Compex WP54AG 1a User's Guide

Browse online or download User's Guide for Routers Compex WP54AG 1a. Compex WP54AG 1a User guide [en] User Manual

  • Download
  • Add to my manuals
  • Print
  • Page
    / 261
  • Table of contents
  • TROUBLESHOOTING
  • BOOKMARKS
  • Rated. / 5. Based on customer reviews

Summary of Contents

Page 1 - PoE Access Point

www.3Com.com Part Number 10015153 Rev. AAUser Guide3Com Wireless 8760 Dual-radio 11a/b/g PoE Access Point3CRWE876075 / WL-546Published June, 2006

Page 2 - 01752-3064

1-2CHAPTER 1: INTRODUCTIONPRODUCT FEATURESAccess Point 8760—Creates an enterprise-class wireless LAN supporting up to 256 simultaneous users. The acce

Page 3 - Contents

4-60CHAPTER 4: SYSTEM CONFIGURATION HTTP Server: Shows if management access via HTTP is enabled. HTTP Server Port: Shows the TCP port used by the HT

Page 4 - 4 System Configuration

4-61Securitysystem” and “shared key.” Open-system authentication accepts any client attempting to connect to the access point without verifying its id

Page 5 - 6 Troubleshooting

4-62CHAPTER 4: SYSTEM CONFIGURATIONError Messages – An example of a logged error message is: “Station Failed to authenticate (unsupported algorithm).”

Page 6

5-15COMMAND LINE INTERFACEUSING THE COMMAND LINE INTERFACEACCESSING THE CLIWhen accessing the management interface for the over a direct connection to

Page 7 - TERMINOLOGY

5-2CHAPTER 5: COMMAND LINE INTERFACETelnet ConnectionTelnet operates over the IP transport protocol. In this environment, your management station and

Page 8

5-3Using the Command Line InterfaceENTERING COMMANDSThis section describes how to enter CLI commands.Keywords and ArgumentsA CLI command is a series o

Page 9 - 1 INTRODUCTION

5-4CHAPTER 5: COMMAND LINE INTERFACEShowing CommandsIf you enter a “?” at the command prompt, the system will display the first level of keywords for

Page 10 - PRODUCT FEATURES

5-5Using the Command Line InterfaceNegating the Effect of CommandsFor many configuration commands you can enter the prefix keyword “no” to cancel the

Page 11 - PERFORMANCE AND RELIABILITY

5-6CHAPTER 5: COMMAND LINE INTERFACEConfiguration CommandsConfiguration commands are used to modify access point settings. These commands modify the r

Page 12 - WIRELESS NETWORK STANDARDS

5-7Using the Command Line InterfaceTable 9 Keystroke CommandsCOMMAND GROUPSThe system commands can be broken down into the functional groups shown b

Page 13 - APPROVED CHANNELS

1-3Product FeaturesPERFORMANCE AND RELIABILITY3Com wireless access point performance features ensure reliable and seamless connections for users where

Page 14 - CHAPTER 1: INTRODUCTION

5-8CHAPTER 5: COMMAND LINE INTERFACEThe access mode shown in the following tables is indicated by these abbreviations: Exec (Executive Mode), GC (Glob

Page 15 - 2 INSTALLING THE ACCESS POINT

5-9Using the Command Line InterfaceDefault Setting NoneCommand Mode ExecExample Related Commands end (5-9)endThis command returns to the previous conf

Page 16 - SAFETY INFORMATION

5-10CHAPTER 5: COMMAND LINE INTERFACEexitThis command returns to the Exec mode or exits the configuration program.Default Setting NoneCommand Mode Any

Page 17 - PERFORMING A SITE SURVEY

5-11Using the Command Line Interface- Destination unreachable - The gateway for this destination indicates that the destination is unreachable. - Netw

Page 18 - BEFORE YOU BEGIN

5-12CHAPTER 5: COMMAND LINE INTERFACEshow historyThis command shows the contents of the command history buffer.Default Setting NoneCommand Mode ExecCo

Page 19 - Console Port

5-13Using the Command Line InterfaceSystem Management CommandsThese commands are used to configure the user name, password, system logs, browser manag

Page 20 - CONNECTING POWER

5-14CHAPTER 5: COMMAND LINE INTERFACEcountryThis command configures the access point’s country code, which identifies the country of operation and set

Page 21 - Figure 3 Connecting Power

5-15Using the Command Line InterfaceDefault Setting US - for units sold in the United States 99 (no country set) - for units sold in other countriesCo

Page 22 - USING THE POWER SUPPLY

5-16CHAPTER 5: COMMAND LINE INTERFACEDefault Setting Enterprise APCommand Mode Global ConfigurationExample system nameThis command specifies or modifi

Page 23 - CHECKING THE LEDS

5-17Using the Command Line InterfaceDefault Setting adminCommand Mode Global ConfigurationExamplepasswordAfter initially logging onto the system, you

Page 24

1-4CHAPTER 1: INTRODUCTIONMANAGEABILITY3Com offers a wide range of standards-based management support, from SNMP to 3Com Network Supervisor and HP Ope

Page 25 - Figure 5 Mounting Bracket

5-18CHAPTER 5: COMMAND LINE INTERFACECommand Mode Interface Configuration (Ethernet)Command Usage • The access point supports Secure Shell version 2.0

Page 26 - FLAT SURFACE INSTALLATION

5-19Using the Command Line InterfaceCommand Mode Interface Configuration (Ethernet)Exampleip http portThis command specifies the TCP port number used

Page 27 - Side Side

5-20CHAPTER 5: COMMAND LINE INTERFACECommand Mode Global ConfigurationExample Related Commandsip http port (5-19)ip https portUse this command to spec

Page 28 - INSTALLING SOFTWARE UTILITIES

5-21Using the Command Line Interfaceip https serverUse this command to enable the secure hypertext transfer protocol (HTTPS) over the Secure Socket La

