WS410 User Manual Rev 1.1.0, October 2007 Rev 1.1.
Copyright Notice ©2007 Wavion, Inc. All rights reserved. Wavion is a registered trademark of Wavion in the United States and certain other jurisdictions. Specifications are subject to change without notice. Loctite is a registered trademark of Loctite Corporation, USA. FCC Notice to Users and Operators This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to Part 15 of the FCC Rules.
WARNING: It is illegal to modify the construction of this product. Modifying the operating frequency or enhancing the transmit output power through the use of external amplifiers or other equipment is specifically disallowed by the “Telecommunications Act.” WARNING: This device is for outdoor use with conditions that no harmful interference to authorized radio stations results from the operation of this device.
Important Safety Instructions CAUTION: The exclamation point within a triangle is intended to alert the user to the presence of important operating and maintenance (servicing) instructions in the literature accompanying the product. WARNING: The lightning flash with an arrowhead symbol within a triangle is intended to alert the user to the presence of uninsulated ìdangerous voltage within the product’s enclosure that may be of sufficient magnitude to constitute a risk of electric shock to persons.
CAUTION: The Wavion WS410 can only be used with approved antennas. About This Manual The following describes configuration of the WS410. It is intended for use by network engineers and administrators charged with setting up and administering Wavion wireless networks. Them manual contains the following: • Chapter 1: Using the WS410 Graphical User Interface on page 10: Introduces the WS410, describes the application page and menu bar, and how to navigate through the system.
Rev 1.1.
Contents Chapter 1 USING WS410 WEB-BASED MANAGEMENT INTERFACE .10 Navigating through the WS410 ..................................................10 Modifying Data.........................................................................12 Saving Data.............................................................................13 Using Other Available Options ....................................................14 Chapter 2 VIEWING THE SYSTEM STATUS ................................
Chapter 6 MANAGING SYSTEM AND STATION SECURITY .............. 52 Viewing the Security Page .........................................................52 Viewing the Management Configuration Page ...............................55 Viewing the Authentication Pages ...............................................59 Configuring RADIUS Server Parameters: Server Manager Tab...61 Viewing the SSID Pages ............................................................
Changing the Network Interface Configuration .............................96 Setting the Operational Channel ..........................................96 Setting the Transmission Power ...........................................97 Saving Changes.................................................................98 Modifying the Security Configuration...........................................98 Renaming the SSID............................................................99 Setting the Security Mode ...........
Using the WS410 Web-based Management Interface CHAPTER 1 Using the WS410 Web-based Management Interface This section discusses the Web-based Management interface of the WS410. Covered are page layout, navigation, and modifying data. Navigating through the WS410 The Web-based Management interface of the WS410 is straightforward. A WS410 page comprises the following main sections: a menu bar, a header, and a main page area. Figure 1.1.
Using the WS410 Web-based Management Interface the menu bar in order to reach a page, all these menu items are listed in order in the header. • The main page area is specific to the functionality of each particular page. Initial navigation begins on the left-hand side of the application window. Menu selection items are Home, System, Network Interfaces, Association, Security, and Event Log. Notice that some of these items have a + symbol in front of the name.
Using the WS410 Web-based Management Interface Figure 1.3. Navigating to a Sub-Item Modifying Data Modifying data in the WS410 is a simple process and complies with Window’s Internet Explorer Web interfaces. There are several types of data-entry fields. • Text boxes signified by white rectangles allow direct text input • Dropdown list boxes have a set of options made available by clicking the arrow on the right side of the rectangle • Radio buttons are clicked to make a selection.
Using the WS410 Web-based Management Interface Saving Data In the WS410, applying data changes to take effect is a process consisting of several steps. To affect a change in a data f iel d 1. Edit the data in the field or make a selection. 2. Click Apply in the bottom right of the window. NOTE: You must click Apply before navigating to another page or the changes do not take effect. When you click Apply, the Web browser shows that the page is busy.
