Quidway WB2011 Wireless Bridge User Guide
User Guide Guide Outdoor 5 GHz Wireless Bridge IEEE 802.
WB2011 F1.1.1.
Compliances Federal Communication Commission Interference Statement This equipment generates, uses, and can radiate radio frequency energy and, if not installed and used in accordance with the instruction manual, may cause interference to radio communications.
Safety Compliance Power Cord Safety Please read the following safety information carefully before installing the wireless bridge: Warning: Installation and removal of the unit must be carried out by qualified personnel only. • The unit must be connected to an earthed (grounded) outlet to comply with international safety standards. • Do not connect the unit to an A.C. outlet (power supply) without an earth (ground) connection.
Veuillez lire à fond l'information de la sécurité suivante avant d'installer le wireless bridge: AVERTISSEMENT: L’installation et la dépose de ce groupe doivent être confiés à un personnel qualifié. • Ne branchez pas votre appareil sur une prise secteur (alimentation électrique) lorsqu'il n'y a pas de connexion de mise à la terre (mise à la masse). • Vous devez raccorder ce groupe à une sortie mise à la terre (mise à la masse) afin de respecter les normes internationales de sécurité.
Bitte unbedingt vor dem Einbauen des wireless bridges die folgenden Sicherheitsanweisungen durchlesen: WARNUNG: Die Installation und der Ausbau des Geräts darf nur durch Fachpersonal erfolgen. • Das Gerät sollte nicht an eine ungeerdete Wechselstromsteckdose angeschlossen werden. • Das Gerät muß an eine geerdete Steckdose angeschlossen werden, welche die internationalen Sicherheitsnormen erfüllt.
Contents Chapter 1: Introduction Package Checklist Hardware Description Component Description System Configuration System Components Point-to-Point Configuration Point-to-Multipoint Configuration Features and Benefits System Defaults 1-1 1-1 1-2 1-2 1-5 1-5 1-5 1-5 1-6 1-7 Chapter 2: Bridge Link Planning Data Rates Radio Path Planning Antenna Height Antenna Position and Orientation Radio Interference Weather Conditions Ethernet Cabling Grounding 2-1 2-1 2-2 2-3 2-4 2-5 2-5 2-6 2-6 Chapter 3: Hardware In
Contents SNMP Administration System Log Wireless Distribution System (WDS) Bridge Spanning Tree Protocol (STP) Radio Interface Radio Settings (802.
Contents password ip http port ip http server show system show version System Logging Commands logging on logging host logging console logging level logging facility-type show logging System Clock Commands sntp-server ip sntp-server enable sntp-server date-time sntp-server daylight-saving sntp-server timezone show sntp SNMP Commands snmp-server community snmp-server contact snmp-server enable server snmp-server host snmp-server location show snmp Flash/File Commands bootfile copy delete dir WDS Commands wds
Contents bridge stp-port spanning-disabled show bridge Filtering Commands filter ap-manage filter ethernet-type enable filter ethernet-type protocol show filters Ethernet Interface Commands interface ethernet dns server ip address ip dhcp shutdown show interface ethernet Wireless Interface Commands interface wireless description speed channel turbo beacon-interval dtim-period fragmentation-length rts-threshold encryption key transmit-key transmit-power shutdown show interface wireless VLAN Commands vlan nat
Contents Appendix C: Cables and Pinouts Twisted-Pair Cable Assignments 10/100BASE-TX Pin Assignments Straight-Through Wiring Crossover Wiring 8-Pin DIN Connector Pinout 8-Pin DIN to RJ-45 Cable Wiring C-1 C-1 C-1 C-2 C-2 C-3 C-4 Glossary Index ix
Contents x
Chapter 1: Introduction The Outdoor 5 GHz Wireless Bridge system consists of two models that provide point-to-point or point-to-multipoint IEEE 802.11a wireless links between remote Ethernet LANs: • WB2011– Provides only external antenna options and is designed to operate as the “Master” bridge in point-to-multipoint configurations, supporting wireless connections to as many as 16 WB2011 Slave units.
1 Introduction Inform your dealer if there are any incorrect, missing or damaged parts. If possible, retain the carton, including the original packing materials. Use them again to repack the product in case there is a need to return it.
Hardware Description 1 External Antenna Options (WB2011 Only) The WB2011 Master bridge unit does not include an integrated antenna, but provides various external antenna options. In a point-to-multipoint configuration an external high-gain omnidirectional, or panel antenna can be used to communicate with up to 16 bridges spread over a wide area. The external antenna connects to the N-type RF connector on the WB2011 using the provided coaxial cable.
1 Introduction However, when connecting the access point to a workstation or other device that does not have MDI-X ports, you must use crossover twisted-pair cable. LED Indicator Input Data from Local Network Switch AC Power Socket (Hidden) Output Data and Power to Wireless Bridge The wireless bridge does not have a power switch. It is powered on when its Ethernet port is connected to the power injector module, and the power injector module is connected to an AC power source.
System Configuration 1 System Configuration System Components At each location where a unit is installed, it must be connected to the local network using the power injector module. The following figure illustrates the system component connections.
1 Introduction WB2011 Slave WB2011 Slave WB2011 Slave WB2011 Master with Omnidirectional Antenna WB2011 Slave WB2011 Slave WB2011 Slave WB2011 Slave WB2011 Master with Antenna WB2011 Slave WB2011 Features and Benefits • WB2011 Master units support point-to-multipoint links using various external antenna options • • • • • • • Maximum data rate up to 108 Mbps Outdoor weatherproof design IEEE 802.
System Defaults 1 • Scans all available channels and selects the best channel and data rate based on the signal-to-noise ratio • Manageable through an easy-to-use web-browser interface, command line (via Telnet), or SNMP network management tools System Defaults The following table lists some of the wireless bridge’s basic system defaults. To reset the bridge defaults, use the CLI command “reset configuration” from the Exec level prompt.
1 Introduction Feature Parameter Default System Logging Syslog Disabled Logging Host Disabled Logging Console Disabled IP Address / Host Name 0.0.0.0 Logging Level Informational Logging Facility Type 16 Spanning Tree Status Enabled Ethernet Interface Speed and Duplex Auto Wireless Interface 802.11a Status Enabled Turbo Mode Disabled Wireless Security 802.