Page 29 - 3 INITIAL CONFIGURATION

5-22CHAPTER 5: COMMAND LINE INTERFACEweb-redirectUse this command to enable web-based authentication of clients. Use the no form to disable this funct

Page 30 -  Password: password

5-23Using the Command Line InterfaceAPmgmtIPThis command specifies the client IP addresses that are allowed management access to the access point thro

Page 31

5-24CHAPTER 5: COMMAND LINE INTERFACEExampleThis example restricts management access to the indicated addresses.APmgmtUIThis command enables and disab

Page 32 - USING THE SETUP WIZARD

5-25Using the Command Line Interfaceshow apmanagementThis command shows the AP management configuration, including the IP addresses of management stat

Page 33 - Figure 10 Login Page

5-26CHAPTER 5: COMMAND LINE INTERFACEshow systemThis command displays basic system configuration settings.Default SettingNoneCommand Mode ExecExampleE

Page 34 - Figure 11 Home Page

5-27Using the Command Line Interfaceshow versionThis command displays the software version for the system.Command Mode ExecExample show configThis com

Page 35 - Using the Setup Wizard

1-5Wireless Network Standards802.11A802.11a operates at the 5 GHz band and supports data rates at up to 54 Mbps. For those organizations demanding eve

Page 36 -  802.11b/g

5-28CHAPTER 5: COMMAND LINE INTERFACEProtocol Filter Information===========================================================Local Bridge :DISAB

Page 37

5-29Using the Command Line Interface----------------Security-----------------------------------Closed System : DISABLEDMulticast cipher

Page 38

5-30CHAPTER 5: COMMAND LINE INTERFACERadius Secondary Server Information========================================IP : 0.0.0.0Port

Page 39 - 5 Click Finish

5-31Using the Command Line InterfaceSNTP Information===========================================================Service State : DisabledSNTP (se

Page 40

5-32CHAPTER 5: COMMAND LINE INTERFACEshow hardwareThis command displays the hardware version of the system.Command Mode ExecExample System Logging Com

Page 41 - 4 SYSTEM CONFIGURATION

5-33Using the Command Line Interfacelogging onThis command controls logging of error messages; i.e., sending debug or error messages to memory. The no

Page 42 - ADVANCED SETUP

5-34CHAPTER 5: COMMAND LINE INTERFACEDefault Setting NoneCommand Mode Global ConfigurationExample logging consoleThis command initiates logging of err

Page 43 - Advanced Setup

5-35Using the Command Line InterfaceCommand Usage Messages sent include the selected level down to Emergency level.Example logging facility-typeThis c

Page 44 - SYSTEM IDENTIFICATION

5-36CHAPTER 5: COMMAND LINE INTERFACEExample logging clearThis command clears all log messages stored in the access point’s memory.Syntaxlogging clear

Page 45 - TCP / IP SETTINGS

5-37Using the Command Line Interfaceshow event-logThis command displays log messages stored in the access point’s memory.Syntaxshow event-logCommand M

Page 46 - (0.0.0.0)

1-6CHAPTER 1: INTRODUCTION

Page 47 - Figure 21 Smart Monitor

5-38CHAPTER 5: COMMAND LINE INTERFACEsntp-server ipThis command sets the IP address of the servers to which SNTP time requests are issued. Use the thi

Page 48

5-39Using the Command Line InterfaceDefault Setting EnabledCommand Mode Global ConfigurationCommand Usage The time acquired from time servers is used

Page 49 - AUTHENTICATION

5-40CHAPTER 5: COMMAND LINE INTERFACERelated Commandssntp-server enable (5-38)sntp-server daylight-savingThis command sets the start and end dates for

Page 50

5-41Using the Command Line InterfaceCommand Mode Global ConfigurationCommand Usage This command sets the local time zone relative to the Coordinated U

Page 51 - Figure 23 Authentication

5-42CHAPTER 5: COMMAND LINE INTERFACEDHCP Relay CommandsDynamic Host Configuration Protocol (DHCP) can dynamically allocate an IP address and other co

Page 52

5-43Using the Command Line Interfacedhcp-relayThis command configures the primary and secondary DHCP server addresses.Syntaxdhcp-relay <primary | s

Page 53 - Authentication

5-44CHAPTER 5: COMMAND LINE INTERFACESNMP CommandsControls access to this access point from management stations using the Simple Network Management Pr

Page 54 - FILTER CONTROL

5-45Using the Command Line Interfacesnmp-server communityThis command defines the community access string for the Simple Network Management Protocol.

Page 55 - Filter Control

5-46CHAPTER 5: COMMAND LINE INTERFACEDefault Setting NoneCommand Mode Global ConfigurationExample Related Commandssnmp-server location (5-46)snmp-serv

Page 56

5-47Using the Command Line Interfacesnmp-server enable serverThis command enables SNMP management access and also enables this device to send SNMP tra

Page 57

2-12 INSTALLING THE ACCESS POINTThis equipment must be installed in compliance with local and national building codes, regulatory restrictions, and FC

Page 58

5-48CHAPTER 5: COMMAND LINE INTERFACE• host_name - Name of the host. (Range: 1-63 characters)• community-string - Password-like community string sent

Page 59 - Figure 26 SNMP

5-49Using the Command Line Interface- dot11StationRequestFail - A client station has failed association, re-association, or authentication.- dot1xAuth

Page 60

5-50CHAPTER 5: COMMAND LINE INTERFACEDefault Setting All traps enabledCommand Mode Global ConfigurationCommand Usage This command is used in conjuncti

Page 61 - CONFIGURING SNMPV3 USERS

5-51Using the Command Line Interfacesnmp-server userThis command configures the SNMP v3 users that are allowed to manage the access point. Use the no

