field: Target IP Address Comment (optional) Status: Set this field to Enable to specify that the Access Point should poll this device. You can also disable an entry by changing this fields value to Disable.
41
Figure 4-4
Interfaces
The Interfaces tab contains the following sub-tabs: Operational Mode 8Wireless-A and Wireless-B Ethernet
From these sub-tabs, you configure the Access Points operational mode, wireless interface settings and Ethernet settings. You may also configure a Wireless Distribution System (WDS) for AP-to-AP communications. For the wireless interface configuration, refer to the wireless parameters below that correspond to your radio type. Wireless A (802.11a) Wireless (802.11b) Wireless (802.11b/g)
42
Wireless A (802.11a)
You can configure and view the following parameters within the Wireless Interface Configuration screen for an 802.11a AP:
NOTE
You must reboot the Access Point before any changes to these parameters take effect. Physical Interface Type: For an 802.11a AP, this field reports: 802.11a (OFDM 5 GHz). OFDM stands for Orthogonal Frequency Division Multiplexing; this is the name for the radio technology used by 802.11a devices. MAC Address: This is a read-only field that displays the unique MAC (Media Access Control) address for the Access Points wireless interface. The MAC address is assigned at the factory. Regulatory Domain: Reports the regulatory domain for which the AP is certified. Not all features or channels are available in all countries. The available regulatory domains include: FCC - U.S./Canada, Mexico, and Australia ETSI - Europe and the United Kingdom TELEC: Japan SG: Singapore ASIA: China, Hong Kong, and South Korea TW: Taiwan Network Name (SSID): Enter a Network Name (between 1 and 32 characters long) for the wireless network. You must configure each wireless client to use this name as well. Auto Channel Select: The AP scans the area for other Access Points and selects a free or relatively unused communication channel. This helps prevent interference problems and increases network performance. By default this feature is enabled. See 802.11a Channel Frequencies for a list of Channels.
NOTE
You cannot disable Auto Channel Select for 802.11a products in Europe (see Dynamic Frequency Selection (DFS) for details). Frequency Channel: When Auto Channel Select is enabled, this field is read-only and displays the Access Points current operating Channel. When Auto Channel Select is disabled, you can specify the Access Points channel. If you decide to manually set the units Channel, ensure that nearby devices do not use the same frequency. Available Channels vary based on regulatory domain. See 802.11a Channel Frequencies. Note that you cannot manually set the channel for 802.11a products in Europe (see Dynamic Frequency Selection (DFS) for details). Transmit Rate: Use the drop-down menu to select a specific transmit rate for the AP. Choose a particular rate available for protocol being used or Auto Fallback. Auto Fallback is the default setting; it allows the AP unit to select the best transmit rate based on the cell size. DTIM Period: The Deferred Traffic Indicator Map (DTIM) is used with clients that have power management enabled. DTIM should be left at 1, the default value, if any clients have power management enabled. This parameter supports a range between 1 and 255.
43
NOTE
WSS disables only BSS ports; WDS ports are still operational.
44
After wireless service resumes, the AP resumes beaconing, transmitting and receiving frames to/from the wireless interface and bridging the frames between the Ethernet and the wireless interface.
NOTE
Wireless service can be shutdown/resumed on each wireless interface individually.
Wireless (802.11b)
You can configure and view the following parameters within the Wireless Interface Configuration screen for an 802.11b AP:
NOTE
You must reboot the Access Point before any changes to these parameters take effect. Physical Interface Type: For 802.11b AP, this field reports: 802.11b (DSSS 2.4 GHz). DSSS stands for Direct Sequence Spread Spectrum; this is the name for the radio technology used by 802.11b devices. MAC Address: This is a read-only field that displays the unique MAC (Media Access Control) address for the Access Points wireless interface. The MAC address is assigned at the factory. Regulatory Domain: Reports the regulatory domain for which the AP is certified. Not all features or channels are available in all countries. The available regulatory domains include: FCC - U.S./Canada, Mexico, and Australia ETSI - Most of Europe, including the United Kingdom, Ireland, Singapore, and Hong Kong TELEC: Japan IL - Israel Network Name (SSID): Enter a Network Name (between 1 and 32 characters long) for the wireless network. You must configure each wireless client to use this name as well. Auto Channel Select: The AP scans the area for other Access Points and selects a free or relatively unused communication channel. This helps prevent interference problems and increases network performance. By default this feature is enabled; see 802.11b Channel Frequencies for a list of Channels. However, if you are setting up a Wireless Distribution System (WDS), it must be disabled. See Wireless Distribution System (WDS) for more information.
45
DTIM Period: The Deferred Traffic Indicator Map (DTIM) is used with clients that have power management enabled. DTIM should be left at 1, the default value, if any clients have power management enabled. This parameter supports a range between 1 and 255. RTS/CTS Medium Reservation: This parameter affects message flow control and should not be changed under normal circumstances. Range is 0 to 2347. When set to a value between 0 and 2347, the Access Point uses the RTS/CTS mechanism for packets that are the specified size or greater. When set to 2347 (the default setting), RTS/CTS is disabled. See RTS/CTS Medium Reservation for more information. Interference Robustness: Enable this option if other electrical devices in the 2.4 GHz frequency band (such as a microwave oven or a cordless phone) may be interfering with the wireless signal. The AP will automatically fragment large packets into multiple smaller packets when interference is detected to increase the likelihood that the messages will be received in the presence of interference. The receiving radio reassembles the original packet once all fragments have been received. This feature is available only if you are using an Orinoco Classic Gold card. This option is disabled by default. Closed System: Check this box to allow only clients configured with the Access Points specific Network Name to associate with the Access Point. When enabled, a client configured with the Network Name ANY cannot connect to the AP. This option is disabled by default. See Broadcast SSID and Closed System for more information. Wireless Service Status: Select shutdown to shutdown the wireless service on a wireless interface, or resume to resume wireless service. See Wireless Service Status for more information. Load Balancing: Enable this option so clients can evaluate which Access Point to associate with, based on current AP loads. This feature is enabled by default; it helps distribute the wireless load between APs. This feature is not available if you are using an ORiNOCO ComboCard or a non-ORiNOCO client with the AP. Medium Density Distribution: When enabled, the Access Point automatically notifies wireless clients of its Distance Between APs, Interference Robustness, and RTS/CTS Medium Reservation settings. This feature is enabled by default and allows clients to automatically adopt the values used by its current Access Point (even if these values differ from the clients default values or from the values supported by other Access Points). Note that this feature is available only if you are using an Orinoco Classic Gold card. Proxim recommends that you leave this parameter enabled, particularly if you have ORiNOCO clients on your wireless network (leaving this parameter enabled should not adversely affect the performance of any ORiNOCO ComboCards or non-ORiNOCO cards on your network).
46
Coverage
The number of Access Points in a set area determines the network coverage for that area. A large number of Access Points covering a small area is a high-density cell. A few Access Points, or even a single unit, covering the same small area would result in a low-density cell, even though in both cases the actual area did not change only the number of Access Points covering the area changed. In a typical office, a high density area consists of a number of Access Points installed every 20 feet and each Access Point generates a small radio cell with a diameter of about 10 feet. In contrast, a typical warehouse might have a low density area consisting of large cells (with a diameter of about 90 feet) and Access Points installed every 200 feet.
Figure 4-5
The Distance Between Cells parameter supports five values: Large, Medium, Small, Minicell, and Microcell.
CAUTION
The distance between APs should not be approximated. It is calculated by means of a manual Site Survey, in which an AP is set up and clients are tested throughout the area to determine signal strength and coverage, and local limits such as physical interference are investigated. From these measurements the appropriate cell size and density is determined, and the optimum distance between APs is calculated to suit your particular business requirements. Contact your reseller for information on how to conduct a Site Survey.
Multicast Rate
The multicast rate determines the rate at which broadcast and multicast packets are transmitted by the Access Point to the wireless network. Stations that are closer to the Access Point can receive multicast packets at a faster data rate than stations that are farther away from the AP. Therefore, you should set the Multicast Rate based on the size of the Access Points cell. For example, if the Access Points cell is very small (e.g., Distance Between APs is set to Microcell), you can expect that all stations should be able to successfully receive multicast packets at 11 MBits/sec so you can set Multicast Rate to 11 Mbits/sec. However, if the Access Points cell is large, you need to accommodate
47
Figure 4-6
NOTE
There is an inter-dependent relationship between the Distance between APs and the Multicast Rate. In general, larger systems operate at a lower average transmit rate. The variation between Multicast Rate and Distance Between APs is presented in the following table:
1.0 Mbit/s Large Medium Small Minicell Microcell yes yes yes yes yes 2.0 Mbits/s yes yes yes yes yes yes yes yes yes yes yes yes 5.5 Mbits/s 11 Mbits/s
The Distance Between APs must be set before the Multicast Rate, because when you select the Distance Between APs, the appropriate range of Multicast values automatically populates the drop-down menu. This feature is not available if you are using an ORiNOCO ComboCard or a non-ORiNOCO client with the AP.
Wireless (802.11b/g)
You can configure the following radio parameters for an 802.11b/g AP:
NOTE
You must reboot the Access Point before any changes to these parameters take effect. Operational Mode: An 802.11b/g wireless interface can be configured to operate in the following modes: 802.11b mode only: The radio uses the 802.11b standard only. 802.11g mode only: The radio is optimized to communicate with 802.11g devices. This setting will provide the best results if this radio interface will only communicate with 802.11g devices.
48
Physical Interface Type: Depending on the Operational Mode, this field reports: For 802.11b mode only: "802.11b (CCK/DSSS 2.4 GHz)" For 802.11g and 802.11g-wifi modes: "802.11g (OFDM/DSSS 2.4 GHz)" For 802.11b/g mode: "802.11b/g (ERP-CCK/DSSS/OFDM 2.4 GHz)" OFDM stands for Orthogonal Frequency Division Multiplexing; this is the name for the radio technology used by 802.11a devices. DSSS stands for Direct Sequence Spread Spectrum; this is the name for the radio technology used by 802.11b devices. MAC Address: This is a read-only field that displays the unique MAC (Media Access Control) address for the Access Points wireless interface. The MAC address is assigned at the factory. Regulatory Domain: Reports the regulatory domain for which the AP is certified. Not all features or channels are available in all countries. The available regulatory domains include: FCC - U.S./Canada, Mexico, and Australia ETSI - Europe, including the United Kingdom, China, and South Korea TELEC - Japan IL - Israel Network Name (SSID): Enter a Network Name (between 1 and 32 characters long) for the wireless network. You must configure each wireless client to use this name as well. Auto Channel Select: The AP scans the area for other Access Points and selects a free or relatively unused communication channel. This helps prevent interference problems and increases network performance. By default this feature is enabled; see 802.11g Channel Frequencies for a list of Channels. Frequency Channel: When Auto Channel Select is enabled, this field is read-only and displays the Access Points current operating channel. When Auto Channel Select is disabled, you can specify the Access Points operating channel. If you decide to manually set the units channel, ensure that nearby devices do not use the same frequency (unless you are setting up a WDS). Available Channels vary based on regulatory domain. See 802.11g Channel Frequencies. Transmit Rate: Select a specific transmit rate for the AP. The values available depend on the Operational Mode. Auto Fallback is the default setting; it allows the AP to select the best transmit rate based on the cell size. For 802.11b only -- Auto Fallback, 1, 2, 5.5, 11 Mbits/sec For 802.11g only -- Auto Fallback, 6, 9, 12, 18, 24, 36, 48, 54 Mbits/sec For 802.11b/g and 802.11g-wifi -- Auto Fallback, 1, 2, 5.5, 6, 9, 11, 12, 18, 24, 36, 48, 54 Mbits/sec DTIM Period: The Deferred Traffic Indicator Map (DTIM) is used with clients that have power management enabled. DTIM should be left at 1, the default value, if any clients have power management enabled. This parameter supports a range between 1 and 255. RTS/CTS Medium Reservation: This parameter affects message flow control and should not be changed under normal circumstances. Range is 0 to 2347. When set to a value between 0 and 2347, the Access Point uses the RTS/CTS mechanism for packets that are the specified size or greater. When set to 2347 (the default setting), RTS/CTS is disabled. See RTS/CTS Medium Reservation for more information. Closed System: Check this box to allow only clients configured with the Access Points specific Network Name to associate with the Access Point. When enabled, a client configured with the Network Name "ANY cannot connect to the AP. This option is disabled by default. See Broadcast SSID and Closed System for more information.
49
Figure 4-7
WDS Example
Bridging WDS
Each WDS link is mapped to a logical WDS port on the AP. WDS ports behave like Ethernet ports rather than like standard wireless interfaces: on a BSS port, an Access Point learns by association and from frames; on a WDS or Ethernet port, an Access Point learns from frames only. When setting up a WDS, keep in mind the following: The WDS link shares the communication bandwidth with the clients. Therefore, while the maximum data rate for the Access Points cell is still 11 Mb, client throughput will decrease when the WDS link is active. If there is no partner MAC address configured in the WDS table, the WDS port remains disabled. Each WDS port on a single AP should have a unique partner MAC address. Do not enter the same MAC address twice in an APs WDS port list. Each Access Point that is a member of the WDS must have the same Channel setting to communicate with each other. Each Access Point that is a member of the WDS must have the same network domain. Each Access Point that is a member of the WDS must have the same WEP Encryption settings. WDS does not use 802.1x. Therefore, if you want to encrypt the WDS link, you must configure each Access Point to use WEP encryption, and each Access Point must have the same Encryption Key(s). See SSID/VLAN/Security. If your network does not support spanning tree, be careful to avoid creating network loops between APs. For example, creating a WDS link between two Access Points connected to the same Ethernet network will create a network loop (if spanning tree is disabled). For more information, refer to the Spanning Tree section.
NOTE
For radio cards that belong to the ETSI regulatory domain, ACS is enabled by default, and cannot be disabled. Therefore, it is not possible to set up a WDS link. This only applies to ETSI 802.11a wireless radios. To setup a wireless backbone follow the steps below for each AP that you wish to include in the Wireless Distribution System.
50
Figure 4-8
Figure 4-9
6. If desired, enable security by checking the Enable WDS Security Mode box.
51
Ethernet
Select the desired speed and transmission mode from the drop-down menu. Half-duplex means that only one side can transmit at a time and full-duplex allows both sides to transmit. When set to auto-duplex, the AP negotiates with its switch or hub to automatically select the highest throughput option supported by both sides. For best results, Proxim recommends that you configure the Ethernet setting to match the speed and transmission mode of the device the Access Point is connected to (such as a hub or switch). If in doubt, leave this setting at its default, auto-speed-auto-duplex. Choose between: 10 Mbit/s - half duplex, full duplex, or auto duplex 100 Mbit/s - half duplex or full duplex auto speed - half duplex or auto duplex
52
Management
The Management tab contains five sub-tabs. Passwords IP Access Table Services Automatic Configuration (AutoConfig) Hardware Configuration Reset (CHRP)
Passwords
The following passwords are configurable: SNMP Read Community Password: The password for read access to the AP using SNMP. Enter a password in both the Password field and the Confirm field. This password must be between 6 and 32 characters. The default password is public. SNMP Read/Write Community Password: The password for read and write access to the AP using SNMP. Enter a password in both the Password field and the Confirm field. This password must be between 6 and 32 characters. The default password is public. SNMPv3 Authentication Password: The password used when sending authenticated SNMPv3 messages. Enter a password in both the Password field and the Confirm field. This password must be between 6 and 32 characters, but a length of at least at least 8 characters is recommended. The default password is public. Secure Management (Services tab) must be enabled to configure SNMPv3. The default SNMPv3 username is administrator, with SHA authentication, and DES privacy protocol. SNMPv3 Privacy Password: The password used when sending encrypted SNMPv3 data. Enter a password in both the Password field and the Confirm field. This password must be between 6 and 32 characters, but a length of at least at least 8 characters is recommended. The default password is public. Secure Management (Services tab) must be enabled to configure SNMPv3. Telnet (CLI) Password: The password for the CLI interface (via serial or Telnet). Enter a password in both the Password field and the Confirm field. This password must be between 6 and 32 characters. The default password is public. HTTP (Web) Password: The password for the Web browser HTTP interface. Enter a password in both the Password field and the Confirm field. This password must be between 6 and 32 characters. The default password is public.
NOTE
For security purposes Proxim recommends changing ALL PASSWORDS from the default public immediately, to restrict access to your network devices to authorized personnel. If you lose or forget your password settings, you can always perform the Reset to Factory Default Procedure.
IP Access Table
The Management IP Access table limits in-band management access to the IP addresses or range of IP addresses specified in the table. This feature applies to all management options (SNMP, HTTP, and CLI) except for CLI management over the serial port. To configure this table, click Add and set the following parameters: IP Address: Enter the IP Address for the management station. IP Mask: Enter a mask that will act as a filter to limit access to a range of IP Addresses based on the IP Address you already entered. The IP mask 255.255.255.255 would authorize the single station defined by the IP Address to configure the Access Point. The AP would ignore commands from any other IP address. In contrast, the IP mask 255.255.255.0 would allow any device that shares the first three octets of the IP address to configure the AP. For example, if you enter an IP address of 10.20.30.1 with a 255.255.255.0 subnet mask, any IP address between 10.20.30.1 and 10.20.30.254 will have access to the APs management interfaces. Comment: Enter an optional comment, such as the station name.
To edit or delete an entry, click Edit. Edit the information, or select Enable, Disable, or Delete from the Status pull-down menu.
53
NOTE
You must reboot the Access Point if you change the HTTP Port or Telnet Port.
Secure Management
Secure Management allows the use of encrypted and authenticated communication protocols such as SNMPv3, and Secure Socket Link (SSL), to manage the Access Point. Secure Management Status: Enables the further configuration of HTTPS Access, and SNMPv3. After enabling Secure Management, you can choose to configure HTTPS (SSL) access on the Services tab, and configure SNMPv3 passwords on the Passwords tab.
SNMP Settings
SNMP Interface Bitmask: Configure the interface or interfaces (Ethernet, Wireless-Slot A, Wireless-Slot B, All Interfaces) from which you will manage the AP via SNMP. Select Disabled to prevent a user from accessing the AP via SNMP.
HTTP Access
HTTP Interface Bitmap: Configure the interface or interfaces (Ethernet, Wireless-Slot A, Wireless-Slot B, All Interfaces) from which you will manage the AP via the Web interface. For example, to allow Web configuration via the Ethernet network only, set HTTP Interface Bitmask to Ethernet. Select Disabled to prevent a user from accessing the AP from the Web interface. HTTP Port: Configure the HTTP port from which you will manage the AP via the Web interface. By default, the HTTP port is 80. You must reboot the Access Point if you change the HTTP Port. HTTP Setup Wizard: The Setup Wizard appears automatically the first time you access the HTTP interface. If you exited out of the Setup Wizard and want to relaunch it, enable this option, click OK, and then close your browser or reboot the AP. The Setup Wizard will appear the next time you access the HTTP interface.
HTTPS Access
HTTPS (Secure Web Status): The user can access the AP in a secure fashion using Secure Socket Layer (SSL) over port 443. The AP comes pre-installed with all required SSL files: default certificate and private key installed. Check this box to enable SSL on the AP. SSL Certificate Passphrase: After enabling SSL, the only configurable parameter is the SSL passphrase. The default SSL passphrase is proxim. The AP supports SSLv3 with a 128-bit encryption certificate maintained by the AP for secure communications between the AP and the HTTP client. All communications are encrypted using the server and the client-side certificate. If you decide to upload a new certificate and private key (using TFTP or HTTP File Transfer), you need to change the SSL Certificate Passphrase for the new SSL files.
NOTE
SSL requires Internet Explorer version 6, 128 bit encryption, Service Pack 1, and patch Q323308.
NOTE
You need to reboot the AP after enabling or disabling SSL for the changes to take effect.
54
Figure 4-10
55
SSH Clients
The following SSH clients have been verified to interoperate with the APs server. The following table lists the clients, version number, and the website of the client.
Clients OpenSSH Putty Zoc Axessh Version V3.4-2 Rel 0.53b 5.00 V2.5 Website http://www.openssh.com http://www.chiark.greenend.org.uk http://www.emtec.com http://www.labf.com
Configuring SSH
Perform the following procedure to enable or disable SSH and set the SSH host key: 1. Click Configure -> Management -> Services. 2. To enable SSH, select Enable from the Enable SSH (Secure Shell) drop down menu.
NOTE
When Secure Management is enabled on the AP, SSH will be enabled by default and cannot be disabled. 3. Select the SSH Host Key Status from the drop-down menu. Host keys must either be generated externally and uploaded to the AP (see Uploading Externally Generated Host Keys), generated manually, or auto-generated at the time of SSH initialization if SSH is enabled and no host keys are present. There is no key present in an AP that is in a factory default state.
56
WARNING
SSH Host key creation may take 3 to 4 minutes during which time the AP may not respond.
Figure 4-11
Uploading an Externally Generated SSH Public Key and SSH Private Key
3. Select SSH Public Key from the File Type drop-down menu. 4. Click Browse, select the SSH Public Key file on your local machine. 5. Click Open. 6. to initiate the file transfer, click the Update AP button. 7. Select SSH Private Key from the File Type drop-down menu. 8. Click Browse, select the SSH Private Key on your local machine. 9. Click Open. 10. To initiate the file transfer, click the Update AP button. The fingerprint of the new SSH public key will be displayed in the Management -> Services page.
57
NOTE
To avoid potential problems when communicating with the AP through the serial port, Proxim recommends that you leave the Flow Control setting at None (the default value). Serial Data Bits: This is a read-only field and displays the number of data bits used in serial communication (8 data bits by default). Serial Parity: This is a read-only field and displays the number of parity bits used in serial communication (no parity bits by default). Serial Stop Bits: This is a read-only field that displays the number of stop bits used in serial communication (1 stop bit by default).
NOTE
The serial port bit configuration is commonly referred to as 8N1.
When RADIUS Based Management is enabled, a local user can be configured to provide Telnet, SSH, and HTTP(S) access to the AP when RADIUS servers fail. The local user has super user capabilities. When secure management is enabled, the local user can only login using secure means (i.e., SSH or SSL). When the local user option is disabled the only access to the AP when RADIUS servers are down will be through serial CLI or SNMP. The Radius Based Management Access parameters allows you to enable HTTP or Telnet Radius Management Access, to configure a RADIUS Profile for management access control, and to enable or disable local user access, and configure the local user password. You can configure and view the following parameters: HTTP RADIUS Access Control Status: Enable RADIUS management of HTTP/HTTPS users. Telnet RADIUS Access Control Status: Enable RADIUS management of Telnet/SSH users. RADIUS Profile for Management Access Control: Specifies the RADIUS Profile to be used for RADIUS Based Management Access. Local User Status: Enables or disables the local user when RADIUS Based Management is enabled. The default local user ID is root. Local User Password and Confirm Password: The default local user password is public. Root cannot be configured as a valid user for Radius based management access when local user access is enabled.
58
NOTE
The default filename is config. The default TFTP IP address is 10.0.0.2 for AP-2000. 5. Click OK to save the changes. 6. Reboot the AP. When the AP reboots it receives the new configuration information and must reboot one additional time. If a Syslog server was configured, the following messages can be observed on the Syslog server: AutoConfig for Static IP TFTP server address and configuration filename AutoConfig Successful
59
Figure 4-12
NOTE
The configuration filename and TFTP server IP address are configured only when the AP is configured for Static IP. If the AP is configured for Dynamic IP these parameters are not used and obtained from DHCP. 1. Click Configure > Management > AutoConfig. The Automatic Configuration Screen appears. 2. Check Enable Auto Configuration. When the AP is Configured with Dynamic IP, the DHCP server should be configured with the TFTP Server IP address ("Boot Server Host Name", option 66) and Configuration file ("Bootfile name", option 67) as follows (note that this example uses a Windows 2000 server): 3. Select DHCP Server > DHCP Option > Scope. The DHCP Options: Scope Screen appears.
60
4. Add the Boot Server Host Name and Boot Filename parameters to the Active Options list. 5. Set the value of the Boot Server Host Name Parameter to the host name or IP Address of the TFTP server. For example: 11.0.0.7.
Figure 4-14
6. Set the value of the Bootfile Name parameter to the Configuration filename. For example: AP-Config 7. If using Syslog, set the Log server IP address (option 7, Log Servers). 8. Reboot the AP. When the AP reboots it receives the new configuration information and must reboot one additional time. If a Syslog server was configured, the following messages can be observed on the Syslog server: AutoConfig for Dynamic IP TFTP server address and configuration filename AutoConfig Successful
61
NOTE
It is important to safely store the configuration reset password. If a user forgets the configuration reset password, the user will be unable to reset the AP to factory default configuration if the AP becomes inaccessible and the hardware configuration reset functionality is disabled.
62
NOTE
It is important to safely store the configuration reset password. If a user forgets the configuration reset password, the user will be unable to reset the AP to factory default configuration if the AP becomes inaccessible and the hardware configuration reset functionality is disabled.