Chapter 2: Bridge Link Planning The Outdoor 5 GHz Wireless Bridge supports fixed point-to-point or point-to-multipoint wireless links. A single link between two points can be used to connect a remote site to larger core network. Multiple bridge links can provide a way to connect widespread Ethernet LANs. For each link in a wireless bridge network to be reliable and provide optimum performance, some careful site planning is required.
2 Bridge Link Planning Radio Path Planning Although the wireless bridge uses IEEE 802.11a radio technology, which is capable of reducing the effect of multipath signals due to obstructions, the wireless bridge link requires a “radio line-of-sight” between the two antennas for optimum performance. The concept of radio line-of-sight involves the area along a radio link path through which the bulk of the radio signal power travels. This area is known as the first Fresnel Zone of the radio link.
Radio Path Planning 2 When planning the radio path for a wireless bridge link, consider these factors: • Avoid any partial line-of-sight between the antennas. • Be cautious of trees or other foliage that may be near the path, or may grow and obstruct the path. • Be sure there is enough clearance from buildings and that no building construction may eventually block the path.
2 Bridge Link Planning Total Link Distance Max Clearance for 60% of First Fresnel Zone at 5.8 GHz Approximate Clearance for Earth Curvature Total Clearance Required at Mid-point of Link 15 miles (24.1 km) 35 ft (10.7 m) 45 ft (13.7 m) 80 ft (24.4 m) 17 miles (27.4 km) 37 ft (11.3 m) 58 ft (17.7 m) 95 ft (29 m) Note that to avoid any obstruction along the path, the height of the object must be added to the minimum clearance required for a clear radio line-of-sight.
Radio Path Planning 2 • Avoid placing the wireless bridge too close to any metallic, reflective surfaces, such as roof-installed air-conditioning equipment, tinted windows, wire fences, or water pipes • The wireless bridge antennas at both ends of the link must be positioned with the same polarization direction, either horizontal or vertical Antenna Polarization — The wireless bridge’s antenna sends a radio signal that is polarized in a particular direction.
2 Bridge Link Planning maximum wind velocity and direction at the site and be sure that any supporting structure, such as a pole, mast, or tower, is built to withstand this force. • Lightning — The wireless bridge includes its own built-in lightning protection. However, you should make sure that the unit, any supporting structure, and cables are all properly grounded. Additional protection using lightning rods, lightning arrestors, or surge suppressors may also be employed.
Chapter 3: Hardware Installation Before mounting antennas to set up your wireless bridge links, be sure you have selected appropriate locations for each antenna. Follow the guidance and information in Chapter 2, “Wireless Link Planning.” Also, before mounting units in their intended locations, you should first perform initial configuration and test the basic operation of the wireless bridge links in a controlled environment over a very short range.
3 2. Hardware Installation Place the U-shaped part of the bracket around the pole and tighten the securing nut just enough to hold the bracket to the pole. (The bracket may need to be rotated around the pole during the alignment process.) Attach bracket to pole with mounting grooves facing up 3. Use the included nuts to tightly secure the wireless bridge to the bracket. Be sure to take account of the antenna polarization direction; both antennas in a link must be mounted with the same polarization.
Mount the Unit 3 Mounting on Larger Diameter Poles In addition, there is a method for attaching the pole-mounting bracket to a pole that is 2 to 5 inches in diameter using an adjustable steel band clamp (not included in the kit). A steel band clamp up to 0.5 inch (1.27 cm) wide can be threaded through the main part of the bracket to secure it to a larger diameter pole without using the U-shaped part of the bracket. This method is illustrated in the following figure.
3 Hardware Installation 2. Position the bracket in the intended location and mark the position of the three mounting screw holes. 3. Drill three holes in the wall that match the screws and wall plugs included in the bracket kit, then secure the bracket to the wall. 4. Use the included nuts to tightly secure the wireless bridge to the bracket.
Connect Cables to the Unit 3 Connect Cables to the Unit 1. Attach the Ethernet cable to the Ethernet port on the wireless bridge. Note: The Ethernet cable included with the package is 30 m (100 ft) long. To wire a longer cable (maximum 100 m, 325 ft), follow the connector pinout information in Appendix B. 2. For extra protection against rain or moisture, apply weatherproofing tape (not included) around the Ethernet connector. 3.
3 Hardware Installation AC power Ethernet cable from LAN switch Inp ut Ou tpu t Power LED indicator Ethernet cable to wireless bridge 3. Insert the power cable plug directly into the standard AC receptacle on the power injector. 4. Plug the other end of the power cable into a grounded, 3-pin socket, AC power source. Note: For International use, you may need to change the AC line cord. You must use a line cord set that has been approved for the receptacle type in your country. 5.
Align Antennas 3 The RSSI connector provides an output voltage between 0 and 3.28 VDC that is proportional to the received radio signal strength. The higher the voltage reading, the stronger the signal. The radio signal from the remote antenna can be seen to have a strong central main lobe and smaller side lobes. The object of the alignment process is to set the antenna so that it is receiving the strongest signal from the central main lobe.
3 Hardware Installation 2. Pan the antenna horizontally back and forth by rotating the mounting bracket around the pole while checking the RSSI voltage. 3. Find the point where the signal is strongest (highest voltage) and secure the mounting bracket firmly to the pole. Note: Sometimes there may not be a central lobe peak in the voltage because vertical alignment is too far off; only two similar peaks for the side lobes are detected. In this case, fix the antenna halfway between the two peaks. 4.
Chapter 4: Initial Configuration The wireless bridge offers a variety of management options, including a web-based interface, a command line interface (CLI), or using SNMP management software. Most initial configuration steps can be made through the web browser interface using the Setup Wizard (page 4-3). However, for units that do not have a preset country code, you must first set the country code using the CLI. Note: Units sold in some countries are not configured with a specific country code.
4 Initial Configuration Initial Configuration Steps Setting the Country Code – Regulations for wireless products differ from country to country. Setting the country code restricts the wireless bridge to use only the radio channels and power settings permitted in the specified country of operation. If the wireless bridge unit is shipped with a preset country code, you are not permitted to change it, as required by country regulations.
Using the Web-based Management Setup Wizard 4 Using the Web-based Management Setup Wizard There are only a few basic steps you need to complete to set up the wireless bridge for your network. The Setup Wizard takes you through configuration procedures for the radio channel selection, IP configuration, and basic WEP encryption for wireless security. The wireless bridge can be managed by any computer using a web browser (Internet Explorer 5.0 or above, or Netscape Navigator 6.2 or above).