Using the WS410 Web-based Management Interface Again see the indication on the web browser that the request is being processed in the same way as described for the Apply button. It is necessary to let this cycle complete before doing anything else. NOTE: The red warning message does not go away when Save is pressed. A reboot of the system is still required. If necessary, reboot the WS410 either by power-cycling the unit, or by clicking Reboot at the bottom of the System window.
Using the WS410 Web-based Management Interface Rev 1.1.
Viewing the System Status CHAPTER 2 Viewing the System Status The Home page shows a summary of status data of the system. From within this page, you can quickly link from fields to other related pages for more information. Viewing the Home Page To v iew t he Hom e page • Click Home. The Summary Status page is displayed. Figure 2.1. Home: Summary Status Page The following fields appear on the Summary Status page: Table 2.1.
Viewing the System Status Table 2.1. Home: Summary Status page Field Description System Identity Links to System Configuration page System Description Description of the device as written in MIB-II SysDescr OID System Up Time Total time since system was switched on or last re-initialized System Contact Administratively-assigned email address of system operator System Name Administratively-assigned name for this managed node; the node's fully-qualified domain name.
Managing the System Configuration CHAPTER 3 Managing the System Configuration The System Configuration page displays system address and IP information. The other system pages allow updating of the software version and system configuration, and a view of the system components. Viewing the System Configuration To v iew t he System Confi gura tion page • Click the System menu item. The System Configuration page displays. Figure 3.1.
Managing the System Configuration The following fields appear on the System Configuration page: Table 3.1. System Configuration page Field Description System Identity System Description Description of the device as written in MIB-II SysDescr OID System Up Time Total time since system was switched on or last re-initialized System Contact Email address of system operator System Name Administratively-assigned name for this managed node; the node's fully-qualified domain name.
Managing the System Configuration Table 3.1.
Managing the System Configuration 4. In the Configured Subnet Mask, enter a valid netmask. NOTE: The system must be rebooted for these changes to take effect. Setting the System Management Configuration You can decide to allow system management from the Wireless Interface, or to allow management only from the Ethernet Interface, for security purposes.
Managing the System Configuration Figure 3.2. Software Upgrade Tab The following fields appear on the Software Upgrade tab: Table 3.2. Software Upgrade tab Field Description Current Version 22 Wavion SW Version Current software version in use Product Parameters Version Current version of the internal database holding the system’s default parameters Upgrade Properties See the chapter Upgrading the System Software on page 82 for details on installing a new software version.
Managing the System Configuration Table 3.2. Software Upgrade tab Field Description Upgrade System Software Path/File (TFTP download) Path to the .wj file being TFTP downloaded Upgrade System Software Path/File (HTTP upload) Path including the .
Managing the System Configuration Returning to the Default Software Version You can reinstall the default software version. If you do this, you lose the current settings and are left with system defaults of IP: 192.168.1.1 and mask: 255.255.255.0 T o r et ur n to th e s ys te m d e f a ul t s o f t wa r e v e r si o n 1. Click Default. A warning popup displays. Figure 3.3. Default Popup 2. Click OK. The system returns to the default software version, and default IP and mask settings.
Managing the System Configuration Restoring the Last Saved Software Version If you backed up a software version before upgrading to a new one, it is possible to return to the previous version. To return to a previous system soft ware version • Click Restore. The last backed up version of the system software is restored to the system. Managing the System Configuration On the System Configuration tab you can manage current system configuration file name and the configuration management parameters.
Managing the System Configuration The following fields appear on the System Configuration tab: Table 3.3. System Configuration tab Field Description Current Configuration File Current Startup Configuration File File currently used to configure system on startup. This field is also used to export the current configuration file. Rightclicking on the file name alllows you to save the current Startup Configuration File on you local disk.
Managing the System Configuration Exporting the Current Startup Configuration File To ex por t t he curr ent syst em conf iguration 1. Click on the name of the current software configuration. A File Download dialog box will appear listing the Name, Type, and From IP address. 2. Click on the Save button of the File Download dialog box. A Save As dialog box will appear. 3. Choose the save in folder, create the correct File name, and click on the Save button.