Figure 4-15
63
Filtering
The Access Points Packet Filtering features help control the amount of traffic exchanged between the wired and wireless networks. There are four sub-tabs under the Filtering tab: Ethernet Protocol Static MAC Advanced TCP/UDP Port
Ethernet Protocol
The Ethernet Protocol Filter blocks or forwards packets based on the Ethernet protocols they support. Follow these steps to configure the Ethernet Protocol Filter: 1. Select the interface or interfaces that will implement the filter from the Ethernet Protocol Filtering drop-down menu. Ethernet: Packets are examined at the Ethernet interface Wireless - Slot A: Packets are examined at the Wireless A interface Wireless - Slot B: Packets are examined at the Wireless B interface All Interfaces: Packets are examined at both interfaces Disabled: The filter is not used 2. Select the Filter Operation Type. If set to Passthru, only the enabled Ethernet Protocols listed in the Filter Table will pass through the bridge. If set to Block, the bridge will block enabled Ethernet Protocols listed in the Filter Table. 3. Configure the Ethernet Protocol Filter Table. This table is pre-populated with existing Ethernet Protocol Filters, however, you may enter additional filters by specifying the appropriate parameters. To add an entry, click Add, and then specify the Protocol Number and a Protocol Name. Protocol Number: Enter the protocol number. See http://www.iana.org/assignments/ethernet-numbers for a list of protocol numbers. Protocol Name: Enter related information, typically the protocol name. To edit or delete an entry, click Edit and change the information, or select Enable, Disable, or Delete from the Status drop-down menu. An entrys status must be enabled in order for the protocol to be subject to the filter. 4. Reboot the AP for any changes to the Ethernet Protocol Filter Table to take effect.
Static MAC
The Static MAC Address filter optimizes the performance of a wireless (and wired) network. When this feature is properly configured, the AP can block traffic between wired devices and wireless devices based on MAC address. For example, you can set up a Static MAC filter to prevent wireless clients from communicating with a specific server on the Ethernet network. You can also use this filter to block unnecessary multicast packets from being forwarded to the wireless network.
NOTE
The Static MAC Filter is an advanced feature. You may find it easier to control wireless traffic via other filtering options, such as Ethernet Protocol Filtering. Each static MAC entry contains the following fields: Wired MAC Address Wired Mask Wireless MAC Address Wireless Mask Comment: This field is optional. Status
64
To create an entry, click Add and enter the appropriate MAC addresses and Masks to setup a filter. The entry is enabled automatically when saved. To edit an entry, click Edit. To disable or remove an entry, click Edit and change the Status field from Enable to Disable or Delete.
Figure 4-16
65
Result: Traffic between the Wired Server and Wireless Client 1 is blocked. Wireless Clients 2 and 3 can still communicate with the Wired Server.
Prevent Multiple Wireless Devices From Communicating With a Single Wired Device
Configure the following settings to prevent Wireless Clients 1 and 2 from communicating with the Wired Server. Wired MAC Address: 00:40:F4:1C:DB:6A Wired Mask: FF:FF:FF:FF:FF:FF Wireless MAC Address: 00:02:2D:51:94:E4 Wireless Mask: FF:FF:FF:00:00:00
Result: When a logical AND is performed on the Wireless MAC Address and Wireless Mask, the result corresponds to any MAC address beginning with the 00:20:2D prefix. Since Wireless Client 1 and Wireless Client 2 share the same prefix (00:02:2D), traffic between the Wired Server and Wireless Clients 1 and 2 is blocked. Wireless Client 3 can still communicate with the Wired Server since it has a different prefix (00:20:A6).
Prevent All Wireless Devices From Communicating With a Single Wired Device
Configure the following settings to prevent all three Wireless Clients from communicating with Wired Server 1. Wired MAC Address: 00:40:F4:1C:DB:6A Wired Mask: FF:FF:FF:FF:FF:FF Wireless MAC Address: 00:00:00:00:00:00 Wireless Mask: 00:00:00:00:00:00
Result: The Access Point blocks all traffic between Wired Server 1 and all wireless clients.
Result: The Access Point blocks all traffic between Wireless Client 3 and the Ethernet network.
Prevent Messages Destined for a Specific Multicast Group from Being Forwarded to the Wireless LAN
If there are devices on your Ethernet network that use multicast packets to communicate and these packets are not required by your wireless clients, you can set up a Static MAC filter to preserve wireless bandwidth. For example, if routers on your network use a specific multicast address (such as 01:00:5E:00:32:4B) to exchange information, you can set up a filter to prevent these multicast packets from being forwarded to the wireless network: Wired MAC Address: 01:00:5E:00:32:4B
66
Result: The Access Point does not forward any packets that have a destination address of 01:00:5E:00:32:4B to the wireless network.
Advanced
You can configure the following advanced filtering options: Enable Proxy ARP: Place a check mark in the box provided to allow the Access Point to respond to Address Resolution Protocol (ARP) requests for wireless clients. When enabled, the AP answers ARP requests for wireless stations without actually forwarding them to the wireless network. If disabled, the Access Point will bridge ARP requests for wireless clients to the wireless LAN. Enable IP/ARP Filtering: Place a check mark in the box provided to allow IP/ARP filtering based on the IP/ARP Filtering Address and IP Mask. Leave the box unchecked to prevent filtering. If enabled, you should also configure the IP/ARP Filtering Address and IP/ARP IP Mask. IP/ARP Filtering Address: Enter the Network filtering IP Address. IP/ARP IP Mask: Enter the Network Mask IP Address.
The following protocols are listed in the Advanced Filter Table: Deny IPX RIP Deny IPX SAP Deny IPX LSP Deny IP Broadcasts Deny IP Multicasts
The AP can filter these protocols in the wireless-to-Ethernet direction, the Ethernet-to-wireless direction, or in both directions. Click Edit and use the Status field to Enable or Disable the filter.
TCP/UDP Port
Port-based filtering enables you to control wireless user access to network services by selectively blocking TCP/UDP protocols through the AP. A user specifies a Protocol Name, Port Number, Port Type (TCP, UDP, or TCP/UDP), and filtering interfaces ( Ethernet, Wireless A only, Wireless A and Ethernet, Wireless B only, Wireless B and Ethernet, All Interfaces) in order to block access to services, such as Telnet and FTP, and traffic, such as NETBIOS and HTTP. For example, an AP with the following configuration would discard frames received on its Ethernet interface with a UDP destination port number of 137, effectively blocking NETBIOS Name Service packets.
Protocol Type (TCP/UDP) UDP Destination Port Number 137 Protocol Name NETBIOS Name Service Interface Ethernet Status (Enable/Disable) Enable
67
68
Alarms
This tab has three sub-tabs. Groups Alarm Host Table Syslog Rogue Access Point Detection (RAD)
Groups
The AP can be configured to generate and send alarms/notifications/traps as version 1 or a version 2c. Use the drop-down menu to select SNMP alarm type. There are seven alarm groups that can be enabled or disabled via the Web interface. Place a check mark in the box provided to enable a specific group. Remove the check mark from the box to disable the alarms. Alarm Severity Levels vary.
Figure 4-17
69
70
In addition, the AP supports these standard traps, which are always enabled: RFC 1215-Trap
Trap Name coldStart Description The AP has been turned on or rebooted. Trap Severity Level: Informational The AP's Ethernet interface link is up (working). Trap Severity Level: Informational The AP's Ethernet interface link is down (not working). Trap Severity Level: Informational
linkUp
linkDown
topologyChange
All these alarm groups correspond to System Alarms that are displayed in the System Status screen, including the traps that are sent by the AP to the SNMP managers specified in the Alarm Host Table.
71
Critical alarms will often result in severe disruption in network activity or an automatic reboot of the AP Major alarms are usually activated due to a breach in the security of the system. Clients cannot be authenticated or an attempt at unauthorized access into the AP has been detected. Informational alarms are there to provide the network administrator with some general information about the activities the AP is performing.
NOTE
Up to 10 entries are possible in the Alarm Host table. IP Address: Enter the Trap Host IP Address. Password: Enter the password in the Password field and the Confirm field. Comment: Enter an optional comment, such as the alarm (trap) host station name.
To edit or delete an entry, click Edit. Edit the information, or select Enable, Disable, or Delete from the Status drop-down menu.
Syslog
The Syslog messaging system enables the AP to transmit event messages to a central server for monitoring and troubleshooting. The AP can send messages to multiple Syslog servers. The access point logs Session Start (Log-in) and Session Stop (Log-out) events for each wireless client as an alternative to RADIUS accounting. See RFC 3164 at http://www.rfc-editor.org for more information on the Syslog standard.
72
Syslog Messages
The following messages are supported in the AP:
Message Auto Configuration via DHCP Auto Configuration for static IP TFTP server IP/Config filename missing in DHCP response AutoConfig TFTP server IP address used is <IP address> AutoConfig filename used is <filename> AutoConfig TFTP download failed Image Error check, invalid image AP Heartbeat status Client Authentication State Accounting RADIUS Responses Severity Informational Informational Minor Informational Informational Minor Minor Minor Informational Informational Informational
73
Trusted AP
Rogue AP
Management Station
Figure 4-18
Additionally, the RAD scan results are maintained in a table that can be queried via SNMP. The system administrator has to enable RAD on the Access Points in the wireless network and also configure the Trap Host on all these Access
74
Configuring RAD
Perform this procedure to enable and configure RAD. The RAD screen also displays the time of the last scan and the number of new access points detected in the last scan. 1. Enable the Security Alarm Group. Select the Security Alarm Group link from the RAD screen. Configure a Trap Host to receive the list of access points detected during the scan. 2. Click Configure > Alarms > RAD. 3. Enable RAD by checking Enable Rogue AP Detection. 4. Enter the Scan Interval. The Scan Interval specifies the time period in minutes between scans and can be set to any value between 15 and 1440 minutes. 5. Select the Scan Interface as Wireless - Slot A, Wireless - Slot B, or Both Wireless - Slots A & B. 6. Click OK. The results of the RAD scan be viewed in the Status page in the HTTP interface.
Figure 4-19
75
Bridge
The AP is a bridge between your wired and wireless networking devices. As a bridge, the functions performed by the AP include: MAC address learning Forward and filtering decision making Spanning Tree protocol used for loop avoidance
Once the AP is connected to your network, it learns which devices are connected to it and records their MAC addresses in the Learn Table. The table can hold up to 10,000 entries. To view the Learn Table, click on the Monitor tab and select the Learn Table tab. The Bridge tab has four sub-tabs. Spanning Tree Storm Threshold Intra BSS Packet Forwarding (Pkt Fwd)
Spanning Tree
A Spanning Tree is used to avoid redundant communication loops in networks with multiple bridging devices. Bridges do not have any inherent mechanism to avoid loops, because having redundant systems is a necessity in certain networks. However, redundant systems can cause Broadcast Storms, multiple frame copies, and MAC address table instability problems. Complex network structures can create multiple loops within a network. The Spanning Tree configuration blocks certain ports on AP devices to control the path of communication within the network, avoiding loops and following a spanning tree structure. For more information on Spanning Tree protocol, see Section 8.0 of the IEEE 802.1d standard. The Spanning Tree configuration options are advanced settings. Proxim recommends that you leave these parameters at their default values unless you are familiar with the Spanning Tree protocol.
Storm Threshold
Storm Threshold is an advanced Bridge setup option that you can use to protect the network against data overload by: Specifying a maximum number of frames per second as received from a single network device (identified by its MAC address). Specifying an absolute maximum number of messages per port.
The Storm Threshold parameters allow you to specify a set of thresholds for each port of the AP, identifying separate values for the number of broadcast messages/second and Multicast messages/second. When the number of frames for a port or identified station exceeds the maximum value per second, the AP will ignore all subsequent messages issued by the particular network device, or ignore all messages of that type. Address Threshold: Enter the maximum allowed number of packets per second. Ethernet Threshold: Enter the maximum allowed number of packets per second. Wireless-Slot A and Wireless-Slot B Threshold: Enter the maximum allowed number of packets per second.
Intra BSS
The wireless clients (or subscribers) that associate with a certain AP form the Basic Service Set (BSS) of a network infrastructure. By default, wireless subscribers in the same BSS can communicate with each other. However, some administrators (such as wireless public spaces) may wish to block traffic between wireless subscribers that are associated with the same AP to prevent unauthorized communication and to conserve bandwidth. This feature enables you to prevent wireless subscribers within a BSS from exchanging traffic. Although this feature is generally enabled in public access environments, Enterprise LAN administrators use it to conserve wireless bandwidth by limiting communication between wireless clients. For example, this feature prevents peer-to-peer file sharing or gaming over the wireless network.
76
NOTE
The gateway to which traffic will be redirected should be node on the Ethernet network. It should not be a wireless client. To configure interfaces for packet forwarding, specifying interface port(s) to which packets are redirected and a destination MAC address, as follows: 1. Within the Packet Forwarding Configuration screen, check the box labeled Enable Packet Forwarding. 2. Specify a destination Packet Forwarding MAC Address. The AP will redirect all unicast, multicast, and broadcast packets received from wireless clients to the address you specify. 3. Select a Packet Forwarding Interface Port from the drop-down menu. You can redirect traffic to: Any Interface (traffic is redirected to a port based on the bridge learning process) Ethernet A WDS connection (see Wireless Distribution System (WDS) for details) 4. Click OK to save your changes.
77
RADIUS Profiles
Configuring RADIUS Profiles on the AP define a profile for RADIUS Servers used by the system or by a VLAN. The network administrator can define RADIUS Servers per Authentication Mode and per VLAN. The AP communicates with the RADIUS server defined in a profile to provide the following features: MAC Access Control Via RADIUS Authentication 802.1x Authentication using RADIUS RADIUS Accounting
Also, RADIUS Based Management Access allows centralized user management. The network administrator can configure default RADIUS authentication servers to be used on a system-wide basis, or in networks with VLANs enabled the administrator can also configure separate authentication servers to be used for MAC authentication, EAP authentication, or Accounting in each VLAN. You can configure the AP to communicate with up to six different RADIUS servers per VLAN/SSID: Primary Authentication Server (MAC-based authentication) Back-up Authentication Server (MAC-based authentication) Primary Authentication Server (EAP/802.1x authentication) Back-up Authentication Server (EAP/802.1x authentication) Primary Accounting Server Back-up Accounting Server
The back-up servers are optional, but when configured, the AP will communicate with the back-up server if the primary server is off-line. After the AP has switched to the backup server, it will periodically check the status of the primary RADIUS server every five (5) minutes. Once the primary RADIUS server is again online, the AP automatically reverts from the backup RADIUS server back to the primary RADIUS server. All subsequent requests are then sent to the primary RADIUS server. You can view monitoring statistics for each of the configured RADIUS servers.
AP
Figure 4-20
This figure shows a network with separate authentication servers for each authentication type and for each VLAN. The clients in VLAN 1 are authenticated using the authentication servers configured for VLAN 1. The type of authentication
78
Assigning the user to a VLAN by specifying the VLAN membership information of the user.
Figure 4-21
79
Figure 4-22
NOTE
This page configures only the Primary RADIUS Server associated with the profile. After configuring these parameters, save them by clicking OK. Then, to configure the Secondary RADIUS Server, edit the profile from the main page. Server Profile Name: the profile name. This is the name used to associated a VLAN to the profile. Refer to SSID/VLAN/Security. MAC Address Format Type: This parameter should correspond to the format in which the clients 12-digit MAC addresses are listed within the RADIUS server. Available options are: Dash delimited: dash between each pair of digits: xx-yy-zz-aa-bb-cc Colon delimited: colon between each pair of digits: xx:yy:zz:aa:bb:cc Single dash delimited: dash between the sixth and seventh digits: xxyyzz-aabbcc No delimiters: No characters or spaces between pairs of hexidecimal digits: xxyyzzaabbcc Accounting Inactivity Timer: Enter the accounting inactivity timer. This parameter supports a value from 1-60 minutes. The default is 5 minutes. Authorization Lifetime: Enter the time, in seconds, each client session may be active before being automatically re-authenticated. This parameter supports a value between 900 and 43200 seconds. The default is 900 sec. Server Addressing Format: select IP Address or Name. If you want to identify RADIUS servers by name, you must configure the AP as a DNS Client. See DNS Client for details.
80
NOTE
Each VLAN can be configured to use a separate RADIUS server (and backup server) for MAC authentication.
NOTE
Contact your RADIUS server manufacturer if you have problems configuring the server or have problems using RADIUS authentication.
NOTE
Each VLAN can be configured to use a separate RADIUS server (and backup server) for 802.1x authentication. 802.1x authentication (EAP authentication) can be separately enabled for each VLAN.
81
Session Length
Accounting sessions continue when a client reauthenticates to the same AP. Sessions are terminated when: A client disassociates. A client does not transmit any data to the AP for a fixed amount of time. A client is detected on a different interface.
If the client roams from one AP to another, one session is terminated and a new session is begun.
NOTE
This feature requires RADIUS authentication using MAC Access Control or 802.1x. Wireless clients configured in the Access Points static MAC Access Control list are not tracked.
82
SSID/VLAN/Security
The AP provides several security features to protect your network from unauthorized access. Virtual Local Area Networks (VLANs) are logical groupings of network hosts. Defined by software settings, other VLAN members or resources appear (to clients) to be on the same physical segment, no matter where they are attached on the logical LAN or WAN segment. They simplify traffic flow between clients and their frequently-used or restricted resources. The AP uses Security Profiles to define allowed wireless clients, and authentication and encryption types and RADIUS Profiles to define RADIUS Servers used by the system or by a VLAN. The SSID/VLAN/Security tab contains the following sub-tabs: Management VLAN Security Profiles MAC Access Wireless-A and Wireless-B
Management VLAN
VLAN Overview
Virtual Local Area Networks (VLANs) are logical groupings of network hosts. Defined by software settings, other VLAN members or resources appear (to clients) to be on the same physical segment, no matter where they are attached on the logical LAN or WAN segment. They simplify traffic flow between clients and their frequently-used or restricted resources. VLANs now extend as far as the reach of the access point signal. Clients can be segmented into wireless sub-networks via SSID and VLAN assignment. A Client can access the network by connecting to an AP configured to support its assigned SSID/VLAN. AP devices are fully VLAN-ready; however, by default VLAN support is disabled. Before enabling VLAN support, certain network settings should be configured, and network resources such as a VLAN-aware switch, a RADIUS server, and possibly a DHCP server should be available. Once enabled, VLANs are used to conveniently, efficiently, and easily manage your network in the following ways: Manage adds, moves, and changes from a single point of contact Define and monitor groups Reduce broadcast and multicast traffic to unnecessary destinations Improve network performance and reduce latency Increase security Secure network restricts members to resources on their own VLAN Clients roam without compromising security
VLAN tagged data is collected and distributed through an AP's wireless interface(s) based on Network Name (SSID). An Ethernet port on the access point connects a wireless cell or network to a wired backbone. The access points communicate across a VLAN-capable switch that analyzes VLAN-tagged packet headers and directs traffic to the appropriate ports. On the wired network, a RADIUS server authenticates traffic and a DHCP server manages IP addresses for the VLAN(s). Resources like servers and printers may be present, and a hub may include multiple APs, extending the network over a larger area. In this figure, the numbered items correspond to the following components: 1. 2. 3. 4. 5. 6. 7. VLAN-enabled access point VLAN-aware switch (IEEE 802.1Q uplink) AP management via wired host (SNMP, Web interface or CLI) DHCP Server RADIUS Server VLAN 1 VLAN 2
83
Figure 4-23
NOTE
The ability to configure up to 16 VLAN/SSID pairs and to configure a security profile per SSID is available only for 802.11b/g APs and 802.11a Upgrade Kit APs. 802.11b APs do not support multiple VLAN/SSID pairs. APs with the 802.11a card support multiple VLAN/SSID pairs, but do not support the security profile per SSID capability. The AP matches packets transmitted or received to a network name with the associated VLAN. Traffic received by a VLAN is only sent on the wireless interface associated with that same VLAN. This eliminates unnecessary traffic on the wireless LAN, conserving bandwidth and maximizing throughput. In addition to enhancing wireless traffic management, the VLAN-capable AP supports easy assignment of wireless users to workgroups. In a typical scenario, each user VLAN represents a workgroup; for example, one VLAN could be used for an EMPLOYEE workgroup and the other, for a GUEST workgroup. In this scenario, the AP would assign every packet it accepted to a VLAN. Each packet would then be identified as EMPLOYEE or GUEST, depending on which wireless NIC received it. The AP would insert VLAN headers or tags with identifiers into the packets transmitted on the wired backbone to a network switch. Finally, the switch would be configured to route packets from the EMPLOYEE workgroup to the appropriate corporate resources such as printers and servers. Packets from the GUEST workgroup could be restricted to a gateway that allowed access to only the Internet. A member of the GUEST workgroup could send and receive e-mail and access the Internet, but would be prevented from accessing servers or hosts on the local corporate network.
84
NOTE
The ability to configure up to 16 VLAN/SSID pairs and to configure a security profile per SSID is available only for 802.11b/g APs and 802.11a Upgrade Kit APs. 802.11b APs do not support multiple VLAN/SSID pairs. APs with the 802.11a card support multiple VLAN/SSID pairs, but do not support the security profile per SSID capability. The three primary scenarios for using VLAN workgroups are as follows: 1. VLAN disabled: Your network does not use VLANs, and you cannot configure the AP to use multiple SSIDs. 2. VLAN enabled, each VLAN workgroup uses a different VLAN ID Tag 3. VLAN enabled, a mixture of Tagged and Untagged workgroups
CAUTION
If a non-zero management VLAN ID is configured then management access to the AP is restricted to wired or wireless hosts that are members of the same VLAN. Ensure your management platform or host is a member of the same VLAN before attempting to manage the AP.
1. Click Configure > SSID/VLAN/Security. 2. Set the VLAN Management ID to a value between -1 and 4094 (a value of 0 disables VLAN management). 3. Place a check mark in the Enable VLAN Protocol box.
CAUTION
Once a VLAN Management ID is configured and is equivalent to one of the VLAN User IDs on the AP, all members of that User VLAN will have management access to the AP. Be careful to restrict VLAN membership to those with legitimate access to the AP.
1. Click Configure > SSID/VLAN/Security. 2. Set the VLAN Management ID to use the same VLAN ID as one of the configured SSID/VLAN pairs. See Typical User VLAN Configurations for details. 3. Place a check mark in the Enable VLAN Protocol box.
85
NOTE
For larger networks that include multiple Access Points, you may prefer to maintain this list on a centralized location using the MAC Access Control Via RADIUS Authentication.
Figure 4-24
86
WEP Encryption
The IEEE 802.11 standards specify an optional encryption feature, known as Wired Equivalent Privacy or WEP, that is designed to provide a wireless LAN with a security level equal to what is found on a wired Ethernet network. WEP encrypts the data portion of each packet exchanged on an 802.11 network using an Encryption Key (also known as a WEP Key). When Encryption is enabled, two 802.11 devices must have the same Encryption Keys and both devices must be configured to use Encryption in order to communicate. If one device is configured to use Encryption but a second device is not, then the two devices will not communicate, even if both devices have the same Encryption Keys. An 802.11b AP supports 64-bit and 128-bit encryption: For 64-bit encryption, an encryption key is 10 hexadecimal characters (0-9 and A-F) or 5 ASCII characters (see ASCII Character Chart). For 128-bit encryption, an encryption key is 26 hexadecimal characters or 13 ASCII characters. An 802.11a or 802.11b/g AP supports 64-bit, 128-bit, and 152-bit encryption: For 64-bit encryption, an encryption key is 10 hexadecimal characters (0-9 and A-F) or 5 ASCII characters (see ASCII Character Chart). For 128-bit encryption, an encryption key is 26 hexadecimal characters or 13 ASCII characters. For 152-bit encryption, an encryption key is 32 hexadecimal characters or 16 ASCII characters.
802.1x Authentication
IEEE 802.1x is a standard that provides a means to authenticate and authorize network devices attached to a LAN port. A port in the context of IEEE 802.1x is a point of attachment to the LAN, either a physical Ethernet connection or a wireless link to an Access Point. 802.1x requires a RADIUS server and uses the Extensible Authentication Protocol (EAP) as a standards-based authentication framework, and supports automatic key distribution for enhanced security. The EAP-based authentication framework can easily be upgraded to keep pace with future EAP types. Popular EAP types include: EAP-Message Digest 5 (MD5): Username/Password-based authentication; does not support automatic key distribution EAP-Transport Layer Security (TLS): Certificate-based authentication (a certificate is required on the server and each client); supports automatic key distribution EAP-Tunneled Transport Layer Security (TTLS): Certificate-based authentication (a certificate is required on the server; a clients username/password is tunneled to the server over a secure connection); supports automatic key distribution PEAP - Protected EAP with MS-CHAP v2: Secure username/password-based authentication; supports automatic key distribution
Different servers support different EAP types and each EAP type provides different features. Refer to the documentation that came with your RADIUS server to determine which EAP types it supports.
NOTE
The AP supports the following EAP types when Authentication Mode is set to 802.1x, WPA or 802.11i (WPA2): EAP-TLS, PEAP, and EAP-TTLS. When Authentication Mode is set to Mixed, the AP supports the following EAP types: EAP-TLS, PEAP, EAP-TLLS, and EAP-MD5 (MD5 does not support automatic key distribution; therefore, if you choose this method you need to manually configure each client with the network's encryption key).
87
When using Authentication Mode to 802.1x, WPA, Mixed mode (802.1x and WEP), or 802.11i, you need to configure your RADIUS server for authentication purposes. Prior to successful authentication, an unauthenticated client PC cannot send any data traffic through the AP device to other systems on the LAN. The AP inhibits all data traffic from a particular client PC until the client PC is authenticated. Regardless of its authentication status, a client PC can always exchange 802.1x messages in the clear with the AP (the client begins encrypting data after it has been authenticated).
Figure 4-25
The AP acts as a pass-through device to facilitate communications between the client PC and the RADIUS server. The AP (2) and the client (1) exchange 802.1x messages using an EAPOL (EAP Over LAN) protocol (A). Messages sent from the client station are encapsulated by the AP and transmitted to the RADIUS (3) server using EAP extensions (B). Upon receiving a reply EAP packet from the RADIUS, the message is typically forwarded to the client, after translating it back to the EAPOL format. Negotiations take place between the client and the RADIUS server. After the client has been successfully authenticated, the client receives an Encryption Key from the AP (if the EAP type supports automatic key distribution). The client uses this key to encrypt data after it has been authenticated. For 802.11a and 802.11b/g clients that communicate with an AP, each client receives its own unique encryption key; this is known as Per User Per Session Encryption Keys.