4 Initial Configuration Launching the Setup Wizard – To perform initial configuration, click Setup Wizard on the home page, then click on the [Next] button to start the process.
Using the Web-based Management Setup Wizard 1. 4 Radio Channel – You must enable radio communications for the 802.11a radio and set the operating channel. • 802.11a Turbo Mode – If you select Enable, the wireless bridge will operate in turbo mode with a data rate of up to 108 Mbps. Normal mode supports 13 channels, Turbo mode supports only 5 channels. (Default: Disable) 802.11a Radio Channel – Set the operating radio channel number. (Default: 56ch, 5.
4 2. Initial Configuration IP Configuration – Either enable or disable (Dynamic Host Configuration Protocol (DHCP) for automatic IP configuration. If you disable DHCP, then manually enter the IP address and subnet mask. If a management station exists on another network segment, then you must enter the IP address for a gateway that can route traffic between these segments.
Using the Web-based Management Setup Wizard 3. Security – Enable Wired Equivalent Privacy (WEP) encryption and set an encryption key. 4. Click Finish. 5. Click the OK button to restart the access point.
4 4-8 Initial Configuration
Chapter 5: System Configuration Before continuing with advanced configuration, first complete the initial configuration steps described in Chapter 4 to set up an IP address for the wireless bridge. The wireless bridge can be managed by any computer using a web browser (Internet Explorer 5.0 or above, or Netscape Navigator 6.2 or above). Enter the default IP address: http://192.168.1.1 To log into the wireless bridge, enter the default user name “admin” and click LOGIN (there is no default password).
5 System Configuration Menu Description Page Filter Control Enables VLAN support and filters traffic matching specific Ethernet protocol types 5-6 SNMP Controls access to this wireless bridge from management stations using SNMP, as well as the hosts that will receive trap messages 5-7 Administration Configures user name and password for management access; upgrades software from local file, FTP or TFTP server; resets configuration settings to factory defaults; and resets the wireless bridge 5-10
5 Advanced Configuration System Name – An alias for the wireless bridge, enabling the device to be uniquely identified on the network. (Default: Outdoor Bridge; Range: 1-22 characters) Location – A text string that describes the system location. (Maximum length: 20 characters) Contact – A text string that describes the system contact. (Maximum length: 255 characters) CLI Commands for System Identification – Enter the global configuration mode and use the system name command to specify a new system name.
5 System Configuration By default, the wireless bridge will be automatically configured with IP settings from a Dynamic Host Configuration Protocol (DHCP) server. However, if you are not using a DHCP server to configure IP addressing, use the CLI to manually configure the initial IP values (page 4-2). After you have network access to the wireless bridge, you can use the web browser interface to modify the initial IP configuration, if needed.
5 Advanced Configuration If you have management stations, DNS, or other network servers located on another subnet, type the IP address of the default gateway router in the text field provided. Otherwise, leave the address as all zeros (0.0.0.0). • Primary and Secondary DNS Address: The IP address of Domain Name Servers on the network. A DNS maps numerical IP addresses to domain names and can be used to identify network hosts by familiar names instead of the IP addresses.
5 System Configuration Filter Control The wireless bridge can employ VLAN tagging support and network traffic frame filtering to control access to network resources and increase security. Native VLAN ID – The VLAN ID used to tag traffic passing from the wireless interface to the wired network. (Range: 1-64) VLAN – Enables or disables VLAN tagging support on the wireless bridge (changing the VLAN status forces a system reboot).
5 Advanced Configuration CLI Commands for VLAN Support – From the global configuration mode use the native-vlanid command to set the default VLAN ID for the Ethernet interface, then enable VLANs using the vlan enable command. When you change the access point’s VLAN support setting, you must reboot the access point to implement the change. To view the current VLAN settings, use the show system command.
5 System Configuration SNMP – Enables or disables SNMP management access and also enables the wireless bridge to send SNMP traps (notifications). SNMP management is enabled by default. Community Name (Read Only) – Defines the SNMP community access string that has read-only access. Authorized management stations are only able to retrieve MIB objects.
5 Advanced Configuration CLI Commands for SNMP – Use the snmp-server enable server command from the global configuration mode to enable SNMP. To set read/write and read-only community names, use the snmp-server community command. The snmp-server host command defines a trap receiver host. To view the current SNMP settings, use the show snmp command.
5 System Configuration Administration Changing the Password Management access to the web and CLI interface on the wireless bridge is controlled through a single user name and password. You can also gain additional access security by using control filters (see “Filter Control” on page 5-6). To protect access to the management interface, you need to configure an Administrator’s user name and password as soon as possible.
Advanced Configuration 5 Upgrading Firmware You can upgrade new wireless bridge software from a local file on the management workstation, or from an FTP or TFTP server. After upgrading new software, you must reboot the wireless bridge to implement the new code. Until a reboot occurs, the wireless bridge will continue to run the software it was using before the upgrade started. Also note that rebooting the wireless bridge with new software will reset the configuration to the factory default settings.
5 System Configuration Firmware Upgrade Local – Downloads an operation code image file from the web management station to the wireless bridge using HTTP. Use the Browse button to locate the image file locally on the management station and click Start Upgrade to proceed. • New firmware file: Specifies the name of the code file on the server. The new firmware file name should not contain slashes (\ or /), the leading letter of the file name should not be a period (.
5 Advanced Configuration be used to check that the new file is present in the wireless bridge file system. To run the new software, use the reset board command to reboot the wireless bridge. Outdoor Bridge#copy tftp file 1. Application image 2. Config file 3. Boot block image Select the type of download<1,2,3>: [1]:1 TFTP Source file name:bridge-img.bin TFTP Server IP:192.168.1.19 6-28 Outdoor Bridge#dir File Name -------------------------dflt-img.bin bridge-img.
5 System Configuration Enabling System Logging The wireless bridge supports a logging process that can control error messages saved to memory or sent to a Syslog server. The logged messages serve as a valuable tool for isolating wireless bridge and network problems. System Log Setup – Enables the logging of error messages. Logging Host – Enables the sending of log messages to a Syslog server host. Server Name/IP – The IP address or name of a Syslog server.
