WBS-2400 and WBS-2400-SCT User Manual SW version 4.
Copyright Notice ©2006, 2007, 2008, 2009 Wavion, Inc. All rights reserved. Wavion is a registered trademark of Wavion in the United States and certain other jurisdictions. Specifications are subject to change without notice. FCC Notice to Users and Operators This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to Part 15 of the FCC Rules.
READ THIS FIRST! Important Safety Instructions CAUTION: The exclamation point within a triangle is intended to alert the user to the presence of important operating and maintenance (servicing) instructions in the literature accompanying the product.
CAUTION: There are no user-serviceable parts inside. All service must be performed by qualified personnel. CAUTION: The RJ45 connectors of your Wavion WBS-2400 may source DC power on pins 4,5 and 7,8. The IEEE 802.3 standards allow for pins 4,5 and 7,8 to be used for Power Over Ethernet. Some products may be incompatible with the Wavion Power Over Ethernet capability. If such problems occur, make sure that the unit is configured with the Power Over Ethernet capability set to Off (default setting).
About This Manual The following describes configuration of the WBS-2400 and WBS-2400-SCT. It is intended for use by network engineers and administrators charged with setting up and administering Wavion wireless networks. This manual contains the following: • Chapter 1: Viewing the System Status: Explains the Home page with its summary of the system status. • Chapter 2: Managing the System Configuration: Explains how to configure the system, upgrade the software version and install SDMA feature.
Contents Viewing the System Status .......................................................................... 10 Logging in........................................................................................................................... 10 Logging out ........................................................................................................................ 10 StartUp wizard ...............................................................................................................
Configuring WPA2 Security.....................................................................................75 Configuring RADIUS Server Parameters...............................................................75 VLAN Configuration ...........................................................................................................76 Tagging VLAN ...........................................................................................................76 Configuring VLAN ............................
Introduction Wavion is glad to have the opportunity to offer the WBS2400 family of products as the best wireless coverage solution for your project requirements. Wavion’s next-generation base stations, referred to as spatially adaptive WiFi Base Stations, are designed specifically to address shortcomings in current outdoor access points for rural and metro WiFi applications.
Figure 1.1: Shows the relationship between the WBS-2400 hardware modules. Figure 1.
Viewing the System Status Chapter 1 Viewing the System Status The Home page shows a summary of status data of the system. From within this page, you can quickly link from fields to other related pages for more information. Logging in The default IP address of the unit is IP: 192.168.1.1 and mask: 255.255.255.0. To log-in, type “admin” in the username field, and “admin” in the password field.
Viewing the System Status Figure 1.2 Quick Installation Guide Figure 1.3 IP Address Configuration You can skip the Wizard in this page by pressing the “Skip Wizard” button.
Viewing the System Status Figure 1.4 Automatic Channel Selection After pressing “Start” a channel scanning will be performed. The last page of the wizard is the ACS results. From this page starts the normal functionality of the GUI. Figure 1.5 Rev 4.
Viewing the System Status Viewing the Home Page To view the Home page • Click Home. The Summary Status page is displayed. Figure 1.6 Home: Summary Status Page The following fields appear on the Summary Status page: Table 1.
Viewing the System Status Table 1.1 Home: Summary Status Page Field Description System Identity Links to System Configuration page System Description Description of the device as written in MIB-II SysDescr OID System Up Time Total time since system was switched on or last reinitialized System Contact Administratively-assigned email address of system operator System Name Administratively-assigned name for this managed node; the node's fully-qualified domain name.
Managing the System Configuration Chapter 2 Managing the System Configuration The System Configuration page displays system identification parameters like, IP information, system location servers etc. The other system pages allow updating of the software version and system configuration, and a view of the system components. Viewing the System Configuration To view the System Configuration page • Click the System menu item. The System Configuration page displays. Figure 2.
Managing the System Configuration The following fields appear on the System Configuration page: Table- 2.
Managing the System Configuration This page contains basic static information on the system, such as contact details, and IP addresses. Several changes are recommended on this page. Setting System Contact Details In the System Identity area, in the System Contact field, enter the contact email address of the net owner. Setting the IP Address Configuration Change the IP address to allow the full configuration.
Managing the System Configuration 1. Applying the VLAN parameters (external VLAN ID and tagging mode) using the existing management traffic, and selecting the desired VLAN to be the Management VLAN on the Administration page. After this stage the current wire-line connection to the system GUI will drop. 2. Saving the parameters – using the new Management VLAN, i.e. over the tagged VLAN. To enable VLAN management 1.
Managing the System Configuration Saving Changes Note: After making changes on this page, you must click both Apply and Save, or the changes do not remain in effect after the next reboot. 1. Click Apply. 2. Click Save. Managing System and Software Configurations You can change the system startup configuration, upgrade the software version from the system software tabs and install the SDMA feature license.
