www.3Com.com Part Number 10015153 Rev. AAUser Guide3Com Wireless 8760 Dual-radio 11a/b/g PoE Access Point3CRWE876075 / WL-546Published June, 2006
1-2CHAPTER 1: INTRODUCTIONPRODUCT FEATURESAccess Point 8760—Creates an enterprise-class wireless LAN supporting up to 256 simultaneous users. The acce
4-60CHAPTER 4: SYSTEM CONFIGURATION HTTP Server: Shows if management access via HTTP is enabled. HTTP Server Port: Shows the TCP port used by the HT
4-61Securitysystem” and “shared key.” Open-system authentication accepts any client attempting to connect to the access point without verifying its id
4-62CHAPTER 4: SYSTEM CONFIGURATIONError Messages – An example of a logged error message is: “Station Failed to authenticate (unsupported algorithm).”
5-15COMMAND LINE INTERFACEUSING THE COMMAND LINE INTERFACEACCESSING THE CLIWhen accessing the management interface for the over a direct connection to
5-2CHAPTER 5: COMMAND LINE INTERFACETelnet ConnectionTelnet operates over the IP transport protocol. In this environment, your management station and
5-3Using the Command Line InterfaceENTERING COMMANDSThis section describes how to enter CLI commands.Keywords and ArgumentsA CLI command is a series o
5-4CHAPTER 5: COMMAND LINE INTERFACEShowing CommandsIf you enter a “?” at the command prompt, the system will display the first level of keywords for
5-5Using the Command Line InterfaceNegating the Effect of CommandsFor many configuration commands you can enter the prefix keyword “no” to cancel the
5-6CHAPTER 5: COMMAND LINE INTERFACEConfiguration CommandsConfiguration commands are used to modify access point settings. These commands modify the r
5-7Using the Command Line InterfaceTable 9 Keystroke CommandsCOMMAND GROUPSThe system commands can be broken down into the functional groups shown b
1-3Product FeaturesPERFORMANCE AND RELIABILITY3Com wireless access point performance features ensure reliable and seamless connections for users where
5-8CHAPTER 5: COMMAND LINE INTERFACEThe access mode shown in the following tables is indicated by these abbreviations: Exec (Executive Mode), GC (Glob
5-9Using the Command Line InterfaceDefault Setting NoneCommand Mode ExecExample Related Commands end (5-9)endThis command returns to the previous conf
5-10CHAPTER 5: COMMAND LINE INTERFACEexitThis command returns to the Exec mode or exits the configuration program.Default Setting NoneCommand Mode Any
5-11Using the Command Line Interface- Destination unreachable - The gateway for this destination indicates that the destination is unreachable. - Netw
5-12CHAPTER 5: COMMAND LINE INTERFACEshow historyThis command shows the contents of the command history buffer.Default Setting NoneCommand Mode ExecCo
5-13Using the Command Line InterfaceSystem Management CommandsThese commands are used to configure the user name, password, system logs, browser manag
5-14CHAPTER 5: COMMAND LINE INTERFACEcountryThis command configures the access point’s country code, which identifies the country of operation and set
5-15Using the Command Line InterfaceDefault Setting US - for units sold in the United States 99 (no country set) - for units sold in other countriesCo
5-16CHAPTER 5: COMMAND LINE INTERFACEDefault Setting Enterprise APCommand Mode Global ConfigurationExample system nameThis command specifies or modifi
5-17Using the Command Line InterfaceDefault Setting adminCommand Mode Global ConfigurationExamplepasswordAfter initially logging onto the system, you
1-4CHAPTER 1: INTRODUCTIONMANAGEABILITY3Com offers a wide range of standards-based management support, from SNMP to 3Com Network Supervisor and HP Ope
5-18CHAPTER 5: COMMAND LINE INTERFACECommand Mode Interface Configuration (Ethernet)Command Usage • The access point supports Secure Shell version 2.0
5-19Using the Command Line InterfaceCommand Mode Interface Configuration (Ethernet)Exampleip http portThis command specifies the TCP port number used
5-20CHAPTER 5: COMMAND LINE INTERFACECommand Mode Global ConfigurationExample Related Commandsip http port (5-19)ip https portUse this command to spec
5-21Using the Command Line Interfaceip https serverUse this command to enable the secure hypertext transfer protocol (HTTPS) over the Secure Socket La
5-22CHAPTER 5: COMMAND LINE INTERFACEweb-redirectUse this command to enable web-based authentication of clients. Use the no form to disable this funct
5-23Using the Command Line InterfaceAPmgmtIPThis command specifies the client IP addresses that are allowed management access to the access point thro
5-24CHAPTER 5: COMMAND LINE INTERFACEExampleThis example restricts management access to the indicated addresses.APmgmtUIThis command enables and disab
5-25Using the Command Line Interfaceshow apmanagementThis command shows the AP management configuration, including the IP addresses of management stat
