Compex WP54AG 1a Uživatelská příručka

Procházejte online nebo si stáhněte Uživatelská příručka pro Směrovače Compex WP54AG 1a. Compex WP54AG 1a User guide [en] Uživatelská příručka

  • Stažení
  • Přidat do mých příruček
  • Tisk
  • Strana
    / 261
  • Tabulka s obsahem
  • ŘEŠENÍ PROBLÉMŮ
  • KNIHY
  • Hodnocené. / 5. Na základě hodnocení zákazníků

Shrnutí obsahu

Strany 1 - PoE Access Point

www.3Com.com Part Number 10015153 Rev. AAUser Guide3Com Wireless 8760 Dual-radio 11a/b/g PoE Access Point3CRWE876075 / WL-546Published June, 2006

Strany 2 - 01752-3064

1-2CHAPTER 1: INTRODUCTIONPRODUCT FEATURESAccess Point 8760—Creates an enterprise-class wireless LAN supporting up to 256 simultaneous users. The acce

Strany 3 - Contents

4-60CHAPTER 4: SYSTEM CONFIGURATION HTTP Server: Shows if management access via HTTP is enabled. HTTP Server Port: Shows the TCP port used by the HT

Strany 4 - 4 System Configuration

4-61Securitysystem” and “shared key.” Open-system authentication accepts any client attempting to connect to the access point without verifying its id

Strany 5 - 6 Troubleshooting

4-62CHAPTER 4: SYSTEM CONFIGURATIONError Messages – An example of a logged error message is: “Station Failed to authenticate (unsupported algorithm).”

Strany 6

5-15COMMAND LINE INTERFACEUSING THE COMMAND LINE INTERFACEACCESSING THE CLIWhen accessing the management interface for the over a direct connection to

Strany 7 - TERMINOLOGY

5-2CHAPTER 5: COMMAND LINE INTERFACETelnet ConnectionTelnet operates over the IP transport protocol. In this environment, your management station and

Strany 8

5-3Using the Command Line InterfaceENTERING COMMANDSThis section describes how to enter CLI commands.Keywords and ArgumentsA CLI command is a series o

Strany 9 - 1 INTRODUCTION

5-4CHAPTER 5: COMMAND LINE INTERFACEShowing CommandsIf you enter a “?” at the command prompt, the system will display the first level of keywords for

Strany 10 - PRODUCT FEATURES

5-5Using the Command Line InterfaceNegating the Effect of CommandsFor many configuration commands you can enter the prefix keyword “no” to cancel the

Strany 11 - PERFORMANCE AND RELIABILITY

5-6CHAPTER 5: COMMAND LINE INTERFACEConfiguration CommandsConfiguration commands are used to modify access point settings. These commands modify the r

Strany 12 - WIRELESS NETWORK STANDARDS

5-7Using the Command Line InterfaceTable 9 Keystroke CommandsCOMMAND GROUPSThe system commands can be broken down into the functional groups shown b

Strany 13 - APPROVED CHANNELS

1-3Product FeaturesPERFORMANCE AND RELIABILITY3Com wireless access point performance features ensure reliable and seamless connections for users where

Strany 14 - CHAPTER 1: INTRODUCTION

5-8CHAPTER 5: COMMAND LINE INTERFACEThe access mode shown in the following tables is indicated by these abbreviations: Exec (Executive Mode), GC (Glob

Strany 15 - 2 INSTALLING THE ACCESS POINT

5-9Using the Command Line InterfaceDefault Setting NoneCommand Mode ExecExample Related Commands end (5-9)endThis command returns to the previous conf

Strany 16 - SAFETY INFORMATION

5-10CHAPTER 5: COMMAND LINE INTERFACEexitThis command returns to the Exec mode or exits the configuration program.Default Setting NoneCommand Mode Any

Strany 17 - PERFORMING A SITE SURVEY

5-11Using the Command Line Interface- Destination unreachable - The gateway for this destination indicates that the destination is unreachable. - Netw

Strany 18 - BEFORE YOU BEGIN

5-12CHAPTER 5: COMMAND LINE INTERFACEshow historyThis command shows the contents of the command history buffer.Default Setting NoneCommand Mode ExecCo

Strany 19 - Console Port

5-13Using the Command Line InterfaceSystem Management CommandsThese commands are used to configure the user name, password, system logs, browser manag

Strany 20 - CONNECTING POWER

5-14CHAPTER 5: COMMAND LINE INTERFACEcountryThis command configures the access point’s country code, which identifies the country of operation and set

Strany 21 - Figure 3 Connecting Power

5-15Using the Command Line InterfaceDefault Setting US - for units sold in the United States 99 (no country set) - for units sold in other countriesCo

Strany 22 - USING THE POWER SUPPLY

5-16CHAPTER 5: COMMAND LINE INTERFACEDefault Setting Enterprise APCommand Mode Global ConfigurationExample system nameThis command specifies or modifi

Strany 23 - CHECKING THE LEDS

5-17Using the Command Line InterfaceDefault Setting adminCommand Mode Global ConfigurationExamplepasswordAfter initially logging onto the system, you

Strany 24

1-4CHAPTER 1: INTRODUCTIONMANAGEABILITY3Com offers a wide range of standards-based management support, from SNMP to 3Com Network Supervisor and HP Ope

Strany 25 - Figure 5 Mounting Bracket

5-18CHAPTER 5: COMMAND LINE INTERFACECommand Mode Interface Configuration (Ethernet)Command Usage • The access point supports Secure Shell version 2.0

Strany 26 - FLAT SURFACE INSTALLATION

5-19Using the Command Line InterfaceCommand Mode Interface Configuration (Ethernet)Exampleip http portThis command specifies the TCP port number used

Strany 27 - Side Side

5-20CHAPTER 5: COMMAND LINE INTERFACECommand Mode Global ConfigurationExample Related Commandsip http port (5-19)ip https portUse this command to spec