5 Advanced Configuration command to set the facility-type number to use on the Syslog server. To view the current logging settings, use the show logging command. Outdoor Outdoor Outdoor Outdoor Outdoor Outdoor Outdoor Bridge(config)#logging Bridge(config)#logging Bridge(config)#logging Bridge(config)#logging Bridge(config)#logging Bridge(config)#exit Bridge#show logging on level alert console host 1 10.1.0.
5 System Configuration indicate the number of hours your time zone is located before (east) or after (west) UTC. Enable Daylight Saving – The wireless bridge provides a way to automatically adjust the system clock for Daylight Savings Time changes. To use this feature you must define the month and date to begin and to end the change from standard time. During this period the system clock is set back by one hour.
Advanced Configuration 5 Wireless Distribution System (WDS) The IEEE 802.11a standard defines a WIreless Distribution System (WDS) for connections between wireless bridges. The outdoor wireless bridge uses WDS to forward traffic on links between units. When using WDS, only wireless bridge units can associate to each other. A wireless client cannot associate with any unit in a wireless bridge network.
5 System Configuration MAC Address – The physical layer address of the wireless bridge unit at the other end of the wireless link. (12 hexadecimal digits in the form “xx:xx:xx:xx:xx:xx”) Port Status – Enables or disables the wireless bridge link. Note: The wireless MAC address for each bridge unit is printed on the label on the back of the unit.
Advanced Configuration 5 Bridge Aging Time – Changes the aging time for entries in the dynamic address table: • Ethernet: The time after which a learned Ethernet port entry is discarded. (Range: 60-1800 seconds; Default: 100 seconds) • Wireless 802.11a: The time after which a learned wireless entry is discarded.
5 System Configuration CLI Commands for Bridging – The following example shows how to set the MAC address aging time for the wireless bridge.
5 Advanced Configuration Spanning Tree Protocol (STP) The Spanning Tree Protocol (STP) can be used to detect and disable network loops, and to provide backup links between switches, bridges or routers. This allows the wireless bridge to interact with other bridging devices (that is, an STP-compliant switch, bridge or router) in your network to ensure that only one route exists between any two stations on the network, and provide backup links which automatically take over when a primary link goes down.
5 System Configuration Forward Delay – The maximum time (in seconds) this device waits before changing states (i.e., discarding to learning to forwarding). This delay is required because every device must receive information about topology changes before it starts to forward frames. In addition, each port needs time to listen for conflicting information that would make it return to a discarding state; otherwise, temporary data loops might result.
Advanced Configuration 5 Priority – Defines the priority used for this port in the Spanning Tree Protocol. If the path cost for all ports on a switch are the same, the port with the highest priority (i.e., lowest value) will be configured as an active link in the spanning tree. This makes a port with higher priority less likely to be blocked if the Spanning Tree Protocol is detecting network loops.
5 System Configuration CLI Commands for STP – The following example configures spanning tree paramters for the bridge and wireless port 5.
5 Radio Interface Radio Interface The IEEE 802.11a radio interface includes configuration options for radio signal characteristics and wireless security features. Note: The radio channel settings for the wireless bridge are limited by local regulations, which determine the number of channels that are available. Radio Settings (802.11a) The IEEE 802.11a interface operates within the 5 GHz band, at up to 54 Mbps in normal mode or up to 108 Mbps in Turbo mode.
5 System Configuration Note: In normal mode, the wireless bridge provides a channel bandwidth of 20 MHz, and supports the maximum number of channels permitted by local regulations (e.g., 11 channels for the United States). In Turbo Mode, the channel bandwidth is increased to 40 MHz to support the increased data rate. However, this reduces the number of channels supported (e.g., 5 channels for the United States).
5 Radio Interface the wireless bridge will save all broadcast/multicast frames for the Basic Service Set (BSS) and forward them after every second beacon. Using smaller DTIM intervals delivers broadcast/multicast frames in a more timely manner, causing stations in Power Save mode to wake up more often and drain power faster. Using higher DTIM values reduces the power used by stations in Power Save mode, but delays the transmission of broadcast/multicast frames.
5 System Configuration Outdoor Bridge#show interface wireless a 6-57 Wireless Interface 802.11a Information ========================================================== ----------------Identification---------------------------Description : 802.11a wireless bridge Turbo Mode : ON Channel : 42 (AUTO) Status : Enable ----------------802.
5 Radio Interface Setting up IEEE 802.11 Wired Equivalent Privacy (WEP) shared keys enables the wireless bridge to prevent unauthorized access to the network. Be sure to define at least one static WEP key for data encryption. Also, be sure that the WEP keys are the same for all bridge units in the wireless network. Data Encryption Setup – Enable or disable the wireless bridge to use either WEP or AES for data encryption.
5 System Configuration Advanced Encryption Standard (AES) AES has been designated by the National Institute of Standards and Technology as the successor to the Data Encryption Standard (DES) encryption algorithm, and will be used by the U.S. government for encrypting all sensitive, nonclassified information. Because of its strength, and resistance to attack, AES is also being incorporated as part of the 802.11 security standard.
5 Radio Interface • Alphanumeric: Enter keys as an alphanumeric string using between 8 and 31 characters. Note: For each wireless port link (1 to 16), the AES keys must match on the corresponding bridge unit. CLI Commands for WEP Security – From the 802.11a interface configuration mode, use the encryption command to enable WEP encryption. To enter WEP keys, use the key command, and then set one key as the transmit key using the transmit-key command.
5 System Configuration CLI Commands for AES Security – From the 802.11a interface configuration mode, use the encryption command to enable AES encryption. To enter AES keys, use the key command. To view the current security settings, use the show interface wireless a command. Outdoor Bridge(config)#interface wireless a Enter Wireless configuration commands, one per line.
Status Information 5 Status Information The Status page includes information on the following items: Menu Description Page AP Status Displays configuration settings for the basic system and the wireless interface 5-33 Station Status Shows remote wireless bridges currently associated with the local wireless bridge 5-35 Event Logs Shows log messages stored in memory 5-36 Wireless Bridge Status The AP Status window displays basic system configuration settings, as well as the settings for the wire
5 System Configuration • IP Default Gateway: IP address of the gateway router between this device and management stations that exist on other network segments. • HTTP Server: Shows if management access via HTTP is enabled. • HTTP Server Port: Shows the TCP port used by the HTTP interface. • Version: Shows the version number for the runtime code. AP Wireless Configuration – The AP Wireless Configuration table displays the wireless interface settings listed below. Note that Radio A refers to the 802.
