Wi r e l e s s C o m m u n i c a t i o n s , I n c .
Aironet Wireless Communications, Inc. No part of this document may be reproduced or transmitted in any form or by any means, electronic or mechanical, for any purpose, without the express written permission of Aironet Wireless Communications, Inc. Information in this document is subject to change without notice. Aironet Wireless Communications, Inc.
Contents Contents About the Technical Reference Manual ................................................................................. xii Typographical Conventions .................................................................................................... xiv Welcome to the Ethernet or Token Ring Bridge ........................................xv Data Transparency and Protocols ......................................................................................
ii Contents Chapter 2 - Accessing the Console System ............................................... 2-1 Access Methods .................................................................................................................... 2-2 Using the Console ................................................................................................................. 2-2 Sub-Menus .................................................................................................
Contents Using the ConÞguration Radio IEEE 802.11 Menu .............................................................. 4-5 Setting the Beacon Period (Beacon) ............................................................................... 4-5 Setting the Forwarding Time Interval (DTIM) ............................................................... 4-5 Adding IEEE 802.11 Management Packet Extensions (Extend) .................................... 4-6 Setting the RF RTS/CTS Parameter (RTS) .....................
iv Contents Setting Up the Infrastructure Topology (Tring, Rring, Bridge) Token Ring Only .......... 5-5 Using the Token Ring Extended Menu ................................................................................. 5-6 Setting the Size of a Bridge Number (Partition) Token Ring Only ................................ 5-6 Early Token Release (Earlyrls) Token Ring Only ........................................................... 5-7 Control Frame Saps (Sap) Token Ring Only ...............................
Contents Setting SNMP Trap Destinations (Trapdest) ................................................................... 7-6 Specifying Community Names for Trap Messages (Trapcomm) .................................... 7-7 Specifying the Type of Log to Cause an SNMP Trap (Loglevel) ................................... 7-7 Enabling Authentication Failure Trap (Authtrap) ........................................................... 7-7 Chapter 8 - Using the Spanning Tree Protocol .................................
vi Contents Using the STP ConÞguration Menu (Repeater Only) .......................................................... 8-17 Viewing the Port State (State) ....................................................................................... 8-17 Setting Port, Priority and Cost Options (Port, Priority, Cost) ....................................... 8-17 Chapter 9 - Viewing Statistics .................................................................... 9-1 Viewing the Statistics Menu .....................
Contents Chapter 11 - Using Filters .........................................................................11-1 Overview ............................................................................................................................ 11-2 Using the Filter Menu ......................................................................................................... 11-2 Filtering Multicast Addresses (Multicast) .....................................................................
viii Contents Specifying the Type of Logs to Print (Printlevel) ....................................................... 12-11 Specifying the Type of Logs to Save (Loglevel) ......................................................... 12-11 Specifying the Type of Logs to Light Status Indicator (Ledlevel) .............................. 12-11 Setting Statistic Parameters (Statistics) ....................................................................... 12-12 Forwarding Logs to a Unix System (Syslog) .........
Contents Appendix B - Console Menu Tree ...................................................................................B-1 Appendix C - SNMP Variables .......................................................................................C-1 Appendix D - Aironet Technical Support ....................................................................... D-1 UserÕs Guide ................................................................................................................... D-1 Communications ..
x List of Figures Figure 0.1 Figure 0.2 Figure 0.3 Figure 1.1 Figure 1.2 Figure 1.3 Figure 1.4 Figure 1.5 Figure 1.6 Figure 1.7 Figure 1.8 Figure 1.9 Figure 5.1 Figure 8.1 Figure 8.2 Figure 8.3 Figure 10.2 - Point-to-Point Wireless Bridge ............................................... xxii Point-to-Multipoint Wireless Bridge...................................... xxiii Infrastructure Extension with Repeaters .................................xxiv Overview of Ethernet or Token Ring Bridge .................
xi List of Tables Table 1.1 - Top Panel Indicator Description ............................................... 1-11 Table 4.1 - Auto Link Test Display Patterns ...............................................
xii Ethernet or Token Ring Bridge About the Technical Reference Manual This manual covers the installation, configuration, control, and maintenance of your Ethernet or Token Ring Bridge. Please read Chapter 1 – Installing the Ethernet or Token Ring Bridge before attempting to install or use the hardware and software described in this manual.
About the Technical Reference Manual - xiii Chapter 9 – Setting Up the Association Table – Provides you with an introduction to the association process and detailed procedures for setting up the Ethernet or Token Ring Bridge’s Association Table. Chapter 10 – Using Filters – Describes how to control the forwarding of multicast messages. Chapter 11 – Setting Up Event Logs – Outlines the procedures for setting up Event Logs and lists the common error log messages received on the Ethernet or Token Ring Bridge.
xiv Ethernet or Token Ring Bridge Typographical Conventions When reading the technical reference manual, it’s important to understand the symbol and formatting conventions used in the documentation. The following symbols and formatting are used in the manual. Convention Type of Information Indicates a note which contains important information set off from the normal text. A caution message that appears before procedures which, if not observed, could result in loss of data or damage to the equipment.
Ethernet or Token Ring Bridge xv Welcome to the Ethernet or Token Ring Bridge The Ethernet or Token Ring Bridge allows the connections of two or more remote Ethernet or Token Ring LAN’s into a single virtual LAN. Workstations on each of the remote LAN’s may communicate with each other as though they were on the same physical LAN.
xvi Ethernet or Token Ring Bridge The Token Ring Bridge can attach directly to Shielded Twisted Pair (STP) or Unshielded Twisted Pair (UTP) Token Ring LAN segments. These segments must conform to IEEE 802.5. If the existing infrastructure to which the Bridge is to be attached is not Ethernet or Token Ring-based, an Ethernet or Token Ring segment can be added by installing an Ethernet or Token Ring Network Interface Card (NIC) in the File Server or by adding a third-party Bridge.
Ethernet or Token Ring Bridge xvii Radio Ranges The following section provides general guidelines on factors that influence infrastructure performance. Site Survey Because of differences in component configuration, placement, and physical environment, every infrastructure application is a unique installation. Before installing the system, users should perform a site survey in order to determine the optimum utilization of networking components and to maximize range, coverage and infrastructure performance.
xviii Ethernet or Token Ring Bridge Line of Site A clear line of sight must be maintained between Wireless Bridge antennas. Any obstructions may impede the performance or prohibit the ability of the Wireless Bridge to transmit and receive data. Directional antennas should be placed at both ends at appropriate elevation with maximum path clearance. 100 Series Wireless Bridge (2 Mbps) Bridge Range Antenna BRE115 (ETSI) BR110 1 Km 2 Miles 6 dBi patch BRE120 (ETSI) BR120 5 Km 7 Miles 13.
Ethernet or Token Ring Bridge xix Radio Antenna Aironet Bridge Solutions have been packaged to provide wide area bridge connectivity in accordance with regulatory rules and regulations. Aironet has designed the product packages to provide optimal performance, measured by throughput and range, while maintaining compliance with various regulatory agencies around the world. Approved antennas for use with each product are listed below: n BRE101, BRE501, BR110, and BR510 5.
xx Ethernet or Token Ring Bridge Terminology When configuring your system, and when reading this manual, keep in mind the following terminology: Infrastructure – The wireless infrastructure is the communications system that combines Aironet Bridges, mobile nodes and fixed nodes. Aironet Bridges within the infrastructure can be either root units, which are physically wired to the LAN backbone, or can act as wireless repeaters. Other RF enabled devices serve as fixed nodes or mobile nodes.
Ethernet or Token Ring Bridge xxi Bridge System Configurations The Ethernet or Token Ring Bridge can be used in a variety of infrastructure configurations. How you configure your infrastructure will determine the size of the microcell, which is the area a single Bridge will provide with RF coverage. You can extend the RF coverage area by creating multiple microcells on a LAN. Examples of some common system configurations are shown on the pages that follow, along with a brief description of each.
xxii Ethernet or Token Ring Bridge Figure 0.1 - Point-to-Point Wireless Bridge The Point-to-Point Wireless Bridge Configuration uses two units to bridge two individual LANs. Packets are sent between the file server and Workstation B through the Wireless Bridge units (root unit and remote node) over the radio link. Data packets sent from the file server to Workstation A go through the wired LAN segment and do not go across the wireless radio link.
Ethernet or Token Ring Bridge xxiii Figure 0.2 - Point-to-Multipoint Wireless Bridge When connecting three or more LANs (usually in different buildings), each building requires an Aironet Wireless Bridge and antenna. This is called a Multipoint Wireless Bridge Configuration. One Wireless Bridge is designated as the central site. Its antenna is configured to transmit and receive signals from the Wireless Bridges at the other sites.
xxiv Ethernet or Token Ring Bridge Figure 0.3 - Infrastructure Extension with Repeaters Wireless Bridges can be configured as repeaters to extend the range of a wireless network beyond that of a single radio hop. Repeaters can operate as either stand-alone units or have LAN connections.
Ethernet or Token Ring Bridge xxv
Part 1 - Getting Started Part 1 - Getting Started
Part 1 - Getting Started
Chapter 1 - Installing the Ethernet or Token Ring Bridge for Ethernet 1 CHAPTER 1 Installing the Bridge for Ethernet or Token Ring This chapter describes the procedures for installing the Ethernet or Token Ring Bridge.
