Smc-networks ElliteConnect 2.4GHz/5GHz Uživatelský manuál

Procházejte online nebo si stáhněte Uživatelský manuál pro Hardware Smc-networks ElliteConnect 2.4GHz/5GHz. SMC Networks ElliteConnect 2.4GHz/5GHz User Manual Uživatelská příručka

  • Stažení
  • Přidat do mých příruček
  • Tisk
  • Strana
    / 322
  • Tabulka s obsahem
  • ŘEŠENÍ PROBLÉMŮ
  • KNIHY
  • Hodnocené. / 5. Na základě hodnocení zákazníků

Shrnutí obsahu

Strany 1 - Outdoor Access Point/Bridge

38 TeslaIrvine, CA 92618Phone: (949) 679-8000EliteConnect™ Universal2.4GHz/5GHz Wireless Dual-Band Outdoor Access Point/BridgeThe easy way to make all

Strany 2 - Copyright

COMPLIANCESviiiSafety CompliancePower Cord SafetyPlease read the following safety information carefully before installing the wireless access point:WA

Strany 3 - LIMITED WARRANTY

System Configuration6-24CLI Commands for RADIUS MAC Authentication – Use the mac-authentication server command from the global configuration mode to e

Strany 4

Advanced Configuration6-25CLI Commands for 802.1X Authentication – Use the 802.1X supported command from the global configuration mode to enable 802.1

Strany 5

System Configuration6-26Filter ControlThe wireless bridge can employ VLAN tagging support and network traffic frame filtering to control access to net

Strany 6 - EC Conformance Declaration

Advanced Configuration6-27traffic that has an unknown VLAN ID or no VLAN tag is dropped. When VLAN support is disabled, the wireless bridge does not t

Strany 7

System Configuration6-28Note: The specific configuration of RADIUS server software is beyond the scope of this guide. Refer to the documentation provi

Strany 8

Advanced Configuration6-29• Enable: Wireless bridge filters Ethernet protocol types based on the configuration of protocol types in the filter table.

Strany 9 - Community

System Configuration6-30you want to filter. To display the current settings, use the show filters command from the Exec mode.SNMPYou can use a network

Strany 10 - Safety Compliance

Advanced Configuration6-31SNMP – Enables or disables SNMP management access and also enables the wireless bridge to send SNMP traps (notifications). S

Strany 11 - OMPLIANCES

System Configuration6-32Trap Destination Community Name – The community string sent with the notification operation. (Maximum length: 23 characters; D

Strany 12

Advanced Configuration6-33AdministrationChanging the PasswordManagement access to the web and CLI interface on the wireless bridge is controlled throu

Strany 13 - (Germany):

COMPLIANCESixImportant! Before making connections, make sure you have the correct cord set. Check it (read the label on the cable) against the followi

Strany 14

System Configuration6-34CLI Commands for the User Name and Password – Use the username and password commands from the CLI configuration mode.Upgrading

Strany 15

Advanced Configuration6-35Before upgrading new software, verify that the wireless bridge is connected to the network and has been configured with a co

Strany 16

System Configuration6-36Firmware Upgrade Local – Downloads an operation code image file from the web management station to the wireless bridge using H

Strany 17

Advanced Configuration6-37Note: If you have upgraded system software, then you must reboot the wireless bridge to implement the new operation code.CLI

Strany 18

System Configuration6-38System Log The wireless bridge can be configured to send event and error messages to a System Log Server. The system clock can

Strany 19

Advanced Configuration6-39Logging Console – Enables the logging of error messages to the console.Logging Level – Sets the minimum severity level for e

Strany 20

System Configuration6-40CLI Commands for System Logging – To enable logging on the wireless bridge, use the logging on command from the global configu

Strany 21

Advanced Configuration6-41The wireless bridge acts as an SNTP client, periodically sending time synchronization requests to specific time servers. You

Strany 22

System Configuration6-42CLI Commands for SNTP – To enable SNTP support on the wireless bridge, from the global configuration mode specify SNTP server

Strany 23 - Introduction

Advanced Configuration6-43Wireless Distribution System (WDS)The IEEE 802.11 standard defines a WIreless Distribution System (WDS) for connections betw

Strany 24 - Package Checklist

COMPLIANCESxVeuillez lire à fond l'information de la sécurité suivante avant d'installer le wireless access point:AVERTISSEMENT: L’installat

Strany 25

System Configuration6-44Mode – The wireless bridge is set to operate as a Slave or Master unit:• Master Mode: In a point-to-multipoint network configu

Strany 26 - Hardware Description

Advanced Configuration6-45MAC Address – The physical layer address of the wireless bridge unit at the other end of the wireless link. (12 hexadecimal

Strany 27 - Ethernet Port

System Configuration6-46Bridge Aging Time – Changes the aging time for entries in the dynamic address table:• Ethernet: The time after which a learned

Strany 28 - Input Output

Advanced Configuration6-47CLI Commands for Bridging – The following example shows how to set the MAC address aging time for the wireless bridge.Spanni

Strany 29

System Configuration6-48device (except for the root device) which incurs the lowest path cost when forwarding a packet from that device to the root de

Strany 30

Advanced Configuration6-49Enable – Enables/disables STP on the wireless bridge. (Default: Enabled)Forward Delay – The maximum time (in seconds) this d

Strany 31 - Features and Benefits

System Configuration6-50Hello Time – Interval (in seconds) at which the root device transmits a configuration message. (Range: 1-10 seconds)• Default:

Strany 32 - System Defaults

Advanced Configuration6-51assigned to ports with slower media. (Path cost takes precedence over port priority.) • Range: 1-65535• Default: Ethernet in

Strany 33

System Configuration6-52Por t Fast (Fast Forwarding) – You can enable this option if an interface is attached to a LAN segment that is at the end of a

Strany 34

Advanced Configuration6-53CLI Commands for STP – The following example configures spanning tree paramters for the bridge and wireless port 5. AP(confi

Strany 35

COMPLIANCESxiBitte unbedingt vor dem Einbauen des Access Point die folgenden Sicherheitsanweisungen durchlesen (Germany):WARNUNG: Die Installation und

Strany 36

System Configuration6-54RSSI The RSSI value displayed on the RSSI page represents a signal to noise ratio. A value of 30 would indicate that the power