Strany 28 - INSTALLING SOFTWARE UTILITIES

5-21Using the Command Line Interfaceip https serverUse this command to enable the secure hypertext transfer protocol (HTTPS) over the Secure Socket La

Strany 29 - 3 INITIAL CONFIGURATION

5-22CHAPTER 5: COMMAND LINE INTERFACEweb-redirectUse this command to enable web-based authentication of clients. Use the no form to disable this funct

Strany 30 -  Password: password

5-23Using the Command Line InterfaceAPmgmtIPThis command specifies the client IP addresses that are allowed management access to the access point thro

Strany 31

5-24CHAPTER 5: COMMAND LINE INTERFACEExampleThis example restricts management access to the indicated addresses.APmgmtUIThis command enables and disab

Strany 32 - USING THE SETUP WIZARD

5-25Using the Command Line Interfaceshow apmanagementThis command shows the AP management configuration, including the IP addresses of management stat

Strany 33 - Figure 10 Login Page

5-26CHAPTER 5: COMMAND LINE INTERFACEshow systemThis command displays basic system configuration settings.Default SettingNoneCommand Mode ExecExampleE

Strany 34 - Figure 11 Home Page

5-27Using the Command Line Interfaceshow versionThis command displays the software version for the system.Command Mode ExecExample show configThis com

Strany 35 - Using the Setup Wizard

1-5Wireless Network Standards802.11A802.11a operates at the 5 GHz band and supports data rates at up to 54 Mbps. For those organizations demanding eve

Strany 36 -  802.11b/g

5-28CHAPTER 5: COMMAND LINE INTERFACEProtocol Filter Information===========================================================Local Bridge :DISAB

Strany 37

5-29Using the Command Line Interface----------------Security-----------------------------------Closed System : DISABLEDMulticast cipher

Strany 38

5-30CHAPTER 5: COMMAND LINE INTERFACERadius Secondary Server Information========================================IP : 0.0.0.0Port

Strany 39 - 5 Click Finish

5-31Using the Command Line InterfaceSNTP Information===========================================================Service State : DisabledSNTP (se

Strany 40

5-32CHAPTER 5: COMMAND LINE INTERFACEshow hardwareThis command displays the hardware version of the system.Command Mode ExecExample System Logging Com

Strany 41 - 4 SYSTEM CONFIGURATION

5-33Using the Command Line Interfacelogging onThis command controls logging of error messages; i.e., sending debug or error messages to memory. The no

Strany 42 - ADVANCED SETUP

5-34CHAPTER 5: COMMAND LINE INTERFACEDefault Setting NoneCommand Mode Global ConfigurationExample logging consoleThis command initiates logging of err

Strany 43 - Advanced Setup

5-35Using the Command Line InterfaceCommand Usage Messages sent include the selected level down to Emergency level.Example logging facility-typeThis c

Strany 44 - SYSTEM IDENTIFICATION

5-36CHAPTER 5: COMMAND LINE INTERFACEExample logging clearThis command clears all log messages stored in the access point’s memory.Syntaxlogging clear

Strany 45 - TCP / IP SETTINGS

5-37Using the Command Line Interfaceshow event-logThis command displays log messages stored in the access point’s memory.Syntaxshow event-logCommand M

Strany 46 - (0.0.0.0)

1-6CHAPTER 1: INTRODUCTION

Strany 47 - Figure 21 Smart Monitor

5-38CHAPTER 5: COMMAND LINE INTERFACEsntp-server ipThis command sets the IP address of the servers to which SNTP time requests are issued. Use the thi

Strany 48

5-39Using the Command Line InterfaceDefault Setting EnabledCommand Mode Global ConfigurationCommand Usage The time acquired from time servers is used

Strany 49 - AUTHENTICATION

5-40CHAPTER 5: COMMAND LINE INTERFACERelated Commandssntp-server enable (5-38)sntp-server daylight-savingThis command sets the start and end dates for

Strany 50

5-41Using the Command Line InterfaceCommand Mode Global ConfigurationCommand Usage This command sets the local time zone relative to the Coordinated U

Strany 51 - Figure 23 Authentication

5-42CHAPTER 5: COMMAND LINE INTERFACEDHCP Relay CommandsDynamic Host Configuration Protocol (DHCP) can dynamically allocate an IP address and other co

Strany 52

5-43Using the Command Line Interfacedhcp-relayThis command configures the primary and secondary DHCP server addresses.Syntaxdhcp-relay <primary | s

Strany 53 - Authentication

5-44CHAPTER 5: COMMAND LINE INTERFACESNMP CommandsControls access to this access point from management stations using the Simple Network Management Pr

Strany 54 - FILTER CONTROL

5-45Using the Command Line Interfacesnmp-server communityThis command defines the community access string for the Simple Network Management Protocol.

Strany 55 - Filter Control

5-46CHAPTER 5: COMMAND LINE INTERFACEDefault Setting NoneCommand Mode Global ConfigurationExample Related Commandssnmp-server location (5-46)snmp-serv

Strany 56

5-47Using the Command Line Interfacesnmp-server enable serverThis command enables SNMP management access and also enables this device to send SNMP tra

Strany 57

2-12 INSTALLING THE ACCESS POINTThis equipment must be installed in compliance with local and national building codes, regulatory restrictions, and FC

Strany 58

5-48CHAPTER 5: COMMAND LINE INTERFACE• host_name - Name of the host. (Range: 1-63 characters)• community-string - Password-like community string sent

Strany 59 - Figure 26 SNMP

5-49Using the Command Line Interface- dot11StationRequestFail - A client station has failed association, re-association, or authentication.- dot1xAuth

Strany 60

5-50CHAPTER 5: COMMAND LINE INTERFACEDefault Setting All traps enabledCommand Mode Global ConfigurationCommand Usage This command is used in conjuncti

Strany 61 - CONFIGURING SNMPV3 USERS

5-51Using the Command Line Interfacesnmp-server userThis command configures the SNMP v3 users that are allowed to manage the access point. Use the no

