Symbol ws5100 Sytem Ref Guide
Symbol ws5100 Sytem Ref Guide
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. Symbol is a registered
trademark of Symbol Technologies, Inc. All other product or service names are the property of their respective owners.
Contents
Chapter 1. Overview
1.1 Hardware Overview. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-1
1.1.1 Physical Specifications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-2
1.1.2 System Status LED Codes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-2
1.1.3 10/100/1000 Port Status LED Codes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-3
1.2 Software Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-4
1.2.1 Infrastructure Features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-4
1.2.2 Wireless Switching . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-7
1.2.3 Wired Switching . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-18
1.2.4 Management Features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-19
1.2.5 Security Features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-20
1.2.6 Access Port Support. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-26
Chapter 8. Diagnostics
8.1 Displaying the Main Diagnostic Interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-1
8.1.1 Switch Environment. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-2
8.1.2 CPU Performance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-3
8.1.3 Switch Memory Allocation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-4
8.1.4 Switch Disk Allocation. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-5
8.1.5 Switch Memory Processes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-6
8.1.6 Other Switch Resources . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-6
8.2 Configuring System Logging . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-7
8.2.1 Log Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-7
8.2.2 File Management. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-9
8.3 Reviewing Core Snapshots . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-14
8.3.1 Transferring Core Snapshots . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-14
8.4 Reviewing Panic Snapshots . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-16
8.4.1 Viewing Panic Details. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-17
8.4.2 Transferring Panic Files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-17
8.5 Debugging the Applet . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-19
8.6 Configuring a Ping . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-20
8.6.1 Modifying the Configuration of an Existing Ping Test. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-22
8.6.2 Adding a New Ping Test . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-23
8.6.3 Viewing Ping Statistics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-24
TOC-6 WS5100 Series Switch System Reference Guide
About This Guide
Introduction
This guide provides information about using the WS5100 Series Switch.
NOTE: Screens and windows pictured in this guide are samples and can differ from actual
screens.
Documentation Set
The documentation set for the WS5100 Series Switch is partitioned into the following guides to provide
information for specific user needs.
• WS5100 Installation Guide - describes the basic setup and configuration required to transition to more
advanced configuration of the switch.
• WS5100 CLI Reference - describes the Command Line Interface (CLI) and Management Information
Base (MIB) commands used to configure the WS5100 Series Switch.
• WS5100 Migration Guide - provides upgrade instructions and new feature descriptions for legacy
users of the WS5100 Series Switch.
• WS5100 Troubleshooting Guide- describes workarounds to known conditions the user may encounter.
• RF Management Software Users Guide - describes how to use Motorola RFMS to set up and monitor
your WS5100 in respect to areas of good RF throughput and defined physical barriers.
Document Conventions
The following conventions are used in this document to draw your attention to important information:
NOTE: Indicate tips or special requirements.
CAUTION: Indicates conditions that can cause equipment damage or data loss.
!
WARNING! Indicates a condition or procedure that could result in
personal injury or equipment damage.
viii WS5100 Series Switch System Reference Guide
Notational Conventions
The following additional notational conventions are used in this document:
• Italics are used to highlight the following:
• Chapters and sections in this and related documents
• Dialog box, window and screen names
• Drop-down list and list box names
• Check box and radio button names
• Icons on a screen.
• GUI text is used to highlight the following:
• Screen names
• Menu items
• Button names on a screen.
• bullets (•) indicate:
• Action items
• Lists of alternatives
• Lists of required steps that are not necessarily sequential
• Sequential lists (e.g., those that describe step-by-step procedures) appear as numbered lists.
Overview
The WS5100 switch is a centralized management solution for wireless networking. It connects to non-legacy
access ports through L2 or L3 (L2 is preferable, if the situation allows it).
Access ports function as radio antennas for data traffic management and routing. System configuration and
intelligence for the wireless network resides with the switch. The switch uses access ports to bridge data
to and from wireless devices. The wireless switch applies appropriate policies to data packets before
forwarding them to their destination.
All data packets to and from wireless devices are processed by the switch, where appropriate policies are
applied before they are decapsulated and sent to their destination.
Access port configuration is managed by the switch through a Web UI Graphical User Interface (GUI), SNMP
or the switch Command Line Interface (CLI).
1.1.2.1 Start Up
Power On Self Test (POST) running All colors in rotation All colors in rotation
1.1.2.2 Primary
1.1.2.3 Standby
1.2.1.4 Diagnostics
The following diagnostics are available:
1. In-service Diagnostics – In-service diagnostics provide a range of automatic health monitoring features
ensuring both the system hardware and software are in working order. In-service-diagnostics
continuously monitor available physical characteristics (as detailed below) and issue log messages when
warning or error thresholds are reached. There are three types of in-service diagnostics:
• Hardware – Ethernet ports, chip failures, system temperature via the temperature sensors provided
by the hardware, etc.
• Software – CPU load, memory usage, etc.
• Environmental – CPU and air temperature, fans speed, etc.
2. Out-of-service Diagnostics – Out-of-service diagnostics are a set of intrusive tests run from the user
interface. Out-of-service diagnostics cannot be run while the switch is in operation. Intrusive tests
include:
• Ethernet loopback tests
• RAM tests, Real Time Clock tests, etc.
3. Manufacturing Diagnostics – Manufacturing diagnostics are a set of diagnostics used by manufacturing
to inspect quality of hardware.
1-6 WS5100 Series Switch System Reference Guide
1.2.1.5 Serviceability
A special set of Service CLI commands are available to provide additional troubleshooting capabilities for
service personnel. For example, access to Linux services, panic logs, etc. Only authorized users or service
personnel are provided access to the Service CLI.
A built-in Packet Sniffer enables service personnel to capture incoming and outgoing packets in a buffer.
The switch also collects statistics for RF activity, Ethernet port activity etc. RF statistics include roaming
stats, packet counters, octets tx/rx, signal, noise SNR, retry, and information for each MU.
1.2.1.9 Redundancy
Using the switch redundancy, up to 12 switches can be configured in a redundancy group (and provide group
monitoring). In the event of a switch failure, an existing cluster member assumes control. Therefore, the
switch supported network is always up and running even if a switch fails or is removed for maintenance or
a software upgrade.
The following redundancy features are supported:
• Up to 12 switch redundancy members are supported in a single group. Each member is capable of
tracking statistics for the entire group in addition to their own.
• Each redundancy group is capable of supporting an Active/Active configuration. Each redundancy group
can support two or more primary members, each responsible for group load sharing.
Overview 1-7
• Members within the same redundancy group can be deployed across different subnets and maintain their
interdependence as redundancy group members.
• Each member of the redundancy group supports AP load balancing by default.
• Members of the redundancy group support license aggregation. When a new member joins the group,
the new member can leverage the access port adoption license(s) of existing members.
• Each member of the redundancy group (including the reporting switch) is capable of displaying cluster
performance statistics for all members in addition to their own.
• Centralized redundancy group management using the switch CLI.
For more information on configuring the switch for redundancy support, see
Configuring Switch Redundancy on page 5-33.
• Wireless Roaming
• Power Save Polling
• QoS
• Wireless Layer 2 Switching
• Automatic Channel Selection
• WMM-Unscheduled APSD
• Multiple VLANs per WLAN\
1.2.2.1 Adaptive AP
An adaptive AP (AAP) is an AP-51XX access point that can adopt like an AP300 (L3). The management of an
AAP is conducted by the switch, once the access point connects to the switch and receives its AAP
configuration.
An AAP provides:
• local 802.11 traffic termination
• local encryption/decryption
• local traffic bridging
• tunneling of centralized traffic to the wireless switch
An AAP’s switch connection can be secured using IP/UDP or IPSec depending on whether a secure WAN link
from a remote site to the central site already exists.
The switch can be discovered using one of the following mechanisms:
• DHCP
• Switch fully qualified domain name (FQDN)
• Static IP addresses
The benefits of an AAP deployment include:
• Centralized Configuration Management & Compliance - Wireless configurations across distributed sites
can be centrally managed by the wireless switch or cluster.
• WAN Survivability - Local WLAN services at a remote sites are unaffected in the case of a WAN outage.
• Securely extend corporate WLAN's to stores for corporate visitors - Small home or office deployments
can utilize the feature set of a corporate WLAN from their remote location.
• Maintain local WLAN's for in store applications - WLANs created and supported locally can be
concurrently supported with your existing infrastructure.
For an overview of AAP and how it is configured and deployed using the switch and access point, see
B.1 Adaptive AP Overview.
• Detect interference from other systems and avoid co-channeling with those systems (most notably
radar systems).
• Provide uniform spectrum loading across all devices.
This feature is enabled automatically when the country code indicates that DFS is required for at
least one of the frequency bands that are allowed in the country.
• TPC – Transmit Power Control (TPC) meets the regulatory requirement for maximum power and mitigation
for each channel. TPC functionality is enabled automatically for every AP that operates on the channel.
802.11bg
• Dual mode b/g protection – ERP builds on the payload data rates of 1 and 2 Mbit/s that use DSSS
modulation and builds on the payload data rates of 1, 2, 5.5, and 11 Mbit/s, that use DSSS, CCK, and
optional PBCC modulations. ERP provides additional payload data rates of 6, 9, 12, 18, 24, 36, 48, and 54
Mbit/s. The transmission and reception capability for 1, 2, 5.5, 11, 6, 12, and 24 Mbit/s data rates is
mandatory.
Two additional optional ERP-PBCC modulation modes with payload data rates of 22 and 33 Mbit/s are
defined. An ERP-PBCC station may implement 22 Mbit/s alone or 22 and 33 Mbit/s. An optional
modulation mode (known as DSSS-OFDM) is also incorporated with payload data rates of 6, 9, 12, 18,
24, 36, 48, and 54 Mbit/s.
• Short slot protection – The slot time is 20 µs, except an optional 9 µs slot time may be used when the
BSS consists of only ERP STAs capable of supporting this option. The optional 9 µs slot time should not
be used if the network has one or more non-ERP STAs associated. For IBSS, the Short Slot Time field is
set to 0, corresponding to a 20 µs slot time.
1.2.2.4 Proxy-ARP
Proxy ARP is provided for MU's in PSP mode whose IP address is known. The WLAN generates an ARP reply
on behalf of a MU (if the MU's IP address is known). The ARP reply contains the MAC address of the MU (not
the MAC address of switch). Thus, the MU does not awaken to send ARP replies (increasing MU battery life
and conserving wireless bandwidth).
If an MU goes into PSP without transmitting at least one packet, its Proxy ARP will not work.
2. A user ID/ Password and hotspot ESSID is issued by the site receptionist or IT staff.
3. The user connects their laptop to this ESSID
4. The laptop receives its IP configuration via DHCP. DHCP service can be provided by an external DHCP
server or provided by the internal DHCP server located on the switch.
5. The user opens a Web browser and connects to their home page.
6. The switch re-directs them to the hotspot Web page for authentication.
7. The user enters their User ID/ Password.
8. A Radius server authenticates the user.
9. Upon successful authentication, the user is directed to a Welcome Page that lists (among other things)
an Acceptable Use Policy.
10.The user agrees to the usage terms and is granted access to the Internet. (or other network services).
To redirect traffic from a default home page to a login page, the switch uses destination network address
translation (destination NAT is similar to the source NAT/ PAT but the destination IP address and port get
modified instead of the source as in traditional NAT). More specifically, when the switch receives an HTTP
Web page request from the user (when the client first launches its browser after connecting to the WLAN),
a switch protocol stack intercepts the request and sends back an HTTP response after modifying the network
and port address in the packet. Thus, acting like a proxy between the user and the Web site they are trying
to access.
To setup a hotspot, create a WLAN ESSID and select Hotspot authentication from the Authentication menu.
This is simply another way to authenticate a WLAN user, as it would be impractical to authenticate visitors
using 802.1x. For information on configuring a hotspot, see Configuring Hotspots on page 4-32.
NOTE: Each WS5100 can support a maximum of 48 access ports. However, port adoption
per switch is determined by the number of licenses acquired.
Fast Roaming
Using 802.11i can speed up the roaming process from one AP to another. Instead of doing a complete 802.1x
authentication each time a MU roams between APs, 802.11i allows a MU to re-use previous PMK
authentication credentials and perform a four-way handshake. This speeds up the roaming process. In
addition to reusing PMKs on previously visited APs, Opportunistic Key Caching allows multiple APs to share
PMKs amongst themselves. This allows an MU to roam to an AP it has not previously visited and reuse a
PMK from another AP to skip the 802.1x authentication.
Interswitch Layer 2 Roaming
An associated MU (connected to a switch) can roam to another access port connected to a different switch.
Both switches must be on the same L2 domain. Authentication information is not shared between the
switches, nor are buffered packets on one switch transferred to the other. Pre-authentication between the
switch and MU allows faster roaming.
International Roaming
The wireless switch supports international roaming per the 802.11d specification.
MU Move Command
As a value added proprietary feature between Motorola infrastructure products and Motorola MUs, a move
command has been introduced. The move command permits an MU to roam between ports connected to the
same switch without the need to perform the full association and authentication defined by the 802.11
standard. The move command is a simple packet up/packet back exchange with the access port. Verification
of this feature is dependent on its implementation in one or more mobile units.
Virtual AP
The switch supports multiple Basic Service Set Identifiers (BSSIDs). An access port capable of supporting
multiple BSSID's generates multiple beacons, one per BSSID. Hence, an AP that supports 4 BSSID's can send
4 beacons. The basic requirement for supporting multiple BSSID's is multiple MAC addresses, since each
BSSID is defined by its MAC address.
When multiple BSSID's are enabled, you cannot tell by snooping the air whether any pair of beacons is sent
out by the same physical AP or different physical AP. Hence the term "virtual AP's"- each virtual AP behaves
exactly like a single-BSSID AP.
Each BSSID supports 1 Extended Service Set Identifier (ESSID). Sixteen ESSIDs per switch are supported.
1.2.2.13 QoS
QoS provides a data traffic prioritization scheme. QoS reduces congestion from excessive traffic.
If there is enough bandwidth for all users and applications (unlikely because excessive bandwidth comes at
a very high cost), then applying QoS has very little value. QoS provides policy enforcement for mission-critical
applications and/or users that have critical bandwidth requirements when the switch’s bandwidth is shared
by different users and applications.
QoS helps ensure each WLAN on the switch receives a fair share of the overall bandwidth, either equally or
as per the proportion configured. Packets directed towards MUs are classified into categories such as
Overview 1-15
Management, Voice and Data. Packets within each category are processed based on the weights defined for
each WLAN.
The switch supports the following QoS mechanisms:
802.11e QoS
802.11e enables real-time audio and video streams to be assigned a higher priority over data traffic. The
switch supports the following 802.11e features:
• Basic WMM
• WMM Linked to 802.1p Priorities
• WMM Linked to DSCP Priorities
• Fully Configurable WMM
• Admission Control
• Unscheduled-APSD
• TSPEC Negotiation
• Block ACKQBSS Beacon Element
802.1p Support
802.1p is a standard for providing QoS in 802-based networks. 802.1p uses three bits to allow switches to
re-order packets based on priority level. 802.1p uses the Generic Attributes Registration Protocol (GARP) and
the GARP VLAN Registration Protocol (GVRP). GARP allows MUs to request membership within a multicast
domain, and GVRP lets them register to a VLAN.
Voice QoS
When switch resources are shared between a Voice over IP (VoIP) conversation and a file transfer, bandwidth
is normally exploited by the file transfer, thus reducing the quality of the conversation or even causing it to
disconnect. With QoS, a VoIP conversation (a real-time session), receives priority, maintaining a high level of
voice quality. Voice QoS ensures:
• Strict Priority
• Spectralink Prioritization
• VOIP Prioritization (IP ToS Field)
• Multicast Prioritization
Data QoS
The switch supports the following data QoS techniques:
• Egress Prioritization by WLAN
• Egress Prioritization by ACL
DCSCP to AC Mapping
The switch provides arbitrary mapping between Differentiated Services Code Point (DCSCP) values and
WMM Access Categories. This mapping can be set manually.
1-16 WS5100 Series Switch System Reference Guide
1.2.3.2 DDNS
Dynamic DNS (DDNS) keeps a domain name linked to a changing IP address. Typically, when a user connects
to a network, the user’s ISP assigns it an unused IP address from a pool of IP addresses. This address is only
valid for a short period. Dynamically assigning IP addresses increases the pool of assignable IP addresses.
DNS maintains a database to map a given name to an IP address used for communication on the Internet.
The dynamic assignment of IP addresses makes it necessary to update the DNS database to reflect the
current IP address for a given name. Dynamic DNS updates the DNS database to reflect the correct mapping
of a given name to an IP address.
WPA
WPA is designed for use with an 802.1X authentication server, which distributes different keys to each user.
However, it can also be used in a less secure pre-shared key (PSK) mode, where every user is given the same
passphrase.
WPA uses Temporal Key Integrity Protocol (TKIP), which dynamically changes keys as the system is used.
When combined with the much larger Initialization Vector, it defeats well-known key recovery attacks on
WEP. For information on configuring WPA for a WLAN, see Configuring WPA/WPA2 using TKIP and CCMP
on page 4-51.
WPA2
WPA2 uses a sophisticated key hierarchy that generates new encryption keys each time a MU associates
with an access point. Protocols including 802.1X, EAP and Radius are used for strong authentication. WPA2
also supports the TKIP and AES-CCMP encryption protocols. For information on configuring WPA for a WLAN,
see Configuring WPA/WPA2 using TKIP and CCMP on page 4-51.
Keyguard-WEP
KeyGuard is Motorola’s proprietary dynamic WEP solution. Motorola (upon hearing of the vulnerabilities of
WEP) developed a non standard method of rotating keys to prevent compromises. Basically, KeyGuard is TKIP
without the message integrity check. KeyGuard is proprietary to Motorola MUs only. For information on
configuring KeyGuard for a WLAN, see Configuring WEP 128 / KeyGuard on page 4-49.
1.2.5.2 MU Authentication
The switch uses the following authentication schemes for MU association:
• Kerberos
• 802.1x EAP
• MAC ACL
Refer to Editing the WLAN Configuration on page 4-24 for additional information.
Kerberos
Kerberos allows for mutual authentication and end-to-end encryption. All traffic is encrypted and security
keys are generated on a per-client basis. Keys are never shared or reused, and are automatically distributed
in a secure manner. For information on configuring Kerberos for a WLAN, see
Configuring Kerboros on page 4-31.
802.1x EAP
802.1x EAP is the most secure authentication mechanism for wireless networks and includes
EAP-TLS, EAP-TTLS and PEAP. The switch is a proxy for Radius packets. An MU does a full 802.11
authentication and association and begins transferring data frames. The switch realizes the MU needs to
authenticate with a Radius server and denies any traffic not Radius related. Once Radius completes its
authentication process, the MU is allowed to send other data traffic. You can use either an onboard Radius
server or internal Radius Server for authentication. For information on configuring 802.1x EAP for a WLAN,
see Configuring 802.1x EAP on page 4-30.
MAC ACL
The MAC ACL feature is basically a dynamic MAC ACL where MUs are allowed/denied access to the network
based on their configuration on the Radius server. The switch allows 802.11 authentication and association,
then checks with the Radius server to see if the MAC address is allowed on the network. The Radius packet
1-22 WS5100 Series Switch System Reference Guide
uses the MAC address of the MU as both the username and password (this configuration is also expected
on the Radius server). MAC-Auth supports all encryption types, and (in case of 802.11i) the handshake is
completed before the Radius lookup begins. For information on configuring 802.1x EAP for a WLAN, see
Configuring MAC Authentication on page 4-40.
1.2.5.4 MU to MU Allow
MU to MU allow enables frames from one MU (where the destination MAC is that of another MU) to be
switched to the second MU.
1.2.5.5 MU to MU Disallow
Use MU to MU Disalllow to restrict MU to MU communication within a WLAN. The default is ‘no’, which
allows MUs to exchange packets with other MUs. It does not prevent MUs on other WLANs from sending
packets to this WLAN. You would have to enable MU to MU Disallow on the other WLAN.
1.2.5.6 Switch-to-Wired
MU frames are switched out to the wired network (out of the switch). Another upstream device decides
whether the frame should be sent back to the second MU, and if so it sends the frame back to the switch,
and it is switched out just like any other frame on the wire. This allows a drop/allow decision to be made by
a device other than the wireless switch.
1.2.5.8 WIDS
The Motorola Wireless Intrusion Dectection System (WIDS) monitors for any presence of unauthorized rogue
access points. Unauthorized attempts to access the WLAN is generally accompanied by anomalous behavior
as intruding MUs try to find network vulnerabilities. Basic forms of this behavior can be monitored and
reported without needing a dedicated WIDS. When the parameters exceed a configurable threshold, the
switch generates an SNMP trap and reports the result via the management interfaces. Basic WIDS
functionality does not require monitoring APs and does not perform off-channel scanning.
NOTE: Wired side scanning for Rogue APs using WNMP is not supported. Similarly,
Radius lookup for approved AP is not provided.
Authorized AP Lists
Configure a list of authorized access ports based on their MAC addresses. The switch evaluates the APs
against the configured authorized list after obtaining Rogue AP information from one of the 2 mechanisms
as mentioned in Rogue AP Detection on page 1-23.
Rogue AP Report
After determining which are authorized APs and which are Rogue, the switch prepares a report.
Motorola RFMS Support
With this most recent switch firmware release, the switch can provide rogue device detection data to the
Motorola RF Management software application (or Motorola RFMS). Motorola RFMS uses this data to refine
the position and display the rogue on a site map representative of the physical dimensions of the actual radio
coverage area of the switch. This is of great assistance in the quick identification and removal of
unauthorized devices.
1.2.5.10 ACLs
ACLs control access to the network through a set of rules. Each rule specifies an action taken when a packet
matches a set of rules. If the action is deny, the packet is dropped. If the action is permit, the packet is
Overview 1-25
allowed. If the action is to mark, the packet is tagged for priority. The switch supports the following types of
ACLs:
• IP Standard ACLs
• IP Extended ACLs
• MAC Extended ACLs
• Wireless LAN ACLs
ACLs are identified by a number or a name (the exception being MAC extended ACLs which take only name
as their identifier). Numbers are predefined for IP Standard and Extended ACLs, whereas a name can be any
valid alphanumeric string not exceeding 64 characters. With numbered ACLs, the rule parameters have to be
specified on the same command line along with the ACL identifier. For named ACLs, rules are configured
within a separate CLI context. For information on creating an ACL, see
Configuring ACLs on page 6-17.
1.2.5.13 NAT
Network Address Translation (NAT) is supported for non-IPSec packets routed by the switch. The following
types of NAT are supported:
• Port NAT– Port NAT (also known as NAPT) entails multiple local addresses are mapped to single global
address and a dynamic port number. The user is not required to configure any NAT IP address. Instead IP
1-26 WS5100 Series Switch System Reference Guide
address of the public interface of the switch is used to NAT packets going out from private network and
vice versa for packets entering private network.
• Static NAT– Static NAT is similar to Port NAT with the only difference being that it allows the user to
configure a source NAT IP address and/or destination NAT IP address to which all the packets will be
NATted to. The source NAT IP address is used when hosts on a private network are trying to access a
host on a public network. A destination NAT IP address can be used for public hosts to talk to a host on
a private network.
1.2.5.15 NAC
Using Network Access Control (NAC), the switch hardware and software grants access to specific network
resources. NAC performs a user and MU authorization check for resources that do not have a NAC agent.
NAC verifies a MU’s compliance with the switch’s security policy. The switch supports only the EAP/802.1x
type of NAC. However, the switch also provides a mean to bypass NAC authentication for MU’s that do not
have NAC 802.1x support (printers, phones, PDAs etc.). For information on configuring NAC support, see
Configuring NAC Server Support on page 4-44.
2. Enter the User ID admin, and Password superuser. Both are case-sensitive. Click the Login button.
NOTE: If using HTTP to login into the switch, you may encounter a Warning screen if a
self-signed certificate has not been created and implemented for the switch. This warning
screen will continue to display on future login attempts until a self-signed certificate is
implemented. Motorola recommends only using the default certificate for the first few
login attempts until a self-signed certificate can be generated.
NOTE: If your password is lost, there is a means to access the switch, but you are forced
to revert the switch back to its factory default settings and lose your existing
configuration (unless saved to a secure location). Consequently, Motorola recommends
keeping the password in a secure location so it can be retrieved. For information on
password recovery, see Switch Password Recovery on page 2-3.
Once the Web UI is accessed, the Switch main menu item displays a configuration tab with high-level
switch information. Click the Show Dashboard button to display an overall indicator of switch health.
Once the switch is fully configured, the dashboard is the central display for the user to view the version
Switch Web UI Access and Image Upgrades
of firmware running on the switch, quickly assess the last 5 alarms generated by the switch, view the
status of the switch’s Ethernet connections and view switch CPU and memory utilization statistics.
NOTE: The chapters within this System Reference Guide are arranged to be
complimentary with the main menu items in the menu tree of the switch Web UI. Refer to
this content to configure switch network addressing, security and diagnostics as required.
Username: restore
Password: restoreDefaultPasword
WARNING: This will wipe out the configuration (except license key) and user
data under "flash:/" and reboot the device
Do you want to continue? (y/n):
3. Press Y to delete the current configuration and reset factory defaults.
The switch will login into the Web UI with its reverted default configuration. If you had exported the
switch’s previous configuration to an external location, it now can be imported back to the switch. For
information on importing switch configuration files, see Transferring a Config File on page 3-19.
2-4 WS5100 Series Switch System Reference Guide
CAUTION: After upgrading the switch baseline from 1.4.x or 2.x to the 3.x baseline,
! applet caching can produce unpredictable results and contents. After the upgrade, ensure
your browser is restarted. Otherwise, the credibility of the upgrade can come into
question.
CAUTION: The 3.x version WS5100 switch uses 3 unique (default) SNMPv3 user names
! and passwords for MD5 authentication and DES privacy. If upgrading your configuration
from a 1.4.x or 2.x baseline, you will need to change your SNMPv3 usernames and
passwords to ensure SNMPv3 interoperation.
2.3.1 Upgrading the Switch Image from 1.4.x or 2.x to Version 3.x
To upgrade a switch running either a 1.4.x or 2.x version to the latest 3.x version switch firmware:
1. Execute the PreUpgradeScript utility (or use the CLI) to ensure there is enough space on your system to
perform the upgrade. The PreUpgradeScript utility should be in the same directory as the upgrade files.
2. Install the Cfgupgrade1.x-setup utility on a Windows desktop system by double clicking the
Cfgupgrade 1.x-setup file.
Follow the prompts displayed by the installer to install Cfgupgrade 1.x-setup.
A WS5100 Configuration Upgrade icon gets created within the Program Files folder. The icon can be
optionally created on your Windows desktop as well.
Switch Web UI Access and Image Upgrades
3. From the WS5100 running either 1.4.x or 2.x, create a configuration and save it on the switch.
WS5100# save <file name> <.cfg>
This is the configuration that will be upgraded to the new 3.x baseline.
Configuration files are tracked by their MD5 checksum. If a file is renamed, it will still have the same md5
sum. Once a file has been loaded it will not be reloaded, even if the local configuration information is
changed.
The requested image file version (if any) is checked against the current version before any attempt is made
to load it. If the requested version is the same as the running version, no action is taken. If the image file
version (embedded in the file header) does not match the expected version, no further action is taken. If the
version has not been specified, the image file header is compared to the local version. If they are the same,
no action is taken.
NOTE: Once the system has been operating for ten minutes, Auto Install is disabled,
though it may still be reconfigured. This is to prevent the system from attempting to re-
install each time a DHCP lease is renewed.
URLs and the version string are set as text and can be cleared using an empty pair of double quotes to denote
the blank string. In the following example, define the three URLs and the expected version of the image file,
then enable all three features for the auto install.
WS5100(config)#autoinstall config url ftp://ftp:[email protected]/ws5100/
config
WS5100(config)#autoinstall cluster-config url ftp://ftp:[email protected]/
ws5100/cluster-config
WS5100(config)#autoinstall image url ftp://ftp:[email protected]/ws5100/
images/WS5100.img
WS5100(config)#autoinstall image version 3.1.0.0-XXXXX
WS5100(config)#autoinstall config
WS5100(config)#autoinstall cluster-config
WS5100(config)#autoinstall image
WS5100(config)#show autoinstall
feature enabled URL
config yes ftp://ftp:[email protected]/ws5100/config
cluster cfg yes ftp://ftp:[email protected]/ws5100/cluster-config
image yes ftp://ftp:[email protected]/ws5100/images/WS5100.img
expected image version 3.1.0.0-XXXXX
Once again, for DHCP option based auto install the URLs is ignored and those passed by DHCP are not stored.
Whenever a string is blank it is shown as --not-set--.
5. Reset the AP if you changed the AP's IP address, buy displaying the System Summary and selecting the
Reset AP option. If you reset the AP-4131 you will need to login as Admin again.
Switch Web UI Access and Image Upgrades
This chapter describes the Switch main menu information used to configure the WS5100. This chapter
consists of the following sections:
• Viewing the Switch Interface
• Viewing Switch Port Information
• Viewing Switch Configurations
• Viewing Switch Firmware Information
• Switch File Management
• Configuring Automatic Updates
• Viewing the Switch Alarm Log
• Viewing Switch Licenses
• How to use the Filter Option
NOTE: HTTPS must be enabled to access the switch applet. Ensure HTTPS access has
been enabled before using the login screen to access the switch applet.
NOTE: When the switch’s configuration is successfully updated (using the Web UI), the
effected screen is closed without informing the user their change was successful.
However, if an error were to occur, the error displays within the effected screen’s Status
field and the screen remains displayed. With file transfer operations, the transfer screen
remains open during the transfer and remains open upon completion (with status
displayed within the Status field).
3. The system prompts the user for the correct Country code after the first login.
A warning message could display stating that an incorrect country setting will lead to an illegal use of
the switch. Selecting the correct country is extremely important. Each country has its own regulatory
restrictions concerning electromagnetic emissions (channel range) and the maximum RF signal strength
transmitted. To ensure compliance with national and local laws, be sure to set the Country correctly.
4. Refer the System field to view or define the following information:
Switch Information 3-3
System Name Displays the designated system name. Provide a system name serving as a
reminder of the user base the switch supports (engineering, retail, etc.).
Location The Location parameter serves as a reminder of where the switch can be found.
Define the System Name as a specific identifier of the switch’s location. Use the
System Name and Location parameters together to optionally define the switch
name by the radio coverage type it supports and physical location. For example,
“second floor engineering.”
Contact Displays a Contact value for system administration and troubleshooting. This
name should be the network administrator responsible for switch operations.
Uptime Displays the current operational time for the device name defined within the
System Name field. Uptime is the cumulative time since the switch was last
rebooted or lost power.
Firmware Displays the current firmware version running on the switch. This version should
be periodically compared to the most recent version available on the Motorola
Web site, as versions with increased functionality are periodically released.
AP Licenses Displays the number of access port licenses currently available for the switch. This
value represents the maximum number of access ports the switch is licensed to
adopt.
Date (MM/DD/ Displays the day, month and year currently used with the switch.
YYYY)
Time Zone Use the drop-down menu to specify the time zone used with the switch. Adjusting
the time zone will in turn, cause an adjustment to the time displayed.
Country Use the drop-down menu to specify the correct country of operation. Selecting the
country incorrectly could render your switch as operating illegally.
7. Click the Show Dashboard button to display a screen with important indicators of switch health and
status. For more information, see Viewing Dashboard Details. Referencing the Details screen is
recommended before new configurations are employed that utilize increased switch bandwidth.
8. Click the Reset Password button to display a screen to reset the password.
Enter the new password within the Password and Confirm Password fields and click OK.
NOTE: When entering a new password for the switch, please note that the password
must be a minimum of 8 characters long.
9. Click the Apply button to save the updates (to the Time Zone or Country parameters specifically).
10.Click the Revert button to undo any changes.
Click the Show Dashboard button (within the Switch screen’s Configuration tab) to display the current
health of the switch.
The Dashboard screen displays the current health of the switch and is divided into fields representing the
following important diagnostics:
• Alarms
• Ports
• Environment
• CPU/Memory
• File Systems
Apart from the sections mentioned above, it also displays the following status:
Redundancy State Displays the Redundancy State of the switch. The status can be either Enabled or
Disabled.
• Enabled - Defined a green state.
• Disabled - Defined by a yellow state.
Firmware Displays the Firmware version of the current software running on the wireless
switch.
Access Ports Displays the total number of access ports adopted by the switch.
Mobile Units Displays the total number of MUs associated with the switch.
Up Time Displays the actual switch uptime. The Uptime is the current operational time of
the device defined within the System Name field. Uptime is the cumulative time
since the switch was last rebooted or lost power.
1. Refer to the Alarms field for details of all the unacknowledged alarms generated during the past 48
hours. The alarms are classified as:
• Critical — Denoted by a red indicator. These alarms warrant immediate attention.
• Major — Denoted by a yellow indicator. These alarms warrant attention.
• Others — Denoted by a blue indicator.
The alarms field also displays details (in a tabular format) of the 5 most recent unacknowledged critical/
major alarms raised during the past 48 hours. The table displays the following details:
Severity Displays the severity of the alarm. It can be either Critical or Major.
Last Occurrence Displays the time when the alarm was reported.
Displays the number of times during the past 48 hours such an alarm was
# Occurrences generated.
2. Refer to the Ports field for link, speed and duplex status of each physical port on the switch’s front panel.
It displays the following details in a tabular format:
Speed Displays the speed at which the port transmits or receives data.
Duplex Displays the status of the port, either— Full Duplex or Unknown.
3. The Environment section displays the CPU temperature and switch fan speed. It displays the valid
threshold range set by the user.
4. The CPU/Memory section displays the free memory available with the RAM.
5. The File Systems section displays the free file system available for:
• flash
• nvram
• system
Switch Information 3-7
3. Refer to the Switch Statistics field for the following read-only information about associated MUs:
Number of MUs Displays the total number of MUs currently associated to the switch.
Associated
Number of APs Displays the total number of access ports currently adopted by the switch.
Adopted
Number of Radios Displays the total number of radios currently adopted by the switch.
Adopted
4. Refer to the Traffic field to assess network traffic for associated APs and radios:
Pkts per second Displays the packet transmission rate for received and transmitted packets over
last 30 seconds and 1 hour.
Throughput Displays the traffic throughput for packets received, packets transmitted and total
packets over last 30 seconds and 1 hour. The throughput value can help identify
network bandwidth and utilization issues negatively impacting performance.
3-8 WS5100 Series Switch System Reference Guide
Avg. Bit Speed Displays the average bit speed for the switch over last 30 seconds and 1 hour. Use
the average bit speed value to help determine overall network speeds and
troubleshoot network congestion.
% Non-unicast pkts Displays the percentage of non-unicast packets seen (received & transmitted) by
the switch over last 30 seconds and 1 hour. Non-unicast traffic includes both
multicast and broadcast traffic.
5. The RF Status section displays the following read-only RF radio signal information for associated APs
and radios:
Avg Signal Displays the average signal strength for MUs associated with the switch over the
last 30 seconds and 1 hour. Typically, the higher the signal, the closer the MU.
Avg Noise Displays the average RF noise for all MUs associated with the selected WLAN.
MU noise for the last 30 seconds is displayed in black and the number in blue
represents MU noise for the last hour. If MU noise is excessive, consider moving
the MU closer to the access port, or in area with less conflicting network traffic.
Excessive noise may also be an indication of network interference.
Avg SNR Displays the average Signal to Noise Ratio (SNR) for all MUs associated with the
switch. The Signal to Noise Ratio is an indication of overall RF performance on the
wireless network.
6. Refer to the Errors field for read-only packet error and loss information for associated access ports and
radios:
Average Number of Displays the average number of retries for all MUs associated with the switch.
Retries The number in black represents average retries for the last 30 seconds and the
number in blue represents average retries for the last hour.
% Gave Up Pkts Displays the percentage of packets which the switch gave up on for all MUs
associated with the switch. The number in black represents this statistic for the
last 30 seconds and the number in blue represents this statistic for the last hour.
% Non-decryptable Displays the percentage of undecryptable packets for all MUs associated with the
Pkts switch. The number in black represents undecryptable pkts for the last 30 seconds
and the number in blue represents undecryptable pkts for the last hour.
Name Displays the current port name. By default, eth1 and eth2 are available.
MAC Address Displays the port’s MAC Address. This value is read-only, set at the factory and
cannot be modified.
Speed Displays the current speed of the data transmitted and received over the port.
3. Select a port and click the Edit button to modify the port configuration. For additional information, see
Editing the Port Configuration.
Speed Select the speed at which the port can receive and transmit the data. Select from
the following range:
• 10 Mbps
• 100 Mbps
• 1000 Mbps
• Auto
Duplex Modify the duplex status by selecting one of the following options:
• Half
• Full
• Auto
Channel Group (0-4) Optionally, set the Channel Group (0-4) defined for the port. The switch bundles
individual Ethernet links (over the selected channel) into a single logical link that
provides bandwidth between the switch and another switch or host. The port
speed used is dependant on the Duplex value selected (full, half or auto). If a
segment within a channel fails, traffic previously carried over the failed link is
routed to the remaining segments within the channel. A trap is sent upon a failure
identifying the switch, channel and failed link.
Description Enter a brief description for the port. The description should reflect the port’s
intended function to differentiate it from others with similar configurations.
Admin Status Either Enable (activate) or Disable (inactivate) the admin status of the port.
Medium Displays the current (read-only) connection medium used by this port.
Read-only details about the port’s cabling connection also display within the Edit screen. This information
should be used to determine the configuration defined for this port.
5. Click the OK button to commit the changes made to the port configurations.
6. Click Cancel to disregard any changes and revert back to the last saved configuration.
MAC Address Displays the port’s MAC Address. This value is read-only, set at the factory and
cannot be modified.
Oper Status Displays the operational status of the port. The port status can be either Up or
Down.
Speed Displays the current speed of the data transmitted and received over the port. Is
the speed slow in respect to the data type proliferating the port’s supported
network segment?