5-26CHAPTER 5: COMMAND LINE INTERFACEshow systemThis command displays basic system configuration settings.Default SettingNoneCommand Mode ExecExampleE
5-27Using the Command Line Interfaceshow versionThis command displays the software version for the system.Command Mode ExecExample show configThis com
1-5Wireless Network Standards802.11A802.11a operates at the 5 GHz band and supports data rates at up to 54 Mbps. For those organizations demanding eve
5-28CHAPTER 5: COMMAND LINE INTERFACEProtocol Filter Information===========================================================Local Bridge :DISAB
5-29Using the Command Line Interface----------------Security-----------------------------------Closed System : DISABLEDMulticast cipher
5-30CHAPTER 5: COMMAND LINE INTERFACERadius Secondary Server Information========================================IP : 0.0.0.0Port
5-31Using the Command Line InterfaceSNTP Information===========================================================Service State : DisabledSNTP (se
5-32CHAPTER 5: COMMAND LINE INTERFACEshow hardwareThis command displays the hardware version of the system.Command Mode ExecExample System Logging Com
5-33Using the Command Line Interfacelogging onThis command controls logging of error messages; i.e., sending debug or error messages to memory. The no
5-34CHAPTER 5: COMMAND LINE INTERFACEDefault Setting NoneCommand Mode Global ConfigurationExample logging consoleThis command initiates logging of err
5-35Using the Command Line InterfaceCommand Usage Messages sent include the selected level down to Emergency level.Example logging facility-typeThis c
5-36CHAPTER 5: COMMAND LINE INTERFACEExample logging clearThis command clears all log messages stored in the access point’s memory.Syntaxlogging clear
5-37Using the Command Line Interfaceshow event-logThis command displays log messages stored in the access point’s memory.Syntaxshow event-logCommand M
1-6CHAPTER 1: INTRODUCTION
5-38CHAPTER 5: COMMAND LINE INTERFACEsntp-server ipThis command sets the IP address of the servers to which SNTP time requests are issued. Use the thi
5-39Using the Command Line InterfaceDefault Setting EnabledCommand Mode Global ConfigurationCommand Usage The time acquired from time servers is used
5-40CHAPTER 5: COMMAND LINE INTERFACERelated Commandssntp-server enable (5-38)sntp-server daylight-savingThis command sets the start and end dates for
5-41Using the Command Line InterfaceCommand Mode Global ConfigurationCommand Usage This command sets the local time zone relative to the Coordinated U
5-42CHAPTER 5: COMMAND LINE INTERFACEDHCP Relay CommandsDynamic Host Configuration Protocol (DHCP) can dynamically allocate an IP address and other co
5-43Using the Command Line Interfacedhcp-relayThis command configures the primary and secondary DHCP server addresses.Syntaxdhcp-relay <primary | s
5-44CHAPTER 5: COMMAND LINE INTERFACESNMP CommandsControls access to this access point from management stations using the Simple Network Management Pr
5-45Using the Command Line Interfacesnmp-server communityThis command defines the community access string for the Simple Network Management Protocol.
5-46CHAPTER 5: COMMAND LINE INTERFACEDefault Setting NoneCommand Mode Global ConfigurationExample Related Commandssnmp-server location (5-46)snmp-serv
5-47Using the Command Line Interfacesnmp-server enable serverThis command enables SNMP management access and also enables this device to send SNMP tra
2-12 INSTALLING THE ACCESS POINTThis equipment must be installed in compliance with local and national building codes, regulatory restrictions, and FC
5-48CHAPTER 5: COMMAND LINE INTERFACE• host_name - Name of the host. (Range: 1-63 characters)• community-string - Password-like community string sent
5-49Using the Command Line Interface- dot11StationRequestFail - A client station has failed association, re-association, or authentication.- dot1xAuth
5-50CHAPTER 5: COMMAND LINE INTERFACEDefault Setting All traps enabledCommand Mode Global ConfigurationCommand Usage This command is used in conjuncti
5-51Using the Command Line Interfacesnmp-server userThis command configures the SNMP v3 users that are allowed to manage the access point. Use the no
5-52CHAPTER 5: COMMAND LINE INTERFACE- group-name - The name of the SNMP group to which the user is assigned (32 characters maximum). There are three
5-53Using the Command Line Interface• ip-addr - Specifies the IP address of the management station to receive notifications.• sec-name - The defined
5-54CHAPTER 5: COMMAND LINE INTERFACEDefault Setting NoneCommand Mode Global ConfigurationCommand Usage • The access point allows up to 10 notificatio
5-55Using the Command Line InterfaceDefault Setting NoneCommand Mode Global ConfigurationExample show snmp groupsThis command displays the SNMP v3 pre