Page 62 - ADMINISTRATION

5-52CHAPTER 5: COMMAND LINE INTERFACE- group-name - The name of the SNMP group to which the user is assigned (32 characters maximum). There are three

Page 63 - Figure 29 Administration

5-53Using the Command Line Interface• ip-addr - Specifies the IP address of the management station to receive notifications.• sec-name - The defined

Page 64 - UPGRADING FIRMWARE

5-54CHAPTER 5: COMMAND LINE INTERFACEDefault Setting NoneCommand Mode Global ConfigurationCommand Usage • The access point allows up to 10 notificatio

Page 65 - Figure 31 Firmware Upgrade

5-55Using the Command Line InterfaceDefault Setting NoneCommand Mode Global ConfigurationExample show snmp groupsThis command displays the SNMP v3 pre

Page 66

5-56CHAPTER 5: COMMAND LINE INTERFACEExample show snmp usersThis command displays the SNMP v3 users and settings.Syntax show snmp usersCommand ModeExe

Page 67 - AND SPANNING TREE SETTINGS

5-57Using the Command Line InterfaceExample show snmp targetThis command displays the SNMP v3 notification target settings.Syntaxshow snmp targetComma

Page 68

2-2CHAPTER 2: INSTALLING THE ACCESS POINT To access and use the Web configuration management system, you need a computer that is running Internet Exp

Page 69

5-58CHAPTER 5: COMMAND LINE INTERFACEExample show snmp filter-assignmentsThis command displays the SNMP v3 notification filter assignments.Syntaxshow

Page 70

5-59Using the Command Line Interfaceshow snmpThis command displays the SNMP configuration settings.Command Mode ExecExampleEnterprise AP#show snmpSNMP

Page 71

5-60CHAPTER 5: COMMAND LINE INTERFACEFlash/File CommandsThese commands are used to manage the system code or configuration files.Table 18 Flash/File

Page 72

5-61Using the Command Line Interfacecopy This command copies a boot file, code image, or configuration file between the access point’s flash memory an

Page 73 - SYSTEM LOG

5-62CHAPTER 5: COMMAND LINE INTERFACEExample The following example shows how to upload the configuration settings to a file on the TFTP server:The fol

Page 74 - Table 3 Logging Levels

5-63Using the Command Line InterfaceExample This example shows how to delete the test.cfg configuration file from flash memory.Related Commandsbootfil

Page 75 - RADIO INTERFACE

5-64CHAPTER 5: COMMAND LINE INTERFACEshow bootfileThis command displays the name of the current operation code file that booted the system.Syntaxshow

Page 76 - Figure 35 Radio Settings A

5-65Using the Command Line Interfaceradius-server addressThis command specifies the primary and secondary RADIUS servers. Syntaxradius-server [seconda

Page 77 - Radio Interface

5-66CHAPTER 5: COMMAND LINE INTERFACEExample radius-server keyThis command sets the RADIUS encryption key. Syntax radius-server [secondary] key <ke

Page 78 - Figure 36 Radio Settings A

5-67Using the Command Line Interfaceradius-server timeoutThis command sets the interval between transmitting authentication requests to the RADIUS ser

Page 79 - Turbo Mode

2-3Deciding Where to Place Equipment and Performing A Site SurveyDECIDING WHERE TO PLACE EQUIPMENT AND PERFORMING A SITE SURVEYThe access point is id

Page 80

5-68CHAPTER 5: COMMAND LINE INTERFACEExample radius-server timeout-interimThis command sets the interval between transmitting accounting updates to th

Page 81

5-69Using the Command Line InterfaceDefault SettingNo delimiterCommand ModeGlobal ConfigurationExample radius-server vlan-formatThis command sets the

Page 82 - 802.11B/G INTERFACE

5-70CHAPTER 5: COMMAND LINE INTERFACEExample 802.1X AuthenticationThe access point supports IEEE 802.1X access control for wireless clients. This cont

Page 83

5-71Using the Command Line Interface802.1xThis command configures 802.1X as optionally supported or as required for wireless clients. Use the no form

Page 84 - CONFIGURING WI-FI MULTIMEDIA

5-72CHAPTER 5: COMMAND LINE INTERFACE• When 802.1X is required, the access point enforces 802.1X authentication for all 802.11 associated stations. If

Page 85

5-73Using the Command Line Interface802.1x session-key-refresh-rateThis command sets the interval at which unicast session keys are refreshed for asso

Page 86 - Figure 38 WMM Backoff Times

5-74CHAPTER 5: COMMAND LINE INTERFACEExample802.1x-supplicant enableThis command enables the access point to operate as an 802.1X supplicant for authe

Page 87 - Figure 39 WMM Configuration

5-75Using the Command Line InterfaceDefaultNoneCommand ModeGlobal ConfigurationCommand UsageThe access point currently only supports EAP-MD5 CHAP for

Page 88

5-76CHAPTER 5: COMMAND LINE INTERFACEMAC Address Authentication Use these commands to define MAC authentication on the access point. For local MAC aut

Page 89 - SECURITY

5-77Using the Command Line InterfaceExampleRelated Commandsaddress filter entry (5-77) 802.1x-supplicant user (5-74)address filter entryThis command e

Page 90

2-4CHAPTER 2: INSTALLING THE ACCESS POINTConfiguring a wireless LAN can be as easy as placing a 3Com Wireless Access Point in a central area and makin

Page 91 - Security

5-78CHAPTER 5: COMMAND LINE INTERFACEaddress filter deleteThis command deletes a MAC address from the filter table.Syntaxaddress filter delete <mac

Page 92

5-79Using the Command Line InterfaceRelated Commandsaddress filter entry (5-77) radius-server address (5-65) 802.1x-supplicant user (5-74)mac-authenti

Page 93

5-80CHAPTER 5: COMMAND LINE INTERFACEfilter local-bridgeThis command disables communication between wireless clients. Use the no form to disable this