1-2 Ethernet or Token Ring Bridge Before You Start After unpacking the system, make sure the following items are present and in good condition: n Wireless Bridge (Ethernet or Token Ring model) n Power Pack. The power pack will be either 120VAC/60 Hz or 90-264VAC/47-63Hz to 12-18VDC, whichever is appropriate for country of use.
Installing the Bridge for Ethernet or Token Ring 1 - 3 Installation This section describes the procedures for installing the Aironet Wireless Bridge. Installing the Antennas Before installing your Bridge System, we recommend that you test the Bridge using the 2.2 dBi dipole antenna included in your package. Once testing is completed, install your Wireless Bridge for use with the appropriate antenna for your application using the following the instructions. 1.
1-4 Ethernet or Token Ring Bridge 2. Connect the lightning arrestor to one end of the low loss antenna cable. NOTE: The lightning arrestor should be connected to the antenna con- nector on the Wireless Bridge. The lightning arrestor is added to provide surge protection to the Bridge in the event of voltage surges as a result of a lightning strike. 3. Connect the antenna to the other end of the low loss antenna cable.
Installing the Bridge for Ethernet or Token Ring 1 - 5 Installing the Console Port Cable 1. Attach the Console Port cable to the Serial Port. Attach the other cable end to the Serial Port on a terminal or a PC running a terminal emulation program. Use a 9-pin male to 9-pin female straight through cable (Figure 1-3). NOTE: This connection is required for setting up initial configuration information.
1-6 Ethernet or Token Ring Bridge Installing the Ethernet Connection NOTE: If you are installing a Token Ring Bridge, proceed to page 1-8. The Ethernet Wireless Bridge supports three connection types: è n 10Base2 (Thinnet) n 10Base5 (Thicknet) AUI connector n 10BaseT (Twisted Pair) To Attach 10Base2 (Thinnet) Cabling: 1. Make sure the unit is powered off. 2. Attach the Thinnet cabling to each end of a BNC T-connector, if applicable. 3. Attach the T-connector to the 10Base2 BNC (Figure 1.4).
Installing the Bridge for Ethernet or Token Ring 1 - 7 è To Attach the 10Base5 (Thicknet) Cabling: 1. Make sure the unit is powered off. 2. Attach the transceiver connector to the 10Base5 AUI port as shown in Figure 1.5. 3. Slide the locking mechanism in place. 4. Attach the other end of the transceiver drop cabling to an external transceiver. Figure 1.5 - Attaching 10Base5 (Thicknet) Cabling 10Base5 10BaseT 10Base2 è To Attach the 10BaseT (Twisted Pair) cabling: 1. Make sure the unit is powered off.
1-8 Ethernet or Token Ring Bridge Installing the Token Ring Connection The Token Ring Wireless Bridge supports three connection types: n Shielded Twisted Pair (STP) n Unshielded Twisted Pair (UTP) è To Attach the STP Cabling: 1. Make sure the unit is powered off. 2. Attach the transceiver connector to the DB-9 port. 3. Attach the other end of the transceiver drop cabling to a Token Ring Multi-Station Access Unit (MAU). UTP STP è To Attach the UTP Cabling: 1. Make sure the unit is powered off. 2.
Installing the Bridge for Ethernet or Token Ring 1 - 9 Attaching the AC/DC Power Pack and Powering On the Ethernet or Token Ring Wireless Bridge 1. Insert the small plug on the end of the AC/DC power pack cord into the power port. 2. Plug the AC/DC power pack into an electrical outlet. (120VAC/60 Hz or 90-264VAC as appropriate) 3. Power on the Ethernet or Token Ring Wireless Bridge by pushing the On/Off button. Figure 1.
1 - 10 Ethernet or Token Ring Bridge Viewing the Indicator Displays Top Panel Indicators The indicators are a set of displays located on the top panel of the Ethernet or Token Ring Bridge unit. n Ethernet or Token Ring Indicator – Used to indicate infrastructure traffic activity. The light is normally off, but will flash green whenever a packet is received or transmitted over the Ethernet or Token Ring interface. n Status Indicator – Shows solid green when the Bridge has accepted a radio association.
Installing the Bridge for Ethernet or Token Ring 1 - 11 Table 1.
1 - 12 Ethernet or Token Ring Bridge Back Panel Indicators (Ethernet Only) The back panel indicators shown in Figure 1.9 are: n 10BaseT polarity : Solid amber to indicate the 10BaseT polarity is reversed. Check cable connections. n 10BaseT active : Solid green to indicate the 10BaseT has been config- ured as the active port. n Ethernet Rx : Flashes green when an Ethernet packet has been received. n Ethernet Tx : Flashes green when an Ethernet packet has been trans- mitted.
Chapter 2 - Accessing the Console System 2 CHAPTER 2 Accessing the Console System This chapter describes the methods used to access the Console system of the Ethernet or Token Ring Bridge. This system contains all commands necessary to configure and monitor the operation of the unit.
2 - 2 Ethernet or Token Ring Bridge Access Methods There are many ways in which you may configure and monitor the Ethernet or Token Ring Bridge. When the unit is powered up, basic configuration must initially be performed by accessing the Console Serial Port. To gain access through the Serial Port, the Ethernet or Token Ring Bridge must be connected to a terminal or a PC running a terminal emulation program. See Chapter 1 “Installing the Bridge for Ethernet or Token Ring”.
Accessing the Console System 2 - 3 Each menu contains the following elements: n Title Line: Contains the product name, firmware version and menu name. It also contains the unique name assigned to the unit. See Chapter 6 “Setting Network Identifiers”. n Option Column : Displays the menu options and option number. n Value Column : Displays either the value as [menu] or displays the current settings for the option. If the value is [menu], there are additional sub-menus available.
2 - 4 Ethernet or Token Ring Bridge Commands and Information If your selection is a command, you may be prompted for information before it executes. Information may be one of the following types: n Token: A list of one or more fixed strings. To select a particular token, you need only enter enough of the starting characters of the token to allow it to be uniquely identified from the characters of the other tokens in the list.
Accessing the Console System 2 - 5 Some configuration commands only allow the choice between two fixed values. When the menu item is selected, the opposite value to the current value is chosen. For example, if the configuration item is only a selection between on and off, and the current value is on, then selecting the menu option will select the off value.
2 - 6 Ethernet or Token Ring Bridge Command Line Mode Another way to move within the Console is to enter commands directly from the Main Menu. Commands allow you to bypass the menu system and go directly to any level sub-menu or option. Enter the list of submenus, command names, and information separated by space characters. Example 1: To access the Radio Configuration Menu (located two submenus down): 1. At the Main Menu prompt type: configuration radio 2. Press ENTER.
Accessing the Console System 2 - 7 While a telnet session is in progress, you may not use the Console Port to gain access to the menus. If any characters are entered, the following message is printed identifying the location of the connection. Console taken over by remote operator at 192.200.1.1
2 - 8 Ethernet or Token Ring Bridge n Option: Contains the menu selections as a list of hyper-links. If the selection is a sub-menu, the selection name will end with the word “Menu”. n Value: Displays the current value of configured items. n Description: Explains the menu selection. The bottom of each menu page contains hyper-links to immediately return to the Main Menu or previous menus. To select a menu item, click with the mouse or select a link with the required keyboard commands.
Accessing the Console System 2 - 9 About the Menus Perform the following general functions using menus: n Configuration: Allows you to configure Ethernet or Token Ring and Radio Parameters, establish Network Identifications, and set SNMP values. See Chapters 3-7. n Statistics: View a variety of statistical information such as transmit and receive data throughput, Ethernet or Token Ring and radio errors, and the general status of the Ethernet or Token Ring Bridge unit. See Chapter 9 “Viewing Statistics”.
2 - 10 Ethernet or Token Ring Bridge Using the Configuration Console Menu The Console system is configured using the Configuration Console Menu shown below. To access this menu, select Configuration from the Main Menu then select Console from the Configuration Menu.
Accessing the Console System 2 - 11 Setting the Communication Port Parameters (Port) Use the port option to set the following Ethernet or Token Ring Bridge port communication parameters: Baud Rate, Data Bits, Parity and Flow. When the port option is selected, the Configuration Console Port Menu appears. Any changes are effective immediately.
2 - 12 Ethernet or Token Ring Bridge Setting Privilege Levels and Passwords (Rpassword, Wpassword) You can restrict access to the menus by setting privilege levels and passwords. Privilege levels are set from the Main Menu. Passwords are set from the Configuration Console Menu. There are three privilege levels contained in the Console Port: n Logged Out Level (Off): Access denied to all sub-menus. Users are only allowed access to the privilege and help options of the Main Menu.
Accessing the Console System 2 - 13 è To Set a Privilege Level: 1. Select Privilege from the Main Menu. Enter one of [off, readonly, write] : 2. Type the first letter of your selection and press ENTER. è To Set a Password: 1. Select Configuration from the Main Menu. 2. Select Console from the Configuration Menu. 3. Select the appropriate password option from the Configuration Console Menu.