5-56CHAPTER 5: COMMAND LINE INTERFACEExample show snmp usersThis command displays the SNMP v3 users and settings.Syntax show snmp usersCommand ModeExe
5-57Using the Command Line InterfaceExample show snmp targetThis command displays the SNMP v3 notification target settings.Syntaxshow snmp targetComma
2-2CHAPTER 2: INSTALLING THE ACCESS POINT To access and use the Web configuration management system, you need a computer that is running Internet Exp
5-58CHAPTER 5: COMMAND LINE INTERFACEExample show snmp filter-assignmentsThis command displays the SNMP v3 notification filter assignments.Syntaxshow
5-59Using the Command Line Interfaceshow snmpThis command displays the SNMP configuration settings.Command Mode ExecExampleEnterprise AP#show snmpSNMP
5-60CHAPTER 5: COMMAND LINE INTERFACEFlash/File CommandsThese commands are used to manage the system code or configuration files.Table 18 Flash/File
5-61Using the Command Line Interfacecopy This command copies a boot file, code image, or configuration file between the access point’s flash memory an
5-62CHAPTER 5: COMMAND LINE INTERFACEExample The following example shows how to upload the configuration settings to a file on the TFTP server:The fol
5-63Using the Command Line InterfaceExample This example shows how to delete the test.cfg configuration file from flash memory.Related Commandsbootfil
5-64CHAPTER 5: COMMAND LINE INTERFACEshow bootfileThis command displays the name of the current operation code file that booted the system.Syntaxshow
5-65Using the Command Line Interfaceradius-server addressThis command specifies the primary and secondary RADIUS servers. Syntaxradius-server [seconda
5-66CHAPTER 5: COMMAND LINE INTERFACEExample radius-server keyThis command sets the RADIUS encryption key. Syntax radius-server [secondary] key <ke
5-67Using the Command Line Interfaceradius-server timeoutThis command sets the interval between transmitting authentication requests to the RADIUS ser
2-3Deciding Where to Place Equipment and Performing A Site SurveyDECIDING WHERE TO PLACE EQUIPMENT AND PERFORMING A SITE SURVEYThe access point is id
5-68CHAPTER 5: COMMAND LINE INTERFACEExample radius-server timeout-interimThis command sets the interval between transmitting accounting updates to th
5-69Using the Command Line InterfaceDefault SettingNo delimiterCommand ModeGlobal ConfigurationExample radius-server vlan-formatThis command sets the
5-70CHAPTER 5: COMMAND LINE INTERFACEExample 802.1X AuthenticationThe access point supports IEEE 802.1X access control for wireless clients. This cont
5-71Using the Command Line Interface802.1xThis command configures 802.1X as optionally supported or as required for wireless clients. Use the no form
5-72CHAPTER 5: COMMAND LINE INTERFACE• When 802.1X is required, the access point enforces 802.1X authentication for all 802.11 associated stations. If
5-73Using the Command Line Interface802.1x session-key-refresh-rateThis command sets the interval at which unicast session keys are refreshed for asso
5-74CHAPTER 5: COMMAND LINE INTERFACEExample802.1x-supplicant enableThis command enables the access point to operate as an 802.1X supplicant for authe
5-75Using the Command Line InterfaceDefaultNoneCommand ModeGlobal ConfigurationCommand UsageThe access point currently only supports EAP-MD5 CHAP for
5-76CHAPTER 5: COMMAND LINE INTERFACEMAC Address Authentication Use these commands to define MAC authentication on the access point. For local MAC aut
5-77Using the Command Line InterfaceExampleRelated Commandsaddress filter entry (5-77) 802.1x-supplicant user (5-74)address filter entryThis command e
2-4CHAPTER 2: INSTALLING THE ACCESS POINTConfiguring a wireless LAN can be as easy as placing a 3Com Wireless Access Point in a central area and makin
5-78CHAPTER 5: COMMAND LINE INTERFACEaddress filter deleteThis command deletes a MAC address from the filter table.Syntaxaddress filter delete <mac
5-79Using the Command Line InterfaceRelated Commandsaddress filter entry (5-77) radius-server address (5-65) 802.1x-supplicant user (5-74)mac-authenti
5-80CHAPTER 5: COMMAND LINE INTERFACEfilter local-bridgeThis command disables communication between wireless clients. Use the no form to disable this
5-81Using the Command Line Interfacefilter ap-manageThis command prevents wireless clients from accessing the management interface on the access point
5-82CHAPTER 5: COMMAND LINE INTERFACEDefaultDisabledCommand ModeGlobal ConfigurationExamplefilter ethernet-type enableThis command checks the Ethernet
5-83Using the Command Line Interfacefilter ethernet-type protocolThis command sets a filter for a specific Ethernet type. Use the no form to disable f
5-84CHAPTER 5: COMMAND LINE INTERFACEExampleWDS Bridge Commands The commands described in this section are used to set the operation mode for each acc