Strany 37 - Network Configuration

Advanced Configuration6-55RSSI – The RSSI value for a selected port can be displayed and a representative voltage output can be enabled.• Output Activ

Strany 38

System Configuration6-56Radio InterfaceThe IEEE 802.11a and 802.11g interfaces include configuration options for radio signal characteristics and wire

Strany 39 - Infrastructure Wireless LAN

Radio Interface6-57Radio Settings A (802.11a)The IEEE 802.11a interface operates within the 5 GHz band, at up to 54 Mbps in normal mode or up to 108 M

Strany 40

System Configuration6-58mode.SSID Broadcast – When enabled, the access point radio does not include its SSID in beacon messages. Nor does it respond t

Strany 41 - Bridge Link Topologies

Radio Interface6-59Auto Channel Select – Enables the wireless bridge to automatically select an unoccupied radio channel. (Default: Enabled)Transmit P

Strany 42

System Configuration6-60Using higher DTIM values reduces the power used by stations in Power Save mode, but delays the transmission of broadcast/multi

Strany 43

Radio Interface6-61Maximum Associations – (Access point mode only) Sets the maximum number of clients that can be associated with the access point rad

Strany 44

System Configuration6-62AP(config)#interface wireless a 7-99Enter Wireless configuration commands, one per line.AP(if-wireless a)#description RD-AP#3

Strany 45 - Bridge Link Planning

Radio Interface6-63Radio Settings G (802.11g)The IEEE 802.11g standard operates within the 2.4 GHz band at up to 54 Mbps. Also note that because the I

Strany 46

COMPLIANCESxiigegeben, wenn auch die an das Gerät angeschlossenen Geräte unter SELV-Bedingungen betrieben werden.•Stromkabel. Dies muss von dem Land,

Strany 47 - Antenna Height

System Configuration6-64with each other. For example, in the United States you can deploy up to three access points in the same area (e.g., channels 1

Strany 48

Radio Interface6-65stop sending the SSID in beacon messages. Select a radio channel or set selection to Auto using the channel command. Set any other

Strany 49

System Configuration6-66Security (Bridge Mode)Wired Equivalent Privacy (WEP) and Advanced Encryption Standard (AES) are implemented for security in br

Strany 50 - Radio Interference

Radio Interface6-67Setting up IEEE 802.11 Wired Equivalent Privacy (WEP) shared keys prevents unauthorized access to the wireless bridge network.Be su

Strany 51 - Weather Conditions

System Configuration6-68Advanced Encryption Standard (AES) AES has been designated by the National Institute of Standards and Technology as the succes

Strany 52 - Grounding

Radio Interface6-69Configuring AES encryption keys on the wireless bridge provides far more robust security than using WEP. Also, a unique AES key can

Strany 53 - Hardware Installation

System Configuration6-70command. To view the current security settings, use the show interface wireless a command.Note: The index and length values us

Strany 54 - Mount the Unit

Radio Interface6-71CLI Commands for AES Security – From the 802.11a interface configuration mode, use the encryption command to enable AES encryption.

Strany 55

System Configuration6-72Security (Access Point Mode)A radio band set to access point mode is configured by default as an “open system,” which broadcas

Strany 56

Radio Interface6-73wireless clients. A summary of wireless security considerations is listed in the following table.Security MechanismClient Support I

Strany 57 - Connect External Antennas

xiiiTABLE OF CONTENTS1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-1Package Checklist . . . . . . . . . . . . . . . . .

Strany 58

System Configuration6-74Note: Although a WEP static key is not needed for WEP over 802.1X, WPA over 802.1X, and WPA PSK modes, you must enable WEP enc

Strany 59 - Connect the Power Injector

Radio Interface6-75authentication and data encryption. Also, be sure that the WEP shared keys are the same for each client in the wireless network.Aut

Strany 60

System Configuration6-76Shared Key Setup – Select 64 Bit, 128 Bit, or 152 Bit key length. Note that the same size of encryption key must be supported

Strany 61 - Align Antennas

Radio Interface6-77four settings without having to update the client keys.Note: Key index and type must match that configured on the clients.The confi

Strany 62

System Configuration6-78show interface wireless a or show interface wireless g command.Note: The index and length values used in the key command must

Strany 63

Radio Interface6-79CLI Commands for WEP over 802.1X Security – From the 802.11a or 802.11g interface configuration mode, use the authentication comman

Strany 64

System Configuration6-80Wi-Fi Protected Access (WPA)WPA employs a combination of several technologies to provide an enhanced security solution for 802

Strany 65 - Initial Configuration

Radio Interface6-81when a RADIUS server has authenticated a user’s credentials will encryption keys be sent to the access point and client.Note: To im

Strany 66 - Initial Setup through the CLI

System Configuration6-82uses TKIP unicast data encryption keys for WPA clients and WEP unicast keys for WEP clients. The global encryption key for mul

Strany 67

Radio Interface6-83The WPA configuration parameters are described below:Authentication Type Setup – When using WPA, set the access point to communicat

Strany 68 - Setup Wizard

TABLE OF CONTENTSxivConnect External Antennas . . . . . . . . . . . . . . . . . . . . . . . . . . .4-5Connect Cables to the Unit . . . . . . . . . .

Strany 69

System Configuration6-84• TKIP: TKIP provides data encryption enhancements including per-packet key hashing (that is, changing the encryption key on e

Strany 70

Radio Interface6-85The configuration settings for WPA are summarized below:CLI Commands for WPA Pre-shared Key Security – From the 802.11a or 802.11g

Strany 71

System Configuration6-86authentication. To view the current 802.11g security settings, use the show interface wireless a or show interface wireless g

Strany 72

Status Information6-87Status InformationThe Status page includes information on the following items:AP StatusThe AP Status window displays basic syste

Strany 73

System Configuration6-88• System Up Time: Length of time the management agent has been up.• MAC Address: The physical layer address for this device.•

Strany 74

Status Information6-89• Radio Authentication Type: Shows the bridge is set as an open system.• 802.1X: Shows if IEEE 802.1X access control for wireles

Strany 75

System Configuration6-90Station StatusThe Station Status window shows wireless clients currently associated with the access point.The Station Status p

Strany 76

Status Information6-91• Associated: Shows if the station has been successfully associated with the access point. • Forwarding Allowed: Shows if the st

Strany 77 - Chapter 6

System Configuration6-92Event LogsThe Event Logs window shows the log messages generated by the wireless bridge and stored in memory.The Event Logs ta

Strany 78

Status Information6-93

Strany 79

TABLE OF CONTENTSxvEntering Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-3Keywords and Arguments . . . . . . . . . . .