MTU Displays the maximum transmission unit (MTU) setting configured on the port. The
MTU value represents the largest packet size that can be sent over a link. The
MTU is determined by the underlying network, but must be taken into account at
the IP level. IP packets (which can be up to 64K bytes each) must be packaged into
lower-level packets of the appropriate size for the underlying network(s) and re-
assembled on the other end. 10/100 Ethernet ports have a maximum MTU setting
of 1500.
Packets In Dropped Displays the number of packets dropped by the port. If the number appears
excessive, a different port could be required.
Packets In Error Displays the number of erroneous packets received by the port. If the number
appears excessive, a different port could be required.
Bytes Out Displays the total number of bytes transmitted by the port.
Packets Out Displays the total number of packets transmitted (sent) by the port. A low value
could be an indication of a network problem.
Packets Out Dropped Displays the total number of transmitted packets dropped. A high value may be an
indication of network issues.
Packets Out Error Displays the total number of erroneous transmitted packets.
4. Select a port and click on Details button to see the detailed port statistics. For more information, refer
to Detailed Port Statistics.
5. Select a port and click on Graph button to view the port statistics in a graphical format. For more
information, refer to Viewing the Port Statistics Graph.
3-14 WS5100 Series Switch System Reference Guide
3. The Interface Statistics screen displays. This screen displays the following statistics for the selected
port:
MAC Address Displays physical address information associated with the interface. This address
is read-only (hard-coded at the factory) and cannot be modified.
Input Unicast Displays the number of unicast packets (packets directed towards the interface)
Packets received on the interface.
Input NonUnicast Displays the number of NonUnicast Packets (Multicast and Broadcast Packets)
Packets received on the interface.
Input Total Packets Displays the total number of packets received on the interface.
Input Packets Displays the number of received packets dropped by the interface by the input
Dropped Queue of the hardware unit /software module associated with the VLAN. Packets
are dropped when the input Queue is full or unable to processing incoming traffic.
Input Packets Error Displays the number of packets with errors received on the interface. Input Packet
Errors are input errors due to; no buffer space/ignored packets due to broadcast
storms, packets larger than maximum packet size, framing errors, input rate
exceeding the receiver's date handling rate or cyclic redundancy check errors. In
all of these cases, an error is reported and logged.
Output Bytes Displays the number of bytes transmitted from the interface.
Switch Information 3-15
Output Unicast Displays the number of unicast packets (packets directed towards a single
Packets destination address) transmitted from the interface.
Output NonUnicast Displays the number of unicast packets transmitted from the interface.
Packets
Output Total Packets Displays the total number of packets transmitted from the interface.
Output Packets Displays the number of transmitted packets dropped from the interface. Output
Dropped Packets Dropped are packets dropped when the output queue of the device
associated with the interface is saturated.
Output Packets Error Displays the number of transmitted packets with errors. Output Packet Errors are
the sum of all the output packet errors, malformed packets and misaligned packets
received.
4. The Status is the current state of the requests made from the applet. Requests are any “SET/GET”
operation from the applet. The Status field displays error messages if something goes wrong in the
transaction between the applet and the switch.
5. Click on the Refresh button to refresh the port statistics.
6. Click on the Close button to exit out of the screen.
The Interface Statistics screen displays for the selected port. The screen provides the option to view
the following:
• Input Bytes
• Input Pkts Dropped
• Output Pkts Total
• Output Pkts Error
• Input Pkts Total
• Input Pkts Error
• Output Pkts NUCast
• Input Pkts NUCast
• Output Bytes
• Output Pkts Dropped
3. Display any of the above by selecting the checkbox associated with it.
NOTE: You are not allowed to select (display) more than four parameters at any given
time.
NOTE: To view the entire switch configuration using SNMP, the switch CLI provides a
better medium to review the entire switch configuration.
The following information is displayed in tabular format. Configuration files (with the exception of
startup-config and running-config) can be edited, viewed in detail or deleted.
Size (Bytes) Displays the size (in bytes) of each available configuration file.
3-18 WS5100 Series Switch System Reference Guide
Created Displays the date and time each configuration file was created. Use this
information as a baseline for troubleshooting problems by comparing event log
data with configuration file creation data.
Modified Displays the date and time each configuration file was last modified. Compare this
column against the Created column to discern which files were modified and make
informed decisions whether existing files should be further modified or deleted.
2. To view the contents of a config file in detail, select a config file by selecting a row from the table and
click the View button. For more information, see Viewing the Detailed Contents of a Config File.
3. Select a configuration (other than the start-up-config or running config) and click the Install button to
install the file on the switch and replace the existing startup-config file.
If a file (for example, sample-config) is selected, a message displays stating, “When sample-config is
installed, it will replace start-up config. Are you sure you want to install sample-config.” Click Yes to
continue.
NOTE: Selecting either the startup-config or running-config does not enable the Edit
button. A different configuration must be available to enable the Edit function for the
purposes of replacing the existing startup-config.
4. To permanently remove a file from the list of configurations available to the switch, select a configuration
file from the table and click the Delete button.
If startup-config is deleted, a prompt displays stating the default switch startup-config will automatically
take its place. The switch running-config cannot be deleted.
5. To restore the system’s default configuration and revert back to factory default, click the Restore
Defaults button.
NOTE: After setting the switch to revert to factory default settings, the system must be
rebooted before the default settings take effect. When this occurs, the switch IP address
may change.
6. Click the Transfer Files button to move a target configuration file to a secure location for later use. For
more information, see Transferring a Config File.
Use the up and down navigation facilities on the right-hand side of the screen to view the entire page.
3. The Page parameter displays the portion of the configuration file in the main viewing area.
The total number of pages in the file are displayed to the right of the current page. The total number of
lines in the file display in the Status field at the bottom of the screen.
Scroll to corresponding pages as required to view the entire contents of the file. To navigate to a specific
page, enter the page number in the text area (next to Page item) and click on the Go button. The source
parameter differs depending on the source selected.
4. Refer to the Status field for the current state of the requests made from the applet. Requests are any
“SET/GET” operation from the applet. The Status field displays error messages if something goes wrong
in the transaction between the applet and the switch.
5. Click the Refresh button to get the most recent updated version of the configuration file.
6. Click Close to close the dialog without committing updates to the running configuration.
1. Click the Transfer Files button on the bottom of the Configuration screen.
2. Refer to the Source field to define the location and address information for the source config file.
From Select the location representing the source file’s current location using the From
drop-down menu. Options include Server, Local Disk and Switch.
File Specify a source file for the file transfer. If the switch is selected, the file used at
startup automatically displays within the File parameter.
Using Refer to the Using drop down-menu to configure whether the log file transfer is
conducted using FTP or TFTP. FTP transfers require a valid user ID and password.
IP Address Enter the IP Address of the server or system receiving the source configuration.
Ensure the IP address is valid or risk jeopardizing the success of the file transfer.
User ID Enter the User ID credentials required to transfer the configuration file from a FTP
server.
Password Enter the Password required to send the configuration file from an FTP server.
Path Specify an appropriate Path name to the target directory on the local system disk
or server. The Target options are different depending on the target selected.
3. Refer to the Target field to specify the details of the target file.
To Use the To drop-down menu to define the location of the configuration file.
Options include the switch (default location), external server or local disk.
File Use the File field to specify a target file for the file transfer. Use the File Browser
icon to search attached files systems for target file location.
4. Refer to the Status field for the current state of the requests made from the applet. Requests are any
“SET/GET” operation from the applet. The Status field displays error messages if something goes wrong
in the transaction between the applet and the switch.
5. Click the Transfer button when ready to move the target file to the specified location. Repeat the process
as necessary to move each desired configuration file to the specified location.
6. Click the Abort button to cancel the file transfer process before it is complete.
7. Click the Close button to exit the Transfer screen and return to the Config Files screen. Once a file is
transferred, there is nothing else to be saved within the Transfer screen.
Switch Information 3-21
Image Displays whether a firmware image is the primary image or a secondary image.
The primary image is typically the image loaded when the switch boots.
Version Displays a unique alphanumeric version for each firmware file listed.
Current Boot A check mark within this column designates this version as the version used by the
switch the last time it was booted. An “X” in this column means this version was
not used the last time the switch was booted.
Next Boot A check mark within this column designates this version as the version to be used
the next time the switch is booted. An “X” in this column means this version will
not be used the next time the switch is booted. To change the boot designation,
highlight an image and click the Edit button.
Built Time Displays the time the version was created (built). Do not confuse the Built Time
with the time the firmware was last loaded on the switch.
Install Time The Install Time is the time this version was loaded with on the switch.
Periodically review this information to assess the relevance of older files.
3-22 WS5100 Series Switch System Reference Guide
3. Refer to the Patch field for a listing of those Patches available to the switch. The name and version of
each patch file is displayed. Each patch file has an associated .txt file designation. the text file describes
nuances associated with the file that may make it optimal for use with the switch.
4. Select an existing firmware version and click the Edit button to change the firmware version used when
the switch is booted the next. For more information, see Editing the Switch Firmware.
5. Click on the Global Settings button to specify a firmware version for use with the failover image. For
more information, see Enabling Global Settings for the Failover Image.
6. Click on the Update Firmware button to update the firmware file loaded onto the switch. For more
information, see Updating the Switch Firmware.
NOTE: To apply a patch to the switch follow the same instructions for updating the
switch’s firmware.
7. To remove a patch, select it from amongst those displayed within the Patch field and click the Remove
Patch button.
3. Select the checkbox to use this version on the next boot of the switch.
4. To edit the secondary image, select the secondary image, click the Edit button and select the Use this
firmware on next reboot checkbox.
This firmware version will now be invoked after the next reboot of the switch.
5. Refer to the Status field for the current state of the requests made from the applet. Requests are any
“SET/GET” operation from the applet. The Status field displays error messages if something goes wrong
in the transaction between the applet and the switch.
6. Click the OK button to commit the changes made and exit the screen.
3. Select the Enable Image Failover checkbox to load an alternative firmware version if the WLAN
module fails to load the selected version successfully after 2 reboot attempts.
4. Refer to the Status field for the current state of the requests made from the applet. Requests are any
“SET/GET” operation from the applet. The Status field displays error messages if something goes wrong
in the transaction between the applet and the switch.
5. Click OK to save and add the changes to the running configuration and close the dialog.
3. Use the From drop-down menu to specify the location from which the file is sent.
4. Enter the name of the file containing the firmware update in the File text field.
This is the file that will append the file currently in use.
3-24 WS5100 Series Switch System Reference Guide
5. From the Using drop down menu, select either FTP or TFTP as a medium to update the firmware.
a. Use FTP to get the firmware update from a File Transfer Protocol (FTP) server. A user account must
be established on the FTP server specified for the firmware update.
b. Use TFTP to get the firmware update from a Trivial File Transfer Protocol (TFTP) server.
6. Enter the IP address for the FTP or TFTP server in the IP address field.
7. Enter the username for FTP server login in the User ID field.
8. Enter the password for FTP server login in the Password field.
9. Enter the complete file path for the file that contains the firmware update in the Path field.
10.Click the Do Update button to initiate the update.
A warning prompt displays. Upon confirming the firmware update, the switch reboots and completes the
firmware update.
CAUTION: When restarting or rebooting the switch, the Radius server is restarted
! regardless of its state before the reboot.
11.Click OK to add the changes to the running configuration and close the dialog.
12.Refer to the Status field for the current state of the requests made from the applet. Requests are any
“SET/GET” operation from the applet. The Status field displays error messages if something goes wrong
in the transaction between the applet and the switch.
13.Click Cancel to close the dialog without committing updates to the running configuration.
1. Select Switch > File Management from the main menu tree.
2. Refer to the Source field to specify the details of the source file.
From Use the From drop-down menu to select the source file’s current location. The
options include Wireless Switch and Server. The following transfer options are
possible:
• Wireless Switch to Wireless Switch
• Wireless Switch to Server
• Server to Wireless Switch.
The parameters displayed in the Source and Target fields differ based on the
above selection. These different kinds of file transfer techniques are described in
the sections that follow.
File Use the Browse button to navigate to a target file for transfer. If the switch is
selected from the From drop-down menu (within the Source field), the file used at
startup automatically displays.
2. Use the Browse button to locate a target file for the file transfer.
3. Use the To drop-down menu (within the Target field) and select Wireless Switch. This defines the
location of the file.
4. Use the Browse button to define a location for the transferred file.
5. Click the Transfer button to complete the file transfer.
6. The Message section in the main menu area displays the file transfer message.
7. Click Abort at any time during the transfer process to abort the file transfer.
3. Use the To drop-down menu (within the Target field) and select Server. This defines the transfer location
of the configuration file. Enter the file location marked to store the transferred file.
4. Use the Using drop down-menu to configure whether the log file transfer is conducted using FTP, TFTP,
HTTP or SFTP. This field display the default port for FTP,TFTP, HTTP or SFTP. The value in this field can be
configured as required. Enter the IP Address of the server receiving the source configuration. Ensure the
IP address is valid or risk jeopardizing the success of the file transfer. Enter the User ID credentials
required to transfer the configuration file from a FTP server.
5. Enter the Password required to send the configuration file from an FTP server.
6. Specify the appropriate Path name to the target directory on the server. The target options are different
depending on the target selected.
7. Click the Transfer button to complete the file transfer. The Message section in the main menu area
displays the file transfer message.
8. Click Abort at any time during the transfer process to abort the file transfer.
1. Refer to the Source field to specify the details of the source file. Use the From drop-down menu and
select Server.
To enable and configure the automatic update feature for switch firmware, configuration files and cluster
configurations:
1. Select Switch > Automatic Updates from the main menu tree.
2. Refer to the Switch Configuration field to enable and define the configuration for automatic
configuration file updates. If enabled, the located (updated) configuration file will be used with the
switch the next time the switch boots.
Enable Select the Enable checkbox to allow an automatic configuration file update when
a newer (updated) file is detected (upon the boot of the switch) at the specified IP
address.
IP Address Define the IP address of the server where the configuration files reside. If a new
version is detected when the switch is booted, it is uploaded to the switch and
used upon the next boot of the switch.
User ID Enter the User ID required to access the FTP or TFTP server.
File Name (With Provide the complete and accurate path to the location of the configuration files
Path) on the server. This path must be accurate to ensure the most recent file is
retrieved.
Protocol Use the Protocol drop-down menu to specify the FTP, TFTP, HTTP, SFTP or
resident switch FLASH medium used for the file update from the server. FLASH is
the default setting.
3. Refer to the Redundancy Configuration field to enable and define the configuration for automatic
cluster file updates.
Enable Select the Enable checkbox to allow an automatic cluster file update when a new
(updated) file is detected (upon the boot of the switch) at the specified IP address.
IP Address Define the IP address of the server where the cluster files reside. If a new version
is detected when the switch is booted it will be uploaded to the switch and used
upon the next boot of the switch.
User ID Enter the User ID required to access the FTP or TFTP server.
File Name (With Provide the complete and accurate path to the location of the cluster files on the
Path) server. This path must be accurate to ensure the most recent file is retrieved.
Protocol Use the Protocol drop-down menu to specify the FTP, TFTP, HTTP, SFTP or
resident switch FLASH medium used for the file update from the server. FLASH is
the default setting.
4. Refer to the Firmware field to enable and define the configuration for automatic firmware updates. If
enabled, the located (updated) switch firmware is used with the switch the next time the switch boots.
Enable Select the Enable checkbox to allow an automatic firmware update when a new
(updated) version is detected (upon the boot of the switch) at the specified IP
address.
IP Address Define the IP address of the server where the firmware files reside. If a new
version is detected when the switch is booted it will be uploaded to the switch
and used upon the next boot of the switch.
User ID Enter the User ID required to access the FTP or TFTP server.
File Name (With Provide the complete and accurate path to the location of the firmware files on the
Path) server. This path must be accurate to ensure the file is retrieved.
Protocol Use the Protocol drop-down menu to specify the FTP, TFTP, HTTP, SFTP or
resident switch FLASH medium used for the file update from the server. FLASH is
the default setting.
Version Provide the target firmware version to ensure the switch is upgrading to the
intended baseline.
5. Select the Start Update button to begin the file updates for the enabled switch configuration, cluster
configuration or firmware facilities.
6. Click the Apply button to save the changes to the configuration.
7. Click the Revert button to revert back to the last saved configuration.
Switch Information 3-31
2. Use the Alarm Log screen’s filtering options to view alarm log data by page or the by its entire content.
3. Select either of the two available options to view alarm log information:
View By Page Select the View By Page radio button to view alarm log information on a per
page basis. Use the View By Page option to page through alarm logs. If there are
a large number of alarms, the user can navigate to the page that has been
completely loaded. All operations can be performed on the currently loaded data.
Enter a page number next to “Page” and click the Go button to move to the
specific page.
View All Select the View All radio button to display the complete alarm log with in the
table. If there are a large number of alarms, the View All option will take several
minutes to load.
4. Refer to the table within the Alarm Log screen for the following information:
Index Displays the unique numerical identifier for trap events (alarms) generated in the
system. Use the index to help differentiate an alarm from others with similar
attributes.
Status Displays the current state of the requests made from the applet. Requests are any
“SET/GET” operation from the applet. The Status displays error messages if
something goes wrong in the transaction between the applet and the switch.
3-32 WS5100 Series Switch System Reference Guide
Time Stamp Displays the date, year and time the alarm was raised (as well as the time zone of
the system). The time stamp only states the time the alarm was generated, not the
time it was acknowledged.
Severity Displays the severity level of the event. Use this (non numerical and verbal)
description to assess the criticality of the alarms. Severity levels include:
• Critical
• Major
• Warning
• Informational
• Normal
Module Name Displays the module name that triggered this alarm. Use this information to
assess if this alarm is a recurring problem or if it is an isolated incident.
Message Displays a detailed event message corresponding to the alarm event. It contains
an event specific message for information about the alarm. Use this value along
with the Details description for optimal problem event identification.
5. Select an alarm and click the Details button to display an alarm description along with a system
proposed solution and possible causes. For more information, see
Viewing Alarm Log Details.
6. Select the alarm(s) from those listed and click the Delete button to remove them from the list of alarms.
This is not recommended in instances where the problem is unacknowledged and the criticality has not
yet been assessed.
7. Select the unacknowledged alarm(s) from those listed and click the Acknowledge button to
acknowledge them.
8. Click the Export button to export the content of the table to a Comma Separated Values file (CSV).
3. Refer to the Alarm Details and Alarm Message for the following information:
Description Displays the details of the alarm log event. This information can be used in
conjunction with the Solution and Possible Causes items to troubleshoot the
event and determine how the event can be avoided in the future.
Solution Displays a possible solution to the alarm event. The solution should be attempted
first to rectify the described problem.
Possible Causes Describes the probable causes that could have raised this specific alarm.
Determine whether the causes listed can be remedied to avoid this alarm from
being raised in the future.
Alarm Message Displays the radio (and MAC address if relevant) reporting the alarm detail
information.
License Key Enter the license key required to install a particular feature. The license key is
returned when you supply the switch serial number to Motorola support.
Feature Name Enter the name of the feature you wish to install/upgrade using the license.
Serial Number Displays the serial number of the switch used for generating the license key.
Feature Name Displays the name of the feature either installed or upgraded on the switch.
License Count Displays the number of licenses applied while entering the license key.
License Usage Lists the number of license in use. Determine whether this number adequately
represents the number of switches needed to deploy.
5. Select a license from the table and click the Delete button to remove the license from the list available
to the switch.
Switch Information 3-35
2. Enter the filter criteria as per the options provided in the Filter Option zone.
The parameters in the Filter Option field are populated with the parameters of the screen in which it
appears. Not all switch Web UI’s contain the filtering option.
3. Click the Filter Entire Table button to filter the entire table in which the filter zone appears.
The result of the filtering operation displays at the bottom of the table
4. Click the Turn Off Filtering button to disable the filtering option for the screen where it appears.
Filtering status (when filtering is turned off) displays at the bottom of the table.
5. Click the Hide Filtering Option button to hide the Filter Option zone.
3-36 WS5100 Series Switch System Reference Guide
Network Setup
This chapter describes the Network Setup menu information used to configure the switch. This chapter
consists of the following switch Network configuration activities:
• Displaying the Network Interface
• Viewing Network IP Information
• Viewing and Configuring Layer 2 Virtual LANs
• Configuring Switch Virtual Interfaces
• Viewing and Configuring Switch WLANs
• Viewing Associated MU Details
• Viewing Access Port Information
• Viewing Access Port Adoption Defaults
• Viewing Access Port Status
• Multiple Spanning Tree
NOTE: HTTPS must be enabled to access the switch applet. Ensure HTTPS access has
been enabled before using the login screen to access the switch applet.
4-2 WS5100 Series Switch System Reference Guide
NOTE: When the switch’s configuration is successfully updated (using the Web UI), the
effected screen is closed without informing the user their change was successful.
However, if an error were to occur, the error displays within the effected screen’s Status
field and the screen remains displayed. In the case of file transfer operations, the transfer
screen remains open during the transfer operation and remains open upon completion
(with status displayed within the Status field).
To view the switch’s Network configuration:
1. Select Network from the main menu tree.
Network Setup 4-3
DNS Servers Displays the number of DNS Servers configured thus far for use with the switch. For more
information, see Viewing Network IP Information on page 4-4.
IP Routes Displays the number of IP routes for routing packets to a defined destination. For information
on defining IP Routes, see Configuring IP Forwarding on page 4-6.
Additional Displays the number of layer three (IP) address to layer two (MAC) address mappings. For
Resolution Entries more information, see Viewing Address Resolution on page 4-8.
Switch Virtual Displays the number of virtual interfaces (VLANs) defined thus far for the switch. New
Interfaces VLANs can be defined or existing VLANs can be modified as needed. For more information,
see Configuring Switch Virtual Interfaces on page 4-12.
Wireless LANs Displays the number of WLANs currently defined on the switch. The switch has 32 default
WLANs. New WLANs can be added as needed, and their descriptions, VLAN
assignments and security schemes modified. For more information, see Viewing and
Configuring Switch WLANs on page 4-20.
Mobile Units Displays the number of MUs currently associated to (and interacting with) the switch. The
details of individual MUs can be displayed as needed. For more information, see Viewing
Associated MU Details on page 4-74.
Access Ports Displays the number of Access Ports (APs) active on the switch. Access ports can be added
or existing APs can have their VLAN assignments changed, their descriptions modified and
their current authentication and encryption schemes modified. For more information, see
Viewing Access Port Information on page 4-81.
Radios Displays the number of AP radios detected over the switch managed network. Displayed
with this information is the number of radios detected that have been adopted by the switch.
For more information, see Viewing Access Port Status on page 4-111.
The Apply and Cancel buttons are greyed out within this screen, as there is no data to be configured or
saved.
4-4 WS5100 Series Switch System Reference Guide
3. The Domain Name System tab displays DNS details in a tabular format.
Server IP Address Displays the IP address of the domain name server(s) the system can use for
resolving domain names to IP addresses. Domain look up order is determined by
the order of the servers listed. The first server queried is the first server displayed.
Therefore, ensure obsolete addresses are periodically removed.
Server Type Displays whether the DNS IP address entry has been created statically (manually)
or dynamically. The DHCP server provides the dynamic DNS IP address entry
displayed. A static DNS IP address can be created by clicking the Add button.
4. Select an IP Address from the table and click the Delete button to remove the selected entry from the list.
Network Setup 4-5
5. Click the Add button to display a screen used to add another domain name server. For more information,
see Adding an IP Address for a DNS Server on page 4-5.
6. Click the Global Settings button to open a screen that allows the domain lookup to be enabled/disabled
and the domain name to be specified. For more information, see Configuring Global Settings on page 4-5.
2. Enter the Server IP Address to define the IP address of the new static domain name server.
3. Refer to the Status field for the current state of the requests made from applet. This field displays error
messages if something goes wrong in the transaction between the applet and the switch.
4. Click OK to use the changes to the running configuration and close the dialog.
5. Click Cancel to close the dialog without committing updates to the running configuration.
A Configuration screen displays for editing the DNS settings of the server.
4-6 WS5100 Series Switch System Reference Guide
2. Select the Domain Look Up checkbox to enable the switch to query domain name servers to resolve
domain names to IP addresses.
NOTE: The order of look up is determined by the order of the servers within Domain
Name System tab. The first server queried is the first server displayed.
3. Enter a Domain Name in the text field. This is the switch’s domain.
4. Refer to the Status field for the current state of the requests made from applet. This field displays error
messages if something goes wrong in the transaction between the applet and the switch.
5. Click OK to use the changes to the running configuration and close the dialog.
6. Click Cancel to close the dialog without committing updates to the running configuration.
3. The read-only IP Forwarding tab displays the current status between VLANs. To toggle the status of
routing between VLANs, use the Enable/Disable options located at the bottom of the screen.
The following details display in the table:
Destination Subnet Displays the mask used for destination subnet entries. The Subnet Mask is the IP
mask used to divide internet addresses into blocks (known as subnets). A value of
255.255.255.0 will support 256 IP addresses.
Subnet Mask Displays the mask used for destination subnet entries. The Subnet Mask is the IP
mask used to divide internet addresses into blocks (known as subnets). A value of
255.255.255.0 will support 256 IP addresses.
Gateway Address Displays the IP address of the Gateway used to route the packets to the specified
destination subnet. Do not set the gateway address to any VLAN interface used
by the switch.
Interface Displays the interface name with which the destination subnet entries are
attached.
Protocol Displays the name of the routing protocol with which this route was obtained.
Possible values are:
• Static — Routes are statically added by the operator.
• DHCP — Routes obtained from the DHCP server.
• Connected — Routes automatically installed by the switch for directly
connected networks based on interface IP addresses.
• Kernel/ ICMP — Routes added as a result of receiving an ICMP redirect from
an intermediate router.
Active When IP Forwarding is enabled for the selected subnet, a green check displays in
the Active column. A red X defines the subnet as disabled.
4. Select an entry and click the Delete button to remove the selected entry from the IP forwarding table.
5. Click the Add button to create a new static route. For more information, see Adding a New Static Route
on page 4-7.
6. Click Enable (to allow) or Disable (to deny) routing between VLANs.
2. In the Destination Subnet field, enter an IP address to route packets to a specific destination address.
3. Enter a subnet mask for the destination subnet in the Subnet Mask field.
The Subnet Mask is the IP mask used to divide internet addresses into blocks known as subnets. A value
of 255.255.255.0 support 256 IP addresses.
4. In the Gateway Address field, enter the IP address of the gateway used to route the packets to the
specified destination subnet. Do not set the gateway address to any VLAN interface used by the switch.
5. Refer to the Status field for the current state of the requests made from applet. This field displays error
messages if something goes wrong in the transaction between the applet and the switch.
6. Click OK to use the changes to the running configuration and close the dialog.
7. Click Cancel to close the dialog without committing updates to the running configuration.
Interface Displays the name of the actual interface where the IP address was
found (typically a VLAN).
MAC Address Displays the MAC address corresponding to the IP address being
resolved.
4. Click the Clear button to remove the selected AP entry if no longer usable.
4-10 WS5100 Series Switch System Reference Guide
Name Displays the name of the VLAN to which the switch is currently connected.
3. Select a record from the table and click the Edit button to modify the record. For more information, see
Editing the Details of an Existing VLAN on page 4-11.
Network Setup 4-11
4. Use the Edit screen to modify the VLAN’s mode, access VLAN and allowed VLAN designation.
Name Displays a read only field and with the name of the Ethernet to which the VLAN is
associated.
Mode Use the drop-down menu to select the mode. It can be either:
• Access – This Ethernet interface accepts packets only form the native VLANs.
If this mode is selected, the Allowed VLANs field is unavailable.
• Trunk–The Ethernet interface allows packets from the given list of VLANs you
can add to the trunk.
4-12 WS5100 Series Switch System Reference Guide
Native VLAN Use this field to change the tag assigned to the native VLAN.
Allowed VLANs This section has the following 2 options (and is only available when Trunk is
selected from the Mode drop-down menu):
• No VLANs– Select this option if you do not wish to add any additional VLANs.
• Selected VLANs– Select this option if you wish to add additional VLANs.
6. Refer to the Status field for the current state of the requests made from applet. This field displays error
messages if something goes wrong in the transaction between the applet and the switch.
7. Click OK to use the changes to the running configuration and close the dialog.
8. Click Cancel to close the dialog without committing updates to the running configuration.
DHCP Displays whether the DHCP client is enabled or not. A green check mark defines
the DHCP client as enabled for the interface. A red X means the interface is
disabled.
Primary Subnet Mask Displays the subnet mask assigned for this interface.
Admin Status Displays whether the virtual interface is operational and available to the switch.
Oper Status Displays whether the selected Switch Virtual Interface is currently (Up) or not
(Down) on the switch.
Management A green checkmark within this column defines this VLAN as currently used by the
Interface switch. This designates the interface settings used for global switch settings in
case of conflicts. For example, if multiple SVIs are configured with DHCP enabled
on each, the switch could have multiple domain names assigned from different
DHCP servers.The one assigned over the selected Management Interface would
be the only one used by the switch. This setting does not affect any of the
Management Access Interfaces configured using
Configuring Access Control on page 7-2.
3. Select a record from the table and click the Edit button to modify the record. For more information, see
Modifying a Virtual Interface on page 4-15.
4-14 WS5100 Series Switch System Reference Guide
4. Select a record from the table and click the Delete button to remove the configuration from the list of
switch virtual interfaces.
5. Click the Add button to add a new configuration to the switch virtual interface. For more information, see
Adding a Virtual Interface on page 4-14.
6. Select an interface as click the Startup button to invoke the selected interface the next time the switch
is booted.
7. Select an interface as click the Shutdown button to disable the selected interface.
8. Use the Secondary IP Addresses field to define additional IP addresses to associate with VLAN IDs.
The address provided in this field is used if the primary IP address is unreachable.
Select the Add button (within the Secondary IP Addresses field) to define additional addresses from a
sub screen. Choose an existing secondary address and select Edit or Delete to revise or remove a
secondary address.
9. Refer to the Status field for the current state of the requests made from applet. This field displays error
messages if something goes wrong in the transaction between the applet and the switch.
10.Click OK to use the changes to the running configuration and close the dialog.
11.Click Cancel to close the dialog without committing updates to the running configuration.
The screen displays with the name of the VLAN in the upper left-hand side. The VLAN ID cannot be
modified and should be used to associate the VLAN ID with the description and IP address assignments
defined.
3. If necessary, modify the Description of the VLAN, to make it representative of the VLAN’s intended
operation within the switch managed network.
4. Unselect the Use DHCP to obtain IP Address automatically checkbox to assign IP addresses
manually and you do not want DHCP to provide them.
5. Use the Primary IP Address field to manually enter the IP address for the virtual interface.
6. Enter the Subnet Mask for the IP address.
4-16 WS5100 Series Switch System Reference Guide
7. Select the Set as Management Interface checkbox to convert the selected VLAN ID to a management
interface.
8. Use the Secondary IP Addresses field to define/modify additional IP addresses to associate with
VLAN IDs. The addresses provided will be used if the primary IP address is unreachable.
Select the Add button (within the Secondary IP Addresses field) to define/modify additional addresses
from a sub screen. Select an existing secondary address and select Edit or Delete to revise or remove a
secondary address as needed.
9. Refer to the Status field for the current state of the requests made from applet. This field displays error
messages if something goes wrong in the transaction between the applet and the switch.
10.Click OK to use the changes to the running configuration and close the dialog.
11.Click Cancel to close the dialog without committing updates to the running configuration.
3. Refer to the following to assess the network throughput of existing virtual interfaces:
Name Displays the user defined interface name. The corresponding statistics are
displayed along the row. The statistics are the total traffic to the interface since
its creation.
Bytes In Displays the number of bytes coming into the interface. The status is not self-
updated. To view the current status, click the Details button.
Network Setup 4-17
Packets In Displays the number of packets coming into the interface (including packets
dropped, error packets, etc.)
Packets In Dropped Displays the number of dropped packets coming into the interface. Packets are
dropped if:
1. The input queue for the hardware device/software module handling the
interface definition is
saturated/full.
2. Overruns occur when the interface receives packets faster than it can
transfer them to a buffer.
Packets In Error Displays the number of error packets coming into the interface.
• Runt frames — Packets shorter than the minimum Ethernet frame length (64
bytes).
• CRC errors — The Cyclical Redundancy Check (CRC) is the 4 byte field at the
end of every frame the receiving station uses to interpret if the frame is valid.
If the CRC value computed by the interface does not match the value at the end
of frame, it is considered as a CRC error.
• Late collisions — A late collision is any collision that occurs after the first 64
octets of data have been sent by the sending station. Late collisions are not
normal and are usually the result of out of specification cabling or a
malfunctioning device.
• Misaligned frames — A misaligned frame is a frame that somehow gets out of
sync with the receiving station’s receive clock recovery circuit. Misalignment is
reported if the frame ends with a CRC error and extra bits are also detected.
Bytes Out Displays the number of bytes going out on the interface.
Packets Out Displays the number of packets going out on the interface.
Packets Out Dropped Displays the number of dropped packets going out of the interface, due to
saturated output queues assigned to the interface processor or the physical
device/software module. Packets can be dropped due to collisions as well.
Packets Out Error Displays the number of error packets going out of the interface, including frame
forming errors or malformed packets transmitted over the interface.
3. Click the Details button to view packet level statistics of any user defined interface. For more
information, see Viewing Virtual Interface Statistics on page 4-17.
4. Click the Graph button to view a graphical representation of the switch virtual interface statistics. For
more information, see Viewing the Virtual Interface Statistics Graph on page 4-19.
MAC Address Displays physical address information associated with the interface. This address
is read-only (hard-coded at the factory) and cannot be modified.
Input Unicast Displays the number of unicast packets (packets directed towards the interface)
Packets received at the interface.
Input NonUnicast Displays the number of NonUnicast Packets (Multicast and Broadcast Packets)
Packets received at the interface.
Input Total Packets Displays the total number of packets received at the interface.
Input Packets Displays the number of packets dropped at the interface by the input Queue of the
Dropped hardware unit /software module associated with the VLAN interface. Packets are
dropped when the input Queue of the interface is full or unable to handle incoming
traffic.
Input Packets Error Displays the number of packets with errors at the interface. Input Packet Errors are
input errors occurring due to; no buffer space/ignored packets due to broadcast
storms, packets larger than maximum packet size, framing errors, input rate
exceeding the receiver's date handling rate or cyclic redundancy check errors. In
all these cases, an error is reported.
Output Bytes Displays the number of bytes transmitted from the interface.
Output Unicast Displays the number of unicast packets (packets directed towards a single
Packets destination address) transmitted from the interface.
Output NonUnicast Displays the number of unicast packets transmitted from the interface.
Packets
Network Setup 4-19
Output Total Packets Displays the total number of packets transmitted from the interface.
Output Packets Displays the number of transmitted packets dropped at the interface. Output
Dropped Packets Dropped are packets dropped when the output queue of the physical
device associated with interface is saturated.
Output Packets Error Displays the number of transmitted packets with errors. Output Packet Errors are
the sum of all the output packet errors, malformed packets and misaligned packets
received on an interface.
4. The Status is the current state of requests made from the applet. Requests are any “SET/GET” operation
from the applet. The Status field displays error messages if something goes wrong in the transaction
between the applet and the switch.
5. Click the Refresh button to refresh the virtual interface statistics. Status information is not polled to the
applet. Hence you have to refresh the switch to retrieve the data.
6. Click the Close button to exit the screen. Clicking Close does not lose any data, as there are no values
configured within this screen (it is read-only).
NOTE: Do not select more than four parameters at any given time.
4. Refer to the Status field for the current state of the requests made from applet. This field displays error
messages if something goes wrong in the transaction between the applet and the switch.
5. Click Close to close the dialog.
updates to a WLAN’s description and their current authentication and encryption schemes. Be careful to
properly map BSS WLANs and security schemes. the WS5100 supports 32 WLANs.
To configure a WLAN:
1. Select Network > Wireless LANs from the main menu tree.
2. Click the Configuration tab.
Index Displays the WLAN’s numerical identifier. The WLAN index range is from 1 to 32.
An index can be helpful to differentiate a WLAN from other WLANs with similar
configurations.
Enabled Refer to the Enabled parameter to discern whether the specified WLAN is enabled
or disabled. When enabled, a green check mark displays. When disabled, a red "X"
displays. To enable or disable a WLAN, select it from the table and click the Enable
or Disable button.
ESSID Displays the Service Set ID associated with each WLAN. Click the Edit button to
modify the value to a new unique SSID.
Description Displays a short description of the associated WLAN. Click the Edit button to
modify the value the WLAN description.
VLAN(s) Displays the name of the VLAN the WLAN is associated with. The VLAN ID is an
integer assigned for the corresponding user defined name. The VLAN ID can be
between 1 and 4094. The default VLAN ID is 1.
4-22 WS5100 Series Switch System Reference Guide
Authentication Displays the type of authentication used with the specified WLAN. Click the Edit
button to modify the WLAN’s current authentication scheme. For information on
configuring an authentication scheme for a WLAN, see Configuring
Authentication Types on page 4-30.
Encryption Displays the type of wireless encryption used on the specified WLAN. When no
encryption is used, the field displays "none". Click the Edit button to modify the
WLAN’s current encryption scheme. For information on configuring an
authentication scheme for a WLAN, see Configuring Different Encryption Types on
page 4-47.
Extended WLAN (defined by the default red X) are typical centralized WLANs
created on the switch.
QOS Weight Defines the Quality of Service weight for the WLAN. WLAN QoS will be applied
based on the QoS weight value with higher values assigned priority. The range for
QoS. weight values is between 1 and 10 with 1 being the default value.
3. Click the Edit button to display a screen where WLAN information, encryption and authentication
settings can be viewed or changed.
4. Click the Enable button to enable the selected WLAN. When enabled, a green check mark displays.
When disabled, a red "X" displays. Enabled WLANs are display in a number of different switch Web UI
configurations for additional configuration activities. To enable or disable a WLAN, select it from the
table and click the Enable or Disable button. The Enable button is only available when the selected WLAN
is disabled.