2 - 14 Ethernet or Token Ring Bridge Enabling Linemode (Linemode) Enable linemode when working with telnet and terminal emulators that do not send characters when typed, but rather save them until the operator presses the carriage return at the end of a line. The Console will not automatically complete any typed commands or information when a space or carriage return is inserted. To enable linemode: 1. Select Configuration on the Main Menu. 2. Select Linemode on the Configuration Console Menu. 3.
Accessing the Console System 2 - 15 Monitoring of the DTR Signal The Ethernet or Token Ring Bridge monitors the state of the Data Terminal Ready (DTR) signal. This signal is used to indicate the presence or absence of a DTE device connected to the Console Port.
2 - 16 Ethernet or Token Ring Bridge
Part 2 - Configuration Part 2 - Configuration
Part 2 - Configuration
Chapter 3 - Before You Begin 3 CHAPTER 3 Before You Begin This chapter provides a general introduction to the Configuration Menu and describes the procedures for saving and restoring your configurations. See Chapters 4 - 11 for more information on configurations.
3-2 Ethernet or Token Ring Bridge Viewing the Configuration Menu Once you have completed the installation, the next step is to use the Configuration Menu commands to configure the Ethernet or Token Ring Bridge. To access the Configuration Menu, select Configuration from the Main Menu.
Before You Begin 3 - 3 STP: Used to configure the spanning tree protocol See Chapter 8 “Using the Spanning Tree Protocol”. More: Used to configure vendor specific items. Dump : Used to dump the configuration commands to the Console PortSee “Backing up your Configuration (Dump)”. Saving Configuration Parameters Although there is no explicit save command, your configuration parameters are automatically saved to non-volatile flash memory each time a parameter is set or modified.
3-4 Ethernet or Token Ring Bridge n All: The entire configuration will be displayed. n Non-default: Only the configuration options that are different from the original default settings will be displayed. n Distributable: Only the configuration options that are not considered unique to this unit are displayed. You may use the “diagnostics load distribute” command to send this configuration to other units in the infrastructure. 3.
Chapter 4 - Configuring the Radio Network 4 CHAPTER 4 Configuring the Radio Network This chapter describes the procedures for configuring the Ethernet or Token Ring Bridge Radio Network. Here’s what you’ll find in this chapter: n Overview n Using the Configuration Radio Menu n Using the Configuration Radio IEEE 802.
4 - 2 Ethernet or Token Ring Bridge Overview When configuring the radio network, all units should be configured while in close proximity to each other. This will allow your units to communicate with other radio nodes on your infrastructure as the units’ parameters are set. Once configuration is complete, the units can then be moved to their permanent location. Tests can be run to check the reliability of the radio links. See “Running a Link Test (Linktest)”.
Configuring the Radio Network 4 - 3 Using the Configuration Radio Menu The radio network is configured using the Configuration Radio Menu. To access this menu, select Configuration from the Main Menu then select Radio from the Configuration Menu. 1 2 3 4 5 6 7 8 - Option Ssid I80211 Frequency Rates Basic_rates Root Install Extended Configuration Radio Menu Value Description [interoperate] - Service set identification [ menu ] - 802.
4 - 4 Ethernet or Token Ring Bridge Basic Rates (Basic_rates) Use the basic_rates option to set up the basic bit rates for all associating Ethernet or Token Ring Bridges in the cell. All nodes in the cell must have the same basic rate setting in order to associate. The highest basic rate setting is used to transmit broadcasts and association packets. The basic rates must also be allowed data rates. Enabling Root Mode (Root) Use the root option to enable or disable root mode.
Configuring the Radio Network 4 - 5 Using the Configuration Radio IEEE 802.11 Menu 1 2 3 4 5 - Option Beacon Dtim Extend Rts Encap Configuration Radio I80211 Menu Value Description [ 100 ] - Beacon period in Kusec [ 2 ] - DTIM interval [ on ] - Allow proprietary extensions [ 2048 ] - RTS/CTS packet size threshold [802.
4 - 6 Ethernet or Token Ring Bridge Adding IEEE 802.11 Management Packet Extensions (Extend) If this parameter is enabled, the Ethernet or Token Ring Bridge will add extensions to some of the IEEE 802.11 management packets. This passes more information to other radio nodes allowing them to associate to the best Bridge. Even with the extensions enabled, other manufacturer’s nodes should ignore the extra information. However, if they become confused, this parameter may be disabled.
Configuring the Radio Network 4 - 7 Encapsulation The Encap option and the related encapsulation table commands of Show, Add and Remove are of concern only when both of the following conditions exist: n You are assembling a wireless LAN that incorporates non-Aironet equipment. n The non-Aironet equipment uses a proprietary method of packet encapsulation that is different from the method used by Aironet. If your wireless LAN consists only of Aironet components, use the default Encap value of 802.
4 - 8 Ethernet or Token Ring Bridge On an ethernet LAN, the data portion of a frame may be in one of two formats: DIX or DSAP/SSAP. The two formats differ both in packet size specifications and in the manner of heading, or starting, the data portion. An 802 wireless LAN requires packets to start with the DSAP/SSAP format and therefore must provide a method of conversion. DSAP/SSAP packet types are easily converted since the header is already in the required style.
Configuring the Radio Network 4 - 9 Running a Signal Strength Test (Strength) The strength option sends a packet once per second to each node in the association table. This packet is echoed back to the Ethernet or Token Ring Bridge which records and displays the RF signal strength associated with that particular node. It can be used to quickly check the link to each radio partner or could be monitored while aligning directional antennas between two nodes.
4 - 10 Ethernet or Token Ring Bridge Running a Multicast Test (Multicast) The multicast option is used to test transmission conditions within local radio cells. Packets are sent between the source and destination nodes without any acknowledgments or retries (as multicasts). This test provides a good indication of the raw state of the path to the node since no attempt is made to recover from any radio errors.
Configuring the Radio Network 4 - 11 If the path to the target node was over the radio, a total number of radio retries necessary to complete the test is also displayed. If the total number of retries is large, there may be problems with the link. Look for sources of interference. Running a Remote Linktest (Remote) Use the remote option to run a multicast link test between a client node associated somewhere in the infrastructure and its parent Bridge.
4 - 12 Ethernet or Token Ring Bridge Viewing Errors (Errors) The errors option is used to view the Radio Error statistics that may have occurred during the link test. See Chapter 9 “Viewing Statistics”. Setting the Automatic Link Test Mode (Autotest) The autotest option is used to control the automatic running of a link test whenever a repeater associates to its parent. The test will use the currently configured test parameters which, by default, runs a test to the parent node.
Configuring the Radio Network 4 - 13 The Autotest procedure can be used to help determine the placement of repeater units. For example, at each prospective location, an installer could cycle the power on the unit and watch the indicator displays for the results of the link test. As the test begins to fail, the installer could determine the radio range to the infrastructure and adjust the location accordingly.
4 - 14 Ethernet or Token Ring Bridge Setting Retry Transmission Time (Time_Retries, Count_Retries) These settings allow the user to establish a particular level of radio performance by controlling the RF packet retry level. The lesser of the two values will be used. If the retry count is reached before the retry time is met, then retry process on this particular packet is stopped. If the destination was a child node, it will be disassociated.
Configuring the Radio Network 4 - 15 Setting the Power Level (Power) This parameter may be used to reduce the power level of the radio transmitter down from the maximum allowed by the regulatory commission. Depending on where you are located, you may be allowed to set the power to 50 milliwatts, 100 milliwatts or to full power. Setting Fragment Size (Fragment) This parameter determines the largest packet size that may be transmitted.
4 - 16 Ethernet or Token Ring Bridge
Chapter 5 - Configuring the Ethernet Port 5 CHAPTER 5 Configuring the Ethernet or Token Ring Port This chapter describes the procedures for configuring the Ethernet or Token Ring Bridge Port.
5-2 Ethernet or Token Ring Bridge Using the Configuration Ethernet or Token Ring Menu The Ethernet or Token Ring Port is configured using the Configuration Ethernet or Token Ring Menu. To access this menu, select Configuration from the Main Menu then select Ethernet or Token Ring from the Configuration Menu.
Configuring the Ethernet or Token Ring Port 5 - 3 The active option should be disabled if the port on the Aironet Bridge is not going to be used. This informs the software not to route packets to the port and stops the use of processing power for scanning for Ethernet or Token Ring activity. Setting the Maximum Frame Size (Size) Ethernet Only The size option allows you to increase the maximum size of the frames transmitted to and from the Ethernet infrastructure.
5-4 Ethernet or Token Ring Bridge Setting the Routing Method (Method) Token Ring Only The Token Ring Bridge may be configured to operate with networks: n Whose packets are transparently routed by Bridges based on the destination MAC address. n Whose packets must contain a source routing mode header to guide their path through the infrastructure. Transparent: It is assumed that there are no source routing headers in the packets.
Configuring the Ethernet or Token Ring Port 5 - 5 Setting Up the Infrastructure Topology (Tring, Rring, Bridge) Token Ring Only When you use Token Ring Bridges to connect two or more source routed Token Rings together, the Token Ring Bridges create a virtual Token Ring out of the infrastructure. This allows nodes on the infrastructure to have source routes of their own and allows for easier routing of the packets through the Token Ring Bridges. Figure 5.
5-6 Ethernet or Token Ring Bridge The Token Ring number and the radio ring numbers should be assigned by your network administrator since each ring in your infrastructure must be assigned a unique number. Once these have been determined, all units must be configured with the number of the Token Ring to which they are attached. The root unit must also be configured with the virtual radio ring number. It will inform the repeater units of the radio ring number when they associate to the root.