Status Information 5 Station Status The Station Status window shows remote wireless bridges currently associated with the local wireless bridge. The Station Status page displays basic connection information for each wireless bridge link. Note that this page is automatically refreshed every five seconds. • Station Address: The MAC address of the remote wireless bridge. • Authenticated: Shows if the remote wireless bridge has been authenticated. The two basic methods of authentication supported for 802.
5 System Configuration Event Logs The Event Logs window shows the log messages generated by the wireless bridge and stored in memory. The Event Logs table displays the following information: • Log Time: The time the log message was generated. • Event Level: The logging level associated with this message. For a description of the various levels, see “logging level” on page 5-13. • Event Message: The content of the log message.
Chapter 6: Command Line Interface Using the Command Line Interface Accessing the CLI When accessing the management interface for the wireless bridge via a Telnet connection, the wireless bridge can be managed by entering command keywords and parameters at the prompt. Using the wireless bridge’s command-line interface (CLI) is very similar to entering commands on a UNIX system. Telnet Connection Telnet operates over the IP transport protocol.
6 Command Line Interface Entering Commands This section describes how to enter CLI commands. Keywords and Arguments A CLI command is a series of keywords and arguments. Keywords identify a command, and arguments specify configuration parameters. For example, in the command “show interface ethernet,” show and interface are keywords, and ethernet is an argument that specifies the interface type. You can enter commands as follows: • To enter a simple command, enter the command keyword.
Entering Commands 6 Interface). You can also display a list of valid keywords for a specific command.
6 Command Line Interface Understanding Command Modes The command set is divided into Exec and Configuration classes. Exec commands generally display information on system status or clear statistical counters. Configuration commands, on the other hand, modify interface parameters or enable certain functions. These classes are further divided into different modes. Available commands depend on the selected mode.
Entering Commands 6 change to “Outdoor Bridge(if-ethernet)#,” or “Outdoor Bridge(if-wireless a)” indicating that you have access privileges to the associated commands. You can use the end command to return to the Exec mode. Outdoor Bridge(config)#interface ethernet Outdoor Bridge(if-ethernet)# Command Line Processing Commands are not case sensitive.
6 Command Line Interface Command Groups The system commands can be broken down into the functional groups shown below.
General Commands 6 configure This command activates Global Configuration mode. You must enter this mode to modify most of the settings on the wireless bridge. You must also enter Global Configuration mode prior to enabling the context modes for Interface Configuration. See “Using the Command Line Interface” on page 1. Default Setting None Command Mode Exec Example Outdoor Bridge#configure Outdoor Bridge(config)# Related Commands end (6-7) end This command returns to the previous configuration mode.
6 Command Line Interface Example This example shows how to return to the Exec mode from the Interface Configuration mode, and then quit the CLI session: Outdoor Bridge(if-ethernet)#exit Outdoor Bridge#exit CLI session with the wireless bridge is now closed Username: ping This command sends ICMP echo request packets to another node on the network. Syntax ping • host_name - Alias of the host. • ip_address - IP address of the host.
General Commands 6 reset This command restarts the system or restores the factory default settings. Syntax reset • board - Reboots the system. • configuration - Resets the configuration settings to the factory defaults, and then reboots the system. Default Setting None Command Mode Exec Command Usage When the system is restarted, it will always run the Power-On Self-Test.
6 Command Line Interface show line This command displays the console port’s configuration settings. Command Mode Exec Example The console port settings are fixed at the values shown below.
6 System Management Commands country This command configures the wireless bridge’s country code, which identifies the country of operation and sets the authorized radio channels. Syntax country country_code - A two character code that identifies the country of operation. See the following table for a full list of codes.
6 Command Line Interface Default Setting US - for units sold in the United States 99 (no country set) - for units sold in other countries Command Mode Exec Command Usage • If you purchased an wireless bridge outside of the United States, the country code must be set before radio functions are enabled. • The available Country Code settings can be displayed by using the country ? command. Example Outdoor Bridge#country us Outdoor Bridge# prompt This command customizes the CLI prompt.
System Management Commands 6 Default Setting Outdoor Bridge Command Mode Global Configuration Example Outdoor Bridge(config)#system name bridge-link Outdoor Bridge(config)# username This command configures the user name for management access. Syntax username name name - The name of the user.
6 Command Line Interface Example Outdoor Bridge(config)#password bridgelink Outdoor Bridge(config)# ip http port This command specifies the TCP port number used by the web browser interface. Use the no form to use the default port. Syntax ip http port port-number no ip http port port-number - The TCP port to be used by the browser interface.
System Management Commands 6 Related Commands ip http port (6-14) show system This command displays basic system configuration settings.
6 Command Line Interface System Logging Commands These commands are used to configure system logging on the wireless bridge.
6 System Logging Commands logging host This command specifies a syslog server host that will receive logging messages. Use the no form to remove syslog server host. Syntax logging host no logging host • host_name - The name of a syslog server. (Range: 1-20 characters) • host_ip_address - The IP address of a syslog server. Default Setting None Command Mode Global Configuration Example Outdoor Bridge(config)#logging host 10.1.0.
6 Command Line Interface logging level This command sets the minimum severity level for event logging. Syntax logging level Default Setting Error Command Mode Global Configuration Command Usage Messages sent include the selected level down to the Emergency level. Level Argument Description Emergency System unusable Alert Immediate action needed Critical Critical conditions (e.g.
6 System Clock Commands Command Usage The command specifies the facility type tag sent in syslog messages. (See RFC 3164.) This type has no effect on the kind of messages reported by the wireless bridge. However, it may be used by the syslog server to sort messages or to store messages in the corresponding database. Example Outdoor Bridge(config)#logging facility 19 Outdoor Bridge(config)# show logging This command displays the logging configuration.
6 Command Line Interface sntp-server ip This command sets the IP address of the servers to which SNTP time requests are issued. Use the this command with no arguments to clear all time servers from the current list. Syntax sntp-server ip <1 | 2> • 1 - First time server. • 2 - Second time server. • ip - IP address of an time server (NTP or SNTP). Default Setting 137.92.140.80 192.43.244.