5. Click the Disable button to disable the selected WLAN. When enabled, a green check mark displays.
When disabled, a red "X" displays. To enable or disable a WLAN, select it from the table and click the
Enable or Disable button. The Disable button is only available when the selected WLAN is enabled.
Network Setup 4-23
6. Click the Global Settings button to display a screen with WLAN settings applying to the all the WLANs
on the system. Remember, changes made to any one value impact each WLAN.
Click OK to save updates to the Global WLAN Settings screen. Click Cancel to disregard changes and
revert back to the previous screen. Checkbox options within the Global Settings screen include:
MU Proxy ARP Enables Proxy ARP handling for MUs. Proxy ARP is provided for MU’s in PSP mode
handling whose IP address is known. The WLAN generates an ARP reply on behalf of a MU,
if the MU’s IP address is known. The ARP reply contains the MAC address of the
MU (not the MAC address of WLAN Module). Thus, the MU does not awaken to
send ARP replies (helping to increase battery life and conserve bandwidth). If an
MU goes into PSP mode without transmitting at least one packet, its Proxy ARP
will not work for the MU. This option is selected by deafult.
Shared-Key Enables Shared-Key Authentication for all enabled WLANs on the system. This
Authentication option is selected by default.
Manual mapping of Use this option (its selected by default) for custom WLAN to Radio mappings.
WLANs When Advanced Configuration is disabled, the user cannot conduct Radio –
WLAN mapping. Additionally, the user cannot enable WLANs with an index from
17 to 32. Once the Advanced Configuration option is enabled, the following
conditions must be satisfied (to successfully disable it). No WLANs with index 17
to 32 should be enabled. Additionally, the Radio – WLAN mapping should conform
to the following:
BSS ID 1 – Possible WLANs 1,5,9,13
BSS ID 2 – Possible WLANs 2,6,10,14
BSS ID 3 – Possible WLANs 3,7,11,15
BSS ID 4 – Possible WLANs 4, 8, 12,16
Enable WLAN Select this option to enable WLAN bandwidth settings. WLAN bandwidth settings
Bandwidth Settings ensures quality of service for applications regardless of network load. This option
is selected by default.
4-24 WS5100 Series Switch System Reference Guide
The Wireless LANs Edit screen is divided into the following user-configurable fields:
• Configuration
• Authentication
• Encryption
• Advanced
5. Refer to the Configuration field to define the following WLAN values
ESSID Displays the Extended Service Set ID (ESSID) associated with each WLAN. If
changing the ESSID, ensure the value used is unique.
Description If editing an existing WLAN, ensure its description is updated accordingly to best
describe the intended function of the WLAN.
VLAN ID Assign the revised VLAN ID for this WLAN. Select the Dynamic Assignment
checkbox for an user based VLAN assignment when 802.1x EAP Authentication is
used.
Dynamic Assignment Select the Dynamic Assignment checkbox for an automatic VLAN assignment. The
switch cannot route traffic between different VLANs on ETH1 and ETH2. Be
cognizant of this limitation when planning to route traffic between different
VLANs.
Assign Multiple Assign the revised VLAN ID for this WLAN. Select the Dynamic Assignment
VLANs checkbox for an user based VLAN assignment when 802.1x EAP Authentication is
used. For more information, seeAssigning Multiple VLANs per WLAN on page 4-
28.
NOTE: If the WLAN is to support AAP, the Independent Mode (AAP Only) checkbox
must be selected. Additionally, the access point must have its auto discovery option
enabled to be discovered by the switch. For information on configuring an access point for
AAP support, see B.4.1 Adaptive AP Configuration.
NOTE: For a Radius supported VLAN to function, the "Dynamic Assignment" checkbox
must be enabled for the WLAN supporting the VLAN.
4-26 WS5100 Series Switch System Reference Guide
802.1X EAP A Radius server is used to authenticate users. For detailed information on
configuring EAP for the WLAN, see Configuring 802.1x EAP on page 4-30.
MAC Authentication The switch uses a Radius server to see if a target MAC address is allowed on the
network. The attributes of the Radius Server are required. For more information,
see Configuring MAC Authentication on page 4-40
No Authentication When selected, no Authentication is used and transmissions are made (in the
open) without security unless an encryption scheme is used. This setting is not
recommended when data protection is important.
WEP 64 Use the WEP 64 checkbox to enable the Wired Equivalent Privacy (WEP) protocol
with a 40-bit key. WEP is available in two encryption modes: 40 bit (also called
WEP 64) and 104 bit (also called WEP 128). The 104-bit encryption mode provides
a longer algorithm that takes longer to decode than that of the 40-bit encryption
mode. For detailed information on configuring WEP 64 for the WLAN, see
Configuring WEP 64 on page 4-47.
WEP 128 Use the WEP 128 checkbox to enable the Wired Equivalent Privacy (WEP) protocol
with a 104-bit key. WEP is available in two encryption modes: WEP 64 (using a 40-
bit key) and WEP 128 (using a 104-bit key). WEP 128 encryption mode provides a
longer algorithm that takes longer to decode than that of the WEP 64 encryption
mode. For detailed information on configuring WEP 128 for the WLAN, see
Configuring WEP 128 / KeyGuard on page 4-49.
KeyGuard Uses a Motorola proprietary encryption mechanism to protect data. For detailed
information on configuring KeyGuard for the WLAN, see
Configuring WEP 128 / KeyGuard on page 4-49.
WPA-WPA2-TKIP Use the WPA-TKIP checkbox to enable Wi-Fi Protected Access (WPA) with
Temporal Key Integrity Protocol (TKIP). For detailed information on configuring
TKIP for the WLAN, see
Configuring WPA/WPA2 using TKIP and CCMP on page 4-51.
WPA2-CCMP WPA2 is a newer 802.11i standard that provides even stronger wireless security
than Wi-Fi Protected Access (WPA) and WEP. CCMP is the security standard used
by the Advanced Encryption Standard (AES). AES serves the same function TKIP
does for WPA-TKIP. CCMP computes a Message Integrity Check (MIC) using the
proven Cipher Block Chaining (CBC) technique. Changing just one bit in a message
produces a totally different result. For detailed information on configuring CCMP
for the WLAN, see Configuring WPA/WPA2 using TKIP and CCMP on page 4-51.
Network Setup 4-27
Accounting Mode If using a Syslog server to conduct accounting for the switch, select the Syslog
option from the Accounting Mode drop-down menu. Once selected, a Syslog
Config button is enabled on the bottom of the Network > Wireless LANs > Edit
screen. Use this sub screen to provide the Syslog Server IP address and port for the
Syslog Server performing the accounting function.
If either Hotspot, MAC Authentication or 802.1x EAP have been selected from
within the Authentication field, a Radius Config button is enabled (on the bottom
of the screen) allowing the user to define a Primary and Secondary Radius
Accounting Server IP address, port, shared secret password and timeout and retry.
Define these accounting settings as required for the switch.
The default Accounting Mode setting is Off.
Answer Broadcast Select this checkbox to allow the WLAN to respond to probes for broadcast ESS.
ESS
Use Voice Select the Use Voice Prioritization option if Voice is used on the WLAN. This gives
Prioritization priority to voice packets and voice management packets and is supported only on
certain legacy Motorola VOIP phones.
Enable SVP Enabling SVP (Spectralink Voice Prioritization) allows the switch to identify and
prioritize traffic from Spectralink/Polycomm phones.
Secure Beacon Closed system is the secure beacon feature for not answering broadcast SSID.
This option still allows MU to MU communication within the WLAN.
QoS Weight Sets the Quality of Service weight for the WLAN. The default value for the weight
is 1. WLAN QoS will be applied based on the QoS weight value with the higher
values given priority.
MU to MU Traffic Allows frames from one MU (where the destination MAC is of another MU) are
switched to a second MU. Use the drop-down menu to select one of the following
options:
• Drop Packets – This restricts MU to MU communication based on the WLAN’s
configuration
• Allow Packets – This allows MU to MU communication based on the WLAN’s
configuration
• Forward through switch – The frames from the MU are switched out to the
wired network (out of the switch). Another upstream device decides whether
the frame should be sent back to the second MU, and if so, it sends the frame
back to the switch and is switched out just like any other frame on the wire.
Access Category Displays the Access Category for the intended traffic. The Access Categories are
the different WLAN-WMM options available to the radio.
The Access Category types are:
• Automatic/WMM – Optimized for WMM
• Voice – Optimized for voice traffic. Voice packets receive priority.
• Video – Optimized for video traffic. Video packets receive priority.
• Normal – Optimized for normal traffic
• Low – Optimized for background traffic
4-28 WS5100 Series Switch System Reference Guide
MCast Addr 1 The address provided takes packets (where the first 4 bytes match the first 4 bytes
of the mask) and sends them immediately over the air instead of waiting for the
DTIM period. Any multicast/broadcast that does not match this mask will go out
only on DTIM Intervals.
MCast Addr 2 The second address also takes packets (where the first 4 bytes match the first 4
bytes of the mask) and sends them immediately over the air instead of waiting for
the DTIM period. Any multicast/broadcast that does not match this mask will go
out only on DTIM Intervals.
NAC Mode Using Network Access Control (NAC), the switch only grants access to specific
network resources. NAC restricts access to only compliant and validated devices
(printers, phones, PDAs etc.), thereby limiting the risk of emerging security risks.
NAC performs an authorization check for users and MUs without a NAC agent, and
verifies a MU’s compliance with the network security policy. The switch supports
only the EAP/802.1x type of NAC. However, the switch can bypass NAC for MU’s
without NAC 802.1x support. For the implications of using the include and exclude
with NAC, see Configuring the NAC Inclusion List on page 4-64 and
Configuring the NAC Exclusion List on page 4-68.
9. Refer to the Status field for the current state of the requests made from applet. This field displays error
messages if something goes wrong in the transaction between the applet and the switch.
10.Click on the Radius... button (when Radius is selected as the accounting mode) to configure an external
primary and secondary Radius and NAC server. For more information, see Configuring External Radius
Server Support on page 4-40.
11.Select the Syslog button (when Syslog is selected as the accounting mode) to view switch syslog
accounting details. To enable syslog, select the Syslog option from the Accounting Mode drop-down
menu. Use this sub screen to provide the Syslog Server IP address and port for the Syslog Server
performing the accounting function.
12.Select the NAC button to configure the NAC mode. For more detailed information see Configuring NAC
Server Support on page 4-44.
13.Click OK to use the changes to the running configuration and close the dialog.
14.Click Cancel to close the dialog without committing updates to the running configuration.
4. Select the Dynamic Assignment checkbox for an user based VLAN assignment with Radius for this
WLAN.
5. Select the Assign Multiple VLAN(s) button to map a WLAN to more than one VLAN. This displays the
Multiple VLAN Mapping screen.
6. Configure the Multiple VLAN Mapping for WLAN table as required to add or remove multiple VLANS
for the selected WLAN.
Multiple VLAN’s per WLAN are mapped (by default) to a regular VLAN and are not supported on an
adaptive AP. Refer to Editing the WLAN Configuration on page 4-24 to select and define an independent
VLAN for adaptive AP support.
VLAN Displays the VLANs currently mapped to the WLAN. By default, VLAN 1 is
configured for any selected WLAN.
User Limit Displays the user limit configured for the mapped VLAN. The maximum allowed
user limit is 4096 per VLAN.
NOTE: The maximum number of secondary IPs that can be assigned to a VLAN is 32.
7. Select the Insert button to add the VLAN using the criteria described above.
8. Select a row from the Multiple VLAN Mapping table and click the Remove button to delete the mapping
of a VLAN to a WLAN.
9. Refer to the Status field for the current state of the requests made from applet. This field displays error
messages if something goes wrong in the transaction between the applet and the switch.
10.Click OK to use the changes to the running configuration and close the dialog.
11.Click Cancel to close the dialog without committing updates to the running configuration.
NOTE: In a cluster environment with multiple switches, please ensure that the VLAN list
is consistent across all switches.
4-30 WS5100 Series Switch System Reference Guide
5. Configure the Advanced field as required to define MU timeout and retry information for the
authentication server.
MU Timeout Define the time (between 1- 60 seconds) for the switch’s retransmission of EAP-
Request packets. The default is 5 seconds.
MU Max Retries Specify the maximum number of times the switch retransmits an EAP-Request
frame to the client before it times out the authentication session. The default is 3
retries, with a maximum of 100 supported.
6. Refer to the Status field for the current state of the requests made from applet. This field displays error
messages if something goes wrong in the transaction between the applet and the switch.
7. Click OK to use the changes to the running configuration and close the dialog.
8. Click Cancel to close the dialog without committing updates to the running configuration.
Configuring Kerboros
Kerberos (designed and developed by MIT) provides strong authentication for client/server applications
using secret-key cryptography. Using Kerberos, a MU must prove its identity to a server (and vice versa)
across an insecure network connection. Once a MU and server prove their identity, they can encrypt all
communications to assure privacy and data integrity. Kerberos can only be used with Motorola clients.
5. Click the Config button to the right of the Kerberos checkbox. The Kerberos screen displays.
3. Select the Hotspot button from within the Authentication field. The Radius Config... button on the
bottom of the screen becomes enabled. Ensure a primary and optional secondary Radius Server have
been configured to authenticate users requesting access to the hotspot supported WLAN. For more
information, see Configuring External Radius Server Support on page 4-40.
4. Click the Config button to the right of the Hotspot checkbox.
A Hotspot screen displays, allowing the user to define one of three available hotspot types.
5. Use the drop-down menu at the top of the screen to define whether this WLAN’s Web pages are:
• Internal - three HTML pages with basic functionality are made available on the switch's onboard
HTTP server. The HTML pages are pre-created to collect login credentials through Login.htm, send
them to a Radius server and display a Welcome.htm or a Faliure.htm depending on the result of the
authentication attempt. For more information, see Configuring an Internal Hotspot on page 4-34.
• External - a customer may wish to host their own external Web server using advanced Web content
(using XML, Flash). Use the External option to point the switch to an external hotspot. For more
information, see Configuring External Hotspot on page 4-36.
• Advanced - a customer may wish to use advanced Web content (XML, Flash) but might not have (or
would not want to use) an external Web server, choosing instead to host the Web pages on the
switch's HTTP Web server. Selecting the Advanced option allows for the importing the Web pages
from an external source (like an FTP server) and hosting them on the switch. For more information,
see Configuring Advanced Hotspot on page 4-38.
NOTE: The appearance of the Hotspot screen differs depending on which option is
selected from the drop-down menu. You may want to research the options available
before deciding which hotspot option to select.
NOTE: As part of the hotspot configuration process, ensure a primary and optional
secondary Radius Server have been properly configured to authenticate the users
requesting access to the hotspot supported WLAN. For more information on configuring
Radius Server support for the hotspot supported WLAN, see Configuring External Radius
Server Support on page 4-40.
4. Click the Login tab and enter the title, header, footer Small Logo URL, Main Logo URL and Descriptive
Text you would like to display when users login to the switch maintained hotspot.
Title Text Displays the HTML text displayed on the Welcome page when using the switch’s
internal Web server. This option is only available if Internal is chosen from the
drop-down menu.
Header Text Displays the HTML header displayed on the Failed page when using the switch’s
internal Web server. This option is only available if Internal is chosen from the
drop-down menu.
Footer Text Displays the HTML footer text displayed on the Failed page when using the
switch’s internal Web server. This option is only available if Internal is chosen from
the drop-down menu.
Small Logo URL Displays the URL for a small logo image displayed on the Failed page when using
the switch’s internal Web server. This option is only available if Internal is chosen
from the drop-down menu.
4-36 WS5100 Series Switch System Reference Guide
Main Logo URL Displays the URL for the main logo image displayed on the Failed page when using
the switch’s internal Web server. This option is only available if Internal is chosen
from the drop-down menu above.
Descriptive Text Specify any additional text containing instructions or information for the users
who access the Failed page. This option is only available if Internal is chosen from
the drop-down menu above. The default text is: “Either the username and
password are invalid, or service is unavailable at this time.”
5. Refer to the Allow List field, and enter any IP address (for internal or external Web sites) that may be
accessed by the Hotspot user without authentication.
NOTE: An associated MU may not be able to ping the host within the hotspot. For
instance, a hotspot supported WLAN is enabled. Within the Allowed List, a network
(157.235.95.0) is added. An MU is associated, and an IP address is obtained for the MU.
The MU is then unsuccessful in pinging the host IP address (157.235.95.54) from within
the hotspot. Consequently, the Allowed List should be used for host IPs only.
3. Select the Hotspot button from within the Authentication field. Ensure External is selected from within
the This WLAN’s Web Pages are of the drop-down menu.
4. Refer to the External Web Pages field and provide the Login, Welcome and Failed Page URLs used by
the external Web server to support the hotspot.
Login Page URL Define the complete URL for the location of the Login page. The Login screen will
prompt the hotspot user for a username and password to access the Welcome
page.
Welcome Page URL Define the complete URL for the location of the Welcome page. The Welcome
page assumes the hotspot user has logged in successfully and can access the
Internet.
Failed Page URL Define the complete URL for the location of the Failed page. The Failed screen
assumes the hotspot authentication attempt has failed, you are not allowed to
access the Internet and you need to provide correct login information to access the
Web.
4-38 WS5100 Series Switch System Reference Guide
NOTE: When using an external hotspot page for redirection, certain HTML codes must be
included on the pages to properly redirect to the switch.
For the Login and Welcome pages, the following code must be modified:
If the above code is not modified and included, switch redirection may not work.
5. Refer to the Allow List field, and enter any IP address (for internal or external Web sites) that may be
accessed by the Hotspot user without authentication.
NOTE: In certain instances, an associated MU may not be able to ping the host within the
hotspot. For instance, a hotspot supported WLAN is enabled. Within the Allowed List, a
network (157.235.95.0) is added. An MU is associated, and an IP address is obtained for
the MU. The MU is then unsuccessful in pinging the host IP address (157.235.95.54) from
within the hotspot. Consequently, the Allowed List should be used for host IPs only.
NOTE: If the Web-server is located on a VLAN other than the one on which the MUs will
be associated, specify the IP address for the VLAN on which the server is located within
the Allow List.
6. Refer to the Status field for the current state of the requests made from applet. This field displays error
messages if something goes wrong in the transaction between the applet and the switch.
7. Click OK to use the changes to the running configuration and close the dialog.
8. Click Cancel to close the dialog without committing updates to the running configuration.
Configuring Advanced Hotspot
A customer may wish to use advanced Web content (XML, Flash) but might not have (or would not want to
use) an external Web server, choosing instead to host the Web pages on the switch's HTTP Web server.
Selecting the Advanced option allows for importing the Web pages from an external source (like an FTP
server) and hosting them on the switch.
To use the Advanced option to define the hotspot:
1. Select Network > Wireless LANs from the main menu tree.
2. Select an existing WLAN from those displayed within the Configuration tab.
3. Click the Edit button.
Network Setup 4-39
NOTE: Advanced hotspot configuration is not permissible using the switch Web UI. Refer
to the switch CLI or other advanced configuration options to define a hotspot with
advanced properties. However, the switch can still install and maintain directories
containing Web page content.
5. Once the properties of the advanced hotspot have been defined, the file can be installed on the switch
and used to support the hotspot. The following parameters are required to upload the file:
a. Specify a source hotspot configuration file. The file used at startup automatically displays within the
File parameter.
b. Refer to the Using drop-down menu to configure whether the hotspot file transfer is conducted using
FTP or TFTP.
c. Enter the IP Address of the server or system receiving the source hotspot configuration. Ensure the
IP address is valid or risk jeopardizing the success of the file transfer.
d. If using FTP, enter the User ID credentials required to transfer the configuration file from a FTP
server.
e. If using FTP, enter the Password required to send the configuration file from an FTP server.
f. Specify the appropriate Path name to the hotspot configuration on the local system disk or server.
4-40 WS5100 Series Switch System Reference Guide
g. Once the location and settings for the advanced hotspot configuration have been defined, click the
Install button to use the hotspot configuration with the switch.
6. Refer to the Allow List field, and enter any IP address (for internal or external Web sites) that may be
accessed by the Hotspot user without authentication.
NOTE: In certain instances, an associated MU may not be able to ping the host within the
hotspot. For instance, a hotspot supported WLAN is enabled. Within the Allowed List, a
network (157.235.95.0) is added, an MU is associated, and an IP address is obtained for
the MU. The MU is then unsuccessful in pinging the host IP address (157.235.95.54) from
within the hotspot. Consequently, the Allowed List should be used for host IPs only.
7. Refer to the Status field for the current state of the requests made from applet. This field displays error
messages if something goes wrong in the transaction between the applet and the switch.
8. Click OK to use the changes to the running configuration and close the dialog.
9. Click Cancel to close the dialog without committing updates to the running configuration.
Configuring MAC Authentication
The MAC Authentication option allows the user to configure a Radius server for user authentication with the
range of MAC addressees defined as allowed or denied access to the switch managed network.
NOTE: As part of the MAC Authentication process, ensure a primary and optional
secondary Radius Server have been properly configured to authenticate the users
requesting access to the ACL supported WLAN. For more information on configuring
Radius Server support for the Dynamic MAC ACL supported WLAN, see Configuring
External Radius Server Support on page 4-40.
To configure an external Radius Server for EAP 802.1x, Hotspot or Dynamic MAC ACL WLAN support:
NOTE: To optimally use an external Radius Server with the switch, Motorola recommends
defining specific external Server attributes to best utilize user privilege values for specific
switch permissions. For information on defining the external Radius Server configuration,
see Configuring an External Radius Server for Optimal Switch Support on page 4-43.
1. Select Network > Wireless LANs from the main menu tree.
2. Select an existing WLAN from those displayed within the Configuration tab.
3. Click the Edit button.
4. Select either the EAP 802.1x, Hotspot or Dynamic MAC ACL button from within the Authentication
field. This enables the Radius Conig... button at the bottom of the Network > Wireless LANs > Edit
screen.
5. Select the Radius Conig... button. The Radius Configuration screen displays for defining an external
Radius or NAC Server.
The Radius Configuration screen contains tabs for defining both the Radius and NAC server settings. For
NAC overview and configuration information, see Configuring NAC Server Support on page 4-44.
4-42 WS5100 Series Switch System Reference Guide
6. Refer to the Server field and define the following credentials for a primary and secondary Radius server.
RADIUS Server Enter the IP address of the primary and secondary server acting as the Radius user
Address authentication data source.
RADIUS Port Enter the TCP/IP port number for the primary and secondary server acting as the
Radius user authentication data source. The default port is 1812.
RADIUS Shared Provide a shared secret (password) for user credential authentication with the
Secret primary or secondary Radius server.
Server Timeout Enter a value (between 1 and 300 seconds) to indicate the number of elapsed
seconds causing the switch to time out on a request to the primary or secondary
server.
Server Retries Enter a value between 1 and 100 to indicate the number of times the switch
attempts to reach the primary or secondary Radius server before giving up.
NOTE: The Radius or NAC server’s Timeout and Retries should be less than what is
defined for an MU’s timeout and retries. If the MU’s time is less than the server’s, a fall
back to the secondary server will not work.
7. Refer to the Accounting field and define the following credentials for a primary and secondary Radius
Server.
Accounting Server Enter the IP address of the primary and secondary server acting as the Radius
Address accounting server.
Accounting Port Enter the TCP/IP port number for the primary and secondary server acting as the
Radius accounting data source. The default port is 1813.
Accounting Shared Provide a shared secret (password) for user credential authentication with the
Secret primary or secondary Radius accounting server.
Accounting Timeout Enter a value (between 1 and 300 seconds) to indicate the number of elapsed
seconds causing the switch to time out a request to the primary or secondary
accounting server.
Accounting Retries Enter a value between 1 and 100 to indicate the number of times the switch
attempts to reach the primary or secondary Radius accounting server before giving
up.
Accounting Mode Use the Accounting Mode drop-down menu to define the accounting mode as
either Start-Stop, Stop Only or Start-Interim-Stop. Define the interval (in
seconds) used with the selected accounting mode.
8. Select the Re-authentication checkbox to force a periodic re-authentication with the Radius server.
Periodic repetition of the authentication process provides ongoing security for currently authorized
connections. Define an interval between 30 and 65535 seconds.
Network Setup 4-43
9. Refer to the Advanced field to define the authentication protocol used with the Radius Server.
PAP PAP - Password Authentication Protocol sends a username and password over a
network to a server that compares the username and password to a table of
authorized users. If the username and password are matched in the table, server
access is authorized.
DSCP/TOS Optionally mark packets with a DiffServ CodePoint (DSCP) in its header. The DSCP
value is stored in the first 6 bits of the Type of Service (ToS) field that is part of the
standard IP header. The DCSP values are associated with a forwarding treatment
called Per Hop Behaviors (PHB). Service can be provisioned (if necessary) by
assigning a DCSP point code from 1 - 6.
access, configure the Radius Server with two attributes. Once with a value 1 for monitor access and then
with a value 2 for the helpdesk role.
Multiple roles can also be defined by configuring the Radius Server with attribute 1 and value 3 (or
monitor value 1 and helpdesk value 2).
NOTE: If user privilege attributes are not defined for the Radius Server, users will be
authenticated with a default privilege role of 1 (Monitor read-only access).
1. Select Network > Wireless LANs from the main menu tree.
2. Select an existing WLAN from those displayed with the Configuration tab.
3. Click on the Edit button.
4. Select either the EAP 802.1x, Hotspot or Dynamic MAC ACL button from within the Authentication
field.
This enables the Radius button at the bottom of the Network > Wireless LANs > Edit screen.
5. Select the Radius button.
The Radius Configuration screen displays (with the Radius tab displayed by default) for defining an
external Radius or NAC Server.
6. .Select the NAC tab to configure NAC support.
7. Refer to the Server field and define the following credentials for a primary and secondary NAC server.
NAC Server Address Enter the IP address of the primary and secondary NAC server.
NAC Server Port Enter the TCP/IP port number for the primary and secondary server. The default
port is 1812.
4-46 WS5100 Series Switch System Reference Guide
NAC Shared Secret Provide a shared secret (password) for user credential authentication with the
primary or secondary NAC server.
Server Timeout Enter a value (between 1 and 300 seconds) to indicate the number of elapsed
seconds causing the switch to time out on a request to the primary or secondary
NAC server.
Server Retries Enter a value between 1 and 100 to indicate the number of times the switch
attempts to reach the primary or secondary server before giving up.
CAUTION: The server’s Timeout and Retries should be less than what is defined for an
! MU’s timeout and retries. If the MU’s time is less than the server’s, a fall back to the
secondary server will not work.
8. Refer to the Accounting field and define the following credentials for a primary and secondary NAC
Server.
Accounting Server Enter the IP address of the primary and secondary server acting as the NAC
Address accounting server.
Accounting Port Enter the TCP/IP port number for the primary and secondary server acting as the
NAC accounting data source. The default port is 1813.
Accounting Shared Provide a shared secret (password) for user credential authentication with the
Secret primary or secondary NAC accounting server.
Accounting Timeout Enter a value (between 1 and 300 seconds) to indicate the number of elapsed
seconds causing the switch to time out a request to the primary or secondary
accounting server.
Accounting Retries Enter a value between 1 and 100 to indicate the number of times the switch
attempts to reach the primary or secondary NAC accounting server before giving
up.
Accounting Mode Use the Accounting Mode drop-down menu to define the accounting mode as
either Start-Stop, Stop Only or Start-Interim-Stop. Define the interval (in
seconds) used with the selected accounting mode
9. Select the Re-authentication checkbox to force a periodic re-authentication with the NAC server.
Periodic repetition of the authentication process provides ongoing security for currently authorized
connections. Define an interval between 30 and 65535 seconds.
10.Refer to the Advanced field to define the authentication protocol used with the NAC Server.
PAP PAP - Password Authentication Protocol sends a username and password over a
network to a server that compares the username and password to a table of
authorized users. If the username and password are matched in the table, server
access is authorized.
Network Setup 4-47
11.Refer to the Status field for the current state of the requests made from applet. This field displays error
messages if something goes wrong in the transaction between the applet and the switch.
12.Click OK to use the changes to the running configuration and close the dialog.
13.Click Cancel to close the dialog without committing updates to the running configuration.
Key 1 1011121314
Key 2 2021222324
Key 3 3031323334
Key 4 4041424344
7. If you feel it necessary to restore the WEP algorithm back to its default settings, click the Restore
Default WEP Keys button. This may be the case if you feel the latest defined WEP algorithm has been
compromised and longer provides its former measure of data security.
8. Refer to the Status field for the current state of the requests made from applet. This field displays error
messages if something goes wrong in the transaction between the applet and the switch.
9. Click OK to use the changes to the running configuration and close the dialog.
10.Click Cancel to close the dialog without committing updates to the running configuration.
Network Setup 4-49
Key 1 101112131415161718191A1B1C
Key 2 202122232425262728292A2B2C
Key 3 303132333435363738393A3B3C
Key 4 404142434445464748494A4B4C
7. If you feel it necessary to restore the WEP algorithm back to its default settings, click the Restore
Default WEP Keys button. This may be the case if you feel the latest defined WEP algorithm has been
compromised and no longer provides its former measure of data security.
8. Refer to the Status field for the current state of the requests made from applet. This field displays error
messages if something goes wrong in the transaction between the applet and the switch.
9. Click OK to use the changes to the running configuration and close the dialog.
10.Click Cancel to close the dialog without committing updates to the running configuration.
Network Setup 4-51
5. Select the Broadcast Key Rotation checkbox to enable the broadcasting of encryption-key changes to
MUs.
Only broadcast key changes when required by associated MUs to reduce the transmissions of sensitive
key information. This value is enabled by default.
6. Refer to the Update broadcast keys every field to specify a time period (in seconds) for broadcasting
encryption-key changes to MUs.
Set key broadcasts to a shorter interval (at least 60 seconds) for tighter security on wireless connections.
Set key broadcasts to a longer interval (at most, 86400 seconds) to extend key times for wireless
connections. The default is 7200 seconds.
7. Configure the Key Settings field as needed to set an ASCII Passphrase and key values.
ASCII Passphrase To use an ASCII passphrase (and not a hexadecimal value), select the checkbox
and enter an alphanumeric string of 8 to 63 characters. The alphanumeric string
allows character spaces. The switch converts the string to a numeric value. This
passphrase saves the administrator from entering the 256-bit key each time keys
are generated.
256-bit Key To use a hexadecimal value (and not an ASCII passphrase), select the checkbox
and enter 16 hexadecimal characters into each of the four fields displayed.
8. Optionally select one of the following from within the Fast Roaming (8021x only) field.
PMK Caching Select Pairwise Master Key (PMK) caching to create a shared key between a client
device and its authenticator. When a client roams between devices, the client’s
credentials no longer need to completely reauthenticated (a process that can take
up to 100 milliseconds). In the instance of a voice session, the connection would
likely be terminated if not using a PMK. PMK cache entries are stored for a finite
amount of time, as configured on the wireless client.
Opportunistic Key Opportunistic Key Caching allows the switch to use a PMK derived with a
Caching client on one access port with the same client when it roams over to another
access port. Upon roaming, the client does not have to conduct 802.1x
authentication and can start sending/receiving data sooner.
9. Refer to the Status field for the current state of the requests made from applet. This field displays error
messages if something goes wrong in the transaction between the applet and the switch.
10.Click OK to use the changes to the running configuration and close the dialog.
11.Click Cancel to close the dialog without committing updates to the running configuration.
Last 30s Click the Last 30s radio button to display statistics for the WLAN over the last 30
seconds. This option is helpful when troubleshooting issues as they actually occur.
Last Hr Click the Last Hr radio button to displays statistics for the WLAN over the last 1
hour. This metric is helpful in baselining events over a one hour interval.
Index The Idx (or index) is a numerical identifier used to differentiate the WLAN from
other WLANs that may have similar characteristics.
ESSID The SSID is the Service Set ID (SSID) for the selected WLAN.
Descr The Descr item contains a brief description of the WLAN. Use the description
(along with the index) to differentiate the WLAN from others with similar
attributes.
VLAN The VLAN parameter displays the name of the VLAN the WLAN is associated with.
Throughput Mbps Throughput Mbps is the average throughput in Mbps on the selected WLAN. The
Rx value is the average throughput in Mbps for packets received on the selected
WLAN. The Tx value is the average throughput for packets sent on the selected
WLAN.
Avg BPS Displays the average bit speed in Mbps for the selected WLAN. This includes all
packets sent and received.
Network Setup 4-55
% Non-UNI Displays the percentage of the total packets for the selected WLAN that are non-
unicast packets. Non-unicast packets include broadcast and multicast packets.
Retries Displays the average number of retries for all MUs associated with the selected
WLAN.
4. To view WLAN statistics in greater detail, select a WLAN and click the Statistics button. For more
information, see Viewing WLAN Statistics in Detail on page 4-55.
5. To view WLAN statistics in a graphical format, select a WLAN and click the Graph button. For more
information, see Viewing WLAN Statistics in a Graphical Format on page 4-57.
6. To view WLAN packet data rates and retry counts, select a WLAN and click the Switch Statistics
button. For more information, see Viewing WLAN Switch Statistics on page 4-59.
The Details screen displays the WLAN statistics of the selected WLAN. The Details screen contains the
following fields:
4-56 WS5100 Series Switch System Reference Guide
• Information
• Traffic
• RF Status
• Errors
Information in black represents the statistics from the last 30 seconds and information in blue
represents statistics from the last hour.
4. Refer to the Information field for the following information:
ESSID Displays the Service Set ID (SSID) for the selected WLAN.
VLAN Displays the name of the VLAN the WLAN is associated with.
Num Associated Displays the total number of MUs currently associated with the selected WLAN.
Stations
Encryption Type Displays the encryption type deployed on the selected WLAN.
5. Refer to the Traffic field for the following information (both received and transmitted):
Pkts per second Displays the average total packets per second that cross the selected WLAN. The
Rx column displays the average total packets per second received on the selected
WLAN. The Tx column displays the average total packets per second sent on the
selected WLAN. The number in black represents this statistic for the last 30
seconds and the number in blue represents this statistic for the last hour.
Throughput Displays the average throughput in Mbps on the selected WLAN. The Rx column
displays the average throughput in Mbps for packets received on the selected
WLAN. The Tx column displays the average throughput for packets sent on the
selected WLAN. The number in black represents this statistic for the last 30
seconds and the number in blue represents this statistic for the last hour.
Avg Bit Speed Displays the average bit speed in Mbps on the selected WLAN. This includes all
packets sent and received. The number in black represents this statistic for the
last 30 seconds and the number in blue represents this statistic for the last hour.
Non-unicast Pkts Displays the percentage of the total packets for the selected WLAN that are non-
unicast. Non-unicast packets include broadcast and multicast packets. The
number in black represents this statistic for the last 30 seconds and the number in
blue represents this statistic for the last hour.
Avg MU Signal Displays the average RF signal strength in dBm for all MUs associated with the
selected WLAN. The number in black represents this statistic for the last 30
seconds and the number in blue represents this statistic for the last hour.
Network Setup 4-57
Avg MU Noise Displays the average RF noise for all MUs associated with the selected WLAN.
The number in black represents this statistic for the last 30 seconds and the
number in blue represents this statistic for the last hour.
Avg MU SNR Displays the average Signal to Noise Ratio (SNR) for all MUs associated with the
selected WLAN. The Signal to Noise Ratio is an indication of overall RF
performance on your wireless network.
Average Number of Displays the average number of retries for all MUs associated with the selected
Retries WLAN. The number in black represents this statistic for the last 30 seconds and
the number in blue represents this statistic for the last hour.
% Gave Up Pkts Displays the percentage of packets the switch gave up on for all MUs associated
with the selected WLAN. The number in black represents this statistic for the last
30 seconds and the number in blue represents this statistic for the last hour.
% Non-decryptable Displays the percentage of undecryptable packets for all MUs associated with the
Pkts selected WLAN. The number in black represents this statistic for the last 30
seconds and the number in blue represents this statistic for the last hour.
8. Refer to the Status field for the current state of the requests made from applet. This field displays error
messages if something goes wrong in the transaction between the applet and the switch.
9. Click OK to use the changes to the running configuration and close the dialog.
10.Click Cancel to close the dialog without committing updates to the running configuration.
The WLAN Statistics screen displays for the select port. The WLAN Statistics screen provides the option
of viewing the graphical statistics of the following parameters:
• Pkts per sec
• Throughput (Mbps)
• Avg Bits per sec
• Avg Signal (dBm)
• Dropped Pkts
• TX Pkts per sec
• TX Tput (Mbps)
• NUcast Pkts
• Avg Noise (dBm)
• Undecr Pkts
• RXPkts per sec
• RX Tput (Mbps)
• Avg Retries
• Avg SNR (dB)
• # Radios
NOTE: You cannot select (and trend) more than four parameters at any given time.
Network Setup 4-59
3. Select any of the above listed parameters by clicking on the checkbox associated with it.
4. Click the Close button to exit the screen.
4. Refer to the Packet Rates field to review the number of packets both transmitted (Tx) and received (Rx)
at data rates from 1.0 to 54.0 Mbps. If a large number of packets are sent and received at a slower data
rate, then perhaps the switch is not adequately positioned or configured to support the MUs within that
WLAN.
NOTE: The Motorola RF Management Software is recommended to plan the deployment
of the switch. Motorola RFMS can help optimize the positioning and configuration of a
switch in respect to a WLAN’s MU throughput requirements. For more information, refer
to the Motorola Web site.
5. Refer to the Retry Counts field to review the number packets requiring retransmission from the switch.
4-60 WS5100 Series Switch System Reference Guide
6. Refer to the Status field for the current state of the requests made from applet. This field displays error
messages if something goes wrong in the transaction between the applet and the switch.
7. Click Refresh to update the Packet Rate and Retry Count data displayed within the screen.
8. Click Close to close the dialog and re turn to the Network > Wireless LANs > Statistics screen.
Idx Displays the WLANs numerical identifier. The WLAN index range is from 1 to 32.
Click the Edit button to modify this property.
SSID Displays the Service Set ID (SSID) associated with each WLAN.