Page 94

5-81Using the Command Line Interfacefilter ap-manageThis command prevents wireless clients from accessing the management interface on the access point

Page 95 - Figure 42 WEP Keys

5-82CHAPTER 5: COMMAND LINE INTERFACEDefaultDisabledCommand ModeGlobal ConfigurationExamplefilter ethernet-type enableThis command checks the Ethernet

Page 96 - Wi-Fi Protected Access (WPA)

5-83Using the Command Line Interfacefilter ethernet-type protocolThis command sets a filter for a specific Ethernet type. Use the no form to disable f

Page 97

5-84CHAPTER 5: COMMAND LINE INTERFACEExampleWDS Bridge Commands The commands described in this section are used to set the operation mode for each acc

Page 98

5-85Using the Command Line Interfacebridge role (WDS)This command selects the bridge operation mode for the radio interface.Syntaxbridge role <ap |

Page 99 - Figure 43 AP Status

5-86CHAPTER 5: COMMAND LINE INTERFACEbridge-link parentThis command configures the MAC address of the parent bridge node.Syntaxbridge-link parent <

Page 100 - Figure 44 Station Status

5-87Using the Command Line Interface• In bridge mode, up to five child links can be specified using link index numbers 2 to 6. Index number 1 is reser

Page 101 - Figure 45 Event Logs

2-5Connecting the Standard AntennasFigure 1 Front and Rear Panel DescriptionCONNECTING THE STANDARD ANTENNASThe Access Point 8760 is supplied with s

Page 102

5-88CHAPTER 5: COMMAND LINE INTERFACEshow bridge aging-timeThis command displays the current WDS forwarding table aging time setting.Command Mode Exec

Page 103 - NTERFACE

5-89Using the Command Line Interfaceshow bridge filter-entryThis command displays current entries in the WDS forwarding table.Command Mode ExecExample

Page 104 - Telnet Connection

5-90CHAPTER 5: COMMAND LINE INTERFACEshow bridge linkThis command displays WDS bridge link and spanning tree settings for specified interfaces.Syntaxs

Page 105 - ENTERING COMMANDS

5-91Using the Command Line InterfaceSpanning Tree CommandsThe commands described in this section are used to set the MAC address table aging time and

Page 106 - Partial Keyword Lookup

5-92CHAPTER 5: COMMAND LINE INTERFACEbridge stp enableThis command enables the Spanning Tree Protocol. Use the no form to disable the Spanning Tree Pr

Page 107 - Table 8 Command Modes

5-93Using the Command Line InterfaceDefault Setting 15 secondsCommand Mode Global ConfigurationCommand Usage This command sets the maximum time (in se

Page 108 - Command Line Processing

5-94CHAPTER 5: COMMAND LINE INTERFACEbridge stp max-ageUse this command to configure the spanning tree bridge maximum age globally for the wireless br

Page 109 - Table 10 Command Groups

5-95Using the Command Line InterfaceDefault Setting 32768Command Mode Global ConfigurationCommand Usage Bridge priority is used in selecting the root

Page 110 - Table 11 General Commands

5-96CHAPTER 5: COMMAND LINE INTERFACEbridge-link port-priorityUse this command to configure the priority for the specified port. Syntax bridge-link po

Page 111 - Enterprise AP(config)#

5-97Using the Command Line InterfaceExampleEthernet Interface Commands The commands described in this section configure connection parameters for the

Page 112 - Username:

3Com Corporation 350 Campus Drive Marlborough, MA 01752-3064Copyright © 2006 3Com Corporation. All rights reserved. No part of this documentation may

Page 113 - Enterprise AP#reset board

2-6CHAPTER 2: INSTALLING THE ACCESS POINTFigure 2 Antenna AdjustmentDepending on the coverage required for your site, you may want to replace the st

Page 114

5-98CHAPTER 5: COMMAND LINE INTERFACEinterface ethernetThis command enters Ethernet interface configuration mode.Default Setting NoneCommand Mode Glob

Page 115 - System Management Commands

5-99Using the Command Line InterfaceRelated Commands show interface ethernet (5-102)ip address This command sets the IP address for the access point.

Page 116 - Table 13 Country Codes

5-100CHAPTER 5: COMMAND LINE INTERFACEip dhcp This command enables the access point to obtain an IP address from a DHCP server. Use the no form to res

Page 117

5-101Using the Command Line Interfacespeed-duplexThis command configures the speed and duplex mode of a given interface when autonegotiation is disabl

Page 118 - RD2(config)#

5-102CHAPTER 5: COMMAND LINE INTERFACECommand Usage This command allows you to disable the Ethernet port due to abnormal behavior (e.g., excessive col

Page 119

5-103Using the Command Line InterfaceWireless Interface CommandsThe commands described in this section configure connection parameters for the wireles

Page 120 - Enterprise AP(if-ethernet)#

5-104CHAPTER 5: COMMAND LINE INTERFACEinterface wirelessThis command enters wireless interface configuration mode.Syntaxinterface wireless <a | g&g

Page 121

5-105Using the Command Line InterfacevapThis command provides access to the VAP (Virtual Access Point) interface configuration mode.Syntaxvap <vap-

Page 122

5-106CHAPTER 5: COMMAND LINE INTERFACEExampleturboThis command sets the access point to an enhanced proprietary modulation mode (not regulated in IEEE

Page 123

5-107Using the Command Line Interfacemulticast-data-rateThis command configures the maximum data rate at which the access point transmits multicast an

Page 124

2-7Connecting PowerIf you supply your own Ethernet cable for connecting power, be sure that it is standard category 5 straight-through (8-wire) cable

Page 125

5-108CHAPTER 5: COMMAND LINE INTERFACEchannelThis command configures the radio channel through which the access point communicates with wireless clien

Page 126

5-109Using the Command Line Interfacetransmit-powerThis command adjusts the power of the radio signals transmitted from the access point.Syntaxtransmi