NOTE
For Dual-radio APs: WPA is available only for the AP-2000b/g and for APs using either an 802.11a or 802.11b/g Upgrade Kit. WPA is not available for APs with an 802.11b PC Card or a 5 GHz Upgrade Kit. WPA is a replacement for Wired Equivalent Privacy (WEP), the encryption technique specified by the original 802.11 standard. WEP has several vulnerabilities that have been widely publicized. WPA addresses these weaknesses and provides a stronger security system to protect wireless networks. WPA provides the following new security measures not available with WEP: Improved packet encryption using the Temporal Key Integrity Protocol (TKIP) and the Michael Message Integrity Check (MIC). Per-user, per-session dynamic encryption keys: Each client uses a different key to encrypt and decrypt unicast packets exchanged with the AP A client's key is different for every session; it changes each time the client associates with an AP The AP uses a single global key to encrypt broadcast packets that are sent to all clients simultaneously Encryption keys change periodically based on the Re-keying Interval parameter WPA uses 128-bit encryption keys
88
NOTE
For more information on WPA, see the Wi-Fi Alliance Web site at http://www.wi-fi.org. The AP supports the following WPA authentication modes: WPA: The AP uses 802.1x to authenticate clients. You should only use an EAP that supports mutual authentication and session key generation, such as EAP-TLS, EAP-TTLS, and PEAP. See 802.1x Authentication for details. WPA-PSK (Pre-Shared Key): For networks that do not have 802.1x implemented, you can configure the AP to authenticate clients based on a Pre-Shared Key. This is a shared secret that is manually configured on the AP and each of its clients. The Pre-Shared Key must be 256 bits long, which is 64 hexadecimal digits. The AP also supports a PSK Pass Phrase option to facilitate the creation of the Pre-Shared Key (so a user can enter an easy-to-remember phrase rather than a string of characters). 802.11i (also known as WPA2): The AP authenticates clients according to the 802.11i draft standard, using 802.1x authentication, an AES cipher, and re-keying. 802.11i-PSK (also known as WPA2 PSK): The AP uses an AES cipher, and authenticates clients based on a Pre-Shared Key. The Pre-Shared Key must be 256 bits long, which is either 64 hexadecimal digits. The AP also supports a PSK Pass Phrase option to facilitate the creation of the Pre-Shared Key (so a user can enter an easy-to-remember phrase rather than a string of characters).
NOTE
The ability to configure up to 16 VLAN/SSID pairs and to configure a security profile per SSID is available only for 802.11b/g APs and 802.11a Upgrade Kit APs. 802.11b APs do not support multiple VLAN/SSID pairs. APs with the 802.11a card support multiple VLAN/SSID pairs, but do not support the security profile per SSID capability.
89
Up to 16 security profiles can be configured per wireless interface. 1. Click Configure -> SSID/VLAN/Security -> Security Profile.
Figure 4-26
2. Click Add in the Security Profile Table to create a new entry. To modify an existing profile, select the profile and click Edit. To delete an existing profile, select the profile and click Delete. You cannot delete a Security Profile used in an SSID. Also, the first Security Profile (index 1.1 to 1.7) cannot be deleted. 3. Configure one or more types of wireless stations (security modes) that are allowed access to the AP under the security profile. The WEP/PSK parameters are separately configurable for each security mode. To enable a security mode in the profile (Non Secure Station, WEP Station, 802.1x Station, WPA Station, WPA-PSK Station, 802.11i Station, 802.11i-PSK Station), check the box next to the mode. See Figure 4-27 on page 92. If the security mode selected in a profile is WEP, WPA-PSK, or 802.11i-PSK, then you must configure the WEP or Pre-Shared Keys. 4. Configure the parameters as follows for each enabled security mode. Refer to Figure 4-27 on page 92. Non Secure Station: Authentication Mode: None. The AP allows access to Stations without authentication. Non secure station should be used only with WEP or 802.1x security mode. Cipher: None WEP Station: Authentication Mode: None Cipher: WEP Encryption Key 0, Encryption Key 1, Encryption Key 2, Encryption Key 3 Encryption Transmit Key: select Key 0, Key 1, Key 2, or Key 3
90
91
Figure 4-27
92
Figure 4-28
The Add Entry or Edit Entry screen appears. See Figure 4-29 and Figure 4-30 on page 94.
Figure 4-29
93
Figure 4-30
4. Enter a unique Network Name (SSID), between 1 and 32 characters. This parameter is mandatory. 5. Enter a unique VLAN ID. This parameter is mandatory. You must specify a unique VLAN ID for each SSID on the interface. A VLAN ID is a number from -1 to 4094. A value of -1 means that an entry is untagged. You can set the VLAN ID to -1 or untagged if you do not want clients that are using a specific SSID to be members of a VLAN workgroup. Only one untagged VLAN ID is allowed per interface. The VLAN ID must match an ID used by your network; contact your network administrator if you need assistance defining the VLAN IDs. 6. If editing an entry, enable or disable the VLAN using the Status drop-down menu. If adding an entry, this field will not appear. 7. Click OK to return to Wireless A or B Security Configuration Screen. See Figure 4-31 on page 95.
94
Figure 4-31
8. Enable or disable RADIUS accounting on the VLAN/SSID under the Accounting Status drop-down menu. 9. Enable or disable RADIUS MAC authentication status on the VLAN/SSID under the RADIUS Authentication Status drop-down menu. 10. Enable or disable MAC Access Control List status on the VLAN/SSID under the MAC ACL Status drop-down menu. 11. Enter the Rekeying Interval in seconds. The default interval is 900 seconds. 12. Enter the Security Profile used by the VLAN in the Security Profile field. Refer to the Security Profiles section for more information.
NOTE
If you have two or more SSIDs per interface using a security Profile with a security mode of Non Secure, be aware that security being applied in the VLAN is not being applied in the wireless network.
95
Figure 4-32
3. Click Add to configure additional SSIDs, VLANs, and their associated security profiles and RADIUS server profiles, or click Edit to modify an existing VLAN/SSID.
96
Figure 4-33
97
Figure 4-34
4. Enter a unique Network Name (SSID), between 1 and 32 characters. This parameter is mandatory. 5. Enter a unique VLAN ID. This parameter is mandatory. You must specify a unique VLAN ID for each SSID on the interface. A VLAN ID is a number from -1 to 4094. A value of -1 means that an entry is untagged. You can set the VLAN ID to -1 or untagged if you do not want clients that are using a specific SSID to be members of a VLAN workgroup. Only one untagged VLAN ID is allowed per interface. The VLAN ID must match an ID used by your network; contact your network administrator if you need assistance defining the VLAN IDs. 6. If editing an entry, enable or disable the VLAN using the VLAN Status drop-down menu. If adding, this drop-down menu will not appear. 7. Enable or disable the SSID Authorization status from the drop-down menu. SSID Authorization is the RADIUS based authorization of the SSID for a particular client. The authorized SSIDs are sent as the tunnel attributes. 8. Enable or disable RADIUS accounting on the VLAN/SSID under the Accounting Status drop-down menu. 9. Enable or disable RADIUS MAC authentication status on the VLAN/SSID under the RADIUS Authentication Status drop-down menu. 10. Enable or disable MAC Access Control List status on the VLAN/SSID under the MAC ACL Status drop-down menu. 11. Enter the Rekeying Interval in seconds. The default interval is 900 seconds. 12. Enter the Security Profile used by the VLAN in the Security Profile field.
98
99
Logging into the HTTP Interface Version: Provides version information for the Access Points system components. ICMP: Displays statistics for Internet Control Message Protocol packets sent and received by the AP. IP/ARP Table: Displays the APs IP Address Resolution table. Learn Table: Displays the list of nodes that the AP has learned are on the network. IAPP: Provides statistics for the Inter-Access Point Protocol messages sent and received by the AP. RADIUS: Provides statistics for the configured primary and backup RADIUS server(s). Interfaces: Displays the Access Points interface statistics (Wireless and Ethernet). Station Statistics: Displays statistics for stations and Wireless Distribution System links.
NOTE
The HTTP interface supports the following Web browser: Microsoft Internet Explorer 6 with Service Pack 1 or later Netscape 6.1 or later 2. If necessary, disable the Internet proxy settings. For Internet Explorer users, follow these steps: Select Tools > Internet Options.... Click the Connections tab. Click LAN Settings.... If necessary, remove the check mark from the Use a proxy server box. Click OK twice to save your changes and return to Internet Explorer. 3. Enter the Access Points IP address in the browsers Address field and press Enter. Result: The AP Enter Network Password screen appears. 4. Enter the HTTP password in the Password field and click OK. Leave the User Name field blank. (By default, the HTTP password is public). Result: The System Status screen appears.
100
Figure 5-1
5. Click the Monitor button located on the left-hand side of the screen.
Figure 5-2
6. Click the tab that corresponds to the statistics you want to review. For example, click Learn Table to see the list of nodes that the AP has discovered on the network. 7. If applicable, click the Refresh button to update the statistics.
101
Version
From the HTTP interface, click the Monitor button and select the Version tab. The list displayed provides you with information that may be pertinent when calling Technical Support. With this information, your Technical Support representative can verify compatibility issues and make sure the latest software are loaded. This screen displays the following information for each Access Point component: Serial Number: The components serial number, if applicable. Component Name ID: The AP identifies a system component based on its ID. Each component has a unique identifier. Variant: Several variants may exist of the same component (for example, a hardware component may have two variants, one with more memory than the other). Version: Specifies the components version or build number. The Software Image version is the most useful information on this screen for the typical end user.
Figure 5-3
102
ICMP
This tab provides statistical information for both received and transmitted messages directed to the AP. Not all ICMP traffic on the network is counted in the ICMP (Internet Control Message Protocol) statistics.
Figure 5-4
IP/ARP Table
This tab provides information based on the Address Resolution Protocol (ARP), which relates MAC Address and IP Addresses.
Figure 5-5
IP/ARP Table
103
Learn Table
This tab displays information relating to network bridging. It reports the MAC address for each node that the device has learned is on the network and the interface on which the node was detected. There can be up 10,000 entries in the Learn Table.
Figure 5-6
Learn Table
IAPP
This tab displays statistics relating to client handovers and communications between ORiNOCO Access Points.
Figure 5-7
IAPP Screen
104
RADIUS
This tab provides RADIUS authentication, EAP/802.1x authentication, and accounting information for both the Primary and Backup RADIUS servers.
NOTE
RADIUS authentication and accounting must be enabled for this information to be valid.
Figure 5-8
105
Interfaces
This tab displays statistics for the Ethernet and wireless interfaces. The Operational Status can be up, down, or testing.
Figure 5-9
106
Station Statistics
This tab displays information on wireless clients attached to the AP and on Wireless Distribution System links.
Figure 5-10
107
108
Performing Commands
Logging into the HTTP Interface Introduction to File Transfer via TFTP or HTTP: Describes the available file transfer methods. Update AP via TFTP: Download files from a TFTP server to the AP. Update AP via HTTP: Download files to the AP from HTTP. Retrieve File via TFTP: Upload configuration files from the AP to a TFTP server. Retrieve File via HTTP: Upload configuration files from the AP via HTTP. Reboot: Reboot the AP in the specified number of seconds. Reset: Reset all of the Access Points configuration settings to factory defaults. Help Link: Configure the location where the AP Help files can be found.
NOTE
The HTTP interface supports the following Web browser: Microsoft Internet Explorer 6 with Service Pack 1 or later Netscape 6.1 or later 2. If necessary, disable the Internet proxy settings. For Internet Explorer users, follow these steps: Select Tools > Internet Options.... Click the Connections tab. Click LAN Settings.... If necessary, remove the check mark from the Use a proxy server box. Click OK twice to save your changes and return to Internet Explorer. 3. Enter the Access Points IP address in the browsers Address field and press Enter. Result: The Enter Network Password screen appears. 4. Enter the HTTP password in the Password field and click OK. Leave the User Name field blank. (By default, the HTTP password is public). Result: The System Status screen appears.
109
Performing Commands
Figure 6-1
5. Click the Commands button located on the left-hand side of the screen.
Figure 6-2
6. Click the tab that corresponds to the command you want to issue. For example, click Reboot to restart the unit.
110
Performing Commands
The following procedures describe uploading Configuration files from the AP:
NOTE
SSL requires Internet Explorer version 6, 128 bit encryption, Service Pack 1, and patch Q323308.
If any of the above checks fail on the downloaded image, the Access Point deletes the downloaded image and retains the old image. Otherwise, if all checks pass successfully, the AP deletes the old image and retains the downloaded image. These checks are to ensure that the AP does not enter an invalid image state. The storage of the two images is only temporary to ensure the proper verification; the two images will not be stored in the AP permanently. Image error checking functions automatically in the background. No user configuration is required.
111
Performing Commands
Figure 6-3
If you do not have a TFTP server installed on your system, install the TFTP server from the ORiNOCO CD. You can either install the TFTP server from the CD Wizard or run OEM-TFTP-Server.exe found in the CDs Xtras/SolarWinds sub-directory. The Update AP via TFTP tab shows version information and allows you to enter TFTP information as described below. Server IP Address: Enter the TFTP server IP Address. Double-click the TFTP server icon on your desktop and locate the IP address assigned to the TFTP server. Note: This is the IP address that will be used to point the Access Point to the AP Image file. File Name: Enter the name of the file to be downloaded (including the file extension). Copy the updated AP Image file to the TFTP servers root folder. The default AP Image is located at C:/Program Files/ORiNOCO/AP/. File Type: Select the proper file type. Choices include: Config for configuration information, such as System Name, Contact Name, and so on. Image for the AP Image (executable program). UpgradeBspBl for the Bootloader software. SSL Certificate: the digital certificate for authentication in SSL communications. SSL Private Key: the private key for encryption in SSL communications. SSH Public Key: the public key in SSH communications. Refer to Secure Shell (SSH) for more information. SSH Private Key: the private key in SSH communications. Refer to Secure Shell (SSH) for more information. CLI Batch File: a CLI Batch file that contains CLI commands to configure the AP. This file will be executed by the AP immediately after being uploaded. Refer to CLI Batch File for more information. File Operation: Select either Update AP or Update AP & Reboot. You should reboot the AP after downloading files.
112
Performing Commands
Figure 6-4
The Update AP via HTTP tab shows version information and allows you to enter HTTP information as described below. Select the File Type that needs to be updated from the drop-down box. Choices include: Config for configuration information, such as System Name, Contact Name, and so on. Image for the AP Image (executable program). Upgrade BSPBL: for the Bootloader software. SSL Certificate: the digital certificate for authentication in SSL communications. SSL Private Key: the private key for encryption in SSL communications. SSH Public Key: the public key in SSH communications. Refer to Secure Shell (SSH) for more information. SSH Private Key: the private key in SSH communications. Refer to Secure Shell (SSH) for more information. CLI Batch File: a CLI Batch file that contains CLI commands to configure the AP. This file will be executed by the AP immediately after being uploaded. Refer to CLI Batch File for more information.
Use the Browse button or manually type in the name of the file to be downloaded (including the file extension) in the File Name field. If typing the file name, you must include the full path and the file extension in the file name text box. To initiate the HTTP Update operation, click the Update AP button. A warning message gets displayed that advises the user that a reboot of the device will be required for changes to take effect.
113
Performing Commands
Figure 6-5 Warning Message
NOTE
An HTTP file transfer using SSL may take extra time. If the operation completes successfully the following screen appears.
Figure 6-6
Update AP Successful
If the operation did not complete successfully the following screen appears, and the reason for the failure is displayed.
Figure 6-7
Update AP Unsuccessful
114
Performing Commands
NOTE
Use the following procedure to retrieve a file from an AP to a TFTP server: 1. If retrieving a Configuration file, configure all the required parameters in their respective tabs. Reboot the device. 2. Retrieve and store the file. Click the Retrieve File button to initiate the upload of the file from the AP to the TFTP server. 3. If you retrieved a Configuration file, update the file as necessary. 4. If you retrieved a CLI Batch File or CLI Batch Log, you can examine the file using a standard text editor. For more information on CLI Batch Files, refer to CLI Batch File.
Figure 6-8
115
Performing Commands
Figure 6-9
A confirmation message gets displayed that asks if the user wants to proceed with retrieving the file. Click OK to continue with the operation or Cancel to abort the operation.
Figure 6-10
116
Performing Commands
Figure 6-11
On clicking the Save button the following Save As window displays, where the user is prompted to choose the filename and location where the file is to be downloaded. Select an appropriate filename and location and click OK.
Figure 6-12
117
Performing Commands
Reboot
Use the Reboot tab to save configuration changes (if any) and reset the AP. Entering a value of 0 (zero) seconds causes an immediate reboot. Note that Reset, described below, does not save configuration changes.
CAUTION
Rebooting the AP will cause all users who are currently connected to lose their connection to the network until the AP has completed the restart process and resumed operation.
Figure 6-13
118
Performing Commands
Reset
Use the Reset tab to restore the AP to factory default conditions. The AP may also be reset from the RESET button located on the side of the unit. Since this will reset the Access Points current IP address, a new IP address must be assigned. Refer to Recovery Procedures for more information.
CAUTION
Resetting the AP to its factory default configuration will permanently overwrite all changes that have made to the unit. The AP will reboot automatically after this command has been issued.
Figure 6-14
119
Performing Commands
Help Link
To open Help, click the Help button on any display screen. During initialization, the AP on-line help files are downloaded to the default location: C:/Program Files/ORiNOCO/AP/HTML/index.htm.
NOTE
Use the forward slash character ("/") rather than the backslash character ("\") when configuring the Help Link location.
NOTE
Add the APs management IP address into the Internet Explorer list of Trusted Sites. The ORiNOCO AP Help information is available in English, French, German, Italian, Spanish, and Japanese. The Help files are copied to your computer in one language only. If you want to place these files on a shared drive, copy the Help Folder to the new location, and then specify the new path in the Help Link box.
Figure 6-15
120
NOTE
This section helps you locate problems related to the AP device setup. For details about RADIUS, TFTP, serial communication programs (such as HyperTerminal), Telnet applications, or web browsers, please refer to the documentation that came with the application for assistance.
Troubleshooting Concepts
The following list identifies important troubleshooting concepts and topics. The most common initialization and installation problems relate to IP addressing. For example, you must have valid IP addresses for both the AP and the management computer to access the units HTTP interface. IP Address management is fundamental. Factory default units are set for Dynamic (DHCP) IP Address assignment. The default IP address for the AP is 10.0.0.1 if your network does not have a DHCP server. If you connect the AP to a network with an active DHCP server, then use ScanTool to locate the IP address of your unit. If a DHCP server is not active on your subnet, then use ScanTool to assign a static IP address to the unit. The Trivial File Transfer Protocol (TFTP) provides a means to download and upload files. These files include the AP Image (executable program) and configuration files. If the AP password is lost or forgotten, you will need to reset to default values. The Reset to Factory Default Procedure resets configuration, but does not change the current AP Image. If all else fails Use the Forced Reload Procedure to erase the current AP Image and then download a new image. Once the new image is loaded, use the Reset to Factory Default Procedure to set the unit to factory default values and reconfigure the unit. The AP Supports a Command Line Interface (CLI). If you are having trouble locating your AP on the network, connect to the unit directly using the serial interface and refer to Using the Command Line Interface (CLI) for CLI command syntax and parameter names.
121
122
123
NOTE
16 VLAN/SSID pairs are available for 802.11b/g APs and APs with an 11a Upgrade Kit. 802.11b APs and APs with a 5 GHz Upgrade Kit only support one VLAN/SSID pair.
VLAN Workgroups
The correct VLAN assignment can be verified by pinging the AP to ensure connectivity, by pinging the switch to ensure VLAN properties, and by pinging hosts past the switch to confirm the switch is functional. Ultimately, traffic can be sniffed on the Ethernet or WDS interfaces (if configured) using third-party packages. Most problems can be avoided by ensuring that 802.1Q compliant VLAN tags containing the proper VLAN ID have been inserted in the bridged frames. The VLAN ID in the header should correspond to the users assigned network name.
124
CAUTION
The manual override process disconnects all users and resets all values to factory defaults.
Overload Indications
1. Verify that you are not using a cross-over cable between the AE output port and the AP. 2. Verify that there is no short over any of the twisted pair cables. 3. Move the device into a different output port if it works, there is probably a faulty port or bad RJ-45 connection.
Recovery Procedures
The most common installation problems relate to IP addressing. For example, without the TFTP server IP Address, you will not be able to download a new AP Image to the AP. IP Address management is fundamental. We suggest you create a chart to document and validate the IP addresses for your system. If the password is lost or forgotten, you will need to reset the AP to default values. The Reset to Factory Default Procedure resets configuration settings, but does not change the current AP Image. If the AP has a corrupted software image, follow the Forced Reload Procedure to erase the current AP Image and download a new image.
125
NOTE
See RELOAD and RESET Buttons to identify the buttons. You need to use a pin or the end of a paperclip to press a button. Result: The AP reboots, and the factory default network values are restored. 2. If not using DHCP, use the ScanTool or CLI over a serial connection to set the IP address, subnet mask, and other IP parameters. See Using the Command Line Interface (CLI) for CLI information.
Figure 7-1
NOTE
This does not delete the APs configuration (in other words, the Forced Reload Procedure does not reset to device to factory defaults). If you need to force the AP to the factory default state after loading a new AP image, use the Reset to Factory Default Procedure above.
126
NOTE
See RELOAD and RESET Buttons to identify the buttons. You need to use a pin or the end of a paperclip to press a button. Result: The AP reboots and the indicators begin to flash.
CAUTION
By completing Step 2, the firmware in the AP will be erased. You will need an Ethernet connection, a TFTP server, and a serial cable (if using the Bootloader CLI) to reload firmware.
2. Press and hold the RELOAD button for about 20 seconds until the POWER LED turns amber. Result: The AP deletes the current AP Image. 3. Follow one of the procedures below to load a new AP Image to the Access Point: Download a New Image Using ScanTool Download a New Image Using the Bootloader CLI
Download Procedure
Follow these steps to use ScanTool to download a software image to an Access Point with a missing image: 1. 2. 3. 4. 5. Download the latest software from http://www.proxim.com. Copy the latest software updates to your TFTP server. Launch ScanTool. Highlight the entry for the AP you want to update and click Change. Set IP Address Type to Static.
NOTE
You need to assign static IP information temporarily to the Access Point since its DHCP client functionality is not available when no image is installed on the device. 6. Enter an unused IP address that is valid on your network in the IP Address field. You may need to contact your network administrator to get this address. 7. Enter the networks Subnet Mask in the field provided. 8. Enter the networks Gateway IP Address, if necessary. You may need to contact your network administrator to get this address. You should only need to enter the default gateway address if the Access Point and the TFTP server are separated by a router. 9. Enter the IP address of your TFTP server in the field provided. 10. Enter the Image File Name (including the file extension). Enter the full directory path and file name. If the file is located in the default TFTP directory, you need enter only the file name.
127
Download Procedure
1. Download the latest software from http://www.proxim.com. 2. Copy the latest software updates to your TFTP servers default directory. 3. Use a straight-through serial cable to connect the Access Points serial port to your computers serial port.
NOTE
You must remove the Access Points cable cover and front cover to access the serial port. 4. Open your terminal emulation program (like HyperTerminal) and set the following connection properties: Com Port: <COM1, COM2, etc., depending on your computer> Baud rate: 9600 Data Bits: 8 Stop bits: 1 Flow Control: None Parity: None 5. Under File -> Properties -> Settings -> ASCII Setup, enable the Send line ends with line feeds option. Result: HyperTerminal sends a line return at the end of each line of code. 6. Press the RESET button on the AP. Result: The terminal display shows Power On Self Tests (POST) activity. After approximately 30 seconds, a message indicates: Sending Traps to SNMP manager periodically. After this message appears, press the ENTER key repeatedly until the following prompt appears: [Device name]>
128
129
Figure 7-2
6. Change the IP address and other network values using set and reboot CLI commands, similar to the example below (use your own IP address and subnet mask). Note that IP Address Type is set to Dynamic by default. If you have a DHCP server on your network, you should not need to manually configure the Access Points IP address; the Access Point will obtain an IP address from the networks DHCP server during boot-up. Result: After each entry the CLI reminds you to reboot; however wait to reboot until all commands have been entered. [Device name]> set ipaddrtype static [Device name]> set ipaddr <IP Address> [Device name]> set ipsubmask <IP Subnet Mask> [Device name]> set ipgw <Default Gateway IP Address> [Device name]> show ip (to confirm your new settings) [Device name]> reboot 0 7. After the AP reboots, verify the new IP address by reconnecting to the CLI and enter a show ip command. Alternatively, you can ping the AP from a network computer to confirm that the new IP address has taken effect. 8. When the proper IP address is set, use the HTTP interface or CLI over Telnet to configure the rest of the units operating parameters.
130
Related Applications
RADIUS Authentication Server
If you enabled RADIUS Authentication on the AP, make sure that your networks RADIUS servers are operational. Otherwise, clients will not be able to log in. There are several reasons the authentication server services might be unavailable, here are two typical things to check: Make sure you have the proper RADIUS authentication server information setup configured in the AP. Check the RADIUS Authentication Servers Shared Secret and Destination Port number (default is 1812; for RADIUS Accounting, the default is 1813). Make sure the RADIUS authentication server RAS setup matches the AP.