Managing the System Configuration 1. Default Except IP – In this case, the unit will lose its current setting without changing the IP address. This option is convenient when choosing to return to default from a remote location. 2. Default – In this case, the unit will lose its current setting and gets system defaults of IP: 192.168.1.1 and mask: 255.255.255.0 To return to the system default software version 1. Click Default or Default Except IP. 2. Click OK A warning popup displays. Figure 2.
Managing the System Configuration Upgrading the Software Version A full description of upgrading the software version is given in upgrading the System Software section in Chapter 7. Backing Up the Current Software Version You can backup the software version currently installed on the system. This can be used before upgrading to a new version with which you do not have experience. To back up the current version of the software • Click Backup.
Managing the System Configuration Table- 2.2 System Configuration tab Field Description Current Configuration File Current Startup Configuration File File currently used to configure system on startup. This field is also used to export the current configuration file. Rightclicking on the file name allows you to save the current Startup Configuration File on you local disk. See Exporting the Current startup Configuration File.
Managing the System Configuration A Save As dialog box will appear. 5 Choose the save in folder, create the correct File name, and click on the Save button. Importing a New System Configuration File To import a new system configuration Select the import protocol to be used, either TFTP or HTTP. If TFTP is selected, enter the IP address of the TFTP server to be used for the download, if it is not the default server. In the New Startup Configuration File, click Browse and select the file location.
Managing the System Configuration For help creating the Tech Support Report, please refer to Debug Interface section. Please send one Tech Support Report per each WBS-2400 where you want to enable the SDMA feature. Figure 2.5 Features Licensing Tab Installing the SDMA feature Upon reception of the license key, type it in the “Key” field of the “License Featuring” tab. Click on the “Install” button. A pop-up window will appears. Figure 2.
Managing the System Configuration Figure 2.8 SDMA Installed and Active Note: Although the feature is installed, you can enable and disable it through the Wireless tab in Network-> Wireless menu.
Managing the System Configuration Viewing the System Hardware Components The System Hardware page lists the components of the system. Figure 2.9 System Hardware Page-WBS-2400 Figure 2.10 System Hardware Page-WBS-2400-SCT The following information is displayed on the System Hardware page for each component. Rev 4.
Managing the System Configuration Table- 2.3 System Hardware page Field Description Product Number An internal ID which identifies the components of the system. There are no field replaceable units. This information may be used to identify the hardware components. Serial Number An internal ID which identifies the date of manufacture, production lot, and individual component. There are no field replaceable units.
Managing the System Configuration Figure 2.11 Debug Interface Page Table- 2.4 Debug Interface page Field Description Common Debug Interface File Upload In rare cases you will be asked by Wavion technical person to upload a file into the system to help critical issue debugging. Module Control ID/Args These codes will be given by Wavion Technical support person to load to the system in order to get help with critical debugging. Tech.
Managing the System Configuration VLAN Select the VLAN (broadcast domain) where the IP addresses should be valid Optional Parameters Leave it blank for a repetition of 5 PING. Select “–t” for a non-stop PING stream.
Managing Network Interfaces Chapter 3 Managing Network Interfaces You can view the status of the network interfaces. There is a summary page and a separate page where each interface can be managed. Viewing the Network Interfaces Summary To view the Network Interfaces Summary page • Click Network Interfaces in the menu. Depending on whether the base station has an embedded Ethernet Switch or not the view of the Network Interface Summary page will be different Figure 3.
Managing Network Interfaces Figure 3.2 Network Interfaces Summary for units with embedded Ethernet Switch You can click ETH A, ETH B, ETH C or Wireless in the page to view the Ethernet or Wireless Interface pages. Alternatively, you can click Ethernet or Wireless in the menu bar to view corresponding interface pages The following fields appear on the Network Interfaces Summary page: Table- 3.
Managing Network Interfaces Managing the Ethernet Interface The Ethernet page displays status and configuration parameters, and statistics information for the Ethernet interface. To view the Ethernet interface parameters and statistics. • Click Ethernet either from the Network Interfaces Summary or as a sub-item of the Network Interfaces menu item. Figure 3.3 Ethernet Page for systems without embedded switch Table- 3.
Managing Network Interfaces Figure 3.4 Ethernet Page for systems with embedded switch Table- 3.
Managing Network Interfaces • • Wireless pages: o Wireless (configurable): Status and Configuration details, Interference Handling Mode, Frequency Planning Consideration, Traffic Optimization. o Wireless Activity: Statistics, RF Channel Parameters, SDMA parameters. o ACS (Automatic Channel Selection) SSID-VLAN submenu: For details on this sub-menu please refer to Managing SSID To view the Wireless interface parameters and statistics.
Managing Network Interfaces Table- 3.4 Wireless page Field Description Operational Status Up/Down BSSID Identifier MAC address of the BST Operational Channel The wireless channel used by the unit. See Setting the Operational Channel Transmission Power Default Max=1 for maximum Tx Power and Min=6 for lowest Tx Power. It's a 3dB steps. Should be set to maximum for most applications. Beacon Period (Kusec) Amount of time between beacons in kilomicroseconds.