Page 127

5-110CHAPTER 5: COMMAND LINE INTERFACEDefault Settingb+g modeCommand ModeInterface Configuration (Wireless - 802.11g)Command Usage • For Japan, only 1

Page 128

5-111Using the Command Line InterfaceExampleantenna controlThis command selects the use of two diversity antennas or a single antenna for the radio in

Page 129

5-112CHAPTER 5: COMMAND LINE INTERFACEantenna idThis command specifies the antenna type connected to the access point represented by a four-digit hexa

Page 130

5-113Using the Command Line InterfaceDefault SettingIndoorCommand ModeInterface Configuration (Wireless)Command Usage• When an external antenna is sel

Page 131

5-114CHAPTER 5: COMMAND LINE INTERFACEdtim-period This command configures the rate at which stations in sleep mode must wake up to receive broadcast/m

Page 132

5-115Using the Command Line Interfacefragmentation-length This command configures the minimum packet size that can be fragmented when passing through

Page 133

5-116CHAPTER 5: COMMAND LINE INTERFACEDefault Setting 2347Command Mode Interface Configuration (Wireless)Command Usage • If the threshold is set to 0,

Page 134 - System Logging Commands

5-117Using the Command Line InterfaceExamplesuper-g This command enables Atheros proprietary Super G performance enhancements. Use the no form to disa

Page 135

2-8CHAPTER 2: INSTALLING THE ACCESS POINTUSING THE POWER SUPPLYThe power supply can be located at any point between the access point and the LAN acces

Page 136

5-118CHAPTER 5: COMMAND LINE INTERFACEExamplessidThis command configures the service set identifier (SSID). Syntaxssid <string>string - The name

Page 137

5-119Using the Command Line InterfaceCommand Mode Interface Configuration (Wireless-VAP)Command Usage When closed system is enabled, the access point

Page 138

5-120CHAPTER 5: COMMAND LINE INTERFACEDefault Setting 30Command Mode Interface Configuration (Wireless-VAP)Exampleauth-timeout-valueThis command confi

Page 139 - System Clock Commands

5-121Using the Command Line InterfaceCommand UsageYou must first enable VAP interface 0 before you can enable VAP interfaces 1, 2, 3, 4, 5, 6, or 7.Ex

Page 140

5-122CHAPTER 5: COMMAND LINE INTERFACECommand Mode ExecExample Enterprise AP#show interface wireless g 0Wireless Interface Information================

Page 141

5-123Using the Command Line Interface----------------Security-------------------------------------------------Closed System : Disabl

Page 142

5-124CHAPTER 5: COMMAND LINE INTERFACEWMM AP ParametersAC0(Best Effort) : logCwMin: 4 logCwMax: 6 AIFSN: 3

Page 143

5-125Using the Command Line Interfaceshow stationThis command shows the wireless clients associated with the access point.Command Mode ExecExample Rog

Page 144 - DHCP Relay Commands

5-126CHAPTER 5: COMMAND LINE INTERFACEThe access point can be configured to periodically scan all radio channels and find other access points within r

Page 145

5-127Using the Command Line InterfaceThe rogue AP database can be viewed using the show rogue-ap command.• The access point sends Syslog messages for

Page 146 - Table 17 SNMP Commands

2-9Checking the LEDsCHECKING THE LEDSWhen power is connected, the access point LEDs light. The illustration and the following table describe the LEDs

Page 147

5-128CHAPTER 5: COMMAND LINE INTERFACErogue-ap durationThis command sets the scan duration for detecting access points.Syntaxrogue-ap duration <mil

Page 148

5-129Using the Command Line InterfaceDefault Setting720 minutesCommand Mode Interface Configuration (Wireless)Command Usage This command sets the inte

Page 149

5-130CHAPTER 5: COMMAND LINE INTERFACEshow rogue-apThis command displays the current rogue AP database.Command Mode ExecExample Wireless Security Comm

Page 150

5-131Using the Command Line InterfaceauthThis command configures authentication for the VAP interface.Syntaxauth <open-system | shared-key | wpa |

Page 151

5-132CHAPTER 5: COMMAND LINE INTERFACE• To use WEP shared-key authentication, set the authentication type to “shared-key” and define at least one stat

Page 152

5-133Using the Command Line InterfaceWEP). To place the VAP into AES only mode, use “required” and then select the “cipher-ccmp” option for the ciphe

Page 153

5-134CHAPTER 5: COMMAND LINE INTERFACEExampleRelated Commandskey (5-134)key This command sets the keys used for WEP encryption. Use the no form to del

Page 154

5-135Using the Command Line InterfaceExampleRelated Commandskey (5-134) encryption (5-133) transmit-key (5-135)transmit-keyThis command sets the index

Page 155

5-136CHAPTER 5: COMMAND LINE INTERFACEcipher-suite This command defines the cipher algorithm used to encrypt the global key for broadcast and multicas

Page 156 - .1.3.6.1.2.1.2.2.1.1.23

5-137Using the Command Line Interface• AES-CCMP (Advanced Encryption Standard Counter-Mode/CBCMAC Protocol): WPA2 is backward compatible with WPA, inc

Page 157

2-10CHAPTER 2: INSTALLING THE ACCESS POINTWALL, CEILING, OR ELECTRICAL BOX MOUNTINGTo mount the access point to a wall, ceiling, or electrical box:1 R

Page 158

5-138CHAPTER 5: COMMAND LINE INTERFACE• Using the “software” option provides the best performance for a large number of clients on one radio interface

Page 159

5-139Using the Command Line Interfacepmksa-lifetime This command sets the time for aging out cached WPA2 Pairwise Master Key Security Association (PMK

Page 160

5-140CHAPTER 5: COMMAND LINE INTERFACEDefault Setting DisabledCommand Mode Interface Configuration (Wireless-VAP)Command Usage • Each time a client ro