TFTP Server
The Trivial File Transfer Protocol (TFTP) server allows you to transfer files across a network. You can upload configuration files from the AP for backup or copying, and you can download configuration files or new software images. The TFTP software is located on the ORiNOCO AP Installation CD-ROM. If a TFTP server is not configured and running, you will not be able to download and upload images and configuration files to/from the AP. Remember that the TFTP server does not have to be local, so long as you have a valid TFTP IP address. Note that you do not need a TFTP server running unless you want to transfer files to or from the AP. After the TFTP server is installed: Check to see that TFTP is configured to point to the directory containing the AP Image. Make sure you have the proper TFTP server IP Address, the proper AP Image file name, and that the TFTP server is connected. Make sure the TFTP server is configured to both send and receive, with no time-out.
131
This section describes the APs Command Line (CLI) Interface. CLI commands can be used to initialize, configure, and manage the Access Point. CLI commands may be entered in real time through a keyboard or submitted with CLI scripts. A CLI Batch file is a user-editable configuration file that provides a user-friendly way to change the AP configuration through a file upload. The CLI Batch file is an ASCII file that facilitates Auto Configuration because it does not require the user to access one of the APs management interfaces to make configuration changes as is required with the proprietary TLV format configuration file. The CLI is available through both the Serial Port interface and over the Ethernet interface using Telnet.
NOTE
All CLI commands and parameters are case-sensitive. General Notes Command Line Interface (CLI) Variations CLI Command Types Using Tables & User Strings Configuring the AP using CLI commands Set Basic Configuration Parameters using CLI Commands Other Network Settings CLI Monitoring Parameters Parameter Tables CLI Batch File
General Notes
Prerequisite Skills and Knowledge
To use this document effectively, you should have a working knowledge of Local Area Networking (LAN) concepts, network access infrastructures, and client-server relationships. In addition, you should be familiar with software setup procedures for typical network operating systems and servers.
Notation Conventions
Computer prompts are shown as constant width type. For example: [Device-Name]> Information that you input as shown is displayed in bold constant width type. For example: [Device name]> set ipaddr 10.0.0.12 The names of keyboard keys, software buttons, and field names are displayed in bold type. For example: Click the Configure button. Screen names are displayed in bold italics. For example, the System Status screen.
Important Terminology
Configuration Files - Database files containing the current Access Point configuration. Configuration items include the IP Address and other network-specific values. Config files may be downloaded to the Access Point or uploaded for backup or troubleshooting.
132
133
The parameters supported by the Bootloader CLI (for viewing and modifying) are:
The following lists display the results of using the help command in the Bootloader CLI:
Figure A-1
The following lists display the results of using the show command in the Bootloader CLI:
Figure A-2
134
? (List Commands)
This command can be used in a number of ways to display available commands and parameters. The following table lists each operation and provides a basic example. Following the table are detailed examples and display results for each operation.
Operation Display the Command List (Example 1) Display commands that start with specified letters (Example 2) Display parameters for set and show Commands (Examples 3a and 3b) Prompt to enter successive parameters for Commands (Example 4) Basic Example
Figure A-3
135
Figure A-4
. . . .
Figure A-5
Figure A-6
Figure A-7
136
download
Downloads the specified file from a TFTP server to the Access Point. Executing download in combination with the asterisks character (*) will make use of the previously set TFTP parameters. Executing download without parameters will display command help and usage information. 1. Syntax to download a file: Device-Name]>download <tftp server address> <path and filename> <file type> Example: [Device-Name]>download 192.168.1.100 APImage2 img 2. Syntax to display help and usage information: [Device-Name]>download 3. Syntax to execute the download Command using previously set (stored) TFTP Parameters: [Device-Name]>download *
help
Displays instructions on using control-key sequences for navigating a Command Line and displays command information and examples. 1. Using help as the only argument: [Device-Name]>help
137
Figure A-8
2. Complete command description and command usage can be provided by: [Device-Name]>help <command name> [Device-Name]><command name> help
history
Shows content of Command History Buffer. The Command History Buffer stores command statements entered in the current session. To avoid re-entering long command statements, use the keyboard up arrow (Ctrl-P) and down arrow (Ctrl-N) keys to recall previous statements from the Command History Buffer. When the desired statement reappears, press the Enter key to execute, or you may edit the statement before executing it. [Device-Name]> history
passwd
Changes the CLI Password. [Device-Name]> passwd oldpassword newpassword newpassword
reboot
Reboots Access Point after specified number of seconds. Specify a value of 0 (zero) for immediate reboot. [Device-Name]> reboot 0 [Device-Name]> reboot 30
search
Lists the parameters supported by the specified table. This list corresponds to the table information displayed in the HTTP interface. In this example, the CLI returns the list of parameters that make up an entry in the IP Access Table. [Device-Name]> search mgmtipaccesstbl
Figure A-9
138
139
Example 2: Executing the exit, quit, or done commands when an object that requires reboot has been configured
In addition to the above informational message, the CLI also provides a message as a result of the exit, quit, or done command if changes have been made to objects that require reboot. If you make changes to objects that require reboot and execute the exit command the following message is displayed: [Device-Name]>exit<CR> OR quit<CR> OR done<CR>
Modifications have been made to parameters that require the device to be rebooted. These changes will only take effect after the next reboot.
140
2 2 2 2
NOTE
You may need to enable a disabled table entry before you can change the entrys elements.
141
Figure A-11 Result of show ipaddr CLI Command 2. View all parameters in a table. Syntax: [Device-Name]> show <table name> Example:[Device-Name]> show mgmtipaccesstbl Result: Displays the IP Access Table and its entries.
142
The string delimiter does not have to be used for every string object. The single quote or double quote only has to be used for string objects that contain blank space characters. If the string object being used does not contain blank spaces, then the string delimiters, single or double quotes, mentioned in this section are not required.
2. 3.
NOTE
Proxim recommends changing your default passwords immediately. To perform this operation using CLI commands, refer to Change Passwords.
NOTE
If you have not previously configured the Access Points IP address and do not have a DHCP server on the network, the Access Point will default to an IP address of 10.0.0.1. 2. 3. 4. Go to the DOS command prompt on your computer. Type telnet <IP Address of the unit>. Enter the CLI password (default is public).
143
Change Passwords
[Device-Name]>passwd <Old Password> <New Password> <Confirm Password> (CLI password) [Device-Name]>set httppasswd <New Password> (HTTP interface password) [Device-Name]>set snmprpasswd <New Password> (SNMP read password) [Device-Name]>set snmprwpasswd <New Password> (SNMP read/write) [Device-Name]>set snmpv3authpasswd <New Password> (SNMPv3 authentication password)
144
CAUTION
Proxim strongly urges you to change the default passwords to restrict access to your network devices to authorized personnel. If you lose or forget your password settings, you can always perform the Reset to Factory Default Procedure.
Perform the following commands to enable TX Power Control and set the transmit power level: [Device-Name]>set txpowercontrol enable [Device-Name]>set wif <interface number> currenttxpowerlevel <value> Allowed values are: 1 (100%), 2 (50%), 3 (25%), 4 (12.5%)
145
Examples: [Device-Name]>set wifssidtbl 3.1 ssid accesspt1 vlanid 22 ssidauth enable acctstatus enable secprofile 1 radmacprofile "MAC Authentication" radeapprofile "EAP Authentication" radacctprofile "Accounting" radmacauthstatus enable aclstatus enable set wifssidtbl 4.1 ssid accesspt1 vlanid 22 ssidauth enable acctstatus enable secprofile 1 radmacprofile "MAC Authentication" radeapprofile "EAP Authentication" radacctprofile "Accounting" radmacauthstatus enable aclstatus enable
146
NOTE
The configuration filename and TFTP server IP address are configured only when the AP is configured for Static IP. If the AP is configured for Dynamic IP these parameters are not used and obtained from DHCP. The default filename is config. The default TFTP IP address is 10.0.0.2 for AP-2000. [Device-Name]>set autoconfigstatus <enable/disable> [Device-Name]>set autoconfigfilename <filename> Enter the filename of the configuration file that is used if the AP is configured for Static IP. [Device-Name]>set autoconfigTFTPaddr <IP address> Enter the TFTP server address that is used if the AP is configured for Static IP.
147
CAUTION
Before enabling this feature, confirm that the IP address pools you have configured are valid addresses on the network and do not overlap the addresses assigned by any other DHCP server on the network. Enabling this feature with incorrect address pools will cause problems on your network.
148
NOTE
The distance between APs should not be approximated. It is calculated by means of a manual Site Survey, in which an AP is set up and clients are tested throughout the area to determine signal strength and coverage, and local limits such as physical interference are investigated. From these measurements the appropriate cell size and density is determined, and the optimum distance between APs is calculated to suit your particular business requirements.
149
NOTE
The Distance Between APs must be set before the Multicast Rate.
NOTE
Super mode must be enabled on the interface before Turbo mode can be enabled.
150
Configure Syslog
[Device-Name]>set [Device-Name]>set [Device-Name]>set [Device-Name]>set [Device-Name]>set <enable/disable> syslogpriority <1-7 (default is 6)> syslogstatus <enable/disable> sysloghbstatus <enable/disable> (default is disable) sysloghbinterval <1 - 604800> (default is 900 seconds) sysloghosttbl <index> ipaddr <ipaddress> cmt <comment> status
151
NOTE
For larger networks that include multiple Access Points, you may prefer to maintain this list on a centralized location using the RADIUS parameters (see Set RADIUS Parameters).
152
Examples of Configuring Primary and Secondary RADIUS Servers and Displaying the RADIUS Configuration
Primary server configuration: set radiustbl 1.1 profname "MAC Authentication" seraddrfmt 1 sernameorip 20.0.0.20 port 1812 ssecret public responsetm 3 maxretx 3 acctupdtintrvl 0 macaddrfmt 1 authlifetm 900 radaccinactivetmr 5 vlanid 22 status enable Secondary server configuration: set radiustbl 1.2 profname "MAC Authentication" seraddrfmt 1 sernameorip 20.0.0.30 port 1812 ssecret public responsetm 3 maxretx 3 acctupdtintrvl 0 macaddrfmt 1 authlifetm 900 radaccinactivetmr 5 vlanid 33 status enable [Device-Name]>show radiustbl Index Primary/Backup Profile Name Server Status Server Addressing Format IP Address/Host Name Destination Port VLAN Identifier MAC Address Format Response Time Maximum Retransmission Authorization Lifetime Accounting Update Interval Accounting Inactivity Timer Index Primary/Backup Profile Name Server Status Server Addressing Format IP Address/Host Name Destination Port VLAN Identifier MAC Address Format Response Time Maximum Retransmission Authorization Lifetime Accounting Update Interval Accounting Inactivity Timer : : : : : : : : : : : : : : : : : : : : : : : : : : : : 1 Primary MAC Authentication notReady ipaddr 0.0.0.0 1812 -1 dashdelimited 3 3 0 0 5 1 Backup MAC Authentication notReady ipaddr 0.0.0.0 1812 -1 dashdelimited 3 3 0 0 5
153
154
155
Parameter Tables
Objects contain groups that contain both parameters and parameter tables. Use the following Tables to configure the Access Point. Columns used on the tables include: Name - Parameter, Group, or Table Name Type - Data type Values - Value range, and default value, if any Access = access type, R = Read Only (show), RW = Read-Write (can be set), W = Write Only CLI Parameter - Parameter name as used in the Access Point
156
157
System Parameters
Name System Name Location Contact Name Contact E-mail Contact Phone FLASH Backup Interval Flash Update System OID Descriptor DisplayString DisplayString Type Group DisplayString DisplayString DisplayString DisplayString DisplayString Integer Values N/A User Defined User Defined User Defined User Defined User Defined max 254 characters 0 - 65535 seconds 0 1 N/A System Name, flash version, S/N, bootloader version dd:hh:mm:ss dd days hh hours mm minutes ss seconds Resets all parameters to default factory values Access R RW RW RW RW RW RW RW R R CLI Parameter system sysname sysloc sysctname sysctemail sysctphone sysflashbckint sysflashupdate sysoid sysdescr
Up Time
Integer
sysuptime
RW
sysresettodefaults Note: You must enter the following command twice to reset to defaults: set sysresettodefaults 1
158
NOTE
The inventory management commands display advanced information about the APs installed components. You may be asked to report this information to a representative if you contact customer support.
Network Parameters
IP Configuration Parameters
Name Network IP Configuration Type Group Group Values N/A N/A Access R R CLI Parameter network ip (Note: The network and ip parameters display the same information) ipaddr ipmask ipgw ipttl ipaddrtype
User Defined User Defined User Defined User Defined (seconds) 64 (default) static dynamic (default)
RW RW RW RW RW
NOTE
The IP Address Assignment Type (ipaddrtype) must be set to static before the IP Address (ipaddr), IP Mask (ipmask) or Default Gateway IP Address (ipgw) values can be entered.
159
IpAddress IpAddress
RW RW RW R
NOTE
The DHCP Server (dhcpstatus) can only be enabled after a DHCP IP Pool table entry has been created.
NOTE
Set either End IP Address or Width (but not both) when creating an IP address pool.
160
Integer
RW
linkintpollretx
161
Auto Channel Select (ACS)1 DTIM Period RTS/CTS Medium Reservation MAC Address Closed System Wireless Service Status Supported Frequency Channels Load Balancing
RW RW RW R RW RW R RW
Note 1: For 802.11a APs in Europe, Auto Channel Select is a read-only parameter; it is always enabled.
R RW
suppdatarates txrate
Integer
phytype
SuperMode TurboMode
Integer Integer
RW RW
supermode turbomode
Note 1: Super Mode must be enabled first on the wireless interface before Turbo Mode can be enabled.
162
Integer Integer
RW RW
interrobust channel
Multicast Rate
Integer
RW
multrate
Closed Wireless System Medium Distribution MAC Address Supported Data Rates
RW RW R R
Transmit Rate
Integer32
RW
txrate
R R
suppchannels phytype
DisplayString
regdomain
NOTE
There is an inter-dependent relationship between the Distance between APs and the Multicast Rate. In general, larger systems operate a lower average transmit rates.
Distance between APs Large Medium Small Minicell Microcell Multicast Rate 1 and 2 Mbits/sec 1, 2, and 5.5 Mbits/sec 1, 2, 5.5 and 11 Mbits/sec 1, 2, 5.5 and 11 Mbits/sec 1, 2, 5.5 and 11 Mbits/sec
163
Integer
RW
channel
R RW
suppdatarates txrate
R RW RW
Note 1: Super Mode must be enabled first on the wireless interface before Turbo Mode can be enabled.
164
NOTE
The ability to configure up to 16 VLAN/SSID pairs and to configure security and RADIUS profiles per SSID is available only for 802.11b/g APs and 802.11a Upgrade Kit APs. 802.11b APs do not support multiple VLAN/SSID pairs. APs with the 802.11a card support multiple VLAN/SSID pairs, but do not support the security profile per SSID capability.
Name Type Values N/A Primary Wireless Interface = 3 Secondary Wireless Interface = 4 1 - 16 (SSID index) 0 - 32 characters -1 - 4094 Enable Disable Enable Disable Enable Disable Enable Disable 1-32 Access R R CLI Parameter wifssidtbl index Wireless Interface SSID Table Table Table Index Integer
Table Index SSID VLAN ID Table Row Status SSID Authorization Status per VLAN RADIUS Accounting Status per VLAN MAC ACL Status per VLAN Security Profile RADIUS MAC Profile RADIUS EAP Profile RADIUS Accounting Profile Deny Non Encrypted Data
Integer DisplayString VlanId RowStatus Integer Integer Integer Integer Integer Integer Integer Integer
R RW RW RW RW RW RW RW RW RW RW
ssidindex ssid vlanid status ssidauth acctstatus macaclstatus secprofile radmacprofile radeapprofile radacctprofile denynonencrypted
Enable Disable
R/W
Integer WEPKeyType
RW WO
secmode encryptkey0
165
MAC Address
PhyAddress
ethermacaddr
Management Parameters
Secure Management Parameters
Name Secure Management Type Integer Values Enable/Disable Access RW CLI Parameter securemgmtstatus
SNMP Parameters
Name SNMP SNMP Management Interface Bitmask Type Group Interface Bitmask Values N/A 0 or 2 - no interfaces (disable) 1 or 3 - Ethernet 4 or 6 - Wireless A 8 or 10 - Wireless B 12 = Wireless A & B 13 or 15 - all interfaces (default is 15) User Defined public (default) max 63 characters User Defined public (default) max 63 characters User Defined public (default) max 63 characters User Defined public (default) max 63 characters Access R RW CLI Parameter snmp snmpifbitmask
Read Password
DisplayString
snmprpasswd
Read/Write Password
DisplayString
snmprwpasswd
snmpv3authpasswd
snmpv3privpasswd
166
Write-only sslpassphrase
NOTE
The default path for the Help files is C:/Program Files/ORiNOCO/AP/HTML/index.htm. (Use the forward slash character ("/") rather than the backslash character ("\") when configuring the Help Link location.) The AP Help information is available in English, French, German, Italian, Spanish, and Japanese.
Telnet Parameters
Name Telnet Telnet Management Interface Bitmask Type Group Interface Bitmask Values N/A 0 or 2 - no interfaces (disable) 1 or 3 - Ethernet 4 or 6 - Wireless A 8 or 10 - Wireless B 12 = Wireless A & B 13 or 15 - all interfaces (default is 15) User Defined 23 (default) 1 300 seconds 30 sec (default) 1 - 900 seconds 900 sec (default) Access R RW CLI Parameter telnet telifbitmask
Telnet Port Telnet Login Inactivity Time-out Telnet Session Idle Time-out
RW RW RW
R R R RW
167
SSH Parameters
The following commands enable or disable SSH and set the SSH host key.
Name SSH Status SSH Public Host Key Fingerprint SSH Host Key Status Type Integer DisplayString Integer Values Enable Disable User Defined Create Delete Access RW RW RW CLI Parameter sshstatus sshkeyfprint sshkeystatus
The AP SSH feature, open-SSH, confirms to the SSH protocol, and supports SSH version 2. The following SSH clients have been verified to interoperate with the APs server. The following table lists the clients, version number, and the website of the client.
Clients OpenSSH Putty Zoc Axessh Version V3.4-2 Rel 0.53b 5.00 V2.5 Website http://www.openssh.com http://www.chiark.greenend.org.uk http://www.emtec.com http://www.labf.com
For key generation, only the OpenSSH client has been verified.
168
169
Operation Type
RW
etherfltoptype
NOTE
The filter Operation Type (passthru or block) applies only to the protocol filters that are enabled in this table.
NOTE
The AP requires a reboot for changes to the Ethernet Protocol Filtering Table to take effect.
DisplayString Integer
RW RW
cmt status
170
Status
Integer
RW
status
Port Type
Octet String
RW
porttype
171
Protocol Name
DisplayString
RW
protoname
Interface Bitmask
Integer32
RW
ifbitmask
Status (optional)
Integer
RW
status
Alarms Parameters
SNMP Table Host Table Parameters
When creating table entries, you may either specifying the argument name followed by argument value. CLI applies default values to the omitted arguments. Due to the nature of the information, the only argument that can be omitted is the comment argument.
NOTE
Up to 10 entries can be added to the SNMP Trap Host Table.
Name SNMP Trap Host Table Table Index IP Address Password Comment (optional) Status (optional) Type Table Integer IpAddress DisplayString DisplayString Integer Values N/A User Defined User Defined User Defined (up to 64 characters) User Defined (up to 254 characters) enable (default) disable delete Access CLI Parameter R N/A RW W RW RW snmptraphosttbl index ipaddr passwd cmt status
Syslog Parameters
The following parameters configure the Syslog settings.
Name Syslog Syslog Status Syslog Port Type Group Integer Octet String Values N/A enable disable (default) 514 Access R RW R CLI syslog syslogstatus syslogport
172
Heartbeat Status
Integer
RW RW
sysloghbstatus sysloghbinterval
NOTE
The Heartbeat parameters are advanced settings not available via the HTTP interface. When Heartbeat is enabled, the AP periodically sends a message to the Syslog server to indicate that it is active. The frequency with which the heartbeat message is sent depends upon the setting of the Heartbeat Interval.
Bridge Parameters
Spanning Tree Parameters
Name Spanning Tree Spanning Tree Status Bridge Priority Maximum Age Type Group Integer Integer Integer Values N/A enable (default) disable 0 65535 32768 (default) 600 4000 (in 0.01 sec intervals; i.e., 6 to 40 seconds) 2000 (default) 100 1000 (in 0.01 sec intervals; i.e., 1 to 10 seconds) 200 (default) 400 3000 (in 0.01 sec intervals; i.e., 4 to 30 seconds) 1500 (default) Access R RW RW RW CLI Parameter stp stpstatus stppriority stpmaxage
Hello Time
Integer
RW
stphellotime
Forward Delay
Integer
RW
stpfwddelay
173
Status
Integer
RW
status
Packet Forwarding MAC Group Address Packet Forwarding MAC MacAddress Address Packet Forwarding Status Packet Forwarding Interface Port Integer Integer
174
Security Parameters
MAC Access Control Parameter
Name MAC Address Control Status Operation Type Type Group Integer Integer Values N/A enable disable (default) passthru (default) block Access R RW RW CLI Parameter macacl macaclstatus macacloptype
RADIUS Parameters
General RADIUS Parameters
Name RADIUS Client Invalid Server Address Type Group Counter32 Values N/A N/A Access R R CLI Parameter radius radcliinvsvradd
175
Port (optional) Shared Secret Response Time (optional) Maximum Retransmissions (optional) RADIUS MAC Address Format
RW W RW RW
Integer
RW
radmacaddrformat
RADIUS Accounting Inactivity Timer Authorization Lifetime RADIUS Accounting Update Interval VLAN ID
RW W RW RW
VLAN/SSID Parameters
Name VLAN Status Management ID Type Group Integer VlanId N/A enable disable (default) -1 (untagged) or 1-4094 Values R RW RW Access vlan vlanstatus vlanmgmtid CLI Parameter
176
Authentication Mode
Integer
RW
authmode
Cipher
Integer
ciphersuite
Encryption Key 1 Encryption Key 2 Encryption Key 3 Encryption Key 4 Encryption Transmit Key Encryption Key Length Rekey Interval WPA PSK Value WPA PSK Pass Phrase RADIUS EAP Profile
Integer Integer Integer Integer Integer Integer Integer Integer Integer Integer
RW RW RW RW RW RW RW RW RW RW
secprofileencryptkey1 secprofileencryptkey2 secprofileencryptkey3 secprofileencryptkey4 encryptkeytx encryptkeylength rekeyint pskkey passphrase radeapprofile
177
Other Parameters
IAPP Parameters
Name IAPP IAPP Status Periodic Announce Interval (seconds) Type Group Integer Integer Values N/A enable (default) disable 80 120 (default) 160 200 2 seconds 410 ms 512 ms (default) 614 ms 717 ms 819 ms 1 - 4 (default 4) enable (default) disable Access R RW RW CLI Parameter iapp iappstatus iappannint
Integer Integer
R RW
iappannresp iapphandtout
Integer Integer
RW RW
iapphandretx iappannreqstart
NOTE
These parameters configure the Inter Access Point Protocol (IAPP) for roaming. Leave these settings at their default value unless a technical representative asks you to change them.
178
Each command must be separated by a new line. Refer to Appendix A, CLI Command Reference for detailed command syntax.
NOTE
The following commands are not supported: Show command, Debug command, Undebug command, Upload command, Download command, Kill command, and the Exit, Quit, and Done commands.
179
The AP logs all the errors during execution and stores them in the Flash memory in a CLI Batch File Error Log named CBFERR.LOG. The CLI Batch File Error Log can be downloaded though TFTP, HTTP, or CLI file transfer to a specified host.
180
B
ASCII Character Q R S T U V W X Y Z [ \ ] ^ _ ` a b c d e f g h Hex Equivalent 51 52 53 54 55 56 57 58 59 5A 5B 5C 5D 5E 5F 60 61 62 63 64 65 66 67 68 ASCII Character i j k l m n o p q r s t u v w x y z { | } ~ Hex Equivalent 69 6A 6B 6C 6D 6E 6F 70 71 72 73 74 75 76 77 78 79 7A 7B 7C 7D 7E
You can configure WEP Encryption Keys in either Hexadecimal or ASCII format. Hexadecimal digits are 0-9 and A-F (not case sensitive). ASCII characters are 0-9, A-F, a-f (case sensitive), and punctuation marks. Each ASCII character corresponds to two hexadecimal digits. The table below lists the ASCII characters that you can use to configure WEP Encryption Keys. It also lists the Hexadecimal equivalent for each ASCII character.
ASCII Character ! " # $ % & ' ( ) * + , . / 0 1 2 3 4 5 6 7 8 Hex Equivalent 21 22 23 24 25 26 27 28 29 2A 2B 2C 2D 2E 2F 30 31 32 33 34 35 36 37 38 ASCII Character 9 : ; < = > ? @ A B C D E F G H I J K L M N O P Hex Equivalent 39 3A 3B 3C 3D 3E 3F 40 41 42 43 44 45 46 47 48 49 4A 4B 4C 4D 4E 4F 50
181
Specifications
Software Features
The tables below compare the software features available depending on the card type in the Access Point: Number of Stations per BSS Management Functions Advanced Bridging Functions Medium Access Control (MAC) Functions Security Functions Network Functions Advanced Wireless Functions
Without encryption With WEP encryption With 802.1x Authentication With WPA
Management Functions
Feature Web User Interface Telnet / CLI SNMP Agent TFTP 802.11b yes yes yes yes 802.11a yes yes yes yes 802.11b/g yes yes yes yes
182
Note 1: A user cannot manually select a channel for products sold in Europe; these products require automatic channel selection using Dynamic Frequency Selection (DFS).