Managing Network Interfaces Table- 3.4 Wireless page Field Description • • • Capacity optimization (802.11g only): CPE wishing to associate to the BST must support 802.11g protocol. Legacy mode (802.11b/g): This mode allows 802.11b CPE to associate. QoS Optimization: System is optimized for VoIP deployments. CPE wishing to associate to the BST must support 802.11g protocol. The CPE should support working with multicast/broadcast data at 12Mbps.
Managing Network Interfaces To set the Operational Channel In the Status and Configuration area, from the dropdown list in the Operational Channel field, select the channel on which the system runs. Default is Channel 6: 2437 MHz. Setting the Transmission Power Be sure the Transmission Power is set to the maximum; the radio button in this field should be set on the setting closest to the word Max. Selecting the Interference Handling Mode The default Interference Handing Mode is Interferences Mode.
Managing Network Interfaces Selecting the Traffic Optimization The WBS-2400 and WBS-2400-SCT is set by default to “Capacity optimization”. This mode supports only CPE that can work in 802.11g protocol. This mode is optimized to achieve a higher capacity when compared to 802.11b systems. When older, 802.11b CPE are present in the covered area, is possible to allow their association to the base station. In order to do that, please set the base station to work in “Legacy mode”.
Managing Network Interfaces SDMA mode Wavion’s SDMA technology sends two concurrent data streams from the base station to two different users. This doubles the downlink capacity of each base station. The feature must be installed prior to enabling it. Please refer to Installing the SDMA Feature. SDMA will work with CPE that are connected to the WBS with an SNR higher than 15dB, and when the CPE Downlink modulation is above 5.5Mbps in 802.11b mode or 54Mbps when working in 802.11g protocol.
Managing Network Interfaces The following fields appear on the Wireless Activity page: Table- 3.5 Wireless Activity page Field Description Channel Parameters Noise Level The level of the system noise power in dBm. Nominal noise level without interference is -97 dBm. Higher values indicate higher noise levels due to interference presence. Note: Noise level will show N/A after reboot. It will update after 4~6 minutes up time when the Calibration cycle 0 is done.
Managing Network Interfaces Table- 3.5 Wireless Activity page Field Description Total Tx capacity The calculated average throughput that was achieved (in Kbps) since the last screen refresh. The estimated available throughput based on parameters of last transmissions, SDMA activity and channel parameters. When the Estimated WBS capacity throughput in last transmission and SDMA activity is near zero , the field shows the maximum available throughput : available ◊ When SDMA is disabled: 29593 kbps.
Managing Network Interfaces Automatic Channel Selection Figure 3.7 Automatic Channel Selection Page in Standalone Mode The Automatic Channel Selection (ACS) is a tool for automatic scanning the frequency channels, and selecting the best channel based on the activity and the interference level of each channel. It is useful for both standalone deployment and in assisting tool for multi-BST deployment.
Managing Network Interfaces Note: During scan mode the system will not be operational, i.e. clients will not be able to associate, although beacons will continue to be transmitted. How to return to Operational Mode: The system will automatically return to operational mode with the recommended channel selected by the ACS algorithm unless the “Automatic set to recommended channel and reboot” checkbox is not checked. In this case the system will return to the previous selected channel after the scanning.
Managing Network Interfaces Table- 3.6 Automatic Channel Selection page Field Description Scan Status Status of the system mode. • Not in ACS mode - is shown during operational mode • Scanning - is shown during scan Recommended channel The best channel that was chosen based on scan results. It selects the best channel from channels selected in the "available channel" list. The recommended channel is selected based both on noise level and channel activity. Rev 4.
Managing Network Interfaces Backhaul The WBS-2400 and WBS-2400-SCT have two important features to help the operator to deploy the systems more efficiently. Those features are: ◊ Backhaul CPE ◊ Self-Backhaul (SBH) Figure 3.8 Connected Backhauls page Table- 3.7 Connected Backhauls Field Description Backhaul BST Link Information Link # Index of the Self-backhaul link MAC Address MAC Address of the peer BST. Link Status Status of the SBH link: ◊ Up: Link is working ◊ Unidirectional.
Managing Network Interfaces Field Description Operational Rate The rate of the data transmitted to Peer BST on the SBH link. Rx Rate The rate of the data received from Peer BST on the SBH link.
Managing Network Interfaces Field Description State State of which the station is connected Backhaul CPE The Backhaul CPE feature allows to create an SSID that together with the CPE associated to it creates a trunking interface. This interface is capable of tunneling tagged VLAN between the two ends (CPE and BST). Only one SSID can be configured as backhaul SSID. The number of VLAN capable to be trunked is the number of available VLAN in the system (15 in SSID-VLAN mode, 5 in BSSID mode).