Page 161 - Command Mode

5-141Using the Command Line InterfaceLink Integrity CommandsThe access point provides a link integrity feature that can be used to ensure that wireles

Page 162 - Flash/File Commands

5-142CHAPTER 5: COMMAND LINE INTERFACEhost does not respond or is unreachable) exceeds the limit set by the link-integrity ping-fail-retry command, th

Page 163

5-143Using the Command Line InterfaceExample link-integrity ping-fail-retryThis command configures the number of consecutive failed Ping counts before

Page 164

5-144CHAPTER 5: COMMAND LINE INTERFACEshow link-integrityThis command displays the current link integrity configuration.Command Mode ExecExample IAPP

Page 165

5-145Using the Command Line Interfacebetween access points from different vendors. This command is used to enable or disable 802.11f handover signalin

Page 166 - Table 19 RADIUS Client

5-146CHAPTER 5: COMMAND LINE INTERFACEvlanThis command enables VLANs for all traffic. Use the no form to disable VLANs.Syntax[no] vlan enable DefaultD

Page 167

5-147Using the Command Line InterfaceDefault Setting 1Command Mode Global ConfigurationCommand Usage The management VLAN is for managing the access po

Page 168

2-11Wall, Ceiling, or Electrical Box MountingFigure 4 Routing a CableFigure 5 Mounting Bracket4 Connect the Ethernet cable to the port on the back

Page 169

5-148CHAPTER 5: COMMAND LINE INTERFACE• If the VLAN ID has not been configured for a client on the RADIUS server, then the frames are tagged with the

Page 170

5-149Using the Command Line InterfaceDefaultsupportedCommand ModeInterface Configuration (Wireless)Examplewmm-acknowledge-policyThis command allows th

Page 171

5-150CHAPTER 5: COMMAND LINE INTERFACEExamplewmmparamThis command configures detailed WMM parameters that apply to the access point (AP) or the wirele

Page 172 - 802.1X Authentication

5-151Using the Command Line InterfaceDefaultCommand ModeInterface Configuration (Wireless)ExampleAP ParametersWMM Parameters AC0 (Best Effort) AC1 (B

Page 173

5-152CHAPTER 5: COMMAND LINE INTERFACE

Page 174

6-16 TROUBLESHOOTINGIf you have difficulty with the 3Com Wireless LAN access point, first check the following items in the configuration: Radio Setti

Page 175

6-2CHAPTER 6: TROUBLESHOOTINGNo operation.Verify the access point configuration.Review access point firmware revisions and update firmware if necessar

Page 176

6-3While you are configuring the access point, the Configuration Management System stops responding.To maintain wireless association, the service area

Page 177

6-4CHAPTER 6: TROUBLESHOOTING

Page 178 - MAC Address Authentication

I-1INDEXNumbers3Com 3CDaemon Server Tool 2-143Com Wireless Infrastructure Device Manager 2-14802.11g 5-104Aaccess pointinstallation 2-1IP addr

Page 179

2-12CHAPTER 2: INSTALLING THE ACCESS POINTFLAT SURFACE INSTALLATIONThe access point can also be placed on a flat surface such as a table, desktop or f

Page 180

I-2Ggateway address 4-6, 5-2, 5-99Hhardware version, displaying 5-27HTTP, secure server 5-21HTTPS 5-21IIAPP 5-144IEEE 802.11a 4-35, 5-104c

Page 181 - Table 22 Filtering Commands

I-3RTSthreshold 4-41, 5-115Ssafety information 2-2Secure Socket Layer See SSLsecurity, options 4-49session key 4-10, 4-13, 5-73shared key 3-

Page 182

2-13Selecting and Connecting a Different Antenna ModelFigure 7 Connecting Antennae1 Position the antenna so that there are minimal obstacles between

Page 183

2-14CHAPTER 2: INSTALLING THE ACCESS POINTINSTALLING SOFTWARE UTILITIESThe installation CD includes documentation and software utilities to help you s

Page 184

3-13 INITIAL CONFIGURATIONThe Access Point 8760 offers a variety of management options, including a web-based interface.The initial configuration step

Page 185

3Contents1 IntroductionProduct Features 1-2Security 1-2Performance and Reliability 1-3Virtual Access Point (VAP) Support 1-3WDS Bridgi

Page 186 - WDS Bridge Commands

3-2CHAPTER 3: INITIAL CONFIGURATION1 Connect a computer directly to the Access Point using the supplied standard Category 5 UTP Ethernet cable.2 Enter

Page 187 - Enterprise AP(if-wireless a)#

3-3Figure 8 Wireless Interface Device ManagerClick on the Properties button to see the following screenFigure 9 Wireless Interface Device Manager

Page 188

3-4CHAPTER 3: INITIAL CONFIGURATIONDirectly connect to the device through its Ethernet port or console port. Follow the instructions below to login in

Page 189

3-5Using the Setup WizardLogging In – Enter the username “admin,” and password “password,” then click LOGIN. For information on configuring a user nam

Page 190 - Example

3-6CHAPTER 3: INITIAL CONFIGURATIONThe home page displays the Main Menu.Figure 11 Home PageLaunching the Setup Wizard – To perform initial configura

Page 191

3-7Using the Setup Wizard1 Service Set ID – Enter the service set identifier in the SSID box which all wireless clients must use to associate with the

Page 192

3-8CHAPTER 3: INITIAL CONFIGURATIONFigure 14 Setup Wizard - Step 2 802.11aTurbo Mode – If you select Enable, the access point will operate in turbo

Page 193 - Table 24 Bridge Commands

3-9Using the Setup Wizard3 IP Configuration – Either enable or disable Dynamic Host Configuration Protocol (DHCP) for automatic IP configuration. If y

