User's Manual
Table Of Contents
- BreezeACCESS 4900 System Manual
- About This Manual
- Contents
- Figures
- Tables
- Chapter 1 - System Description
- Chapter 2 - Installation
- Chapter 3 - Commissioning
- Chapter 4 - Operation and Administration
- Working with the Monitor Program
- Menus and Parameters
- Main Menu
- Info Screens Menu
- Unit Control Menu
- Basic Configuration Menu
- Site Survey Menu
- Advanced Configuration Menu
- IP Parameters
- Air Interface Parameters
- ESSID Parameters
- Frequency Definition Parameters
- Frequency Definition Submenu in AU
- Frequency Definition Submenu in SU
- Best AU Parameters (SU)
- Scanning Mode (SU only)
- Power Control Parameters
- Antenna Gain
- Cell Distance Parameters (AU only)
- Arbitration Inter-Frame Spacing (AIFS)
- Maximum Number of Associations (AU only)
- Wireless Link Trap Threshold (AU only)
- Spectrum Analysis
- Lost Beacons Transmission Watchdog Threshold
- Disassociate (AU only)
- Network Management Parameters
- Bridge Parameters
- VLAN Support
- Ethernet Broadcast Filtering (SU only)
- Ethernet Broadcast/Multicast Limiter
- Bridge Aging Time
- Broadcast Relaying (AU only)
- Unicast Relaying (AU only)
- MAC Address Deny List (AU only)
- Add MAC Address to Deny List
- Remove MAC Address from Deny List
- Roaming Option (SU only)
- Ports Control (SU only)
- Show Bridge Parameters
- Performance Parameters
- Service Parameters
- Security Parameters
- Appendix A - Software Version Loading Using TFTP
- Appendix B - File Download and Upload Using TFTP
- Appendix C - Using the Set Factory Defaults Utility
- Appendix D - Preparing the Indoor to Outdoor SU Cable
- Appendix E - Supported MIBS and Traps
- Appendix F - Parameters Summary
- Appendix G - Using the Feature License Web Application
- Appendix H - Troubleshooting
Menus and Parameters
4.2.6.7.4 Default Key (SU only)
The Default Key defines the Key to be used for encrypting/decrypting t
authentication messages (Shared Key mode) and/or data frames (Data
Encryption enabled). The AU learns the Default Key from the SU provi
one of the Keys defined in the AU. The AU may use different keys when
authenticating and/or communicating with different SUs.
Available values range from 1 to 4.
The default is KEY # 1.
4.2.6.7.5 Default Multicast Key (AU only)
rypting
es range from 1 to 4.
The default is KEY # 1.
4.2.6.7.6 Key # 1 to Key # 4
The Key # options enables defining the encryption key to be used for initializing
the pseudo-random number generator that forms part of the
encryption/decryption process. The Keys must be set before the Shared Key
authentication algorithm or Data Encryption can be used. To support proper
operation, both the Key # and the content must be identical at both sides of a
wireless link.
Each Key is a string of 32 hexadecimal numbers. For security reasons, it is a
“write only” parameter, displayed as a string of asterisks (“*”).
The default for all 4 Keys is 000…0 (a string of 32 zeros), which means no key.
4.2.6.7.7 Promiscuous Authentication (AU only)
The Promiscuous Authentication mode enables new SUs to join an active cell
where Shared Key operation and/or Data Encryption are used, even if this SU
does not have the correct security parameters. In promiscuous mode, all
downlink transmissions (from AU to SUs) are not encrypted, allowing remote
configuration of security parameters, regardless of the current settings in the SUs
of the parameters related to data encryption. After a new SU joins the cell it
should be remotely configured with the proper parameters (or upgraded). When
the SU is configured properly, the Promiscuous Mode should be disabled.
The default is Disable.
he
ded it is
The Multicast Default Key defines the Key to be used for encrypting/dec
multicasts and broadcasts when Data Encryption is enabled.
Available valu
NOTE
Do not leave the AU in the enabled Promiscuous Authentication mode for prolonged periods. Use it
only when absolutely necessary, perform the required actions as quickly as possible and disable it.
The unit will return automatically to Promiscuous Authentication disabled mode after reset.
Operation and Administration
143