Security Functions
Feature Security Profiles per VLAN RADIUS Profiles per VLAN IEEE 802.11 WEP 1 MAC Access Control RADIUS Based Management Access Control RADIUS MAC-based Access Control IEEE 802.1x Authentication 2 Multiple Authentication Server Support per VLAN 4 Rogue Access Point Detection Per User Per Session (PUPS) Encryption 3 Wi-Fi Protected Access (WPA) 802.11b yes yes yes yes yes yes yes yes no N/A N/A 802.11a yes yes yes yes yes yes yes yes yes yes Available with 11a Upgrade KitNot available with 5 GHz Upgrade Kit 802.11b/g yes yes yes yes yes yes yes yes yes yes yes
Note 1: Key lengths supported by 802.11a: 64-bit, 128-bit, and 152-bit. Key lengths supported by 802.11b: 64-bit and 128-bit. Key lengths supported by 802.11b/g: 64-bit, 128-bit, and 152-bit. Note 2: EAP-MD5, EAP-TLS, EAP-TTLS, and PEAP client supplicant supported. Note 3: Use in conjunction with WPA or 802.1x Authentication. Note 4: Support is provided for a primary and backup RADIUS authentication server for both MAC-based authentication and 802.1x authentication.
183
11a Upgrade Kit: Up to 16 Up to 16 VLAN IDs per VLAN IDs per wireless wireless interface interface 5 GHz Upgrade Kit: One VLAN ID per wireless Interface
Note 1: Includes Fallback to Primary RADIUS Server, RADIUS Session Timeout, RADIUS Multiple MAC Address Formats, RADIUS DNS Host Name Support, RADIUS Start/Stop Accounting.
Note 1: Available only one way (AP to client) if using an ORiNOCO ComboCard or a non-ORiNOCO client. Note 2: No client support in 802.11a or 802.11b/g. Note 3: This feature is not available if you are using an ORiNOCO ComboCard or a non-ORiNOCO client with an 802.11b AP.
Hardware Specifications
Physical Specifications
AP-2000 Unit
Dimensions (H x W x L) = 6.5 x 18.5 x 26 cm (2.5 x 7.25 x 10.25 in.) Weight = 1.75 Kg (3.5 lb.)
184
Specifications
Electrical Specifications
Without Active Ethernet Module
Voltage = 100 to 240 VAC (50-60 Hz) Current = 0.2 amp Power Consumption = 20 Watts
Environmental Specifications
AP-2000 Unit
Operating = 0 to 40C (32 to 104 F) @ 20 to 90% relative humidity Transport = -40 to 60C (-40 to 140F) @ 15 to 95% relative humidity (no condensation allowed) Storage = -10 to 60C (14 to 140F) @ 10 to 90% relative humidity (no condensation allowed)
Ethernet Interface
10/100 Base-TX, RJ-45 female socket
HTTP Interface
Microsoft Internet Explorer 6 with Service Pack 1 or later Netscape 6.1 or later
Radio Specifications
802.11a Channel Frequencies 802.11b Channel Frequencies 802.11g Channel Frequencies Wireless Communication Range
NOTE
Refer to the Regulatory Flyer included with the AP for the latest regulatory information.
185
There are five sets of frequency bands that determine the available channels depending on the regulatory domain. Some countries restrict 802.11a operation to specific frequency bands. The Web interface and CLI display the available channels for a radio's particular regulatory domain. In the CLI, any channels that are not available are labeled "Not Supported".
NOTE
The original 5 GHz Upgrade Kit only supports the Lower and Middle U-NII bands. The 11a Upgrade Kit supports all of the frequency bands described below.
Frequency Band Lower Band (36 = default) Channel ID 34 36 38 40 42 44 46 48 Middle Band (52 = default) 52 56 58 60 H Band 100 104 108 112 116 120 124 128 132 136 140 Upper Band (149 = default) 149 153 157 161 ISM Band 165 FCC (GHz) 5.180 5.200 5.220 5.240 5.260 5.280 5.300 5.320 5.745 5.675 5.785 5.805 5.825 ETSI (GHz) 5.180 5.200 5.220 5.240 5.260 5.280 5.300 5.320 5.500 5.520 5.540 5.560 5.580 5.600 5.620 5.640 5.660 5.680 5.700 TELEC (GHz) 5.170 1 5.190 5.210 5.230 SG (GHz) 5.180 5.200 5.220 5.240 5.745 5.675 5.785 5.805 5.825 ASIA (GHz) 5.745 5.675 5.785 5.805 TW (GHz) 5.260 5.280 5.300 5.320 5.745 5.675 5.785 5.805 5.825
186
Some countries restrict 802.11b operation to specific frequency bands. The web interface will always display the available channels depending in the cards regulatory domain. In the CLI, any channels that are not available are labeled "Not Supported".
Channel ID 1 2 3 4 5 6 7 8 9 10 11 12 13 14 FCC (GHz) 2.412 2.417 2.422 2.427 2.432 2.437 2.442 2.447 2.452 2.457 2.462 ETSI (GHz) 2.412 2.417 2.422 2.427 2.432 2.437 2.442 2.447 2.452 2.4571 2.4621 2.4671 2.4721 TELEC (GHz) 2.412 2.417 2.422 2.427 2.432 2.437 2.442 2.447 2.452 2.457 2.462 2.467 2.472 2.484 IL (GHz) 2.427 2.432 2.437 2.442 2.447 -
Some countries restrict 802.11g operation to specific frequency bands. The web interface will always display the available channels depending in the cards regulatory domain. In the CLI, any channels that are not available are labeled "Not Supported".
Channel ID 1 2 3 4 5 6 7 8 9 10 11 FCC (GHz) 2.412 2.417 2.422 2.427 2.432 2.437 2.442 2.447 2.452 2.457 2.462 ETSI (GHz) 2.412 2.417 2.422 2.427 2.432 2.437 2.442 2.447 2.452 2.4571 2.4621 TELEC (GHz) 2.412 2.417 2.422 2.427 2.432 2.437 2.442 2.447 2.452 2.457 2.462 IL (GHz) 2.427 2.432 2.437 2.442 2.447 -
187
Specifications
Channel ID 12 13 14 FCC (GHz) ETSI (GHz) 2.4671 2.4721 TELEC (GHz) 2.467 2.472 2.4842 IL (GHz) -
Note 1: France is restricted to these channels. Note 2: Channel 14 is only available when using 802.11b only mode.
802.11b
Range Open Office Semi-Open Office Closed Office Tx Power (dBm) Receiver Sensitivity (dBm) Antenna Gain 11 Mbits/s 142 m (466 ft.) 98 m (322 ft.) 67 m (220 ft.) 15 -82 5.5 Mbits/s 177 m (581 ft.) 122 m (400 ft.) 84 m (276 ft.) 15 -85 2 Mbits/s 219 m (718 ft.) 151 m (495 ft.) 104 m (341 ft.) 15 -88 1 Mbits/s 272 m (892 ft.) 187 m (614 ft.) 129 m (423 ft.) 15 -91
Table C-1
188
Specifications
802.11a (5 GHz Upgrade Kit)
Range Open Office Semi-Open Office Closed Office Tx Power (dBm) Receiver Sensitivity (dBm) Antenna Gain 54 Mbits/ s 19 m (62 ft.) 13 m (43 ft.) 9m (30 ft.) 7 -65 48 Mbits/s 33 m (108 ft.) 23 m (75 ft.) 16 m (52 ft.) 11 -69 36 Mbits/s 55 m (180 ft.) 38 m (125 ft.) 26 m (85 ft.) 14 -73 24 Mbits/ s 74 m (243 ft.) 51 m (167 ft.) 35 m (115 ft.) 14 -77 18 Mbits/ s 92 m (302 ft.) 63 m (207 ft.) 43 m (141 ft.) 14 -80 12 Mbits/s 106 m (348 ft.) 73 m (239 ft.) 50 m (164 ft.) 14 -82 9 Mbits/ s 122 m (400 ft.) 84 m (276 ft.) 58 m (190 ft.) 14 -84 6 Mbits/ s 131 m (430 ft.) 90 m (295 ft.) 62 m (203 ft.) 14 -85
Table C-2
Table C-3
189
Specifications
802.11b/g
Range 54 Mbits/s 56 m (184 ft.) 38 m (125 ft.) 48 Mbits/s 69 m (226 ft.) 48 m (157 ft.) 36 Mbits/s 107 m (351 ft.) 73 m (239 ft.) 24 Mbits/s 164 m (538 ft.) 113 m (371 ft.) 18 Mbits/s 219 m (718 ft.) 151 m (495 ft.) 12 Mbits/s 272 m (892 ft.) 187 m (614 ft.) 9 Mbits/s 292 m (958 ft.) 201 m (659 ft.) 6 Mbits/s 314 m (1030 ft.) 216 m (709 ft.) 11 Mbits/s 204 m (669 ft.) 140 m (459 ft.) 5.5 Mbits/s 236 m (774 ft.) 162 m (531 ft.) 2 Mbits/s 253 m (830 ft.) 174 m (571 ft.) 1 Mbits/s 338 m (1109 ft.) 232 m (761 ft.)
Open Office SemiOpen Office Closed Office Tx Power (dBm) Receiver Sensitivity (dBm) Antenna Gain
26 m (85 ft.) 12
33 m (108 ft.) 13
51 m (167 ft.) 14
78 m (256 ft.) 15
97 m (318 ft.) 15
-68
-70
-75
-80
-84
-87
-88
-89
-83
-85
-86
-90
Table C-4
190
Technical Support
If you are having a problem using an AP and cannot resolve it with the information in Troubleshooting the AP-2000, gather the following information and contact ORiNOCO Technical Support: List of ORiNOCO products installed on your network; include the following: Product names and quantity Part numbers (P/N) Serial numbers (S/N) List of ORiNOCO software versions installed Check the HTTP interfaces Version screen Include the source of the software version (e.g., pre-loaded on unit, installed from CD, downloaded from Proxim Web site, etc.) Information about your network Network operating system (e.g., Microsoft Networking); include version information Protocols used by network (e.g., TCP/IP, NetBEUI, IPX/SPX, AppleTalk) Ethernet frame type (e.g., 802.3, Ethernet II), if known IP addressing scheme (include address range and whether static or DHCP) Network speed and duplex (10 or 100 Mbits/sec; full or half duplex) Type of Ethernet device that the Access Points are connected to (e.g., Active Ethernet power injector, hub, switch, etc.) Type of Security enabled on the wireless network (None, WEP Encryption, 802.1x, Mixed) A description of the problem you are experiencing What were you doing when the error occurred? What error message did you see? Can you reproduce the problem? For each ORiNOCO product, describe the behavior of the devices LEDs when the problem occurs
NOTE
Online support is available, and the latest software and documentation is available for download at http://support.proxim.com
191
Statement of Warranty
Warranty Coverage
Proxim Corporation warrants that its Products are manufactured solely from new parts, conform substantially to specifications, and will be free of defects in material and workmanship for a Warranty Period of 1 year from the date of purchase.
Repair or Replacement
In the event a Product fails to perform in accordance with its specification during the Warranty Period, Proxim offers return-to-factory repair or replacement, with a thirty (30) business-day turnaround from the date of receipt of the defective Product at a Proxim Corporation Repair Center. When Proxim has reasonably determined that a returned Product is defective and is still under Warranty, Proxim shall, at its option, either: (a) repair the defective Product; (b) replace the defective Product with a refurbished Product that is equivalent to the original; or (c) where repair or replacement cannot be accomplished, refund the price paid for the defective Product. The Warranty Period for repaired or replacement Products shall be ninety (90) days or the remainder of the original Warranty Period, whichever is longer. This constitutes Buyers sole and exclusive remedy and Proxims sole and exclusive liability under this Warranty.
Limitations of Warranty
The express warranties set forth in this Agreement will not apply to defects in a Product caused; (i) through no fault of Proxim during shipment to or from Buyer, (ii) by the use of software other than that provided with or installed in the Product, (iii) by the use or operation of the Product in an application or environment other than that intended or recommended by Proxim, (iv) by modifications, alterations, or repairs made to the Product by any party other than Proxim or Proxims authorized repair partners, (v) by the Product being subjected to unusual physical or electrical stress, or (vii) by failure of Buyer to comply with any of the return procedures specified in this Statement of Warranty.
Support Procedures
Buyer should return defective LAN Products1 within the first 30 days to the merchant from which the Products were purchased. Buyer can contact a Proxim Customer Service Center either by telephone or via web. Calls for support for Products that are near the end of their warranty period should be made not longer than seven (7) days after expiration of warranty. Repair of Products that are out of warranty will be subject to a repair fee. Contact information is shown below. Additional support information can be found at Proxims web site at http://support.proxim.com. LAN Products1: Domestic calls: 866-674-6626 (24 hours per day, 7 days per week) International calls: 408-542-5390 WAN Products2: Domestic calls: 800-674-6626 (8:00 A.M. 5:00 P.M, M-F Pacific Time) International calls: 408-542-5390
When contacting the Customer Service for support, Buyer should be prepared to provide the Product description and serial number and a description of the problem. The serial number should be on the product. In the event the Customer Service Center determines that the problem can be corrected with a software update, Buyer might be instructed to download the update from Proxims web site or, if thats not possible, the update will be sent to Buyer. In the event the Customer Service Center instructs Buyer to return the Product to Proxim for repair or replacement, the Customer Service Center will provide Buyer a Return Material Authorization (RMA) number and shipping instructions. Buyer must return the defective Product to Proxim, properly packaged to prevent damage, shipping prepaid, with the RMA number prominently displayed on the outside of the container.
1 LAN products include: ORiNOCO 2 WAN products include: Lynx, Tsunami, Tsunami MP, Tsunami Quickbridge
192
Statement of Warranty
Calls to the Customer Service Center for reasons other than Product failure will not be accepted unless Buyer has purchased a Proxim Service Contract or the call is made within the first thirty (30) days of the Products invoice date. Calls that are outside of the 30-day free support time will be charged a fee of $25.00 (US Dollars) per Support Call. If Proxim reasonably determines that a returned Product is not defective or is not covered by the terms of this Warranty, Buyer shall be charged a service charge and return shipping charges.
Other Information
Search Knowledgebase
Proxim stores all resolved problems in a solution database at the following URL: http://support.proxim.com.
193
Regulatory Information
This regulatory flyer contains the following sections: Information to the User Read this document prior to installation! User Documentation is provided on the CD-ROM. Informations pour lutilisateur Lisez ce document avant l'installation ! La documentation utilisateur est fournie sur le CD-ROM. Informazioni per lutente Legga questo documento prima dellinstallazione. La documentazione nella sua lingua contenuta nel CD-ROM. Informationen fr den Benutzer Bitte lesen Sie dieses Dokument vor der Installation sorgfltig durch! Die CD-ROM enthlt die erforderliche Benutzerdokumentation. Informacin para el usuario Lea este documento antes de realizar la instalacin! Encontrar la documentacin del usuario en su idioma en el CD-ROM.
194
Regulatory Information
Wireless Client and Base Station products are wireless network products based on IEEE 802.11 standards for wireless LANs as defined and approved by the Institute of Electrical and Electronics Engineers. Products designed according the IEEE 802.11a and IEEE 802.11g standards standard use Orthogonal Frequency Division Multiplexing (OFDM) radio technology. Products designed according the IEEE 802.11b standard use Direct Sequence Spread Spectrum (DSSS) radio technology. These products are designed to be interoperable with any other wireless product that complies with the corresponding standard. The Wireless Fidelity (Wi-Fi) certification is defined by the Wi-Fi Alliance.
195
Regulatory Information
This device must be installed and used in strict accordance with the manufacturer's instructions as described in the user documentation that comes with the product. For country-specific radio approvals or restrictions, please consult the section Radio Approvals of this flyer. In some situations or environments, the use of wireless devices may be restricted by the proprietor of the building or responsible representatives of the organization. These situations may for example include: Using the wireless equipment on board of airplanes, or In any other environment where the risk of interference to other devices or services is perceived or identified as harmful.
If you are uncertain of the policy that applies on the use of wireless equipment in a specific organization or environment (e.g. airports), you are encouraged to ask for authorization to use this device prior to turning on the equipment. The manufacturer is not responsible for any radio or television interference caused by unauthorized modification of the devices included with this kit, or the substitution or attachment of connecting cables and equipment other than specified by manufacturer. The correction of interference caused by such unauthorized modification, substitution or attachment will be the responsibility of the user. The manufacturer and its authorized resellers or distributors are not liable for any damage or violation of government regulations that may arise from failing to comply with these guidelines.
196
Regulatory Information
Les produits client et de la Base Station sont des produits pour rseaux sans fil conus selon les normes IEEE 802.11 dfinies et approuves par lInstitute of Electrical and Electronics Engineers (IEEE). Les produits conus selon les normes IEEE 802.11b qui utilisent la technologie radio Direct Sequence Spread Spectrum (DSSS), cest--dire spectre tendu squence directe. Les produits conus selon les normes IEEE 802.11a et IEEE 802.11g utilisent la technologie radio Orthogonal Frequency Division Multiplexing (OFDM), cest--dire division multiplex de frquence orthogonale. Ces produits sont conus pour roperer avec n'importe quel autre produit sans fil qui est conforme la norme correspondante. Certification Wireless Fidelity (Wi-Fi) dfinie par la Wi-Fi Alliance.
197
Si vous avez des doutes concernant lutilisation dquipements sans fil dans lenvironnement spcifique dune socit (par ex. les aroports), veuillez demander lautorisation dutiliser le dispositif avant de lallumer. Le fabricant nest pas responsable des interfrences radio ou tlvision causes par une modification non autorise du dispositif compris dans ce kit ou par le remplacement ou le branchement de cbles et quipements de connexion autres que ceux spcifis par le fabricant. La correction des interfrences causes par de telles modifications, substitutions ou branchements non autoriss incombera lutilisateur. Le fabricant et ses revendeurs ou distributeurs autoriss ne sont pas responsables des dgts ou violations des rglementations gouvernementales qui peuvent dcouler de la non-observation de ces directives.
198
Regulatory Information
I prodotti cliente e delle Base Station sono prodotti senza fili della rete basati su IEEE 802.11 standard come definiti ed approvati dall'Institute of Electrical and Electronics Engineers. I prodotti hanno progettato conciliare la tecnologia radiofonica Direct Sequence Spread Spectrum (DSSS) di uso standard dello IEEE 802.11b. I prodotti hanno progettato conciliare la tecnologia radiofonica Orthogonal Frequency Division Multiplexing (OFDM) (divisione multiplex di frequenza ortogonale) di uso standard dello IEEE 802.11a e IEEE 802.11g. Questi prodotti sono destinati per funzionare con qualunque altro prodotto senza fili che aderisce allo standard corrispondente. Certificazione Wireless Fidelity (Wi-Fi), definita dalla Wi-Fi Alliance.
199
Informazioni legali
Questo dispositivo deve essere installato e utilizzato nel pieno rispetto delle istruzioni fornite dal costruttore, riportate nella documentazione in dotazione al prodotto. Per quanto riguarda le omologazioni dei prodotti radio per ciascun singolo paese, consultare la sezione Omologazioni radio di questo documento. In alcune situazioni o in determinati ambienti, luso di dispositivi wireless potrebbe essere limitato dal proprietario delledificio o dai responsabili dellazienda. Queste situazioni possono ad esempio includere i casi seguenti: Uso dellapparecchiatura wireless a bordo di aerei, oppure In qualsiasi altro ambiente in cui il rischio di interferenza con altri dispositivi o servizi sia percepito o identificato come dannoso.
In caso di dubbi sulle norme relative alluso di dispositivi radio in un ambiente specifico (es. aeroporti), si consiglia di richiedere lautorizzazione alluso del dispositivo prima di accendere lapparecchiatura. Il produttore non potr essere ritenuto responsabile per interferenze radio o TV causate da modifiche non autorizzate apportate ai dispositivi inclusi in questo kit oppure dalla sostituzione o dal collegamento di cavi o dispositivi diversi da quelli prescritti dal produttore. Leliminazione delle interferenze causate da tali modifiche, sostituzioni o collegamenti non autorizzati sar di responsabilit dellutente. Il produttore e i suoi rivenditori o distributori non potranno essere ritenuti responsabili per danni o violazioni di norme di legge causati dalla mancata osservanza di queste linee guida.
200
Regulatory Information
Funk-Client- und Funk-Base Stations-Produkte sind die drahtlosen Netzprodukte, die auf IEEE 802.11 Standards basieren, wie definiert und durch das Institute of Electrical and Electronics Engineers genehmigt. Produkte konzipierten das bereinstimmen der Funktechnologie des IEEE 802.11b Standardgebrauch Direct Sequence Spread Spectrum (DSSS). Produkte konzipierten das bereinstimmen der Radiotechnologie des IEEE 802.11a und IEEE 802.11g Standardgebrauch Orthogonal Frequency Division Multiplexing (OFDM) (orthogonalen Frequenzvielfachs). Diese Produkte sind konzipiert, um mit jedem anderen drahtlosen Produkt zu funktionieren, das mit dem entsprechenden Standard bereinstimmt. WiFi-Zertifikat (Wireless Fidelity) der Wi-Fi Alliance.
WICHTIGE SICHERHEITSHINWEISE
Bei der Verwendung dieses Gerts sind die folgenden grundlegenden Sicherheitsvorkehrungen einzuhalten, um Gefahren wie Feuer, Stromschlge oder Personenschden zu vermeiden: a. Setzen Sie dieses Gert niemals in feuchten Umgebungen wie z. B. in der Nhe von Badewannen, Wasch- oder Splbecken, in feuchten Kellerrumen oder in der Nhe von Swimmingpools ein. b. Vermeiden Sie die Verwendung des Produkts bei Gewittern. Es besteht das wenn auch geringe Risiko von Stromschlgen durch Blitzeinschlag. c. Bei Lecks in Gasleitungen: Setzen Sie das Produkt niemals in der Nhe des Lecks ein.
201
Rechtliche Hinweise
Die Installation und der Gebrauch dieses Gerts mssen streng nach den Anweisungen des Herstellers erfolgen, die in der Benutzerdokumentation zu diesem Produkt zu finden sind. Die lnderspezifischen Funkzulassungen finden Sie im Abschnitt Funkgenehmigungen dieses Dokumentes. In bestimmten Situationen oder Umgebungen ist der Gebrauch von Funkgerten mglicherweise durch den Gebudeeigentmer oder verantwortliche Personen des Unternehmens untersagt. Nicht gestattet ist zum Beispiel: der Betrieb von Funkgerten an Bord eines Flugzeuges oder der Betrieb von Funkgerten in jeder anderen Umgebung, in der das Risiko, dass der Betrieb oder der Empfang anderer Gerte gestrt wird, besteht oder als mglich angesehen wird.
Falls Sie die Vorschriften fr die Verwendung von Funkgerten in einem bestimmten Unternehmen oder in einer bestimmten Umgebung (z. B. Flughfen) nicht genau kennen, bitten Sie um Erlaubnis, bevor Sie das Gert einschalten. Der Hersteller bernimmt keine Haftung fr Funk- oder Fernsehstrungen, die durch unzulssige nderungen an den in diesem Paket enthaltenen Gerten auftreten oder durch den Austausch und Anschluss von anderen als den vom Hersteller genannten Anschlusskabeln und Gerten verursacht werden. Die Verantwortung fr die Behebung der durch ein solches ndern, Austauschen oder Anschlieen hervorgerufenen Strungen trgt der Benutzer. Der Hersteller, seine autorisierten Hndler oder Vertriebspartner haften nicht fr Schden oder Verletzungen staatlicher Vorschriften, die sich aus der Nichteinhaltung dieser Richtlinien ergeben.
202
Regulatory Information
Los productos del cliente sin hilos y de la estacin baja son productos sin hilos de la red basados en IEEE 802.11 estndares para LANs sin hilos segn lo definidos y aprobados por el Institute of Electrical and Electronics Engineers. Los productos disearon acordar la tecnologa de radio espectro ensanchado en secuencia directa (DSSS) del uso estndar de IEEE 802.11b. Los productos disearon acordar la tecnologa de radio Orthogonal Frequency Division Multiplexing (OFDM) (multiplexacin de divisin de frecuencia orthogonale) del uso estndar de IEEE 802.11a y IEEE 802.11g. Estos productos se disean para funcionar con cualquier otro producto sin hilos que se conforme con el estndar correspondiente. La certificacin Wi-Fi (Wireless Fidelity Fidelidad inalmbrica) definida por la Wi-Fi Alliance.
203
Si no est seguro de la norma que rige el uso de dispositivos inalmbricos en una organizacin o en un entorno especfico, por ejemplo, en los aeropuertos, se recomienda que solicite autorizacin para utilizar el dispositivo antes de poner en marcha el equipo. El fabricante no es responsable de ninguna interferencia de radio o televisin causada por la modificacin no autorizada de los dispositivos incluidos en este kit, o la sustitucin o conexin de cables y equipo no especificada por el propio fabricante. El usuario ser responsable de corregir la interferencia causada por cualquier modificacin, sustitucin o conexin sin autorizacin. El fabricante y sus distribuidores o proveedores no son responsables de los daos o infracciones de las leyes gubernamentales que puedan producirse por el incumplimiento de estas directrices.
204
Regulatory Information
PC Card AP-200, AP-700, AP-1000, AP-4000, AP-4000 11a Upgrade Kit, AP-4000 11g Cardbus Kit, AP-2500, AP-4000, ORiNOCO AP-600, AP-600 11g Upgrade Kit, AP-600 11abg Upgrade Kit, Base Station . Base Station (IEEE) LAN IEEE 802.11 IEEE 802.11a/802.11g (OFDM) IEEE 802.11b (DSSS) Wi-Fi Alliance Wi-Fi (Wireless Fidelity)
a. b. c.