Strany 80 - System Identification

System Configuration6-94

Strany 81

7-1Chapter 7Command Line InterfaceUsing the Command Line InterfaceAccessing the CLIWhen accessing the management interface for the wireless bridge via

Strany 82

Command Line Interface7-2gateway if you are managing the wireless bridge from a different IP subnet. For example:After you configure the wireless brid

Strany 83 - TCP / IP Settings

Entering Commands7-3Entering CommandsThis section describes how to enter CLI commands.Keywords and ArgumentsA CLI command is a series of keywords and

Strany 84

Command Line Interface7-4Getting Help on CommandsYou can display a brief description of the help system by entering the help command. You can also dis

Strany 85

Entering Commands7-5The command “show interface ?” will display the following information:Partial Keyword LookupIf you terminate a partial keyword wit

Strany 86

Command Line Interface7-6Understanding Command ModesThe command set is divided into Exec and Configuration classes. Exec commands generally display in

Strany 87

Entering Commands7-7Configuration CommandsConfiguration commands are used to modify wireless bridge settings. These commands modify the running config

Strany 88

Command Line Interface7-8Command Line ProcessingCommands are not case sensitive. You can abbreviate commands and parameters as long as they contain en

Strany 89 - PPPoE Settings

Command Groups7-9Command GroupsThe system commands can be broken down into the functional groups shown below.Command GroupDescription PageGeneral Bas

Strany 90

TABLE OF CONTENTSxviSystem Clock Commands . . . . . . . . . . . . . . . . . . . . . . . . . . .7-28sntp-server ip . . . . . . . . . . . . . . . . . .

Strany 91

Command Line Interface7-10The access mode shown in the following tables is indicated by these abbreviations: GC (Global Configuration), IC-E (Ethernet

Strany 92

General Commands7-11Command Mode ExecExample Related Commands end (page 7-11)endThis command returns to the previous configuration mode.Default Settin

Strany 93

Command Line Interface7-12Example This example shows how to return to the Exec mode from the Interface Configuration mode, and then quit the CLI sessi

Strany 94

General Commands7-13– Network or host unreachable - The gateway found no corresponding entry in the route table. • Press <Esc> to stop pinging.E

Strany 95

Command Line Interface7-14show historyThis command shows the contents of the command history buffer.Default Setting NoneCommand Mode ExecCommand Usage

Strany 96

System Management Commands7-15ExampleThe console port settings are fixed at the values shown below.System Management CommandsThese commands are used t

Strany 97

Command Line Interface7-16countryThis command configures the wireless bridge’s country code, which identifies the country of operation and sets the au

Strany 98

System Management Commands7-17Default Setting US - for units sold in the United States99 (no country set) - for units sold in other countriesCommand M

Strany 99

Command Line Interface7-18Example promptThis command customizes the CLI prompt. Use the no form to restore the default prompt.Syntax prompt stringno p

Strany 100 - System Configuration

System Management Commands7-19system nameThis command specifies or modifies the system name for this device. Use the no form to restore the default sy

Strany 101 - Advanced Configuration

TABLE OF CONTENTSxviiWDS Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-61wds channel . . . . . . . . . . . . . . . .

Strany 102 - Filter Control

Command Line Interface7-20ExamplepasswordAfter initially logging onto the system, you should set the password. Remember to record it in a safe place.

Strany 103

System Management Commands7-21Default Setting 80Command Mode Global ConfigurationExampleRelated Commandsip http server (page 7-21)ip http serverThis c

Strany 104

Command Line Interface7-22show systemThis command displays basic system configuration settings.Default SettingNoneCommand Mode ExecExampleAP#show syst

Strany 105

System Logging Commands7-23show versionThis command displays the software version for the system.Default SettingNoneCommand Mode ExecExample System Lo

Strany 106

Command Line Interface7-24logging onThis command controls logging of error messages; i.e., sending debug or error messages to memory. The no form disa

Strany 107

System Logging Commands7-25Default Setting NoneCommand Mode Global ConfigurationExample logging consoleThis command initiates logging of error message

Strany 108

Command Line Interface7-26Default Setting ErrorCommand Mode Global ConfigurationCommand Usage Messages sent include the selected level down to the Eme

Strany 109 - Administration

System Logging Commands7-27Default Setting 16Command Mode Global ConfigurationCommand Usage The command specifies the facility type tag sent in syslog

Strany 110

Command Line Interface7-28ExampleSystem Clock CommandsThese commands are used to configure SNTP and system clock settings on the wireless bridge.AP#sh

Strany 111

System Clock Commands7-29sntp-server ipThis command sets the IP address of the servers to which SNTP time requests are issued. Use the this command wi

Strany 112

CopyrightInformation furnished by SMC Networks, Inc. (SMC) is believed to be accurate and reliable. However, no responsibility is assumed by SMC for i

Strany 113

TABLE OF CONTENTSxviiidns server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .7-92ip address . . . . . . . . . . . . . . .

Strany 114 - System Log

Command Line Interface7-30sntp-server enableThis command enables SNTP client requests for time synchronization with NTP or SNTP time servers specified

Strany 115

System Clock Commands7-31sntp-server date-timeThis command sets the system clock.Default Setting 00:14:00, January 1, 1970Command Mode Global Configur

Strany 116

Command Line Interface7-32Command Usage The command sets the system clock back one hour during the specified period.Example This sets daylight savings

Strany 117

System Clock Commands7-33degrees longitude. To display a time corresponding to your local time, you must indicate the number of hours and minutes your

Strany 118

Command Line Interface7-34SNMP CommandsControls access to this wireless bridge from management stations using the Simple Network Management Protocol (

Strany 119

SNMP Commands7-35Default Setting • public - Read-only access. Authorized management stations are only able to retrieve MIB objects.• private - Read/wr

Strany 120

Command Line Interface7-36Example Related Commandssnmp-server location (page 7-38)snmp-server enable serverThis command enables SNMP management access

Strany 121

SNMP Commands7-37snmp-server host This command specifies the recipient of an SNMP notification. Use the no form to remove the specified host.Syntaxsnm

Strany 122

Command Line Interface7-38Example Related Commandssnmp-server enable server (page 7-36)snmp-server locationThis command sets the system location strin

Strany 123 - Spanning Tree Protocol (STP)

Flash/File Commands7-39show snmpThis command displays the SNMP configuration settings.Command Mode ExecExampleFlash/File CommandsThese commands are us

Strany 124

TABLE OF CONTENTSxixA Troubleshooting . . . . . . . . . . . . . . . . . . . . . . . . . A-1B Specifications . . . . . . . . . . . . . . . . . . . .