WLAN enabled Displays the status of the WLAN. A Green check defines the WLAN as enabled
and a Red "X" means it is disabled. The enable/disable setting can be defined
using the WLAN Configuration screen.
WMM enabled Displays WLAN-WMM status. It can be enabled (for a WLAN) from the WLAN
Configurations Edit screen by selecting the Enable WMM checkbox.
Network Setup 4-61
Access Displays the Access Category for the intended radio traffic. Access Categories are
the different WLAN-WMM options available.
The four Access Category types are:
• Background — Optimized for background traffic
• Best-effort — Optimized for best effort traffic
• Video — Optimized for video traffic
• Voice — Optimized for voice traffic
AIFSN Displays the current Arbitrary Inter-frame Space Number (AIFSN). Higher-priority
traffic categories should have lower AIFSNs than lower-priority traffic categories.
This will causes lower-priority traffic to wait longer before trying attempting
access.
Transmit Ops Displays the maximum duration a device can transmit after obtaining a transmit
opportunity. For higher-priority traffic categories, this value should be set to a
low number.
CW Min The CW Min is combined with the CW Max to make the Contention screen. From
this range, a random number is selected for the back off mechanism. Lower values
are used for higher priority traffic.
CW Max The CW Max is combined with the CW Min to make the Contention screen. From
this range, a random number is selected for the back off mechanism. Lower values
are used for higher priority traffic.
3. Click the Edit button to display a screen used to modify the WMM parameters. For more information, see
Editing WMM Settings on page 4-63.
4-62 WS5100 Series Switch System Reference Guide
4. Select the QoS Mappings button to revise the existing mappings of access category to 802.1p and DSCP
to access category settings.
With a drastic increase in bandwidth absorbing network traffic (VOIP, multimedia etc.), the importance of
data prioritization is critical to effective network management.
Refer to the following fields within the QoS Mapping screen to optionally revise the existing settings to
in respect to the data traffic requirements for this WLAN.
Access Category to Optionally revise the 802.1p Prioritization for each access category to prioritize
802.1p the network traffic expected on this WLAN.
802.1p to Access Set the access category accordingly in respect to its importance for this WLAN’s
Category target network traffic.
DSCP to Access Set the access category accordingly in respect to its DSCP importance for this
Category WLAN’s target network traffic.
Differentiated Services Code Point (DSCP) is a field in an IP packet that enables
different levels of service to be assigned to network traffic. This is achieved by
marking each packet on the network with a DSCP code and appropriating to it the
corresponding level of service or priority. QoS enabled programs request a specific
service type for a traffic flow through the generic QoS (GQoS) application
programming interface (API).
Network Setup 4-63
SSID Displays the Service Set ID (SSID) associated with the selected WMM index. This
SSID is read-only and cannot be modified within this screen.
Access Category Displays the Access Category for the intended radio traffic. The Access Categories
are the different WLAN-WMM options available to the radio.
The four Access Category types are:
• Background - Optimized for background traffic
• Best-effort - Optimized for best effort traffic
• Video - Optimized for video traffic. Video traffic receives priority.
• Voice - Optimized for voice traffic. Voice traffic receives priority.
4-64 WS5100 Series Switch System Reference Guide
AIFSN Define the current Arbitrary Inter-frame Space Number (AIFSN). Higher-priority
traffic categories should have lower AIFSNs than lower-priority traffic categories.
This will causes lower-priority traffic to wait longer before trying to access the
medium.
Transmit Ops Define the maximum duration a device can transmit after obtaining a transmit
opportunity. For higher-priority traffic categories, this value should be set to a low
number.
CW Minimum The CW Minimum is combined with the CW Maximum to make the Contention
screen. From this range, a random number is selected for the back off mechanism.
Select a lower value for high priority traffic.
CW Maximum The CW Maximum is combined with the CW Minimum to make the Contention
screen. From this range, a random number is selected for the back off mechanism.
Lower values are used for higher priority traffic
Use DSCP or 802.1p Select the DSCP or 802.1p radio buttons to choose between DSCP and 802.1p.
5. Refer to the Status field for the current state of the requests made from applet. This field displays error
messages if something goes wrong in the transaction between the applet and the switch.
6. Click OK to use the changes to the running configuration and close the dialog.
7. Click Cancel to close the dialog without committing updates to the running configuration.
• Include a few MU’s for NAC validation and bypass the rest of the MU’s.
To view the attributes of a NAC Include list:
1. Select Network > Wireless LANs from the main menu tree.
2. Select the NAC Include List Configuration tab to view and configure NAC enabled devices.
3. The Include Lists field displays the list of devices that can be included on a WLAN (a printer for
example).
Use the Add button to add a device for configuration on a WLAN. A maximum of 6 MAC addressees are
allowed per device. For more information, see Adding an Include List to a WLAN on page 4-66.
The List Configuration field displays a list of MAC addresses that can be included on a WLAN. You can
add more than one device in this list. For example, printer 1, printer 2 etc.
4. Use the Add button (within the List Configuration field) to add more than one device to the WLAN. You
can create 32 lists (both include and exclude combined together) and 64 MAC entries per list. For more
information, see Configuring Devices on the Include List on page 4-66.
5. The Configured WLANs field displays available WLANs. Associate a list item (within the Include Lists
field) with as many WLANs as required.
For information on mapping NAC Include list items with WLANs, see Mapping Include List Items to
WLANs on page 4-67.
6. To delete a device (and its configuration), select it from the Include Lists and click the Delete button
7. Use the Edit button in the List Configuration section to modify the devices parameters.
8. To delete any list configuration for a particular device, select the row from the List Configuration
section and click on the Delete button.
4-66 WS5100 Series Switch System Reference Guide
The List Name field displays the name of the device list used. This parameter is read-only.
4. Enter the Host Name for the device you wish to add.
5. Enter a valid MAC Address of the device you wish to add.
6. Optionally, enter the MAC Mask for the device you wish to add.
Network Setup 4-67
7. Refer to the Status field. It displays the current state of the requests made from the applet. Requests are
any “SET/GET” operation from the applet. The Status field displays error messages if something goes
wrong in the transaction between the applet and the switch.
8. Click OK to save and add the new configuration and close the dialog window.
9. Click Cancel to close the dialog without committing updates to the running configuration.
4. Map the selected list item with as many WLANs as needed (be selecting the WLAN’s checkbox). Use the
Select All button to associate each WLAN with the selected list item.
5. To remove the WLAN Mappings, select the Deselect All button to clear the mappings.
6. Refer to the Status field for a display of the current state of the requests made from the applet. Requests
are any “SET/GET” operation from the applet. The Status field displays error messages if something goes
wrong in the transaction between the applet and the switch.
7. Click OK to save and add the new configuration and close the dialog window.
8. Click Cancel to close the dialog without committing updates to the running configuration.
4-68 WS5100 Series Switch System Reference Guide
The Exclude Lists field displays a list of devices that can be excluded from a WLAN.
3. Use the Add button to add a device that can be excluded on a WLAN. For more information, see
Adding an Exclude List to the WLAN on page 4-69.
The List Configuration field displays a list of MAC addresses that can be excluded from a WLAN. You
can add more than one device to this list.
4. Use the Add button (within the List Configuration field) to add devices excluded from NAC compliance
on a WLAN. You can create up to 32 lists (both include and exclude combined together) and 64 MAC
Network Setup 4-69
entries maximum per list. For more information, see Configuring Devices on the Exclude List on page 4-
69.
5. The Configured WLANs field displays the available switch WLANs. Associate a list item in the Exclude
Lists field with multiple WLANs.
For information on mapping NAC Exclude list’s items to WLANs, see Mapping Exclude List Items to
WLANs on page 4-70.
6. To delete a device, select a device from the Exclude List and click the Delete button.
7. Use the Edit button to modify devices parameters.
8. To delete a list configuration for a device, select a row from the List Configuration field and click the
Delete button.
4. Enter the name of the device that you wish to exclude for NAC authentication.
5. Refer to the Status field. It displays the current state of the requests made from the applet. Requests are
any “SET/GET” operation from the applet. The Status field displays error messages if something goes
wrong in the transaction between the applet and the switch.
6. Click OK to save and add the new configuration and close the dialog window.
7. Click Cancel to close the dialog without committing updates to the running configuration.
4. The List Name displays the read-only name of the list for which you wish to add more devices.
5. Enter the Host Name for the device you wish to add for the selected exclude list.
6. Enter a valid MAC Address for the device you wish to add.
7. Optionally, enter the MAC Mask for the device you wish to add.
8. Refer to the Status field. It displays the current state of the requests made from the applet. Requests are
any “SET/GET” operation from the applet. The Status field displays error messages if something goes
wrong in the transaction between the applet and the switch.
9. Click OK to save and add the new configuration and close the dialog window.
10.Click Cancel to close the dialog without committing updates to the running configuration.
3. Select a item from the Exclude List’s List Name field and click the Edit button (within the Configured
WLANs field).
4. Map the selected list item with as many WLANs as needed (be selecting the WLAN’s checkbox). Use the
Select All button to associate each WLAN with the selected list item.
5. To remove the WLAN Mappings, select the Deselect All button to clear the mappings.
6. Refer to the Status field for a display of the current state of the requests made from the applet. Requests
are any “SET/GET” operation from the applet. The Status field displays error messages if something goes
wrong in the transaction between the applet and the switch.
7. Click OK to save and add the new configuration and close the dialog window.
8. Click Cancel to close the dialog without committing updates to the running configuration.
2. Add a host entry to the include list. This adds a specified MAC entry/MAC range into the client’s include
list.
WS5100 (config-wireless-client-list) #station pc1 AA:BB:CC:DD:EE:FF
WS5100 (config-wireless-client-list) #
3. Associate the include list to a WLAN. This adds the client’s include list into the WLAN.
WS5100 (config-wireless-client-list) #wlan 1
WS5100 (config-wireless-client-list) #
The Status screen displays the following read-only device information for MUs interoperating within the
switch managed network.
Station Index Displays a numerical device recognition identifier for a specific MU.
MAC Address Each MU has a unique Media Access Control (MAC) address through which it is
identified. This address is burned into the ROM of the MU.
IP Address Displays the unique IP address for the MU. Use this address as necessary
throughout the applet for filtering and device intrusion recognition and approval.
Ready Displays whether the MU is ready for switch interoperation. Values are Yes and
No.
Network Setup 4-75
Power Save Displays the current (read-only) Power-Save-Poll (PSP) state of the MU. The Power
Save field has two potential settings. PSP indicates the MU is operating in Power
Save Protocol mode. In PSP, the MU runs enough power to check for beacons and
is otherwise inactive. CAM indicates the MU is continuously aware of all radio
traffic. CAM is recommended for MUs frequently transmitting with the switch’s
access ports for periods of two hours or greater.
WLAN Displays the name of the WLAN the MU’s associated AP is connect to.
Radio Index The Radio Index is a numerical device recognition identifier for MU radios. The
index is helpful to differentiate device radios when a particular MU has more than
one radio.
Radio Type The Radio Type defines the radio used by the adopted MU. The switch supports
802.11b MUs and 802.11 a/b and 802.11 a/g dual-radio MUs. The radio also
supports 802.11a only and 802.11g MUs.
3. Click the Details button to launch a screen with additional information about the selected MU. For more
information, see Viewing MU Details on page 4-75
4. Highlight a MU from those listed and click the Disconnect button to remove the MU from the list of
currently associated devices.
Be aware that disconnected MUs will often become immediately re-connected to the switch. Ensure
disconnected MUs are permanently removed from switch association.
5. Click the Export button to export the content of the table to a Comma Separated Values file (CSV).
3. Select a MU from the table in the Status screen and click the Details button.
MAC Address Displays the Hardware or Media Access Control (MAC) address for the MU.
IP Address Displays the unique IP address for the MU. Use this address as necessary
throughout the applet for filtering and device intrusion recognition and approval.
Power Save Displays the current PSP state of the MU. This field has two potential settings.
PSP indicates if the MU is operating in PSP mode. In PSP, the MU runs enough
power to check for beacons, and is otherwise inactive. CAM indicates the MU is
continuously aware of all radio traffic. CAM is recommended for MUs transmitting
frequently.
VLAN Displays the VLAN parameter for the name of the VLAN the MU is currently
mapped to.
Last Active Displays the time the MU last interoperated with the switch.
QoS Information Displays an indicator of the wireless device’s battery life. Additionally, the service
period for the selected MU is also displayed.
Radio Index Displays is a numerical identifier used to associate a particular Radio with a set
of statistics. The Index is helpful for distinguishing the a particular radio from
other MU radios with similar configurations.
Radio Type Displays the radio type used by the adopted MU. The switch supports 802.11b
MUs as well as 802.11 a/b and 802.11 a/g dual-radio MUs. The radio also
supports 802.11a only and 802.11g MUs.
Base Radio MAC Displays the SSID of the access port when initially adopted by the switch.
Voice Displays whether or not the MU is a voice capable device. Traffic from a voice
enabled MU is handled differently than traffic from MUs without this capability.
MUs grouped to particular WLANs can be prioritized to transmit and receive voice
traffic over data traffic.
WMM Displays WMM usage status for the MU, including the Access Category currently
in use. Use this information to assess whether the MU is using the correct WMM
settings in relation to the operation of the switch.
Roam Count Refer to the Roam Count value to assess the number of times the MU has roamed
from the switch.
5. Click the Refresh button to update the MU Statistics to their latest values.
6. Refer to the Status field for the current state of the requests made from applet. This field displays error
messages if something goes wrong in the transaction between the applet and the switch.
3. Select the Last 30s checkbox to display MU statistics gathered over the last 30 seconds. This option is
helpful for assessing MU performance trends in real-time.
4-78 WS5100 Series Switch System Reference Guide
4. Select the Last HR checkbox to display MU statistics gathered over the last hour. This option is helpful
for assessing performance trends over a measurable period.
5. Refer to following details as displayed within the MU Statistics table:
Radio Index Displays a numerical identifier used to associate a particular Radio with a set of
statistics. The Index is helpful for distinguishing the radio from other radios with
a similar configuration.
MAC Address Displays the Hardware or Media Access Control (MAC) address for the MU. The
MAC address is hard coded at the factory and cannot be modified.
WLAN Displays the name of the WLAN the MU is currently associated with. Use this
information to determine if the MU/WLAN placement best suits the intended
operation and MU coverage area.
Throughput Mbps Displays the average throughput in Mbps between the selected MU and the
access port. The Rx column displays the average throughput in Mbps for packets
received on the selected MU from the access port. The Tx column displays the
average throughput for packets sent on the selected MU from the access port.
Bit Speed (Avg.) Displays the average bit speed in Mbps for the selected MU. This includes all
Mpbs packets sent and received.
% Non Unicast Displays the percentage of the total packets for the selected MU that are non-
unicast packets. Non-unicast packets include broadcast and multicast packets.
Retries Displays the average number of retries per packet. A high number in this field
could indicate possible network or hardware problems.
6. Click the Details button to launch a screen with additional information about the selected MU. For more
information, see Viewing MU Statistics in Detail on page 4-78.
7. Click the Graph button to launch a graph with pictorial information about the selected MU in a graphical
format. For more information, see View a MU Statistics Graph on page 4-80.
8. Click the Export button to export the content of the table to a Comma Separated Values file (CSV).
3. Select a MU from the table displayed in the Statistics screen and click the Details button.
The Details screen displays WLAN statistics for the selected WLAN, including:
• Information
• Traffic
• RF Status
• Errors
Information in black represents the statistics from the last 30 seconds and information in blue represents
statistics from the last hour. Use both sets of data to trend stats in real time versus a measurable period
(1 hour).
4. Refer to the Information field for the following information:
MAC Address Displays the Hardware or Media Access Control (MAC) address for the MU. This
address is hard-coded at the factory and cannot be modified.
Voice Displays whether the MU is a voice capable device. Traffic from voice enabled
MUs is handled differently (higher priority) than traffic from MUs without this
capability.
4-80 WS5100 Series Switch System Reference Guide
WLAN Displays the name of the WLAN the MU is currently associated with.
WMM Displays WMM usage status for the MU, including the access category currently
in use. Use this information to assess whether the MU is using the correct WMM
settings in relation to its intended data traffic type.
Pkts per second Displays the average packets per second received by the MU. The Rx column
displays the average packets per second received on the selected MU. The Tx
column displays the average packets per second sent on the selected MU.
Throughput Displays the average throughput in Mbps between the MU and the access port.
The Rx column displays the average throughput in Mbps for packets received on
the selected MU from the access port. The Tx column displays the average
throughput for packets sent on the selected MU from the access port.
Avg. Bit Speed Displays the average bit speed in Mbps on the selected MU. This includes all
packets sent and received.
% Non-unicast pkts Displays the percentage of the total packets for the MU that are non-unicast
packets. Non-unicast packets include broadcast and multicast packets.
Avg MU Signal Displays the RF signal strength in dBm for the selected MU.
Avg MU SNR Displays the Signal to Noise Ratio (SNR) for the selected MU. The Signal to Noise
Ratio is an indication of overall RF performance on the wireless network.
Avg Num of Retries Displays the average number of retries for the selected MU. Use this information
to assess potential performance issues.
% Gave Up Pkts Displays the percentage of packets the switch gave up on for the selected MU.
% of Undecryptable Displays the percentage of undecryptable packets (packets that could not be
Pkts processed) for the selected MU.
8. Refer to the Status field for the current state of the requests made from applet. This field displays error
messages if something goes wrong in the transaction between the applet and the switch.
9. Click Cancel to close the dialog without committing updates to the running configuration.
3. Select a MU from the table displayed in the Statistics screen and click the Graph button.
4. Select a checkbox to display that metric charted within the graph. Do not select more than four
checkboxes at any one time.
5. Refer to the Status field for the current state of the requests made from applet. This field displays error
messages if something goes wrong in the transaction between the applet and the switch.
6. Click Close to close the dialog without committing updates to the running configuration.
Index Displays the numerical index (device identifier) used with the device radio. Use
this index (along with the radio name) to differentiate the radio from other device
radios.
AP Type Displays the type of access port detected. The switch supports Motorola AP-300
model access ports.
Type Use the Type to identify whether the radio is 802.11a radio or an 802.11bg radio.
Adopted Displays the radio’s adoption status. If the radio is adopted, a green check
displays. If the radio is not adopted, a red X displays.
Network Setup 4-83
Parent AP MAC Displays the access port's Ethernet MAC (the device MAC address that is printed
Address on the casing of the unit). Please do not confuse this BSSID MAC with the access
port's Ethernet MAC address.
MAC Address The Base Radio MAC is the radio's first MAC address when it is adopted by the
Switch.
State Display the radio’s current operational mode. If the radio is set as a Detector AP,
the state is "Detector", otherwise the state is "Normal".
VLAN Displays the name of the VLAN currently used with each access port radio.
Desired Channel When the radio’s channel is configured statically, the Actual Channel and Desired
Channel are the same. If using ACS (Automatic Channel Selection), the switch
selects a channel for the radio. The Desired Channel displays “ACS” and the
Actual channel displays the channel selected for the radio. When set to Random,
the applet determines the channel’s designation.
Actual Channel When the radio’s channel is configured statically, the Actual Channel and Desired
Channel are the same. If using ACS (Automatic Channel Selection), the switch
selects a channel for the radio. The Desired channel displays “ACS” and the
Actual Channel displays the channel selected for the radio.
Desired Power (dBm) Displays the configured power setting in dBm for the selected radio. In most
cases, the Desired Power and Actual Power are the same unless the desired
power level would put the radio's output power outside the accepted regulatory
compliance range.
Actual Power Displays the current power level in dBm for the selected radio. In most cases, the
Desired Power and Actual Power are the same unless the desired power level
would put the radio's output power outside the accepted regulatory compliance
range.
Placement When the radio is adopted using the default configuration, the power for the radio
can be defined as “Indoor” or “Outdoor.” However, some countries have
restrictions for the use of outdoor radios. If using a value of “Outdoor” verify it is
in compliance with the country of operation’s regulatory restrictions.
Last Adopted Displays the time this radio was last adopted by the switch.
5. Click the Edit button to launch a screen used to configure radio specific parameters. For more
information, see Editing AP Settings on page 4-85.
6. Click the Delete button to remove a radio. However, before a radio can be removed, the radio’s BSS
mapping must be removed.
7. Click the Add button to add a radio. The radio must be added before the radio can be adopted. For more
information, see Adding APs on page 4-90.
8. Click the Reset button to reset an individual radio.
9. Click the Tools > button to displays a submneu with Reset, Run ACS and Export options.
Select the Reset option to reset the access port radio. Select the Run ACS Now option to scan all
channels and discover which radios are adopted and on what channel. ACS then analyzes the radios'
4-84 WS5100 Series Switch System Reference Guide
channels and moves the radio to the channel where it is least likely to have interference from the other
radios. Use the Export option to move the contents of the table to a Comma Separated Values file (CSV).
10.Click the Global Settings button to display a screen with settings applying to all radios on the system.
For more information, see Configuring an AP’s Global Settings on page 4-84.
Port Authentication
To configure the port authentication settings on an access port:
1. Select Network > Access Port Radios from the main menu tree.
2. Click the Configuration tab.
3. Click the Global Settings button.
4. Click the Configure Port Authentication button.
5. Enter the 802.1x Username assigned to the access port.
6. Enter the 802.1x Password (for the corresponding username) providing authorization for access port
authorization adoption.
NOTE: The default user name and password for AP300 port authentication is a user name
of admin and a password of symbol.
7. Check the Use Default Values option checkbox to set the Username and Password to factory default
values. The access port can get disconnected if the 802.1x authenticator is not configured accordingly.
NOTE: 802.1x username and password information is only passed to adopted access
ports when the Username and Password are set. Any AP adopted after this does not
automatically receive a username and password.
NOTE: After setting the username and password to factory default settings, the system
must be rebooted before the factory default settings are applied
8. Refer to the Status field for the current state of the requests made from applet. This field displays error
messages if something goes wrong in the transaction between the applet and the switch.
9. Click OK to use the changes to the running configuration and close the dialog.
10.Click Cancel to close the dialog without committing updates to the running configuration.
settings as well as a set of advanced properties in case its transmit and receive capabilities need to be
adjusted.
NOTE: The screen display can vary slightly depending on whether the access port radio is
an 802.11a or 802.11bg model.
5. In the Radio Descr. field, enter a brief description to differentiate the radio. The description is used to
describe radios of the same type and can be used to locate a radio if there are any problems.
6. Select the Dedicate this Radio as Detector option to use this radio as a detector port to identify rogue
APs on the network.
Setting this radio as a detector dedicates the radio to detect rogue APs on the network. Dedicated
detectors do not connect to clients.
7. Select the Single-channel scan for Unapproved APs checkbox to enable the switch to scan for rogue
devices using the radio’s current channel of operation.
Network Setup 4-87
8. Select the Enable Enhanced Beacon Table checkbox to allow adopted access port or access point
radios to scan for potentially unauthorized APs across all bands.
This option utilizes radio bandwidth, but is an exhaustive means of scanning across all available channels
and listening for AP beacon traffic. Once probe responses are received, a network device management
application like Motorola RFMS or the Wireless Intrusion Detection System (WIDS) can locate the device
and remove it if defined as unauthorized.
9. Select the Enable Enhanced Probe Table checkbox to enable an adopted access port or access point
radio to forward the probes required to obtain MU RSSI information.
RSSI data (as obtained by at least three detecting radios) can be used by the Motorola RFMS application
to triangulate the location of a MU on a site map representative of the actual physical dimensions of the
switch radio coverage area. Once located on a site map, intuitive decisions can be made regarding the
MU’s authorization within the switch managed network.
10.From within the Radio Settings field, define the Placement of the access port as either Indoors or
Outdoors.
An access port can be set for Indoors or Outdoors use depending on the model and the placement
location. Power settings and channel selection options differ based on each country's regulatory rules
and whether or not the unit is placed indoors or outdoors.
11.Select a channel for communications between the access port and its associated MUs within the
Desired Channel field.
The selection of a channel determines the available power levels. The range of legally approved
communication channels varies depending on the installation location and country. The selected channel
can be a specific channel, “Random,” or “ACS.” Random assigns each radio a random channel. ACS
(Automatic Channel Selection) allows the switch to systematically assign channels. Default is Random.
12.After first selecting a channel, select a power level in dBm for RF signal strength in the Desired Power
(dBm) field.
The optimal power level for the specified channel is best determined by a site survey prior to installation.
Available settings are determined according to the selected channel. Set a higher power level to ensure
RF coverage in WLAN environments that have more electromagnetic interference or greater distances
between the access port and MUs. Decrease the power level according to the proximity of other access
ports. Overlapping RF coverage may cause lost packets and problems for roaming devices trying to
connect to an access port. After setting a power level, channel and placement the RF output power for
the access port is displayed in mW. The default is 20 dBm (802.11bg), 17 dBm (802.11a).
NOTE: After setting a power level, channel and placement, the RF output power for the
access port displays in mW.
13.To configure optional rate settings, click the Rate Settings button to display a new dialogue containing
rate setting information. Instructions on configuring rate settings is described in Configuring Rate
Settings on page 4-89.
4-88 WS5100 Series Switch System Reference Guide
14.In most cases, the default settings for the Advanced Properties are sufficient. If needed, additional
Advanced Properties can be modified for the following:
Antenna Diversity Use the drop-down menu to configure the Antenna Diversity settings for access
ports using external antennas. Options include:
• Full Diversity - Utilizes both antennas to provide antenna diversity.
• Primary Only - Enables only the primary antenna.
• Secondary Only - Enables only the secondary antenna.
Antenna Diversity should only be enabled if the access port has two matching
external antennas. Default value is Full Diversity.
Maximum MUs Sets the maximum number of MUs that can associate to a radio. The maximum
number of MUs that can associate to a radio is 64.
Adoption Preference Displays the preference ID of the switch.The value can be set between 1 and 65535.
ID To define the radios as preferred, the access port preference ID should be same as
adoption preference ID.
The adoption preference ID is used for AP load-balancing. A switch will
preferentially adopt APs which have the same adoption-preference-ID as the
switch itself.
Short Preambles only If using an 802.11bg radio, select this checkbox for the radio to transmit using a
short preamble. Short preambles improve throughput. However, some devices
(SpectraLink phones) require long preambles. This checkbox does not display if
using an 802.11a radio.
RTS Threshold Specify a Request To Send (RTS) threshold (in bytes) for use by the WLAN's adopted
access ports.
RTS is a transmitting station's signal that requests a Clear To Send (CTS) response
from a receiving station. This RTS/CTS procedure clears the air where many MUs
are contending for transmission time. Benefits include fewer data collisions and
better communication with nodes that are hard to find (or hidden) because of other
active nodes in the transmission path.
Control RTS/CTS by setting an RTS threshold. This setting initiates an RTS/CTS
exchange for data frames larger than the threshold, and sends (without RTS/CTS)
any data frames smaller than the threshold.
Consider the trade-offs when setting an appropriate RTS threshold for the WLAN's
access ports. A lower RTS threshold causes more frequent RTS/CTS exchanges.
This consumes more bandwidth because of additional latency (RTS/CTS
exchanges) before transmissions can commence. A disadvantage is the reduction
in data-frame throughput. An advantage is quicker system recovery from
electromagnetic interference and data collisions. Environments with more wireless
traffic and contention for transmission make the best use of a lower RTS threshold.
A higher RTS threshold minimizes RTS/CTS exchanges, consuming less bandwidth
for data transmissions. A disadvantage is less help to nodes that encounter
interference and collisions. An advantage is faster data-frame throughput.
Environments with less wireless traffic and contention for transmission make the
best use of a higher RTS threshold. Default is 2346.
Network Setup 4-89
Beacon Interval Specify a beacon interval in units of 1,000 microseconds (K-us). This is a multiple
of the DTIM value, for example, 100: 10. (See "DTIM Period," below). A beacon is
a packet broadcast by the adopted access ports to keep the network synchronized.
Included in a beacon is information such as the WLAN service area, the radio-port
address, the broadcast destination addresses, a time stamp, and indicators about
traffic and delivery such as a DTIM. Increase the DTIM/beacon settings
(lengthening the time) to let nodes sleep longer and preserve battery life.
Decrease these settings (shortening the time) to support streaming-multicast
audio and video applications that are jitter-sensitive. The default is
100 K-us.
Self Healing Offset When an access port increases its power to compensate for a failure, power is
increased to the country's regulatory maximum. Set the Self Healing Offset to
reduce the country's regulatory maximum power if access ports are situated close
to each other or if an access port uses an external antenna.
DTIM Periods Select the DTIM periods button to specify a period for Delivery Traffic Indication
Messages (DTIM) for BSS IDs 1-4. This is a divisor of the beacon interval (in
milliseconds), for example, 10 : 100. (See "Beacon Interval," above). A DTIM is
periodically included in the beacon frame transmitted from adopted access ports.
The DTIM period determines how often the beacon contains a DTIM, for example,
1 DTIM for every 10 beacons. The DTIM indicates broadcast and multicast frames
(buffered at the access port) are soon to arrive. These are simple data frames that
require no acknowledgement, so nodes sometimes miss them. Increase the DTIM/
beacon settings (lengthening the time) to let nodes sleep longer and preserve their
battery life. Decrease these settings (shortening the time) to support streaming-
multicast audio and video applications that are jitter-sensitive. The default DTIM
period is 10 beacons for BSS 1-4.
15.Refer to the Status field for the current state of the requests made from applet. This field displays error
messages if something goes wrong in the transaction between the applet and the switch.
16.Click OK to use the changes to the running configuration and close the dialog.
17.Click Cancel to close the dialog without committing updates to the running configuration.
Configuring Rate Settings
Use the Rate Settings screen to define a set of basic and supported rates for the target radio. This allows
the radio to sync with networks using varying data rates and allows the radio to default to a predefined set
of data rates when higher data rates cannot be maintained.
To configure Rate Settings for a radio:
1. Click the Rate Settings button within the radio edit screen to launch a new screen with rate setting
information.
2. Check the boxes next to all the Basic Rates you want supported.
Basic Rates are used for management frames, broadcast traffic and multicast frames. If a rate is selected
as a basic rate it is automatically selected as a supported rate.
3. Check the boxes next to all the Supported Rates you want supported.
4-90 WS5100 Series Switch System Reference Guide
Supported rates allow an 802.11 network to specify the data rate it supports. When a MU attempts to
join the network, it checks the data rate used on the network. If a rate is selected as a basic rate, it is
automatically selected as a supported rate. The basic default rates for an 802.11a radio differ from those
802.11b default rates, as an 802.11a radio can support a maximum data rate of 54Mbps, while an
802.11b radio can support a maximum data rate of 11Mbps.
4. Click the Clear all rates button to uncheck all of the Basic and Supported rates.
5. Refer to the Status field for the current state of the requests made from applet. This field displays error
messages if something goes wrong in the transaction between the applet and the switch.
6. Click OK to use the changes to the running configuration and close the dialog.
7. Click Cancel to close the dialog without committing updates to the running configuration.
3. Click the Add button to display at screen containing settings for adding a radio
4. Enter the device MAC Address (the physical MAC address of the radio). Ensure this address is the actual
hard-coded MAC address of the device.
5. Use the AP Type drop-down menu to define the radio type you would like to add. If adding an AP-4131
model access point, its access port conversion will render the access point a “thin” access port.
6. Select the radio type checkboxes corresponding to the type of AP radio used.
7. Enter a numerical value in the Radio Index field for each selected radio.
The Radio Index is a numerical value assigned to the radio as a unique identifier. For example; 1, 2, or 3.
The index is helpful for differentiating radios of similar type and configuration.
8. Refer to the Status field for the current state of the requests made from applet. This field displays error
messages if something goes wrong in the transaction between the applet and the switch.
9. Click OK to use the changes to the running configuration and close the dialog.
10.Click Cancel to close the dialog without committing updates to the running configuration.
3. To select the time frame for the radio statistics, select either Last 30s or Last Hr above the statistics
table.
• Select the Last 30s radio button to display statistics for the last 30 seconds for the radio.
• Select the Last Hr radio button to display statistics from the last hour for the radio.
4. Refer to the table for the following information:
Index Displays the numerical index (device identifier) used with the radio. Use this index
(along with the radio name) to differentiate the radio from other device radios.
Description Displays the name used with the radio. Use this name (along with the radio index)
to differentiate the radio from other device radios.
MUs Displays the number of MUs currently associated with the access port.
Throughput Mbps Displays the average throughput in Mbps for the selected radio. The Rx column
displays the average throughput in Mbps for packets received on the selected
radio. The Tx column displays the average throughput for packets sent on the
selected radio.
Average Mbps Displays the average bit speed in Mbps on the selected access port. This value
includes packets both sent and received.
RF Util Displays the percentage of the total packets for the selected radio that are non-
unicast packets. Non-unicast packets include broadcast and multicast packets.
% Non-UNI Displays the percentage of packets for the selected radio that are non-unicast
packets. Non-unicast packets include broadcast and multicast packets.
Retries Displays the average number of retries for all MUs associated with the selected
radio.
Network Setup 4-93
5. Select a radio from those displayed and click the Details button for additional radio information in rae
data format. For more information, see Viewing AP Statistics in Detail on page 4-93.
6. Select a radio from those displayed and click the Graph button for additional radio performance
information in graphical format. For more information, see Viewing AP Statistics in Detail on page 4-93.
Description Displays a brief description of the radio to help differentiate the radio from similar
models.
MAC Address Displays the Hardware or Media Access Control (MAC) address for the access
port. access ports with dual radios will have a unique hardware address for each
radio.
Num Associated Displays the number of MUs currently associated with the radio.
Stations
Current Channel Displays the channel the access port is currently passing traffic on. If the channel
is displayed in red, it means the configured channel does not match the current
channel. The configured channel in this case, is the value in parentheses. The AP
may not be operating on the configured channel for 2 reasons: Uniform spreading
is enabled or radar was encountered on the configured channel.
Pkts per second Displays the average total packets per second that cross the selected radio. The
Rx column displays the average total packets per second received on the selected
radio. The Tx column displays the average total packets per second sent on the
selected radio. The number in black represents this statistic for the last 30
seconds and the number in blue represents this statistic for the last hour.
Throughput Displays the average throughput in Mbps on the selected radio. The Rx column
displays the average throughput in Mbps for packets received on the selected
radio. The Tx column displays the average throughput for packets sent on the
selected radio. The number in black represents this statistic for the last 30
seconds and the number in blue represents this statistic for the last hour.
4-94 WS5100 Series Switch System Reference Guide
Avg Bit Speed Displays the average bit speed in Mbps on the selected radio. This includes all
packets that are sent and received. The number in black represents this statistic
for the last 30 seconds and the number in blue represents this statistic for the last
hour.
Non-unicast Pkts Displays the percentage of the total packets for the selected radio that are non-
unicast packets. Non-unicast packets include broadcast and multicast packets.
The number in black represents this statistic for the last 30 seconds and the
number in blue represents this statistic for the last hour.
Avg Station Signal Displays the average RF signal strength in dBm for all MUs associated with the
selected radio. The number in black represents this statistic for the last 30
seconds and the number in blue represents this statistic for the last hour.
Avg Station Noise Displays the average RF noise for all MUs associated with the selected radio. The
number in black represents this statistic for the last 30 seconds and the number in
blue represents this statistic for the last hour.
Avg Station SNR Displays the average Signal to Noise Ratio (SNR) for all MUs associated with the
selected radio. The Signal to Noise Ratio is an indication of overall RF
performance on your wireless network.
Avg Num of retries Displays the average number of retries for all MUs associated with the selected
radio. The number in black represents this statistic for the last 30 seconds and the
number in blue represents this statistic for the last hour.
% Gave Up Pkts Displays the percentage of packets the switch gave up on for all MUs associated
with the selected radio. The number in black represents this statistic for the last
30 seconds and the number in blue represents this statistic for the last hour.
% of Undecryptable Displays the percentage of undecryptable packets for all MUs associated with the
Pkts selected radio. The number in black represents this statistic for the last 30
seconds and the number in blue represents this statistic for the last hour.
8. Click Refresh to update the content of the screen with the latest values.
9. Refer to the Status field for the current state of the requests made from applet. This field displays error
messages if something goes wrong in the transaction between the applet and the switch.
10.Click Cancel to close the dialog without committing updates to the running configuration.
3. Select a radio index from the table displayed in the Statistics screen and click the Graph button.
4. Select a checkbox to display that metric charted within the graph. Do not select more than four
checkboxes at any one time.
5. Refer to the Status field for the current state of the requests made from applet. This field displays error
messages if something goes wrong in the transaction between the applet and the switch.
6. Click Close to exit the Graph and return to the parent Access Port Radios Statistics screen.
The WLAN Assignment tab is divided into two fields; Select Radios and Assigned WLANs.
5. Refer to the Select Radios field for the following information:
Index Displays the numerical index (device identifier) used with the radio. Use this index
(along with the radio description) to differentiate the radio from other radios with
similar configurations.
Description Displays a description of the Radio. Modify the description as required to name
the radio by its intended coverage area or function.
The Assigned WLANs field displays the WLANs associated to each BSSID used by the radios within
the radio table. There can be up to 16 WLANs associated with each BSS. Out of these, one WLAN must
be the primary WLAN.
6. Select a WLAN Assignment (by index) and click the Edit button to modify its properties.For more
information, see Editing a WLAN Assignment on page 4-96.
7. To remove an existing WLAN from the list available for WLAN assignment, select the WLAN and click
the Delete button.
3. Select a radio from the table and click the Edit button.
The Select Radio/BSS field displays the WLANs associated to each of the BSSIDs used by the radios
within the radio table. Use Select/Change Assigned WLANs field to edit the WLAN assignment.
4. Select any of the WLANs from the table to unassign/disable it from the list of available WLANs.
5. Refer to the Status field for the current state of the requests made from applet. This field displays error
messages if something goes wrong in the transaction between the applet and the switch.
6. Click the Apply button to save the modified WLAN assignment.
7. Click Close to exit the screen without committing updates to the running configuration.
Index Displays the identifier assigned to each WLAN index, each index is assigned a
unique identifier such as (1/4, 1/3, etc.).