Base Station
a.100-240 V AC b.AC / c. d. e. f.Base Station (UTP) (STP) (STP)
205
Regulatory Information
LAN
LAN LAN LAN
206
Regulatory Information
Warnings
This equipment generates, uses, and can radiate radio frequency energy and, if not installed and used in accordance with the instructions, may cause harmful interference to radio communications. However, there is no guarantee that interference will not occur in a particular installation. If this equipment does cause harmful interference to radio or television reception, which can be determined by turning the equipment off and on, the user is encouraged to try and correct the interference by one or more of the following measures: Reorient or relocate the receiving antenna. Increase the distance between the equipment and the receiver. Connect the equipment to an outlet on a circuit different from that to which the receiver is connected. Consult the dealer or an experienced radio/TV technician for help.
In some situations or environments, the use of wireless devices may be restricted by the proprietor of the building or responsible representatives of the organization. These situations may for example include the use of wireless equipment on board of airplanes, or in any other environment where the risk of interference to other devices or services is perceived or identified as harmful. If you are uncertain of the policy that applies on the use of wireless equipment in a specific organization or environment (e.g. airports), you are encouraged to ask for authorization to use this device prior to turning on the equipment.
Modifications
The FCC requires the user to be notified that any changes or modifications to this device that are not expressly approved by the manufacturer may void the users authority to operate the equipment. The correction of interference caused by unauthorized modification, substitution or attachment will be the responsibility of the user. The manufacturer and its authorized resellers or distributors are not liable for any damage or violation of government regulations that may arise from failing to comply with these guidelines.
207
Regulatory Information
Canada IC Information
Industry Canada (IC)
This device complies with the limits for a class B digital device and conforms to Industry Canada standard ICES-003. Products that contain a radio transmitter comply with Industry Canada standard RSS 210 and are labelled with IC approval number. Wireless LAN products designed according the IEEE 802.11b or IEEE 802.11g standard additionally comply with Industry Canada standard RSS 139. Cet appareil numrique de classe B est conforme la norme ICES-003 de Industry Canada. La radio sans fil de ce dispositif est conforme la certification RSS 210 de Industry Canada et est tiquete avec un numro d'approbation IC. Les produits pour rseaux sans fil qui utilisent la norme IEEE 802.11b ou IEEE 802.11g sont en plus conformes la certification RSS 139 de Industry Canada.
Product Safety
ETL or UL listed products conform to ANSI/UL STD.1950 certified to CAN/CSA STD C22.2 NO.950. Les produits rpertoris ETL ou UL sont conformes ANSI/UL STD.1950 certifis selon la norme CAN/CSA STD C22.2 NO.950.
208
Regulatory Information
Europe Information
Products labeled with the CE mark comply with EMC Directive 89/336/EEC and the Low Voltage Directive 73/23/EEC implying conformity to the following European Norms. Tous les produits portant la marque CE sont conformes la directive EMC 89/336/EEC et la directive 73/23/EEC sur les basses tensions qui impliquent la conformit aux normes de la Commission de la Communaut Europenne. Tutti i prodotti con il marchio CE sono conformi alle direttive EMC 89/336/EEC e direttive Bassa tensione 73/23/EEC che rispetto le norme dalla Commissione della Comunit Europea. Produkte mit der CE Kennzeichnung erfllen die EMV Richtlinie 89/336/EEC sowie die Niederspannungsrichtlinie 73/23/EEC, implizieren die Erfllung der Normen der EU-Kommission. Todos los productos con la marca CE cumplen con la directiva de compatibilidad electromagntica EMC 89/336/EEC y la directiva de baja tensin 73/23/EEC y implica conformidad con las normas de la Comisin de la Unin Europea. EN 60950 (IEC60950) - Product Safety EN 55022 (CISPR 22) - Electromagnetic Interference EN 55024 (IEC61000-4-2,3,4,5,6,8,11) - Electromagnetic Immunity EN 61000-3-2 (IEC610000-3-2) - Power Line Harmonics EN 61000-3-3 (IEC610000-3-3) - Power Line Flicker Products labeled with the CE 0XXX (!) contain a radio transmitter that complies with the R&TTE Directive 1999/5/EC implying conformity to the following European Norms. Les produits portant la marque CE 0XXX (!) contiennent un metteur radio conforme la directive R&TTE 1999/5/EC qui impliquent la conformit aux normes de la Commission de la Communaut Europenne. I prodotti che recano lavvertenza CE 0XXX (!) contengono un trasmettitore radio conforme alla Direttiva R&TTE 1999/5/EC emessa dalla Commissione della Comunit Europea. Funkprodukte mit der CE 0XXX (!) Kennzeichnung enthalten einen Funktransmitter, der die von der Kommission der EU verabschiedete Richtlinie R&TTE 1999/5/EC erfllt. Los productos con la marca CE 0XXX (!) contienen un transmisor de radio que cumple con la Directiva R&TTE 1999/5/EC emitida por la Comisin Europea. EN 60950 (IEC60950) - Product Safety ETSI EN 300328 - Radio LAN equipment operating in the 2.4 Ghz band ETSI EN 301893 - Radio LAN equipment operating in the 5 Ghz band ETSI EN 300826 or ETSI EN 301489-17 - General EMC requirements for radio equipment To determine the type of transmitter, check the product identification label on your Wireless LAN product. Pour identifier le type dmetteur, reportez-vous ltiquette didentification de votre produit. Per determinare il tipo di trasmettitore, controllare la targhetta di identificazione del prodotto. Um welchen Transmittertyp es sich handelt, knnen Sie auf dem Typenschild auf dem Produkt ablesen. Para determinar el tipo de transmisor, compruebe la etiqueta de identificacin del producto.
209
Regulatory Information
Proxim 802.11a Base Station products sold in Europe use a technique called Dynamic Frequency Selection (DFS) to automatically select an operating channel. The European Telecommunications Standard Institute (ETSI) requires that 802.11a devices use DFS to prevent interference with radar systems and other devices that already occupy the 5 GHz band. Les produits de la Proxim 802.11a Base Station vendues en Europe utilisent une technique dnomme Slection de frquence dynamique (Dynamic Frequency Selection, DFS) pour qu'un canal de fonctionnement soit automatiquement choisi. Le l'institut europen des standards de tlcommunications (European Telecommunications Standard Institute, ETSI) exige que les priphriques 802.11a utilisent DFS pour empcher toute interfrence avec les systmes radar et d'autres priphriques qui occupent dj la bande des 5 GHz. Le unit Proxim 802.11a Base Station vendute in Europa impiegano una tecnologia denominata Selezione di frequenza dinamica (Dynamic Frequency Selection, DFS) per la selezione automatica del canale operativo. L'Istituto europeo di standardizzazione delle telecomunicazioni (European Telecommunications Standard Institute, ETSI) sancisce che tutti i dispositivi 802.11a devono usare la DFS per prevenire eventuali interferenze con sistemi radar ed altri dispositivi che gi occupano la banda de 5 GHz. Die in Europa vertriebenen Proxim 802.11a Base Station-Gerte verwenden die so genannte dynamische Frequenzauswahl (Dynamic Frequency Selection, DFS), um automatisch einen gltigen Betriebskanal auszuwhlen. Das European Telecommunications Standard Institute (European Telecommunications Standard Institute, ETSI) schreibt vor, dass 802.11a-Gerte DFS verwenden, um Strungen in Radarsystemen und anderen Gerten, die das 5-GHz-Band verwenden, zu vermeiden. Las unidades Proxim 802.11a Base Station vendidas en Europa usan una tcnica llamada Seleccin dinmica de frecuencias (Dynamic Frequency Selection, DFS) para seleccionar automticamente un canal de operacin. El Instituto Europeo de Normas de Telecomunicaciones (European Telecommunications Standard Institute, ETSI) requiere que los dispositivos 802.11a usen DFS para evitar las interferencias con sistemas de radar y otros dispositivos que ya ocupan la banda de 5 GHz. Some European countries using this product may be subject to specific restrictions as listed in the Radio Approvals section. Dans certains pays, lutilisation du produit peut tre subordonne des conditions spcifiques comme indiques dans la section Certifications radio. In alcuni paesi luso del prodotto pu essere soggetto a limitazioni specifiche, come indicato nelle sezioni Omologazioni radio. In einigen Lndern kann der Betrieb dieses Produktes bestimmten Beschrnkungen unterliegen, wie sie in dem Abschnitt Funkgenehmigungen. En algunos pases la utilizacin de este producto puede estar sujeta a restricciones concretas, tal y como se describe en el apartado Permisos de utilizacin.
210
Regulatory Information
Japan Information
Association of Radio Industries and Businesses (ARIB)
(ARIB) STD-T71) 5.15 ~ 5.25 GHz IEEE 802.11a Radio Approvals (ARIB) STD-T66) 2.4 GHz IEEE 802.11b Radio Approvals (DSSS) 2.400 2.483 MHz (RF-ID) 1 LAN (RF-ID) 40 2 (RF-ID) RF (RF-ID) RF 3 (RF-ID) Web http://www.proxim.com
211
Regulatory Information
(Trade Name/Manufacturer) Agere Systems Agere Systems Agere Systems Proxim Corporation Proxim Corporation Proxim Corporation Proxim Corporation Agere Systems Proxim Corporation Proxim Corporation Agere Systems Proxim Corporation / USI Proxim Corporation / USI
(Certification No.) R-LARN-01-028 R-LARN-02-0027 E-E900-01-4590 E-E900-03-2111 (B) E-E900-03-2111 (B) E-E900-03-2111 (B) E-E900-03-2111 (B) E-E900-01-4591 E-F900-01-5918 (B) E-F900-03-1500 (B) E-F900-02-0043 (B) pending pending
(Date of Certification) 2001.10.15 2002.01.26 2001.10.13 2003.05.15 2003.05.15 2003.05.15 2003.05.15 2001.10.13 2003.04.07 2003.04.07 2002.01.03 2004.XX.XX 2004.XX.XX
(Made in) Taiwan Taiwan Taiwan Taiwan Taiwan Taiwan Taiwan Taiwan Taiwan Taiwan Taiwan Taiwan Taiwan
212
Regulatory Information
Radio Approvals
To determine whether you are allowed to use your device in the countries listed below, please check the contains transmitter number that is printed on the identification label of your device.
Certifications radio
Pour dterminer si vous tes autoris utiliser votre dispositif dans les pays indiques ci-dessous, veuillez contrler le numro de lmetteur imprim sur ltiquette didentification de votre dispositif.
Omologazioni radio
Per determinare se sia consentito o meno utilizzare lapparecchiatura nei paesi sotto elencati, controllare il numero contiene trasmettitore impresso sulla targhetta di identificazione del dispositivo.
Funkgenehmigungen
Um festzustellen, ob Sie zum Gebrauch des Gerts in den nachfolgend aufgefhrten Lndern berechtigt sind, berprfen Sie die Transmitternummer auf dem Gerteetikett.
Permisos de utilizacin
Para determinar si puede utilizar el dispositivo en los pases que se enumeran a continuacin, compruebe el nmero contiene transmisor impreso en la etiqueta de identificacin del dispositivo.
Radio Transmitter Approval Reference Restrictions metteur Radio Numro du Permis Restrictions Trasmittente de Numero di Limitazioni Radio Approvazione Beschrnkungen Radio-bermittler Zustimmung-Nummer Restricciones Transmisor de Nmero de Permiso Radio PC24E-H-FC PC24E-11-FC/R CNC: 16-2327 CNC: 16-2574
Argentina
Australia
PC24E-H-FC PC24E-11-FC/R
Australia Australia
G11FNF-PC PC50E-8-FC/A A13QBF-PC For indoor use only. For indoor use only.
Alpha-1: B11FNF Alpha-1: G11FNF Alpha-1: C38WCW AP-700: AP-AG-AT-01 AP-4000: AP-AG-AT-02 For indoor use only. For indoor use only. For indoor use only.
213
Regulatory Information
Country Pays Paese Land Pas Radio Transmitter Approval Reference Restrictions metteur Radio Numro du Permis Restrictions Trasmittente de Numero di Limitazioni Radio Approvazione Beschrnkungen Radio-bermittler Zustimmung-Nummer Restricciones Transmisor de Nmero de Permiso Radio Alpha-1: A13QBF PC24E-H-FC PC24E-H-ET-L PC24E-H-ET PC24E-11-FC/R PC24E-11-ET/R CE 0336 ! Only indoor with integral or approved Range Extender Antenna. Nur zum Einsatz innerhalb von Gebuden (mit der integrierten Antenne oder einer zugelassenen Reichweitenverstrkerantenne) Only indoor with integral or approved Range Extender Antenna. Nur zum Einsatz innerhalb von Gebuden (mit der integrierten Antenne oder einer zugelassenen Reichweitenverstrkerantenne) Only indoor with integral or approved Range Extender Antenna. Nur zum Einsatz innerhalb von Gebuden (mit der integrierten Antenne oder einer zugelassenen Reichweitenverstrkerantenne). Only indoor with integral or approved Range Extender Antenna. Nur zum Einsatz innerhalb von Gebuden (mit der integrierten Antenne oder einer zugelassenen Reichweitenverstrkerantenne). CE 0122 ! R0167 SRD3a For indoor use only.
Austria sterreich
G11FNF-PC G13ENE-PC
CE 0336 ! CE 0336 !
Austria sterreich
Austria sterreich
214
Regulatory Information
Country Pays Paese Land Pas Radio Transmitter Approval Reference Restrictions metteur Radio Numro du Permis Restrictions Trasmittente de Numero di Limitazioni Radio Approvazione Beschrnkungen Radio-bermittler Zustimmung-Nummer Restricciones Transmisor de Nmero de Permiso Radio PC24E-H-FC PC24E-H-ET-L PC24E-H-ET CE 0122 ! RTT/RL/X 113 CE 0122 ! For outdoor usage you may only use channels 10 and 11 (2457 and 2462 MHz). Private usage outside buildings across less than 300 m public grounds requires no special registration. Private usage outside buildings across more than 300 m public grounds require special registration at IBPT/BIPT. Public usage outside buildings requires an IBPT/BIPT licence. For registration and license please contact IBPT/BIPT. Voor buitengebruik mag alleen kanaal 10 en 11 (2457 en 2462 MHz) worden geactiveerd. Bij prive gebruik buiten gebouwen over minder dan 300m publiek terrein is geen vergunning nodig. Voor prive gebruik buiten gebouwen over meer dan 300m publiek terrein moet een vergunning bij IBPT/BIPT aangevraagd worden. Bij publieke toepassingen buiten gebouwen moet een vergunning bij IBPT/BIPT aangevraagd worden. Pour un usage extrieur vous ne devez utiliser que les canaux 10 et 11 (2457 et 2462 MHz). Lutilisation extrieure titre priv dont la porte est infrieure 300 m de parcs publiques ne ncessite pas denregistrement. Lutilisation extrieure titre priv dont la porte est suprieure 300 m de parcs publiques ncessite lenregistrement auprs de IBPT/BIPT. Lutilisation extrieure titre publique ncessite une licence par IBPT/BIPT. Pour lenregistrement et la licence, veuillez contacter IBPT/BIPT. Fr den Einsatz im Freien sind nur die Kanle 10 und 11 (2457 und 2462 MHz) zulssig. Fr die private Nutzung auerhalb von Gebuden auf ffentlichem Gelnde und ber Entfernungen weniger als 300 m ist keine besondere Registrierung erforderlich. Fr die private Nutzung auerhalb von Gebuden auf ffentlichem Gelnde und ber Entfernungen von mehr als 300 m ist eine besondere Registrierung beim IBPT/BIPT erforderlich. Fr ffentliche Einzatz ist eine besondere Registrierung beim IBPT/BIPT erforderlich. Only indoor with integral or approved Range Extender Antenna. Alleen voor gebruik binnenshuis met ingebouwde of goedgekeurde reikwijdteversterkerantenne. Pour usage intrieur uniquement, avec une antenne intgrale ou amplificatrice approuve.
PC24E-11-FC/R PC24E-11-ET/R
CE 0336 ! CE 0336 !
215
Regulatory Information
Country Pays Paese Land Pas Radio Transmitter Approval Reference Restrictions metteur Radio Numro du Permis Restrictions Trasmittente de Numero di Limitazioni Radio Approvazione Beschrnkungen Radio-bermittler Zustimmung-Nummer Restricciones Transmisor de Nmero de Permiso Radio Alpha-1: C38WCW CE 0560 ! Only indoor with integral or approved Range Extender Antenna. Alleen voor gebruik binnenshuis met ingebouwde of goedgekeurde reikwijdteversterkerantenne. Pour usage intrieur uniquement, avec une antenne intgrale ou amplificatrice approuve. Nur zum Einsatz innerhalb von Gebuden (mit der integrierten Antenne oder einer zugelassenen Reichweitenverstrkerantenne). Only indoor with integral or approved Range Extender Antenna. Alleen voor gebruik binnenshuis met ingebouwde of goedgekeurde reikwijdteversterkerantenne. Pour usage intrieur uniquement, avec une antenne intgrale ou amplificatrice approuve. Nur zum Einsatz innerhalb von Gebuden (mit der integrierten Antenne oder einer zugelassenen Reichweitenverstrkerantenne). Only indoor with integral or approved Range Extender Antenna. Alleen voor gebruik binnenshuis met ingebouwde of goedgekeurde reikwijdteversterkerantenne. Pour usage intrieur uniquement, avec une antenne intgrale ou amplificatrice approuve. Nur zum Einsatz innerhalb von Gebuden (mit der integrierten Antenne oder einer zugelassenen Reichweitenverstrkerantenne).
Belgium
Belgium Belgium
CE 0560 ! CE 0560 !
G11FNF-PC G13ENE-PC
CE 0336 ! CE 0336 !
CE 0336 ! CE 0336 ! CE 0560 ! Only indoor with integral or approved Range Extender Antenna. Alleen voor gebruik binnenshuis met ingebouwde of goedgekeurde reikwijdteversterkerantenne. Pour usage intrieur uniquement, avec une antenne intgrale ou amplificatrice approuve. Nur zum Einsatz innerhalb von Gebuden (mit der integrierten Antenne oder einer zugelassenen Reichweitenverstrkerantenne). Only indoor with integral or approved Range Extender Antenna. Alleen voor gebruik binnenshuis met ingebouwde of goedgekeurde reikwijdteversterkerantenne. Pour usage intrieur uniquement, avec une antenne intgrale ou amplificatrice approuve. Nur zum Einsatz innerhalb von Gebuden (mit der integrierten Antenne oder einer zugelassenen Reichweitenverstrkerantenne).
216
Regulatory Information
Country Pays Paese Land Pas Radio Transmitter Approval Reference Restrictions metteur Radio Numro du Permis Restrictions Trasmittente de Numero di Limitazioni Radio Approvazione Beschrnkungen Radio-bermittler Zustimmung-Nummer Restricciones Transmisor de Nmero de Permiso Radio Alpha-1: A04LAE Alpha-1:A08NAE PC24E-H-FC CE 0336 ! CE 0336 !
This equipment operates in secondary mode: It is not allowed to protect the equipment against harmful modelo: (01) 07898903006 02 0 interference from primary mode stations or stations of the PC24E-11-FC/R same type. It is not allowed to cause interference to Fabricante: Agere systems that operate in primary mode. Systems Netherlands B.V. G11FNF-PC pending This equipment operates in secondary mode: It is not allowed to protect the equipment against harmful interference from primary mode stations or stations of the same type. It is not allowed to cause interference to systems that operate in primary mode.
Brazil
Brazil
Alpha-1, modelo: (01) 07898903006 01 3 This equipment operates in secondary mode: It is not B11FNF allowed to protect the equipment against harmful Fabricante: Proxim interference from primary mode stations or stations of the Corporation p/a same type. It is not allowed to cause interference to Europe B.V. systems that operate in primary mode. Alpha-1: G11FNF pending This equipment operates in secondary mode: It is not allowed to protect the equipment against harmful interference from primary mode stations or stations of the same type. It is not allowed to cause interference to systems that operate in primary mode. System with outdoor antenna requires license from Industry Canada. Les systmes dots dune antenne extrieure ncessitent la dlivrance dune licence de la part de Industry Canada.
Brazil
Canada
PC24E-H-FC PC24-11-FC/R
IIC: 4005104679A IC: 1856A-G11FNFPC System with outdoor antenna requires license from Industry Canada. Les systmes dots dune antenne extrieure ncessitent la dlivrance dune licence de la part de Industry Canada. IC: 1856A-C38WCW For indoor use only. Pour usage intrieur uniquement.
Canada
C38WCW
IC: 4110A-APAGAT01 For indoor use only. Pour usage intrieur uniquement. IC: 4110A-APAGAT02 IC: 4005A-PCE508A IC: 1856A-A13QBFPC For indoor use only. Pour usage intrieur uniquement.
217
Regulatory Information
Country Pays Paese Land Pas Radio Transmitter Approval Reference Restrictions metteur Radio Numro du Permis Restrictions Trasmittente de Numero di Limitazioni Radio Approvazione Beschrnkungen Radio-bermittler Zustimmung-Nummer Restricciones Transmisor de Nmero de Permiso Radio Alpha-1: B11FNF IC: 1856B-B11FNF Only with integral, approved Range Extender Antenna. Pour usage avec une antenne intgrale ou amplificatrice approuve. Only with integral, approved Range Extender Antenna. Pour usage avec une antenne intgrale ou amplificatrice approuve. For indoor use only. Pour usage intrieur uniquement.
Canada
Canada
Canada
China
CMII: 2001AJ0385 CMII: 2000AJ0152 CMII ID: 2002DJ1380 CMII ID: 2002DJ1225 CMII ID: 2003DJ0807 CMII ID: 2003AJ0806 The use of external antennas is not allowed The use of external antennas is not allowed
G13ENE-PC A04VBA-PC
Alpha-1: B13ENE CMII ID: 2003DJ0344 MPCI3A-20/R Agere Systems Alpha-1: G13ENE CMII ID: 2003DJ0604 Alpha-1: A04VBA CMII ID: 2003AP0741
Alpha-1: C38WCW CMII ID: 2003DJ1055 AP-700: AP-AG-AT-01 AP-4000: AP-AG-AT-02 PC24E-H-FC PC24E-11-FC/R CMII ID: pending CMII ID: pending
The use of external antennas is not allowed The use of external antennas is not allowed
Chile
G11FNF-PC G13ENE-PC
Colombia
218
Regulatory Information
Country Pays Paese Land Pas Radio Transmitter Approval Reference Restrictions metteur Radio Numro du Permis Restrictions Trasmittente de Numero di Limitazioni Radio Approvazione Beschrnkungen Radio-bermittler Zustimmung-Nummer Restricciones Transmisor de Nmero de Permiso Radio PC24E-H-ET-L PC24E-H-ET Denmark Danmark PC24E-H-FC PC24E-H-ET-L PC24E-H-ET PC24E-11-FC/R PC24E-11-ET/R CE 0122 ! R0167 SRD3a CE 0122 ! CE 0336 ! CE 0336 ! Only indoor with integral or approved Range Extender Antenna. Kun til indendrs brug sammen med en integreret eller godkendt afstandsforlngerantenne. Only indoor with integral or approved Range Extender Antenna. Kun til indendrs brug sammen med en integreret eller godkendt afstandsforlngerantenne. For indoor use only. Nemlig til indendrs brug. 45314454
Czech Republic
Denmark Danmark
G11FNF-PC G13ENE-PC
CE 0336 ! CE 0336 !
Denmark Danmark
PC50E-4-ET/A
CE 0336 !
CE 0560 ! Only indoor with integral or approved Range Extender Antenna. Kun til indendrs brug sammen med en integreret eller godkendt afstandsforlngerantenne. Use only with approved external antennas.
Denmark Danmark
Denmark
Only indoor with integral or approved Range Extender Antenna Kun til indendrs brug sammen med en integreret eller godkendt afstandsforlngerantenne. Only indoor with integral or approved Range Extender Antenna Kun til indendrs brug sammen med en integreret eller godkendt afstandsforlngerantenne. For indoor use only. Nemlig til indendrs brug.
PC24E-H-ET-L PC24E-H-ET
M9599048
219
Regulatory Information
Country Pays Paese Land Pas Radio Transmitter Approval Reference Restrictions metteur Radio Numro du Permis Restrictions Trasmittente de Numero di Limitazioni Radio Approvazione Beschrnkungen Radio-bermittler Zustimmung-Nummer Restricciones Transmisor de Nmero de Permiso Radio PC24E-H-FC PC24E-H-ET-L PC24E-H-ET PC24E-11-FC/R PC24E-11-ET/R CE 0336 ! Only indoor with integral or approved Range Extender Antenna. Ainoa sis- avulla integraali eli hyvksytty Ala Avartaa Tuntosarvi. Only indoor with integral or approved Range Extender Antenna. Ainoa sis- avulla integraali eli hyvksytty Ala Avartaa Tuntosarvi. For indoor use only. Ajaksi sis- apu ainoa CE 0122 ! R0167 SRD3a
Finland Suomi
Finland Suomi
G11FNF-PC G13ENE-PC
CE 0336 ! CE 0336 !