6 System Clock Commands Command Usage The time acquired from time servers is used to record accurate dates and times for log events. Without SNTP, the wireless bridge only records the time starting from the factory default set at the last bootup (i.e., 00:14:00, January 1, 1970). Example Outdoor Bridge(config)#sntp-server enable Outdoor Bridge(config)# Related Commands sntp-server ip (6-20) show sntp (6-22) sntp-server date-time This command sets the system clock.
6 Command Line Interface Command Mode Global Configuration Command Usage The command sets the system clock back one hour during the specified period. Example This sets daylight savings time to be used from July 1st to September 1st.
6 SNMP Commands Example Outdoor Bridge#show sntp SNTP Information ========================================================= Service State : Enabled SNTP (server 1) IP : 137.92.140.80 SNTP (server 2) IP : 192.43.244.
6 Command Line Interface Default Setting • public - Read-only access. Authorized management stations are only able to retrieve MIB objects. • private - Read/write access. Authorized management stations are able to both retrieve and modify MIB objects. Command Mode Global Configuration Command Usage If you enter a community string without the ro or rw option, the default is read only.
SNMP Commands 6 snmp-server enable server This command enables SNMP management access and also enables this device to send SNMP traps (i.e., notifications). Use the no form to disable SNMP service and trap messages. Syntax snmp-server enable server no snmp-server enable server Default Setting Enabled Command Mode Global Configuration Command Usage • This command enables both authentication failure notifications and link-up-down notifications.
6 Command Line Interface Command Mode Global Configuration Command Usage The snmp-server host command is used in conjunction with the snmp-server enable server command to enable SNMP notifications. Example Outdoor Bridge(config)#snmp-server host 10.1.19.23 batman Outdoor Bridge(config)# Related Commands snmp-server enable server (6-25) snmp-server location This command sets the system location string. Use the no form to remove the location string.
6 Flash/File Commands Example Outdoor Bridge#show snmp SNMP Information ============================================ Service State : Enable Community (ro) : ***** Community (rw) : ***** Location : WC-19 Contact : Paul Traps : Enabled Host Name/IP : 10.1.19.23 Trap Community : ***** ============================================= Outdoor Bridge# Flash/File Commands These commands are used to manage the system code or configuration files.
6 Command Line Interface Example Outdoor Bridge#bootfile bridge-img.bin Outdoor Bridge# copy This command copies a boot file, code image, or configuration file between the wireless bridge’s flash memory and a FTP/TFTP server. When you save the configuration settings to a file on a FTP/TFTP server, that file can later be downloaded to the wireless bridge to restore system operation.
6 Flash/File Commands Example The following example shows how to upload the configuration settings to a file on the TFTP server: Outdoor Bridge#copy config tftp TFTP Source file name:syscfg TFTP Server IP:192.168.1.19 Outdoor Bridge# The following example shows how to download a configuration file: Outdoor Bridge#copy tftp file 1. Application image 2. Config file 3. Boot block image Select the type of download<1,2,3>: TFTP Source file name:syscfg TFTP Server IP:192.168.1.
6 Command Line Interface dir This command displays a list of files in flash memory. Command Mode Exec Command Usage File information is shown below: Column Heading Description File Name The name of the file. Type (2) Operation Code and (5) Configuration file File Size The length of the file in bytes. Example The following example shows how to display all file information: Outdoor Bridge#dir zz-img.bin dflt-img.
WDS Commands 6 wds mac-address This command enters wireless MAC addresses in the WDS forwarding table for each node in the wireless bridge network. Syntax wds mac-address • port-id - The wireless port number for the bridge link. (1 for Slave units; 1-16 for Master units) • mac-address - The wireless MAC address of the remote bridge unit for this link.
6 Command Line Interface show wds This command displays the current entries in the WDS forwarding table.
Bridge Commands 6 Bridge Commands The commands described in this section are used to set the MAC address table aging time and spanning tree parameters for both the Ethernet and wireless interfaces.
6 Command Line Interface bridge stp-bridge spanning-tree Use this command to enable the Spanning Tree Protocol globally for the wireless bridge. Use the no form to disable it. Syntax bridge stp-bridge spanning-tree no bridge stp-bridge spanning-tree Default Setting Spanning tree is enabled. Command Mode Global Configuration Command Usage The Spanning Tree Protocol (STP) can be used to detect and disable network loops, and to provide backup links between switches, bridges or routers.
Bridge Commands 6 Command Usage This command sets the maximum time (in seconds) the root device will wait before changing states (i.e., discarding to learning to forwarding). This delay is required because every device must receive information about topology changes before it starts to forward frames. In addition, each port needs time to listen for conflicting information that would make it return to the discarding state; otherwise, temporary data loops might result.
6 Command Line Interface Default Setting 20 seconds Command Mode Global Configuration Command Usage This command sets the maximum time (in seconds) a device can wait without receiving a configuration message before attempting to reconfigure. All device ports (except for designated ports) should receive configuration messages at regular intervals. Any port that ages out STP information (provided in the last configuration message) becomes the designated port for the attached LAN.
6 Bridge Commands bridge stp-port path-cost Use this command to configure the spanning tree path cost for the specified port. Use the no form to restore the default for the specified port. Syntax bridge stp-port path-cost cost no bridge stp-port path-cost • port - Specifies the port number on the wireless bridge. (Range: 0, Ethernet interface; 1-16 wireless interface) • cost - The path cost for the port.
6 Command Line Interface Command Usage • This command defines the priority for the use of a port in the Spanning Tree Protocol. If the path cost for all ports on a wireless bridge are the same, the port with the highest priority (that is, lowest value) will be configured as an active link in the spanning tree. • Where more than one port is assigned the highest priority, the port with lowest numeric identifier will be enabled.
Bridge Commands 6 bridge stp-port spanning-disabled This command disables the Spanning Tree Protocol for the specified interface. Use the no form to reenable the Spanning Tree Protocol for the specified interface. Syntax bridge stp-port spanning-disabled no bridge stp-port spanning-disabled port - Specifies the port number on the wireless bridge.
6 Command Line Interface Example Outdoor Bridge#show bridge Bridge Information ================================================= Media Type | Age Time(sec)| ================================================= EtherNet | 300 | WLAN_A | 1000 | ================================================== Bridge Id : 32768.037fbef192 Root Bridge Id : 32768.