Managing Network Interfaces 1. Select an SSID 2. Set the SSID as Backhaul SSID by checking the “Backhaul SSID” checkbox. Please pay attention that the Authentication settings will change automatically to WPA2 PSK and the Encryption to AES. Please choose a pass phrase for authentication. QoS priority will be performed only according to 802.1p, so all the other QoS types (TOS, DSCP, Custom) are not shown. The VLAN set in the SSID is not used at the network side.
Managing Network Interfaces 3. Create the trunked VLAN on disabled SSID. The VLAN appearing at the CPE side should be configured to appear at the WBS side. The way of doing that is by creating a new SSID with the required VLAN without enabling the SSID (the VLAN must be enabled). In this way, the VLAN will exist in the Ethernet interface of the WBS, but not in the air interface. 4. Connect CPE Set the CPE to work as WDS station.
Managing Network Interfaces Self-Backhaul (SBH) To reduce backhaul cost, Wavion's software feature allows operating a radio link between WBS2400 units with up to 3 units per cluster: one central and up to 2 remote. This feature is based on in-band wireless backhaul connectivity with the link gain of 156dB for 6Mbps and 136dB for 54Mbps allowing to create links of up to 20Km distance in Line of Sight (LOS).
Managing Network Interfaces Table- 3.8 Field Self Backhaul page Description Self Backhaul Base Station Role List of BST Role • Standalone - Not in Self Backhaul mode • Central - Is the HUB unit that interconnects between all the units. The central base station can be connected to up to 2 Remote base stations • Remote - The satellite BST that connects wirelessly to the central.
Managing Network Interfaces Remote and Central Scan feature To supports deployment of Remote BST. WBS-2400 have a tool that enables scanning for presence of BST in all the channels by the Remote (Remote-scan) and in the operative channel by the central BST (Central-scan). It gives the user the ability to select one of the BST as peer BST for Self Backhaul link and automatically adopt its configuration for establishment of Backhaul link. Remote-Scan Remote-Scan will use ACS mode and go over all channels.
Managing Network Interfaces Cluster deployment in steps: Step 1: Configure the same passphrase to all Cluster BST- Please refer to the configuration steps (pages 41-44). Step 2: Install Central BST Run ACS on Central BST to select the best channel Set Channel Step 3: Install Remote-BST Run Remote-Scan Select the desired Central BST by click on entry in table.
Managing Network Interfaces Figure 3.12 Self Backhaul Configuration page - Central 1. Apply and save changes 2. Reboot the system. Table- 3.9 Self Backhaul configuration - Central Field Description Logical Network ID A name that describe the network name (Suggestion: Enter the name of your company or ISP ) Cluster ID A name that describes the cluster of BST.
Managing Network Interfaces Remote Configuration 1. Set the BST role to Remote The page will change automatically to Remote BST configuration page. 2. Configure the Network BST name (for identifying the BST in the central link stations list) 2.1. Logical network ID 3. Configure the Central BST to connect with: 3.1. Manually – insert the MAC address of central BST and push the Scan button 3.2. Automatically - run the Remote-Scan Figure 3.
Managing Network Interfaces Figure 3.14 Backhaul BST Link Information page Note: To avoid Network loops, make sure there is no wired Ethernet connectivity to the remote BST that closes a loop with the Ethernet connectivity to the Central BST. Note: All BST in the same cluster must be configured to the same channel. Note: Range in all cluster should be the same WARNING: Do not connect between two Central BST; this may lead to loose the connection between units.
Managing Network Interfaces Bridge Traffic Policing The system has a mechanism that allows the user to set the maximum bandwidth used by broadcast and multicast messages. The policing of traffic also allows blocking any kind of peerto-peer data transaction, unicast or multicast. Figure 3.
Managing Network Interfaces Field Description Management VLAN (active when more than one VLAN is configured). When only a single VLAN is configured Peer-toPeer traffic is allowed. • Multicast peer to peer communication • Allow: multicast/broadcast peer-to-peer traffic is enable Block: multicast/broadcast peer-to-peer traffic is blocked. Unicast peer-to-peer traffic is permitted. Allow DHCP server on wireless interface DHCP server (default gateway) in the wireless interface (not SBH) is valid.
Managing Network Interfaces Figure 3.16 Limiting the multicast rate Peer traffic policing When peer-2-peer communication is blocked, all wireless clients are expected to communicate only with the Default GW. There may be cases in which the network operator wishes to allow peer-2-peer communication that goes through a specific router in the backhaul network, for monitoring and accounting. This option is possible by applying the Proxy ARP feature.
Managing Network Interfaces >1563) a substitute header should be added. This substitute header is set using an LLC header described in RFC 1042 (default option). This option can be overridden by using the header used in 802.1H protocol. The list of EtherTypes which are going to use the 802.1H header should be set in the LLC Encapsulation page. This override option should be used when the WBS is used in non-802.3 Ethernet networks (FDDI, Token Ring, etc.