Strany 125

Command Line Interface7-40bootfileThis command specifies the image used to start up the system.Syntaxbootfile <filename>filename - Name of the i

Strany 126

Flash/File Commands7-41copy This command copies a boot file, code image, or configuration file between the wireless bridge’s flash memory and a FTP/TF

Strany 127

Command Line Interface7-42•The destination file name should not contain slashes (\ or /), the leading letter of the file name should not be a period (

Strany 128

Flash/File Commands7-43Default Setting NoneCommand Mode ExecCaution: Beware of deleting application images from flash memory. At least one application

Strany 129

Command Line Interface7-44Command Usage File information is shown below:Example The following example shows how to display all file information:Column

Strany 130

RADIUS Client7-45RADIUS ClientRemote Authentication Dial-in User Service (RADIUS) is a logon authentication protocol that uses software running on a c

Strany 131

Command Line Interface7-46Command Mode Global ConfigurationExample radius-server portThis command sets the RADIUS server network port. Syntaxradius-se

Strany 132 - Radio Interface

RADIUS Client7-47radius-server keyThis command sets the RADIUS encryption key. Syntax radius-server [secondary] key <key_string>• secondary - Se

Strany 133 - Radio Settings A (802.11a)

Command Line Interface7-48Example radius-server timeoutThis command sets the interval between transmitting authentication requests to the RADIUS serve

Strany 134

Authentication7-49Example AuthenticationThe access point supports IEEE 802.1x access control for wireless clients. This control feature prevents unaut

Strany 135

TABLE OF CONTENTSxx

Strany 136

Command Line Interface7-50Client MAC addresses can also be used for authentication on the access point. For local MAC authentication, first define the

Strany 137

Authentication7-51802.1xThis command configures 802.1x as optionally supported or as required for wireless clients. Use the no form to disable 802.1x

Strany 138

Command Line Interface7-52• When 802.1x is supported, the access point supports 802.1x authentication only for clients initiating the 802.1x authentic

Strany 139 - Radio Settings G (802.11g)

Authentication7-53Command Usage• The access point uses EAPOL (Extensible Authentication Protocol Over LANs) packets to pass dynamic unicast session an

Strany 140

Command Line Interface7-54Example802.1x session-timeoutThis command sets the time period after which a connected client must be re-authenticated. Use

Strany 141

Authentication7-55802.1x supplicantThis command sets the user name and password used for authentication of the access point when operating as a 802.1x

Strany 142 - Security (Bridge Mode)

Command Line Interface7-56Command ModeGlobal ConfigurationCommand Usage• Ethernet and WDS user names and passwords must be set before enabling the 802

Strany 143

Authentication7-57ExampleRelated Commandsaddress filter entry (page 7-57)show authentication (page 7-60)address filter entryThis command enters a MAC

Strany 144

Command Line Interface7-58ExampleRelated Commandsaddress filter default (page 7-56)show authentication (page 7-60)address filter deleteThis command de

Strany 145

Authentication7-59mac-authentication serverThis command sets address filtering to be performed with local or remote options. Use the no form to disabl

Strany 146

1-1Chapter 1IntroductionThe SMC EliteConnect Universal 2.4GHz/5GHz Wireless Dual-Band Outdoor Access Point/Bridge system consists of two models that p

Strany 147

Command Line Interface7-60mac-authentication session-timeoutThis command sets the interval at which associated clients will be re-authenticated with t

Strany 148 - Security (Access Point Mode)

WDS Commands7-61ExampleWDS CommandsThe commands described in this section are used to configure the WIreless Distribution System (WDS) forwarding tabl

Strany 149

Command Line Interface7-62wds channelThis command selects the radio band to be used for WDS forwarding (bridging).Syntaxwds channel <a | g | none&g

Strany 150

WDS Commands7-63Command ModeGlobal ConfigurationCommand Usage• You can only configure one MAC address per wireless port ID.• The Ethernet MAC address

Strany 151

Command Line Interface7-64show wdsThis command displays the current entries in the WDS forwarding table.Syntaxshow wdsCommand ModeExecExampleAP#show w

Strany 152

Bridge Commands7-65Bridge CommandsThe commands described in this section are used to set the MAC address table aging time and spanning tree parameters

Strany 153

Command Line Interface7-66bridge timeoutThis command sets the aging time for both the Ethernet port and the wireless interface.Syntaxbridge timeout &l

Strany 154

Bridge Commands7-67Default Setting Spanning tree is enabled.Command Mode Global ConfigurationCommand Usage The Spanning Tree Protocol (STP) can be use

Strany 155

Command Line Interface7-68Default Setting 15 secondsCommand Mode Global ConfigurationCommand Usage This command sets the maximum time (in seconds) the

Strany 156

Bridge Commands7-69Command Mode Global ConfigurationCommand Usage This command sets the time interval (in seconds) at which the root device transmits

Strany 157

Introduction1-2In addition, both wireless bridge models offer full network management capabilities through an easy-to-use web interface, a command-lin

Strany 158

Command Line Interface7-70Command Usage This command sets the maximum time (in seconds) a device can wait without receiving a configuration message be

Strany 159

Bridge Commands7-71Command Usage Bridge priority is used in selecting the root device, root port, and designated port. The device with the highest pri

Strany 160

Command Line Interface7-72Command Usage • This command is used by the Spanning Tree Protocol to determine the best path between devices. Therefore, lo

Strany 161

Bridge Commands7-73• Where more than one port is assigned the highest priority, the port with lowest numeric identifier will be enabled.Example Relate

Strany 162

Command Line Interface7-74• Since end-nodes cannot cause forwarding loops, they can be passed through the spanning tree state changes more quickly tha