AP Displays the name of the access port associated with the index. The access port
name comes from the description field in the Radio Configuration screen.
Access Category Displays the Access Category currently in use. There are four categories: Video,
Voice, Best Effort and Background. Click the Edit button to change the current
Access Category. Ensure the Access Category reflects the radio’s intended
network traffic.
AIFSN Displays the current Arbitrary Inter-frame Space Number. Higher-priority traffic
categories should have lower AIFSNs than lower-priority traffic categories. This
will causes lower-priority traffic to wait longer before trying to access the
medium.
Transmit Ops Displays the maximum duration a device can transmit after obtaining a transmit
opportunity.
CW Min Displays the CW Max to make the Contention Window. From this range, a random
number is selected for the back off mechanism. Lower values are used for higher
priority traffic.
CW Max Displays the CW Min to make the Contention Window. From this range, a random
number is selected for the back off mechanism. Lower values are used for higher
priority traffic.
3. Use the Filter Options facility (by clicking the Show Filter Options link) to specify if information is filtered
by Index (default setting), AP, Access Category, AIFSN, Transmit Ops, CW Min or CW Max. Select Turn
Filtering Off to disable filtering.
Network Setup 4-99
4. Select a radio and click the Edit button to modify its properties. For more information, see Editing WMM
Settings on page 4-99.
4. Enter a number between 0 and 15 for the AIFSN value for the selected radio.
The AIFSN value is the current Arbitrary Inter-frame Space Number. Higher-priority traffic categories
should have lower AIFSNs than lower-priority traffic categories. This will causes lower-priority traffic to
wait longer before trying to access the medium.
5. Enter a number between 0 and 65535 for the Transmit Ops value.
The Transmit Ops value is the maximum duration a device can transmit after obtaining a transmit
opportunity. For higher-priority traffic categories, this value should be set higher.
6. Enter a value between 0 and 15 for the Contention Window minimum value.
The CW Minimum is combined with the CW Maximum to make the Contention Window. From this range,
a random number is selected for the back off mechanism. Lower values are used for higher priority traffic.
4-100 WS5100 Series Switch System Reference Guide
7. Enter a value between 0 and 15 for the Contention Window maximum value.
The CW Maximum is combined with the CW Minimum to define the Contention Window. From this range,
a random number is selected for the back off mechanism. Lower values are used for higher priority traffic.
8. Select the Admission Control checkbox to enable the restriction of MUs using the WMM policy. This
may be useful when multimedia traffic would be negatively impacted by an abundance of MU traffic. This
setting is not selected by default, but once enabled, has a default value of 32 stations (MUs).
9. Refer to the Status field for the current state of the requests made from applet. This field displays error
messages if something goes wrong in the transaction between the applet and the switch.
10.Click OK to use the changes to the running configuration and close the dialog.
11.Click Cancel to close the dialog without committing updates to the running configuration.
Index The Index is the numerical index (device identifier) used with the device radio. Use
this index (along with the radio name) to differentiate the radio from other device
radios.
Description The displayed name is the name used with the device radio. Use this name (along
with the radio index) to differentiate the radio from other device radios.
QoS Weight Displays the Quality of Service weight for the AP. The default value for the weight
is 1. AP QoS will be applied based on the QoS weight value with the higher values
given priority.
Type Displays whether the radio is an 802.11a radio or an 802.11 bg model radio
Placement Displays the default placement when an radio auto-adopts and takes on the
default settings. Options include Indoor or Outdoor. Default is Indoor.
Channel Displays the default channel when an radio auto-adopts and takes on the default
settings. This value can be a specific channel, Random, or ACS. Random assigns
each radio a random channel. ACS (Automatic Channel Selection) allows the
switch to systematically assign the channel. Default is random.
Power dBm Displays the default power when an radio auto-adopts and takes on the default
settings. Defaults are 20 dBM for 802.11bg) and 17 dBm for 802.11a.
Power mW Displays the default transmit power in mW (derived from the Power dBm setting).
Defaults are 100 mW for 802.11bg and 50 mW for 802.11a.
4. To modify a radio’s adoption defaults, select a radio and click the Edit button. For more information, see
Editing Default Access Port Adoption Settings on page 4-103.
CAUTION: An access port is required to have a DHCP provided IP address before
! attempting layer 3 adoption, otherwise it will not work. Additionally, the access port must
be able to find the IP addresses of the switches on the network.
The Properties field displays the model family for the selected access port. The model is read only and
cannot be modified. The Radio Type displays the radio type (802.11a or 802.11bg). This value is read
only and cannot be modified
5. To use this radio as a detector to identify rogue APs on your network, check the box titled Dedicate this
AP as Detector AP. Setting this radio as a detector will dedicate this radio to detecting rogue APs on
the network. Dedicated detectors do not connect to by clients.
6. Select the Single-channel scan for Unapproved APs checkbox to enable the switch to detect rogue
devices using its only its current channel of operation.
7. Select the Enable Enhanced Beacon Table checkbox to allow the AP to receive beacons and
association information.
8. Select the Enable Enhanced Probe Table checkbox to allow an AP to forward MU probe requests to
the switch.
4-104 WS5100 Series Switch System Reference Guide
9. Within the Radio Settings field, configure the Placement of the radio as either Indoors or Outdoors.
The setting will affect the selection channel and power levels. Default is Indoor.
10.Select a channel for communications between the access port and MUs in the Desired Channel field.
The selection of a channel determines the available power levels. The range of legally approved
communication channels varies depending on the installation location and country. The selected channel
can be a specific channel, “Random,” or “ACS.” Random assigns each radio a random channel. ACS
(Automatic Channel Selection) allows the switch to systematically assign channels. Default is Random.
11.After first selecting a channel, select a power level in dBm for RF signal strength in the Desired Power
(dBm) field.
The optimal power level for the specified channel is best determined by a site survey prior to installation.
Available settings are determined according to the selected channel. Set a higher power level to ensure
RF coverage in WLAN environments that have more electromagnetic interference or greater distances
between the access port and MUs. Decrease the power level according to the proximity of other access
ports. Overlapping RF coverage may cause lost packets and difficulty for roaming devices trying to
engage a access port. After setting a power level, channel and placement the RF output power for the
access port is displayed in mW. Default is 20 dBm (802.11bg), 17 dBm (802.11a))
NOTE: After setting a power level, channel and placement the RF output power for the
access port is displayed below in mW.
12.To configure optional rate settings, click the Rate Settings button to display a new dialogue containing
rate setting information. Instructions on configuring rate settings are described in Configuring Rate
Settings on page 4-89.
13.In most cases, the default settings for the Advanced Properties section are sufficient for most users.
If needed, additional radio settings can be modified for the following properties:
Antenna Diversity Use the drop-down menu to configure the Antenna Diversity settings for access
ports using external antennas. Options include:
• Full Diversity: Utilizes both antennas to provide antenna diversity.
• Primary Only: Enables only the primary antenna.
• Secondary Only: Enables only the secondary antenna.
Antenna Diversity should only be enabled if the access port has two matching
external antennas. Default value is Full Diversity.
Maximum MUs Sets the maximum number of MUs that can associate to a radio. The maximum
number of stations that can associate to a radio are 64.
Adoption Preference The Adoption Preference ID defines the preference ID of the switch.The value can
ID be set between 1 and 65535. To make the radios preferred, the access port
preference ID should be same as adoption preference ID.
The adoption preference id is used for RP load-balancing. A switch will
preferentially adopt access ports which have the same adoption-preference-id as
the switch itself.
Short Preambles only If using an 802.11 bg radio, select this checkbox for the radio to transmit using a
short preamble. Short preambles improve throughput. However, some devices
(SpectraLink phones) require long preambles. This checkbox does not display if
using an 802.11a radio.
Network Setup 4-105
RTS Threshold Specify a Request To Send (RTS) threshold (in bytes) for use by the WLAN's
adopted access ports.
RTS is a transmitting station's signal that requests a Clear To Send (CTS) response
from a receiving station. This RTS/CTS procedure clears the air where many MUs
(or nodes) are contending for transmission time. Benefits include fewer data
collisions and better communication with nodes that are hard to find (or hidden)
because of other active nodes in the transmission path.
Control RTS/CTS by setting an RTS threshold. This setting initiates an RTS/CTS
exchange for data frames larger than the threshold, and simply sends (without
RTS/CTS) any data frames that are smaller than the threshold.
Consider the trade-offs when setting an appropriate RTS threshold for the WLAN's
access ports. A lower RTS threshold causes more frequent RTS/CTS exchanges.
This consumes more bandwidth because of the additional latency (RTS/CTS
exchanges) before transmissions can commence. A disadvantage is the reduction
in data-frame throughput. An advantage is quicker system recovery from
electromagnetic interference and data collisions. Environments with more
wireless traffic and contention for transmission make the best use of a lower RTS
threshold.
A higher RTS threshold minimizes RTS/CTS exchanges, consuming less bandwidth
for data transmissions. A disadvantage is less help to nodes that encounter
interference and collisions. An advantage is faster data-frame throughput.
Environments with less wireless traffic and contention for transmission make the
best use of a higher RTS threshold. Default is 2346.
Beacon Interval Specify a beacon interval in units of 1,000 microseconds (K-us). This is a multiple
of the DTIM value, for example, 100: 10. (See "DTIM Period," below). A beacon is
a packet broadcast by the adopted access ports to keep the network synchronized.
Included in a beacon is information such as the WLAN service area, the radio-port
address, the broadcast destination addresses, a time stamp, and indicators about
traffic and delivery such as a DTIM.
Increase the DTIM/beacon settings (lengthening the time) to let nodes sleep
longer and preserve battery life. Decrease these settings (shortening the time) to
support streaming-multicast audio and video applications that are jitter-sensitive.
Default is 100 K-us.
DTIM Period Specify a period for the Delivery Traffic Indication Message (DTIM). This is a
divisor of the beacon interval (in milliseconds), for example, 10 : 100. (See "Beacon
Interval," above). A DTIM is periodically included in the beacon frame transmitted
from adopted access ports. The DTIM period determines how often the beacon
contains a DTIM, for example, 1 DTIM for every 10 beacons. The DTIM indicates
that broadcast and multicast frames (buffered at the access port) are soon to
arrive. These are simple data frames that require no acknowledgement, so nodes
sometimes miss them. Increase the DTIM/beacon settings (lengthening the time)
to let nodes sleep longer and preserve their battery life. Decrease these settings
(shortening the time) to support streaming-multicast audio and video applications
that are jitter-sensitive. The default DTIM period is 2 beacons.
Self Healing Offset When an access port increases its power to compensate for a failed access port,
power is increased to the country's regulatory maximum. Set the Self Healing
Offset to reduce the country's regulatory maximum power if access ports are
situated close to each other or if access ports s use external antennas. For
additional information on determining the offset value, see the documentation
shipped with the access port.
4-106 WS5100 Series Switch System Reference Guide
14.Refer to the Status field for the current state of the requests made from applet. This field displays error
messages if something goes wrong in the transaction between the applet and the switch.
15.Click OK to use the changes to the running configuration and close the dialog.
16.Click Cancel to close the dialog without committing updates to the running configuration.
Configuring Rate Settings
Use the Rate Settings screen to define a set of basic and supported rates for the target radio. This allows
the radio to sync with networks using varying data rates and allows the radio to default to a predefined set
of data rates when higher data rates cannot be maintained.
To configure a radio’s rate settings:
1. Click the Rate Settings button in the radio edit screen to launch a screen wherein rate settings can be
defined for the radio.
2. Check the boxes next to all Basic Rates you want supported by this radio.
Basic Rates are used for management frames, broadcast traffic and multicast frames. If a rate is selected
as a basic rate it is automatically selected as a supported rate.
3. Check the boxes next to all Supported Rates you want supported by this radio.
Supported Rates allow an 802.11 network to specify the data rate it supports. When a station attempts
to join the network, it checks the data rate used on the network. If a rate is selected as a basic rate it is
automatically selected as a supported rate.
4. Click the Clear all rates button to uncheck all of the Basic and Supported rates.
5. Refer to the Status field for the current state of the requests made from applet. This field displays error
messages if something goes wrong in the transaction between the applet and the switch.
6. Click OK to use the changes to the running configuration and close the dialog.
7. Click Cancel to close the dialog without committing updates to the running configuration.
Network Setup 4-107
3. The system administrator now programs these options into the DHCP server.
4. If the access port finds the list, it sends a unidirectional Hello packet (encapsulated in a UDP/IP frame)
to each switch on the list.
5. Each switch that receives such a packet responds with a Parent response.
The Assigned WLANs tab displays two fields: Select Radios/BSS and
Select/Change Assigned WLANs.
3. With the Select Radios/BSS field, select the radio type to configure (802.11a or 802.11bg) from the
Select Radio drop-down menu.
4. Select the desired BSS from the BSS list or select a Radio (802.11a or 802.11bg) to modify.
5. Refer to the Select/Change Assigned WLAN field for the following information:
Primary WLAN If a specific BSS was selected from the Select Radio/BSS area, choose one of
the selected WLANs from the drop-down menu as the primary WLAN for the BSS.
If the radio was selected, the applet will automatically assign one WLAN to each
BSS in order, and that WLAN will be set as the Primary WLAN for the BSS.
If the number of WLANs selected is greater than the number of BSSIDs, the
remaining WLANs are included with the last BSS.
Index Displays (in ascending order) the numerical index assigned to each SSID. Use the
index (along with the WLANs name) as a means of identifying WLANs once
assigned to different radio BSSIDs. A BSSID cannot support two WLANs with the
same numerical index.
Description Use the WLAN description (along with the WLANs index) as a means of
identifying WLANs assigned to different radio BSSIDs. A BSSID cannot support
two WLANs with the same description.
ESS ID Displays the assigned SSID uniquely distributed between the WLANs assigned to
the BSSIDs.
VLAN Displays the VLAN ID of VLANs assigned to WLANs. By default, all WLANs are
assigned to VLAN 1.
Network Setup 4-109
AP Type Displays whether the radio is an 802.11a radio or an 802.11bg radio. This value is
read-only and cannot be modified.
Access Category Displays the Access Category currently in use. There are four categories: Video,
Voice, Best Effort and Background. Click the Edit button to change the current
Access Category. Ensure the Access Category reflects the radios intended network
traffic.
AIFSN Displays the current Arbitrary Inter-frame Space Number (AIFSN). Higher-priority
traffic categories should have lower AIFSNs than lower-priority traffic categories.
This causes lower-priority traffic to wait longer before trying to access the
medium.
Transmit Ops Displays the maximum duration a device can transmit after obtaining a transmit
opportunity. For higher-priority traffic categories, this value should be set higher.
4-110 WS5100 Series Switch System Reference Guide
CW Min The CW Min is combined with the CW Max to define the Contention Window.
From this range, a random number is selected for the back off mechanism. Lower
values are used for higher priority traffic.
CW Max The CW Max is combined with the CW Min to make the Contention Window. From
this range, a random number is selected for the back off mechanism. Lower values
are used for higher priority traffic.
4. To modify the properties of WMM Adoption Settings, select a radio and click the Edit button. For more
information, see Editing Access Port Adoption WMM Settings on page 4-110.
The AP Type identifies whether the radio is an 802.11a radio or an 802.11 bg radio. This value is read-
only and cannot be modified. There are four editable access categories: Video, Voice, Best Effort and
Background.
4. Enter a number between 0 and 15 for the AIFSN value for the selected radio.
The AIFSN value is the current Arbitrary Inter-frame Space Number. Higher-priority traffic categories
should have lower AIFSNs than lower-priority traffic categories. This causes lower-priority traffic to wait
longer before trying to access the medium.
Network Setup 4-111
5. Enter a number between 0 and 65535 for the Transmit Ops value.
The Transmit Ops value is the maximum duration a device can transmit after obtaining a transmit
opportunity. For Higher-priority traffic categories, this value should be set higher.
6. Enter a value between 0 and 15 for the Contention Window minimum value.
The CW Minimum is combined with the CW Maximum to make the Contention Window. From this range,
a random number is selected for the back off mechanism. Lower values are used for higher priority traffic.
7. Enter a value between 0 and 15 for the Contention Window maximum value.
The CW Maximum is combined with the CW Minimum to make the Contention Window. From this range,
a random number is selected for the back off mechanism. Lower values are used for higher priority traffic.
8. Refer to the Status field for the current state of the requests made from applet. This field displays error
messages if something goes wrong in the transaction between the applet and the switch.
9. Click OK to use the changes to the running configuration and close the dialog.
10.Click Cancel to close the dialog without committing updates to the running configuration.
MAC Address Displays the radio's first MAC address when it is adopted by the switch.
Serial Displays the serial number of the access port, and is used for switch management
purposes. It is read-only and cannot be modified.
HW Version Displays the hardware version of the access port. This information can be helpful
when troubleshooting problems with the access port.
Bootloader Displays the software version the access port boots from. This information can be
helpful when troubleshooting problems.
Protocol Version Displays the version of the interface protocol between the access port and the
switch. This information can be helpful when troubleshooting problems with the
access port.
Fw Version Displays the access port firmware version at run time. Use this information to
assess whether the software requires an upgrade for better compatibility with the
switch.
Radio Indices Displays the indices of the radios belonging to the selected access port. These
indices are equivalent to a numerical device recognition identifier (index) for the
radio.
4. Click the Export button to export the contents of the table to a Comma Separated Values file (CSV).
Network Setup 4-113
5. Click the Convert to Sensor button to convert the selected adopted AP to a sensor that can be used with
the Wireless Intrusion Detection System (WIDS) application.
WIDS uses sensors to collect data transmitted by 802.11a and 802.11b/g compliant devices and sends
the data to a centralized server for analysis and correlation. Sensors are passive devices that function
primarily in listen-only mode. A single sensor can monitor multiple APs.
Once the sensor collects wireless LAN data, the centralized server analyzes the 802.11 frames and
extracts meaningful data points to determine key attributes, such as:
• Wireless device associations
• Use of encryption and authentication
• Vendor identification of all devices
• Total data transferred
Preprocessing data centrally ensures a reduced reliance on network bandwidth to perform wireless
network management.
Index Displays a numerical identifier used to associate a particular access port with a
set of statistics and can help differentiate the access port from other access ports
with similar attributes.
MAC Address Displays the unique Hardware or Media Access Control (MAC) address for the
access port. Access ports with dual radios will have a unique MAC address for
each radio. The MAC address is hard coded at the factory and cannot be modified.
Last Seen (In Displays the time the access port was last seen (observed within the switch
Seconds) managed network). This value is expressed in seconds. Use this value to assess if
the access port is no longer in communications with the switch.
Number of Displays the total number of access ports (at the bottom of the screen) that have
Unadopted APs been recognized, but not adopted by the switch.
3. Select an available index and click the Adopt button to display a screen wherein the properties of a new
radio can be added for adoption to the switch. When displayed, the screen prompts for the MAC address
and type of radio. Complete the fields and click the OK button to add the radio.
4. Click the Export button to export the contents of the table to a Comma Separated Values file (CSV).
CAUTION: An access port is required to have a DHCP provided IP address before
! attempting layer 3 adoption, otherwise it will not work. Additionally, the access port must
be able to find the IP addresses of the switches on the network. To locate switch IP
addresses on the network:
• Configure DHCP option 189 to specify each switch IP address.
• Configure a DNS Server to resolve an existing name into the IP of the switch. The access
port has to get DNS server information as part of its DHCP information. The default DNS
name requested by an AP300 is “Symbol-CAPWAP-Address”. However, since the default
name is configurable, it can be set as a factory default to whatever value is needed.
The following definitions describe the STP instances that define an MST configuration:
• Common Spanning (CST) – MST runs a single spanning tree instance (called the Common Spanning Tree)
that interconnects all the bridges in a network. This instance treats each region as a single bridge. In all
other ways, it operates exactly like Rapid Spanning Tree (RSTP).
• Common and Internal Spanning Trees (CIST) – CIST contains all of the ISTs and bridges not formally
configured into a region. This instance interoperates with bridges running legacy STP and RSTP
implementations.
• Multiple Spanning Tree Instance (MSTI) – The MSTI is identified by an MST identifier (MSTid) value from
1 and 15. This defines an individual instance of a spanning tree. One or more VLANs can be assigned to
an MSTI. A VLAN cannot be assigned to multiple MSTIs. The multiple spanning tree instance 0 is always
present. VLANs not explicitly assigned to an instance are assigned to instance 0.
• MSTP Region – These are clusters of bridges that run multiple instances of the MST protocol. Multiple
bridges detect they are in the same region by exchanging their configuration (instance to VLAN mapping),
name, and revision-level. If you need to have two bridges in the same region, the two bridges must have
identical configurations, names, and revision-levels.
To configure the switch for MST support, configure the name and the revision on each switch being
configured. This name is unique to each region. Then create an Instance and assign an ID. VLANs are then
assigned to instances. These instances must be configured on switches that interoperate with the same
VLAN assignments. Port cost, priority and global parameters can then be configured for individual ports and
instances.
The Multiple Spanning Tree option contains separate tabs for the following activities:
• Configuring a Bridge
• Viewing and Configuring Bridge Instance Details
• Configuring a Port
• Viewing and Configuring Port Instance Details
4-116 WS5100 Series Switch System Reference Guide
Error Disable Timeout Select this option to enable an error disable-timeout facility. The error disable-
timeout is used to set a timeout value for ports disabled resulting from a BPDU
guard.
The BPDU guard feature shuts down the port on receiving a BPDU on a BPDU-guard
enabled port.
ID Format Selector Enter the format selector value of the Configuration Identifier.
Portfast Bdpu Filter Select this checkbox to enable a portfast BPDU filter for the port.
The Spanning Tree Protocol sends BPDUs from all the ports. Enabling the BPDU
filter feature ensures PortFast enabled ports do not transmit or receive any BPDUs.
PortFast Bdpu Guard Select this checkbox to enable the PortFast BPDU Guard on the bridge.
When the BPDU Guard feature is set for bridge, all portfast-enabled ports of the
bridge that have BPDU set to default shutdown the port on receiving a BPDU. Hence
no BPDUs are processed.
Admin Cisco Mode Select this checkbox to enable interoperability with Cisco’s version of MSTP, which
is incompatible with standard MSTP.
Operator Cisco Mode Displays whether Cisco’s version of MSTP is running. This is not a configurable
parameter.
MST Config Digest Displays the Configuration Digest derived from the MST Configuration table.
Internal Root Cost Displays the configured path cost on a link connected to this port within the internal
MSTP region.
Root Port Displays the MAC address of the root port.
Master Port Displays the MAC address of the master port.
VLANs Displays the number of VLANs included in this MSTP instance.
3. Select an ID and click the Delete button to remove from the list.
4. Enter a VLAN ID between 1 to 4094 in the VLAN ID field. This VLAN ID is associated with the Instance
index. You can add multiple VLANs to an instance.
5. Click OK to save and commit the new configuration.
4-120 WS5100 Series Switch System Reference Guide
The Port tab displays the following information (ensure you scroll to the right to view the numerous port
variables described):
Index Displays the port index.
Admin MAC Enable Displays the status of the Admin MAC. Change the status using the Edit button. A
green check mark indicates the Admin MAC Enable status is active/enabled.
Oper MAC Enable This field displays the status of the Oper MAC Enable. You can change the status
using the Edit button. A green check mark indicates the Oper MAC Enable status is
active/enabled.
AutoEdge Displays whether the port is configured as an operational edge port.
Designated Bridge Displays the ID of the bridge sent the best BPDU received on this port.
Guard Root Displays whether the listed port index enforces root bridge placement. The guard
root ensures the port is a designated port. Typically, each guard root port is a
designated port, unless two or more ports (within the root bridge) are connected
together. If the bridge receives superior (BPDUs) on a guard root-enabled port, the
guard root moves the port to a root-inconsistent STP state. This state is equivalent
to a listening state. No data is forwarded across the port. Thus, the guard root
enforces the root bridge position.
Network Setup 4-121
AdminPort PortFast Displays the portfast BPDU filter for the admin port. The Spanning Tree Protocol
BPDU Filter sends BPDUs from all ports.
Enabling the BPDU Filter ensures PortFastenabled admin ports do not transmit or
receive BPDUs.
OperPort PortFast Displays a portfast BPDU filter for the oper port. The Spanning Tree Protocol sends
Bpdu Filter BPDUs from all ports.
Enabling the BPDU Filter feature ensures PortFastenabled oper ports do not
transmit or receive BPDUs.
AdminPort PortFast Displays the AdminPort PortFast BPDU Guard feature.
Bpdu Guard When set for a bridge, all portfast-enabled ports having the
bpdu-guard set to default shut down the port on receiving the BPDU. When this
occurs, the BPDU is not processed.
OperPort PortFast Displays the OperPort PortFast BPDU Guard feature.
Bpdu Guard When the OperPort PortFast BPDU Guard feature is set for a bridge, all portfast-
enabled ports that have the bpdu-guard set to default shut down the port on
receiving a BPDU. When this occurs, the BPDU is not processed.
Port Version Displays the port version associated with this instance. It can be either of the
following:
• STP
• Reserved
• RSTP
• MSTP
Port State Displays whether each port listed is disabled (not forwarding MST frames) or in a
forwarding mode. A port must be enabled to be able to forward.
Port Enable Displays the enable/disable MST designation of each port. A green check mark
indicates the Oper MAC Enable status is active/enabled. A green checkmark should
coincide with a port state of “forwarding” and a red “X” should coincide with a port
state of disabled.
Port Path Cost Displays the path cost for the specified port index. According to the original
specification, cost is 1,000 Mbps (1 gigabit per second) divided by the bandwidth
of the segment connected to the port. Therefore, a 10 Mbps connection would have
a cost of (1,000/10) 100.
Port Designated Cost Displays the port cost for each port on the switch. The cost helps determine the role
of the port in the MST network. The designated cost is the cost for a packet to travel
from this port to the root in the MST configuration. The slower the media, the higher
the cost.
Designated Port Defines the port connection used to send and receive packets. By having only one
designated port per segment, all looping issues should be resolved. Once the
designated port has been selected, any other ports that connect to that segment
become non-designated ports and block traffic from taking the defined path.
Forward Transitions Displays the number of frames received on this port and forwarded by the switch.
Protocol Migration If enabled, protocol migration enables the switch (when running MST) to
interoperate with legacy 802.1d switches. If the listed index receives a legacy
802.1D configuration BPDU, it only sends 802.1D BPDUs over its port.
A green checkmark defines the listed index as supporting protocol migration, and a
red “X” defines the listed index as having protocol migration disabled.
4-122 WS5100 Series Switch System Reference Guide
Admin Edge Port A green checkmark defines the listed index enabled as an Admin Edge Port, and a
red “X” defines the listed index as not being an Admin Edge Port.
Oper Edge Port An oper edge port transitions MST data into a forwarding state. Enable it only on
ports that connect to a single location.
A green checkmark defines the listed index enabled as an Oper Edge Port, and a red
“X” defines the listed index as not being an Oper Edge Port.
Admin Point-to-Point Displays the point-to-point status as ForceTrue or ForceFalse. ForceTrue indicates
this port should be treated as connected to a point-to-point link. ForceFalse
indicates this port should be treated as having a shared connection.
Oper Point-to-Point Displays whether the listed port index is configured to connect to another port
through a point-to-point link. If enabled, the port index becomes a designated port.
The designated port negotiates a rapid transition with the other port using a
proposal-agreement handshake for a loop-free topology. A green checkmark
defines the listed index as supporting point-to-point, and a red “X” defines the
listed index as having point-to-point disabled.
3. Select an Id and click the Edit button to revise the selected MST port configuration.
Port auto Edge Select the checkbox to use the port as an operational edge port.
Port Guard Root Select this checkbox to support guard root for this port index. Guard root ensures
the port is a designated port. Typically, each guard root port is a designated port,
unless two or more ports (within the root bridge) are connected together. If the
bridge receives superior (BPDUs) on a guard root-enabled port, the guard root
moves the port to a root-inconsistent STP state. This state is equivalent to a
listening state. No data is forwarded across the port. Thus, the guard root enforces
the root bridge position.
PortFast BPDU Filter Enable this option to change the status of the Port Fast BPDU Filter.
Port FastBPDU Guard Enable this option to change the status of the Port Fast BPDU Guard.
Port Version Select a value to reconfigure the port version.
Port Path Cost Define the path cost for the specified port index. The cost is 1,000 Mbps (1 gigabit
per second) divided by the bandwidth of the segment connected to the port.
Therefore, a 10 Mbps connection would have a cost of (1,000/10) 100.
Admin Point-to-Point Define the point-to-point status as ForceTrue or ForceFalse. ForceTrue indicates this
status port should be treated as connected to a point-to-point link. ForceFalse indicates
this port should be treated as having a shared connection.
Port Enable Select this checkbox to use this port for the forwarding of MST supported packets
on the switch.
Port Migration If enabled, protocol migration enables the switch (when running MST) to
interoperate with legacy 802.1d switches. If the listed index receives a legacy
802.1D configuration BPDU, it only sends 802.1D BPDUs over its port.
Admin Edge Port Select the checkbox to define this port index as an admin edge port.
3. If necessary, select a CIST Index from the table and click on Edit button to change the port priority and
internal path cost value. For additional information, see
Editing a Port Instance Configuration on page 4-125.
Network Setup 4-125
Most of the MST Port Instance parameters can be reconfigured, as indicated below.
Port Instance ID Read only indicator of the instance ID used as a basis for other modifications.
Port Index Read only indicator of the port index used as a basis for other modifications.
Port Priority If necessary, change the port priority value for the bridge. The lower the priority, a
greater likelihood of the bridge becoming a root.
Admin Internal Path If necessary, change the value for the Admin Internal Root Cost of a path associated
Cost with an interface.
A lower the path cost, the greater likelihood of the specific interface becoming a
root.
Operational Internal Displays the Operational Internal Root Cost of a path associated with an interface.
Path Cost A lower the path cost, the greater likelihood of the specific interface becoming a
root.
4-126 WS5100 Series Switch System Reference Guide
Switch Services
This chapter describes the Services main menu information available for the following switch configuration
activities.:
• Displaying the Services Interface
• DHCP Server Settings
• Configuring Secure NTP
• Configuring Switch Redundancy
• Layer 3 Mobility
• Configuring Self Healing
• Configuring Switch Discovery
• Configuring SOLE Support
5-2 WS5100 Series Switch System Reference Guide
2. Refer to the Services Summary field for the following information relating to configurable values
within the Services main menu item.
DHCP Servers Displays whether DHCP is enabled and the current configuration. For information
on configuring DHCP Server support, see DHCP Server Settings on page 5-3.
NTP Time Displays whether time management is currently enabled or disabled. Network
Management Time Protocol (NTP) manages time and/or network clock synchronization within
the switch managed network. NTP is a client/server implementation.
Redundancy Service Displays whether Redundancy is currently enabled or disabled. One or more
switches can be configured as members of a redundancy group to significantly
reduce the chance of a disruption in service to WLANs and associated MUs in the
event of failure of a switch or intermediate network failure. For more information,
see Configuring Switch Redundancy on page 5-33.
Switch Services 5-3
Layer 3 Mobility Displays whether Layer 3 Mobility is currently enabled or disabled. Layer 3
mobility is a mechanism which enables a MU to maintain the same Layer 3
address while roaming throughout a multi-VLAN network. This enables the
transparent routing of IP datagrams to MUs during their movement, so data
sessions can be initiated while they roam (in for voice applications in particular).
Layer 3 mobility enables TCP/UDP sessions to be maintained in spite of roaming
among different IP subnets. For more information on configuring Layer 3 Mobility,
see Layer 3 Mobility on page 5-44.
Self Healing Displays whether Self Healing is currently enabled. Self healing enables radios to
take action when one or more radios fail. To enable the feature, the user must
specify radio neighbors that would self heal if a neighbor goes down. The neighbor
radios do not have to be of the same type. An 11bg radio can be the neighbor of a
11a radio and either of them can self heal when one fails. For information on
configuring self healing, see Configuring Self Healing on page 5-51.
To configure DHCP:
1. Select Services > DHCP Server from the main menu tree.
2. Select the Enable DHCP Server checkbox to enable the switch’s internal DHCP Server for use with
global pools.
3. Select the Ignore BOOTP checkbox to bypass a BOOTP request.
4. Define an interval (from 1 -10 seconds) for the ping timeout variable. The switch uses the timeout to
intermittently ping and discover whether the client requested IP address is already used.
Switch Services 5-5
Pool Name Displays the name of the IP pool from which IP addresses can be issued to DHCP
client requests on the current interface. The pool is the range of IP addresses
available.
Lease Time When a DHCP server allocates an address for a DHCP client, the client is assigned
(dd:hh:mm) a lease (which expires after a designated interval defined by the administrator). The
lease time is the time an IP address is reserved for re-connection after its last use.
Using very short leases, DHCP can dynamically reconfigure networks in which there
are more computers than there are available IP addresses. This is useful, for
example, in education and customer environments where MU users change
frequently. Use longer leases if there are fewer users.
6. Click the Edit button to modify the properties displayed on an existing DHCP pool. For more information,
see Editing the Properties of an Existing DHCP Pool on page 5-5.
7. To delete an existing DHCP pool from the list of those available, highlight the pool from within the
Network Pool field and click the Delete button.
8. Click the Add button to create a new DHCP pool. For more information, see Adding a New DHCP Pool on
page 5-6.
9. Click the Options button to associate values to options, as defined using the Options Setup functionality.
The values associated to options are local to the pool with which they are associated For more
information, see Configuring DHCP Global Options on page 5-8.
10.Click the DDNS button to configure a DDNS domain and server address used with the list of available
pools. For more information, see Configuring DHCP Server DDNS Values on page 5-9.
11.Click the Options Setup button to define the option name, code and type. Associate values to them (by
clicking the Options button) only after the options are defined.
12.Click Apply to save changes to the screen. Navigating away from the screen without clicking Apply
results in all changes to the screen being lost.
13.Click the Revert button to display the last saved configuration. Unapplied changes are not saved and
must be re-entered.
• A p-peer (peer-to-peer node) uses directed calls to communicate with a known NetBIOS name
server, such as a Windows Internet Name Service (WINS) server, for the IP address of a NetBIOS
machine.
• A m-mixed is a mixed node that uses broadcasted queries to find a node and queries a known
p-node name server for the address.
• A h-hybrid is a combination of two or all of the nodes mentioned above.
6. Change the name of the boot file used for this pool within the Boot File parameter.
7. From the Network field, use the Associated Interface drop-down menu to modify (if necessary) the
switch interface used for the newly created DHCP configuration. Use VLAN1 as a default interface if no
others have been defined.
8. Additionally, define the IP Address and Subnet Mask used for DHCP discovery and requests between
the DHCP Server and DHCP clients.
NOTE: The network IP address and subnet mask of the pool are required to match the
addresses of the layer 3 interface for addresses to be supported on that interface.
9. Within the Lease Time field, define one of the two kinds of leases the DHCP Server assigns to its clients:
• Infinite - If selected, the client can used the assigned address indefinitely.
• Actual Interval - Select this checkbox to manually define the interval for clients to use the DHCP
server assigned addresses. The default lease time is 1 day, with a minimum setting of 1 minute.
10.Within the Servers field, change the server type used with the pool and use the Insert and Remove
buttons to add and remove the IP addresses of the routers used.
11.Modify the Included Ranges (starting and ending IP addresses) for this particular pool.
Use the Insert and Remove buttons as required to define the range of supported IP addresses.
A network pool without any include range is as good as not having a pool, because it won't be useful in
assigning addresses.
12.Click OK to save and add the changes to the running configuration and close the dialog.
13.Refer to the Status field.
The Status is the current state of the requests made from the applet. Requests are any “SET/GET”
operation from the applet. The Status field displays error messages if something goes wrong in the
transaction between the applet and the switch.
14.Click Cancel to close the dialog without committing updates to the running configuration.
3. Enter the name of the IP pool from which IP addresses can be issued to client requests on this interface.
4. Provide the Domain name as appropriate for the interface using the pool.
5. Enter the NetBios Node used with this particular pool. The NetBios Node could have one of the
following types:
• A b-broadcast (broadcast node) uses broadcasting to query nodes on the network for the owner of
a NetBIOS name.
• A p-peer (peer-to-peer node) uses directed calls to communicate with a known NetBIOS name
server, such as a Windows Internet Name Service (WINS) server, for the IP address of a NetBIOS
machine.
• An m-mixed is a mixed node that uses broadcasted queries to find a node, and failing that, queries
a known p-node name server for the address.
• An h-hybrid is a combination of two or all of the nodes mentioned above.
6. Enter the name of the boot file used for this pool within the Boot File parameter.
5-8 WS5100 Series Switch System Reference Guide
7. From the Network field, use the Associated Interface drop-down menu to define the switch interface
is used for the newly created DHCP configuration. Use VLAN1 as a default interface if no others have
been defined.
Additionally, define the IP Address and Subnet Mask used for DHCP discovery and requests between
the DHCP Server and DHCP clients.
NOTE: The IP address and subnet mask of the pool are required to match the addresses of
the layer 3 interface in order for the addresses to be supported through that interface.
8. Within the Lease Time field, define one of the two kinds of leases the DHCP Server assigns to its clients:
• Infinite - If selected, the client can use the assigned address indefinitely.
• Actual Interval - Select this checkbox to manually define the interval for clients to use DHCP supplied
addresses. The default lease time is 1 day, with a minimum setting of 60 seconds and a maximum
value of 946080000 seconds.
9. Within the Servers field, change the server type used with the pool and use the Insert and Remove
buttons to add and remove the IP addresses of the routers used.
10.Provide the Included Ranges (starting and ending IP addresses) for this particular pool.
Use the Insert and Remove buttons as required to define the range of supported IP addresses.
A network pool without any include range is as good as not having a pool, because it won't be useful in
assigning addresses.
11.Click OK to save and add the changes to the running configuration and close the dialog.
12.Refer to the Status field.
The Status is the current state of the requests made from the applet. Requests are any “SET/GET”
operation from the applet. The Status field displays error messages if something goes wrong in the
transaction between the applet and the switch.