SSID and VLAN configuration Chapter 4 SSID and VLAN configuration IEEE 802.11 and WBS-2400 Security Concepts IEEE 802.11 security is supported by the WBS-2400. Security Modes: Authentication and Encryption Methods The following are the different combinations of security modes. Table- 4.
SSID and VLAN configuration Authentication Combinations WBS-2400 allows authentication of various types and in various combinations. • The basic 802.11 authentications are Open (none) and Shared Key. In Shared Key Authentication, the WEP key is used as the shared key. If the SSID is configured to Open + Shared Key, this means that both types of clients can associate to the BST. This can be useful when the IT has another mechanism to determine the authentication of users in terms of his overall network, e.
SSID and VLAN configuration QoS Packets Priority Wireless Multimedia Extensions (WME), also known as WiFi MultiMedia (WMM), provides basic Quality of service (QoS) features to IEEE 802.11 networks. WMM prioritizes traffic according to four Access Categories (AC): • Voice • Video • Best Effort • Background The four access categories and the implementation defined by WMM standard provide traffic prioritization.
SSID and VLAN configuration Figure 3.19 VLAN Tag (802.1p) Priority Marking Table Note: WBS should be set to work with tagged VLAN in order to support 802.1p QoS. Figure 3.20 DSCP (RFC4594) Priority Marking Table Rev 4.
SSID and VLAN configuration Figure 3.21 TOS (IP Precedence) Priority Marking Table Figure 3.22 DSCP (User Defined) Priority Marking Table Select two values (the range is 0 to 63) for each one of the AC. When getting DSCP equals to value1 or to value2, the map to the specified Access Category applies. Remaining values will be mapped to “Best Effort” AC.
SSID and VLAN configuration The SSID-VLAN pages SSID-VLAN is a sub-menu under the Wireless page in Network menu. This page allows management of the security configuration. It is recommended to rename the SSID. The SSID is case sensitive and shorter than 32 characters. There are two operation modes: • Single Broadcast SSID with multiple hidden SSID: (Default) All the SSID share the same BST MAC address. Only SSID #1 is broadcasted. This SSID cannot be disabled.
SSID and VLAN configuration Figure 4.1 SSID Table Page-Default mode The following information is displayed on the SSID Table. Table- 4.2 SSID Table Field Description # SSID index number Enabled Indicates whether the SSID is enabled or not SSID Name The full SSID string Security Parameters Authentication The specific Authentication method as defined for the SSID Encryption The specific Encryption method as defined for the SSID.
SSID and VLAN configuration Figure 4.2 SSID Table Page-BSSID mode The following information is displayed on the BSSID Table. Table- 4.3 BSSID Table Field Description # SSID index number Enabled Indicates whether the SSID is enabled or not SSID Name The full SSID string MAC Address The address to fill the BSSID field in the beacon of the specific broadcasted SSID Security Parameters Rev 4.
SSID and VLAN configuration Note: Each enabled BSSID causes more beacons to be broadcasted over the air. This may cause degradation of the system’s capacity. Editing SSID/BSSID Figure 4.
SSID and VLAN configuration Figure 4.4 Editing BSSID Page- BSSID mode The following fields appear on the Editing SSID/BSSID page. For more information about Security and QoS Configurations, see also Security Modes: Authentication and Encryption Methods and QoS packets priority Rev 4.
SSID and VLAN configuration Table- 4.4 Editing SSID Page Field Description Identity Rename SSID/BSSID 'Wavion' is the default SSID. Set new name for the SSID; the SSID is case-sensitive, and shorter than 32 characters SSID/BSSID Index It's a chronological numbering for the SSID Table BSSID MAC address attached to the SSID (only in BSSID mode) SSID/BSSID Enabled SSID #1 is always Enabled. SSID that are not enabled cannot be accessed from the wireless interface.
SSID and VLAN configuration Table- 4.4 Editing SSID Page Field Description • DSCP: Uses RFC4594 • TOS: Uses IP precedence Custom: User configuration of the DSCP field Related VLAN VLAN: VLAN0_Name_External-ID-1 Default VLAN name Rename VLAN Option to rename VLAN name for identification. VLAN External ID Configured VLAN number as configured on the backhaul LAN switch VLAN Enabled Enabled for the Primary SSID.
SSID and VLAN configuration • Click the Encryption drop down menu and select WEP in the Editing SSID page (See figure below). • Select from the Authentication choices either Open or Shared Key. Shared Key is recommended. • Select either WEP/40 or WEP/104 from the Encryption choice. • Enter up to 4 WEP keys. Their length is dependent upon the choice selected in the step above; WEP/40 is 10 hex characters and WPE/104 is 26 characters. Figure 4.
SSID and VLAN configuration Configuring WPA Security To configure WPA Security • From the Authentication drop down menu, select either WPA PSK or WPA RADIUS. • Select TKIP, TKIP + WEP/40 or TKIP + WEP/104 from the Encryption choice. • For the Security Keys, select either by Value or by Pass Phrase and enter the appropriate value Figure 4.