5-85Using the Command Line Interfacebridge role (WDS)This command selects the bridge operation mode for the radio interface.Syntaxbridge role <ap |
5-86CHAPTER 5: COMMAND LINE INTERFACEbridge-link parentThis command configures the MAC address of the parent bridge node.Syntaxbridge-link parent <
5-87Using the Command Line Interface• In bridge mode, up to five child links can be specified using link index numbers 2 to 6. Index number 1 is reser
2-5Connecting the Standard AntennasFigure 1 Front and Rear Panel DescriptionCONNECTING THE STANDARD ANTENNASThe Access Point 8760 is supplied with s
5-88CHAPTER 5: COMMAND LINE INTERFACEshow bridge aging-timeThis command displays the current WDS forwarding table aging time setting.Command Mode Exec
5-89Using the Command Line Interfaceshow bridge filter-entryThis command displays current entries in the WDS forwarding table.Command Mode ExecExample
5-90CHAPTER 5: COMMAND LINE INTERFACEshow bridge linkThis command displays WDS bridge link and spanning tree settings for specified interfaces.Syntaxs
5-91Using the Command Line InterfaceSpanning Tree CommandsThe commands described in this section are used to set the MAC address table aging time and
5-92CHAPTER 5: COMMAND LINE INTERFACEbridge stp enableThis command enables the Spanning Tree Protocol. Use the no form to disable the Spanning Tree Pr
5-93Using the Command Line InterfaceDefault Setting 15 secondsCommand Mode Global ConfigurationCommand Usage This command sets the maximum time (in se
5-94CHAPTER 5: COMMAND LINE INTERFACEbridge stp max-ageUse this command to configure the spanning tree bridge maximum age globally for the wireless br
5-95Using the Command Line InterfaceDefault Setting 32768Command Mode Global ConfigurationCommand Usage Bridge priority is used in selecting the root
5-96CHAPTER 5: COMMAND LINE INTERFACEbridge-link port-priorityUse this command to configure the priority for the specified port. Syntax bridge-link po
5-97Using the Command Line InterfaceExampleEthernet Interface Commands The commands described in this section configure connection parameters for the
3Com Corporation 350 Campus Drive Marlborough, MA 01752-3064Copyright © 2006 3Com Corporation. All rights reserved. No part of this documentation may
2-6CHAPTER 2: INSTALLING THE ACCESS POINTFigure 2 Antenna AdjustmentDepending on the coverage required for your site, you may want to replace the st
5-98CHAPTER 5: COMMAND LINE INTERFACEinterface ethernetThis command enters Ethernet interface configuration mode.Default Setting NoneCommand Mode Glob
5-99Using the Command Line InterfaceRelated Commands show interface ethernet (5-102)ip address This command sets the IP address for the access point.
5-100CHAPTER 5: COMMAND LINE INTERFACEip dhcp This command enables the access point to obtain an IP address from a DHCP server. Use the no form to res
5-101Using the Command Line Interfacespeed-duplexThis command configures the speed and duplex mode of a given interface when autonegotiation is disabl
5-102CHAPTER 5: COMMAND LINE INTERFACECommand Usage This command allows you to disable the Ethernet port due to abnormal behavior (e.g., excessive col
5-103Using the Command Line InterfaceWireless Interface CommandsThe commands described in this section configure connection parameters for the wireles
5-104CHAPTER 5: COMMAND LINE INTERFACEinterface wirelessThis command enters wireless interface configuration mode.Syntaxinterface wireless <a | g&g
5-105Using the Command Line InterfacevapThis command provides access to the VAP (Virtual Access Point) interface configuration mode.Syntaxvap <vap-
5-106CHAPTER 5: COMMAND LINE INTERFACEExampleturboThis command sets the access point to an enhanced proprietary modulation mode (not regulated in IEEE
5-107Using the Command Line Interfacemulticast-data-rateThis command configures the maximum data rate at which the access point transmits multicast an
2-7Connecting PowerIf you supply your own Ethernet cable for connecting power, be sure that it is standard category 5 straight-through (8-wire) cable
5-108CHAPTER 5: COMMAND LINE INTERFACEchannelThis command configures the radio channel through which the access point communicates with wireless clien
5-109Using the Command Line Interfacetransmit-powerThis command adjusts the power of the radio signals transmitted from the access point.Syntaxtransmi
5-110CHAPTER 5: COMMAND LINE INTERFACEDefault Settingb+g modeCommand ModeInterface Configuration (Wireless - 802.11g)Command Usage • For Japan, only 1
5-111Using the Command Line InterfaceExampleantenna controlThis command selects the use of two diversity antennas or a single antenna for the radio in
5-112CHAPTER 5: COMMAND LINE INTERFACEantenna idThis command specifies the antenna type connected to the access point represented by a four-digit hexa