Configuring the Ethernet or Token Ring Port 5 - 7 Early Token Release (Earlyrls) Token Ring Only This option only appears when used with a 16 Mb ring. Typically, a node transmits a packet after receiving the token. It then retransmits the token once it has seen the packet come back after traversing the ring. The early release option allows the unit to transmit the token immediately after transmitting a packet. This allows for more than one packet to be traversing the ring at a time.
5-8 Ethernet or Token Ring Bridge
Chapter 6 - Setting Network Identifiers 6 CHAPTER 6 Setting Network Identifiers This chapter describes the procedures for setting the Ethernet or Token Ring Bridge network identifiers.
6 - 2 Ethernet or Token Ring Bridge Using the Configuration Ident Menu Network identifiers are entered using the Configuration Ident Menu shown below. To access this menu, select Configuration from the Main Menu then select Ident from the Configuration Menu. 1 2 3 4 5 6 7 - Option Name Nid Inaddr Inmask Routing Location Contact [ [ [ [ [ [ [ Configuration Ident Value "BRE105E_22erba" ] 00409622ef0a ] 149.023.130.044 ] 255.255.255.
Setting Network Identifiers 6 - 3 NOTE: After the network ID is changed, the unit must be restarted either by powering it “Off ” and then “On,” or by using the “Diagnostics Restart” command for the change to come into effect. Assigning an IP Address (Inaddr) Use the inaddr option to establish an IP (Internet Protocol) address for the Ethernet or Token Ring Bridge. An IP address must be assigned to the unit before it can be accessed by either telnet, HTTP, or SNMP.
6 - 4 Ethernet or Token Ring Bridge Configuring the IP Routing Table The IP routing table is entered using the Configuration Ident Routing Menu shown below. To access this menu, select Routing from the Configuration Ident Menu. 1 2 3 4 5 - Option Display Host Net Default Delete Configuration Ident Routing Menu Value Description - Display route table entries - Add a static host route - Add a static network route [ 149.023.130.
Setting Network Identifiers 6 - 5 The Flags column displays letters identifying the type of entry: n S: Entry is static (entered by operator) n N: Entry is an infrastructure route n H: Entry is a host route The Use column indicates the number of packets that have been forwarded using this table entry. In the sample table, all addresses that match 149.23.166.xxx would be forwarded to the router at address 149.23.165.71. Any packet for address 149.23.130.20 would be forwarded to the address 149.23.165.
6 - 6 Ethernet or Token Ring Bridge
Chapter 7 - Configuring SNMP 7 CHAPTER 7 Configuring SNMP This chapter describes how to configure the Ethernet or Token Ring Bridge for use with the Simple Network Management Protocol (SNMP).
7-2 Ethernet or Token Ring Bridge Overview The Simple Network Management Protocol (SNMP) provides an industry standard mechanism for the exchange of management information in a TCP/IP based internet environment. The resident SNMP agent in the Ethernet or Token Ring Bridge is compliant with subsets of the Management Information Base (MIB-I, and MIB-II) for TCP/IP based internets, as defined in Internet’s Request for Comment’s (RFC) 1156 and 1213.
Configuring SNMP 7 - 3 Enabling the SNMP Agent (Enabled) The enabled option functions as an On/Off switch for the SNMP agent. The default setting is “On”. If the parameter is turned “Off”, all incoming SNMP messages will be ignored and no outgoing traps will be generated. Setting Up SNMP Communities (Communities) The communities option contains a menu that allows control access to the SNMP agent. When you select the communities option, the Configuration SNMP Communities Menu appears.
7-4 Ethernet or Token Ring Bridge An SNMP community consists of the following: n Name: The default set of communities is “Public, Proxy, Private, Regional, and Core”. You can define up to 5 community names. When an NMS requests information from the unit’s agent, the community name in the request must match one of the names on the SNMP communities list. n Access Mode: Displays the community access modes – “ReadWrite” and “Read-Only”. The default access mode is “Read-Only.
Configuring SNMP 7 - 5 NOTE: An error response will be returned to the NMS, if the NMS is trying a “set” request used with a community that has Read-Only access. Setting or Removing Allowed NMS IP Addresses (Ipadr) Use the ipadr option to set or remove allowed NMS IP addresses. If the community has a list of allowed IP addresses, only requests from an NMS with an IP address in the SNMP communities list will be allowed. If there is no list, any IP address is allowed. The default list is “Any.
7-6 Ethernet or Token Ring Bridge Enabling Remote NMS to Change Community Setup (Remote) The remote option controls whether the section of the custom MIB for the Ethernet or Token Ring Bridge allowing access to the community name configuration is enabled or disabled. n On: A remote NMS with write access will be able to change the configuration and access rights for the community names. n Off: No NMS will be able to change this part of the configuration.
Configuring SNMP 7 - 7 Specifying Community Names for Trap Messages (Trapcomm) Use the trapcomm option to specify the community name that will be used in the trap message. Specifying the Type of Log to Cause an SNMP Trap (Loglevel) The Ethernet or Token Ring Bridge may be configured to generate an enterprise specific trap whenever a log of a given severity or higher is produced. The trapdest parameter must be “On”.
7-8 Ethernet or Token Ring Bridge
Chapter 8 - Using the Spanning Tree Protocol 8 CHAPTER 8 Using the Spanning Tree Protocol This chapter describes how to conÞgure the Ethernet or Token Ring Bridge for use with the Spanning Tree Protocol (STP) Protocol.
8 - 2 Ethernet or Token Ring Bridge Overview STP is used to remove loops from a bridged LAN environment. The Ethernet or Token Ring Bridge implements the IEEE 802.1d Spanning Tree Protocol (STP) speciÞcation to manage multiple Bridges in an extended LAN environment. This allows the Ethernet or Token Ring Bridge to be used in bridged infrastructures with other 802.1d compliant Bridges.
Using the Spanning Tree Protocol 8 - 3 Understanding Loops If there is more than one path from one LAN to another, the infrastructure contains a loop. Figure 8.1 - Example Loop on a Bridge Infrastructure Node A LAN 1 Bridge 1 Bridge 2 LAN 2 If Node A transmits a multicast packet, both Bridge 1 and Bridge 2 will try and forward the packet to LAN 2. Each Bridge, on seeing the otherÕs transmission on LAN 2, will forward the packet back to LAN 1.
8 - 4 Ethernet or Token Ring Bridge How STP Protocol Works The STP protocol works by having the Bridges transmit special conÞguration messages to each other. The messages contain enough information to allow the Bridges to: n Elect a single Bridge. A single Bridge is selected, from all the Bridges on all the LAN, to be the root Bridge. Each Bridge then calculates the distance of the shortest path to the root Bridge. n Elect a designated Bridge (for each LAN).
Using the Spanning Tree Protocol 8 - 5 Each Bridge starts by assuming it is the root and its root cost is 0. When a Bridge receives a conÞguration message, it records the values only if the message received is better than the message it would transmit out the port. For example, message C1 is better than C2: n If the root ID in C1 has a lower numeric value than the value from C2. n If the root IDÕs are equal and C1Õs root cost is lower.
8 - 6 Ethernet or Token Ring Bridge Determining the Spanning Tree All ports on a Bridge, either the root port or the designated port for their LAN, are allowed to forward packets. All others are blocked and do not transmit or receive any data packets. Understanding Bridge Failures All root and blocked ports monitor the LANs to which they are connected and watch for conÞguration messages transmitted by the designated Bridge for the LAN.
Using the Spanning Tree Protocol 8 - 7 If the port is still part of the spanning tree at the end of the listening period it is put in the learning state. In this state it can still receive and transmit conÞguration messages, but is also allowed to learn the source addresses from the packets received from its LAN. It is still not allowed to forward any packets.
8 - 8 Ethernet or Token Ring Bridge The root Bridge in turn will include a ßag in all the conÞguration messages it sends.This ßag will be propagated through the infrastructure by all the other Bridges. After a time period the root Bridge will clear the ßag. This instructs all Bridges to return to the normal aging timeout. Implementing STP Protocol The STP protocol is implemented on the Aironet Ethernet or Token Ring Bridge as follows.
Using the Spanning Tree Protocol 8 - 9 Using the Configuration STP Menu (Root Bridge Only) The STP Protocol for a root Bridge is conÞgured using the ConÞguration STP Menu. This menu will only appear if the Root Mode is ÒOnÓ as described in Chapter 4 ÒConÞguring the Radio NetworkÓ. To access this menu, select ConÞguration from the Main Menu, then select STP from the ConÞguration Menu.
8 - 10 Ethernet or Token Ring Bridge Setting the Bridge Priority (Priority) The priority option is used to set the priority value appended to the infrastructure address of the Bridge ID. By changing the priority value, you can inßuence which Bridge in the infrastructure will become the root Bridge. The lower the priority value, the more likely the Bridge will be the root. If all other Bridges are set to the default value (8000 hex), a Bridge set with a lower value will become the root.
Using the Spanning Tree Protocol 8 - 11 Figure 8.2 provides a sample conÞguration in which it would be useful to change the root Bridge. Bridge 4 is the root with the spanning tree shown by the thick line. STP has been disabled to the port on Bridge 1 to prevent a loop. Figure 8.