Strany 62 - ADMINISTRATION

5-52CHAPTER 5: COMMAND LINE INTERFACE- group-name - The name of the SNMP group to which the user is assigned (32 characters maximum). There are three

Strany 63 - Figure 29 Administration

5-53Using the Command Line Interface• ip-addr - Specifies the IP address of the management station to receive notifications.• sec-name - The defined

Strany 64 - UPGRADING FIRMWARE

5-54CHAPTER 5: COMMAND LINE INTERFACEDefault Setting NoneCommand Mode Global ConfigurationCommand Usage • The access point allows up to 10 notificatio

Strany 65 - Figure 31 Firmware Upgrade

5-55Using the Command Line InterfaceDefault Setting NoneCommand Mode Global ConfigurationExample show snmp groupsThis command displays the SNMP v3 pre

Strany 66

5-56CHAPTER 5: COMMAND LINE INTERFACEExample show snmp usersThis command displays the SNMP v3 users and settings.Syntax show snmp usersCommand ModeExe

Strany 67 - AND SPANNING TREE SETTINGS

5-57Using the Command Line InterfaceExample show snmp targetThis command displays the SNMP v3 notification target settings.Syntaxshow snmp targetComma

Strany 68

2-2CHAPTER 2: INSTALLING THE ACCESS POINT To access and use the Web configuration management system, you need a computer that is running Internet Exp

Strany 69

5-58CHAPTER 5: COMMAND LINE INTERFACEExample show snmp filter-assignmentsThis command displays the SNMP v3 notification filter assignments.Syntaxshow

Strany 70

5-59Using the Command Line Interfaceshow snmpThis command displays the SNMP configuration settings.Command Mode ExecExampleEnterprise AP#show snmpSNMP

Strany 71

5-60CHAPTER 5: COMMAND LINE INTERFACEFlash/File CommandsThese commands are used to manage the system code or configuration files.Table 18 Flash/File

Strany 72

5-61Using the Command Line Interfacecopy This command copies a boot file, code image, or configuration file between the access point’s flash memory an

Strany 73 - SYSTEM LOG

5-62CHAPTER 5: COMMAND LINE INTERFACEExample The following example shows how to upload the configuration settings to a file on the TFTP server:The fol

Strany 74 - Table 3 Logging Levels

5-63Using the Command Line InterfaceExample This example shows how to delete the test.cfg configuration file from flash memory.Related Commandsbootfil

Strany 75 - RADIO INTERFACE

5-64CHAPTER 5: COMMAND LINE INTERFACEshow bootfileThis command displays the name of the current operation code file that booted the system.Syntaxshow

Strany 76 - Figure 35 Radio Settings A

5-65Using the Command Line Interfaceradius-server addressThis command specifies the primary and secondary RADIUS servers. Syntaxradius-server [seconda

Strany 77 - Radio Interface

5-66CHAPTER 5: COMMAND LINE INTERFACEExample radius-server keyThis command sets the RADIUS encryption key. Syntax radius-server [secondary] key <ke

Strany 78 - Figure 36 Radio Settings A

5-67Using the Command Line Interfaceradius-server timeoutThis command sets the interval between transmitting authentication requests to the RADIUS ser

Strany 79 - Turbo Mode

2-3Deciding Where to Place Equipment and Performing A Site SurveyDECIDING WHERE TO PLACE EQUIPMENT AND PERFORMING A SITE SURVEYThe access point is id

Strany 80

5-68CHAPTER 5: COMMAND LINE INTERFACEExample radius-server timeout-interimThis command sets the interval between transmitting accounting updates to th

Strany 81

5-69Using the Command Line InterfaceDefault SettingNo delimiterCommand ModeGlobal ConfigurationExample radius-server vlan-formatThis command sets the

Strany 82 - 802.11B/G INTERFACE

5-70CHAPTER 5: COMMAND LINE INTERFACEExample 802.1X AuthenticationThe access point supports IEEE 802.1X access control for wireless clients. This cont

Strany 83

5-71Using the Command Line Interface802.1xThis command configures 802.1X as optionally supported or as required for wireless clients. Use the no form

Strany 84 - CONFIGURING WI-FI MULTIMEDIA

5-72CHAPTER 5: COMMAND LINE INTERFACE• When 802.1X is required, the access point enforces 802.1X authentication for all 802.11 associated stations. If

Strany 85

5-73Using the Command Line Interface802.1x session-key-refresh-rateThis command sets the interval at which unicast session keys are refreshed for asso

Strany 86 - Figure 38 WMM Backoff Times

5-74CHAPTER 5: COMMAND LINE INTERFACEExample802.1x-supplicant enableThis command enables the access point to operate as an 802.1X supplicant for authe

Strany 87 - Figure 39 WMM Configuration

5-75Using the Command Line InterfaceDefaultNoneCommand ModeGlobal ConfigurationCommand UsageThe access point currently only supports EAP-MD5 CHAP for

Strany 88

5-76CHAPTER 5: COMMAND LINE INTERFACEMAC Address Authentication Use these commands to define MAC authentication on the access point. For local MAC aut

Strany 89 - SECURITY

5-77Using the Command Line InterfaceExampleRelated Commandsaddress filter entry (5-77) 802.1x-supplicant user (5-74)address filter entryThis command e

Strany 90

2-4CHAPTER 2: INSTALLING THE ACCESS POINTConfiguring a wireless LAN can be as easy as placing a 3Com Wireless Access Point in a central area and makin

Strany 91 - Security

5-78CHAPTER 5: COMMAND LINE INTERFACEaddress filter deleteThis command deletes a MAC address from the filter table.Syntaxaddress filter delete <mac

Strany 92

5-79Using the Command Line InterfaceRelated Commandsaddress filter entry (5-77) radius-server address (5-65) 802.1x-supplicant user (5-74)mac-authenti

Strany 93

5-80CHAPTER 5: COMMAND LINE INTERFACEfilter local-bridgeThis command disables communication between wireless clients. Use the no form to disable this