5-113Using the Command Line InterfaceDefault SettingIndoorCommand ModeInterface Configuration (Wireless)Command Usage• When an external antenna is sel
5-114CHAPTER 5: COMMAND LINE INTERFACEdtim-period This command configures the rate at which stations in sleep mode must wake up to receive broadcast/m
5-115Using the Command Line Interfacefragmentation-length This command configures the minimum packet size that can be fragmented when passing through
5-116CHAPTER 5: COMMAND LINE INTERFACEDefault Setting 2347Command Mode Interface Configuration (Wireless)Command Usage • If the threshold is set to 0,
5-117Using the Command Line InterfaceExamplesuper-g This command enables Atheros proprietary Super G performance enhancements. Use the no form to disa
2-8CHAPTER 2: INSTALLING THE ACCESS POINTUSING THE POWER SUPPLYThe power supply can be located at any point between the access point and the LAN acces
5-118CHAPTER 5: COMMAND LINE INTERFACEExamplessidThis command configures the service set identifier (SSID). Syntaxssid <string>string - The name
5-119Using the Command Line InterfaceCommand Mode Interface Configuration (Wireless-VAP)Command Usage When closed system is enabled, the access point
5-120CHAPTER 5: COMMAND LINE INTERFACEDefault Setting 30Command Mode Interface Configuration (Wireless-VAP)Exampleauth-timeout-valueThis command confi
5-121Using the Command Line InterfaceCommand UsageYou must first enable VAP interface 0 before you can enable VAP interfaces 1, 2, 3, 4, 5, 6, or 7.Ex
5-122CHAPTER 5: COMMAND LINE INTERFACECommand Mode ExecExample Enterprise AP#show interface wireless g 0Wireless Interface Information================
5-123Using the Command Line Interface----------------Security-------------------------------------------------Closed System : Disabl
5-124CHAPTER 5: COMMAND LINE INTERFACEWMM AP ParametersAC0(Best Effort) : logCwMin: 4 logCwMax: 6 AIFSN: 3
5-125Using the Command Line Interfaceshow stationThis command shows the wireless clients associated with the access point.Command Mode ExecExample Rog
5-126CHAPTER 5: COMMAND LINE INTERFACEThe access point can be configured to periodically scan all radio channels and find other access points within r
5-127Using the Command Line InterfaceThe rogue AP database can be viewed using the show rogue-ap command.• The access point sends Syslog messages for
2-9Checking the LEDsCHECKING THE LEDSWhen power is connected, the access point LEDs light. The illustration and the following table describe the LEDs
5-128CHAPTER 5: COMMAND LINE INTERFACErogue-ap durationThis command sets the scan duration for detecting access points.Syntaxrogue-ap duration <mil
5-129Using the Command Line InterfaceDefault Setting720 minutesCommand Mode Interface Configuration (Wireless)Command Usage This command sets the inte
5-130CHAPTER 5: COMMAND LINE INTERFACEshow rogue-apThis command displays the current rogue AP database.Command Mode ExecExample Wireless Security Comm
5-131Using the Command Line InterfaceauthThis command configures authentication for the VAP interface.Syntaxauth <open-system | shared-key | wpa |
5-132CHAPTER 5: COMMAND LINE INTERFACE• To use WEP shared-key authentication, set the authentication type to “shared-key” and define at least one stat
5-133Using the Command Line InterfaceWEP). To place the VAP into AES only mode, use “required” and then select the “cipher-ccmp” option for the ciphe
5-134CHAPTER 5: COMMAND LINE INTERFACEExampleRelated Commandskey (5-134)key This command sets the keys used for WEP encryption. Use the no form to del
5-135Using the Command Line InterfaceExampleRelated Commandskey (5-134) encryption (5-133) transmit-key (5-135)transmit-keyThis command sets the index
5-136CHAPTER 5: COMMAND LINE INTERFACEcipher-suite This command defines the cipher algorithm used to encrypt the global key for broadcast and multicas
5-137Using the Command Line Interface• AES-CCMP (Advanced Encryption Standard Counter-Mode/CBCMAC Protocol): WPA2 is backward compatible with WPA, inc
2-10CHAPTER 2: INSTALLING THE ACCESS POINTWALL, CEILING, OR ELECTRICAL BOX MOUNTINGTo mount the access point to a wall, ceiling, or electrical box:1 R
5-138CHAPTER 5: COMMAND LINE INTERFACE• Using the “software” option provides the best performance for a large number of clients on one radio interface
5-139Using the Command Line Interfacepmksa-lifetime This command sets the time for aging out cached WPA2 Pairwise Master Key Security Association (PMK
5-140CHAPTER 5: COMMAND LINE INTERFACEDefault Setting DisabledCommand Mode Interface Configuration (Wireless-VAP)Command Usage • Each time a client ro
5-141Using the Command Line InterfaceLink Integrity CommandsThe access point provides a link integrity feature that can be used to ensure that wireles