8 - 12 Ethernet or Token Ring Bridge If there is heavy trafÞc between LAN A and LAN B, it would be more efÞcient to have Bridge 1 become the root with the port on Bridge 3 being disabled. Figure 8.
Using the Spanning Tree Protocol 8 - 13 Setting the Hello Message Interval Time (Hello_Time) The hello_time option is used to set the interval time, in seconds, between the transmission of conÞguration messages. This value is only used if the local Bridge becomes the spanning tree root Bridge. If not, the value in received conÞguration messages transmitted from the root Bridge is used. If the interval time is set too high, the infrastructure will respond slowly in resolving any conßict problems.
8 - 14 Ethernet or Token Ring Bridge If the timout period is set too low, the spanning tree infrastructure may reconÞgure itself unnecessarily and messages can be lost due to heavy trafÞc on the infrastructure. However, if set too high, the infrastructure will take longer than necessary to recover from failed ports or Bridges. The upper limit on the allowed range is determined by the setting of the forwarding delay. The timeout period must be less than twice the forwarding delay, minus 1 second.
Using the Spanning Tree Protocol 8 - 15 Setting the Local Port Priority (Priority) The priority option is only used when two or more repeaters are connected to the same LAN for redundancy and you want to select which one will forward the packets. The port assigned the lowest priority value will be the one to forward. The priority range is from 0 to ff hex with a default setting of 80.
8 - 16 Ethernet or Token Ring Bridge Displaying the Protocol Status (Display) The display option shows the overall status of the STP protocol and the state of each port on the local Bridge. When you select Display, the STP Status screen appears.
Using the Spanning Tree Protocol 8 - 17 Viewing the Port State (State) The state option is a read-only value which displays the current STP state of the local LAN port. The states displayed are forward, learn, listen, or blocked. Using the STP Configuration Menu (Repeater Only) The STP protocol for a repeater Bridge is conÞgured using the ConÞguration STP Menu. This menu will only appear if the Root Mode is ÒOnÓ. To access the ConÞguration STP Menu, select STP from the ConÞguration Menu.
8 - 18 Ethernet or Token Ring Bridge
Part 3 - Control & Maintenance Part 3 - Control & Maintenance
Part 3 - Control & Maintenance
Chapter 9 - Viewing Statistics 9 CHAPTER 9 Viewing Statistics This chapter describes how to use the Statistics Menu to monitor the performance of the Ethernet or Token Ring Bridge.
9-2 Ethernet or Token Ring Bridge Viewing the Statistics Menu The Statistics Menu provides easy access to a variety of statistical information regarding the Ethernet or Token Ring Bridge’s performance. You can use the data to monitor the unit and detect problems when they occur. To access this menu, select Statistics from the Main Menu.
Viewing Statistics 9 - 3 Throughput Statistics (Throughput) The Throughput Statistics Display provides a detailed summary of the radio data packets passing through your unit. To access this display, select Statistics from the Main Menu then select Throughput from the Statistics Menu.
9-4 Ethernet or Token Ring Bridge n Errors: Displays the number of errors that may have occurred. n Enter space to redisplay, C[lear stats], q[quit]: To redisplay statistics, enter a space by pressing the space bar. To clear the statistics, press “C” (case sensitive). To exit the Statistics Menu, press “q”. Radio Error Statistics (Radio) The Radio Error Statistics Display provides a detailed summary of the radio receiver and transmitter errors that have occurred on the unit.
Viewing Statistics 9 - 5 Error Statistics The Ethernet or Token Ring Error Statistics Display provides a detailed summary of the receiver and transmitter errors that have occurred on the unit. To access this display, select Statistics from the Main Menu then select Ethernet or Token Ring from the Statistics Menu.
9-6 Ethernet or Token Ring Bridge n Frame copy error: The Token Ring adapter has received a frame addressed to itself that has been marked as already copied off the ring. This could be due to a duplicate address on the ring or a possible line hit. n Token error: The Token Ring adapter has either not received a token in the required time or has received an invalid token.
Viewing Statistics 9 - 7 Ethernet Error Statistics ETHERNET ERROR STATISTICS Cleared 19:36:31 ago Receive Transmit -------------------------------------- ------------------------------Buffer full frames lost 0 Excessive collisions 0 CRC errors 0 Deferrals 273 Collisions 2 +2 Excessive deferrals 0 Frame alignment errors 0 No carrier sense present 0 Over-length frames 0 Carrier sense lost 0 Short frames 0 Out of window collisions 0 Overruns 0 Underruns 0 Misses 0 Bad length 0 Enter space to redisplay, C[lear
9-8 Ethernet or Token Ring Bridge n Excessive Deferrals: Number of times the frame failed to transmit due to excessive deferrals. Usually indicates the frame had to be continuously retried due to heavy traffic on the Ethernet infrastructure. n No Carrier Sense Present: Number of times the carrier was not present when a transmission was started. Usually indicates a problem with a cable on the Ethernet infrastructure. n Carrier Sense Lost: Number of times the carrier was lost during a transmission.
Viewing Statistics 9 - 9 Displaying Sources Routes (Routes) Token Ring Only The route option displays the source routes to the LAN nodes that the radio node is communicating with. They may be displayed in ring order, node order, or as a single node.
9 - 10 Ethernet or Token Ring Bridge Displaying Overall Status (Status) This display shows the settings of the most important configuration parameters of the Ethernet or Token Ring unit as well as important runtime statistics. Use the display to see if anything significant is configured incorrectly.
Viewing Statistics 9 - 11 Recording a Statistic History (Watch) Use the watch option to record the values of a chosen Ethernet or Token Ring statistic over time. Once you select a statistic and a time interval, the unit will start a timer. At each timer expiration, the unit will record the current value of the statistic. The last 20 samples are saved. è To Record a Statistic History: 1. Select the watch option. 1. ra 2. re 3. tk 4.
9 - 12 Ethernet or Token Ring Bridge Displaying a Statistic History (History) Use the history option to display the Ethernet or Token Ring history of the statistic that is currently being recorded. è To Display a Statistic History: 1. Select the history option. Depending on your watch option selections, a display screen similar to the one below will appear.
Viewing Statistics 9 - 13 Displaying Node Information (Node) The node command displays current Ethernet or Token Ring information about the client. Radio Node Statistics Address Signal Tx Pkt Tx Byte Tx Retry ------- ------ ----------- -------004096128e76 45 1012 204322 39 Enter space to redisplay, q[uit]: ID --- Rx Pkt -----1673 Rx Byte ------112386 Rate ----- n Address: Displays the address of the client. n Signal: Displays the signal strength of the client.
9 - 14 Ethernet or Token Ring Bridge Setting Screen Display Time (Display_Time) Use the display time option to set the Ethernet or Token Ring time interval for the automatic redisplay of any repeating display. The default value is 10 seconds.
Chapter 10 - Setting Up the Association Table 10 CHAPTER 10 Setting Up the Association Table This chapter describes the procedures for setting up the Association Table for the Ethernet or Token Ring Bridge.
10 - 2 Ethernet or Token Ring Bridge Overview Client nodes and repeater Bridges request to be associated with a parent Bridge so the parent will forward data frames. This exchange of radio packets passes back and forth information such as a node’s address, device, association type, and ASCII name. This information is entered into the Bridge’s association table along with the address of the parent Bridge.
Setting Up the Association Table 10 - 3 Using the Association Menu The Association Menu contains options that allow you to view the table entries, add entries, and control the routing of packets on your radio network. To access this menu, select Association from the Main Menu.
10 - 4 Ethernet or Token Ring Bridge The typical hierarchy display will resemble: RADIO HIERARCHY Device Address Name -------------------- ------------ -------------------BRE105E 00409611cd0e BRE105E_22ff0a BRE105T 00409611d1e5 hello there UC4500E 004096207206 UC4500E_207206 BRE105E 00409611d602 BRE105E_22ff0a UC4500E 0040962068b0 UC4500E_2068b0 LM4500 00409620222a The rest of the displays will be similar to the one below.
Setting Up the Association Table 10 - 5 n Parent Column: Displays the node ID of the parent to which the node is associated. In place of a node ID, the column may display the following: A blank entry: The node is not associated. Local: The node is associated to this unit. Local block: The node has been blocked and will not be allowed to associate with the local system directly. See “Association Monitor Menu (Monitor)”. n Name Column: Displays the node name.
10 - 6 Ethernet or Token Ring Bridge Association Monitor Menu (Monitor) The commands in this menu allow you to monitor the location and movement of all of the radio nodes in the local infrastructure.
Setting Up the Association Table 10 - 7 Network Map (Trace) This command builds a table similar to the Network Map Table but does not continuously display the table. Whenever the contents of the table change, a log message appears indicating the changes. The command is most useful for watching the movement of the radio nodes through the infrastructure. LM4500 202271 found associated to BRE105E 22ff0a unit_112c80 Lobby_112c80 lost NOTE: Press ENTER to exit screen.
10 - 8 Ethernet or Token Ring Bridge For example, suppose there is an Bridge on your accounting LAN and three end nodes (A, B, and C) within radio range of the Bridge. Only End Node A should be allowed access to the LAN. 1. Disable auto-association. 2. Add End Node A as a static entry. End Node A is allowed to associate to the root unit. 3. End Nodes B and C are not allowed to associate. Figure 10.