Strany 163 - Status Information

Bridge Commands7-75show bridgeThis command displays aging time and spanning tree settings for the Ethernet and wireless interfaces.Syntaxshow bridgeC

Strany 164

Command Line Interface7-76Filtering CommandsThe commands described in this section are used to control access to the management interface from the wir

Strany 165

Filtering Commands7-77Command UsageThis command can disable wireless-to-wireless communications between clients via the access point. However, it does

Strany 166 - Station Status

Command Line Interface7-78filter ethernet-type enableThis command checks the Ethernet type on all incoming and outgoing Ethernet packets against the p

Strany 167

Filtering Commands7-79filter ethernet-type protocolThis command sets a filter for a specific Ethernet type. Use the no form to disable filtering for a

Strany 168 - Event Logs

Package Checklist1-3 • Outdoor pole-mounting bracket kit• Outdoor wall-mounting bracket kit• This User Guide Inform your dealer if there are

Strany 169

Command Line Interface7-80show filtersThis command shows the filter options and protocol entries in the filter table. Command ModeExecExamplePPPoE Com

Strany 170

PPPoE Commands7-81ip pppoeThis command enables Point-to-Point Protocol over Ethernet (PPPoE) on the Ethernet interface. Use the no form to disable PP

Strany 171 - Command Line Interface

Command Line Interface7-82Command Usage The access point uses a PPPoE connection, or tunnel, only for management traffic between the access point and

Strany 172

PPPoE Commands7-83Example Related Commandspppoe local ip (page 7-86)pppoe remote ip (page 7-86)pppoe ipcp dnsThis command requests allocation of IP ad

Strany 173 - Entering Commands

Command Line Interface7-84pppoe lcp echo-intervalThis command sets the Link Control Protocol (LCP) echo interval for the PPPoE tunnel.Syntaxpppoe lcp

Strany 174 - Getting Help on Commands

PPPoE Commands7-85pppoe lcp echo-failureThis command sets the Link Control Protocol (LCP) echo timeout for the PPPoE tunnel.Syntaxpppoe lcp echo-failu

Strany 175 - Using Command History

Command Line Interface7-86pppoe local ipThis command sets the local IP address for the PPPoE tunnel.Syntaxpppoe local ip <ip-address>ip-address

Strany 176 - Exec Commands

PPPoE Commands7-87Default Setting NoneCommand Mode Interface Configuration (Ethernet)Command Usage If the pppoe ip allocation mode is set to static, t

Strany 177 - Configuration Commands

Command Line Interface7-88Command Usage You must enter a user name with this command, and a password with the pppoe password command.Example Related C

Strany 178 - Command Line Processing

PPPoE Commands7-89pppoe service-nameThis command sets the service name for the PPPoE tunnel.Syntaxpppoe service-name <string>string - Service na

Strany 179 - Command Groups

Introduction1-4Hardware DescriptionEthernet PortRSSI Connector with Protective CapGrounding Point ScrewIntegrated AntennaBottom ViewTop View (SMC2888W

Strany 180 - General Commands

Command Line Interface7-90Example show pppoeThis command shows information about the PPPoE configuration.Command Mode Privileged ExecExample AP#(if-et

Strany 181

Ethernet Interface Commands7-91Ethernet Interface CommandsThe commands described in this section configure connection parameters for the Ethernet inte

Strany 182

Command Line Interface7-92Example To specify the 10/100Base-TX network interface, enter the following command:dns serverThis command specifies the add

Strany 183

Ethernet Interface Commands7-93Related Commands show interface ethernet (page 7-96)ip address This command sets the IP address for the (10/100Base-TX)

Strany 184

Command Line Interface7-94• You must assign an IP address to this device to gain management access over the network or to connect the wireless bridge

Strany 185 - System Management Commands

Ethernet Interface Commands7-95Command Usage • You must assign an IP address to this device to gain management access over the network or to connect t

Strany 186

Command Line Interface7-96Command Mode Interface Configuration (Ethernet)Command Usage This command allows you to disable the Ethernet port due to abn

Strany 187

Wireless Interface Commands7-97Example Wireless Interface CommandsThe commands described in this section configure connection parameters for the wire

Strany 188

Command Line Interface7-98dtim-period Configures the rate at which stations in sleep mode must wake up to receive broadcast/multicast transmissionsIC

Strany 189

Wireless Interface Commands7-99interface wirelessThis command enters wireless interface configuration mode.Syntaxinterface wireless a• a - 802.11a rad

Strany 190

Hardware Description1-5Integrated High-Gain AntennaThe SMC2888W-S wireless bridge includes an integrated high-gain (17 dBi) flat-panel antenna for 5 G

Strany 191

Command Line Interface7-100Default Setting NoneCommand Mode Interface Configuration (Wireless)ExamplessidThis command configures the service set ident

Strany 192

Wireless Interface Commands7-101closed-systemThis command closes access to clients without a pre-configured SSID. Use the no form to disable this feat

Strany 193 - System Logging Commands

Command Line Interface7-102Command Mode Interface Configuration (Wireless)Command Usage The maximum transmission distance is affected by the data rate

Strany 194

Wireless Interface Commands7-103ExampleturboThis command sets the wireless bridge to an enhanced mode (not regulated in IEEE 802.11a) that provides a

Strany 195

Command Line Interface7-104beacon-interval This command configures the rate at which beacon signals are transmitted from the wireless bridge. Syntaxbe

Strany 196

Wireless Interface Commands7-105Default Setting 2Command Mode Interface Configuration (Wireless)Command Usage • The Delivery Traffic Indication Map (D

Strany 197

Command Line Interface7-106Default Setting 2346Command Mode Interface Configuration (Wireless)Command Usage • If the packet size is smaller than the p

Strany 198 - System Clock Commands

Wireless Interface Commands7-107Default Setting 2347Command Mode Interface Configuration (Wireless)Command Usage • If the threshold is set to 0, the w

Strany 199

Command Line Interface7-108Default Setting fullCommand Mode Interface Configuration (Wireless)Command Usage • The “min” keyword indicates minimum powe

Strany 200

Wireless Interface Commands7-109Example authenticationThis command defines the 802.11 authentication type allowed by the access point. Syntaxauthentic

Strany 201

Introduction1-6Power Injector ModuleThe wireless bridge receives power through its network cable connection using power-over-Ethernet technology. A po