13.Click Cancel to close the dialog without committing updates to the running configuration
2. Highlight an existing pool name from within either the Configuration or Host Pool tab and click the
Options Setup button at the bottom of the screen
3. Click the Insert button to display an editable field wherein the name and value of the DHCP option can
be added.
4. Name the option as appropriate, assign a Code (numerical identifier) and use the Type drop-down
options to specify a value of ip or ascii to the DHCP global option.
5. Highlight an entry from within the Global Options screen and click the Remove button to delete the name
and value.
6. Click OK to save and add the changes to the running configuration and forward the updates to the other
peer switches comprising the mobility domain.
7. Refer to the Status field.
The Status is the current state of the requests made from the applet. Requests are any “SET/GET”
operation from the applet. The Status field displays error messages if something goes wrong in the
transaction between the applet and the switch.
8. Click Cancel to close the dialog without committing updates to the running configuration
NOTE: For an additional (in depth) discussion on the DDNS setup options available to the
WS5100 switch (using both the switch CLI and Web UI), refer to Chapter 7 of the WS5100
Migration Guide available for download from the corporate Website.
To configure a global domain name and DDNS server address:
1. Select Services > DHCP Server from the main menu tree.
5-10 WS5100 Series Switch System Reference Guide
2. Highlight an existing pool name from within either the Configuration or Host Pool tabs and click the
DDNS button at the bottom of the screen.
3. Enter a Domain Name which represents the forward zone in the DNS server. For example test.net.
4. Define the TTL (Time to Live) to specify the validity of DDNS records. The maximum value is 864000
seconds.
5. Use the Automatic Update drop-down menu to specify whether the automatic update feature is on or
off. Select Server update to enable a DDNS update from the DHCP server. Select Client update to get
the DDNS updates from DHCP clients.
6. Select the Enable Multiple User Class checkbox if multiple user class support is needed.
7. Use the DDNS Servers field to define the IP addresses of the DNS servers.
8. Click OK to save and add the changes to the running configuration and close the dialog.
9. Refer to the Status field.
The Status is the current state of the requests made from the applet. Requests are any “SET/GET”
operation from the applet. The Status field displays error messages if something goes wrong in the
transaction between the applet and the switch.
10.Click Cancel to close the dialog without committing updates to the running configuration
3. Refer to the following information to assess whether the existing group of DHCP pools is sufficient:
Pool Name Displays the name of the IP pool from which IP addresses can be issued to DHCP
client requests on this interface. The pool is the range of IP addresses for which
addresses can be assigned.
IP Address Displays the IP address for the client on this interface using the pool name listed.
Hardware Address Displays the type of interface used to pass DHCP discover and request exchanges
between the switch DHCP server and DHCP Clients. The Hardware Address field
also displays the address of the DHCP client for whom the static IP is reserved.
Client Name Displays the name of the client requesting DHCP Server support over this
interface. This name is ready only cannot be modified using the host pool edit
option.
Client ID Displays the client Identifier, based on this identifier static IP is assigned.
Hardware address and Client Identifier should not be configured on a same host
pool. A pool name cannot have both a client ID and MAC address.
4. Click the Edit button to modify the properties displayed on an existing DHCP pool. For more information,
see Editing the Properties of an Existing DHCP Pool on page 5-5.
5. To delete an existing DHCP pool from the list of those available, highlight the pool from within the Pool
Name field and click the Delete button.
6. Click the Add button to create a new DHCP pool. For more information, see Adding a New DHCP Pool on
page 5-6.
7. Click the Options button to insert a global pool name into the list of available pools. For more
information, see Configuring DHCP Global Options on page 5-8.
5-12 WS5100 Series Switch System Reference Guide
8. Click the DDNS button to configure a DDNS domain and server address that can be used with the list of
available pools. For more information, see Configuring DHCP Server DDNS Values on page 5-9.
The Excluded tab displays “fixed” IP addresses statically assigned and unavailable for assignment with
a pool.
3. Click the Edit button to modify the IP address range displayed. For more information, see Editing the
Properties of an Existing DHCP Pool on page 5-5.
4. To delete an existing DHCP pool from the list of those available to the switch, highlight the pool from
within the Network Pool field and click the Delete button.
5. Click the Add button to create a new IP address range for a target host pool. For more information, see
Adding a New DHCP Pool on page 5-6.
Switch Services 5-13
In the illustration above, a DHCP relay address has been configured on subnet 2 (The CLI equivalent is
“ip helper-address <subnet1 External DHCP Server IP > <subnet1 Interface Name>”). When configuring a
DHCP Relay address, specify the other interface where the external DHCP Server can be reached. In this
example, that interface is subnet1. The DHCP relay agent must listen on both subnet1 and subnet2.
Consequently, the DHCP Server cannot run on either subnet1 or subnet2 (it must be both).
However, you can run an onboard DHCP server on subnet3 to provide DHCP requests for clients in subnet3.
This is independent of the DHCP relay configuration. You cannot run onboard DHCP Server on subnet1 to
provide IP addresses to DHCP clients requesting IP addresses using DHCP relay.
To view and configure DHCP relay information:
1. Select Services > DHCP Server from the main menu tree.
5-14 WS5100 Series Switch System Reference Guide
3. Refer to the Interfaces field for the names of the interfaces available to route information between the
DHCP Server and DHCP clients. If this information is insufficient, consider creating a new IP pool or edit
an existing pool.
4. Refer to the Gateway Information field for DHCP Server and Gateway Interface IP addresses. Ensure
these address are not in conflict with the addresses used to route data between the DHCP Server and
client.
NOTE: The gateway address should not be set to a VLAN interface used by the switch.
5. Click the Edit button to modify the properties displayed on an existing DHCP pool. Refer to step 7 for the
information that can be modified for the DHCP relay.
6. To delete an existing DHCP pool from the list of those available to the switch, highlight the pool from
within the Network Pool field and click the Delete button.
NOTE: The interface VLAN and gateway interface should have their IP addresses set. The
interface VLAN and gateway interface should not have DHCP client or DHCP Server
enabled. DHCP packets cannot be relayed to an onboard DHCP Server. The interface VLAN
and gateway interface cannot be the same.
7. Click the Add button to create a new DHCP pool.
a. Use the Interface drop-down menu to assign the interface used for the DHCP relay. As VLANs are
added to the switch, the number of interfaces available grows.
b. Add Servers as needed to supply DHCP relay resources. As Servers are added, use the Gateway
drop-down menu associated with each Server to supply the interface used to route data. The
gateway address should not be set to any VLAN interface used by the switch.
c. Click OK to save and add the changes to the running configuration and close the dialog.
Switch Services 5-15
d. Click Cancel to close the dialog without committing updates to the running configuration.
3. Refer to the contents of the DDNS Bindings tab for the following information:
Domain Name Displays the domain name mapping corresponding to the IP address listed in the
left-hand side of the tab.
4. Click the Export button to display a screen used to export DDNS Binding information to a secure location.
3. Refer to the contents of the Bindings tab for the following information:
IP Address Displays a IP address for each client with a listed MAC address. This column is
read-only and cannot be modified.
MAC Address / Displays the MAC address (client hardware ID) of the client using the switch’s
Client ID DHCP Server to access switch resources. The MAC address is read-only and
cannot be modified.
4. Click the Export button to display a screen used to export the DHCP Binding information to a secure
location.
Switch Services 5-17
3. Refer to the contents of the Dynamic Bindings tab for the following:
IP Address Displays the IP address for each client whose MAC Address is listed in the MAC
Address / Client ID column. This column is read-only and cannot be modified.
MAC Address / Displays the MAC address (client hardware ID) of the client using the switch’s
Client ID DHCP Server to access switch resources. The MAC address is read-only and cannot
be modified.
Expiration Displays the expiration of the lease used by the client for switch DHCP resources.
This column is read-only and cannot be modified.
4. Select an address from those displayed and click the Delete button to remove the client from the list
displayed. The Delete button is enabled only when one or more rows are selected for deletion.
5. Click on Delete All Automatic Leases button to delete all the automatic leased DHCP connections.
This button is enabled when one or more rows exist.
6. Click the Export button to display a screen used to export the DHCP Binding information to a secure
location.
5-18 WS5100 Series Switch System Reference Guide
3. The User Class Name field displays the client names grouped by the class name.
4. The User Class Option Name field displays the names defined for a particular client.
Select the Multiple User Class Options checkbox to associate the user class option names with a
multiple user class.
5. Click the Add button create a new user class name (client). For more information, see Adding a New
DHCP User Class on page 5-18.
6. Click the Edit button to modify the properties displayed for an existing DHCP User Class Name. For more
information, see Editing the Properties of an Existing DHCP User Class on page 5-19.
7. To delete an existing DHCP user class and its associated option names from the list available to the DHCP
server, select the user class from the User Class Name field and click Delete.
The DHCP server groups clients based on user class option values. DHCP Clients with the defined set of
user class option values are identified by class.
a. Enter the User Class Name to create a new client. The DHCP user class name should not exceed
32 characters.
b. Enter Option Values for the devices associated with the DHCP user class name. The value should
not exceed 32 characters.
c. Select the Multiple User Class Option checkbox to enable multiple option values for the user
class. This allows the user class to transmit multiple option values to DHCP servers supporting
multiple user class options.
d. Click OK to save and add the new configuration.
e. Refer to the Status field. It displays the current state of the requests made from the applet. Requests
are any “SET/GET” operation from the applet. The Status field displays error messages if something
goes wrong in the transaction between the applet and the switch.
f. Click Cancel to close the dialog without committing updates to the running configuration.
3. Select an existing DHCP user class name from the list and click on the Edit button from the DHCP User
Class Name section.
2. Select the Pool Class tab to view the DHCP pool class details.
3. Refer to the Pool Class Names field to configure a pool class. A pre configured pool and class must
exist to configure a pool class.
The Address Ranges section displays the address ranges associated with the pool class.
4. Click the Edit button to modify the properties displayed for an existing DHCP Pool Class Name. For more
information, see Editing an Existing DHCP Pool Class on page 5-21.
5. To delete an existing DHCP pool class name and its associated address range, select the pool class name
from the Pool Class Names field and click the Delete button.
6. Click the Add button create a new pool class name. For more information, see Adding a New DHCP Pool
Class on page 5-22.
b. Select a address range and click Remove to delete that particular address range.
7. Refer to the Status field. It displays the current state of the requests made from the applet. Requests are
any “SET/GET” operation from the applet. The Status field displays error messages if something goes
wrong in the transaction between the applet and the switch.
8. Click OK to save the new configuration and close the dialog window.
9. Click Cancel to close the dialog without committing updates to the running configuration.
4. Use the Pool Name field to define a new pool name. Enter the pool name created using Adding a New
DHCP Pool on page 5-6.
5. Use the Class Name field to associate an existing class, created using Adding a New DHCP User Class
on page 5-18.
6. The Pool Class Address Range field is used to assign address range to the class inside the pool. A
maximum of 4 address ranges can be assigned to a class.
a. Use the Insert button to enter the Start IP and End IP address range for a class.
b. Select a address range and click Remove to delete that particular address range.
7. Refer to the Status field. It displays the current state of the requests made from the applet. Requests are
any “SET/GET” operation from the applet. The Status field displays error messages if something goes
wrong in the transaction between the applet and the switch.
8. Click OK to save the new configuration and close the dialog window.
9. Click Cancel to close the dialog without committing updates to the running configuration.
Switch Services 5-23
3. An ACL Id must be created before it is selectable from any of the drop-down menus. Refer to the Access
Group field to define the following:
Full Access Supply a numeric ACL ID from the drop-down menu to provide the ACL full access.
Only Control Queries Supply a numeric ACL ID from the drop-down menu to provide the ACL only control
query access to SNTP resources.
Server and Query Enter a numeric ACL ID from the drop-down menu to provide the ACL Server and
Access Query access to SNTP resources.
Only Server Access Provide a numeric ACL ID from the drop-down menu to provide the ACL only server
access to SNTP resources.
Authenticate Time Select this checkbox to ensure credential authentication takes place between the
Sources SNTP server and the switch. When this checkbox is selected, the Apply and Revert
buttons become enabled to save or cancel settings.
Act As NTP Master When this checkbox is selected, the Apply and Revert buttons become enabled to
Clock save or cancel settings within the Other Settings field.
Clock Stratum Define how many hops (from 1 to 15) the switch is from a SNTP time source. The
switch automatically chooses the SNTP resource with the lowest stratum number.
The SNTP supported switch is careful to avoid synchronizing to a server that may
not be accurate. Thus, the SNTP enabled switch never synchronizes to a machine
not synchronized itself. The SNTP enabled switch compares the time reported by
several sources, and does not synchronize to a time source whose time is
significantly different than others, even if its stratum is lower.
Switch Services 5-25
Listen to NTP Select this checkbox to allow the switch to listed over the network for SNTP
Broadcasts broadcast traffic. Once enabled, the switch and the SNTP broadcast server must
be on the same network.
Broadcast Delay Enter the estimated round-trip delay (between 1 and 999999 seconds) for SNTP
broadcasts between the SNTP broadcast server and the switch. Define the
interval based on the priority of receiving accurate system time frequently.
Typically, no more than one packet per minute is necessary to synchronize the
switch to within a millisecond of the SNTP broadcast server.
Auto Key Use use an Auto Key drop-down menu to specify whether the
a key is disabled, enabled only on the host or enabled only on the client.
5. Click Apply to save changes to the screen. Navigating away from the screen without clicking the Apply
button results in all the changes to the screen being discarded.
6. Click the Revert button to undo the changes to the screen and revert to the last saved configuration.
Key ID Displays a Key ID between 1-65534. The Key ID is a abbreviation allowing the
switch to reference multiple passwords. This makes password migration easier and
more secure between the switch and its NTP resource.
Key Value Displays the authentication value used to secure the credentials of the server
providing system time to the switch.
Trusted Key If a checkmark appears, a trusted key has been associated with a domain name. A
trusted key is added when a public key is known, but cannot be securely obtained.
Adding the trusted key allows information from the server to be considered secure.
The authentication procedures requires both the local and remote servers share the
same key and key identifier. Therefore, using key information from a trusted source
is important.
4. Select an existing key and click the Delete button to permanently remove it from the list of Key IDs.
5. Click the Add button to create a new Symmetric Key that can be used by the switch.
CAUTION: After an NTP synchronization using a Symmetric Key, the NTP status will not
! automatically be updated.
6. Enter a Key ID between 1-65534. The Key ID is a Key abbreviation allowing the switch to reference
multiple passwords.
This makes password migration easier and more secure between the switch and its NTP resource.
7. Enter an authentication Key Value used to secure the credentials of the NTP server providing system
time to the switch.
8. Select the Trusted Key checkbox to use a trusted key.
A trusted key should be used when a public key is known, but cannot be securely obtained. Adding a
trusted key allows data to be considered secure between the switch and its SNTP resource.
9. Refer to the Status field.
The Status is the current state of the requests made from the applet. Requests are any “SET/GET”
operation from the applet. The Status field displays error messages if something goes wrong in the
transaction between the applet and the switch.
10.Click OK to save and add the changes to the running configuration and close the dialog.
Switch Services 5-27
11.Click Cancel to close the dialog without committing updates to the running configuration.
3. Refer to the following information (as displayed within the NTP Neighbor tab) to assess whether an
existing neighbor configuration can be used as is, if an existing configuration requires modification or a
new configuration is required.
IP Address/ Displays the numeric IP address of the resource (peer or server) providing switch
Hostname SNTP resources. Ensure the server is on the same subnet as the switch to provide
SNTP support.
Neighbor Type Displays whether the NTP resource is a Peer (another associated peer device
capable of SNTP support) or a Server (a dedicated SNTP server resource). This
designation is made when adding or editing an NTP neighbor.
Preferred Source Displays whether this NTP resource is a preferred NTP resource. Preferred sources
(those with a checkmark) are contacted before non-preferred resources. There can
be more than one preferred source.
NTP Version Displays a NTP version between 1 and 4. Currently version three and four
implementations of NTP are available. The latest version is NTPv4, but the official
Internet standard is NTPv3.
4. Select an existing neighbor and click the Edit button to modify the existing peer or server designation, IP
address, version, authentication key ID and preferred source designation.
5. Select an existing entry and click the Delete button to remove it from the table.
6. Click the Add button to define a new peer or server configuration that can be added to the existing
configurations displayed within the NTP Neighbor tab.For more information, see Adding an NTP Neighbor
on page 5-28.
4. Select the Peer checkbox if the SNTP neighbor is a peer to the switch (non FTP server) within the switch’s
current subnet.
5. Select the Server checkbox if the neighbor is a server within the switch’s current subnet.
Switch Services 5-29
6. Select the Broadcast Server checkbox to allow the switch to listen over the network for NTP broadcast
traffic.
The switch’s NTP configuration can be defined to use broadcast messages instead of messaging between
fixed NTP synchronization resource addresses. Use a NTP broadcast to listen for NTP synchronization
packets within a network. To listen to NTP broadcast traffic, the broadcast server (and switch) must be
on the same subnet. NTP broadcasts reduce configuration complexity since both the switch and its NTP
resources can be configured to send and receive broadcast messages.
NOTE: If this checkbox is selected, the AutoKey Authentication checkbox is disabled, and
the switch is required to use Symmetric Key Authentication for credential verification with
its NTP resource. Additionally, if this option is selected, the broadcast server cannot be
selected as a preferred source.
7. Enter the IP Address of the peer or server providing SNTP synchronization.
8. Select the Hostname checkbox to assign a hostname to the server or peer for further differentiation of
other devices with a similar configuration.
9. Use the NTP Version drop-down menu to select the version of SNTP to use with this configuration
Currently version three and version four implementations of NTP are available. The latest version is
NTPv4, but the official Internet standard is NTPv3.
10.If necessary, select the No Authentication checkbox to allow communications with the NTP resource
without any form of security. This option should only be used with known NTP resources.
11.Select the AutoKey Authentication checkbox to use an Auto key protocol based on the public key
infrastructure (PKI) algorithm. The SNTP server uses a fast algorithm and a private value to regenerate
key information on the arrival of a message. The switch sends its designated public key to the server for
credential verification and the two exchange messages. This option is disabled when the Broadcast
Server checkbox is selected.
12.Select the Symmetric Key Authentication checkbox to use a single (symmetric) key for encryption and
decryption. Since both the sender and the receiver must know the same key, it is also referred to as
shared key cryptography. The key can only be known by the sender and receiver to maintain secure
transmissions.
13.Enter an Key ID between 1-65534. The Key ID is a Key abbreviation allowing the switch to reference
multiple passwords.
14.Select the Preferred Source checkbox if this NTP resource is a preferred NTP resource. Preferred
sources are contacted before non-preferred resources. There can be more than one preferred source.
15.Refer to the Status field. The Status is the current state of the requests made from the applet. Requests
are any “SET/GET” operation from the applet. The Status field displays error messages if something goes
wrong in the transaction between the applet and the switch.
16.Click OK to save and add the changes to the running configuration and close the dialog.
17.Click Cancel to close the dialog without committing updates to the running configuration.
5-30 WS5100 Series Switch System Reference Guide
3. Refer to the following SNTP Association data for each SNTP association displayed:
Address Displays the numeric IP address of the SNTP resource (Server) providing SNTP
updates to the switch.
Reference Clock Displays the address of the time source the switch is synchronized to.
Stratum Displays how many hops the switch is from a SNTP time source. The switch
automatically chooses the SNTP resource with the lowest stratum. The SNTP
supported switch is careful to avoid synchronizing to a server that may not be
accurate. Thus, the NTP enabled switch never synchronizes to a machine not
synchronized itself. The SNTP enabled switch compares the time reported by
several sources, and does not synchronize to a time source whose time is
significantly different than others, even if its stratum is lower.
When Displays the date and time when the SNTP association was initiated. Has the
association been trouble free over that time?
Peer Poll Displays the maximum interval between successive messages, in seconds to the
nearest power of two.
Reach Displays the status of the last eight SNTP messages. If an SNTP packet is lost, the
lost packet is tracked over the next eight SNTP messages.
Switch Services 5-31
Delay (sec) Displays the round-trip delay (in seconds) for SNTP broadcasts between the SNTP
server and the switch.
Offset (sec) Displays the calculated offset between the switch and SNTP server. The switch
adjusts its clock to match the server's time value. The offset gravitates toward
zero over time, but never completely reduces its offset to zero.
Dispersion (sec) Displays how scattered the time offsets are (in seconds) from a SNTP time server
4. Select an existing NTP association and click the Details button to display additional information useful
in discerning whether the association should be maintained.
5-32 WS5100 Series Switch System Reference Guide
3. Refer to the SNTP Status field to review the accuracy and performance of the switch’s ability to
synchronize with a NTP server:
Stratum Displays how many hops the switch is from its current NTP time source.
Reference Displays the address of the time source the switch is synchronized to.
Precision Displays the precision (accuracy) of the switch’s time clock (in Hz). The values that
normally appear in this field range from -6 for mains-frequency clocks to -20 for
microsecond clocks found in some workstations.
Reference time Displays the time stamp at which the local clock was last set or corrected.
Clock Offset Displays the time differential between switch time and the NTP resource.
Switch Services 5-33
Root delay The total round-trip delay in seconds. This variable can take on both positive and
negative values, depending on the relative time and frequency offsets. The values
that normally appear in this field range from negative values of a few milliseconds
to positive values of several hundred milliseconds.
Root Dispersion Displays the nominal error relative to the primary time source in seconds. The
values that normally appear in this field range from 0 to several hundred
milliseconds.
on the other switches at the same time. This is done by the cluster-protocol running on WS1, by duplicating
the commands and sending them to the group over the virtual connection:
After sending the command to other members, the cluster-management protocol (at WS1) waits for a
response from the members of the redundancy group. Upon receiving a response from each member, WS1
updates the user’s screen and allows the user to enter/execute the next command.
The wait time required to collect responses from other switches is predefined, so if any one or more members
does not respond to a given command within the defined interval, the command originating switch displays
whatever responses have been collected and ignores the delayed responses. This time-based response
mechanism eliminates the possibility of indefinite response hangs and allows for quicker redundancy group
configuration.
There is no fixed master-slave relationship between members. Typically, a switch can be considered a master
for the command it originates. Responding members can be considered slaves with respect to that command.
This virtual master-slave relationship makes this design unique when compared to existing centralized
management systems. Having a virtual master-slave relationship eliminates a single point of failure, since a
Switch Services 5-35
user can make use of any switch as the group centralized management entity (using the cluster-management
context).
To view status and membership data and define a redundancy group configuration, refer to the following:
• Reviewing Redundancy Status
• Configuring Redundancy Group Membership
To configure switch redundancy:
1. Select Services > Redundancy from the main menu tree.
The Redundancy screen displays with the Configuration tab selected.
Enable Redundancy Select this checkbox to enable/disable clustering. Clustering must be disabled to
set a redundancy related parameter. All the modifiable values are grayed out if
enabled
Redundancy Switch Define the destination IP address used to send heartbeats and update messages.
IP
Mode A member can be in either in Primary or Standby mode. In the redundancy group,
all ‘Active’ members adopt access ports except the ‘Standby’ members who adopt
access ports only when an ‘Active’ member has failed or sees an access-port not
adopted by a switch.
Redundancy ID Define an ID for the cluster group. All the switches configured in the cluster should
have the same Cluster ID. The valid range is
1-65535.
Discovery Period Use the Discovery Period to configure a cluster member discovery interval.
During the discovery time, a switch discovers the existence of other switches
within the redundancy group. Configure an interval between 10 and 60 seconds.
The default value is 30 seconds.
5-36 WS5100 Series Switch System Reference Guide
Heartbeat Period The Heartbeat Period is the interval heartbeat messages are sent. Heartbeat
messages discover the existence and status of other members within the group.
Configure an interval between
1 and 255 seconds. The default value is 5seconds.
Hold Time Define the Hold Time for a redundancy group. If there are no heartbeats received
from a peer during the hold time, the peer is considered down. In general, the hold
period is configured for three times the heartbeat period. Meaning, if three
consecutive heartbeats are not received from the peer, the peer is assumed down
and unreachable. The hold time is required to be longer than the heartbeat interval.
Configure a hold time between 10 and 255 seconds. The default is 15 seconds.
Handle STP Select the Handle STP convergence checkbox to enable Spanning Tree Protocol
convergence (STP) convergence for the switch. In general, this protocol is enabled in layer 2
networks to prevent network looping. If the network is enabled for STP to prevent
looping, the network forwards data only after STP convergence. Enabling STP
convergence delays the redundancy state machine execution until the STP
convergence is completed (the standard protocol value for STP convergence is 50
seconds). Delaying the state machine is important to load balance access ports at
startup.
Enable DHCP Enables DHCP Redundancy for member switches. DHCP Redundancy allows an
Redundancy administrator to have only one DHCP server running at any time in a cluster. The
clustering protocol enables all peers participating in DHCP redundancy to
determine the active DHCP server among them. The switch with lowest
Redundancy IP is selected as the active DHCP server for the cluster. This selected
active DHCP server can be either a primary or standby switch. The other switches
do not provide DHCP service as long as the selected DHCP server switch is active.
Auto Revert Check this box to enable the Auto Revert feature and specify the time (in minutes)
for the switch to revert. Configure the interval between 1 and 1800 minutes. The
default revert time is 5 minutes.
When a primary switch fails, the standby switch takes over APs adopted by the
primary. If the auto revert feature is enabled, when the failed primary switch comes
back up, the standby starts a timer based on the auto-revert interval. At the expiry
of auto-revert interval (if the primary switch is still up), the standby switch releases
all adopted APs and goes back to a monitoring mode. The expiry timer either will
be stopped or restarted if the primary switch goes down and comes up during the
auto-revert interval.
Revert Now Reverts an active fail-over standby switch to a passive standby switch. When a user
presses this button, the standby switch will un-adopt all its adopted APs and move
into a standby (passive) mode only if all configured members are up again. The
revert function does not push APs to the primary switch unless the primary switch
has failed over.
3. Refer to the History field to view the current state of the redundancy group.
State Displays the new state (status) of the redundancy group after a Trigger event has
occurred.
Time Displays the Timestamp (time zone specific) when the state change occurred.
Switch Services 5-37
Trigger Displays the event causing the redundancy group state change on the switch.
Description Displays a redundancy event description defining the redundancy group state
change on the switch. Typical states include Redundancy Disabled or Redundancy
Enabled.
4. Click Apply to save any changes to the screen. Navigating away from the screen without clicking the
Apply button results in all the changes on the screen being discarded.
5. Click the Revert button to undo the changes to the screen and revert to the last saved configuration.
3. Refer to the Status field to assess the current state of the redundancy group.
Redundancy state is Displays the state of the redundancy group. When the redundancy feature is
disabled, the state is “Disabled.” When enabled, it goes to a “Startup” state. From
“Startup” it goes to a “Discovery” state immediately if the STP convergence is not
enabled. Otherwise, it remains in “Startup” for a period of 50 seconds (the
standard STP convergence time). During the discover state, the switch exchanges
heartbeats and update messages to discover other members and define the
redundancy group license. After discerning memberships, it moves to an Active
state. There is no difference in state execution for Primary and Standby modes.
Licenses in switch Displays the number of licenses installed to adopt access ports on the current
switch.
Protocol Version The Cluster Protocol should be set to an identical value for each switch in the
redundancy group. The protocol version is one of the parameters used to
determine whether two peers can form a group.
Licenses in Group Displays the number of access ports that can be adopted in the redundancy group.
This value is calculated when a member starts-up, is added, is deleted or a license
changes (downgrade and upgrade.) This value is equal to the highest license level
of its members. It is NOT the sum of the license level of its members. For
information on licensing rules impacting redundancy group members, see
Redundancy Group License Aggregation Rules on page 5-44.
Access Ports in group Displays the total of the number of access ports adopted by the entire membership
of the redundancy group.
Adoption capacity in Displays the combined AP adoption capability for each switch radio comprising
group the cluster. Compare this value with the adoption capacity on this switch to
determine if the cluster members have adequate adoption capabilities.
Rogue Access Ports Displays the cumulative number of rogue APs detected by the members of the
in group group. Compare this value with the number of rogues detected by this AP to
discern whether an abundance of rogues has been located by a particular switch
and thus escalates a security issue with a particular switch.
Radios in group Displays the combined number (sum) of radios a amongst all the members of the
redundancy group.
Self-healing radios in Displays the number of radios within the cluster that have self-healing capabilities
group enabled. Compare this value with the total number of radios within the group to
determine how effectively the radios within the cluster can self-heal if problems
exist.
Mobile Units in Displays the combined number of MU associations for the members of the
group redundancy group. Compare this number with the number of MUs on this switch
to determine how effectively MU associations are distributed within the cluster.
DHCP Server in Displays the total number of DHCP Servers available for DHCP resources for the
Group combined cluster membership.
Connectivity Status Displays the current connectivity status of the cluster membership.
Access Ports on this Displays the total of the number of access ports adopted by this switch.
switch
Switch Services 5-39
Adoption capacity on Displays the AP adoption capability for this switch. Compare this value with the
this switch adoption capacity for the entire cluster to determine if the cluster members (or this
switch) have adequate adoption capabilities. For information on licensing rules
impacting redundancy group members, see Redundancy Group License
Aggregation Rules on page 5-44.
Rogue Access Ports Displays the number of rogue APs detected by this switch. Compare this value
on this switch with the cumulative number of rogues detected by the group to discern whether
an abundance of rogues has been located by a particular switch and thus
escalates a security issue.
Radios on this switch Displays the number of radios used with this switch.
Self-healing radios Displays the number of radios on this switch with self-healing enabled. Compare
on this switch this value with the total number of radios within the group to determine how
effectively radios can self-heal if problems exist.
Mobile Units on this Displays the number of MUs currently associated with the radio(s) used with this
switch switch. Compare this number with the number of MUs within the group to
determine how effectively MUs are distributed within the cluster.
4. The Apply and Revert buttons are unavailable for use with the Status screen, as there are no editable
parameters to save or revert.
5-40 WS5100 Series Switch System Reference Guide
Status Displays the current status of this group member. This status could have the
following values:
• Configured - The member is configured on the current wireless service module.
• Seen - Heartbeats can be exchanged between the current switch and this
member.
• Invalid - Critical redundancy configuration parameter(s) of the peer (heartbeat
time, discovery time, hold time, Redundancy ID, Redundancy Protocol version
of this member) do not match this switch’s parameters.
• Not Seen - The member is no more seen by this switch.
• Established - The member is fully established with this current module and
licensing information already been exchanged between this switch and the
member.
• Unknown - No status information could be obtained.
Last Seen Displays the time when this member was last seen by the switch.
Adoption Count Displays the number of access ports adopted by this member.
Switch Services 5-41
Mode The Redundancy Mode could be Active or Standby depending on the mode
configuration on the member. Refer to the Configuration screen to change the
mode.
4. Select a row, and click the Details button to display additional details for this member. For more
information, see Displaying Redundancy Member Details on page 5-41.
5. Select a row and click the Delete button to remove a member from the redundancy group. The
redundancy group should be disabled to conduct an Add or Delete operation.
6. Click the Add button to add a member to the redundancy group. The redundancy group should be disabled
to conduct an Add or Delete operation. For more information, see Adding a Redundancy Group Member
on page 5-43.
IP Address Displays the IP addresses of the members of the redundancy group. There are a
minimum of 2 members needed to define a redundancy group, including this
current module.
Status Displays the current status of this group member. This status could have the
following values:
• Configured - The member is configured on the current wireless service
module.
• Seen - Heartbeats can be exchanged between the current switch and this
member.
• Invalid - Critical redundancy configuration parameter(s) of the peer
(heartbeat time, discovery time, hold time, Redundancy ID, Redundancy
Protocol version of this member) do not match this switch’s parameters.
• Not Seen - The member is no more seen by this switch.
Established - The member is fully established with this current module and
licensing information already been exchanged between this switch and the
member.
Adoption Count Displays the number of access ports adopted by this member.
Adoption Capacity Displays the maximum number of access ports this member is licensed to adopt.
For information on licensing rules impacting redundancy group members, see
Redundancy Group License Aggregation Rules on page 5-44.
Mode The Redundancy Mode could be Active or Standby depending on the mode
configuration on the member. Refer to the Configuration screen to change the
mode
License Count Displays the number of port licenses available for this switch. For information on
licensing rules impacting redundancy group members, see Redundancy Group
License Aggregation Rules on page 5-44.
Image Version Displays the image version currently running on this member. Is the selected
version complimentary with this switch’s version?
First Seen Displays the time this member was first seen by the switch.
Last Seen Displays the time this member was last seen by the switch.
HB Sent Displays the number of heartbeats sent from the switch to this member since the
last reboot of the switch.
HB Received Displays the number of heartbeats received by the switch since the last reboot.
Updates Sent Displays the number of updates sent from the switch since the last reboot.
Updates include, authorization level, group authorization level and number of
access ports adopted.
Updates Received Displays the number of updates received by the current switch from this member
since the last reboot.
Radio Portals Displays the number of radio portals detected on each redundancy member listed.
Associated MUs Display the number of MUs associated with each member listed.
Switch Services 5-43
Rogue APs Displays the number of Rogue APs detected by each member. Use this information
to discern whether these radios represent legitimate threats to other members of
the redundancy group.
Self Healing Radios Displays the number of self healing radios on each detected member. These radios
can be invaluable if other radios within the redundancy group were to experience
problems requiring healing by another radio.
• Forward and reverse data paths for traffic originating from and destined to MUs that have roamed from
one L3 subnet to another are symmetric.
To configure Layer 3 Mobility for the switch:
1. Select Services > Layer 3 Mobility from the main menu tree.
The Layer 3 Mobility screen appears with the Configuration tab displayed.
2. Select the Use Default Management Interface checkbox to use the switch’s default management
interface IP address for MUs roaming amongst different Layer 3 subnets. The IP address displayed to the
right of the checkbox is used by Layer 3 MU traffic.
3. If wanting to use a local IP addresses (non switch management interface) for MUs roaming amongst
different Layer 3 subnets, select the Use this Local Address checkbox and enter an IP address.
4. Use the Roam Interval to define maximum length of time MUs within selected WLAN are allowed to
roam amongst different subnets.
5. Refer to the table of WLANs and select the checkboxes of those WLANs you wish to enable Layer 3
mobility for.
Once the settings are applied, MUs within these WLANs can roam amongst different subnets.
6. Select the Enable Mobility checkbox to enable a MU to maintain the same Layer 3 address while
roaming throughout a multi-VLAN network.
7. Select the All WLANs On button to enable mobility for each WLAN listed.
If unsure if you want to enable mobility for each WLAN, manually select just those you want to enable.
8. Select the All WLANs Off button to disable mobility for each WLAN listed.
9. Click the Apply button to save the changes made within this screen. Clicking Apply overwrites the
previous configuration.
Switch Services 5-47
10.Click the Revert button to disregard any changes made within this screen and revert back to the last
saved configuration.
3. Refer to the contents of the Peer List for existing IP addresses and Layer 3 MU session status.
Use this information to determine whether a new IP address needs to be added to the list or an existing
address needs to be removed.
4. Select an IP address from those displayed and click the Delete button to remove the address from the
list available for MU Layer 3 roaming amongst subnets.
5-48 WS5100 Series Switch System Reference Guide
5. Click the Add button to display a screen used for adding the IP address to the list of addresses available
for MU Layer 3 roaming.
Enter the IP addresses in the area provided and click the OK button to add the addresses to the list
displayed within the Peer List screen.
Peer IP Displays the IP addresses of the peer switches within the mobility domain. Each
peer can support up to 500 MUs.
JOIN Events Displays the number of JOIN messages sent and received. JOIN messages
sent/rcvd advertise the presence of MUs entering the mobility domain for the first time.
When a MU (currently not present in the MU database) associates with a switch,
it immediately sends a JOIN message to the host switch with MAC, VLAN and IP
information (both current and home switch IP info). The home switch forwards the
JOIN to all its peers (except the one from which it received the original message).
JOIN messages are always originated by the current switch. JOIN messages are
also used during the home switch selection phase to inform a candidate home
switch about a MU. The current switch selects the home switch (based on its local
selection mechanism) and sends a JOIN message to the home switch that is
forwarded it to all its peers.
LEAVE Events Displays the number of LEAVE messages sent and received. LEAVE messages are
sent/rcvd sent when the switch decides a MU originally present in the MU database is no
longer present in the mobility domain. The criterion to determine the MU has
actually left the network is implementation specific. The current switch sends the
LEAVE message with the MU's MAC address information to the home switch,
which eventually forwards the message to each mobility peer.
5-50 WS5100 Series Switch System Reference Guide
L2-ROAMs Displays the number of Layer 2 ROAM messages sent and received. When a MU
sent/rcvd roams to a new switch on a different layer 3 network (MU is mapped to a different
VLAN ID), it sends a L3-ROAM message to the home switch with the new IP
information for the current switch it is associated with. The L3-ROAM message is
then forwarded by the home switch to each peer.
L3-ROAMs Displays the number of Layer 3 ROAM messages sent and received. When a MU
sent/rcvd roams to a new current switch (on the same layer 3 subnet as the old current
switch), it sends a L2-ROAM message to the old home switch with the new home
switch-IP and current switch-IP information. This L2-ROAM message is then
forwarded by the old home switch to each peer.
4. Click the Clear Statistics button to remove the data displayed for the selected peer IP address.
Enable Interference When enabled, the switch is capable of switching channels on an access port
Avoidance (Automatic Channel Selection) if interference is observed on the current operating
channel.
Average Retries Displays the average number of retries for a MU to communicate with a neighbor
radio. Define a retry value between 0.0 and 15.0 retry attempts. Average Retries
is a threshold value, when exceeded ACS is initiated.
Hold Time Set the interval (in seconds) that disables interference avoidance after detection.
The hold time prevents the radio from re-running ACS continuously.
4. Click the Apply button to save the changes made within this screen. Clicking Apply overwrites the
previous configuration.
5-52 WS5100 Series Switch System Reference Guide
5. Click the Revert button to disregard any changes made within this screen and revert back to the last
saved configuration.