5-142CHAPTER 5: COMMAND LINE INTERFACEhost does not respond or is unreachable) exceeds the limit set by the link-integrity ping-fail-retry command, th
5-143Using the Command Line InterfaceExample link-integrity ping-fail-retryThis command configures the number of consecutive failed Ping counts before
5-144CHAPTER 5: COMMAND LINE INTERFACEshow link-integrityThis command displays the current link integrity configuration.Command Mode ExecExample IAPP
5-145Using the Command Line Interfacebetween access points from different vendors. This command is used to enable or disable 802.11f handover signalin
5-146CHAPTER 5: COMMAND LINE INTERFACEvlanThis command enables VLANs for all traffic. Use the no form to disable VLANs.Syntax[no] vlan enable DefaultD
5-147Using the Command Line InterfaceDefault Setting 1Command Mode Global ConfigurationCommand Usage The management VLAN is for managing the access po
2-11Wall, Ceiling, or Electrical Box MountingFigure 4 Routing a CableFigure 5 Mounting Bracket4 Connect the Ethernet cable to the port on the back
5-148CHAPTER 5: COMMAND LINE INTERFACE• If the VLAN ID has not been configured for a client on the RADIUS server, then the frames are tagged with the
5-149Using the Command Line InterfaceDefaultsupportedCommand ModeInterface Configuration (Wireless)Examplewmm-acknowledge-policyThis command allows th
5-150CHAPTER 5: COMMAND LINE INTERFACEExamplewmmparamThis command configures detailed WMM parameters that apply to the access point (AP) or the wirele
5-151Using the Command Line InterfaceDefaultCommand ModeInterface Configuration (Wireless)ExampleAP ParametersWMM Parameters AC0 (Best Effort) AC1 (B
5-152CHAPTER 5: COMMAND LINE INTERFACE
6-16 TROUBLESHOOTINGIf you have difficulty with the 3Com Wireless LAN access point, first check the following items in the configuration: Radio Setti
6-2CHAPTER 6: TROUBLESHOOTINGNo operation.Verify the access point configuration.Review access point firmware revisions and update firmware if necessar
6-3While you are configuring the access point, the Configuration Management System stops responding.To maintain wireless association, the service area
6-4CHAPTER 6: TROUBLESHOOTING
I-1INDEXNumbers3Com 3CDaemon Server Tool 2-143Com Wireless Infrastructure Device Manager 2-14802.11g 5-104Aaccess pointinstallation 2-1IP addr
2-12CHAPTER 2: INSTALLING THE ACCESS POINTFLAT SURFACE INSTALLATIONThe access point can also be placed on a flat surface such as a table, desktop or f
I-2Ggateway address 4-6, 5-2, 5-99Hhardware version, displaying 5-27HTTP, secure server 5-21HTTPS 5-21IIAPP 5-144IEEE 802.11a 4-35, 5-104c
I-3RTSthreshold 4-41, 5-115Ssafety information 2-2Secure Socket Layer See SSLsecurity, options 4-49session key 4-10, 4-13, 5-73shared key 3-
2-13Selecting and Connecting a Different Antenna ModelFigure 7 Connecting Antennae1 Position the antenna so that there are minimal obstacles between
2-14CHAPTER 2: INSTALLING THE ACCESS POINTINSTALLING SOFTWARE UTILITIESThe installation CD includes documentation and software utilities to help you s
3-13 INITIAL CONFIGURATIONThe Access Point 8760 offers a variety of management options, including a web-based interface.The initial configuration step
3Contents1 IntroductionProduct Features 1-2Security 1-2Performance and Reliability 1-3Virtual Access Point (VAP) Support 1-3WDS Bridgi
3-2CHAPTER 3: INITIAL CONFIGURATION1 Connect a computer directly to the Access Point using the supplied standard Category 5 UTP Ethernet cable.2 Enter
3-3Figure 8 Wireless Interface Device ManagerClick on the Properties button to see the following screenFigure 9 Wireless Interface Device Manager
3-4CHAPTER 3: INITIAL CONFIGURATIONDirectly connect to the device through its Ethernet port or console port. Follow the instructions below to login in
3-5Using the Setup WizardLogging In – Enter the username “admin,” and password “password,” then click LOGIN. For information on configuring a user nam
3-6CHAPTER 3: INITIAL CONFIGURATIONThe home page displays the Main Menu.Figure 11 Home PageLaunching the Setup Wizard – To perform initial configura
3-7Using the Setup Wizard1 Service Set ID – Enter the service set identifier in the SSID box which all wireless clients must use to associate with the
3-8CHAPTER 3: INITIAL CONFIGURATIONFigure 14 Setup Wizard - Step 2 802.11aTurbo Mode – If you select Enable, the access point will operate in turbo
3-9Using the Setup Wizard3 IP Configuration – Either enable or disable Dynamic Host Configuration Protocol (DHCP) for automatic IP configuration. If y
3-10CHAPTER 3: INITIAL CONFIGURATIONFigure 16 Setup Wizard - Step 4Authentication Type – Use “Open System” to allow open access to all wireless clie
3-11Using the Setup Wizard5 Click Finish.6 Click the OK button to complete the wizard.Figure 17 Setup Wizard - Completed