Filtering Commands 6 Command Mode Global Configuration Example Outdoor Bridge(config)#filter ap-manage Outdoor Bridge(config)# filter ethernet-type enable This command checks the Ethernet type on all incoming and outgoing Ethernet packets against the protocol filtering table. Use the no form to disable this feature.
6 Command Line Interface Command Mode Global Configuration Command Usage Use the filter ethernet-type enable command to enable filtering for Ethernet types specified in the filtering table, or the no filter ethernet-type enable command to disable all filtering based on the filtering table.
6 Ethernet Interface Commands Ethernet Interface Commands The commands described in this section configure connection parameters for the Ethernet interface.
6 Command Line Interface Command Mode Global Configuration Command Usage The primary and secondary name servers are queried in sequence. Example This example specifies two domain-name servers. Outdoor Bridge(if-ethernet)#dns primary-server 192.168.1.55 Outdoor Bridge(if-ethernet)#dns secondary-server 10.1.0.55 Outdoor Bridge(if-ethernet)# Related Commands show interface ethernet (6-46) ip address This command sets the IP address for the (10/100Base-TX) Ethernet interface.
Ethernet Interface Commands 6 Example Outdoor Bridge(config)#interface ethernet Enter Ethernet configuration commands, one per line. Outdoor Bridge(if-ethernet)#ip address 192.168.1.2 255.255.255.0 192.168.1.253 Outdoor Bridge(if-ethernet)# Related Commands ip dhcp (6-45) ip dhcp This command sets the IP address for the currently selected VLAN interface. Use the no form to restore the default IP address.
6 Command Line Interface shutdown This command disables the Ethernet interface. To restart a disabled interface, use the no form. Syntax shutdown no shutdown Default Setting Interface enabled Command Mode Interface Configuration (Ethernet) Command Usage This command allows you to disable the Ethernet port due to abnormal behavior (e.g., excessive collisions), and reenable it after the problem has been resolved. You may also want to disable the Ethernet port for security reasons.
6 Wireless Interface Commands Example Outdoor Bridge#show interface ethernet Ethernet Interface Information ======================================== IP Address : 192.168.1.1 Subnet Mask : 255.255.255.0 Default Gateway : 192.168.1.253 Primary DNS : 192.168.1.55 Secondary DNS : 10.1.0.
6 Command Line Interface interface wireless This command enters wireless interface configuration mode. Syntax interface wireless a a - 802.11a radio interface. Default Setting None Command Mode Global Configuration Example To specify the wireless interface, enter the following command: Outdoor Bridge(config)#interface wireless a Outdoor Bridge(if-wireless a)# description This command adds a description to a the wireless interface. Use the no form to remove the description.
Wireless Interface Commands 6 speed This command configures the maximum data rate at which remote bridges can connect to the local bridge. Syntax speed speed - Maximum access speed allowed for remote bridges. (Options: 6, 9, 12, 18, 24, 36, 48, 54 Mbps) Default Setting 54 Mbps Command Mode Interface Configuration (Wireless) Command Usage The maximum transmission distance is affected by the data rate. The lower the data rate, the longer the transmission distance.
6 Command Line Interface Example Outdoor Bridge(if-wireless a)#channel 36 Outdoor Bridge(if-wireless a)# turbo This command sets the wireless bridge to an enhanced mode (not regulated in IEEE 802.11a) that provides a higher data rate of up to 108 Mbps. Default Setting Disabled Command Mode Interface Configuration (Wireless - 802.11a) Command Usage • The normal 802.11a wireless operation mode provides connections up to 54 Mbps. Turbo Mode is an enhanced mode (not regulated in IEEE 802.
6 Wireless Interface Commands Command Usage The beacon signals allow remote bridges to maintain contact with the local wireless bridge. They may also carry power-management information. Example Outdoor Bridge(if-wireless a)#beacon-interval 150 Outdoor Bridge(if-wireless a)# dtim-period This command configures the rate at which remote bridges in sleep mode must wake up to receive broadcast/multicast transmissions.
6 Command Line Interface fragmentation-length This command configures the minimum packet size that can be fragmented when passing through the wireless bridge. Syntax fragmentation-length length - Minimum packet size for which fragmentation is allowed. (Range: 256-2346 bytes) Default Setting 2346 Command Mode Interface Configuration (Wireless) Command Usage • If the packet size is smaller than the preset Fragment size, the packet will not be segmented.
Wireless Interface Commands 6 Command Usage • If the threshold is set to 0, the wireless bridge never sends RTS signals. If set to 2347, the wireless bridge always sends RTS signals. If set to any other value, and the packet size equals or exceeds the RTS threshold, the RTS/CTS (Request to Send / Clear to Send) mechanism will be enabled. • The wireless bridge sends RTS frames to a receiving remote bridge to negotiate the sending of a data frame.
6 Command Line Interface • • • • • encrypting all sensitive, nonclassified information. Because of its strength, and resistance to attack, AES is also being incorporated as part of the 802.11 standard. The WEP settings must be the same on all bridges in your wireless network. The WEP encryption length specified in the encryption command and the key command must match. The AES keys must match for each wireless bridge link pair.
Wireless Interface Commands 6 Command Usage • To enable WEP encryption, use the encryption command to specify the key type and length, and use the key command to configure at least one key. • To enable AES encryption, use the encryption command to specify the key type, and use the key command to configure a key for each wireless port. • If WEP is enabled, all units in the wireless bridge network must be configured with the same keys.
6 Command Line Interface Example Outdoor Bridge(if-wireless a)#transmit-key 2 Outdoor Bridge(if-wireless a)# transmit-power This command adjusts the power of the radio signals transmitted from the wireless bridge. Syntax transmit-power signal-strength - Signal strength transmitted from the wireless bridge. (Options: full, half, quarter, eighth, min) Actual transmit power depends on the antenna, radio channel, and transmit data rate.
Wireless Interface Commands 6 Example Outdoor Bridge(if-wireless a)#shutdown Outdoor Bridge(if-wireless a)# show interface wireless This command displays the status for the wireless interface. Syntax show interface wireless a • a - 802.11a radio interface. Command Mode Exec Example Outdoor Bridge#show interface wireless a Wireless Interface Information ========================================================= ----------------Identification----------------------------Description : Enterprise 802.