The top right-hand corner displays whether neighbor recovery is currently enabled or disabled. To change
the state, click the Enable Neighbor Recovery checkbox within the Configuration tab.
3. Refer to the following information as displayed within the Neighbor Recovery screen.
Radio Index Displays a numerical identifier used (in conjunction with the radio’s name) to
differentiate the radio from its peers.
Description Displays a text description used (in conjunction with the radio’s index) to
differentiate the radio from its peers.
RP Mac Address Displays the Ethernet MAC address of the access port. Use the Access Port MAC
Address for the addition or deletion of the radio.
Switch Services 5-53
Action Displays the self healing action configured for the radio. Options include:
• Raise Power - The transmit power of the radio is increased when a neighbor
radio is not functioning as expected.
• Open Rates - Radio rates are decreased to support all rates when a neighbor
radio is not functioning as expected.
• Both - Increases power and increases rates when a neighbor radio is not
functioning as expected.
• None - No action is taken when a neighbor radio is not functioning as expected.
4. Highlight an existing neighbor and click the Edit button to launch a screen designed to modify the self
healing action and/or neighbors for the radio. For more information, see Editing the Properties of a
Neighbor on page 5-53.
5. Select the Remove Neighbors button to remove all neighbors from the selected radio’s neighbor list.
6. Click the Detect Neighbors button to auto-determine neighbors for the radios.
NOTE: The Detect Neighbors button is enabled only when the Enable Neighbor
Recovery checkbox is selected from within the Configuration tab. Ensure this option has
been enabled before trying to detect neighbors.
Enabling this feature automatically makes each radio disassociate with their attached MUs, clear the
current neighbor list and move into detection mode to detect neighboring radios.
Neighbor detection works best if all radios are configured and adopted. Starting the automatic neighbor
detection feature disassociates MUs and clears the current neighbor configuration.
The radio index and description display in the upper right corner of the screen. The Available Radios
value represents the radios that can be added as a neighbor for the target radio. Neighbor Radios are
existing radios (neighbors).
4. Select one of the following four actions from the Self Healing Action drop-down menu:
• None - The radio takes no action at all when its neighbor radio fails.
• Open Rates - The radio will default to factory-default rates when its neighbor radio fails.
• Raise Power - The radio raises its transmit power to the maximum provided its power is lower than
the maximum permissible value.
• Both - The radio will open its rates as well as raise its power.
5. Click the Add -> button to move a radio from the Available Radios list to the Neighbor Radios list. This
dedicates neighbors for this radio.
6. Select a radio and click <- Remove to move the radio from the Neighbor Radios list to the Available
Radios list.
7. Refer to the Status field for an update of the edit process.
The Status is the current state of the requests made from the applet. Requests are any “SET/GET”
operation from the applet. The Status field displays error messages if something goes wrong in the
transaction between the applet and the switch.
8. Click OK to save the changes to the running configuration and close the dialog.
9. Click Cancel to close the dialog without committing updates to the running configuration.
Switch Services 5-55
2. Refer to the following information within the Discovery Profiles tab to discern whether an existing profile
can be used as is, requires modification (or deletion) or if a new discovery profile is required.
Index Displays the numerical identifier used to differentiate this profile from others with
similar configurations. The index is supplied to new profiles sequentially.
Profile Name Displays the user-assigned name for the profile. The profile name should
associate the profile with the group of devices or area where the discovered
devices are anticipated to be located.
Start IP Address Displays the starting numeric (non DNS) IP address from where the search for
available network devices is conducted.
End IP Address Displays the ending numeric (non DNS) IP address from where the search for
available network devices is conducted.
SNMP Version Displays the version of the SNMP (either SNMP v2 or v3) used for discovering
available network devices.
3. Select an existing profile and click the Edit button to modify the profile name starting and ending IP
address and SNMP version. Motorola recommends editing a profile only if some of its attributes are still
valid, if the profile is obsolete, delete it and create a new one.
4. Select an existing profile and click the Delete button to remove this profile from the list of available
profiles.
5. Click the Add button to display a screen used to define a new switch discovery profile. For more
information, see Adding a New Discovery Profile on page 5-57.
6. Click the Start Discovery button to display a Read Community String (SNMP v2) or V3
Authentication (SNMP v3) screen.
compromise switch security. Therefore, when Start Discovery is selected, the switch prompts the user to
verify their SNMP credentials against the SNMP credentials of discovered devices. SNMP v2 and v3
credentials must be verified before the switch displays discovered devices within the Recently Found
Devices table..
If SNMP v2 is used with a discovering profile, a Read Community String screen displays.The
Community String entered is required to match the name used by the remote network management
software of the discovered switch.
Switch Services 5-57
If SNMP v3 is used with a discovering profile, a V3 Authentication screen displays. The User Name and
Password are required to match the name used by the remote network management software of the
discovered switch.
When the credentials of the V2 Read Community or V3 Authentication screens are satisfied, the switch
discovery process begins.
7. If necessary, click the Stop Discovery button (enabled only during the discovery operation) to stop the
discovery operation.
3. Define the following parameters for the new switch discovery profile:
Profile Name Define a user-assigned name used to title the profile. The profile name should
associate the profile with the group of devices or area where the discovered
devices should be located.
Start IP Address Enter the starting numeric (non DNS) IP address from where the search for
available network devices is conducted.
5-58 WS5100 Series Switch System Reference Guide
End IP Address Enter the ending numeric (non DNS) IP address from where the search for
available network devices is conducted
SNMP Version Use the drop-down menu to define the SNMP version (either v2 or v3) used for
discovering available network devices.
3. Refer to the following within the Recently Found Devices screen to discern whether a located device
should be deleted from the list or selected to have its Web UI launched and its current configuration
modified.
IP Address Displays the IP address of the discovered switch. This IP address obviously falls
within the range of IP addresses specified for the discovery profile used for the
device search. If the IP addresses displayed do not meet your search expectations,
consider creating a new discovery profile and launching a new search.
Software Version Displays the software version running on the discovered device.
Product Displays the name of the device discovered by the device search. If the list of
devices discovered is unsatisfactory, consider configuring a new discovery policy
and launching a new search.
Redundancy Group If the discovered device is part of a redundancy group, its cluster ID displays within
ID this column. The Redundancy ID would have been assigned using the Switch >
Redundancy screen.
Device Name Displays the device name assigned to the discovered device. This name would
have been assigned using the Switch > Configuration screen.
Device Location Displays the device location defined to the discovered device. The location would
have been assigned using the Switch > Configuration screen.
Profile used for Displays the profile selected from within the Discovery Profiles tab and used with
Discovery the Start Discovery function to discover devices within the switch managed
network. If the group of devices discovered and displayed within the Recently
Found Devices tab does not represent the device demographic needed, consider
going back to the Discovery Profiles tab and selected a different profile for the
switch discovery process.
4. If a discovered switch is of no interest, select it from amongst the discovered devices displayed and click
the Delete button.
Once removed, the located device cannot be selected and its Web UI displayed.
5. Select a discovered device from amongst those located and displayed within the Recently Found Devices
screen and click the Launch button to display the Web UI for that switch.
CAUTION: When launching the Web UI of a discovered device, take care not to make
! configuration changes rendering the device ineffective in respect to its current
configuration.
5-60 WS5100 Series Switch System Reference Guide
Type Displays the configuration for those SOLE adapters detected. Currently, the switch
supports Aeroscout adapters.
Enabled This columns displays a green checkmark for each SOLE adapter enabled, and a
red X for each that is disabled.
Switch Services 5-61
2. Click the Enable button to enable a selected SOLE adapter currently disabled.
The Enabled column displays a green checkmark next to the SOLE adapter once enabled. A Red X
defines the adapter as disabled.
NOTE: In order to set the listening MAC in each radio you must use the radio command in
the switch’s Command Line Interface (CLI). An example of the command syntax is:. #radio
<1-n> tag-type aeroscout listen-addr 01-0c-cc-00-00-00v.
3. Click the Disable button to disable a selected SOLE adapter. The Enable column displays a red X next to
the SOLE adapter once disabled.
3. Review the following to ascertain the SOLE adapters seen by the switch:
Type Displays the configuration type for all SOLE adapters. Currently, the only
supported type is Aeroscout.
Build Date Displays the SOLE adapter build date and time.
5-62 WS5100 Series Switch System Reference Guide
Type Displays the configuration type for each SOLE adapter. Currently the only
supported type is Aeroscout.
No. of RX Msgs Displays the number of recieved message packets received on SOLE adapter.
No. of TX Msgs Displays the number of transmitted message packets sent on the SOLE adapter.
No. of Tag Reports Displays the number of locationing tag reports received on the SOLE adapter.
Last Msg RX Time Displays the time stamp of the last message received on the SOLE adapter.
Last Msg TX Time Displays the time stamp of the last message transmitted on the SOLE adapter.
Switch Security
This chapter describes the security mechanisms available to the switch. This chapter describes the following
security configuration activities:
• Displaying the Main Security Interface
• AP Intrusion Detection
• MU Intrusion Detection
• Configuring Wireless Filters
• Configuring ACLs
• Configuring NAT Information
• Configuring IKE Settings
• Configuring IPSec VPN
• Configuring the Radius Server
• Creating Server Certificates
• Configuring Enhanced Beacons and Probes
Access Port Intrusion Displays the Enabled or Disabled state of the switch to detect potentially hostile
Detection access ports (the definition of which defined by you). Once detected, these devices
can be added to a list of devices either approved or denied from interoperating
within the switch managed network. For more information, see AP Intrusion
Detection on page 6-3.
Mobile Unit Intrusion Displays the state of the switch protecting against threats from MUs trying to find
Detection network vulnerabilities. For more information, see MU Intrusion Detection on page
6-9.
Wireless Filters Displays the state of the filters used to either allow or deny a MAC address (or
groups of MAC addresses) from associating with the switch. For more information,
see Configuring Wireless Filters on page 6-12.
Certificates Displays the number of Server and CA certificates currently used by the switch.
For more information, see Creating Server Certificates on page 6-81.
Trustpoints Displays the number of trustpoints currently in use by this switch. The trustpoint
signing the certificate can be a certificate authority, corporation or an individual.
A trustpoint represents a CA/identity pair and contains the identity of the CA, CA-
specific configuration parameters, and an association with one enrolled identity
certificate. For more information, see
Using Trustpoints to Configure Certificates on page 6-81.
Key Pairs Displays the number of Key Pairs currently used by the switch. For more
information, see Configuring Trustpoint Associated Keys on page 6-88.
The Apply and Cancel buttons are greyed out within this screen, as there is no data to be configured or saved.
Switch Security 6-3
Enable Select the Enable checkbox to enable associated access ports to detect
potentially hostile access points (the definition of which defined by you). Once
detected, the access points can be added to a list of APs either approved or denied
from interoperating within the switch managed network.
Approved AP timeout Define a value (in seconds) the switch uses to timeout (previously approved)
access points that have not communicated with the switch. The range is from 1-
65535 seconds, with a default of 300 seconds. This value is helpful for continually
re-validating access points that interoperate within the switch managed network.
Unapproved AP Define a value (in seconds) the switch uses to remove access points that have not
timeout communicated with the switch. The range is from 1-65535 seconds, with a default
of 300 seconds.
4. Refer to the MU Assisted Scan field to enable associated MUs to assist in the detection of access
points.
Enable Select the Enable checkbox to enable associated MUs to detect potentially
hostile access points (the definition of which defined by you). Once detected,
these devices can be added to a list of access points either approved or denied
from interoperating within the switch managed network.
Refresh Time Define a value (in seconds) associated MUs use to scan for access points. The
range is from 300 - 86400 seconds, with a default of 1800 seconds.
Index Displays the numerical identifier (index value) assigned to this particular set of
Allowed APs. Assign this value by clicking Add for a new set of access point
address information or click the Edit button to revise the index. The Index can be
used as reference to group specific devices numerically to a specific range of MAC
or ESSID addresses. This user cannot modify the index from this screen.
BSS MAC Address Displays the MAC address of the Allowed AP(s). The MAC addresses displayed
are defined by clicking the Add button and entering a specific MAC address or by
allowing all MAC addresses to be allowed. The list of MAC addresses allowed can
be modified by highlighting an existing entry, clicking the Edit button and revising
the properties of the MAC address.
ESSID Displays the ESSIDs of the Allowed AP(s). The addresses displayed are defined by
clicking the Add button and entering a specific MAC address or by allowing all
MAC addresses to be allowed. The list of MAC addresses allowed can be
modified by highlighting an existing entry, clicking the Edit button and revising the
properties of the MAC address.
8. Select an Allowed AP and click the Edit button to launch a screen used to modify the index and SSID of
the AP. For more information, see Adding or Editing an Allowed AP on page 6-5.
9. Select an Allowed AP and click the Delete button to remove the AP from list of Allowed APs.
Switch Security 6-5
10.Click the Add button to display a screen used to enter device information for a new AP added to the
Allowed AP list. For more information, see Adding or Editing an Allowed AP on page 6-5.
4. If adding a new Allowed AP, use the Index parameter to assign a numerical index value to this particular
access point. The index range is from 1-200. If editing an existing Allowed AP, this is a read only field and
cannot be modified.
5. Refer to the BSS MAC Address field to define the following:
Any MAC Address/ Click the Any MAC Address radio button to allow any MAC address detected on
Specific MAC the network as an Allowed AP. This is not necessary if a specific MAC address is
Address used with this index.
Click the second radio button to enter a specific MAC address as an Allowed AP.
Use this option if (for network security) you want to restrict the number of MAC
Addresses to a single MAC address.
Any ESSID/Specific Click the Any ESSID radio button to allow any ESSID located on the network as
ESSID an Allowed AP. This may not be necessary if a specific ESSID was used with this
particular index.
Click the second radio button to enter a specific ESSID as an Allowed AP. Use this
option if (for network security) you want to restrict the number of device ESSIDs
saved for this index to a single access point ESSID.
6-6 WS5100 Series Switch System Reference Guide
7. Refer to the Status field for the current state of the requests made from applet. This field displays error
messages if something goes wrong in the transaction between the applet and the switch.
8. Click OK to use the changes to the running configuration and close the dialog.
9. Click Cancel to close the dialog without committing updates to the running configuration.
3. The Approved APs (Reported by APs) table displays the following information:
BSS MAC Address Displays the MAC Address of each approved AP. These MAC addresses are access
points observed on the network meeting the criteria (MAC and ESSIDs) of allowed
APs.
Reporting AP Displays the numerical value assigned to the radio used with the specific device
MAC Address and SSID listed for this approved AP.
Channel Displays the channel the approved AP is currently transmitting on. If this device is
operating on a channel not frequently used within your network segment, perhaps
the device is correctly defined as an approved AP.
Switch Security 6-7
Last Seen (In Displays the time (in seconds) the approved AP was last seen on the network.
Seconds)
4. The Number of Approved APs is simply the sum of all of approved access point MAC Addresses
detected.
5. Click on the Export button to export the contents of the table to a Comma Separated Values file (CSV).
3. The Unapproved APs (Reported by APs) table displays the following information:
BSS MAC Address Displays the MAC Address of each Unapproved AP. These MAC addresses are
access points observed on the network, but have yet to be added to the list of
Approved APs, and are therefore interpreted as a threat on the network.
If a MAC Address displays on the list incorrectly, click the Allow button and add
the MAC Address of a newly Allowed AP index.
Reporting AP Displays the numerical value for the radio used with the detecting AP.
Signal Strength (in Displays the Relative Signal Strength Indicator (RSSI) for the detected (and
dbm) unapproved) AP. AP’s with a strong signal may pose a more significant risk within
the switch managed network.
Last Seen (in Displays the time (in seconds) the Unapproved AP was last seen on the network
Seconds) by the detecting AP.
ESSID Displays the ESSID of each Unapproved AP. These ESSIDs are device ESSIDs
observed on the network, but have yet to be added to the list of Approved APs and
are therefore interpreted as a threat. If an ESSID displays on the list incorrectly,
click the Allow button and add the ESSID to a new Allowed AP index.
4. The Number of Unapproved APs is simply the sum of all of Unapproved Radio MAC Addresses
detected.
5. If a radio’s MAC address is listed incorrectly, highlight the MAC Address and click the Allow button.
Assign an Index and define the required device address information to move the device into the list of
approved access point MAC addresses. The number of Unapproved APs updates accordingly as devices
are added and removed.
6. Click the Export button to export the contents of the table to a Comma Separated Values file (CSV).
3. The Unapproved APs (Reported by MUs) table displays the following information:
BSS MAC Address Displays the MAC Address of each Unapproved AP. These MAC addresses are
access points observed on the network (by associated MUs), but have yet to be
added to the list of approved APs, and are therefore interpreted as a threat on the
network.
Last Seen (In Displays the time (in seconds) the Unapproved AP was last seen on the network
Seconds) by the detecting MU. Use this interval to determine whether the detected MU is
still a viable threat.
ESSID Displays the ESSID of each Unapproved AP. These ESSIDs are device ESSIDs
observed on the network, but have yet to be added to the list of Approved APs and
are therefore interpreted as a threat.
4. The Number of Unapproved APs is simply the sum of all of Unapproved Radio MAC Addresses
detected.
5. Click the Export button to export the contents of the table to a Comma Separated Values file (CSV).
Violation Type Displays the name of the violation for which threshold values are set in the MU,
radio and switch columns.
Mobile Unit Set the MU threshold value for each violation type. If exceeded, the MU will be
filtered and displayed within the Filtered MUs screen. Set the values appropriately
in respect to the number of MUs within the switch managed network and how
often they are associating/disassociating, and have their authentication and
encryption credentials verified.
Radio Set the radio threshold value for each violation type. If exceeded, the MU is
filtered and displayed within the Filtered MUs screen.
Switch Set the switch’s threshold value for each violation type. If exceeded, the offending
MU is filtered (from the switch) and displayed within the Filtered MUs screen.
Time to Filter Set the Time to Filter interval (in seconds) the switch uses to filter out MUs defined
as committing a violation. Refer to Viewing Filtered MUs on page 6-11 to review
the contents of the MUs that have been filtered thus far.
CAUTION: Setting MU threshold values too low can jeopardize MU performance or break
! the MU’s connection.
Switch Security 6-11
5. When using the Frames with known bad ESSIDs violation parameter it is necessary to enter a list of
known bad ESSIDs for the violation parameter. To enter this information, select Frames with known
bad ESSIDs and then click the Bad Essid Config button to launch a dialogue box where bad ESSIDs
can be added and removed.
NOTE: If using the Frames with known bad ESSIDs violation parameter if no ESSIDs
are entered in the Bad Essid Config dialogue, this parameter will not function.
The Filtered MUs tab displays the following read-only information for detected MUs:
MAC Address Displays the MU’s MAC address. Defer to this address as the potentially hostile
MU’s identifier.
Radio Index The radio index displays the index of the detected MU. Use this information to
discern whether the detected MU is known and whether is truly constitutes a
threat.
6-12 WS5100 Series Switch System Reference Guide
Violation Type Displays the reason the violation occurred for each detected MU. Use the Violation
Type to discern whether the detected MU is truly a threat on the switch managed
network (and must be removed) or can be interpreted as a non threat. The
following violation types are possible:
• Excessive Probes
• Excessive Association
• Excessive Disassociation
• Excessive Authentication failure
• Excessive Crypto replays
• Excessive 802.11 replays
• Excessive Decryption failures
• Excessive Unassociated Frames
• Excessive EAP Start Frames
• Null destination
• Same source/destination MAC
• Source multicast MAC
• Weak WEP IV
• TKIP Countermeasures
• Invalid Frame Length
• Excessive EAP-NAKS
• Invalid 802.1x frames
• Invalid Frame Type
• Beacon with broadcast ESSID
• Frames with known bad ESSIDs
• Unencrypted traffic
• Frames with non-changing WEP IV
NOTE: The following violation types require the access port be in scan mode:
• Beacon with broadcast ESSID
• Frames with known bad ESSIDs
Time Remaining Displays the time remaining before the next filter activity. Detected MUs are
removed from the filtered list when they no longer violate the thresholds defined
within the Configuration tab.
3. Select a detected MU and click the Delete button to remove it from the list of MUs you are tracking as
potential threats within the switch managed network.
4. Click on the Export button to export the contents of the table to a Comma Separated Values file (CSV).
1. Select Security > Wireless Filters from the main menu tree.
2. The Wireless Filters tab is divided into 2 fields:
• Filters
• Associated WLANs
MU-ACL Index Displays a numerical identifier used to associate a particular ACL to a range of
MAC addresses (or a single MAC address) that are either allowed or denied
access to the switch managed network.
Starting MAC Displays the beginning MAC Address (for this specific Index) either allowed or
denied access to the switch managed network.
Ending MAC Displays the ending MAC Address (for this specific Index) either allowed or denied
access to the switch managed network.
Allow/Deny States whether this particular ACL Index and MAC address range has been
allowed or denied access to the switch managed network.
WLAN Index Highlight an Index to display the name(s) of the WLANs currently associated with
this particular Index. Click the Membership button to map available WLANs to
this filter.
ESSID Displays the SSID required by the devices comprising this WLAN.
6-14 WS5100 Series Switch System Reference Guide
Authentication Displays the authentication scheme configured for the devices comprising this
WLAN.
Encryption Displays the encryption method configured for the devices comprising this WLAN.
5. If the properties of an existing filter fulfill to your needs but still require modification to better filter
devices, select the Edit button. For more information see,
Editing an Existing Wireless Filter on page 6-14.
6. If an existing filter is now obsolete, select it from those listed and click the Delete button.
7. Click the Add button to create a new filter. For more information, see Adding a new Wireless Filter on
page 6-15.
8. Click the Memberships button to display a screen wherein a selected index can be added to one or more
existing WLANs. For more information see, Associating an ACL with WLAN on page 6-16
9. Click on the Export button to export the contents of the table to a Comma Separated Values file (CSV).
4. The Station-ACL Index is used as an identifier for a MAC Address range and allow/deny ACL
designation. The available index range is 1 - 1000. However, the index is not editable, only its starting/
ending MAC range and allow/deny designation. If a new index is needed, create a new filter.
5. Modify the existing Starting MAC for the target Index or leave the Starting MAC value as is and just
modify the Ending MAC Address or Allow/Deny designation.
Switch Security 6-15
6. Modify the existing Ending MAC for the target Index. Enter the same Starting MAC address within the
Ending MAC field to use only the Starting MAC address as either allowed or denied access to the
switch managed network.
7. Use the drop-down menu to select Allow or Deny.
This rule applies to MUs within the specified Starting and Ending MAC Address range. For example, if
the adoption rule is to Allow, access is granted for all MUs within the specified range.
8. Refer to the Status field for the state of the requests made from applet. This field displays error
messages if something goes wrong in the transaction between the applet and the switch.
9. Click OK to use the changes to the running configuration and close the dialog.
10.Click Cancel to close the dialog without committing updates to the running configuration.
This rule applies to MUs within the specified Starting and Ending MAC Address range. For example, if
the adoption rule is to Allow, access is granted for all MUs within the specified range.
7. Refer to the Status field for the current state of the requests made from applet. This field displays error
messages if something goes wrong in the transaction between the applet and the switch.
8. Click OK to use the changes to the running configuration and close the dialog.
9. Click Cancel to close the dialog without committing updates to the running configuration.
4. Select the box to the right of each WLAN you want associated with the ACL.
Selecting a WLAN maps it the MAC address range and allow or deny designation assigned to it.
Consequently, be sure you are not restricting MU traffic for a WLAN that requires those MAC addresses
to interact with the switch.
Switch Security 6-17
5. Refer to the Status field for the state of the requests made from applet. This field displays error
messages if something goes wrong in the transaction between the applet and the switch.
6. Click OK to use the changes to the running configuration and close the dialog.
7. Click Cancel to close the dialog without committing updates to the running configuration.
Use the ACL screen to view, add and configure access control configurations. Typically, an ACL consists of
series of entries called an Access Control Entry (ACE). Each ACE defines the access rights for a user in
relationship to the switch. When access is attempted, the operating system uses the ACL to determine
whether the user has switch access permissions. The ACL screen displays four tabs supporting the following
ACL configuration activities:
• Configuring an ACL
• Attaching an ACL
• Attaching an ACL on a WLAN Interface/Port
• Reviewing ACL Statistics
NOTE: For an overview of how the switch uses an ACL to filter permissions to the switch
managed network, go to ACL Overview on page 6-17.
NOTE: Port and router ACLs can be applied only in an inbound direction. WLAN ACLs
support applying ACLs in the inbound and outbound direction.
6-18 WS5100 Series Switch System Reference Guide
• Wireless LAN ACLs - A Wireless LAN ACL is designed to filter/mark packets based on the wireless LAN
from which they arrived rather than filtering the packets arrived on L2 ports.
For more information, see
• Router ACLs
• Port ACLs
• Wireless LAN ACLs
• ACL Actions
• Precedence Order
NOTE: Port and router ACLs can be applied only in an inbound direction. WLAN ACLs
support applying ACLs in the inbound and outbound direction.
Each session has a default idle time-out interval. If no packets are received within this interval, the session
is terminated and a new session must be initiated. These intervals are fixed and cannot be configured by the
user.
Switch Security 6-19
NOTE: A Permit All ACL is not supported when using NTP. If a Permit All ACL is used with
NTP, the client will not be able to synchronize with the NTP server.
NOTE: Only a Port ACL supports a mark action. With Router ACLs, a mark is treated as a
permit and the packet is allowed without modifications.
The ACLs field displays the list of ACLs currently associated with the switch. An ACL contains an ordered
list of ACEs. Each ACE specifies a permit or deny designation and a set of conditions the packet must
satisfy to match the ACE. Because the switch stops testing conditions after the first match, the order of
conditions in the list is critical.
4. If an existing ACL no longer satisfies switch access control requirements, select it from amongst the
existing ACLs and click the Delete button.
5. Use the Add button (within the ACLs field) to add an additional ACL. For more information, see Adding a
New ACL on page 6-21.
6. Refer to the Associated Rules field to assess the rules and precedence associated with each ACL. If
necessary, rules and can be added or existing rules modified. For more information, see Adding a New
ACL Rule on page 6-22.
4. Select an ACL Type from the drop-down menu. The following options are available:
• Standard IP List – Uses source IP addresses for matching operations.
• Extended IP List – Uses source and destination IP addresses and optional protocol information for
matching operations.
• MAC Extended List – Uses source and destination MAC addresses, VLAN ID and optional protocol
information.
5. Enter a numeric index name for the ACL in the ACL ID field.
6. Refer to the Status field for the current state of the requests made from applet. This field displays error
messages if something goes wrong in the transaction between the applet and the switch.
7. Click OK to use the changes to the running configuration and close the dialog.
8. Click Cancel to close the dialog without committing updates to the running configuration.
4. Use the Precedence field to enter a precedence (priority) value between 1 and 5000.
The rules within an ACL will be applied to packets based on their precedence value. Rules with lower
precedence are always applied first.
NOTE: If adding an access control entry to an ACL using the switch SNMP interface,
Precedence is a required parameter.
5. Use the Operation drop-down menu to define a permit, deny or mark designation for the ACL. If the
action is to mark, the packet is tagged for priority.
6. Select the Logging checkbox to generate log messages when a packet has been forwarded, denied or
marked based on the criteria specified in the access lists.
7. If mark is selected from within the Operations drop-down menu, the Attribute to mark field is
enabled. Select the 802.1p (0 - 7) or TOS(0 - 255) checkbox and define the attribute receiving priority
with this ACL mark designation.
8. From within the Filters field, select a Source Wildcard/Mask from the drop-down menu.
The source is the address of the network or host (in dotted decimal format). The Source-mask is the
network mask.
9. Use the Source Address field to enter the IP address where the packets are sourced.
10.Refer to the Status field for the current state of the requests made from applet. This field displays error
messages if something goes wrong in the transaction between the applet and the switch.
11.Click OK to use the changes to the running configuration and close the dialog.
12.Click Cancel to close the dialog without committing updates to the running configuration.
6-24 WS5100 Series Switch System Reference Guide
6. Use the Operation drop-down menu (if necessary) to modify the permit, deny or mark designation for the
ACL. If the action is to mark, the packet is tagged for priority.
7. Select the Logging checkbox to generate log messages when a packet has been forwarded, denied or
marked based on the criteria specified in the access lists.
8. If mark is selected from within the Operations drop-down menu, the Attribute to mark field becomes
enabled. If necessary, select the 802.1p (0 - 7) or TOS(0 - 255) checkbox and define the attribute
receiving priority with this ACL mark designation.
9. From within the Filters field, modify (if necessary) the Source Wildcard/Mask from the drop-down
menu.
The source is the source address of the network or host in dotted decimal format. The Source-mask is the
network mask.
10.Use the Source Address field to revise (if necessary) the IP address where the packets are sourced.
NOTE: If an Extended IP ACL is used, a Destination Wildcard/Mask and Destination
Address are required.
11.Refer to the Status field for the state of the requests made from applet. This field displays error
messages if something goes wrong in the transaction between the applet and the switch.
12.Click OK to use the changes to the running configuration and close the dialog.
13.Click Cancel to close the dialog without committing updates to the running configuration.
Switch Security 6-25
Interface The interface to which the switch is configured. It can be one of the following:
• eth1
• eth2
• vlan1 (or any additional VLANs that have been created)
• tunnel n (where n equals the name(s) of those tunnels created thus far).
IP ACL Displays the IP ACL configured as the inbound IP for the layer 2 or layer 3 interface.
MAC ACL Displays the MAC ACL to be configured as the MAC IP for the layer 2 interface.
4. Select an interface and click on Edit to modify the ACL interface, IP ACL and MAC ACL values.
5. Select an interface and click the Delete button to delete the interface configuration from the switch.
6. Click on Add button to add an physical or VLAN interface to the switch. For more information, see Adding
a New ACL L2/L3 Configuration on page 6-25.
4. Use the Interface drop-down menu to select the interface to configure on the switch. Available options
include – Ethernet 1, Ethernet 2, VLAN 1 (plus those VLANs created thus far) and Tunnel n (where n equals
the name(s) of those tunnels created thus far).
5. Use the IP ACL drop-down menu to select an IP ACL used as the inbound IP for the layer 2 or layer 3
interface.
6. Use the MAC ACL drop-down menu to select an MAC ACL used as the MAC IP for the layer 2 interface.
7. Refer to the Status field for the state of the requests made from applet. This field displays error
messages if something goes wrong in the transaction between the applet and the switch.
8. Click OK to use the changes to the running configuration and close the dialog.
9. Click Cancel to close the dialog without committing updates to the running configuration.
3. Refer to the following information as displayed within the Attach -WLAN tab:
Direction Displays whether the WLAN ACL is configured to work in an inbound or outbound
direction.
4. Select a WLAN (by row) and click Edit to modify the WLAN Index, IP ACL and MAC ACL values.
5. Select a row and click the Delete button to delete the ACL from the list available (but not from the
switch).
6. Click the Add button to add an ACL to a WLAN interface. For more information, see Adding or Editing a
New ACL WLAN Configuration on page 6-27.
Interface Displays the Ethernet 1, Ethernet 2 or VLAN 1 interface used to add the ACL
association to the switch.
Action Displays the permit, deny or mark designation for the ACL. If the action is to mark,
the packet is tagged for priority.
Protocol Displays the permit, deny or mark designation for the ACL. If the action is to mark,
the packet is tagged for priority or “type of service.”
Low Source IP Displays the Low Source IP Address from where the packets are sourced.
High Source IP Displays the High Source (highest address in available range) IP Address from
where the packets are sourced.
Low Destination IP Displays the Low Destination (lowest address in available range) IP Address.
Packets In Displays the number of packets (in bytes) transmitted over the ACL.
Packets Out Displays the number of instances this ACL has been used. Periodically review to
determine whether specific ACLs should be deleted or modified to make relevant.
4. Select an interface and click the Delete button to delete the ACL interface from the switch.
5. Click the Export to export the selected ACL attribute to a user specified location.
6-30 WS5100 Series Switch System Reference Guide
3. Refer to the following information as displayed within the Dynamic Translation tab.
Access List Defines the packet selection criteria for NAT. NAT is applied only on packets which
match a rule defined in the access-list. Only the Standard IP and Extended IP
Access List can be used.
Interface Defines the interface through which packets are routed. The source IP address and
source port number (only if IP protocol is TCP or UDP) of packets is changed to the
interface IP address and a random port number.
4. Select an existing NAT configuration and click the Edit button to modify the settings of this existing NAT
configuration. The fields within the Edit screen are similar to those displayed when adding a new NAT
configuration.
6-32 WS5100 Series Switch System Reference Guide
5. Select an existing NAT configuration and click the Delete button to remove it from the list of available
configurations.
6. Click the Add button to display a screen to create a new NAT configuration and add it to the list of
available configurations. For more information, see
Adding a New Dynamic NAT Configuration on page 6-32.
4. Define the NAT Type from the drop-down menu. Options include:
• Inside - The set of networks subject to translation. These are the internal addresses you are trying
to prevent from being exposed to the outside world.
• Outside - All other addresses. Usually these are valid addresses located on the Internet. Outside
addresses pose no risk if exposed over a publicly accessible network.
5. Define the NAT Direction from the drop-down menu. Options include:
• Source - The inside network is transmitting data over the network its intended destination. On the
way out, the source IP address is changed in the header and replaced by the (public) IP address.
• Destination - Packets passing through the NAT on the way back to the switch managed LAN are
searched against to the records kept by the NAT engine. There the destination IP address is changed
back to the specific internal private class IP address in order to reach the LAN over the switch
managed network.
6. Use the Access List drop-down menu to select the list of addresses used during NAT translation. These
addresses (once translated) will not be exposed to the outside world when the translation address is
used to interact with the remote destination
Switch Security 6-33
7. Use the Interface drop-down menu to select the VLAN used as the communication medium between the
source and destination points within the NAT configuration. Ensure the VLAN selected represents the
intended network traffic within the NAT supported configuration. VLAN1 is available by default.
8. Refer to the Status field for the state of the requests made from applet. This field displays error
messages if something goes wrong in the transaction between the applet and the switch.
9. Click OK to use the changes to the running configuration and close the dialog.
10.Click Cancel to close the dialog without committing updates to the running configuration.
3. Refer to the following information as displayed within the Static Translation tab.
Protocol Displays the tcp or udp option selected for use with the static translation.
Local Address Displays the Local Address used at the (source) end of the static NAT
configuration. This address (once translated) will not be exposed to the outside
world when the translation address is used to interact with the remote
destination.
Local Port Applies NAT on packets matching the specified port number. The port number
matched can be either source or destination based on the direction specified. This
option is valid only if the direction specified is destination.
Global Address Modifies the IP address of the matching packet to the specified value. The IP
address modified can be either source or destination based on the direction
specified.
Global Port Modifies the port number of the matching packet to the specified value. This
option is valid only if the direction specified is destination.
4. Select an existing NAT configuration and click the Edit button to display screen to modify the settings of
this existing NAT configuration. The fields within the Edit screen are similar to those displayed when
adding a new NAT configuration.
5. Select an existing NAT configuration and click the Delete button to remove it from the list of available
configurations displayed.
6. Click the Add button to display screen to create a new NAT configuration and add it to the list of available
configurations. For more information, see Adding a New Dynamic NAT Configuration on page 6-32.
4. Define the NAT Type from the drop-down menu. Options include:
• Inside - The set of networks subject to translation. These are the internal addresses you are trying
to prevent from being exposed to the outside world.
• Outside - All other addresses (usually valid addresses located on the Internet). Outside addresses
pose no risk if exposed over a publicly accessible network.
5. Define the NAT Direction from the drop-down menu. Options include:
• Source - The inside network is transmitting data over the network its intended destination. On the
way out, the source IP address is changed in the header and replaced by the (public) IP address.
• Destination - Packets passing through the NAT on the way back to the switch managed LAN are
searched against to the records kept by the NAT engine. There the destination IP address is changed
back to the specific internal private class IP address to reach the LAN over the switch managed
network.
6. Enter the Local Address used at the local (source) end of the NAT configuration. This address (once
translated) will not be exposed to the outside world when the translation address is used to interact with
the remote destination.
7. Enter the Local Port (1 - 65535) used to for the translation between the switch and its NAT destination.
8. Use the Protocol drop-down menu to select either TCP or UDP as the protocol
NOTE: After selecting (and saving) a protocol type of TCP or UDP (using the Web UI), the
switch CLI will not display the selected protocol type or provide an option to configure it.
Ensure both the protocol and port are defined using the Web UI.
9. Enter the Global Address to assign to a host in the outside network. This should be interpreted as a
secure address.
10.Displays the Global Port used to for the translation between the switch and its NAT destination.
11.Refer to the Status field for the current state of the requests made from applet. This field displays error
messages if something is wrong in the transaction between the applet and the switch.
12.Click OK to use the changes to the running configuration and close the dialog.
6-36 WS5100 Series Switch System Reference Guide
13.Click Cancel to close the dialog without committing updates to the running configuration.
Interface Displays the VLAN used as the inside or outside NAT type. All defined VLANs are
available from the drop-down menu for use as the interface.
4. To Edit an existing interface, select it from the list of available interfaces and click the Edit button.
An Edit Interface screen displays allowing the user to modify the VLAN and interface type (inside or
outside).
Switch Security 6-37
5. If an interface is obsolete or of no use to the NAT translation process, select it and click the Delete
button to remove it from the list of interfaces available
6. If modifying an existing interface is not a valid option, consider configuring a new interface. To define a
new NAT interface:
a. Click the Add button from within the Interfaces tab.
b. Use the Interface drop-down menu to select the VLAN used as the communication medium between
the switch managed network and its destination (within the insecure outside world).
c. Use the Type drop-down menu to specific the Inside or Outside designation as follows:
• Inside - The set of switch-managed networks subject to translation. These are the internal addresses
you are trying to prevent from being exposed to the outside world.
• Outside - All other addresses. Usually these are valid addresses located on the Internet. Outside
addresses pose no risk if exposed over a publicly accessible network.
d. Refer to the Status field for the state of the requests made from applet. This field displays error
messages if something goes wrong in the transaction between the applet and the switch.
e. Click OK to use the changes to the running configuration and close the dialog.
f. Click Cancel to close the dialog without committing updates to the running configuration.