Page 194 - Command Function Mode Page

3-10CHAPTER 3: INITIAL CONFIGURATIONFigure 16 Setup Wizard - Step 4Authentication Type – Use “Open System” to allow open access to all wireless clie

Page 195

3-11Using the Setup Wizard5 Click Finish.6 Click the OK button to complete the wizard.Figure 17 Setup Wizard - Completed

Page 196

43 Initial ConfigurationNetworks with a DHCP Server 3-1Networks without a DHCP Server 3-1Using the 3Com Installation CD 3-2Launch the 3COM

Page 197

3-12CHAPTER 3: INITIAL CONFIGURATION

Page 198

4-14 SYSTEM CONFIGURATIONBefore continuing with advanced configuration, first complete the initial configuration steps described in Chapter 4 to set u

Page 199 - Ethernet Interface Commands

4-2CHAPTER 4: SYSTEM CONFIGURATIONFigure 18 Advanced SetupThe information in this chapter is organized to reflect the structure of the web screens f

Page 200

4-3Advanced SetupSNMP Configures SNMP settings 4-18Administration Configures user name and password for management access; upgrades software from loca

Page 201 - 192.254.2.253

4-4CHAPTER 4: SYSTEM CONFIGURATIONSYSTEM IDENTIFICATIONThe system name for the access point can be left at its default setting. However, modifying thi

Page 202

4-5TCP / IP SettingsTCP / IP SETTINGSConfiguring the access point with an IP address expands your ability to manage the access point. A number of acce

Page 203

4-6CHAPTER 4: SYSTEM CONFIGURATIONDHCP Client (Enable) – Select this option to obtain the IP settings for the access point from a DHCP (Dynamic Host C

Page 204

4-7TCP / IP SettingsFigure 21 Smart MonitorBy enabling Smart Monitor (known as Link Integrity in the CLI) and setting a target IP address, the AP wi

Page 205 - Wireless Interface Commands

4-8CHAPTER 4: SYSTEM CONFIGURATIONRADIUSRemote Authentication Dial-in User Service (RADIUS) is an authentication protocol that uses software running o

Page 206

4-9Authentication Port: The UDP port number used by the RADIUS server for authentication messages. (Range: 1024-65535; Default: 1812) Key: A shared

Page 207

5Wi-Fi Protected Access (WPA) 4-565 Command Line InterfaceUsing the Command Line Interface 5-1Accessing the CLI 5-1Console Connection

Page 208 - Enterprise AP(if-wireless g)#

4-10CHAPTER 4: SYSTEM CONFIGURATIONuse both MAC address and 802.1X authentication, with client station MAC authentication occurring prior to IEEE 802.

Page 209

4-11AuthenticationFigure 23 AuthenticationMAC Authentication – You can configure a list of the MAC addresses for wireless clients that are authorize

Page 210

4-12CHAPTER 4: SYSTEM CONFIGURATION Local MAC: The MAC address of the associating station is compared against the local database stored on the access

Page 211

4-13AuthenticationWhen 802.1X is enabled, the broadcast and session key rotation intervals can also be configured. Broadcast Key Refresh Rate: Sets t

Page 212

4-14CHAPTER 4: SYSTEM CONFIGURATIONFILTER CONTROLThe access point can employ network traffic frame filtering to control access to network resources an

Page 213

4-15Filter ControlAP Management Filter – Controls management access to the access point from wireless clients. Management interfaces include the web,

Page 214

4-16CHAPTER 4: SYSTEM CONFIGURATIONVLANThe access point can employ VLAN tagging support to control access to network resources and increase security.

Page 215

4-17Filter ControlA VLAN ID (1-4094) can be assigned to a client after successful IEEE 802.1X authentication. The client VLAN IDs must be configured o

Page 216

4-18CHAPTER 4: SYSTEM CONFIGURATIONSNMPSimple Network Management Protocol (SNMP) is a communication protocol designed specifically for managing device

Page 217

4-19SNMPFigure 26 SNMPSNMP – Enables or disables SNMP management access and also enables the access point to send SNMP traps (notifications). (Defau

Page 219

4-20CHAPTER 4: SYSTEM CONFIGURATION Trap Destination Community Name – The community string sent with the notification operation. (Maximum length: 23

Page 220

4-21SNMP dot11InterfaceAFail - The 802.11a or 802.11g interface has failed. dot1xMacAddrAuthSuccess - A client station has successfully authenticate

Page 221

4-22CHAPTER 4: SYSTEM CONFIGURATIONPassphrase – The password or key associated with the authentication and privacy settings. A minimum of eight plain

Page 222

4-23AdministrationFigure 29 AdministrationUsername – The name of the user. The default name is “admin.” (Length: 3-16 characters, case sensitive)New

Page 223

4-24CHAPTER 4: SYSTEM CONFIGURATION Telnet Server: Enables or disables the Telnet server. (Default: Disabled) SSH Server: Enables or disables the SS

Page 224

4-25AdministrationFigure 31 Firmware UpgradeBefore upgrading new software, verify that the access point is connected to the network and has been con

Page 225

4-26CHAPTER 4: SYSTEM CONFIGURATION If upgrading from an FTP server, be sure that you have an account configured on the server with a user name and p

Page 226

4-27WDS and Spanning Tree SettingsWDS AND SPANNING TREE SETTINGSEach access point radio interface can be configured to operate in a bridge or repeater

Page 227 - Rogue AP Detection Commands

4-28CHAPTER 4: SYSTEM CONFIGURATIONFigure 32 WDS and Spanning Tree Settings

Page 228 - Table 27 Rogue AP Commands

4-29WDS and Spanning Tree SettingsWDS Bridge – Up to six WDS bridge or repeater links (MAC addresses) per radio interface can be specified for each un

Page 229

7TERMINOLOGYAccess Point—An internetworking device that seamlessly connects wired and wireless networks.Ad Hoc—An ad hoc wireless LAN is a group of co