Managing the System Configuration Viewing the System Hardware Components The System Hardware page lists the components of the system. Figure 3.5. System Hardware Page The following information is displayed on the System Hardware page for each component. Table 3.4. System Hardware page 28 Wavion Field Description Product Number An internal ID which identifies the components of the system. There are no field replaceable units. This information may be used to identify the hardware components.
Managing the System Configuration Table 3.4. System Hardware page Rev 1.1.0 Field Description Serial Number An internal ID which identifies the date of manufacture, production lot, and individual component. There are no field replaceable units. This information along with the product number may be used to identify the specific hardware component. Antenna Type The Antenna Type indicates the default antenna type that is installed in the unit.
Managing Network Interfaces CHAPTER 4 Managing Network Interfaces You can view the status of the network interfaces. There is a summary page, and a separate page where each interface can be managed. Viewing the Network Interfaces Summary This page displays summary information about the network interfaces. To v iew t he N et wo r k I n te rface s Su mm ary • Click Network Interfaces in the menu. The Network Interfaces Summary page displays. Figure 4.1.
Managing Network Interfaces The following fields appear on the Network Interfaces Summary page: Table 4.1.
Managing Network Interfaces Managing the Ethernet Interface The Ethernet page displays status and configuration parameters, and statistics information for the Ethernet interface. To v iew t he Et he rnet inte rface param et ers and stat istics. • Click Ethernet either from the Network Interfaces Summary or as a sub-item of the Network Interfaces menu item. The Ethernet page displays. Figure 4.2. Ethernet Page The following fields appear on the Ethernet page: Table 4.2.
Managing Network Interfaces Table 4.2.
Managing Network Interfaces Managing the Wireless Interface The Wireless Interface page displays Status and Configuration details (modifiable), Statistics, Data Rates of the switched 802.11b/g interface, and ACS (Automatic Channel Selection). To v iew t he Wireless interface parameters and stat istics. • Click Switched 802.11b/g either from the Network Interfaces Summary or as a sub-item of the Network Interfaces menu item. The Switched 802.11b/g page displays. Figure 4.3. Switched 802.
Managing Network Interfaces Table 4.3. Switched 802.11 b/g page Rev 1.1.0 Field Description Beacon Period (Kusec) Amount of time between beacons in kilomicroseconds. One Kusec equals 1,024 microseconds, which is close to 1 millisecond. DTIM Period (Beacon intervals) This setting, always a multiple of the beacon period, determines how often the beacon contains a Delivery Traffic Indication Message (DTIM). A traffic indication map is present in every beacon.
Managing Network Interfaces Table 4.3. Switched 802.11 b/g page 36 Wavion Field Description Invalid CCA CS Packets The relative amount of time (in percentage) wasted by unsuccessful receptions (i.e reception that failed to be modulated correctly). Invalid CCA EDPackets The relative amount of time (in percentage) wasted by false energy sensing (i.e. energy was detected but no valid carrier was found).
Managing Network Interfaces Table 4.3. Switched 802.11 b/g page Field Description Interferer Handling Mode Select between Dynamic or Static - Low, Moderate, and High. Each selection requires a Reboot to take effect. See Setting the Operational Channel section on page 38. • Dynamic Mode: In this mode, the AP Automatically adapts to the interference condition.
Managing Network Interfaces On this page you can configure the wireless interface. There are several recommendations for this page. Setting the Operational Channel Operational channels should be set up in such a way that if you have multiple units which are located in the same area, they interfere with each other as little as possible. If you have up to three units, it is recommended to use channels 1, 6, and 11, as that minimizes interference between the channels.
Managing Network Interfaces The Automatic Channel Selection page displays. Figure 4.4. Automatic Channel Selection Page General Description: The Automatic Channel Selection (ACS) is a tool for automatic scanning the frequency channels, and selecting the best channel based on the activity and the interference level of each channel. It is useful for both standalone deployment and in assisting tool for multi-AP deployment.
Managing Network Interfaces Figure 4.5. Automatic Channel Selection page during Operational Mode Figure 4.6.