Setting Up the Association Table 10 - 9 If you are going to use static entries to control associations, then the “association add all” command is a quick way to set up the table. 1. Leave auto-association “On” and let the nodes automatically associate to the Bridge. 2. Once they have associated, select Add from the Association Menu and type “All”. All entries currently in the table are now made static. 3. Turn off auto-association. You can now remove extra entries or add missing entries manually.
10 - 10 Ethernet or Token Ring Bridge
Chapter 11 - Using Filters 11 CHAPTER 11 Using Filters This chapter describes how to control the forwarding of multicast messages.
11 - 2 Ethernet or Token Ring Bridge Overview If your Ethernet or Token Ring Bridge is connected to an infrastructure with a large amount of multi-protocol traffic, you may be able to reduce the amount of radio traffic by blocking out (filtering) those addresses or protocols that are not needed.
Using Filters 11 - 3 Filtering Multicast Addresses (Multicast) The multicast menu allows you to control the filtering of multicasts based on the actual multicast address. When you select the Multicast option the Filter Multicast Menu appears.
11 - 4 Ethernet or Token Ring Bridge This same display may also be produced with the “association display” command with either the “all” or “multicast-filters” information. See Chapter 10 “Setting Up the Association Table”.
Using Filters 11 - 5 Filtering Node Addresses (Node) The node option allows you to control the forwarding of packets based on the source node addresses. As with multicast filtering, there is a default action for those addresses not in the table. You may enter actions for specific addresses to override the default action. Specific node filters may be entered by specifying either the 6 byte infrastructure address of the node or by specifying its IP address.
11 - 6 Ethernet or Token Ring Bridge Setting the Default (Source) The default applies to those packets whose address does not have an entry in the filter table. Source address filtering is “Off” by default. This saves processing power since the unit has to look up the source address of each incoming packet to see if a filter is to be applied. Before any individual source filters can be made active, one of the other values for the default must be chosen.
Using Filters 11 - 7 Displaying the IP to Network Address Table (IPdisplay) When a node address filter is entered by IP address, the Ethernet or Token Ring Bridge first determines the infrastructure address associated with this IP address. The actual filtering is done based on the infrastructure address. IP ADDRESS FILTERS IP Address MAC Address Src --------------- ------------ --149.023.165.
11 - 8 Ethernet or Token Ring Bridge The Ethernet or Token Ring Bridge may be set up to monitor and record the list of protocols currently being forwarded over the radio. It will record the protocols found, how may packets were encountered and whether the packet came from the LAN or the radio. To set up the protocol filters, start the monitor and let it run for a while under normal use. Add filters by selecting the protocols from the monitor list.
Using Filters 11 - 9 You may set up filters based on either a protocol identifier or a DSAP/ SSAP combination. If the filter is based on SAPs and the control field has a value of 3, the packet may also be optionally filtered based on the OUI and LLC protocol fields. Both types of filters may also use a variable length bit mask of the packet contents to further specify which packets should be filtered.
11 - 10 Ethernet or Token Ring Bridge Displaying the Filters (Display) Use the display option to view the list of protocol filters you have added. PROTOCOL FILTERS ----------LLC--------- Masks Name Action Protocol SAPs OUI Protocol -------------- -------- -------- ---- ------ --------1. novell discard 8137 2. novell discard aaaa 000000 8137 3. novell discard e0e0 4. Ethertalk discard aaaa 080007 809b 5.
Using Filters 11 - 11 Adding A Filter (Add) Use the add option to add a protocol filter and specify the type of action required. There are several ways to add a filter: n Predefined filter n Manually add all the data n Use an entry from the monitor table built by the unit èTo Add a Predefined Filter 1. Select the add option. 2. Select one of the predefined strings: inet, novell, or netbios. The inet filter adds filters for both the IP and ARP protocols.
11 - 12 Ethernet or Token Ring Bridge è To Add a Filter Using the Monitor If protocol monitoring has been enabled, once you select the add command, the current monitor table will be displayed. To select a monitored protocol: 1. Enter the number displayed at the start of each line of the monitor display. 2. If the monitored protocol was un-recognized and was not given a name, you will be prompted to assign a name. 3. You will be prompted for the action to take when the protocol is encountered.
Using Filters 11 - 13 This allows you to specify a bit mask and corresponding hexadecimal value to be applied to the packet. These two values must match the packet contents before the protocol is identified. You must first specify a mask start position in the packet and match the mask value. The mask start position value should be a 0-based byte offset from the start of the data portion of the frame (after the MAC layer header). If you set the position to “none”, no mask is tested. c.
11 - 14 Ethernet or Token Ring Bridge If you type llc: a. When you select llc, the following prompt appears: Enter a value in hex of ffffh or less : b. Type a 16 bit value for the DSAP/SSAP combination (with the DSAP being in the high 8 bits) and press ENTER. Enter one of [a OUI value in hex of ffffffh or less, any] : This is used to specify an OUI value to further refine the protocol identification.
Using Filters 11 - 15 Removing an Entry (Remove) Use the remove option to remove a protocol filter entry. You may either remove all filters by entering the keyword “all” or a single entry by entering the number assigned to the filter and shown at the start of the line in the filter display. Length of Data Displayed in Log Action (Length) Use the length option to display the contents of packets being forwarded to the radio.
11 - 16 Ethernet or Token Ring Bridge Protocol Monitoring (Monitor/ Show/ Clear) The Ethernet or Token Ring Bridge allows you to create and display a list of the protocols currently being forwarded by the unit. This allows you to test if packets that contain data for unused protocols are being forwarded to the radio nodes. Once enabled by the monitor option, the Ethernet or Token Ring Bridge will then begin to examine the protocol used in each packet forwarded.
Using Filters 11 - 17 Access Packet Direction (Direction) Use the direction options to control the direction a packet is traveling before affected by the filters. n To_radio: Only packets from the LAN will have filters applied. Packets from the radio will not be filtered. This options reduces the amount of LAN traffic to the infrastructure. n Both: Packets in both directions will be filtered. This option allows control of the type of traffic the radio nodes may use.
11 - 18 Ethernet or Token Ring Bridge
Chapter 12 - Setting Up Event Logs 12 CHAPTER 12 Setting Up Event Logs This chapter describes how to use the Logs Menu to set up and view event logs on the Ethernet or Token Ring Bridge.
12 - 2 Ethernet or Token Ring Bridge Overview The Ethernet or Token Ring Bridge produces logs that record the occurrence of significant events occurring within your unit and on the infrastructure. The type of events that are recorded as logs are: n Information Logs: Records status changes that occur in the normal operation of the system. For example, when an end node associates to an Ethernet or Token Ring Bridge.
Setting Up Event Logs 12 - 3 Node “node address” “device name” “ASCII name” removed, max radio retries A node was removed from the table because a response was not received from the node after attempts were made to transmit a packet to it. The node may have failed or moved to another cell. Node “node address” “device name” “ASCII name” removed, staled out A node was removed from the table because data was not received from the node within the stale-out period.
12 - 4 Ethernet or Token Ring Bridge SNMP: “command text” A SNMP management node sent the unit a “set” variable request which was successfully executed. The “command text” is a similar menu command that has the same effect as the SNMP request. SNMP access failure from “community name” “IP address” (node address) A SNMP management node attempted to access the SNMP agent with an invalid community name or a name that it was not allowed to use.
Setting Up Event Logs 12 - 5 TFTP is loading “file name” from “ip address” This log is produced when the BOOTP server gives the Ethernet or Token Ring Bridge the name of a configuration file and then the name of a firmware file to load. Error Logs “Category” Error: nnn “type” errors This log is produced when any error occurs that is marked by an asterisk “*” after its count in the statistics displays. These errors are serious enough to affect the operation of the unit.
12 - 6 Ethernet or Token Ring Bridge Configuration is too large to save The number of commands in the configuration is too large for the available non-volatile memory. This may be caused by too many non-volatile entries in the association table. Could not program the flash memory An error occurred when trying to program a new version of the firmware into flash memory. The unit must be serviced.
Setting Up Event Logs 12 - 7 Lost our association, new specified router The specified router parameter of this repeater has been changed. The unit will drop its current association and try to re-associate. Lost our association, NAK from router The unit responds as though it was associated to its parent, however, the parent does not have the association. The unit will attempt to re-associate. The parent may have been rebooted.
12 - 8 Ethernet or Token Ring Bridge Token ring open failed, signal loss Before the unit inserts into a ring, the unit needs to see certain signals on the interface cable, which were not present or were lost. This message may denote a cabling problem. Token ring open failed, timeout The ring insertion procedure took longer than 18 seconds. Token ring open failed, ring failure The unit was unable to receive a packet it sent to itself after it inserted into a ring.
Setting Up Event Logs 12 - 9 Using the Logs Menu The event logs are viewed using the Logs Menu. To access this menu, select Logs from the Main Menu. 1 2 3 4 5 6 7 8 9 - Option History Clear Printlevel Loglevel Ledlevel Statistics Bnodelog Syslog Lockled Logs Menu Value [ all [ all [ error/severe ] ] ] [ off ] [000.000.000.