SSID and VLAN configuration Table- 4.6 RADIUS Servers Configuration Field Description RADIUS Server IP Address IP Address of the RADIUS Server. If more than 1 address appears in the list, the following RADIUS Servers are used as backup (only if the previous RADIUS Servers cannot be reached). Shared Secret The Shared Secret is a secret that the unit shares with the RADIUS server. This way, both ends know they are "certified".
SSID and VLAN configuration Figure 4.9 WPA2 Radius Servers Configuration Table- 4.7 RADIUS Servers Configuration Field Description RADIUS Server IP Address IP Address of the RADIUS Server. If more than 1 address appears in the list, the following RADIUS Servers are used as backup (only if the previous RADIUS Servers cannot be reached). Shared Secret The Shared Secret is a secret that the unit shares with the RADIUS server. This way, both ends know they are "certified".
SSID and VLAN configuration The default VLAN has the VLAN ID equal to 1, but by default the tagging is disabled leaving the data untagged. By default, all management traffic to and from WBS-2400 is on VLAN ID 1. It is a good practice to create a VLAN dedicated to the management of the unit. See Management VLAN section for more information. The following pages describe the process to set VLAN. Pictures and indications refer to SSID mode. The process in BSSID mode is the same.
SSID and VLAN configuration 2. In the Rename SSID field, enter an SSID Name to be used. 3. Check the SSID Enabled checkbox. This enables the SSID. 4. Check whether this SSID is a Backhaul SSID ( See Backhaul CPE) 5. Configure all security parameters: Authentication, and Encryption as required (See Security Configurations). 6. Configure the QoS Priorization (See QoS Priorization Settings) 7. Within the Related VLAN edit the VLAN Name 8. Select a VLAN ID.
SSID and VLAN configuration Configuring Multiple VLANS per SSID The SSID acts as a "security template" - it determines the general security mode (WPA, WEP, etc.). The Security details (the keys themselves) are linked to the VLAN. Therefore, there is an option to assign multiple VLAN to the same "security template" which is the SSID. This option is applicable only when another authority (i.e. RADIUS Server that supports VLAN assignment) is involved in the Authentication process.
SSID and VLAN configuration Figure 4.11 Editing SSID with RADIUS -- Multiple VLAN Only one VLAN has the Default for SSID checkbox marked. This indicates to the WBS-2400 which is the default VLAN when authentication on the SSID is performed and the RADIUS does not provide the assignment to VLAN (this is to avoid possible configuration problems in the RADIUS). Make sure you configure the RADIUS server to handle clients on multiple VLAN. Rev 4.
SSID and VLAN configuration Make sure that access to the RADIUS Server, including the Shared Secret, is configured correctly. Management VLAN The purpose of the management VLAN is to segment the Management and the Clients data traffic. It also provides an option for customers to keep an Open SSID for public traffic and simultaneously manage the WBS-2400 traffic over a separate VLAN (that may be linked to a secured SSID). The management VLAN can be selected out of the enabled VLAN list.
Viewing Associated Stations Chapter 5 Viewing Associated Stations The Association menu item allows you to view parameters of stations associated to the system. Viewing Stations To view a summary of associated stations • Click the Association menu item. The following summary chart appears if there are associated stations in the system. Figure 5.1 Association Statistics The following fields appear on the Association Statistics page: Table- 5.1 Rev 4.
Viewing Associated Stations Viewing Associated Stations You can view a summary list of associated stations and their parameters To view a summary list of stations and parameters 1.1. Click Association on the menu. Click Associated Stations on the menu bar or on the summary screen The Associated Stations page is displayed. Figure 5.2 Associated Stations Page The following fields appear on the Associated Stations page: Table- 5.
Viewing Associated Stations version 3.2.2, and Ruckus running version 4.4.2.0.28. Tx Rate [Mbps] PHY Rate (modulation) at which the base station currently transmits to the associated station Rx Rate [Mbps] PHY Rate (modulation) at which the associated station currently transmits to the base station SSID SSID to which the associated station is associated VLAN VLAN name to which the station is bound.
Viewing Associated Stations Table- 5.3 Field Station Information tab Description Station Properties MAC Address MAC (Media Access Control) address of the associated station Power Save State Value of Doze in this field indicates that the associated station is in power save mode Station dot11 Type Indicates whether the station is 802.11g or 802.11b. WMM Support Value of 'yes' in this field indicates that the associated station supports the WMM protocol- .
Viewing Associated Stations Figure 5.4 Station Detailed Information tab part 1 In the above screen, the top of the tab is shown. RF Switching Related Information page is shown when the plus [+] sign is clicked. The Rx Rates are shown in the same way: Rev 4.
Viewing Associated Stations Figure 5.5 Station Detailed Information tab part 2 And the RF Switching Related Statistics: Figure 5.6 Station Detailed Information tab part 3 The following information is displayed in the Station Detailed Information tab.