Managing Network Interfaces How to initiate scan: Pressing scan button in the ACS page will initiate the scan process. During the process, the system will reboot to Scan Mode, perform the scan and afterwards, reboot back to Operational Mode to the best channel. During scan mode the system will not be operation, i.e client will not be able to associate, although beacons will continue to be transmitted.
Managing Network Interfaces Table 4.4. Automatic Channel Selection page Field Description Scan Configuration The scan sensitivity. the values can be: • Static Low Interference: Highest scan sensitivity • Static Moderate Interference • Static High Interference: Lowest scan sensitivity The default is Static Low Interference. Using lower sensitivity scan will not monitor the weak interference and show only the high power activity.
Managing Network Interfaces Table 4.4. Automatic Channel Selection page Rev 1.1.0 Field Description Total CCA activity Total activity in the selected channel in percentage Noise level Level of the noise as measured by the AP Beacon failure rate Percentage of the beacons that the system failed to transmit Channel Selection Selection channel for returning to operational mode.
Viewing Associated Stations CHAPTER 5 Viewing Associated Stations The Association menu item allows you to view parameters of associated stations to the system. Viewing Stations To view a su mmary of asso ci ated st ations • Click the Association menu item. The following summary chart appears if there are associated stations in the system. Figure 5.1. Association Statistics The following fields appear on the Association Statistics page: Table 5.1.
Viewing Associated Stations Viewing Associated Stations You can view a summary list of associated stations and their parameters To vi ew a summary list of stat ions a nd paramet ers 1. Click Association on the menu. 2. Click Associated Stations on the menu bar or on the summary screen The Associated Stations page is displayed. Figure 5.2. Associated Stations Page The following fields appear on the Associated Stations page: Table 5.2. Associated Stations of VLANS page Field Description Title Rev 1.1.
Viewing Associated Stations Table 5.2. Associated Stations of VLANS page Field Description RSSI[dBm] The Received Signal Strength Indicator power received by the AP from the associated station. State State of which the station is connected Viewing Specific Stations You can view detailed information about a specific station. To v iew detailed information about a specific sta tion • In the Associated Stations summary page, click the Stations’s MAC Address for the specific station.
Viewing Associated Stations Table 5.3. Station Information tab Field Description Station dot11 Type Indicates whether the station is 802.11g or 802.11b. WME Support No Supported Rates [Mbps] PHY Rates (modulation) at which the associated station can communicate Preamble Type The preamble types may be Short or Long Short Slot - Time This field indicates whether the client supports Short Slot Time Encryption Used The type of encryption used to communicate with this client.
Viewing Associated Stations In the above screen, the top of the tab is shown, with RF Switching Related Information plus sign is clicked. In the figure below, the RF Switching Relating Statistics plus sign is clicked and the bottom of the page is shown. Figure 5.5. Station Detailed Information tab part 2 The following information is displayed in the Station Detailed Information tab. Table 5.4.
Viewing Associated Stations Table 5.4. Station Detailed Information tab Field Description Time since first packet is pending if station is in Doze mode If station is in Power Save mode, the amount of time for which the first packet received is waiting to be delivered Last Activity Number of minutes since the station was last active. Inactivity Timeout If a station is not active for this number of minutes, the AP will de-authenticate it due to inactivity.
Viewing Associated Stations Table 5.4. Station Detailed Information tab Field Description Success (packets) Number of packets transmitted successfully. This count is applicable to Negotiation and Single beam (Beamforming) transmissions and are those that received an Acknowledgement (ACK). Failure [Bytes] Number of bytes that failed to be transmitted. This is only applicable to single beam (Beamforming) transmissions as they are the only variable length transmissions that receive ACKs.
Viewing Associated Stations Rev 1.1.
Managing System and Station Security CHAPTER 6 Managing System and Station Security You can manage system users and their passwords, as well as system security parameters. This chapter covers the following main areas: • Administration in Viewing the Management Configuration Page on page 55 • Authentication in sub-menuViewing the Authentication Pages on page 59 • SSID and VLANs -- this area contains a full description of the concepts of VLANs and SSIDs in the system -- in Introducing IEEE 802.