Strany 94

5-81Using the Command Line Interfacefilter ap-manageThis command prevents wireless clients from accessing the management interface on the access point

Strany 95 - Figure 42 WEP Keys

5-82CHAPTER 5: COMMAND LINE INTERFACEDefaultDisabledCommand ModeGlobal ConfigurationExamplefilter ethernet-type enableThis command checks the Ethernet

Strany 96 - Wi-Fi Protected Access (WPA)

5-83Using the Command Line Interfacefilter ethernet-type protocolThis command sets a filter for a specific Ethernet type. Use the no form to disable f

Strany 97

5-84CHAPTER 5: COMMAND LINE INTERFACEExampleWDS Bridge Commands The commands described in this section are used to set the operation mode for each acc

Strany 98

5-85Using the Command Line Interfacebridge role (WDS)This command selects the bridge operation mode for the radio interface.Syntaxbridge role <ap |

Strany 99 - Figure 43 AP Status

5-86CHAPTER 5: COMMAND LINE INTERFACEbridge-link parentThis command configures the MAC address of the parent bridge node.Syntaxbridge-link parent <

Strany 100 - Figure 44 Station Status

5-87Using the Command Line Interface• In bridge mode, up to five child links can be specified using link index numbers 2 to 6. Index number 1 is reser

Strany 101 - Figure 45 Event Logs

2-5Connecting the Standard AntennasFigure 1 Front and Rear Panel DescriptionCONNECTING THE STANDARD ANTENNASThe Access Point 8760 is supplied with s

Strany 102

5-88CHAPTER 5: COMMAND LINE INTERFACEshow bridge aging-timeThis command displays the current WDS forwarding table aging time setting.Command Mode Exec

Strany 103 - NTERFACE

5-89Using the Command Line Interfaceshow bridge filter-entryThis command displays current entries in the WDS forwarding table.Command Mode ExecExample

Strany 104 - Telnet Connection

5-90CHAPTER 5: COMMAND LINE INTERFACEshow bridge linkThis command displays WDS bridge link and spanning tree settings for specified interfaces.Syntaxs

Strany 105 - ENTERING COMMANDS

5-91Using the Command Line InterfaceSpanning Tree CommandsThe commands described in this section are used to set the MAC address table aging time and

Strany 106 - Partial Keyword Lookup

5-92CHAPTER 5: COMMAND LINE INTERFACEbridge stp enableThis command enables the Spanning Tree Protocol. Use the no form to disable the Spanning Tree Pr

Strany 107 - Table 8 Command Modes

5-93Using the Command Line InterfaceDefault Setting 15 secondsCommand Mode Global ConfigurationCommand Usage This command sets the maximum time (in se

Strany 108 - Command Line Processing

5-94CHAPTER 5: COMMAND LINE INTERFACEbridge stp max-ageUse this command to configure the spanning tree bridge maximum age globally for the wireless br

Strany 109 - Table 10 Command Groups

5-95Using the Command Line InterfaceDefault Setting 32768Command Mode Global ConfigurationCommand Usage Bridge priority is used in selecting the root

Strany 110 - Table 11 General Commands

5-96CHAPTER 5: COMMAND LINE INTERFACEbridge-link port-priorityUse this command to configure the priority for the specified port. Syntax bridge-link po

Strany 111 - Enterprise AP(config)#

5-97Using the Command Line InterfaceExampleEthernet Interface Commands The commands described in this section configure connection parameters for the

Strany 112 - Username:

3Com Corporation 350 Campus Drive Marlborough, MA 01752-3064Copyright © 2006 3Com Corporation. All rights reserved. No part of this documentation may

Strany 113 - Enterprise AP#reset board

2-6CHAPTER 2: INSTALLING THE ACCESS POINTFigure 2 Antenna AdjustmentDepending on the coverage required for your site, you may want to replace the st

Strany 114

5-98CHAPTER 5: COMMAND LINE INTERFACEinterface ethernetThis command enters Ethernet interface configuration mode.Default Setting NoneCommand Mode Glob

Strany 115 - System Management Commands

5-99Using the Command Line InterfaceRelated Commands show interface ethernet (5-102)ip address This command sets the IP address for the access point.

Strany 116 - Table 13 Country Codes

5-100CHAPTER 5: COMMAND LINE INTERFACEip dhcp This command enables the access point to obtain an IP address from a DHCP server. Use the no form to res

Strany 117

5-101Using the Command Line Interfacespeed-duplexThis command configures the speed and duplex mode of a given interface when autonegotiation is disabl

Strany 118 - RD2(config)#

5-102CHAPTER 5: COMMAND LINE INTERFACECommand Usage This command allows you to disable the Ethernet port due to abnormal behavior (e.g., excessive col

Strany 119

5-103Using the Command Line InterfaceWireless Interface CommandsThe commands described in this section configure connection parameters for the wireles

Strany 120 - Enterprise AP(if-ethernet)#

5-104CHAPTER 5: COMMAND LINE INTERFACEinterface wirelessThis command enters wireless interface configuration mode.Syntaxinterface wireless <a | g&g

Strany 121

5-105Using the Command Line InterfacevapThis command provides access to the VAP (Virtual Access Point) interface configuration mode.Syntaxvap <vap-

Strany 122

5-106CHAPTER 5: COMMAND LINE INTERFACEExampleturboThis command sets the access point to an enhanced proprietary modulation mode (not regulated in IEEE

Strany 123

5-107Using the Command Line Interfacemulticast-data-rateThis command configures the maximum data rate at which the access point transmits multicast an

Strany 124

2-7Connecting PowerIf you supply your own Ethernet cable for connecting power, be sure that it is standard category 5 straight-through (8-wire) cable

Strany 125

5-108CHAPTER 5: COMMAND LINE INTERFACEchannelThis command configures the radio channel through which the access point communicates with wireless clien