Viewing Associated Stations Table- 5.4 Station Detailed Information tab Field Description Station Identity Station Association ID The Association ID (AID) that the client got when its association to the BST was completed. Station MAC Address MAC (Media Access Control) address of the associated station. Station's Detailed Information Retry Limit Reached Counter This counter increment every time the Retry Counter (below) reaches its limit (64).
Viewing Associated Stations RX Rates Number of packets received in each one of the operational rates – The dispersion of the rates of the packets received shows if there is any significant interference RF Switching Related Statistics Click + sign to display this information/ click - sign to hide • Negotiation • BRE Type of Transmission of the • Single beam (beamforming) Station For each of the BST transmission types to the station, the following transmission statistics are displayed: Failure (packets)
Viewing Associated Stations MAC Filtering MAC filtering is a feature that enables the user to limit the maximal number of stations to be associated to the WBS-2400. It also allows the creation of “white” or “black” lists to control the identity of the stations to be associated. Figure 5.7 MAC Filtering main page When MAC filtering is enabled, the following fields appear: Figure 5.
Viewing Associated Stations Field Description list”) Upload list Upload a list of MAC addresses. The file type should be .CSV . This is helpful to import lists from other BST or systems. • To create an entry in the MAC list Type: MAC or OUI (the first 3 bytes of the MAC address) MAC address: MAC address or OUI Description • • Press “Add” A maximum of 1000 entries can be added.
Managing System and Station Security Chapter 6 Managing System and Station Security You can manage system users and their passwords, as well as system security parameters. This chapter covers the following main areas: • Administration • Authentication Viewing the Security Page The Security page displays a summary of the different types of security information: administration, authentication, and SSID/VLAN data. To view the Security page • Click Security in the menu. The Security page displays. Figure 6.
Managing System and Station Security Table- 6.1 Security Page Field Description Administration links to the Management Configuration page User Name User name of current user User Type The security level of the current user: Administrator/Viewer SSID The list of active SSID Active SSID Identifier name of each active SSID Active VLAN List of Active VLAN Viewing the Management Configuration Page The Management Configuration page is used for overall system user and configuration management.
Managing System and Station Security Table- 6.
Managing System and Station Security Table- 6.2 Management Configuration page Field Description HTTP Configuration Use this section to enable secure browsing by creating an SSL certificate See below Enable Secure Browsing (SSL only) If the checkbox is marked, it indicates Secure Browsing (SSL) is enabled, and non-secured browsing is disabled.
Managing System and Station Security Select a user type from the user type dropdown list, either Administrator or Viewer. Enter a password in the Password field. A password must contain at least 6 characters. Re-enter the password in the Confirm Password field. Click Apply. Click Save to retain the new user after a reboot. HTTP Configuration To enable secure browsing/create an SSL certificate In the HTTP Configuration section, select Enable Secure Browsing. Select Create new SSL certificate.
Managing System and Station Security Figure 6.3 Authentication Tab The following fields appear on the Authentication tab. Table- 6.3 Authentication tab Field Description Re-Authentication interval and Caching Parameters Re-Authentication Threshold It indicates the threshold in time after which the reauthentication will occur. By default, after 70% of 43200 seconds which is 8.4hours, each client will have to pass re-authentication.
Managing System and Station Security Table- 6.
Viewing Events Chapter 7 Viewing Events You can view and configure logs of system events. Viewing the Most Recent Events The Event Log page displays the systems most recent events. To display the event log • Click Event Log in the menu. The log of most recent system events displays. Figure 8.1 Event Log The following fields appear on the Event Log page: Table- 7.1 Event Log page Field Description Time Since Uptime The time the event occurred.
Viewing Events Table- 7.1 Event Log page Field Description Severity The severity of the event showing how serious event is: Information, Connection Flow, Warning, Critical, or the event type (e.g. Connection Flow) Source System module reporting the event Description Complete description of circumstances of event Viewing the Full Event Log Clicking the Full Event Log menu item displays the Full Event Log page.
Viewing Events Table- 7.2 Full Event Log page Field Description Total Events Number of total events in log Events per page Number of events shown per page; modifiable Page navigator Allows paging through log Time Since Uptime The time the event occurred. A time of 0 is the time the system was last rebooted Severity The severity of the event, showing how serious event is: Information, Warning, Critical, or the event type (e.g.
Viewing Events Table- 7.3 Viewing the Full Event Log page Key Description page. Configuring Event Logs You can configure what appears in the event log, and what is sent to the external logs, such as SYSLOG and SNMP Trap Manager, through the Event Log Control page. On this page, you can control parameters relating to the event log, such as what types of events included in the log, and what method is used to collect the events. To configure event logs 1.1.