12 - 10 Ethernet or Token Ring Bridge The display will be similar to the following: OLDEST 0:00:00 I Node 004096109e30 BRE105E Floor_2_109e30 added locally 0:00:03 I Node 0040961064de AP3500-T F3_1064de added for 004096109e30 30:35:09 NEWEST, cleared at 0:00:00 b[ackward], f[orward], n[ewest], o[ldest], a[ll], C[lear], q[uit] : n First Line: “OLDEST” indicates the end of the buffer display. This will appear at the end of the history log.
Setting Up Event Logs 12 - 11 Specifying the Type of Logs to Print (Printlevel) Use the printlevel option to specify the type of event logs to appear on the Console screen. You will know immediately when an error or information event has occurred and then take the necessary action required. There are four levels of logging: n Error/Severe: Displays all error and severe logs. n Severe: Displays severe error logs only. n All: Displays all error, severe and information logs.
12 - 12 Ethernet or Token Ring Bridge Setting Statistic Parameters (Statistics) This command allows you to control how alarms are generated based on any of the available statistics kept by the Bridge. Logs may be: n Disabled for statistics n Generated if the statistic changes at all n Generated if the statistic changes at a greater than specified rate è To Set Statistic Parameters: 1. Select statistics. Type a number or the short form. 1. ra Radio 2.
Setting Up Event Logs 12 - 13 5. Enter an action. n Off: Turns off any alarms based on the statistics value. n Any: An alarm will be generated if the statistics change value. n Rate: Prompts for a rate per second change. If the statistic value changes faster than this rate, an alarm is produced. Forwarding Logs to a Unix System (Syslog) Use the syslog option to forward all logs printed on the Console (as controlled by the printlevel option) to a Unix host running the Syslogd deamon process.
12 - 14 Ethernet or Token Ring Bridge
Chapter 13 - Performing Diagnostics 13 CHAPTER 13 Performing Diagnostics This chapter describes how to use the Diagnostics Menu to maintain the Ethernet or Token Ring Bridge.
13 - 2 Ethernet or Token Ring Bridge Using the Diagnostics Menu Diagnostics are performed using the Diagnostics Menu. To access this menu, select Diagnostics from the Main Menu.
Performing Diagnostics 13 - 3 Using the Network Menu Network connection commands are performed using the Network Menu. To access this menu, select Diagnostics from the Main Menu the select Network.
13 - 4 Ethernet or Token Ring Bridge When starting a telnet session with the connect option: n Make sure the telnet option on the remote is enabled before connecting to a remote Bridge or client. See “Telnet Access” in Chapter 2. n A message is printed on the remote’s Console stating where the connections originated from. The Console is then disabled for the duration of the telnet session to prevent conflicting commands.
Performing Diagnostics 13 - 5 Physically Locating a Unit (Find) Use the find option to blink the amber indicators of the Bridge on and off. Find a unit you can telnet to if you are not sure of it’s exact location. Type “CTRL-C” to stop the command. Sending a Ping Packet (Ping) Use the ping option to test infrastructure connectivity from the Bridge to other IP nodes. The ping option sends an ICMP echo_request packet to a user-specified remote node.
13 - 6 Ethernet or Token Ring Bridge Loading New Code Versions (Load) The Ethernet or Token Ring Bridge code is stored in a flash memory chip inside the unit. Use the load option to load new code versions of the Ethernet or Token Ring Bridge’s firmware and save it to flash memory. To load new versions of the firmware, the code must be loaded into main memory first, then programmed into the flash memory. The unit will reboot using the new firmware.
Performing Diagnostics 13 - 7 Downloading Using Xmodem Protocol (Xmodem/Crc-xmodem) Use the Xmodem or CRC-xmodem options to load the new firmware version through the Console Port. Depending on the communications software programs available, choose: n Xmodem: Terminates packets with a “checksum” n CRC-xmodem: Terminates packets with a Cyclic Redundancy Check (CRC). è To load firmware using Xmodem or CRC-xmodem: 1.
13 - 8 Ethernet or Token Ring Bridge Downloading or Uploading using the File Transfer Protocol (Ftp) Use the FTP option to download or upload firmware. The Ethernet or Token Ring Bridge can be an FTP client or FTP server. To upload or download firmware you can initiate a connection from: n The Ethernet or Token Ring Bridge console to a remote PC or host and retrieve a new version of the firmware. n The Ethernet or Token Ring Bridge console to a remote PC or host and send a copy of the running firmware.
Performing Diagnostics 13 - 9 èTo Download Firmware using FTP: 1. Load the file onto the PC, host, or Bridge you will retrieve from. 2. Select the dest option and type in the IP address of the host PC or Ethernet or Token Ring Bridge. 3. Select the username option and type in the username required to access the firmware file. If downloading from another Ethernet or Token Ring Bridge, the username option must have a value even though the value is not used by the remote Ethernet or Token Ring Bridge. 4.
13 - 10 Ethernet or Token Ring Bridge The unit will begin an FTP session to the host PC, retrieve the file, program the flash memory, and reboot. A message will appear: 220 sun_host FTP server (SunOS 4.1) ready. 230 User sysop logged in. 200 Type set to I. 200 PORT command successful. 150 Binary data connection for apv33.img (163056 bytes). 226 Binary Transfer complete. 221 Goodbye. FTP: received 161056 bytes in 00:00:10; 15 Kbytes/s transfer rate rebooting unit.
Performing Diagnostics 13 - 11 If uploading to another Ethernet or Token Ring Bridge, the filename option must have a value even though the value is not used by the remote Ethernet or Token Ring Bridge. 5. Select the put option. The unit will begin an FTP session to the remote host PC or Ethernet or Token Ring Bridge. Uploading the Unit’s configuration (Config) You may use this option to save the configuration on a remote host or PC in a format suitable for later downloading using FTP or BOOTP.
13 - 12 Ethernet or Token Ring Bridge 6. The contents of the configuration file is processed as though the commands have been entered by the operator at the console. The commands in the file will modify the currently running configuration. NOTE: The current configuration is not set back to the defaults before the file is processed. Therefore, the file contents do not have to be a complete configuration but may contain just the items you wish to change. 7.
Performing Diagnostics 13 - 13 If you are distributing a configuration, examine the parts of the unit’s configuration that will be distributed by executing the command “configuration dump distributable standard”. The control option controls how the remote units respond to your request to send them a configuration or firmware. Values may be set to: n None: The unit will never respond and cannot be loaded by another unit using the distribute command. n Any: The unit will always respond.
13 - 14 Ethernet or Token Ring Bridge 3. The following message will appear: Finding the other units ... When the command is executed, the local unit will send a special broadcast message similar to the one below to all other units on the infrastructure. It reports that it has a new firmware file with its assigned version number. BR105E 004096001d45 has code version 3.2a (checksum 1598) The remote units then decide whether to respond based on the value of their rcv_distribute parameter.
Appendix A - Aironet Ethernet or Token Ring Bridge Specifications LAN Interfaces Supported Ethernet Cable Specifications Connector Thin Ethernet IEEE 802.3 10Base2 BNC Connector Thick Ethernet IEEE 802.3 10Base5 DB-15 Connector (external Transceiver required) Twisted Pair Ethernet IEEE 802.3 10BaseT RJ-45 Connector Token Ring Cable Specifications Connector Unshielded Twisted Pair IEEE 802.5 RJ-45 Connector Shielded Twisted Pair IEEE 802.
A-2 Ethernet or Token Ring Bridge Physical Specifications Item Description Size 20 x 15 x 5 cm (7.8 x 5.9 x 1.9 inches) Status Indicators Top Panel – Radio Traffic activity, Ethernet or Token Ring Traffic activity, Status Back Panel (Ethernet Only) – Ethernet Rx and Tx activity, Polarity, Port connections, Collisions Console Port DCE with DB-9 female connector Power Supply Power Pack.
A-3 Console Port Pin-Out The Console Port is a DCE using a DB-9 female connector. The following table describes the pinouts on the connector and how you should connect the DB-9 pins to the DB-25 on a terminal. Signal names are in terms of the DTE.
A-4 Ethernet or Token Ring Bridge
Appendix B - Console Menu Tree The Console system consists of multiple sub-menus that branch off the Main Menu, much like a tree. This Appendix provides you with a detailed listing of all menu, sub-menus and options contained in the Console Port.