Finland Suomi
Finland Suomi
Only indoor with integral or approved Range Extender Antenna. Ainoa sis- avulla integraali eli hyvksytty Ala Avartaa Tuntosarvi. Only indoor with integral or approved Range Extender Antenna. Ainoa sis- avulla integraali eli hyvksytty Ala Avartaa Tuntosarvi. Only indoor with integral or approved Range Extender Antenna. Ainoa sis- avulla integraali eli hyvksytty Ala Avartaa Tuntosarvi. Only indoor with integral or approved Range Extender Antenna. Ainoa sis- avulla integraali eli hyvksytty Ala Avartaa Tuntosarvi. For indoor use only. Ajaksi sis- apu ainoa.
Finland Suomi
Finland Suomi
220
Regulatory Information
Country Pays Paese Land Pas Radio Transmitter Approval Reference Restrictions metteur Radio Numro du Permis Restrictions Trasmittente de Numero di Limitazioni Radio Approvazione Beschrnkungen Radio-bermittler Zustimmung-Nummer Restricciones Transmisor de Nmero de Permiso Radio PC24E-H-FC CE 0122 ! Restricted frequency band: On French territory PC24E-H-FC devices may only use channels 10 and 11 (2457 and 2462 MHz). Bande de frquence limite : Sur le territoire franais les dispositifs PC24E-H-FC ne sont autoriss utiliser que les canaux 10 et 11 (2457 MHz et 2462 MHz). PC24E-H-FR(-L) & PC24E-H-ET(-L) devices may only use channels 10, 11,12 and 13 (2457, 2462, 2467and 2472 MHz). It is not allowed to operate the device at any other channel as supported by the device. License required for every indoor installation (please contact ART for procedure to follow). Use outdoors is not allowed. Les dispositifs PC24E-H-FR(-L) & PC24E-H-ET(-L) ne sont autoriss utiliser que les canaux 10, 11,12 et 13 (2457, 2462, 2467et 2472 MHz). Il est interdit dutiliser le dispositif sur les autres canaux pris en charge par le dispositif. La licence est requise pour toute installation intrieure (veuillez contacter ART pour les procdures suivre). Les installations extrieures sont interdites. Only indoor with integral or approved Range Extender Antenna. Pour usage intrieur uniquement, avec une antenne intgrale ou amplificatrice approuve. Only indoor with integral or approved Range Extender Antenna. Pour usage intrieur uniquement, avec une antenne intgrale ou amplificatrice approuve. Only indoor with integral or approved Range Extender Antenna. Pour usage intrieur uniquement, avec une antenne intgrale ou amplificatrice approuve. Only indoor with integral or approved Range Extender Antenna. Pour usage intrieur uniquement, avec une antenne intgrale ou amplificatrice approuve. For indoor use only. Pour usage intrieur uniquement.
France
PC24E-H-FR-L PC24E-H-FR
France
221
Regulatory Information
Country Pays Paese Land Pas Radio Transmitter Approval Reference Restrictions metteur Radio Numro du Permis Restrictions Trasmittente de Numero di Limitazioni Radio Approvazione Beschrnkungen Radio-bermittler Zustimmung-Nummer Restricciones Transmisor de Nmero de Permiso Radio Alpha-1: B13ENE CE 0336 ! Restricted frequency band: On French territory B13ENE devices may only use channels 10, 11, 12, and 13 (2457, 2462, 2467 and 2472 MHz). For WLAN hotspots, ART (Autorit de Regulation des Tlcommunications) has special regulations allowing the use of other channels as well; check with ART for authorizations and local rulings. Only indoor with integral or approved Range Extender Antenna. Bande de frquence limite : Sur le territoire franais les dispositifs B13ENE / G13ENE ne sont autoriss utiliser que les canaux 10, 11, 12 et 13 (2457, 2462, 2467 et 2472 MHz). Pour les rseaux locaux sans fil (WLAN), lAutorit de Regulation des Tlcommunications (ART) permet l'utilisation d'autres bandes de frquence; vrifiez auprs de l'ART pour les autorisations et rglments locaux. Pour usage intrieur uniquement, avec une antenne intgrale ou amplificatrice approuve. Restricted frequency band: On French territory B13ENE devices may only use channels 10, 11, 12, and 13 (2457, 2462, 2467 and 2472 MHz). For WLAN hotspots, ART (Autorit de Regulation des Tlcommunications) has special regulations allowing the use of other channels as well; check with ART for authorizations and local rulings. Only indoor with integral or approved Range Extender Antenna. Bande de frquence limite : Sur le territoire franais les dispositifs B13ENE / G13ENE ne sont autoriss utiliser que les canaux 10, 11, 12 et 13 (2457, 2462, 2467 et 2472 MHz). Pour les rseaux locaux sans fil (WLAN), lAutorit de Regulation des Tlcommunications (ART) permet l'utilisation d'autres bandes de frquence; vrifiez auprs de l'ART pour les autorisations et rglments locaux. Pour usage intrieur uniquement, avec une antenne intgrale ou amplificatrice approuve. CE 0336 ! For indoor use only. Pour usage intrieur uniquement.
France
France
France
Alpha-1: A04LAE
License required for outdoor installations. Check with reseller for procedure to follow. CETECOM: D810070L Fr Installationen im Freien ist eine Lizenz erforderlich. Nhere Informationen zur Vorgehensweise erhalten Sie bei CETECOM: D810069L Ihrem Hndler. CE 0336 ! CE 0336 ! Only indoor with integral or approved Range Extender Antenna. Nur zum Einsatz innerhalb von Gebuden (mit der integrierten Antenne oder einer zugelassenen Reichweitenverstrkerantenne)
CE 0122 !
222
Regulatory Information
Country Pays Paese Land Pas Radio Transmitter Approval Reference Restrictions metteur Radio Numro du Permis Restrictions Trasmittente de Numero di Limitazioni Radio Approvazione Beschrnkungen Radio-bermittler Zustimmung-Nummer Restricciones Transmisor de Nmero de Permiso Radio CE 0336 ! CE 0336 ! Only indoor with integral or approved Range Extender Antenna. Nur zum Einsatz innerhalb von Gebuden (mit der integrierten Antenne oder einer zugelassenen Reichweitenverstrkerantenne) Only indoor with integral or approved Range Extender Antenna. Nur zum Einsatz innerhalb von Gebuden (mit der integrierten Antenne oder einer zugelassenen Reichweitenverstrkerantenne) Only indoor with integral or approved Range Extender Antenna. Nur zum Einsatz innerhalb von Gebuden (mit der integrierten Antenne oder einer zugelassenen Reichweitenverstrkerantenne) For indoor use only. Nur fr Innengebrauch.
CE 0560 ! CE 0560 !
Only indoor with integral or approved Range Extender Antenna. Nur zum Einsatz innerhalb von Gebuden (mit der integrierten Antenne oder einer zugelassenen Reichweitenverstrkerantenne) Only indoor with integral or approved Range Extender Antenna. Nur zum Einsatz innerhalb von Gebuden (mit der integrierten Antenne oder einer zugelassenen Reichweitenverstrkerantenne) For indoor use only. Fr nur Innengebrauch.
Germany Alpha-1: A04LAE CE 0336 ! Deutschland Alpha-1: A08NAE CE 0336 ! Greece PC24E-H-FC PC24E-11-FC/R PC24E-11-ET/R Greece G11FNF-PC G13ENE-PC Greece CE 0122 ! CE 0336 ! CE 0336 ! CE 0336 ! CE 0336 !
Only indoor with integral or approved Range Extender Antenna. Only indoor with integral or approved Range Extender Antenna. Only indoor with integral or approved Range Extender Antenna. Only indoor with integral or approved Range Extender Antenna. .
Greece
223
Regulatory Information
Country Pays Paese Land Pas Radio Transmitter Approval Reference Restrictions metteur Radio Numro du Permis Restrictions Trasmittente de Numero di Limitazioni Radio Approvazione Beschrnkungen Radio-bermittler Zustimmung-Nummer Restricciones Transmisor de Nmero de Permiso Radio PC24E-H-FC PC24E-H-ET PC24E-11-FC/R Hong Kong Hong Kong Hong Kong Hong Kong Hong Kong Hong Kong Hong Kong Hong Kong Hungary Alpha-1: B13ENE HKTA-1039 Alpha-1: A09SBS G13ENE-PC A19PCE-PC HKTA-1039 HKTA-1039 HKTA-1039 LP400096 LP400095
Hong Kong
Alpha-1: G13ENE HKTA-1039 Alpha-1: C38WCW HKTA-1039 AP-700: AP-AT-AG-01 AP-4000: AP-AT-AG-02 PC24E-H-FC PC24E-H-ET-L PC24E-H-ET HKTA-1039 HKTA-1039 LA-004-1-2000/00 LA-005-0-2000/00 LA-004-0-2000/00 CE 0122 ! R0167 SRD3a
Iceland sland
Only indoor with integral or approved Range Extender Antenna. Only indoor with integral or approved Range Extender Antenna. Only indoor with integral or approved Range Extender Antenna. Only indoor with integral or approved Range Extender Antenna.
Iceland sland
G11FNF-PC G13ENE-PC
CE 0560! CE 0560!
224
Regulatory Information
Country Pays Paese Land Pas Radio Transmitter Approval Reference Restrictions metteur Radio Numro du Permis Restrictions Trasmittente de Numero di Limitazioni Radio Approvazione Beschrnkungen Radio-bermittler Zustimmung-Nummer Restricciones Transmisor de Nmero de Permiso Radio PC50E-4-ET/A PC50E-8-ET/A A19PCE-PC Iceland sland Iceland sland CE 0336 ! CE 0336! CE 0560 ! Only indoor with integral or approved Range Extender Antenna. Only indoor with integral or approved Range Extender Antenna. For indoor use only. Fyrir inni- nota eini India Telegraph Act 1885 requires End User License. To obtain a license contact: The Jt. Wireless Advisor The Wireless Planning & Co-ordination Wing Ministry of Communications, Sanchar Bhavan New Delhi CE 0122 ! TRA 24/5/84/6 CE 0122 ! CE 0336 ! CE 0336 ! CE 0336 ! CE 0336 ! Only indoor with integral or approved Range Extender Antenna. Only indoor with integral or approved Range Extender Antenna. Restricted frequency band: only channels 4 through 8 (2418.0-2457.0 MHz) may be used in Israel. Restricted frequency band: only channels 4 through 8 (2418.0-2457.0 MHz) may be used in Israel. Only indoor with integral or approved Range Extender Antenna. Only indoor with integral or approved Range Extender Antenna. Only indoor with integral or approved Range Extender Antenna. For indoor use only. Fyrir inni- nota eini
Iceland sland
Iceland sland
Alpha-1: A04LAE
CE 0336 !
Ireland
Ireland
G11FNF-PC G13ENE-PC
Ireland
Ireland
Israel
PC24E-11-IL/R
MoC 597-2002
225
Regulatory Information
Country Pays Paese Land Pas Radio Transmitter Approval Reference Restrictions metteur Radio Numro du Permis Restrictions Trasmittente de Numero di Limitazioni Radio Approvazione Beschrnkungen Radio-bermittler Zustimmung-Nummer Restricciones Transmisor de Nmero de Permiso Radio G05INI-PC MoC pending Restricted frequency band: only channels 4 through 8 (2418.0-2457.0 MHz) may be used in Israel. Restricted frequency band: only channels 4 through 8 (2418.0-2457.0 MHz) may be used in Israel. Only indoor with integral or approved Range Extender Antenna. Only indoor with integral or approved Range Extender Antenna. Restricted frequency band: only channels 4 through 8 (2418.0-2457.0 MHz) may be used in Israel. Restricted frequency band: only channels 4 through 8 (2418.0-2457.0 MHz) may be used in Israel. Only indoor with integral or approved Range Extender Antenna.
Israel
Israel
Alpha-1: B05INI
MoC pending
Israel
Alpha-1: G05INI
MoC pending
Italy Italia
PC24E-H-FC PC24E-H-ET-L
License required for indoor use. Use with outdoor installations not allowed. CEPT-RLAN I Licenza necessaria per uso in interno. Non consentito DGPGF/4/2/144-03/340 luso in installazioni esterne 367/96 CEPT-RLAN I DGPGF/4/2/144-03/340 327/774 CE 0336 ! CE 0336 ! Only indoor with integral or approved Range Extender Antenna. Solo per interni con Antenna Range Extender integrale o approvata. Only indoor with integral or approved Range Extender Antenna. Solo per interni con Antenna Range Extender integrale o approvata. Only indoor with integral or approved Range Extender Antenna. Solo per interni con Antenna Range Extender integrale o approvata. Only indoor with integral or approved Range Extender Antenna. Solo per interni con Antenna Range Extender integrale o approvata.
CE 0122 !
PC24E-H-ET
PC24E-11-FC/R PC24E-11-ET/R
Italy Italia
G11FNF-PC G13ENE-PC
CE 0336 ! CE 0336 !
Italy Italia
Italy Italia
226
Regulatory Information
Country Pays Paese Land Pas Radio Transmitter Approval Reference Restrictions metteur Radio Numro du Permis Restrictions Trasmittente de Numero di Limitazioni Radio Approvazione Beschrnkungen Radio-bermittler Zustimmung-Nummer Restricciones Transmisor de Nmero de Permiso Radio PC24E-H-FC PC24E-H-JP PC24E-H-ET-L PC24E-11-FC/R PC24E-11-JP/R Japan Japan G13GNJ-PC PC50E-4-JP/A A04LEJ-PC Japan Alpha-1: B14GNJ TELEC: NYCA0010 TELEC: NYCA0008 TELEC: GZCA0007 TELEC: NYCA00024 TELEC: 01NYDA1121 JATE: D01-1128JP TELEC: 01NYDA1122 TELEC: 03YNDA0185 TELEC: 03GZDA0150 TELEC: 01WYBA1051 For indoor use only. TELEC: 03WYBA0048 TELEC: 03NYDA0130 Only indoor with integral or approved Range Extender TELEC: 03GZDA0079 Antenna. ( ) JATE: D99-1057JP
Japan
Japan
Alpha-1: G13GNJ TELEC: 03YNDA0190 Only indoor with integral or approved Range Extender TELEC: 03GZDA0154 Antenna. ( ) Alpha-1: A04LEJ TELEC: 03WYBA0025 For indoor use only.
Japan Japan
Alpha-1: C38WCW TELEC: 003NY03042 Only indoor with integral or approved Range Extender 0000 Antenna. TELEC: 003GZ03027 0000 TELEC: 003WY03015 ( ) 0000 AP-700: AP-AG-AT-01 AP-4000: AP-AG-AT-02 PC24E-H-FC TELEC: pending TELEC: pending TELEC: pending TELEC: pending TELEC: pending TELEC: pending MIC: R-LARN-01-028 Certification date: 2002.10.15 MIC: R-LARN-02-0027 Certification date: 2002.01.26 MIC: R-LARN-03-0238 Product name: PC Card Certification date: Manufacturer: Proxim Corporation 2003.05.29 Made in: Taiwan
Only indoor with integral or approved Range Extender Antenna.
( )
PC24E-11-FC/R
Korea
G11FNF-PC
227
Regulatory Information
Country Pays Paese Land Pas Radio Transmitter Approval Reference Restrictions metteur Radio Numro du Permis Restrictions Trasmittente de Numero di Limitazioni Radio Approvazione Beschrnkungen Radio-bermittler Zustimmung-Nummer Restricciones Transmisor de Nmero de Permiso Radio A04VBA-PC MIC: R-LARN-03-0248 Product name: PC Card Certification date: Manufacturer: Proxim Corporation 2003.06-04 Made in: Taiwan
Korea
Korea
Alpha-1: B13ENE MIC: R-LARN-03-0209 Product name: PC Card Certification date: Manufacturer: Proxim Corporation 2003.05.13 Made in: Taiwan Alpha-1: G11FNF MIC: R-LARN-03-0230 Product name: PC Card Certification date: Manufacturer: Proxim Corporation 2003.05.23 Made in: Taiwan Alpha-1: C38WCW MIC: R-LARN-03-0366 Product name: PC Card Certification date: Manufacturer: Proxim Corporation 2003.08.29 Made in: Taiwan AP-700: AP-AG-AT-01 AP-4000: AP-AG-AT-02 Alpha-1: A04VBA MIC: pending Certification date: 2004.XX.XX MIC: pending Certification date: 2004.XX.XX MIC: R-LARN-03-208 Certification date: 2003.05.13 CE 0122 ! R&TTE Directive 1999/5/EC CE 0336 ! Only indoor with integral or approved Range Extender Antenna. Nur zum Einsatz innerhalb von Gebuden (mit der integrierten Antenne oder einer zugelassenen Reichweitenverstrkerantenne) Only indoor with integral or approved Range Extender Antenna. Nur zum Einsatz innerhalb von Gebuden (mit der integrierten Antenne oder einer zugelassenen Reichweitenverstrkerantenne) For indoor use only. Nur fr Innengebrauch. Only indoor with integral or approved Range Extender Antenna. Nur zum Einsatz innerhalb von Gebuden (mit der integrierten Antenne oder einer zugelassenen Reichweitenverstrkerantenne) Product name: PC Card Manufacturer: Proxim Corporation Made in: Taiwan Product name: Access Point Manufacturer: Proxim Corporation Made in: Taiwan
Korea
Korea
Korea
Korea
Korea
Liechtenstein PC24E-H-FC
PC24E-11-FC/R PC24E-11-ET/R
CE 0336! CE 0336!
CE 0336 ! CE 0560 !
228
Regulatory Information
Country Pays Paese Land Pas Radio Transmitter Approval Reference Restrictions metteur Radio Numro du Permis Restrictions Trasmittente de Numero di Limitazioni Radio Approvazione Beschrnkungen Radio-bermittler Zustimmung-Nummer Restricciones Transmisor de Nmero de Permiso Radio CE 0560! CE 0560! Only indoor with integral or approved Range Extender Antenna. Nur zum Einsatz innerhalb von Gebuden (mit der integrierten Antenne oder einer zugelassenen Reichweitenverstrkerantenne) Only indoor with integral or approved Range Extender Antenna. Nur zum Einsatz innerhalb von Gebuden (mit der integrierten Antenne oder einer zugelassenen Reichweitenverstrkerantenne) Only indoor with integral or approved Range Extender Antenna. Nur zum Einsatz innerhalb von Gebuden (mit der integrierten Antenne oder einer zugelassenen Reichweitenverstrkerantenne) For indoor use only. Fr nur Innengebrauch.
CE 0336 !
Lithuania
CE 0122 ! L 2490/10585-01J L 2490/10584-01J CE 0336 ! CE 0336 ! Only indoor with integral or approved Range Extender Antenna. Pour usage intrieur uniquement, avec une antenne intgrale ou amplificatrice approuve. Only indoor with integral or approved Range Extender Antenna. Pour usage intrieur uniquement, avec une antenne intgrale ou amplificatrice approuve. Only indoor with integral or approved Range Extender Antenna. Pour usage intrieur uniquement, avec une antenne intgrale ou amplificatrice approuve. Only indoor with integral or approved Range Extender Antenna. Pour usage intrieur uniquement, avec une antenne intgrale ou amplificatrice approuve.
CE 0336 !
CE 0560 ! CE 0560 !
229
Regulatory Information
Country Pays Paese Land Pas Radio Transmitter Approval Reference Restrictions metteur Radio Numro du Permis Restrictions Trasmittente de Numero di Limitazioni Radio Approvazione Beschrnkungen Radio-bermittler Zustimmung-Nummer Restricciones Transmisor de Nmero de Permiso Radio CE 0336 ! CE 0336 ! CE 0560 ! Only indoor with integral or approved Range Extender Antenna. Pour usage intrieur uniquement, avec une antenne intgrale ou amplificatrice approuve. Only indoor with integral or approved Range Extender Antenna. Pour usage intrieur uniquement, avec une antenne intgrale ou amplificatrice approuve. For indoor use only. Pour usage intrieur uniquement. On Mexican territory wireless devices may only use channel 11 (2450.0-2483.5 MHz), however for indoors use there are no restrictions on for using all channels, because use of this equipment in Mexico is on secundary basis. En el territorio mexicano, los dispositivos inalmbricos slo pueden usar el canal 11 (2450,0-2483,5 MHz), pero no hay restriccion para el uso de estos equipos dentro de areas cerradas porque operan con frequencia de uso secundario. Para uso en areas abiertas, la banda de frequencia esta restringida. On Mexican territory wireless devices may only use channel 11 (2450.0-2483.5 MHz), however for indoors use there are no restrictions on for using all channels, because use of this equipment in Mexico is on secundary basis. En el territorio mexicano, los dispositivos inalmbricos slo pueden usar el canal 11 (2450,0-2483,5 MHz), pero no hay restriccion para el uso de estos equipos dentro de areas cerradas porque operan con frequencia de uso secundario. Para uso en areas abiertas, la banda de frequencia esta restringida. For indoor use only. Para el uso interior slo. For indoor use only. Pour usage intrieur uniquement.
Luxemburg Alpha-1: A04LAE CE 0336 ! Luxembourg Alpha-1: A08NAE CE 0336 ! Mexico Mxico PC-24E-H-FC PC24E-11-FC/R COFETEL: RCPLUWA99-660 COFETEL: RCPLUPC01-498-A2
Mexico Mxico
G11FNF-PC
COFETEL: RCPPRG103-249
Mexico Mxico
PC50E-8-FC/A A13QBF-PC
230
Regulatory Information
Country Pays Paese Land Pas Radio Transmitter Approval Reference Restrictions metteur Radio Numro du Permis Restrictions Trasmittente de Numero di Limitazioni Radio Approvazione Beschrnkungen Radio-bermittler Zustimmung-Nummer Restricciones Transmisor de Nmero de Permiso Radio Alpha-1: B11FNF COFETEL: PCPPRAL03-095 On Mexican territory wireless devices may only use channel 11 (2450.0-2483.5 MHz), however for indoors use there are no restrictions on for using all channels, because use of this equipment in Mexico is on secundary basis. En el territorio mexicano, los dispositivos inalmbricos slo pueden usar el canal 11 (2450,0-2483,5 MHz), pero no hay restriccion para el uso de estos equipos dentro de areas cerradas porque operan con frequencia de uso secundario. Para uso en areas abiertas, la banda de frequencia esta restringida. On Mexican territory wireless devices may only use channel 11 (2450.0-2483.5 MHz), however for indoors use there are no restrictions on for using all channels, because use of this equipment in Mexico is on secundary basis. En el territorio mexicano, los dispositivos inalmbricos slo pueden usar el canal 11 (2450,0-2483,5 MHz), pero no hay restriccion para el uso de estos equipos dentro de areas cerradas porque operan con frequencia de uso secundario. Para uso en areas abiertas, la banda de frequencia esta restringida. On Mexican territory wireless devices may only use channel 11 (2450.0-2483.5 MHz), however for indoors use there are no restrictions on for using all channels, because use of this equipment in Mexico is on secundary basis. En el territorio mexicano, los dispositivos inalmbricos slo pueden usar el canal 11 (2450,0-2483,5 MHz), pero no hay restriccion para el uso de estos equipos dentro de areas cerradas porque operan con frequencia de uso secundario. Para uso en areas abiertas, la banda de frequencia esta restringida. On Mexican territory wireless devices may only use channel 11 (2450.0-2483.5 MHz), however for indoors use there are no restrictions on for using all channels, because use of this equipment in Mexico is on secundary basis. En el territorio mexicano, los dispositivos inalmbricos slo pueden usar el canal 11 (2450,0-2483,5 MHz), pero no hay restriccion para el uso de estos equipos dentro de areas cerradas porque operan con frequencia de uso secundario. Para uso en areas abiertas, la banda de frequencia esta restringida. For indoor use only. Para el uso interior slo.
Mexico Mxico
Mexico Mxico
Mexico Mxico
Mexico Mxico
231
Regulatory Information
Country Pays Paese Land Pas Radio Transmitter Approval Reference Restrictions metteur Radio Numro du Permis Restrictions Trasmittente de Numero di Limitazioni Radio Approvazione Beschrnkungen Radio-bermittler Zustimmung-Nummer Restricciones Transmisor de Nmero de Permiso Radio PC24E-H-FC PC24E-H-ET-L CE 0122 ! No 67 License required for outdoor installations. Check with reseller for procedure to follow. Vergunning vereist voor buiteninstallatie. Raadpleeg de doorverkoper voor te volgen procedures.
Netherlands Nederland
Only indoor with integral or approved Range Extender Antenna. Alleen voor gebruik binnenshuis met ingebouwde of goedgekeurde reikwijdteversterkerantenne. Only indoor with integral or approved Range Extender Antenna. Alleen voor gebruik binnenshuis met ingebouwde of goedgekeurde reikwijdteversterkerantenne. For indoor use only. Alleen voor gebruik binnen.
Netherlands Nederland
G11FNF-PC G13ENE-PC
CE 0336 ! CE 0336 !
Netherlands Nederland
Netherlands Nederland
Only indoor with integral or approved Range Extender Antenna. Alleen voor gebruik binnenshuis met ingebouwde of goedgekeurde reikwijdteversterkerantenne. Only with approved Range Extender Antenna. Alleen gebruiken met goedgekeurde externe antenne. Only indoor with integral or approved Range Extender Antenna. Alleen binnen te gebruiken met goedgekeurde Externe Antenne. Only indoor with integral or approved Range Extender Antenna. Alleen binnen te gebruiken met goedgekeurde Externe Antenne. For indoor use only. Alleen voor gebruik binnen.
Netherlands Nederland
Netherlands Nederland
232
Regulatory Information
Country Pays Paese Land Pas Radio Transmitter Approval Reference Restrictions metteur Radio Numro du Permis Restrictions Trasmittente de Numero di Limitazioni Radio Approvazione Beschrnkungen Radio-bermittler Zustimmung-Nummer Restricciones Transmisor de Nmero de Permiso Radio RFS ENG 3/2/RFS29 RFS
New Zealand PC24E-H-FC PC24E-11-FC/R PC24E-H-ET-L PC24E-H-ET PC24E-11-ET/R Norway Norsk PC24E-H-FC PC24E-H-ET-L PC24E-H-ET PC24E-11-FC/R PC24E-11-ET/R
CE 0336 !