Managing System and Station Security Figure 6.1. Security Page/no VLANs mode The following fields appear on the Security page: Table 6.1.
Managing System and Station Security Figure 6.2. Security/VLANs Mode page You can un-check VLANs mode to return to the Security/No VLANs page.
Managing System and Station Security Viewing the Management Configuration Page The Management Configuration page is used for overall system user and configuration management. You can add new users, change passwords, and update the SNMP and HTTP configurations. Each section is separate, and has its own Apply and Cancel buttons. To view the Management Configur ation page • Click Administration, either from the Security page, or from the menu bar, as a sub-menu under the Security item.
Managing System and Station Security The following fields appear on the Management Configuration page: Table 6.2.
Managing System and Station Security Table 6.2. Management Configuration page Field Description HTTP Configuration Use this section to enable secure browsing by creating an SSL certificate See below Enable Secure Browsing (SSL only) If the checkbox is marked, it indicates Secure Browsing (SSL) is enabled, and non-secured browsing is disabled.
Managing System and Station Security 4. Enter a password in the Password field. A password must contain at least 6 characters. 5. Re-enter the password in the Confirm Password field. 6. Click Apply. 7. Click Save to retain the new user after a reboot. To enable secure brow sing /create an SSL certi ficat e 1. In the HTTP Configuration section, select Enable Secure Browsing. 2. Select Create new SSL certificate. 3. Enter the system name. 4. Enter the domain name. 5. Click Apply.
Managing System and Station Security sub-menuViewing the Authentication Pages The Authentication pages allow you to configure authentication parameters. To vi ew the Aut he n ticat ion pages • Click Authentication, either from the Security page, or from the menu bar, as a sub-menu under the Security item. The Authentication pages display. The Authentication pages consist of the Authentication tab and the Server Manager tab. Figure 6.4.
Managing System and Station Security Table 6.3. Authentication tab Field Description Re-Keying Method For WPA SSIDs, the administrator determines if and how often re-keying to broadcast keys occurs.
Managing System and Station Security Figure 6.5. Server Manager Tab The following fields appear on the Server Manager tab: Table 6.4. Server Manager tab Field Description RADIUS Server IP Address IP Address of the RADIUS Server. If more than 1 address appears in the list, the following RADIUS Servers are used as backup (only if the previous RADIUS Servers cannot be reached). Shared Secret The Shared Secret is a secret that the unit shares with the RADIUS server.
Managing System and Station Security Viewing the SSID Pages SSIDs are supported in two modes; Non-VLAN and VLAN. Non-VLAN mode is presented first in this documentation. The reference section on security Introducing IEEE 802.11 and WS410 Security Concepts on page 68 may be helpful in reviewing the SSID pages. Following the presentation of Non-VLAN SSIDs is that of VLAN, see VLAN Introduction and Configuration on page 70.
Managing System and Station Security Figure 6.6. Editing SSID -- No VLANs mode The following fields appear on the Editing SSID page. For more information about Security Configurations, see also on page 76 Table 6.5. Editing SSID page Field Description Security Configuration Rev 1.1.
Managing System and Station Security Table 6.5. Editing SSID page Field Description Options Apply Click to have your changes take effect temporarily Save (from the menu) Click to have your changes remain in effect after a reboot Cancel Click to clear your changes; this is only possible if Apply or Save were not clicked Viewing and Configuring WEP Security - No VLANs mode To v iew t he SSID WEP Securi ty - No VLAN mode page s • Click the WEP radio button in the Editing SSID page (See figure below).
Managing System and Station Security Table 6.6. Field Description Security Keys This section dsplays when a security mode is chosen WEP Key # The key # (1-4) indicate the index of the WEP Key. WEP Key # The Key value is the hexadecimal value of the WEP key as stored in HW. For the WEP/40 this key holds 10 hexadecimal characters, for WEP/104 this key holds 26 hexadecimal characters. Options Rev 1.1.