43 Initial ConfigurationNetworks with a DHCP Server 3-1Networks without a DHCP Server 3-1Using the 3Com Installation CD 3-2Launch the 3COM
3-12CHAPTER 3: INITIAL CONFIGURATION
4-14 SYSTEM CONFIGURATIONBefore continuing with advanced configuration, first complete the initial configuration steps described in Chapter 4 to set u
4-2CHAPTER 4: SYSTEM CONFIGURATIONFigure 18 Advanced SetupThe information in this chapter is organized to reflect the structure of the web screens f
4-3Advanced SetupSNMP Configures SNMP settings 4-18Administration Configures user name and password for management access; upgrades software from loca
4-4CHAPTER 4: SYSTEM CONFIGURATIONSYSTEM IDENTIFICATIONThe system name for the access point can be left at its default setting. However, modifying thi
4-5TCP / IP SettingsTCP / IP SETTINGSConfiguring the access point with an IP address expands your ability to manage the access point. A number of acce
4-6CHAPTER 4: SYSTEM CONFIGURATIONDHCP Client (Enable) – Select this option to obtain the IP settings for the access point from a DHCP (Dynamic Host C
4-7TCP / IP SettingsFigure 21 Smart MonitorBy enabling Smart Monitor (known as Link Integrity in the CLI) and setting a target IP address, the AP wi
4-8CHAPTER 4: SYSTEM CONFIGURATIONRADIUSRemote Authentication Dial-in User Service (RADIUS) is an authentication protocol that uses software running o
4-9Authentication Port: The UDP port number used by the RADIUS server for authentication messages. (Range: 1024-65535; Default: 1812) Key: A shared
5Wi-Fi Protected Access (WPA) 4-565 Command Line InterfaceUsing the Command Line Interface 5-1Accessing the CLI 5-1Console Connection
4-10CHAPTER 4: SYSTEM CONFIGURATIONuse both MAC address and 802.1X authentication, with client station MAC authentication occurring prior to IEEE 802.
4-11AuthenticationFigure 23 AuthenticationMAC Authentication – You can configure a list of the MAC addresses for wireless clients that are authorize
4-12CHAPTER 4: SYSTEM CONFIGURATION Local MAC: The MAC address of the associating station is compared against the local database stored on the access
4-13AuthenticationWhen 802.1X is enabled, the broadcast and session key rotation intervals can also be configured. Broadcast Key Refresh Rate: Sets t
4-14CHAPTER 4: SYSTEM CONFIGURATIONFILTER CONTROLThe access point can employ network traffic frame filtering to control access to network resources an
4-15Filter ControlAP Management Filter – Controls management access to the access point from wireless clients. Management interfaces include the web,
4-16CHAPTER 4: SYSTEM CONFIGURATIONVLANThe access point can employ VLAN tagging support to control access to network resources and increase security.
4-17Filter ControlA VLAN ID (1-4094) can be assigned to a client after successful IEEE 802.1X authentication. The client VLAN IDs must be configured o
4-18CHAPTER 4: SYSTEM CONFIGURATIONSNMPSimple Network Management Protocol (SNMP) is a communication protocol designed specifically for managing device
4-19SNMPFigure 26 SNMPSNMP – Enables or disables SNMP management access and also enables the access point to send SNMP traps (notifications). (Defau
6
4-20CHAPTER 4: SYSTEM CONFIGURATION Trap Destination Community Name – The community string sent with the notification operation. (Maximum length: 23
4-21SNMP dot11InterfaceAFail - The 802.11a or 802.11g interface has failed. dot1xMacAddrAuthSuccess - A client station has successfully authenticate
4-22CHAPTER 4: SYSTEM CONFIGURATIONPassphrase – The password or key associated with the authentication and privacy settings. A minimum of eight plain
4-23AdministrationFigure 29 AdministrationUsername – The name of the user. The default name is “admin.” (Length: 3-16 characters, case sensitive)New
4-24CHAPTER 4: SYSTEM CONFIGURATION Telnet Server: Enables or disables the Telnet server. (Default: Disabled) SSH Server: Enables or disables the SS
4-25AdministrationFigure 31 Firmware UpgradeBefore upgrading new software, verify that the access point is connected to the network and has been con
4-26CHAPTER 4: SYSTEM CONFIGURATION If upgrading from an FTP server, be sure that you have an account configured on the server with a user name and p
4-27WDS and Spanning Tree SettingsWDS AND SPANNING TREE SETTINGSEach access point radio interface can be configured to operate in a bridge or repeater
4-28CHAPTER 4: SYSTEM CONFIGURATIONFigure 32 WDS and Spanning Tree Settings
4-29WDS and Spanning Tree SettingsWDS Bridge – Up to six WDS bridge or repeater links (MAC addresses) per radio interface can be specified for each un
7TERMINOLOGYAccess Point—An internetworking device that seamlessly connects wired and wireless networks.Ad Hoc—An ad hoc wireless LAN is a group of co