Strany 126

5-109Using the Command Line Interfacetransmit-powerThis command adjusts the power of the radio signals transmitted from the access point.Syntaxtransmi

Strany 127

5-110CHAPTER 5: COMMAND LINE INTERFACEDefault Settingb+g modeCommand ModeInterface Configuration (Wireless - 802.11g)Command Usage • For Japan, only 1

Strany 128

5-111Using the Command Line InterfaceExampleantenna controlThis command selects the use of two diversity antennas or a single antenna for the radio in

Strany 129

5-112CHAPTER 5: COMMAND LINE INTERFACEantenna idThis command specifies the antenna type connected to the access point represented by a four-digit hexa

Strany 130

5-113Using the Command Line InterfaceDefault SettingIndoorCommand ModeInterface Configuration (Wireless)Command Usage• When an external antenna is sel

Strany 131

5-114CHAPTER 5: COMMAND LINE INTERFACEdtim-period This command configures the rate at which stations in sleep mode must wake up to receive broadcast/m

Strany 132

5-115Using the Command Line Interfacefragmentation-length This command configures the minimum packet size that can be fragmented when passing through

Strany 133

5-116CHAPTER 5: COMMAND LINE INTERFACEDefault Setting 2347Command Mode Interface Configuration (Wireless)Command Usage • If the threshold is set to 0,

Strany 134 - System Logging Commands

5-117Using the Command Line InterfaceExamplesuper-g This command enables Atheros proprietary Super G performance enhancements. Use the no form to disa

Strany 135

2-8CHAPTER 2: INSTALLING THE ACCESS POINTUSING THE POWER SUPPLYThe power supply can be located at any point between the access point and the LAN acces

Strany 136

5-118CHAPTER 5: COMMAND LINE INTERFACEExamplessidThis command configures the service set identifier (SSID). Syntaxssid <string>string - The name

Strany 137

5-119Using the Command Line InterfaceCommand Mode Interface Configuration (Wireless-VAP)Command Usage When closed system is enabled, the access point

Strany 138

5-120CHAPTER 5: COMMAND LINE INTERFACEDefault Setting 30Command Mode Interface Configuration (Wireless-VAP)Exampleauth-timeout-valueThis command confi

Strany 139 - System Clock Commands

5-121Using the Command Line InterfaceCommand UsageYou must first enable VAP interface 0 before you can enable VAP interfaces 1, 2, 3, 4, 5, 6, or 7.Ex

Strany 140

5-122CHAPTER 5: COMMAND LINE INTERFACECommand Mode ExecExample Enterprise AP#show interface wireless g 0Wireless Interface Information================

Strany 141

5-123Using the Command Line Interface----------------Security-------------------------------------------------Closed System : Disabl

Strany 142

5-124CHAPTER 5: COMMAND LINE INTERFACEWMM AP ParametersAC0(Best Effort) : logCwMin: 4 logCwMax: 6 AIFSN: 3

Strany 143

5-125Using the Command Line Interfaceshow stationThis command shows the wireless clients associated with the access point.Command Mode ExecExample Rog

Strany 144 - DHCP Relay Commands

5-126CHAPTER 5: COMMAND LINE INTERFACEThe access point can be configured to periodically scan all radio channels and find other access points within r

Strany 145

5-127Using the Command Line InterfaceThe rogue AP database can be viewed using the show rogue-ap command.• The access point sends Syslog messages for

Strany 146 - Table 17 SNMP Commands

2-9Checking the LEDsCHECKING THE LEDSWhen power is connected, the access point LEDs light. The illustration and the following table describe the LEDs

Strany 147

5-128CHAPTER 5: COMMAND LINE INTERFACErogue-ap durationThis command sets the scan duration for detecting access points.Syntaxrogue-ap duration <mil

Strany 148

5-129Using the Command Line InterfaceDefault Setting720 minutesCommand Mode Interface Configuration (Wireless)Command Usage This command sets the inte

Strany 149

5-130CHAPTER 5: COMMAND LINE INTERFACEshow rogue-apThis command displays the current rogue AP database.Command Mode ExecExample Wireless Security Comm

Strany 150

5-131Using the Command Line InterfaceauthThis command configures authentication for the VAP interface.Syntaxauth <open-system | shared-key | wpa |

Strany 151

5-132CHAPTER 5: COMMAND LINE INTERFACE• To use WEP shared-key authentication, set the authentication type to “shared-key” and define at least one stat

Strany 152

5-133Using the Command Line InterfaceWEP). To place the VAP into AES only mode, use “required” and then select the “cipher-ccmp” option for the ciphe

Strany 153

5-134CHAPTER 5: COMMAND LINE INTERFACEExampleRelated Commandskey (5-134)key This command sets the keys used for WEP encryption. Use the no form to del

Strany 154

5-135Using the Command Line InterfaceExampleRelated Commandskey (5-134) encryption (5-133) transmit-key (5-135)transmit-keyThis command sets the index

Strany 155

5-136CHAPTER 5: COMMAND LINE INTERFACEcipher-suite This command defines the cipher algorithm used to encrypt the global key for broadcast and multicas

Strany 156 - .1.3.6.1.2.1.2.2.1.1.23

5-137Using the Command Line Interface• AES-CCMP (Advanced Encryption Standard Counter-Mode/CBCMAC Protocol): WPA2 is backward compatible with WPA, inc

Strany 157

2-10CHAPTER 2: INSTALLING THE ACCESS POINTWALL, CEILING, OR ELECTRICAL BOX MOUNTINGTo mount the access point to a wall, ceiling, or electrical box:1 R

Strany 158

5-138CHAPTER 5: COMMAND LINE INTERFACE• Using the “software” option provides the best performance for a large number of clients on one radio interface

Strany 159

5-139Using the Command Line Interfacepmksa-lifetime This command sets the time for aging out cached WPA2 Pairwise Master Key Security Association (PMK

Strany 160

5-140CHAPTER 5: COMMAND LINE INTERFACEDefault Setting DisabledCommand Mode Interface Configuration (Wireless-VAP)Command Usage • Each time a client ro