Managing System and Station Security Viewing and Configuring WPA Security - No VLANs mode To v iew t he SSID WPA Securi ty - No VLAN mode pa ge s • Click on the SSID-VLAN Menu (See figure below). • From the Authentication drop down menu, select either WPA PSK, WPA RADIUS or WPA PSK + RADIUS. • Select either TKIP, TKIP + WEP/40 or TKIP + WEP/104 from the Encryption choice. • Enter up to 4 WEP keys.
Managing System and Station Security Introducing IEEE 802.11 and WS410 Security Concepts IEEE 802.11 security is supported by the WS410 in two modes; Non-VLAN and VLAN. In Non-VLAN mode, all associated stations share the same wireless media and therefore have a single broadcast domain. When a client associates to the SSID, security credentials are checked and encryption keys (both unicast and broadcast keys) are assigned.
Managing System and Station Security Authentication Combinations WS410 allows authentication of various types and in various combinations. • The basic 802.11 authentications are Open (none) and Shared Key. In Shared Key Authentication, the WEP key is used as the shared key. If the SSID is configured to Open + Shared Key, this means that both types of clients can associate to the AP.
Managing System and Station Security VLAN Introduction and Configuration Tagging VLANs While on the Wireless media the VLANs are identified by different broadcast keys, on the Ethernet interface they are identified by tags. The VLAN tag is added following the Ethernet header. The default VLAN has the VLAN ID equal to 1. All management traffic to and from WS410 is on this VLAN, however, the traffic that leaves the unit is untagged.
Managing System and Station Security 3. Select Security>SSID-VLAN from the menu on the left to get the list of pre-defined (and disabled) SSIDs. The SSID page is displayed in VLANs mode. NOTE: The look of the SSID page varies significantly when VLANs are enabled. Throughout the rest of this section the VLAN format is used. Figure 6.10. SSID Page in VLANs Mode The following information is displayed on the SSID Table.
Managing System and Station Security 4. Click an SSID name to edit its parameters (e.g. VLAN2) to edit its parameters. Figure 6.11. Editing SSID Page 5. Click Add VLAN at the bottom right of the window to configure the VLAN Parameters. The Add VLAN section of the page is displayed. Figure 6.12. Editing SSID Page with Add VLAN Section Rev 1.1.
Managing System and Station Security 6. In the Rename SSID field, enter an SSID Name to be used in Probe Responses. NOTE: Only the Primary SSID (the first SSID) is advertised in Beacons. These additional SSIDs are hidden SSIDs. 7. Check the SSID Enabled checkbox. This enables the SSID. 8. Configure all security parameters: Mode, Authentication, and Encryption as required. See on page 76. Keys are added in the Related VLAN section below. 9. Within the Related VLANs edit the VLAN Name and VLAN ID. 10.
Managing System and Station Security Figure 6.14. Editing SSID Add VLAN WPA Configuring Multiple VLANS per SSID The SSID acts as a "security template" - it determines the general security mode (WPA, WEP, etc.). The Security details (the keys themselves) are linked to the VLAN. Therefore, there is an option to assign multiple VLANs to the same "security template" which is the SSID. This option is applicable only when another authority (i.e.
Managing System and Station Security Configuring RADIUS Assigned VLANS Figure 6.15. Editing SSID with RADIUS -- Multiple VLANs 1. Perform steps 1-7 in Configuring VLANs on page 70 above. 2. Under Security Configuration, under Authentication, if you select WPA RADIUS or WPA PSK + RADIUS you enable RADIUS authentication. In this case, there is an option to edit multiple VLANs, one after the other. There can be up to 16 VLANs in the overall system. 3. Only one VLAN has the Default for SSID checkbox marked.
Managing System and Station Security Security Modes: Authentication and Encryption Methods The following are the different combinations of security modes. Security Mode Authentication Mode Encryption Mode None Open system None WEP • Open system • Shared key • Open system + Shared • WEP/40 • WEP/104 key WPA • PSK (Pre-shared key) • Radius • PSK + Radius • TKIP • TKIP+WEP/40 • TKIP+WEP/104 Authentication Combinations WS410 allows authentication of various types and in various combinations.