Strany 202

Command Line Interface7-110encryption This command defines whether WEP or AES encryption is used to provide privacy for wireless communications. Use

Strany 203

Wireless Interface Commands7-111• AES has been designated by the National Institute of Standards and Technology as the successor to the Data Encryptio

Strany 204 - SNMP Commands

Command Line Interface7-112key This command sets the keys used for WEP and AES encryption. Use the no form to delete a configured key.Syntaxkey {wep &

Strany 205

Wireless Interface Commands7-113• To enable AES encryption, use the encryption command to specify the key type, and use the key command to configure a

Strany 206

Command Line Interface7-114Command Mode Interface Configuration (Wireless)Command Usage • If you use WEP key encryption, the wireless bridge uses the

Strany 207

Wireless Interface Commands7-115Command Usage • WPA enables the access point to support different unicast encryption keys for each client. However, th

Strany 208

Command Line Interface7-116wpa-clients This command defines whether Wi-Fi Protected Access (WPA) is required or optionally supported for client statio

Strany 209 - Flash/File Commands

Wireless Interface Commands7-117Example Related Commandswpa-mode (page 7-117)wpa-mode This command specifies whether Wi-Fi Protected Access (WPA) is t

Strany 210

Command Line Interface7-118Example Related Commandswpa-clients (page 7-116)wpa-preshared-key (page 7-118)wpa-preshared-key This command defines a Wi-F

Strany 211

Wireless Interface Commands7-119Example Related Commandswpa-clients (page 7-116)wpa-mode (page 7-117)wpa-psk-type This command defines the Wi-Fi Prote

Strany 212

Hardware Description1-7The power injector module automatically adjusts to any AC voltage between 100-240 volts at 50 or 60 Hz. No voltage range settin

Strany 213

Command Line Interface7-120shutdown This command disables the wireless interface. Use the no form to restart the interface.Syntax shutdownno shutdownD

Strany 214

Wireless Interface Commands7-121Example show stationThis command shows the wireless clients associated with the access point.Command Mode ExecAP#show

Strany 215 - RADIUS Client

Command Line Interface7-122Example IAPP CommandsThe command described in this section enables the protocol signaling required to ensure the successful

Strany 216

VLAN Commands7-123DefaultEnabledCommand ModeGlobal ConfigurationCommand UsageThe current 802.11 standard does not specify the signaling required betwe

Strany 217

Command Line Interface7-124Note: Before enabling VLANs on the wireless bridge, you must configure the connected LAN switch port to accept tagged VLAN

Strany 218

VLAN Commands7-125ExampleRelated Commandsnative-vlanid (page 7-125)native-vlanid This command configures the native VLAN ID for the wireless bridge. S

Strany 219 - Authentication

Command Line Interface7-126

Strany 220

A-1Appendix ATroubleshootingCheck the following items before you contact local Technical Support.1. If wireless bridge units do not associate with eac

Strany 221

TroubleshootingA-23. If the wireless bridge cannot be configured using Telnet, a web browser, or SNMP software:• Be sure to have configured the wirele

Strany 222

B-1Appendix BSpecificationsGeneral SpecificationsMaximum Channels (Outdoor)802.11a:US & Canada: 9 (normal mode), 3 (turbo mode)Japan: 4 (normal mo

Strany 223

iLIMITED WARRANTYLimited Warranty Statement: SMC Networks, Inc. (“SMC”) warrants its products to be free from defects in workmanship and materials, un

Strany 224 - 802.1x session-timeout

Introduction1-8System ConfigurationAt each location where a unit is installed, it must be connected to the local network using the power injector modu

Strany 225 - 802.1x supplicant

SpecificationsB-2Modulation Types802.11a: BPSK, QPSK, 16-QAM, 64-QAM802.11g: CCK, BPSK, QPSK, OFDM802.11b: CCK, BPSK, QPSKNetwork ConfigurationBridge

Strany 226

General SpecificationsB-3Network ManagementWeb-browser, Telnet, SNMPTemperatureOperating: -33 to 55 °C (-27.4 to 131 °F)Storage: -40 to 80 °C (-40 to

Strany 227

SpecificationsB-4Antenna Specifications17 dBi Integrated PanelFrequency Range5.150 - 5.850 GHzGain17 dBiVSWR1.8 : 1 maxPolarizationLinear, vertical/ho

Strany 228

Antenna SpecificationsB-5 17 dBi Integrated Panel Antenna Link Budget (5.825 GHz, Cable Loss 1 dB, Fade Margin 5 dB)Modulation/Rates Transmit Power(d

Strany 229

SpecificationsB-6

Strany 230

C-1Appendix CCables and PinoutsTwisted-Pair Cable AssignmentsFor 10/100BASE-TX connections, a twisted-pair cable must have two pairs of wires. Each wi

Strany 231 - WDS Commands

Cables and PinoutsC-210/100BASE-TX Pin AssignmentsUse unshielded twisted-pair (UTP) or shielded twisted-pair (STP) cable for RJ-45 connections: 100-oh

Strany 232

Twisted-Pair Cable AssignmentsC-3Straight-Through WiringBecause the 10/100 Mbps Input port on the power injector uses an MDI pin configuration, you mu

Strany 233

Cables and PinoutsC-48-Pin DIN Connector PinoutThe Ethernet cable from the power injector connects to an 8-pin DIN connector on the wireless bridge. T

Strany 234

8-Pin DIN Connector PinoutC-58-Pin DIN to RJ-45 Cable WiringTo construct an extended Ethernet cable to connect from the power injector’s RJ-45 Output

Strany 235 - Bridge Commands

Features and Benefits1-9Features and Benefits• SMC2888W-S Slave units support a 5 GHz high-gain 17 dBi antenna• SMC2888W-M Master units support 5 GHz

Strany 236

Cables and PinoutsC-6

Strany 237

Glossary-1Glossary10BASE-TIEEE 802.3 specification for 10 Mbps Ethernet over two pairs of Category 3 or better UTP cable.100BASE-TXIEEE 802.3u specifi

Strany 238

GlossaryGlossary-2Basic Service Set (BSS)A set of 802.11-compliant stations and an access point that operate as a fully-connected wireless network.Bea