Strany 161 - Command Mode

5-141Using the Command Line InterfaceLink Integrity CommandsThe access point provides a link integrity feature that can be used to ensure that wireles

Strany 162 - Flash/File Commands

5-142CHAPTER 5: COMMAND LINE INTERFACEhost does not respond or is unreachable) exceeds the limit set by the link-integrity ping-fail-retry command, th

Strany 163

5-143Using the Command Line InterfaceExample link-integrity ping-fail-retryThis command configures the number of consecutive failed Ping counts before

Strany 164

5-144CHAPTER 5: COMMAND LINE INTERFACEshow link-integrityThis command displays the current link integrity configuration.Command Mode ExecExample IAPP

Strany 165

5-145Using the Command Line Interfacebetween access points from different vendors. This command is used to enable or disable 802.11f handover signalin

Strany 166 - Table 19 RADIUS Client

5-146CHAPTER 5: COMMAND LINE INTERFACEvlanThis command enables VLANs for all traffic. Use the no form to disable VLANs.Syntax[no] vlan enable DefaultD

Strany 167

5-147Using the Command Line InterfaceDefault Setting 1Command Mode Global ConfigurationCommand Usage The management VLAN is for managing the access po

Strany 168

2-11Wall, Ceiling, or Electrical Box MountingFigure 4 Routing a CableFigure 5 Mounting Bracket4 Connect the Ethernet cable to the port on the back

Strany 169

5-148CHAPTER 5: COMMAND LINE INTERFACE• If the VLAN ID has not been configured for a client on the RADIUS server, then the frames are tagged with the

Strany 170

5-149Using the Command Line InterfaceDefaultsupportedCommand ModeInterface Configuration (Wireless)Examplewmm-acknowledge-policyThis command allows th

Strany 171

5-150CHAPTER 5: COMMAND LINE INTERFACEExamplewmmparamThis command configures detailed WMM parameters that apply to the access point (AP) or the wirele

Strany 172 - 802.1X Authentication

5-151Using the Command Line InterfaceDefaultCommand ModeInterface Configuration (Wireless)ExampleAP ParametersWMM Parameters AC0 (Best Effort) AC1 (B

Strany 173

5-152CHAPTER 5: COMMAND LINE INTERFACE

Strany 174

6-16 TROUBLESHOOTINGIf you have difficulty with the 3Com Wireless LAN access point, first check the following items in the configuration: Radio Setti

Strany 175

6-2CHAPTER 6: TROUBLESHOOTINGNo operation.Verify the access point configuration.Review access point firmware revisions and update firmware if necessar

Strany 176

6-3While you are configuring the access point, the Configuration Management System stops responding.To maintain wireless association, the service area

Strany 177

6-4CHAPTER 6: TROUBLESHOOTING

Strany 178 - MAC Address Authentication

I-1INDEXNumbers3Com 3CDaemon Server Tool 2-143Com Wireless Infrastructure Device Manager 2-14802.11g 5-104Aaccess pointinstallation 2-1IP addr

Strany 179

2-12CHAPTER 2: INSTALLING THE ACCESS POINTFLAT SURFACE INSTALLATIONThe access point can also be placed on a flat surface such as a table, desktop or f

Strany 180

I-2Ggateway address 4-6, 5-2, 5-99Hhardware version, displaying 5-27HTTP, secure server 5-21HTTPS 5-21IIAPP 5-144IEEE 802.11a 4-35, 5-104c

Strany 181 - Table 22 Filtering Commands

I-3RTSthreshold 4-41, 5-115Ssafety information 2-2Secure Socket Layer See SSLsecurity, options 4-49session key 4-10, 4-13, 5-73shared key 3-

Strany 182

2-13Selecting and Connecting a Different Antenna ModelFigure 7 Connecting Antennae1 Position the antenna so that there are minimal obstacles between

Strany 183

2-14CHAPTER 2: INSTALLING THE ACCESS POINTINSTALLING SOFTWARE UTILITIESThe installation CD includes documentation and software utilities to help you s

Strany 184

3-13 INITIAL CONFIGURATIONThe Access Point 8760 offers a variety of management options, including a web-based interface.The initial configuration step

Strany 185

3Contents1 IntroductionProduct Features 1-2Security 1-2Performance and Reliability 1-3Virtual Access Point (VAP) Support 1-3WDS Bridgi

Strany 186 - WDS Bridge Commands

3-2CHAPTER 3: INITIAL CONFIGURATION1 Connect a computer directly to the Access Point using the supplied standard Category 5 UTP Ethernet cable.2 Enter

Strany 187 - Enterprise AP(if-wireless a)#

3-3Figure 8 Wireless Interface Device ManagerClick on the Properties button to see the following screenFigure 9 Wireless Interface Device Manager

Strany 188

3-4CHAPTER 3: INITIAL CONFIGURATIONDirectly connect to the device through its Ethernet port or console port. Follow the instructions below to login in

Strany 189

3-5Using the Setup WizardLogging In – Enter the username “admin,” and password “password,” then click LOGIN. For information on configuring a user nam

Strany 190 - Example

3-6CHAPTER 3: INITIAL CONFIGURATIONThe home page displays the Main Menu.Figure 11 Home PageLaunching the Setup Wizard – To perform initial configura

Strany 191

3-7Using the Setup Wizard1 Service Set ID – Enter the service set identifier in the SSID box which all wireless clients must use to associate with the

Strany 192

3-8CHAPTER 3: INITIAL CONFIGURATIONFigure 14 Setup Wizard - Step 2 802.11aTurbo Mode – If you select Enable, the access point will operate in turbo

Strany 193 - Table 24 Bridge Commands

3-9Using the Setup Wizard3 IP Configuration – Either enable or disable Dynamic Host Configuration Protocol (DHCP) for automatic IP configuration. If y