Viewing Events Table- 7.4 Event Log Control page Field Description Send SNMP trap Events marked in this row are sent to the SNMP trap manager Send SysLog Events marked in this row are sent to the SysLog server Severity Level Events Select the types of events to be saved to each log Critical Errors Warning Events Information Events Type Events Connection Flow Events Indicates whether connection flow events are saved to a log or sent to a remote server. Version 4.
Viewing Events Rev 4.
Upgrading the System Software Chapter 8 Upgrading the System Software This chapter describes the Wavion WBS-2400 firmware upgrade procedure, using the internal web management tool (CMT) application or TFTP commands. Prior to upgrading, it is essential to backup your Base station configuration (refer to the relevant section in the User Manual document). Note: In order to perform a successful upgrade session it is recommended to perform the upgrade at a time when the system is not fully utilized (e.g.
Upgrading the System Software Firmware Upgrade Procedure Note: To better reflect the value of Wavion products we are changing the name of our product family from Access Points (AP) to Wireless Base Stations (WBS), consequently the existing WS-410 product name will be changed to Wavion WBS-2400.
Upgrading the System Software Verify IP connectivity to the management IP. In order to verify the connection, PING the unit's IP address and verify that PING replies are being received. Note: Management traffic may be VLAN tagged. It is recommended to perform prior to upgrading procedure, software verification and to verify that we have the appropriate file with extension *.wj on your computer. It is recommended to save unit configuration file prior to upgrading (see user manual for details).
Upgrading the System Software • The system software tabs display, consisting of the Software Upgrade tab for managing the system software version, and the System Configuration tab for managing the system configuration. Figure 8.1 System Software page Performing Software Upgrades using HTTP The Software Upgrade option shows details about the current software version, and allows you to set properties required to install a new software version. Other options: 1. Return to the factory default software 2.
Upgrading the System Software Figure 8.2 BST new version been uploaded successfully Step 4: verify a new version is running When the upload has completed successfully and after the Reboot complete, the WEB GUI automatically refreshes the page back to SW Upgrade. Figure 8.3 The new software version is shown Note: When using Microsoft Explorer browser, restart the browser in order to clear the program’s cache.
Upgrading the System Software Performing Software Upgrades using TFTP The Software Upgrade option shows details about the current software version, and allows you to set properties required to install a new software version. Other options: 1. Return to the factory default software 2. Backup the current version of the software 3. Return to a previously backed up version of the software. Step 1: Set the Upgrade properties Select TFTP option on the Software upgrade protocol.
Upgrading the System Software Step 4: verify a new version is running After Reboot is complete, the WEB GUI automatically refresh back to SW Upgrade tab. Figure 8.5 The new software version is shown Note: When using Microsoft Explorer browser, restart the browser in order to clear the program’s cache. Roll back procedure Note: You can roll back to Backup version only if you saved a backup version before To return to the system default software version 1. Click Default or Default except IP.
Upgrading the System Software Figure 8.6 Default Popup 2. Click OK, the system returns to the default software version, and default IP and mask settings (which are: 192.168.1.1 255.255.255.0). Backing Up the Current Software Version You can backup the software version currently installed on the system. The backup version is kept on a separate flash area on the unit itself. This can be used before upgrading to a new version with which you do not have experience.
Appendix: Troubleshooting Chapter 9 Appendix: Troubleshooting We hope your experience with the WBS-2400 is as smooth as possible. In this section we provide tips to solve some common problems. Basic Troubleshooting Problem Solution Default user and password User: admin Password: admin Unable to Ping or HTTP the New Unit • Check the Power • Is the BST Operational? Check the LED, make sure it showing Green on the Status • WBS-2400 default IP Address is 192.168.1.
Appendix: Troubleshooting Problem Solution BST • Check for Line of Sight Link is Good but no data traffic • Check that Passphrase is the same for both BST in case of problems raising cluster links due to low SNR of the SBH links (from the sub-scan) Try to set a different channel of the Central-BST LED Description AE Models LED name ETH A ETH B STATUS Status Description OFF No Ethernet Activity on port A BLINK Ethernet Activity on port A OFF No Ethernet Activity on port B BLINK Ethernet A
Appendix: Troubleshooting LED name RADIO Status Description RED, SLOW_BLINK Factory default but IP RED, FAST_BLINK Factory default GREEN, SLOW_BLINK Initialization state RED, STEADY Critical alert GREEN, SLOW_BLINK Operational without connected stations GREEN, STEADY Operational with connected stations AMBER, FAST_BLINK Operational GENERAL_WARNING AF Models LED name Ethernet Link-(L) STATUS-(S) 115 Wavion Status Description OFF No Ethernet Activity BLINK Ethernet Activity GREEN,
Appendix: Troubleshooting LED name RADIO- (R) Status Description GREEN, SLOW_BLINK Initialization state RED, STEADY Critical alert GREEN, SLOW_BLINK Operational without connected stations GREEN, STEADY Operational with connected stations AMBER, FAST_BLINK Operational GENERAL_WARNING Rev 4.