Strany 239

GlossaryGlossary-3File Transfer Protocol (FTP)A TCP/IP protocol used for file transfer. Hypertext Transfer Protocol (HTTP)HTTP is a standard used to t

Strany 240

GlossaryGlossary-4Open SystemA security option which broadcasts a beacon signal including the access point’s configured SSID. Wireless clients can rea

Strany 241

GlossaryGlossary-5Simple Network Time Protocol (SNTP)SNTP allows a device to set its internal clock based on periodic updates from a Network Time Prot

Strany 242

GlossaryGlossary-6

Strany 243

Index-1AAdvanced Encryption Standard See AESAES 6-82configuring 6-68AES, configuring 6-66, 7-110authentication 6-16, 7-109configuring 6-16, 7-109MAC

Strany 244

IndexIndex-2filter 6-26, 7-56address 6-16, 7-56between wireless clients 6-28, 7-76local bridge 6-28, 7-76local or remote 6-16, 7-59management access 6

Strany 245

IndexIndex-3passwordconfiguring 6-33, 7-20management 6-33, 7-20PoE 4-8specifications B-2port prioritySTA 7-72Power over Ethernet See PoEpower supply,

Strany 246 - Filtering Commands

Introduction1-10System DefaultsThe following table lists some of the wireless bridge’s basic system defaults. To reset the bridge defaults, use the CL

Strany 247

IndexIndex-4Temporal Key Integrity Protocol See TKIPtime zone 6-41, 7-32TKIP 6-81, 7-114transmit power, configuring 6-59, 7-107trap destination 6-31,

Strany 249

SMC2888W-SSMC2888W-M

Strany 250 - PPPoE Commands

System Defaults1-11SNMP Status EnabledLocation nullContact ContactCommunity (Read Only) PublicCommunity (Read/Write) PrivateTraps EnabledTrap Destinat

Strany 251

Introduction1-12Wireless Interface 802.11aStatus EnabledSSID SMCTurbo Mode DisabledRadio Channel Default to first channelAuto Channel Select EnabledTr

Strany 252

System Defaults1-13Wireless Interface 802.11b/gStatus EnabledSSID SMCRadio Channel Default to first channelAuto Channel Select EnabledTransmit Power F

Strany 253

Introduction1-14

Strany 254

2-1Chapter 2Network ConfigurationThe Dual-band Outdoor Access Point / Bridge system provides access point or bridging services through either the 5 GH

Strany 255

Network Configuration2-2The 802.11b and 802.11g frequency band, which operates at 2.4 GHz, can easily encounter interference from other 2.4 GHz device

Strany 256

Access Point Topologies2-3Infrastructure Wireless LANThe access point function of the wireless bridge provides access to a wired LAN for 802.11a/b/g w

Strany 257

LIMITED WARRANTYiiCustomers are responsible for all shipping charges from their facility to SMC. SMC is responsible for return shipping charges from S

Strany 258

Network Configuration2-4Infrastructure Wireless LAN for Roaming Wireless PCsThe Basic Service Set (BSS) defines the communications domain for each acc

Strany 259

Bridge Link Topologies2-5Bridge Link TopologiesThe IEEE 802.11 standard defines a WIreless Distribution System (WDS) for bridge connections between BS

Strany 260

Network Configuration2-6Note: The external antennas offer longer range options using the 5 GHz radio, which makes this interface more suitable for br

Strany 261 - Ethernet Interface Commands

Bridge Link Topologies2-7Master withOmnidirectionalAntennaSlaveSlaveSlaveSlaveSlaveSlaveMaster withSector AntennaSlaveSlaveSlave

Strany 262

Network Configuration2-8

Strany 263

3-1Chapter 3Bridge Link PlanningThe SMC Dual-band Outdoor Access Point / Bridge supports fixed point-to-point or point-to-multipoint wireless links. A

Strany 264

Bridge Link Planning3-2This area is known as the first Fresnel Zone of the radio link. For a radio link not to be affected by obstacles along its path

Strany 265

Radio Path Planning3-3• Be sure there is enough clearance from buildings and that no building construction may eventually block the path.• Check the t

Strany 266

Bridge Link Planning3-4.Note that to avoid any obstruction along the path, the height of the object must be added to the minimum clearance required fo

Strany 267 - Wireless Interface Commands

Radio Path Planning3-5A wireless bridge link is deployed to connect building A to a building B, which is located three miles (4.8 km) away. Mid-way be

Strany 268

iiiCOMPLIANCESFederal Communication Commission Interference StatementThis equipment has been tested and found to comply with the limits for a Class B

Strany 269

Bridge Link Planning3-6• The wireless bridge antennas at both ends of the link must be positioned with the same polarization direction, either horizon

Strany 270

Radio Path Planning3-7Weather ConditionsWhen planning wireless bridge links, you must take into account any extreme weather conditions that are known

Strany 271

Bridge Link Planning3-8Ethernet CablingWhen a suitable antenna location has been determined, you must plan a cable route form the wireless bridge outd

Strany 272

4-1Chapter 4Hardware InstallationBefore mounting antennas to set up your wireless bridge links, be sure you have selected appropriate locations for ea

Strany 273

Hardware Installation4-25. Align antennas at both ends of the link.Testing Basic Link OperationSet up the units over a very short range (15 to 25 feet

Strany 274

Mount the Unit4-33. Use the included nuts to tightly secure the wireless bridge to the bracket. Be sure to take account of the antenna polarization di

Strany 275

Hardware Installation4-4Mounting on Larger Diameter PolesIn addition, there is a method for attaching the pole-mounting bracket to a pole that is 2 to

Strany 276

Connect External Antennas4-52. Position the bracket in the intended location and mark the position of the three mounting screw holes.3. Drill three ho

Strany 277

Hardware Installation4-62. Connect the antenna to the bridge’s N-type connector.3. Apply weatherproofing tape to the antenna connectors to help preven

Strany 278

Connect Cables to the Unit4-7Connect Cables to the Unit1. Attach the Ethernet cable to the Ethernet port on the wireless bridge. Note: The Ethernet c

Strany 279

COMPLIANCESivWireless 5 GHz Band Statements:As the SMC2888W access point/bridge can operate in the 5150-5250 MHz frequency band it is limited by the F

Strany 280

Hardware Installation4-8Note: The wireless bridge’s Ethernet port does not support Power over Ethernet (PoE) based on the IEEE 802.3af standard. Do n