4-30CHAPTER 4: SYSTEM CONFIGURATIONFigure 33 Spanning Tree ProtocolSpanning Tree Protocol – STP uses a distributed algorithm to select a bridging de
4-31WDS and Spanning Tree Settingsfrom that device to the root device. Then it selects a designated bridging device from each LAN which incurs the low
4-32CHAPTER 4: SYSTEM CONFIGURATION Bridge Forwarding Delay – The maximum time (in seconds) this device waits before changing states (i.e., discardin
4-33System LogSYSTEM LOG The access point can be configured to send event and error messages to a System Log Server. The system clock can also be sync
4-34CHAPTER 4: SYSTEM CONFIGURATIONEnter Time Zone – Sets the desired time zone + or - GMT.Enable Daylight Saving – Adjusts the clock for summertime a
4-35Radio Interface Secondary Server: The IP address of a secondary SNTP or NTP time server. The access point first attempts to update the time from
4-36CHAPTER 4: SYSTEM CONFIGURATION802.11A INTERFACEThe IEEE 802.11a interface operates within the 5 GHz band, at up to 54 Mbps in normal mode or up t
4-37Radio InterfaceSSID – The name of the basic service set provided by a VAP interface. Clients that want to connect to the network through the acces
4-38CHAPTER 4: SYSTEM CONFIGURATIONCONFIGURING COMMON RADIO SETTINGSTo configure common radio settings, select the Radio Settings page, and scroll dow
4-39Radio InterfaceSuper Mode – The Atheros proprietary Super A performance enhancements are supported by the access point. These enhancements include
8VAP—Virtual Access Point. An access point radio capable of operating as four separate access points. VLAN—Virtual Local Area Network. A LAN consistin
4-40CHAPTER 4: SYSTEM CONFIGURATIONOutput Antenna – Selects the use of both fixed antennas operating in diversity mode or a single antenna. (Default:
4-41Radio InterfaceDelivery Traffic Indication Message (DTIM) – The rate at which stations in sleep mode must wake up to receive broadcast/multicast t
4-42CHAPTER 4: SYSTEM CONFIGURATION802.11B/G INTERFACEThe IEEE 802.11g standard operates within the 2.4 GHz band at up to 54 Mbps. Also note that beca
4-43Radio InterfaceFigure 37 Radio Settings B/GClient Access Mode – Selects the operating mode for the 802.11g wireless interface. (Default: 802.11b
4-44CHAPTER 4: SYSTEM CONFIGURATIONSuper Mode – The Atheros proprietary Super G performance enhancements are supported by the access point. These enha
4-45Radio InterfaceThe access point implements QoS using the Wi-Fi Multimedia (WMM) standard. Using WMM, the access point is able to prioritize traffi
4-46CHAPTER 4: SYSTEM CONFIGURATIONresolution mechanism first selects data with the highest priority to be granted a transmit opportunity. Then the sa
4-47Radio InterfaceFigure 39 WMM ConfigurationWMM – Sets the WMM operational mode on the access point. When enabled, the parameters for each AC queu
4-48CHAPTER 4: SYSTEM CONFIGURATIONinitial wait time is a random value between zero and the CWMin value. Specify the CWMin value in the range 0-15 mic
4-49SecuritySECURITYThe access point is configured by default as an “open system,” which broadcasts a beacon signal including the configured SSID. Wir
1-11 INTRODUCTIONThe 3Com® Wireless 8760 Dual-radio 11a/b/g PoE Access Point offers a dual-mode architecture that supports 802.11g, 802.11a, and 802.1
4-50CHAPTER 4: SYSTEM CONFIGURATIONThe access point can simultaneously support clients using various different security mechanisms. The configuration
4-51SecurityDynamic WEP (802.1x) onlyAuthentication: Open System Encryption: Enable 802.1x: Required Set 802.1x key refresh and reauthentication rates
4-52CHAPTER 4: SYSTEM CONFIGURATIONWIRED EQUIVALENT PRIVACY (WEP) WEP provides a basic level of security, preventing unauthorized access to the networ
4-53SecurityNote that all clients share the same keys, which are used for user authentication and data encryption. Up to four keys can be specified. T
4-54CHAPTER 4: SYSTEM CONFIGURATIONEncryption – Enable or disable the access point to use data encryption (WEP, TKIP, or AES). If this option is selec
4-55Security Alphanumeric: Enter keys as 5 alphanumeric characters for 64 bit keys, 13 alphanumeric characters for 128 bit keys, or 16 alphanumeric c
4-56CHAPTER 4: SYSTEM CONFIGURATION• Hexadecimal: Enter keys as 10 hexadecimal digits (0-9 and A-F) for 64 bit keys, 26 hexadecimal digits for 128 bi
4-57SecurityTemporal Key Integrity Protocol (TKIP): WPA specifies TKIP as the data encryption method to replace WEP. TKIP avoids the problems of WEP s
4-58CHAPTER 4: SYSTEM CONFIGURATIONfor WPA2. However, the computational intensive operations of AES-CCMP requires hardware support on client devices.
4-59SecurityStatus InformationThe Status page includes information on the following items:Access Point StatusThe AP Status window displays basic syste
Comments to this Manuals