Strany 194 - Command Function Mode Page

3-10CHAPTER 3: INITIAL CONFIGURATIONFigure 16 Setup Wizard - Step 4Authentication Type – Use “Open System” to allow open access to all wireless clie

Strany 195

3-11Using the Setup Wizard5 Click Finish.6 Click the OK button to complete the wizard.Figure 17 Setup Wizard - Completed

Strany 196

43 Initial ConfigurationNetworks with a DHCP Server 3-1Networks without a DHCP Server 3-1Using the 3Com Installation CD 3-2Launch the 3COM

Strany 197

3-12CHAPTER 3: INITIAL CONFIGURATION

Strany 198

4-14 SYSTEM CONFIGURATIONBefore continuing with advanced configuration, first complete the initial configuration steps described in Chapter 4 to set u

Strany 199 - Ethernet Interface Commands

4-2CHAPTER 4: SYSTEM CONFIGURATIONFigure 18 Advanced SetupThe information in this chapter is organized to reflect the structure of the web screens f

Strany 200

4-3Advanced SetupSNMP Configures SNMP settings 4-18Administration Configures user name and password for management access; upgrades software from loca

Strany 201 - 192.254.2.253

4-4CHAPTER 4: SYSTEM CONFIGURATIONSYSTEM IDENTIFICATIONThe system name for the access point can be left at its default setting. However, modifying thi

Strany 202

4-5TCP / IP SettingsTCP / IP SETTINGSConfiguring the access point with an IP address expands your ability to manage the access point. A number of acce

Strany 203

4-6CHAPTER 4: SYSTEM CONFIGURATIONDHCP Client (Enable) – Select this option to obtain the IP settings for the access point from a DHCP (Dynamic Host C

Strany 204

4-7TCP / IP SettingsFigure 21 Smart MonitorBy enabling Smart Monitor (known as Link Integrity in the CLI) and setting a target IP address, the AP wi

Strany 205 - Wireless Interface Commands

4-8CHAPTER 4: SYSTEM CONFIGURATIONRADIUSRemote Authentication Dial-in User Service (RADIUS) is an authentication protocol that uses software running o

Strany 206

4-9Authentication Port: The UDP port number used by the RADIUS server for authentication messages. (Range: 1024-65535; Default: 1812) Key: A shared

Strany 207

5Wi-Fi Protected Access (WPA) 4-565 Command Line InterfaceUsing the Command Line Interface 5-1Accessing the CLI 5-1Console Connection

Strany 208 - Enterprise AP(if-wireless g)#

4-10CHAPTER 4: SYSTEM CONFIGURATIONuse both MAC address and 802.1X authentication, with client station MAC authentication occurring prior to IEEE 802.

Strany 209

4-11AuthenticationFigure 23 AuthenticationMAC Authentication – You can configure a list of the MAC addresses for wireless clients that are authorize

Strany 210

4-12CHAPTER 4: SYSTEM CONFIGURATION Local MAC: The MAC address of the associating station is compared against the local database stored on the access

Strany 211

4-13AuthenticationWhen 802.1X is enabled, the broadcast and session key rotation intervals can also be configured. Broadcast Key Refresh Rate: Sets t

Strany 212

4-14CHAPTER 4: SYSTEM CONFIGURATIONFILTER CONTROLThe access point can employ network traffic frame filtering to control access to network resources an

Strany 213

4-15Filter ControlAP Management Filter – Controls management access to the access point from wireless clients. Management interfaces include the web,

Strany 214

4-16CHAPTER 4: SYSTEM CONFIGURATIONVLANThe access point can employ VLAN tagging support to control access to network resources and increase security.

Strany 215

4-17Filter ControlA VLAN ID (1-4094) can be assigned to a client after successful IEEE 802.1X authentication. The client VLAN IDs must be configured o

Strany 216

4-18CHAPTER 4: SYSTEM CONFIGURATIONSNMPSimple Network Management Protocol (SNMP) is a communication protocol designed specifically for managing device

Strany 217

4-19SNMPFigure 26 SNMPSNMP – Enables or disables SNMP management access and also enables the access point to send SNMP traps (notifications). (Defau

Strany 219

4-20CHAPTER 4: SYSTEM CONFIGURATION Trap Destination Community Name – The community string sent with the notification operation. (Maximum length: 23

Strany 220

4-21SNMP dot11InterfaceAFail - The 802.11a or 802.11g interface has failed. dot1xMacAddrAuthSuccess - A client station has successfully authenticate

Strany 221

4-22CHAPTER 4: SYSTEM CONFIGURATIONPassphrase – The password or key associated with the authentication and privacy settings. A minimum of eight plain

Strany 222

4-23AdministrationFigure 29 AdministrationUsername – The name of the user. The default name is “admin.” (Length: 3-16 characters, case sensitive)New

Strany 223

4-24CHAPTER 4: SYSTEM CONFIGURATION Telnet Server: Enables or disables the Telnet server. (Default: Disabled) SSH Server: Enables or disables the SS

Strany 224

4-25AdministrationFigure 31 Firmware UpgradeBefore upgrading new software, verify that the access point is connected to the network and has been con

Strany 225

4-26CHAPTER 4: SYSTEM CONFIGURATION If upgrading from an FTP server, be sure that you have an account configured on the server with a user name and p

Strany 226

4-27WDS and Spanning Tree SettingsWDS AND SPANNING TREE SETTINGSEach access point radio interface can be configured to operate in a bridge or repeater

Strany 227 - Rogue AP Detection Commands

4-28CHAPTER 4: SYSTEM CONFIGURATIONFigure 32 WDS and Spanning Tree Settings

Strany 228 - Table 27 Rogue AP Commands

4-29WDS and Spanning Tree SettingsWDS Bridge – Up to six WDS bridge or repeater links (MAC addresses) per radio interface can be specified for each un

Strany 229

7TERMINOLOGYAccess Point—An internetworking device that seamlessly connects wired and wireless networks.Ad Hoc—An ad hoc wireless LAN is a group of co