Strany 281

Align Antennas4-95. Check the LED on top of the power injector to be sure that power is being supplied to the wireless bridge through the Ethernet con

Strany 282

Hardware Installation4-10strong central main lobe and smaller side lobes. The object of the alignment process is to set the antenna so that it is rece

Strany 283

Align Antennas4-112. Pan the antenna horizontally back and forth while checking the RSSI voltage. If using the pole-mounting bracket with the unit, yo

Strany 284

Hardware Installation4-12

Strany 285

5-1Chapter 5Initial ConfigurationThe wireless bridge offers a variety of management options, including a web-based interface, a command line interface

Strany 286

Initial Configuration5-2Initial Setup through the CLIThe wireless bridge provides access to the CLI through a Telnet connection. You can open a Telnet

Strany 287

Initial Setup through the CLI5-3At the Exec prompt, type “country ?” to display the list of country codes. Check the code for your country, then enter

Strany 288

Initial Configuration5-4After configuring the wireless bridge’s IP parameters, you can access the management interface from anywhere within the attach

Strany 289

Using the Web-based Management Setup Wizard5-5The home page displays the Main Menu.Launching the Setup Wizard – To perform initial configuration, clic

Strany 290

COMPLIANCESv• This device employs a radar detection feature required for European Community operation in the 5 GHz band. This feature is automatically

Strany 291

Initial Configuration5-62. Radio Channel – You must enable radio communications for the 802.11a and 802.11g radios and set the operating channel.• 802

Strany 292 - IAPP Commands

Using the Web-based Management Setup Wizard5-7Turbo Mode – If you select Enable, the wireless bridge will operate in turbo mode with a data rate of up

Strany 293 - VLAN Commands

Initial Configuration5-8Note: Available channel settings are limited by local regulations which determine which channels are available.3. IP Configur

Strany 294

Using the Web-based Management Setup Wizard5-94. WDS – To set up a wireless bridge link, you must configure the WDS forwarding table by specifying the

Strany 295

Initial Configuration5-105. Security (802.11g) – Set the Authentication Type to “Open System” to allow open access without authentication, or “Shared

Strany 296

Using the Web-based Management Setup Wizard5-11hexadecimal or ASCII string of the appropriate length. The key can be entered as alphanumeric character

Strany 297 - Troubleshooting

Initial Configuration5-12

Strany 298

6-1Chapter 6System ConfigurationBefore continuing with advanced configuration, first complete the initial configuration steps described in Chapter 5 t

Strany 299 - Specifications

System Configuration6-2When the home page displays, click on Advanced Setup. The following page will display.The information in this chapter is organi

Strany 300

Advanced Configuration6-3Advanced ConfigurationThe Advanced Configuration pages include the following options.Menu Description PageSystem Configures b

Strany 301 - General Specifications

COMPLIANCESviOperation Using 5 GHz Channels in the European CommunityThe user/installer must use the provided configuration utility to check the curre

Strany 302 - Antenna Specifications

System Configuration6-4System IdentificationThe system information parameters for the wireless bridge can be left at their default settings. However,

Strany 303

Advanced Configuration6-5System Name – An alias for the wireless bridge, enabling the device to be uniquely identified on the network. (Default: Dual

Strany 304

System Configuration6-6CLI Commands for System Identification – Enter the global configuration mode and use the system name command to specify a new s

Strany 305 - Cables and Pinouts

Advanced Configuration6-7TCP / IP SettingsConfiguring the wireless bridge with an IP address expands your ability to manage the wireless bridge. A num

Strany 306 - 10/100BASE-TX Pin Assignments

System Configuration6-8DHCP Client (Enable) – Select this option to obtain the IP settings for the wireless bridge from a DHCP (Dynamic Host Configura

Strany 307 - Crossover Wiring

Advanced Configuration6-9• Default Gateway: The default gateway is the IP address of the router for the wireless bridge, which is used if the requeste

Strany 308 - 8-Pin DIN Connector Pinout

System Configuration6-10RadiusRemote Authentication Dial-in User Service (RADIUS) is an authentication protocol that uses software running on a centra

Strany 309

Advanced Configuration6-11Primary Radius Server Setup – Configure the following settings to use RADIUS authentication on the access point.• IP Address

Strany 310

System Configuration6-12• Key: A shared text string used to encrypt messages between the access point and the RADIUS server. Be sure that the same tex

Strany 311 - Glossary

Advanced Configuration6-13to display the current settings for the primary and secondary RADIUS servers.PPPoE SettingsThe wireless bridge uses a Point-

Strany 312 - Glossary-2

COMPLIANCESviiDeclaration of Conformity in Languages of the European CommunityEnglish Hereby, SMC Networks, declares that this Radio LAN device is in

Strany 313 - Glossary-3

System Configuration6-14PPP over Ethernet – Enable PPPoE on the RJ-45 Ethernet interface to pass management traffic between the unit and a remote PPPo

Strany 314 - Glossary-4

Advanced Configuration6-15IP Allocation Mode – This field specifies how IP adresses for the PPPoE tunnel are configured on the RJ-45 interface. The al

Strany 315 - Glossary-5

System Configuration6-16AuthenticationWireless clients can be authenticated for network access by checking their MAC address against the local databas

Strany 316 - Glossary-6

Advanced Configuration6-17Ethernet Supplicant Setup – Allows the access point to act as an 802.1X supplicant so it can be authenticated through its Et

Strany 317

System Configuration6-18MAC Authentication – You can configure a list of the MAC addresses for wireless clients that are authorized to access the netw

Strany 318

Advanced Configuration6-19Note: Client station MAC authentication occurs prior to the IEEE 802.1X authentication procedure configured for the access p

Strany 319

System Configuration6-20• Supported: The access point supports 802.1X authentication only for clients initiating the 802.1X authentication process (i.

Strany 320

Advanced Configuration6-21Local MAC Authentication – Configures the local MAC authentication database. The MAC database provides a mechanism to take c

Strany 321

System Configuration6-22• Permission: Select Allow to permit access or Deny to block access. If Delete is selected, the specified MAC address entry is

Strany 322 - SMC2888W-M

Advanced Configuration6-23command. To display the current settings, use the show authentication command from the Exec mode.AP(config)#mac-authenticati

Komentáře k této Příručce

Žádné komentáře