6 Command Line Interface VLAN Commands The wireless bridge can enable the support of VLAN-tagged traffic passing between the wireless interface and the wired network. When VLAN support is enabled, the wireless bridge tags traffic passing to the wired network with the assigned native VLAN ID (a number between 1 and 64). Traffic received from the wired network must also be tagged with the same VLAN ID. Received traffic that has an unknown VLAN ID or no VLAN tag is dropped.
VLAN Commands 6 Example Outdoor Bridge(config)#vlan enable Reboot system now? : y Related Commands native-vlanid (6-59) native-vlanid This command configures the native VLAN ID for the wireless bridge. Syntax native-vlanid vlan-id - Native VLAN ID. (Range: 1-64) Default Setting 1 Command Mode Global Configuration Command Usage When VLANs are enabled, the wireless bridge tags traffic passing to the wired network with the configured native VLAN ID (a number between 1 and 64).
6 6-60 Command Line Interface
Appendix A: Troubleshooting Check the following items before you contact local Technical Support. 1. If wireless bridge units do not associate with each other, check the following: • Check the power injector LED for each bridge unit to be sure that power is being supplied • Be sure that antennas in the link are properly aligned. • Be sure that channel settings match on all bridges • If encryption is enabled, ensure that all bridge links are configured with the same encryption keys. 2.
A 5. Troubleshooting If you forgot or lost the password: • Contact Technical Support.
Appendix B: Specifications General Specifications Maximum Channels 802.11a: US & Canada: 8 (normal mode), 3 (turbo mode) Japan: 4 (normal mode), 1 (turbo mode) ETSI: 11 channels (normal mode), 4 (turbo mode) China: 5 (normal mode), 2(turbo mode) Data Rate 802.11a: Normal Mode: 6, 9, 12, 18, 24, 36, 48, 54 Mbps per channel Turbo Mode: 12, 18, 24, 36, 48, 72, 96, 108 Mbps per channel Modulation Type 802.
B Specifications Humidity 15% to 95% (non-condensing) EMC Compliance (Class A) FCC Class A (US) Radio Signal Certification FCC part 15 15.407(b) Safety CSA/NTRL (CSA 22.2 No. 950 & UL 1950) Standards IEEE 802.3 10BASE-T, IEEE 802.3u 100BASE-TX, IEEE 802.
Appendix C: Cables and Pinouts Twisted-Pair Cable Assignments For 10/100BASE-TX connections, a twisted-pair cable must have two pairs of wires. Each wire pair is identified by two different colors. For example, one wire might be green and the other, green with white stripes. Also, an RJ-45 connector must be attached to both ends of the cable. Caution: Each wire pair must be attached to the RJ-45 connectors in a specific orientation.
C Cables and Pinouts connecting to devices that support automatic MDI/MDI-X pinout configuration, you can use either straight-through or crossover cable.
8-Pin DIN Connector Pinout C connecting supports automatic MDI/MDI-X operation, you can use either “straight-through” or “crossover” cable. EIA/TIA 568B RJ-45 Wiring Standard 10/100BASE-TX Crossover Cable White/Orange Stripe Orange End A White/Green Stripe 1 2 3 4 5 6 7 8 1 2 3 4 5 6 7 8 Blue White/Blue Stripe Green White/Brown Stripe End B Brown 8-Pin DIN Connector Pinout The Ethernet cable from the power injector connects to an 8-pin DIN connector on the wireless bridge.
C Cables and Pinouts 8-Pin DIN to RJ-45 Cable Wiring To construct an extended Ethernet cable to connect from the power injector’s RJ-45 Output port to the wireless bridge’s 8-pin DIN connector, follow the wiring diagram below. Use Category 5 or better UTP or STP cable, maximum length 100 m (328 ft), and be sure to connect all four wire pairs. Note: To construct a reliable Ethernet cable, always use the proper tools or ask a professional cable supplier to construct the cable.
Glossary 10BASE-T IEEE 802.3 specification for 10 Mbps Ethernet over two pairs of Category 3 or better UTP cable. 100BASE-TX IEEE 802.3u specification for 100 Mbps Fast Ethernet over two pairs of Category 5 or better UTP cable. Access Point An internetworking device that seamlessly connects wired and wireless networks. Access points attached to a wired network, support the creation of multiple radio cells that enable roaming throughout a facility.
Glossary Encryption Data passing between the access point and clients can use encryption to protect from interception and evesdropping. Ethernet A popular local area data communications network, which accepts transmission from computers and terminals. File Transfer Protocol (FTP) A TCP/IP protocol used for file transfer. Hypertext Transfer Protocol (HTTP) HTTP is a standard used to transmit and receive all data over the World Wide Web. IEEE 802.
Glossary Service Set Identifier (SSID) An identifier that is attached to packets sent over the wireless LAN and functions as a password for joining a particular radio cell; i.e., Basic Service Set (BSS). Session Key Session keys are unique to each client, and are used to authenticate a client connection, and correlate traffic passing between a specific client and the access point. Shared Key A shared key can be used to authenticate each client attached to a wireless network.
Index A E AES, configuring 5-28, 5-30, 6-53 encryption 5-28, 6-53 Ethernet port 1-3 event logs 5-36, 6-19 B beacon interval 5-26, 6-50 rate 5-26, 6-51 BPDU 5-21 C cable assignments C-1 crossover C-2 straight-through C-2 channel 5-26, 6-49 channels, maximum B-1 Clear To Send See CTS CLI 6-1 command modes 6-4 command line interface See CLI community name, configuring 5-7, 6-23 community string 5-8, 6-23 configuration settings, saving or restoring 5-12, 6-28 configuration, initial setup 4-1 country code,
Index M maximum data rate 5-26, 6-49 802.11a interface 5-26, 6-49 MDI, RJ-45 pin configuration 1-3 O OFDM 1-1 operating frequency B-1 P package checklist 1-1 password configuring 5-10, 6-13 management 5-10, 6-13 PoE 1-3, 3-5 specifications B-1 port priority, STP 6-37 Power over Ethernet See PoE power supply, specifications B-1 R radio channel 802.
Index W WEP 5-28, 6-53 configuring 5-28, 6-53 shared key 5-29, 6-54 Wired Equivalent Protection See WEP Index-3
Index Index-4
WB2011 E102004-R01