Strany 230

4-30CHAPTER 4: SYSTEM CONFIGURATIONFigure 33 Spanning Tree ProtocolSpanning Tree Protocol – STP uses a distributed algorithm to select a bridging de

Strany 231

4-31WDS and Spanning Tree Settingsfrom that device to the root device. Then it selects a designated bridging device from each LAN which incurs the low

Strany 232 - Wireless Security Commands

4-32CHAPTER 4: SYSTEM CONFIGURATION Bridge Forwarding Delay – The maximum time (in seconds) this device waits before changing states (i.e., discardin

Strany 233

4-33System LogSYSTEM LOG The access point can be configured to send event and error messages to a System Log Server. The system clock can also be sync

Strany 234

4-34CHAPTER 4: SYSTEM CONFIGURATIONEnter Time Zone – Sets the desired time zone + or - GMT.Enable Daylight Saving – Adjusts the clock for summertime a

Strany 235

4-35Radio Interface Secondary Server: The IP address of a secondary SNTP or NTP time server. The access point first attempts to update the time from

Strany 236

4-36CHAPTER 4: SYSTEM CONFIGURATION802.11A INTERFACEThe IEEE 802.11a interface operates within the 5 GHz band, at up to 54 Mbps in normal mode or up t

Strany 237

4-37Radio InterfaceSSID – The name of the basic service set provided by a VAP interface. Clients that want to connect to the network through the acces

Strany 238

4-38CHAPTER 4: SYSTEM CONFIGURATIONCONFIGURING COMMON RADIO SETTINGSTo configure common radio settings, select the Radio Settings page, and scroll dow

Strany 239

4-39Radio InterfaceSuper Mode – The Atheros proprietary Super A performance enhancements are supported by the access point. These enhancements include

Strany 240

8VAP—Virtual Access Point. An access point radio capable of operating as four separate access points. VLAN—Virtual Local Area Network. A LAN consistin

Strany 241

4-40CHAPTER 4: SYSTEM CONFIGURATIONOutput Antenna – Selects the use of both fixed antennas operating in diversity mode or a single antenna. (Default:

Strany 242

4-41Radio InterfaceDelivery Traffic Indication Message (DTIM) – The rate at which stations in sleep mode must wake up to receive broadcast/multicast t

Strany 243 - Link Integrity Commands

4-42CHAPTER 4: SYSTEM CONFIGURATION802.11B/G INTERFACEThe IEEE 802.11g standard operates within the 2.4 GHz band at up to 54 Mbps. Also note that beca

Strany 244

4-43Radio InterfaceFigure 37 Radio Settings B/GClient Access Mode – Selects the operating mode for the 802.11g wireless interface. (Default: 802.11b

Strany 245

4-44CHAPTER 4: SYSTEM CONFIGURATIONSuper Mode – The Atheros proprietary Super G performance enhancements are supported by the access point. These enha

Strany 246 - IAPP Commands

4-45Radio InterfaceThe access point implements QoS using the Wi-Fi Multimedia (WMM) standard. Using WMM, the access point is able to prioritize traffi

Strany 247 - Table 30 VLAN Commands

4-46CHAPTER 4: SYSTEM CONFIGURATIONresolution mechanism first selects data with the highest priority to be granted a transmit opportunity. Then the sa

Strany 248

4-47Radio InterfaceFigure 39 WMM ConfigurationWMM – Sets the WMM operational mode on the access point. When enabled, the parameters for each AC queu

Strany 249

4-48CHAPTER 4: SYSTEM CONFIGURATIONinitial wait time is a random value between zero and the CWMin value. Specify the CWMin value in the range 0-15 mic

Strany 250 - Table 31 WMM Commands

4-49SecuritySECURITYThe access point is configured by default as an “open system,” which broadcasts a beacon signal including the configured SSID. Wir

Strany 251

1-11 INTRODUCTIONThe 3Com® Wireless 8760 Dual-radio 11a/b/g PoE Access Point offers a dual-mode architecture that supports 802.11g, 802.11a, and 802.1

Strany 252

4-50CHAPTER 4: SYSTEM CONFIGURATIONThe access point can simultaneously support clients using various different security mechanisms. The configuration

Strany 253

4-51SecurityDynamic WEP (802.1x) onlyAuthentication: Open System Encryption: Enable 802.1x: Required Set 802.1x key refresh and reauthentication rates

Strany 254

4-52CHAPTER 4: SYSTEM CONFIGURATIONWIRED EQUIVALENT PRIVACY (WEP) WEP provides a basic level of security, preventing unauthorized access to the networ

Strany 255 - 6 TROUBLESHOOTING

4-53SecurityNote that all clients share the same keys, which are used for user authentication and data encryption. Up to four keys can be specified. T

Strany 256 - Symptom Solutions

4-54CHAPTER 4: SYSTEM CONFIGURATIONEncryption – Enable or disable the access point to use data encryption (WEP, TKIP, or AES). If this option is selec

Strany 257

4-55Security Alphanumeric: Enter keys as 5 alphanumeric characters for 64 bit keys, 13 alphanumeric characters for 128 bit keys, or 16 alphanumeric c

Strany 258 - CHAPTER 6: TROUBLESHOOTING

4-56CHAPTER 4: SYSTEM CONFIGURATION• Hexadecimal: Enter keys as 10 hexadecimal digits (0-9 and A-F) for 64 bit keys, 26 hexadecimal digits for 128 bi

Strany 259

4-57SecurityTemporal Key Integrity Protocol (TKIP): WPA specifies TKIP as the data encryption method to replace WEP. TKIP avoids the problems of WEP s

Strany 260

4-58CHAPTER 4: SYSTEM CONFIGURATIONfor WPA2. However, the computational intensive operations of AES-CCMP requires hardware support on client devices.

Strany 261

4-59SecurityStatus InformationThe Status page includes information on the following items:Access Point StatusThe AP Status window displays basic syste

Komentáře k této Příručce

Žádné komentáře