Managing System and Station Security PSK gets assigned to the default VLAN, while the clients that authenticate using RADIUS have their VLAN determined by the RADIUS. Encryption Methods Legacy 802.11 clients may connect Open (no encryption), or WEP. In WEP, the encryption key can be either 40bit or 104bit. In WPA, WS410 supports TKIP encryption. Since some clients may be legacy (supporting only WEP), WS410 has the capability to have SSIDs that support both WEP and TKIP clients.
Managing System and Station Security Rev 1.1.
Viewing Events CHAPTER 7 Viewing Events You can view and configure logs of system events. Viewing the Most Recent Events The Event Log page displays the systems most recent events. To display the event log • Click Event Log in the menu. The log of most recent system events displays. Figure 7.1.
Viewing Events The following fields appear on the Event Log page: Table 7.1. Event Log page Field Description Time Since Uptime The time the event occurred. The time of 0 is the time the system was last rebooted. Severity The severity of the event showing how serious event is: Information, Connection Flow, Warning, Critical, or the event type (e.g.
Viewing Events The following fields appear on the Full Event Log page: Table 7.2. Full Event Log page Field Description Total Eventst Number of total events in log Events per page Number of events shown per page; modifiable Page navigator Allows paging through log Time Since Uptime The time the event occurred. A time of 0 is the time the system was last rebooted Severity The severity of the event, showing how serious event is: Information, Warning, Critical, or the event type (e.g.
Viewing Events Table 7.3. Viewing the Full Event Log page Key Description Event Count indicates the total number of events that are in the internal file Events per page The number of events shown on a page. The user my change this value and hit the Arrow-in-a-square to activate the change. By default, there are 15 events per page.
Viewing Events The following fields appear on the Event Log Control page. Table 7.4.
Viewing Events Rev 1.1.
Upgrading the System Software CHAPTER 8 Upgrading the System Software From time to time there are revisions of the software. This section explains how to upgrade the software in your system. To u p gr a d e the e mb e d d e d s o f t w are i n W S 41 0 1. Log in to the management system through a web browser. Login instructions are available in the printed quick start guide and in the login section of the manual. Figure 8.1. Getting to Software Upgrade Tab 2. Click System on the menu bar.
Upgrading the System Software Figure 8.2. Software Upgrade Tab 4. In the Upgrade Properties area, in the Software Upgrade Protocol field, select either the TFTP or HTTP radio button. 5. If you select the TFTP radio button enter the TFTP Server IP Address and the System Software Path/File (TFTP upload) in the appropriate fields. 6. If you select the HTTP radio button, in the Upgrade System Software Path/File (HTTP upload) field, click Browse. The Choose file dialog is displayed.
Upgrading the System Software Figure 8.3. Done Successfully Popup For the upgrade to take effect, the system must be rebooted. 8. Click Reboot Now. A popup is displayed. Figure 8.4. Reboot in Progress 9. After Reboot is complete, the WEB GUI automatically brings you back to SW Upgrade tab, see Figure 8.2.
Upgrading the System Software Rev 1.1.
Appendix: Quick Start Guide to Wavion WS410 CHAPTER 9 Appendix: Quick Start Guide to Wavion WS410 This section explains how to quickly get started using the Wavion WS410. The intended audience for this guide is trained technical professionals.
Appendix: Quick Start Guide to Wavion WS410 4. Click Status on the menu. The Local Area Connection Status dialog is displayed. 5. Click Properties. The Local Area Connection Properties dialog is displayed. 6. Scroll down to Internet Protocol TCP/IP and double-click. Rev 1.1.