B-2 Ethernet or Token Ring Bridge Ethernet Active Size Port Token Ring Active Speed Method Tring Rring Extended Partition Earlyrls Sap Address Display Add Remove Ident Name Nid Inaddr Inmask Routing Display Host Net Default Delete Location Contact Console Type Port Rate Bits Parity Flow Rpassword Wpassword Linemode Telnet Http Ethernet configuration Connection active Maximum frame size Port selection Token Ring configuration Connection active Ring speed Routing method Token Ring number Radio virtual ring
B-3 Snmp Enabled Communities Display Add Remove Access Ipadr Nid Remote Trapdest Trapcomm Loglevel Authtrap STP Active Bridge Priority Hello_time Forward_delay Msg_age_timeout Port Port Priority Cost Rport Rpriority Rcost Display State More Dump Statistics Throughput Radio Ethernet or Token Ring Status Watch History Nodes ARP Display_time Association Display Summary Monitor Map Trace Set snmp values Enable the SNMP agent Set community properties Display communities Add a community Remove a community Set c
B-4 Ethernet or Token Ring Bridge Maximum Autoassoc Add Remove Staletime Niddisp Filter Multicast Default Show Add Remove Radio_mcst Node Ethdst or Tkdst Raddst Source Display Ipdisplay Add Remove Protocols Default Display Add Remove Length Monitor Show Clear Direction Logs History Clear Printlevel Loglevel Ledlevel Statistics Bnodelog Syslog Lockled Diagnostics Network Connect Escape Find Ping Linktest Maximum allow child nodes Allow automatic table additions Control node association Remove association
B-5 Restart Defaults Reset Load Xmodem Crc-xmodem Ftp Get Put Config Dest Username Password Filename Distribute Go Type Control Bootp/DHCP Class Privilege Help Equivalent to power-up Return to default configuration Defaults parts of the configuration Load new version of firmware Xmodem load from serial port Xmodem-CRC load from serial port Load using FTP Load a firmware/config file Send a firmware file Send a configuration file Host IP address Host username Host password Host filename Distribute the firmw
B-6 Ethernet or Token Ring Bridge
Appendix C - SNMP Variables The Aironet Ethernet or Token Ring Bridge supports the Simple Network Management Protocol (SNMP). SNMP provides an industry standard mechanism for the exchange of information in a TCP/IP based internet environment. The resident SNMP agent is compliant with subsets of the (Management Information Base) MIB-I and MIB-II for TCP/IP based internets as defined in Internet’s Request For Changes (RFC) 1156 and 1213.
C-2 Ethernet or Token Ring Bridge The Interfaces Group MIBII.interfaces (1.3.6.1.2.1.2.x) Object ID 1 2 2.1 2.1.1 2.1.2 2.1.3 2.1.4 2.1.5 2.1.6 2.1.7 2.1.8 2.1.9 2.1.10 2.1.11 2.1.12 2.1.13 2.1.14 2.1.15 2.1.16 2.1.17 2.1.18 2.1.19 2.1.20 2.1.21 2.1.
C-3 The IP Group MIBII.ip (1.3.6.1.2.1.4.
C-4 Ethernet or Token Ring Bridge The ICMP Group MIBII.icmp (1.3.6.1.2.1.5.
C-5 The Transmission Group MIBII.transmission.dot3 (1.3.6.1.2.1.10.7.x) Object Id 1 1.1 1.1.1.1 1.1.3.1 2 2.1 2.1.1.1 2.1.2.1 2.1.3.1 2.1.4.1 2.1.5.1 2.1.6.1 2.1.7.1 2.1.8.1 2.1.9.1 2.1.10.1 2.1.11.1 2.1.12.1 2.1.13.1 2.1.14.1 2.1.15.1 2.1.16.
C-6 Ethernet or Token Ring Bridge The SNMP Group MIBII.snmp (1.3.6.1.2.1.11.
C-7 The Configure STP Group MIBII.dot1dBridge.dot1dStp (1.3.6.1.2.1.17.2.x) Object Id 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 Object Name dot1dStpProtocolspecification dot1dStpPriority dot1dStpTimeSinceTopologyChange dot1dStptopChanges dot1dStpDesignatedRoot dot1dStpRootcost dot1dStpRootPort dot1dStpMaxAge dot1dStpHelloTime dot1dStpHoldTime dot1dStpForwardDelay dot1dStpBridgeMaxAge dot1dStpBridgeHelloTime dot1dStpBridgeForwardDelay dot1dStpPortTable 15.1 15.1.1 15.1.2 15.1.3 15.1.4 15.1.5 15.1.6 15.1.7 15.1.
C-8 Ethernet or Token Ring Bridge MIBII.dot1dBridge.dot1dTp (1.3.6.1.2.1.17.4.x) Object Id 1 2 3 Object Name dot1dTpLearnedEntryDiscards dot1dTpAgingTime dot1dTpFdbTable 3.1 3.1.1 3.1.2 3.1.
C-9 The Token Ring Group iso.org.dod.internet.experimental.dot5 (1.3.6.1.3.4) Object Id 1 1.1 1.1.1.1 1.1.2.1 1.1.3.1 1.1.4.1 1.1.5.1 1.1.6.1 1.1.7.1 1.1.8.1 1.1.9.1 2 Object Name dot5Table dot5entry dot5IfIndex dot5Commands dot5RingStatus dot5RingState dot5RingOpenStatus dot5RingSpeed dot5UpStream dot5MonParticipate dot5Functional dot5StatsTable Object Type Sequence of Sequence integer integer integer integer integer integer integer integer integer Sequence of 2.1 2.1.1.1 2.1.2.1 2.1.3.1 2.1.4.1 2.1.5.
C-10 Ethernet or Token Ring Bridge 3.2 The ARLAN Custom MIB The Configure Ethernet Group ACCESSPOINT.configuration.cfgEthernet (1.3.6.1.4.1.551.2.2.1.1.x) Object Id 1 2 Object Name cfgEthEnable cfgEthSize Object Type integer integer Access write write The Configure ARLAN Group ACCESSPOINT.configuration.cfgArlan (1.3.6.1.4.1.551.2.2.1.2.
C-11 The Configure Console Group ACCESSPOINT.configuration.cfgConsole (1.3.6.1.4.1.551.2.2.1.4.x) Object Id 1 2 3 4 5 6 7 9 11 Object Name cfgConsPrivilege cfgConsReadPwd cfgConsWritePwd cfgConsType cfgConsBaud cfgConsBits cfgConsParity cfgConsTelnet cfgConsFlow Object Type integer string string integer integer integer integer integer integer Access write write write write write write write write write The Configure SNMP Group ACCESSPOINT.configuration.cfgSnmp (1.3.6.1.4.1.551.2.2.1.5.
C-12 Ethernet or Token Ring Bridge The Configure Logs Group ACCESSPOINT.configuration.cfgLogs (1.3.6.1.4.1.551.2.2.1.6.x) Object Id 1 2 3 5 6 7 8 Object Name cfgLogPrint cfgLogSave cfgLogLed cfgLogClear cfgLogStatusLock cfgLogBnodeLog cfgLogSyslog Object Type integer integer integer integer integer interger ipaddress Access write write write write write write write The Configure Association Table Group ACCESSPOINT.configuration.cfgAssociation (1.3.6.1.4.1.551.2.2.1.7.
C-13 The Configure Ident Group ACCESSPOINT.configuration.cfgIdent (1.3.6.1.4.1.551.2.2.1.9.x) Object Id 1 2 3 Object Name cfgIdIpadr cfgIdImask cfgIdIpGateway Object Type ipaddress ipaddress ipaddress Access write write write The Radio Error Statistics Group ACCESSPOINT.statistics.statRadio (1.3.6.1.4.1.551.2.2.2.1.
C-14 Ethernet or Token Ring Bridge The Admin Group ACCESSPOINT.admin (1.3.6.1.4.1.551.2.2.4.
C-15 The Admin FTP Group ACCESSPOINT.admin.adminFTP (1.3.6.1.4.1.551.2.2.4.3.
C-16 Ethernet or Token Ring Bridge
Appendix D - Aironet Technical Support User’s Guide Use the User’s Guide document number 710-004496 to learn more about operating your Aironet unit. Communications Use the following information to contact the Aironet Technical Support group: Telephone FAX Email (330) 664-7903 (330) 664-7990 techsupp@aironet.com Web Site For additional product information and technical support, including the capability to download new firmware and drivers, use the Aironet web site at: http://www.aironet.
D-2 Ethernet or Token Ring Bridge
I-i Index A Association Table auto-association 10-7 controlling associations 10-7 display of node addresses 10-9 displaying the summary 10-5 displaying the table 10-3 overview 10-2 viewing the menu 10-3 D DHCP/BOOTP protocol 13-10 Display Time 9-13 Displays prompts 2-5 setting re-display time 9-13 distributing firmware/configurations 13-11 DTIM 4-5 DTR signal monitoring 2-15 dump configuration command 3-3 B E beacon period 4-5 BOOTP/DHCP protocol 13-10 C Commands command line mode 2-6 Configuration back
I - ii monitoring used protocols 11-16 overview 11-2 finding a unit 13-4 FTP downloading firmware/configuration 13-8 menu 13-7 overview 13-7 setting an IP address 6-3 upload firmware 13-9 uploading configurations 13-10 H HTTP allowing incoming connections 2-7, 2-14 setting an IP address 6-3 I Indicator Displays back panel 1-12 from automatic linktest 4-12 how alarms set status indicator 12-11 locking status indicator 12-13 top panel 1-10 Installation antenna 1-3 ethernet cable 1-6 indicator displays 1-10
I - iii ping, a remote IP address 13-4 Ports Ethernet or Token Ring 5-1 privilege levels 2-12 protocol filtering 11-7 R Radio Network configuration menu 4-3 overview 4-2 root mode 4-4 setting DTIM interval 4-5 restarting the unit 13-4 RTS/CTS parameters 4-6 T Telnet allowing incoming connections 2-14 connecting via 2-6 linemode option 2-14 setting IP address 6-3 setting the escape sequence 13-3 starting an outgoing call 13-2 Terminal type setting 2-10 TFTP 13-10 Throughput Statistics 9-3 tracing network
I - iv