Page 230

4-30CHAPTER 4: SYSTEM CONFIGURATIONFigure 33 Spanning Tree ProtocolSpanning Tree Protocol – STP uses a distributed algorithm to select a bridging de

Page 231

4-31WDS and Spanning Tree Settingsfrom that device to the root device. Then it selects a designated bridging device from each LAN which incurs the low

Page 232 - Wireless Security Commands

4-32CHAPTER 4: SYSTEM CONFIGURATION Bridge Forwarding Delay – The maximum time (in seconds) this device waits before changing states (i.e., discardin

Page 233

4-33System LogSYSTEM LOG The access point can be configured to send event and error messages to a System Log Server. The system clock can also be sync

Page 234

4-34CHAPTER 4: SYSTEM CONFIGURATIONEnter Time Zone – Sets the desired time zone + or - GMT.Enable Daylight Saving – Adjusts the clock for summertime a

Page 235

4-35Radio Interface Secondary Server: The IP address of a secondary SNTP or NTP time server. The access point first attempts to update the time from

Page 236

4-36CHAPTER 4: SYSTEM CONFIGURATION802.11A INTERFACEThe IEEE 802.11a interface operates within the 5 GHz band, at up to 54 Mbps in normal mode or up t

Page 237

4-37Radio InterfaceSSID – The name of the basic service set provided by a VAP interface. Clients that want to connect to the network through the acces

Page 238

4-38CHAPTER 4: SYSTEM CONFIGURATIONCONFIGURING COMMON RADIO SETTINGSTo configure common radio settings, select the Radio Settings page, and scroll dow

Page 239

4-39Radio InterfaceSuper Mode – The Atheros proprietary Super A performance enhancements are supported by the access point. These enhancements include

Page 240

8VAP—Virtual Access Point. An access point radio capable of operating as four separate access points. VLAN—Virtual Local Area Network. A LAN consistin

Page 241

4-40CHAPTER 4: SYSTEM CONFIGURATIONOutput Antenna – Selects the use of both fixed antennas operating in diversity mode or a single antenna. (Default:

Page 242

4-41Radio InterfaceDelivery Traffic Indication Message (DTIM) – The rate at which stations in sleep mode must wake up to receive broadcast/multicast t

Page 243 - Link Integrity Commands

4-42CHAPTER 4: SYSTEM CONFIGURATION802.11B/G INTERFACEThe IEEE 802.11g standard operates within the 2.4 GHz band at up to 54 Mbps. Also note that beca

Page 244

4-43Radio InterfaceFigure 37 Radio Settings B/GClient Access Mode – Selects the operating mode for the 802.11g wireless interface. (Default: 802.11b

Page 245

4-44CHAPTER 4: SYSTEM CONFIGURATIONSuper Mode – The Atheros proprietary Super G performance enhancements are supported by the access point. These enha

Page 246 - IAPP Commands

4-45Radio InterfaceThe access point implements QoS using the Wi-Fi Multimedia (WMM) standard. Using WMM, the access point is able to prioritize traffi

Page 247 - Table 30 VLAN Commands

4-46CHAPTER 4: SYSTEM CONFIGURATIONresolution mechanism first selects data with the highest priority to be granted a transmit opportunity. Then the sa

Page 248

4-47Radio InterfaceFigure 39 WMM ConfigurationWMM – Sets the WMM operational mode on the access point. When enabled, the parameters for each AC queu

Page 249

4-48CHAPTER 4: SYSTEM CONFIGURATIONinitial wait time is a random value between zero and the CWMin value. Specify the CWMin value in the range 0-15 mic

Page 250 - Table 31 WMM Commands

4-49SecuritySECURITYThe access point is configured by default as an “open system,” which broadcasts a beacon signal including the configured SSID. Wir

Page 251

1-11 INTRODUCTIONThe 3Com® Wireless 8760 Dual-radio 11a/b/g PoE Access Point offers a dual-mode architecture that supports 802.11g, 802.11a, and 802.1

Page 252

4-50CHAPTER 4: SYSTEM CONFIGURATIONThe access point can simultaneously support clients using various different security mechanisms. The configuration

Page 253

4-51SecurityDynamic WEP (802.1x) onlyAuthentication: Open System Encryption: Enable 802.1x: Required Set 802.1x key refresh and reauthentication rates

Page 254

4-52CHAPTER 4: SYSTEM CONFIGURATIONWIRED EQUIVALENT PRIVACY (WEP) WEP provides a basic level of security, preventing unauthorized access to the networ

Page 255 - 6 TROUBLESHOOTING

4-53SecurityNote that all clients share the same keys, which are used for user authentication and data encryption. Up to four keys can be specified. T

Page 256 - Symptom Solutions

4-54CHAPTER 4: SYSTEM CONFIGURATIONEncryption – Enable or disable the access point to use data encryption (WEP, TKIP, or AES). If this option is selec

Page 257

4-55Security Alphanumeric: Enter keys as 5 alphanumeric characters for 64 bit keys, 13 alphanumeric characters for 128 bit keys, or 16 alphanumeric c

Page 258 - CHAPTER 6: TROUBLESHOOTING

4-56CHAPTER 4: SYSTEM CONFIGURATION• Hexadecimal: Enter keys as 10 hexadecimal digits (0-9 and A-F) for 64 bit keys, 26 hexadecimal digits for 128 bi

Page 259

4-57SecurityTemporal Key Integrity Protocol (TKIP): WPA specifies TKIP as the data encryption method to replace WEP. TKIP avoids the problems of WEP s

Page 260

4-58CHAPTER 4: SYSTEM CONFIGURATIONfor WPA2. However, the computational intensive operations of AES-CCMP requires hardware support on client devices.

Page 261

4-59SecurityStatus InformationThe Status page includes information on the following items:Access Point StatusThe AP Status window displays basic syste

Comments to this Manuals

No comments