Appendix: Quick Start Guide to Wavion WS410 The Internet Protocol (TCP/IP) Properties dialog is displayed. 7. Select “Use the following IP address”. 8. In the IP address field, enter 192.168.1.2. 9. In the IP mask field, enter 255.255.255.0. 10.Click OK. Close all LAN dialogues. Log In After the WS410 is connected to a PC, you need to log in. To l o g in 1. Open the web browser. 2. Enter the IP address in the address bar. Default is 192.168.1.1. The login dialog is displayed.
Appendix: Quick Start Guide to Wavion WS410 Figure 9.1. Login dialog 3. Enter your user name. The default user name is admin. 4. Enter the password. The default password is admin. NOTE: User name and password are case sensitive. NOTE: Once you log in, you can change the user name and password from the Management Configuration screen. Click Security> Administration on the menu bar. 5. Click OK. The Home -- Summary Status page appears. Rev 1.1.
Appendix: Quick Start Guide to Wavion WS410 Figure 9.2. WS410 Home Page Becoming Oriented with the Application The Home page displays a summary of system data and links to other pages that allow management of this data. For the purposes of this quick start, you are instructed how to move from the Home page to the pages where the changes recommended in this guide are made. The pages, including the Home page, can also be reached from the menu bar.
Appendix: Quick Start Guide to Wavion WS410 Modifying the System Configuration From the Home page, click System Identity. (You can also get to this page by clicking System from the menu bar.) The System Configuration page is displayed. Figure 9.3. System Configuration Page. This page contains basic static information on the system, such as contact details, and IP addresses. Several changes are recommended on this page.
Appendix: Quick Start Guide to Wavion WS410 1. To allow entry of a new IP address, select Static from the Configured Boot Protocol dropdown list. 2. In the Configured IP Address field, enter the required IP address. NOTE: The system must be rebooted for these changes to take effect; for the quick start, you are instructed to reboot after the quick start procedure is completed.
Appendix: Quick Start Guide to Wavion WS410 Figure 9.4. Switched 802.11 b/g Page On this page you can configure the wireless interface. There are several recommendations for this page. Setting the Operational Channel Operational channels should be set up in such a way that if you have multiple units, they interfere with each other as little as possible. If you have up to three units, it is recommended to use channels 1, 6, and 11, as that minimizes interference between the channels.
Appendix: Quick Start Guide to Wavion WS410 Dynamic Interference Handling Refer to Chapter 4 for definition. The DIH provides which Channel to use based on he Total CCA Activity and the Noise Level. These values are only valid seven minutes after reboot and when the First System Calibration is complete. It can be configured Dynamically or Static Mode. Saving Changes 1. Click Apply. 2. Click Save. You are warned that it is necessary to reboot before the changes take effect.
Appendix: Quick Start Guide to Wavion WS410 Modifying the Security Configuration To displ ay t he Edit ing SSID page • On the Home page, in the AP Status area, click SSID. The Editing SSID page is displayed. Figure 9.6. Editing SSID. This page allows management of the security configuration. There are several changes recommended on this page. Renaming the SSID In the Rename SSID field, enter the correct SSID for the network of users to be served.
Appendix: Quick Start Guide to Wavion WS410 Setting the Encryption Type In the Encryption field, from the dropdown list; default is None. Saving Changes 1. Click Apply. 2. Click Save. Rebooting the System Several of the changes made during the quick start procedure require rebooting to take effect. After completing the procedure, reboot the system. To reboot t he WS410 1. From the menu, click System. The System Configuration page displays. Figure 9.7. System Configuration Page 2. Click Reboot.
Appendix: Quick Start Guide to Wavion WS410 Congratulations! You have now completed the quick start procedure. We hope you enjoy your experience with the WS410 and provide a reliable wireless networking experience to your customers. Rev 1.1.
Appendix: Troubleshooting C H A P T E R 10 Appendix: Troubleshooting We hope your experience with the WS410 is as smooth as possible. In this section we provide tips to solve some common problems. Problem Solution Unable to Ping or HTTP the New Unit • Check the Power • Is the AP Operational? Check the LED, make sure it showing Green on the Status • WS410 default IP Address is 192.168.1.
Appendix: Troubleshooting Rev 1.1.