Only indoor with integral or approved Range Extender Antenna. Bare innendrs med integral eller godkjent antenne med utvidet rekkevidde. Only indoor with integral or approved Range Extender Antenna. Bare innendrs med integral eller godkjent antenne med utvidet rekkevidde. Only indoor with integral or approved Range Extender Antenna. Bare innendrs med integral eller godkjent antenne med utvidet rekkevidde. Only indoor with integral or approved Range Extender Antenna. Bare innendrs med integral eller godkjent antenne med utvidet rekkevidde. For indoor use only. Bruk bare innenfor Only indoor with integral or approved Range Extender Antenna. Bare innendrs med integral eller godkjent antenne med utvidet rekkevidde. Only indoor with integral or approved Range Extender Antenna. Bare innendrs med integral eller godkjent antenne med utvidet rekkevidde. For indoor use only. Bruk bare innenfor.
Norway Norsk
G11FNF-PC G13ENE-PC
CE 0336 ! CE 0336 !
Norway Norsk
Norway Norsk
Norway Norsk
Alpha-1: A04LAE
CE 0336 !
PC24E-H-FC
AVBS1816
233
Regulatory Information
Country Pays Paese Land Pas Radio Transmitter Approval Reference Restrictions metteur Radio Numro du Permis Restrictions Trasmittente de Numero di Limitazioni Radio Approvazione Beschrnkungen Radio-bermittler Zustimmung-Nummer Restricciones Transmisor de Nmero de Permiso Radio PC24E-H-FC PC24E-H-FC/R PC24E-H-ET-L PC24E-H-ET PC24E-H-ET/R Portugal PC24E-H-FC PC24E-11-FC/R PC24E-11-ET/R 072/2002 CE 0122 ! CE 0336 ! Only indoor with integral or approved Range Extender Antenna. Somente indoor com a antena integral ou aprovada do extender da escala. Only indoor with integral or approved Range Extender Antenna. Somente indoor com a antena integral ou aprovada do extender da escala. Only indoor with integral or approved Range Extender Antenna. Somente indoor com a antena integral ou aprovada do extender da escala. Only indoor with integral or approved Range Extender Antenna. Somente indoor com a antena integral ou aprovada do extender da escala. For indoor use only. Para dentro de casa usar apenas Only indoor with integral or approved Range Extender Antenna. Somente indoor com a antena integral ou aprovada do extender da escala. 688/2000 072/2002
Poland
Portugal
G11FNF-PC G13ENE-PC
CE 0336 ! CE 0336 !
Portugal
Portugal
Portugal
Portugal
Alpha-1: A04LAE
CE 0336 !
Russia
G11FNF-PC G13ENE-PC
234
Regulatory Information
Country Pays Paese Land Pas Radio Transmitter Approval Reference Restrictions metteur Radio Numro du Permis Restrictions Trasmittente de Numero di Limitazioni Radio Approvazione Beschrnkungen Radio-bermittler Zustimmung-Nummer Restricciones Transmisor de Nmero de Permiso Radio Reference 10/36 of 18-3-2002 Reference 10/36 of 18-3-2002 Reference 10/36 of 18-3-2002 Reference 10/36 of 18-3-2002 Reference 10/36 of 18-3-2002 Reference 1355 HT/T Reference 1355 HT/T IDA: PMREQ-0267-2000 IDA: PMREQ-0029-2002 IDA: PMREQ-WLAN-B-0934 -99 IDA: PMREQ-0030-2002 IDA: PMREQ-0693-2003 IDA: PMREQ-0634-2002 IDA: PMREQ-0122-2003 This equipment is allowed for use in a confined area of a building as well as in localized on-site operation. This equipment is allowed for use in a confined area of a building as well as in localized on-site operation. This equipment is allowed for use in a confined area of a building as well as in localized on-site operation. This equipment is allowed for use in a confined area of a building as well as in localized on-site operation. This equipment is allowed for use in a confined area of a building as well as in localized on-site operation. This equipment is allowed for use in a confined area of a building as well as in localized on-site operation. This equipment is allowed for use in a confined area of a building as well as in localized on-site operation.
Saudi Arabia PC24E-H-FC PC24E-11-FC/R PC24E-H-ET PC24E-H-ET-L PC24E-11ET/R Saudi Arabia G11FNF-PC G13ENE-PC Singapore PC24E-H-FC PC24E-11-FC/R PC24E-H-ET
Singapore
PC50E-4-FC/A A09SBS-PC
Singapore
Alpha-1: B13ENE IDA: PMREQ-0121-2003 Alpha-1: G13ENE IDA: PMREQ-0688-2003 Alpha-1: C38WCW IDA: pending
Singapore
Singapore
This equipment is allowed for use in a confined area of a building as well as in localized on-site operation.
235
Regulatory Information
Country Pays Paese Land Pas Radio Transmitter Approval Reference Restrictions metteur Radio Numro du Permis Restrictions Trasmittente de Numero di Limitazioni Radio Approvazione Beschrnkungen Radio-bermittler Zustimmung-Nummer Restricciones Transmisor de Nmero de Permiso Radio PC24E-H-FC PC24E-H-ET-L PC24E-H-ET South Africa G11FNF-PC G13ENE-PC Spain Espaa PC24E-H-FC PC24E-H-ET-L PC24E-H-ET PC24E-11-FC/R PC24E-11-ET/R ICASA: TA-2003/93 ICASA: TA-2003/93 CE 0122 ! 01 00 0196 01 00 0195 CE 0336 ! CE 0336 ! Only indoor with integral or approved Range Extender Antenna. Slo en interiores, con antena integrada o antena de extensin de alcance aprobada Only indoor with integral or approved Range Extender Antenna. Slo en interiores, con antena integrada o antena de extensin de alcance aprobada. Only indoor with integral or approved Range Extender Antenna. Slo en interiores, con antena integrada o antena de extensin de alcance aprobada Only indoor with integral or approved Range Extender Antenna. Slo en interiores, con antena integrada o antena de extensin de alcance aprobada Only indoor with integral or approved Range Extender Antenna. Slo en interiores, con antena integrada o antena de extensin de alcance aprobada
South Africa
Spain Espaa
G11FNF-PC G13ENE-PC
CE 0336 ! CE 0336 !
Spain Espaa
Spain Espaa
Only indoor with integral or approved Range Extender Antenna. Endast inomhus med integrerad antenn eller godknd antenn med lngre rckvidd.
236
Regulatory Information
Country Pays Paese Land Pas Radio Transmitter Approval Reference Restrictions metteur Radio Numro du Permis Restrictions Trasmittente de Numero di Limitazioni Radio Approvazione Beschrnkungen Radio-bermittler Zustimmung-Nummer Restricciones Transmisor de Nmero de Permiso Radio G11FNF-PC G13ENE-PC CE 0336 ! CE 0336 ! Only indoor with integral or approved Range Extender Antenna. Endast inomhus med integrerad antenn eller godknd antenn med lngre rckvidd. Only indoor with integral or approved Range Extender Antenna. Endast inomhus med integrerad antenn eller godknd antenn med lngre rckvidd. Only indoor with integral or approved Range Extender Antenna. Endast inomhus med integrerad antenn eller godknd antenn med lngre rckvidd. For indoor use only. Fr indoor anvnda bara.
Sweden Sverige
Sweden Sverige
Sweden Sverige
Only indoor with integral or approved Range Extender Antenna. Endast inomhus med integrerad antenn eller godknd antenn med lngre rckvidd. Only indoor with integral or approved Range Extender Antenna. Endast inomhus med integrerad antenn eller godknd antenn med lngre rckvidd. For indoor use only. Fr indoor anvnda bara.
Sweden Sverige
Alpha-1: A04LAE
CE 0336 !
CE 0122 ! BAKOM 99.0538.L.P CE 0122 ! CE 0336 ! CE-0336 ! Only indoor with integral or approved Range Extender Antenna. Pour usage intrieur uniquement, avec une antenne intgrale ou amplificatrice approuve. Nur zum Einsatz innerhalb von Gebuden (mit der integrierten Antenne oder einer zugelassenen Reichweitenverstrkerantenne). Solo per interni con Antenna Range Extender integrale o approvata.
237
Regulatory Information
Country Pays Paese Land Pas Radio Transmitter Approval Reference Restrictions metteur Radio Numro du Permis Restrictions Trasmittente de Numero di Limitazioni Radio Approvazione Beschrnkungen Radio-bermittler Zustimmung-Nummer Restricciones Transmisor de Nmero de Permiso Radio G11FNF-PC G13ENE-PC CE 0336 ! CE 0336 ! Only indoor with integral or approved Range Extender Antenna. Pour usage intrieur uniquement, avec une antenne intgrale ou amplificatrice approuve. Nur zum Einsatz innerhalb von Gebuden (mit der integrierten Antenne oder einer zugelassenen Reichweitenverstrkerantenne). Solo per interni con Antenna Range Extender integrale o approvata. For indoor use only. Pour usage intrieur uniquement. Nur fr Innengebrauch. Per uso interno solo. Only indoor with integral or approved Range Extender Antenna. Pour usage intrieur uniquement, avec une antenne intgrale ou amplificatrice approuve. Nur zum Einsatz innerhalb von Gebuden (mit der integrierten Antenne oder einer zugelassenen Reichweitenverstrkerantenne). Solo per interni con Antenna Range Extender integrale o approvata. Only indoor with integral or approved Range Extender Antenna. Pour usage intrieur uniquement, avec une antenne intgrale ou amplificatrice approuve. Nur zum Einsatz innerhalb von Gebuden (mit der integrierten Antenne oder einer zugelassenen Reichweitenverstrkerantenne). Solo per interni con Antenna Range Extender integrale o approvata. Only indoor with integral or approved Range Extender Antenna. Pour usage intrieur uniquement, avec une antenne intgrale ou amplificatrice approuve. Nur zum Einsatz innerhalb von Gebuden (mit der integrierten Antenne oder einer zugelassenen Reichweitenverstrkerantenne). Solo per interni con Antenna Range Extender integrale o approvata.
PC50E-4-ET/A A19PCE-PC
CE 0336 ! CE 0560 !
238
Regulatory Information
Country Pays Paese Land Pas Radio Transmitter Approval Reference Restrictions metteur Radio Numro du Permis Restrictions Trasmittente de Numero di Limitazioni Radio Approvazione Beschrnkungen Radio-bermittler Zustimmung-Nummer Restricciones Transmisor de Nmero de Permiso Radio AP-700: AP-AG-AT-01 CE 0560 ! For indoor use only. Pour usage intrieur uniquement. Nur fr Innengebrauch. Per uso interno solo.
AP-4000: AP-AG-AT-02
CE 0560 !
Alpha-1: A04LAE
CE 0336 !
For indoor use only. Pour usage intrieur uniquement. Nur fr Innengebrauch. Per uso interno solo.
PC24E-H-ET
0704/4184
Alpha-1: G13ENE 4937 G11FNF-PC G13ENE-PC PC24E-H-FC PC24E-11-FC/R 5361 5361 DGT: 89LP0064 (98-7-24) DGT: 91LP0025 (91-2-5) DGT: 92LP0349 DGT: 92LP0444 DGT: 92LP0275 BSMI 3912A213
Alpha-1: G13FNF DGT: 92LP0350 Alpha-1: C38WCW DGT: 92LP0607 AP-700: AP-AT-AG-01 AP-4000: AP-AT-AG-02 Alpha-1: A09TBT DGT: pending DGT: pending DGT: 92LP0276
239
Regulatory Information
Country Pays Paese Land Pas Radio Transmitter Approval Reference Restrictions metteur Radio Numro du Permis Restrictions Trasmittente de Numero di Limitazioni Radio Approvazione Beschrnkungen Radio-bermittler Zustimmung-Nummer Restricciones Transmisor de Nmero de Permiso Radio PC24E-H-FC PC24E-H-ET-L PC24E-H-ET PC24E-11-FC/R PC24E-11-ET/R United Kingdom G11FNF-PC G13ENE-PC United Kingdom United Kingdom United Kingdom United Kingdom CE 0122 ! R0167 SRD3a CE 0122 ! CE 0336 ! CE 0336 ! CE 0336 ! CE 0336 ! Only indoor with integral or approved Range Extender Antenna. Only indoor with integral or approved Range Extender Antenna. Only indoor with integral or approved Range Extender Antenna. Only indoor with integral or approved Range Extender Antenna.
United Kingdom
Only indoor with integral or approved Range Extender Antenna. For indoor use only.
Alpha-1: A04LAE
CE 0336 !
Alpha-1: A08NAE CE 0336 ! United Kingdom Alpha-1: G11FNF CE 0336 ! Alpha-1: G13ENE CE 0336 ! USA PC24E-H-FC PC24E-11-FC/R FCC ID: IMRWLPCE24H FCC ID: IMRWLPCE2411R FCC ID: IMRWLPC2411R FCC ID: HZB-G11FNFPC FCC ID: IMRWLPCE508A FCC ID: HZB-A13QBFPC Only indoor with integral or approved Range Extender Antenna. For indoor use only. Only indoor with integral or approved Range Extender Antenna. Only indoor with integral or approved Range Extender Antenna.
USA
PC50E-8-FC/A A13QBF-PC
240
Regulatory Information
Country Pays Paese Land Pas Radio Transmitter Approval Reference Restrictions metteur Radio Numro du Permis Restrictions Trasmittente de Numero di Limitazioni Radio Approvazione Beschrnkungen Radio-bermittler Zustimmung-Nummer Restricciones Transmisor de Nmero de Permiso Radio Alpha-1: B11FNF FCC ID: HZB-B11FNF
Alpha-1: G11FNF FCC ID: HZB-G11FNF Alpha-1: A13QBF FCC ID: HZB-A13QBF For indoor use only. Alpha-1: C38WCW FCC ID: HZB-C38WCW For indoor use only. AP-700: AP-AG-AT-01 AP-4000: AP-AG-AT-02 PC24E-11-FC/R FCC ID: IXMAPAGAT01 FCC ID: IXMAPAGAT01 CONATEL: 01388301 For indoor use only. For indoor use only.
For Radio Type Numbers with the format PCxxE-y-zz: xx =24 identifies a IEEE 802.11b compliant WLAN radio product for the 2.4 GHz frequency band. 50 identifies a IEEE 802.11a compliant WLAN radio product for the 5 GHz frequency band. E = optional identifier to indicate that the transmitter has an integral antenna. y =H or 11 identifies a transmitter that supports high speed data transfer of 11, 5.5, 2 and 1 Mbps. 4 or 8 identifies the number of channels. zz =FC or FC/R identifies a 11 channel FCC compliant worldcard restricted to operate in the 2.412 - 2.462 GHz frequency band. FC/A identifies a IEEE 802.11a radio transmitter compliant with the FCC rules. ET or ET/R identifies a 13 channel radio transmitter compliant with the European Union regulations. ET/A or ET/B or ET/C identifies a IEEE 802.11a radio transmitter, compliant with the European Union regulations. FR or FR/R identifies a radio transmitter compliant with the French regulations. JP or JP/R identifies a 14 channel radio transmitter compliant with the Japanese regulations. JP/A identifies a IEEE 802.11a radio transmitter compliant with the Japanese regulations. For Radio Type Numbers with the format qrrsss: q =B identifies a IEEE 802.11b compliant WLAN radio product for the 2.4 GHz frequency band. C identifies a product that conforms to IEEE 802.11a/b/g G identifies a IEEE 802.11g compliant WLAN radio product for the 2.4 GHz frequency band. A identifies a IEEE 802.11a compliant WLAN radio product for the 5 GHz frequency band. rr = 04, 05, 08, 09, 11, 13, 14 or 19 identifies the number of channels. sss = ENE /LAE / NAE / PCE = ETSI (Europe) FNF /QBF = FCC GNJ / LEJ = Japan INI = Israel Le code pour le type de radio qui a le format PCxxE-y-zz : xx =24 indique un produit conforme la norme IEEE 802.11b avec une radio 2,4 GHz. 50 indique un produit conforme la norme IEEE 802.11a avec une radio 5 GHz. E =identificateur facultatif pour indiquer que l'metteur a une antenne intgrale. y =H ou 11 indique un metteur qui prend en charge les transferts haute vitesse : 11, 5.5, 2 and 1 Mb/s. SBS = Singapore TBT = Taiwan VBA = Asia (China, South Korea) WCW = WORLD
241
Regulatory Information
4 ou 8 indique le nombre de canaux. zz =FC ou FC/R identifie un carte universelle 11 canaux, conforme aux normes FCC, qui opre dans la zone de 2.412 - 2.462 GHz seulement. FC/A identifie un metteur radio IEEE 802.11a conforme aux normes FCC. ET ou ET/R identifie un metteur radio 13 canaux conforme aux normes de la Communaut Europene. ET/A ou ET/B ou ET/C identifie un metteur radio IEEE 802.11a conforme aux normes de la Communaut Europene. FR ou FR/R identifie un metteur radio conforme aux normes franaises. JP ou JP/R identifie un metteur radio 14 canaux conforme aux normes japonaises. JP/A identifie un metteur radio IEEE 802.11a conforme aux normes japonaises. Le code pour le type de radio qui a le format qrrsss: q =B indique un produit conforme la norme IEEE 802.11b avec une radio 2,4 GHz. C identifie un produit qui se conforme IEEE 802.11a/b/g G indique un produit conforme la norme IEEE 802.11g avec une radio 2,4 GHz. A indique un produit conforme la norme IEEE 802.11a avec une radio 5 GHz. rr = 04, 05, 08, 09, 11, 13, 14 ou 19 indique le nombre de canaux. sss = ENE /LAE / NAE / PCE = ETSI (Europe) FNF /QBF = FCC GNJ / LEJ = Japan INI = Israel Il numero del tipo di radio che ha il formato PCxxE-y-zz: xx =24 identifica un prodotto che conforma alle normative IEEE 802.11b per una radio a 2,4 GHz. 50 identifica un prodotto che conforma alle normative IEEE 802.11b per una radio a 5 GHz. E =contrassegno facoltativo per indicare che il trasmettitore ha un'antenna integrale. y =H o 11 identifica un trasmettitore che supporta alle normative di alta velocit: 11, 5.5, 2 and 1 Mb/s. 4 o 8 identifica il nombre de canales. zz =FC o FC/R identifica un trasmittore a 11 canali conforma alle normative FCC che funciona nella banda di 2.412 2.462 GHz. FC/A identifica un trasmittore radio IEEE 802.11a conforma alle normative FCC. ET o ET/R identifica un trasmittore a 13 canali conforma alle normative della Comunit Europea. ET/A o ET/B o ET/C identifica un trasmittore radio IEEE 802.11a conforma alle normative della Comunit Europea. FR o FR/R identifica un trasmittore radio che conforma alle normative in vigore in Francia. JP o JP/R identifica un trasmittore a 13 canali conforma alle normative nel Giappone. JP/A identifica un trasmittore radio IEEE 802.11a conforma alle normative nel Giaponne. Il numero del tipo di radio che ha il formato qrrsss: q =B identifica un prodotto che conforma alle normative IEEE 802.11b per una radio a 2,4 GHz. C identifica un prodotto che conforme a IEEE 802.11a/b/g G identifica un prodotto che conforma alle normative IEEE 802.11g per una radio a 2,4 GHz. A identifica un prodotto che conforma alle normative IEEE 802.11b per una radio a 5 GHz. rr = 04, 05, 08, 09, 11, 13, 14 o 19 identifica il nombre de canales. sss = ENE /LAE / NAE / PCE = ETSI (Europe) FNF /QBF = FCC GNJ / LEJ = Japan INI = Israel SBS = Singapore TBT = Taiwan VBA = Asia (China, South Korea) WCW = WORLD SBS = Singapore TBT = Taiwan VBA = Asia (China, South Korea) WCW = WORLD
Die Nummer des Transmittertyps die hat das Format PCxxE-y-zz: xx =24 kennzeichnet ein WLAN IEEE 802.11b geflliges Radioprodukt fr das 2,4 GHz Frequenzband. 50 kennzeichnet ein WLAN IEEE 802.11a geflliges Radioprodukt fr das 5 GHz Frequenzband.
242
Regulatory Information
E =wahlweise freigestellte Kennung, zum anzuzeigen, da der bermittler eine integrale Antenne hat. y =H oder 11 kennzeichnet einen Funksender, der hohe Datentransferraten bis zu 11, 5,5, 2 und 1 Mbps untersttzt. 4 oder 8 kennzeichnet die Zahl Funkkanlen. zz =FC oder FC/R kennzeichnet eine FCC-konforme "Worldcard" mit 11 Kanlen, die auf den Betrieb in einem Frequenzband von 2,412 - 2,462 GHz beschrnkt ist. FC/A kennzeichnet einen IEEE 802.11a Radiobermittler, der mit den FCC Richtlinien gefllig ist.. ET oder ET/R kennzeichnet einen Funksender mit 13 Kanlen, der mit den EG-Bestimmungen konform ist. ET/A oder ET/B oder ET/C kennzeichnet einen IEEE 802.11a Radiobermittler, der mit europischen Regelungen gefllig ist. FR oder FR/R kennzeichnet einen IEEE 802.11a Radiobermittler, der mit franzsische Regelungen gefllig ist. JP oder JP/R kennzeichnet einen Funksender mit 14 Kanlen, der mit den japanischen Bestimmungen konform ist. JP/A kennzeichnet einen IEEE 802.11a Radiobermittler, der mit japanische Regelungen gefllig ist. Die Nummer des Transmittertyps die hat das Format qrrsss: q =B kennzeichnet ein WLAN IEEE 802.11a geflliges Radioprodukt fr das 2,4 GHz Frequenzband. C kennzeichnet ein Produkt, das an IEEE 802.11a/b/g sich anpat G kennzeichnet ein WLAN IEEE 802.11g geflliges Radioprodukt fr das 2,4 GHz Frequenzband. A kennzeichnet ein WLAN IEEE 802.11a geflliges Radioprodukt fr das 5 GHz Frequenzband. rr = 04, 05, 08, 09, 11, 13, 14 oder 19 kennzeichnet die Zahl Funkkanlen. SBS = Singapore TBT = Taiwan VBA = Asia (China, South Korea) WCW = WORLD sss = ENE /LAE / NAE / PCE = ETSI (Europe) FNF /QBF = FCC GNJ / LEJ = Japan INI = Israel El nmero de tipo de radio que tiene el formato PxxE-y-zz: xx =24 identifica un producto de radio obediente el estandard WLAN IEEE 802.11b para la banda de frecuencia de 2,4 GHz. 50 identifica un producto de radio obediente el estandard WLAN IEEE 802.11a para la banda de frecuencia de 5 GHz. E =identificador opcional para indicar que el transmisor tiene una antena integral. y =H o 11 identifica un transmisor que soporta transferencia de datos a alta velocidad de 11, 5,5, 2 y 1 Mbps. 4 o 8 identifica el nmero de canales. zz =FC o FC/R identifica una 'worldcard' de 11 canales que cumple con la FCC, limitada para operar nicamente en la banda de frecuencia 2,412 - 2,462 GHz. FC/A identifica un radiotransmisor de IEEE 802.11a obediente con las reglas de la FCC. ET o ET/R identifica un radiotransmisor de 13 canales que cumple con las regulaciones de la Unin Europea. ET/A o ET/B o ET/C identifica un radiotransmisor de IEEE 802.11a obediente con las regulaciones de la union europea. FR o FR/R identifica un radiotransmisor de IEEE 802.11a obediente con las regulaciones francesas. JP o JP/R identifica un radiotransmisor de 14 canales que cumple con las regulaciones japonesas. JP/A identifica un radiotransmisor de IEEE 802.11a obediente con las regulaciones japonesas. El nmero de tipo de radio que tiene el formato qrrsss: q =B identifica un producto de radio obediente el estandard WLAN IEEE 802.11a para la banda de frecuencia de 2,4 GHz. C identifica un producto que se conforme con IEEE 802.11a/b/g G identifica un producto de radio obediente el estandard WLAN IEEE 802.11g para la banda de frecuencia de 2,4 GHz. A identifica un producto de radio obediente el estandard WLAN IEEE 802.11a para la banda de frecuencia de 5 GHz rr = 04, 05, 08, 09, 11, 13, 14 o 19 identifica el nmero de canales. sss = ENE /LAE / NAE / PCE = ETSI (Europe) FNF /QBF = FCC SBS = Singapore TBT = Taiwan
243
Regulatory Information
GNJ / LEJ = Japan INI = Israel VBA = Asia (China, South Korea) WCW = WORLD
PCxxE-y-zz xx =24 2.4 GH IEEE 802.11b WLAN 50 5 GH IEEE 802.11a WLAN E = y =H 11 115.52 1 Mbps 4 8 zz =FC FC/R 2.412 ~ 2.462 GHz FCC 11 Worldcard FC/A FCC IEEE 802.11a ET = ET/R 13 ET/A ET/B ET/C IEEE 802.11a FR FR/R JP JP/R 14 JP/A IEEE 802.11a qrrsss q =B 2.4 GHz IEEE 802.11b WLAN G 2.4 GHz IEEE 802.11g WLAN A 5 GHz IEEE 802.11a WLAN rr =04050809111314 19
sss = ENE /LAE / NAE / PCE = ETSI (Europe) FNF /QBF = FCC GNJ / LEJ = Japan INI = Israel SBS = Singapore TBT = Taiwan VBA = Asia (China, South Korea) WCW = WORLD
244