3. Refer to the following to assess the validity and total NAT translation configurations available to the
switch.
Inside-Global Displays the internal global pool of addresses (allocated out of the switch’s private
address space but relevant to the outside) you are trying to prevent from being
exposed to the outside world.
Inside Local Displays the internal local pool of addresses (addresses internal to the switch) you
are trying to prevent from being exposed to the outside world.
4. Click on the Export button to export the contents of the table to a Comma Separated Values file (CSV).
Switch Security 6-39
NOTE: The default isakmp policy will not be picked up for IKE negotiation if another
crypto isakmp policy is created. For the default isakmp policy to be picked up for AAP
adoption you must first create the default isakmp policy as a new policy with default
parameters. This needs to be done if multiple crypto isakmp policies are needed in the
switch configuration.
During IKE negotiations, peers must identify themselves to one another. Thus, the configuration you define is
the identification medium for device recognition.
3. Set a Keep Alive interval (in seconds) the switch uses for monitoring the continued presence of a peer
and report of the client's continued presence. The client notifies you when the peer is no longer present.
The default interval is 10 seconds.
4. Click the Apply button (within the IKE Settings field) to save the configuration.
5. Click the Revert (within the IKE Settings field) to rollback to the previous configuration.
6. Refer to the Pre-shared Keys field to review the following information:
Peer IP Address Use the Peer IP Address to associate an IP address with the specific tunnel used
by a group of peers.
Aggressive Mode Displays whether aggressive mode is enabled for this IP address and key string. A
green check mark defines aggressive mode as enabled. A red “X” denotes the
mode as disabled.
Key Displays the string ID a remote peer uses to look up pre-shared keys.
NOTE: Please note that RSA keys are not supported for IKE negotiation on this switch.
7. Highlight an existing set of pre-shared Keys and click the Edit button to revise the existing peer IP
address, key and aggressive mode designation.
8. Select an existing entry and click the Delete button to remove it.
Switch Security 6-41
9. If the properties of an existing peer IP address, key and aggressive mode designation are no longer
relevant and cannot be edited, click the Add button to create a new pre-shared key
a. Select the Peer IP Address checkbox to associate an IP address with the specific tunnel used by
a group of peers or, select the Distinguished Name checkbox to configure the switch to restrict
access to those peers with the same distinguished name, or select the Hostname checkbox to allow
shared-key messages between corresponding hostnames.
b. Define the Key (string ID) a remote peer uses to look up the pre-shared to interact securely with peers
within the tunnel.
c. Select the Aggressive Mode checkbox (if required). Aggressive mode enables you to configure IKE
pre-shared keys as Radius tunnel attributes for IP Security (IPSec) peers.
d. Refer to the Status field for the current state of requests made from applet. This field displays error
messages if something is wrong in the transaction between the applet and the switch.
e. Click OK to use the changes to the running configuration and close the dialog.
f. Click Cancel to close the dialog without committing updates to the running configuration.
A IKE policy matches when they have the same encryption, hash, authentication and Diffie-Hellman settings.
The SA lifetime must also be less than or equal to the lifetime in the policy sent. If the lifetimes do not match,
the shorter lifetime applies. If no match exists, IKE refuses negotiation.
To view the current set of IKE policies:
1. Select Security > IKE Settings from the main menu tree.
2. Click the IKE Policies tab.
3. Refer to the values displayed within the IKE Policies tab to determine if an existing policy requires
revision, removal or a new policy requires creation.
Priority Displays the priority for the IKE policy. The available range is from 1 to 10,000,
with 1 being the highest priority value.
Encryption Displays the encryption method protecting data transmitted between peers.
Options include:
• DES 56-bit DES-CBC. The default value.
• 3DES - 168-bit Triple DES.
• AES - 128-bit AES.
• AES 192 - 192-bit AES.
• AES 256 - 256-bit AES.
Hash Value Displays the hash algorithm used to ensure data integrity. The hash value
validates a packet comes from its intended destination, and has not been modified
in transit. Options include:
• SHA - The default value.
• MD5 - MD5 has a smaller digest and is somewhat faster than SHA-1.
Switch Security 6-43
Authentication Type Displays the authentication scheme used to validate the identity of each peer. Pre-
shared keys do not scale accurately with a growing network but are easier to
maintain in a small network. Options include:
• Pre-shared Key - Uses pre-shared keys.
• RSA Signature - Uses a digital certificate with keys generated by the RSA
signatures algorithm.
SA Lifetime Displays an integer for the SA lifetime. The default is 60 seconds. With longer
lifetimes, security defines future IPSec security associations quickly. Encryption
strength is great enough to ensure security without using fast rekey times.
Motorola recommends using the default value.
DH Group Displays the Diffie-Hellman (DH) group identifier. IPSec peers use the defined
value to derive a shared secret without transmitting it to one another.
NOTE: 192-bit AES and 256-bit AES are not supported for manual IPSec sa
configurations.
4. Highlight an existing policy and click the Edit button to revise the policy’s existing priority, encryption
scheme, hash value, authentication scheme, SA lifetime and DH group.
5. Select an existing policy and click the Delete button to remove it from the table.
6. If the properties of an existing policy are no longer relevant and cannot be edited to be useful, click the
Add button to define a new policy.
6-44 WS5100 Series Switch System Reference Guide
Priority Define the priority for the IKE policy. The available range is from 1 to 65,543, with
1 being the highest priority value.
Encryption Set the encryption method used to protect the data transmitted between peers.
Options include:
• DES 56-bit DES-CBC. The default value.
• 3DES - 168-bit Triple DES.
• AES - 128-bit AES.
• AES 192 - 192-bit AES.
• AES 256 - 256-bit AES.
Hash Value Define the hash algorithm used to ensure data integrity. The hash value validates
a packet comes from its intended source and has not been modified in transit.
Options include:
• SHA - The default value.
• MD5 - MD5 has a smaller digest and is somewhat faster than SHA-1.
Authentication Type Set the authentication scheme used to validate the identity of each peer. Pre-
shared keys do not scale accurately with a growing network but are easier to
maintain in a small network. Options include:
• Pre-shared Key - Uses pre-shared keys.
• RSA Signature - Uses a digital certificate with keys generated by the RSA
signatures algorithm.
SA Lifetime Define an integer for the SA lifetime. The default is 60 seconds. With longer
lifetimes, security defines future IPSec security associations quickly. Encryption
strength is great enough to ensure security without using fast rekey times.
Motorola recommends using the default value.
DH Group Set the Diffie-Hellman group identifier. IPSec peers use the defined value to derive
a shared secret without transmitting it to one another.
b. Refer to the Status field for the state of the requests made from applet. This field displays error
messages if something goes wrong in the transaction between the applet and the switch.
c. Click OK to use the changes to the running configuration and close the dialog.
d. Click Cancel to close the dialog without committing updates to the running configuration.
3. Refer to the information displayed within SA Statistics tab to discern the following:
Index Displays the alpha-numeric name (index) used to identify individual SAs.
Phase 1 done Displays whether this index is completed with the phase 1 (authentication)
credential exchanged between peers.
Created Date Displays the exact date the SA was configured for each index displayed.
Local Identity Specifies the address the local IKE peer uses to identify itself to the remote peer.
Remote Identity Specifies the address the remote IKE peer uses to identify itself to a local peer.
Number of During IKE negotiations the peers must identify themselves to each other. This
Negotiations value is helpful in determining the network address information used to validate
peers.
Number of Bytes Displays the number of bytes passed between the peers for the specified index.
6-46 WS5100 Series Switch System Reference Guide
4. Select an index and click the Details button to display a more robust set of statistics for the selected
index.
Use this information to discern whether changes to an existing IKE configuration is warranted or if a new
configuration is required.
5. Click the Stop Connection button to terminate the statistic collection of the selected IKE peer.
security parameters in the Crypto Maps at both peers, allows you to specify a lifetime for the IPSec
security association, allows encryption keys to change during IPSec sessions and permits Certification
Authority (CA) support for a manageable, scalable IPSec implementation. If you do not want IKE with your
IPSec implementation, disable it for IPSec peers. You cannot have a mix of IKE-enabled and IKE-disabled
peers within your IPSec network.
• Configure security associations parameters
The use of manual security associations is a result of a prior arrangement between switch users and the
IPSec peer. If IKE is not used for establishing security associations, there is no negotiation of security
associations. The configuration information in both systems must be the same for traffic to be processed
successfully by IPSec.
• Define transform sets
A transform set represents a combination of security protocols and algorithms. During the IPSec security
association negotiation, peers agree to use a particular transform set for protecting data flow.
With manually established security associations, there is no negotiation with the peer. Both sides must
specify the same transform set. If you change a transform set definition, the change is only applied to
Crypto Map entries that reference the transform set. The change is not applied to existing security
associations, but is used in subsequent negotiations to establish new security associations.
• Create Crypto Map entries
When IKE is used to establish security associations, the IPSec peers can negotiate the settings they use
for the new security associations. Therefore, specify lists (such as lists of acceptable transforms) within
the Crypto Map entry.
• Apply Crypto Map sets to Interfaces
Assign a Crypto Map set to each interface through which IPSec traffic flows. The security appliance
supports IPSec on all interfaces. Assigning the Crypto Map set to an interface instructs the security
appliance to evaluate all the traffic against the Crypto Map set and use the specified policy during
connection or SA negotiation. Assigning a Crypto Map to an interface also initializes run-time data
structures (such as the SA database and the security policy database). Reassigning a modified Crypto
Map to the interface resynchronizes the run-time data structures with the Crypto Map configuration.
With the switch, a Crypto Map cannot get applied to more than one interface at a time.
• Monitor and maintain IPSec tunnels
New configuration changes only take effect when negotiating subsequent security associations. If you
want the new settings to take immediate effect, clear the existing security associations so they will be
re-established with the changed configuration.
For manually established security associations, clear and reinitialize the security associations or the
changes will not take effect.
For more information on configuring IPSec VPN, refer to the following:
• Defining the IPSec Configuration
• Defining the IPSec VPN Remote Configuration
• Configuring IPSEC VPN Authentication
• Configuring Crypto Maps
• Viewing IPSec Security Associations
6-48 WS5100 Series Switch System Reference Guide
SA Lifetime (secs) For IKE based security associations, define a SA Lifetime (in seconds) forcing the
periodic expiration and re-negotiation of peer credentials. Thus, continually
validating the peer relationship. The default value is 3600 seconds.
SA Lifetime (Kb) Causes the security association to time out after the specified amount of traffic (in
kilobytes) have passed through the IPSec tunnel using the security association.
The default value is 4608000 Kb.
Apply Click Apply to save any updates you may have made to the screen.
Revert Click the Revert button to disregard any changes you have made and revert back
to the last saved configuration.
Switch Security 6-49
Name Displays a transform set identifier used to differentiate transform sets. The index
is helpful when transform sets with similar attributes need to be revised or
discarded.
AH Authentication Displays the AH Transform Authentication scheme used with the index. Options
Scheme include:
• None - No AH authentication is used.
• AH-MD5-HMAC - AH with the MD5 (HMAC variant) authentication algorithm.
• AH-SHA-HMAC - AH with the SHA (HMAC variant) authentication algorithm.
ESP Encryption Displays the ESP Encryption Transform used with the index. Options include:
Scheme • None - No ESP encryption is used with the transform set.
• ESP-DES - ESP with the 56-bit DES encryption algorithm.
• ESP-3DES - ESP with 3DES, ESP with AES.
• ESP-AES - ESP with 3DES, ESP with AES (128 bit key).
• ESP-AES 192 - ESP with 3DES, ESP with AES (192 bit key).
• ESP-AES 256 - ESP with 3DES, ESP with AES (256 bit key)
ESP Authentication Displays the ESP Authentication Transform used with the index. Options include:
Scheme • None - No ESP authentication is used with the transform set.
• MD5-HMAC - AH with the MD5 (HMAC variant) authentication algorithm.
• SHA-HMAC - AH with the SHA (HMAC variant) authentication algorithm.
Mode Displays the current mode used with the transform set. The mode is either tunnel
or transport.
5. Select an IPSec VPN transform set (by its index) and click the Edit button to modify its properties. For
more information, see Editing an Existing Transform Set on page 6-49.
6. Select an index and click the Delete button to remove it from the table.
7. If none of the transform sets displayed appear useful, click the Add button to create a new one. For more
information, see Adding a New Transform Set on page 6-51.
4. Revise the following information as required to render the existing transform set useful.
Name The name is read-only and cannot be modified unless a new transform set is
created.
AH Authentication Select the Use AH checkbox (if necessary) to modify the AH Transform
Scheme Authentication scheme. Options include:
• None - No AH authentication is used.
• AH-MD5-HMAC - AH with the MD5 (HMAC variant) authentication algorithm.
• AH-SHA-HMAC - AH with the SHA (HMAC variant) authentication algorithm.
ESP Encryption Select the Use ESP checkbox (if necessary) to modify the ESP Encryption Scheme.
Scheme Options include:
• None - No ESP encryption is used with the transform set.
• ESP-DES - ESP with the 56-bit DES encryption algorithm.
• ESP-3DES - ESP with 3DES, ESP with AES.
• ESP-AES - ESP with 3DES, ESP with AES (128 bit key).
• ESP-AES 192 - ESP with 3DES, ESP with AES (192 bit key).
• ESP-AES 256 - ESP with 3DES, ESP with AES (256 bit key).
ESP Authentication Select the Use ESP checkbox (if necessary) to modify the ESP Authentication
Scheme Scheme. Options include:
• None - No ESP authentication is used with the transform set.
• MD5-HMAC - AH with the MD5 (HMAC variant) authentication algorithm.
• SHA-HMAC - AH with the SHA (HMAC variant) authentication algorithm.
Mode Modify (if necessary) the current mode used with the transform set. The mode is
either Tunnel or Transport.
5. Refer to the Status field for the state of the requests made from applet. This field displays error
messages if something goes wrong in the transaction between the applet and the switch.
Switch Security 6-51
6. Click OK to use the changes to the running configuration and close the dialog.
7. Click Cancel to close the dialog without committing updates to the running configuration.
4. Define the following information as required for the new transform set.
AH Authentication Select the Use AH checkbox to define the AH Transform Authentication scheme.
Scheme Options include:
• None - No AH authentication is used.
• AH-MD5-HMAC - AH with the MD5 (HMAC variant) authentication algorithm.
• AH-SHA-HMAC - AH with the SHA (HMAC variant) authentication algorithm.
6-52 WS5100 Series Switch System Reference Guide
ESP Encryption Select the Use ESP checkbox to define the ESP Encryption Scheme. Options
Scheme include:
• None - No ESP encryption is used with the transform set.
• ESP-DES - ESP with the 56-bit DES encryption algorithm.
• ESP-3DES - ESP with 3DES, ESP with AES.
• ESP-AES - ESP with 3DES, ESP with AES (128 bit key).
• ESP-AES 192 - ESP with 3DES, ESP with AES (192 bit key).
• ESP-AES 256 - ESP with 3DES, ESP with AES (256 bit key).
ESP Authentication Select the Use ESP checkbox to define the ESP Authentication Scheme. Options
Scheme include:
• None - No ESP authentication is used with the transform set.
• MD5-HMAC - AH with the MD5 (HMAC variant) authentication algorithm.
• SHA-HMAC - AH with the SHA (HMAC variant) authentication algorithm.
Mode Define the current mode used with the transform set. The mode is either Tunnel or
Transport.
5. Refer to the Status field for the current state of the requests made from applet. This field displays error
messages if something goes wrong in the transaction between the applet and the switch.
6. Click OK to use the changes to the running configuration and close the dialog.
7. Click Cancel to close the dialog without committing updates to the running configuration.
DNS Server Enter the numerical IP address of the DNS Server used to route information to the
remote destination of the IPSec VPN.
WINS Server Enter the numerical IP address of the WINS Server used to route information to
the remote destination of the IPSec VPN.
Revert Click the Revert button to disregard changes and revert back to the last saved
configuration.
Index Enter the index assigned to the range of IP addresses displayed in the Starting and
Ending IP Address ranges. This index is used to differentiate the index from others
with similar IP addresses.
Starting IP Address Enter the numerical IP address used as the starting address for the range defined.
If the Ending IP address is left blank, only the starting address is used for the
remote destination.
Ending IP Address Enter a numerical IP address to complete the range. If the Ending IP address is
blank, only the starting address is used as the destination address.
5. Click the Edit button (within the IP Range tab) to modify the range of existing IP addresses displayed.
6. Select an IP address range index and click the Delete button to remove this range from those available
within the IP Range tab.
6-54 WS5100 Series Switch System Reference Guide
7. To add a new range of IP addresses, click the Add button (within the IP Range tab) and define the range
in the fields provided. Click OK when completed to save the changes.
8. Click Cancel to disregard the changes and revert to the last saved configuration.
3. Define whether IPSec VPN user authentication is conducted using a Radius Server (by selecting the
Radius radio button), by a user-defined set of names and password (by selecting the User Table radio
Switch Security 6-55
button) or if no authentication is used for credential verification (by selecting the No Authentication
radio button).
4. Enter a NAS ID for the NAS port.
The profile database on the Radius server consists of user profiles for each connected network access
server (NAS) port. Each profile is matched to a username representing a physical port. When the switch
authorizes users, it queries the user profile database using a username representative of the physical
NAS port making the connection.
5. If the Radius Server radio button is selected, the following server information displays within the
Radius tab:
Type Displays whether this target server is a Primary or Secondary Radius Server.
Server IP Address Displays the IP address of the server acting as the data source for the Radius
server.
Port Displays the TCP/IP port number for the server acting as a data source for the
Radius. The default port is 1812.
Shared Secret Displays a shared secret used for each host or subnet authenticating against the
Radius server. The shared secret can be up to 7 characters in length.
6. Select an existing Radius Server and click the Edit button to modify its designation as a primary or
secondary Radius Server, IP address, port, NAS ID and shared secret password.
Motorola recommends only modifying an existing Radius Server when its current configuration is no
longer viable for providing user authentication. Otherwise, define a new Radius Server.
7. Select an existing server and click the Delete button to remove it from list of available Radius Servers.
Only delete a server if its configuration does not provide a valid authentication medium.
8. If you require a new Radius Server be configured, click the Add button.
Set this server’s designation as a primary or secondary Radius Server (using the checkboxes), define the
server IP address, port and shared secret password. Click OK when completed to save the changes.
9. If the User Table checkbox was selected from within the Configuration field, select the User Table tab
to review the User Name and Passwords defined for use.
6-56 WS5100 Series Switch System Reference Guide
10.Click the Add button to display a screen used to add a new User and Password. Enter a User Name and
Password and confirm. Click OK to save the changes.
11.To change an existing user’s password, select the user from within the User Table and click the Change
Password button. Change and confirm the updated password.
12.If necessary, select an existing user and click the Delete button to remove that user from the list
available within the User Table.
The Crypto Maps screen is divided into 5 tabs, each serving a unique function in the overall Crypto Map
configuration. Refer to the following:
• Crypto Map Entries
• Crypto Map Peers
• Crypto Map Manual SAs
• Crypto Map Transform Sets
• Crypto Map Interfaces
Priority / Seq Displays the numerical priority assigned to each Crypto Map.
Name Displays the user-assigned name for this specific Crypto Map. This name can be
modified using the Edit function or a new Crypto Map can be created by clicking
the Add button.
Mode Config Displays a green checkmark for the Crypto Map used with the current interface. A
“X” is displayed next to other Crypto Maps not currently being used.
Number of Peers Displays the number of peers used by each Crypto Map displayed.
6-58 WS5100 Series Switch System Reference Guide
SA Lifetime (secs) Displays a SA Lifetime (in seconds) that forces the periodical expiration and re-
negotiation of peer credentials. Thus, continually validating the peer relationship.
SA Lifetime (Kb) Causes the security association to time out after the specified amount of traffic (in
kilobytes) has passed through the IPSec tunnel (using the security association).
ACL ID Displays the name of the ACL ID used for each Crypto Map.
Number of Interfaces Displays the number of interfaces each specific Crypto Map is used with.
4. Select an existing Crypto Map and click the Edit button to modify the Crypto Map’s attributes.
If an entire Crypto Map requires revision, consider deleting the Crypto Map and creating a new one using
the Add function.
Refer to the definitions supplied for the Add Crypto Map screen (on the next page) to ascertain the
requirements for editing a Crypto Map.
5. Select an existing Crypto Map and click the Delete button to remove it from the list of available.
6. Click the Add button to define the attributes of a new Crypto Map.
a. Assign a Seq # (sequence number) to distinguish one Crypto Map from the another.
b. Assign the Crypto Map a Name to differentiate from others with similar configurations.
c. Use the None, Domain Name or Host Name radio buttons to select and enter the fully qualified
domain name (FQDN) or host name of the host exchanging identity information.
d. Define a SA Lifetime (secs) to define an interval (in seconds) that (when expired) forces a new
association negotiation.
Switch Security 6-59
e. Define a SA Lifetime (Kb) to time out the security association after the specified traffic (in kilobytes)
has passed through the IPSec tunnel using the security association.
f. Use the ACL ID drop-down menu to permit a Crypto Map data flow using the permissions within the
selected ACL.
g. Use the PFS drop-down menu to specify a group to require perfect forward secrecy (PFS) in requests
received from the peer.
h. Use the Remote Type drop-down menu to specify a remote type (either XAuth or L2TP).
i. Use the Mode drop-down menu to specify a mode of Main or Aggressive. Aggressive mode
enables you to configure pre-shared keys as Radius tunnel attributes for IP Security (IPSec) peers.
j. Optionally select the SA Per Host checkbox to specify that separate IPSec SAs should be requested
for each source/destination host pair.
k. Optionally select the Mode Config checkbox to allow the new Crypto Map to be implemented using
the aggressive mode (if selected from the Mode drop-down menu).
l. Refer to the Peers (add choices) field and use the Add and Delete functions as necessary to add
or remove existing peers. For information on adding or modifying peers, see
Crypto Map Peers on page 6-59.
m. Refer to the Transform Sets (select one) field to select and assign a transform set for v with
Crypto Map. Again, a transform set represents a combination of security protocols and algorithms.
During the IPSec security association negotiation, peers agree to use a particular transform set for
protecting data flow.
7. Click OK to save the new Crypto Map and display it within the Crypto Map tab.
3. Refer to the read-only information displayed within the Peers tab to determine whether a peer
configuration (among those listed) requires modification or a new peer requires creation.
Priority / Seq # Displays each peer’s Seq # (sequence number) to distinguish one from the other.
Crypto Map Name Displays the name assigned to the peer to differentiate it from others with similar
configurations.
IKE Peer Displays the IKE peer used with the Crypto Map to build an IPSec security
association.
4. If a Crypto Map Seq # or IKE peer requires revision, select it from amongst those displayed and click the
Edit button.
5. Select an existing Crypto Map and click the Delete button to remove it from the list of those available to
the switch.
6. If a new peer requires creation, click the Add button.
Switch Security 6-61
3. Refer to the read-only information displayed within the Manual SAs tab to determine whether a Crypto
Map (with a manually defined security association) requires modification or if a new one requires
creation.
Priority / Seq # Displays the Seq # (sequence number) used to determine priority. the lower the
number the higher the priority.
IKE Peer Displays the IKE peer used with the Crypto Map to build an IPSec security
association.
ACL ID Displays the ACL ID the Crypto Map’s data flow uses to establish access
permissions.
Transform Set Displays the transform set representing a combination of security protocols and
algorithms. During the security association negotiation, peers agree to use a
particular transform set for protecting the data flow.
4. If a Crypto Map with a manual security association requires revision, select it from amongst those
displayed and click the Edit button to revise its Seq #, IKE Peer, ACL ID and security protocol.
6-62 WS5100 Series Switch System Reference Guide
5. Select an existing table entry and click the Delete button to remove it from the list of those available to
the switch.
6. If a new Crypto Map manual security association requires creation, click the Add button.
a. Define the Seq #. The sequence number determines priority among Crypto Maps. The lower the
number, the higher the priority.
b. Provide a unique Name for this Crypto Map to differentiate it from others with similar
configurations.
c. Enter the name of the IKE Peer used to build an IPSec security association.
d. Use the ACL ID drop-down menu to permit a Crypto Map data flow using the unique permissions
within the selected ACL.
e. Select either the AH or ESP radio button to define whether the Crypto Map’s manual security
association is an AH Transform Authentication scheme or an ESP Encryption Transform scheme. The
AH SPI or ESP SPI fields become enabled depending on the radio button selected.
f. Define the In AH SPI and Auth Keys or In Esp and Cipher Keys depending on which option has
been selected.
g. Use the Transform Set drop-down menu to select the transform set representing a combination of
security protocols and algorithms. During the IPSec security association negotiation, peers agree to
use the transform set for protecting the data flow. A new manual security association cannot be
generated without the selection of a transform set. A default transform set is available (if none are
defined).
7. Click OK when completed to save the configuration of the Crypto Map security association.
Switch Security 6-63
3. Refer to the read-only information displayed within the Transform Sets tab to determine whether a
Crypto Map transform set requires modification or a new one requires creation.
Priority / Seq # Displays the Seq # (sequence number) used to determine priority.
Name Displays the name assigned to the Crypto Map that’s using the transform set.
Transform Set Displays the transform set representing a combination of security protocols and
algorithms. During the IPSec security association negotiation, peers agree to use
the transform set for protecting the data flow.
4. Select an existing Crypto Map and click the Edit button to revise its Seq #, Name and Transform Set.
5. Select an existing entry from the table and click the Delete button to remove it from the list.
6-64 WS5100 Series Switch System Reference Guide
6. If a new Crypto Map transform set requires creation, click the Add button.
3. Refer to the following read-only information displayed within the Interfaces tab.
Name Lists the name of the Crypto Maps available for the interface.
Interface Name Displays the name of the interface through which IPSec traffic flows. Applying the
Crypto Map set to an interface instructs the switch to evaluate all the interface's
traffic against the Crypto Map set and to use the specified policy during
connection or security association negotiation on behalf of traffic protected by
crypto (either CET or IPSec).
4. Click the Assign Interface button to assign a Crypto Map to each interface through which IPSec traffic
flows.
Assigning the Crypto Map set to an interface instructs the security appliance to evaluate all the traffic
against the Crypto Map set and use the specified policy during connection or SA negotiation. Assigning
a Crypto Map to an interface also initializes run-time data structures (such as the SA database and the
security policy database). Reassigning a modified Crypto Map to the interface resynchronizes the run-
time data structures with the Crypto Map configuration. Also, adding new peers through the new
sequence numbers and reassigning the Crypto Map does not break existing connections.
Index Displays the numerical (if defined) ID for the security association. Use the index to
differentiate the index from others with similar configurations.
Local Peer Displays the name of the local peer at the near side of the VPN connection.
Remote Peer Displays the name of the remote peer at the far side of the VPN connection.
ESP SPI In SPI specified in the Encapsulating Security Payload (ESP) inbound header.
ESP SPI Out SPI specified in the Encapsulating Security Payload (ESP) outbound header.
Cipher Algorithm Displays the algorithm used with the ESP cipher.
MAC Algorithm Displays the algorithm used with the security association.
4. Use the page navigation facility (found on top of the table next to the Show Filtering Options link) to
view the list of security associations.
The switch can display a maximum of 600 security associations. To enable a search through the list, the
Security > IPSec VPN screen provides a page navigation facility. Up to 30 security associations display
per page.
The following navigation and pagination options are available:
View All Displays all SAs in one screen.
View By Page Use this option to split the list into pages and view them one page at a time.
The following controls are enabled when the View By Page option is selected.
Page Use this text box to enter the page number to jump directly to. This value cannot
exceed the total number of pages.
Go Use the Go button to jump to the page specified in the Page text box.
5. If necessary, select a security association from those displayed and click the Stop Connection button
to stop the security association.
Switch Security 6-67
NOTE: For hotspot deployment, Motorola recommends using the switch’s onboard Radius
server and built-in user database. This is the easiest setup option and offers a high
degree of security and accountability.
The Radius server defines authentication and authorization schemes for granting the access to wireless
clients. Radius is also used for authenticating hotspot and remote VPN Xauth. The switch can be configured
to use 802.1x EAP for authenticating wireless clients with a Radius server. The following EAP authentication
types are supported by the switch’s onboard Radius server:
• TLS
• TLS and MD5
• TTLS and PAP
• TTLS and MSCHAPv2
• PEAP and GTC
• PEAP and MSCHAPv2
6-68 WS5100 Series Switch System Reference Guide
Apart from EAP authentication, the switch allows the enforcement of user-based policies. User-based
policies include dynamic VLAN assignment and access based on time of day.
The switch uses a default trustpoint. A certificate is required for EAP TTLS,PEAP and TLS Radius
authentication (configured with the Radius service).
Dynamic VLAN assignment is achieved based on the Radius server response. A user who associates to
WLAN1 (mapped to VLAN1) can be assigned a different VLAN after authentication with the Radius server.
This dynamic VLAN assignment overrides the WLAN's VLAN ID to which the User associates.
NOTE: For a Radius supported VLAN to function properly, the "Dynamic Assignment"
checkbox must be enabled for the WLAN supporting the VLAN. For more information, see
Editing the WLAN Configuration on page 4-24.
For 802.1x EAP authentication, the switch initiates the authentication process by sending an EAPoL message
to the access port only after the wireless client joins the wireless network. The Radius client in the switch
processes the EAP messages it receives. It encapsulates them to Radius access requests and sends them to
the configured Radius server (in this case the switch’s local Radius server).
The Radius server validates the user’s credentials and challenge information received in the Radius access
request frames. If the user is authorized and authenticated, the client is granted access by sending a Radius
access accept frame. The frame is transmitted to the client in an EAPoL frame format.
6.9.1.5 LDAP
An external data source based on LDAP can be used to authorize users. The Radius server looks for user
credentials in the configured external LDAP server and authorizes users. The switch supports two LDAP
server configurations.
6.9.1.6 Accounting
Accounting should be initiated by the Radius client. Once the Local/Onboard Radius server is started, it
listens for both authentication and accounting records.
3. Click the Start the RADIUS server link to use the switch’s own Radius server to authenticate users
accessing the switch managed network. Again, this is recommended as the secondary means of
authenticating users.
4. Set a Timeout interval (between 5 and 10 seconds) to define how long the switch waits for a reply to a
Radius request before retransmitting the request. The default value is 5.
Ensure the value is set long enough to compensate for the heaviest periods of data traffic within the
switch managed network.
5. Set a Retires value (between 3and 6) to define the number of times the switch transmits each Radius
request to the server before giving up. The default value is 3.
6. Click the Apply button to save the changes made to within the Global Settings field.
7. Click the Revert button to cancel any changes made within the Global Settings field and revert back to
the last saved configuration.
NOTE: The appearance of the bottom portion of the Configuration tab differs depending
on whether Clients or Proxy Servers is selected. Select the Clients tab to display the
IP Address and Subnet Mask of existing Radius clients. Existing clients can be modified or
new clients added. For more information, see Radius Client Configuration on page 6-71.
Select the Proxy Servers tab to display the ID suffix, IP address and Port Number of
existing Radius proxy servers. Existing servers can be modified or new proxy servers
added. For more information, see Radius Proxy Server Configuration on page 6-71.
Switch Security 6-71
a. Specify the IP Address/Mask of the subnet or host authenticating with the Radius client.
b. Specify a Radius Shared Secret for authenticating the RADIUS client.
Shared secrets used to verify Radius messages (with the exception of the Access-Request message)
are sent by a Radius -enabled device configured with the same shared secret. The shared secret is
a case-sensitive string that can include letters, numbers, or symbols. Make the shared secret at least
31 characters to protect the Radius server from brute-force attacks.
c. Refer to the Status field for the current state of the requests made from applet. This field displays
error messages if something is wrong in the transaction between the applet and the switch.
d. Click OK to use the changes to the running configuration and close the dialog.
e. Click Cancel to close the dialog without committing updates to the running configuration
a. Create a new User ID Suffix as an abbreviation to differentiate the configuration from others with
similar attributes.
b. Specify the IP Address of the new Radius proxy server.
c. Enter the TCP/IP port number used by the proxy Radius server.
d. Specify a Radius Shared Secret for authenticating the Radius client.
The shared secret is used to verify Radius messages. It is a case-sensitive string that can include
letters, numbers, or symbols. Make the shared secret at least 31 characters long to protect the
Radius server from brute-force attacks.
e. Shared secrets verify Radius messages (with the exception of the Access-Request message) are sent
by a Radius-enabled device configured with the same shared secret.
The shared secret is a case-sensitive string that can include letters, numbers, or symbols. Make the
shared secret at least 22 characters long to protect the Radius server from brute-force attacks. The
max length of the shared secret is 31 characters.
f. Refer to the Status field for the current state of the requests made from applet. This field displays
error messages if something goes wrong in the transaction between the applet and the switch.
g. Click OK to use the changes to the running configuration and close the dialog.
h. Click Cancel to close the dialog without committing updates to the running configuration
3. Refer to the Authentication field to define the following Radius authentication information:
EAP and Auth Type Specify the EAP type for the Radius server.
• PEAP uses a TLS layer on top of EAP as a carrier for other EAP modules. PEAP
is an ideal choice for networks using legacy EAP authentication methods.
• TTLS is similar to EAP-TLS, but the client authentication portion of the protocol
is not performed until after a secure transport tunnel has been established. This
allows EAP-TTLS to protect legacy authentication methods used by some
Radius servers.
Auth Data Source Use Auth Data Source drop-down menu to select the data source for the local
Radius server.
• If Local is selected, the switch’s internal user database serves as the data
source for user authentication. Refer to the Users and Groups tabs to define
user and group permissions for the switch’s local Radius server.
• If LDAP is selected, the switch uses the data within an LDAP server.
6-74 WS5100 Series Switch System Reference Guide
Cert Trustpoint Click the View/Change button to specify the trustpoint from which the Radius
server automatically grants certificate enrollment requests. A trustpoint is a
representation of a CA or identity pair. A trustpoint contains the identity of the CA,
CA-specific configuration parameters, and an association with one enrolled
identity certificate. If the server certificate trustpoint is not used, the default
trustpoint is used instead.
CA Cert Trustpoint Click the View/Change button to specify the CA certificate trustpoint from which
the Radius server automatically grants certificate enrollment requests. A
trustpoint is a representation of a CA or identity pair. A trustpoint contains the
identity of the CA, CA-specific configuration parameters, and an association with
one enrolled identity certificate.
If a CA trustpoint is not specified, the "default trustpoint's CA certificate is used
as a CA certificate. If the "Default trustpoint" does not have a CA certificate, the
server certificate is used as the CA certificate.
NOTE: EAP-TLS will not work with a default trustpoint. Proper CA and Server trustpoints
must be configured for EAP-TLS. For information on configuring certificates for the switch,
see Creating Server Certificates on page 6-81.
4. Refer to the LDAP Server Details field to define the primary and secondary Radius LDAP server
configuration providing access to an external database used with the local Radius server.
IP Address Enter the IP address of the external LDAP server acting as the data source for the
Radius server. This server must be accessible from an active switch subnet .
Port Enter the TCP/IP port number for the LDAP server acting as the data source.
Password Attribute Enter the password attribute used by the LDAP server for authentication.
Bind DN Specify the distinguished name to bind with the LDAP server.
Base DN Specify a distinguished name that establishes the base object for the search. The
base object is the point in the LDAP tree at which to start searching.
User Login Filter Enter the login used by the LDAP server for authentication.
Group Filter Specify the group filters used by the LDAP server.
Group Membership Specify the Group Member Attribute sent to the LDAP server when authenticating
Attribute users.
Group Attribute Specify the group attribute used by the LDAP server.
Net Timeout Enter a timeout value (between 1-10 seconds) the system uses to terminate the
connection to the Radius Server if no activity is detected.
5. Click the Apply button to save the changes made to within the screen.
6. Click the Revert button to cancel any changes made within the screen and revert back to the last saved
configuration.
Switch Security 6-75
3. Refer to the following to assess whether an existing user can be used with the local Radius server as is,
requires modification or if a new user is required.
User ID Displays the username for this specific user. The name assigned should reflect the
user’s identity and perhaps their status within the switch managed network (guest
versus secure user).
Guest User Displays whether a specific user has been defined as a guest user (with a green
check) or has been configured as permanent user. Guest users have temporary
access.
Start Date Defines the time when Guest User’s privileges commence.
Expiry Date If the user has been assigned guest privileges, they were also assigned a date
when their Radius privileges expire.
4. Refer to the Available Groups field to view the memberships for existing users.
If the group assignment is insufficient, use the Edit or Add functions to modify/create users or modify
their existing group assignments. For guest users, only the password is editable. For normal (non-guest)
users, the password and group association can be modified.
To modify the attributes of an existing user, select the user from the list and click the Edit button.
6-76 WS5100 Series Switch System Reference Guide
Modify the existing user’s guest designation, password, expiry date and group assignments as required
to reflect the user’s current local Radius authentication requirements.
5. If an existing user is no longer needed, select the user from those displayed and click the Delete button
to permanently remove the user.
6. To create a new user for use with the local Radius server, click the Add button and provide the following
information.
CAUTION: If password encryption is not enabled, Radius user passwords are stored in
! the running configuration file in clear text. The user passwords are shown as encrypted if
the global password encryption is enabled. The maximum for the file is 5000 users, 100
groups, 25 clients, 5 realms and 2 LDAP servers.
User ID Define a unique user ID that differentiates this user from others with similar
attributes.
Guest User Select the Guest User checkbox to assign this particular user temporary access
to the local Radius server, thus restricting their authentication period to a user
defined interval.
Password Enter the password that adds the user to the list of approved users displayed
within the Users tab.
Confirm Password Re-enter (confirm) the password used to add the user to the list of approved users
displayed within the Users tab.
Current Switch Time Displays the read only switch time. This is the time used for expiry data and
time.sers tab.
Start Date & Time Defines the start date and time (in dd:MM:yyyy-hh:mm format) to login guest
users defined with temporary permissions.
Expiry Date & Time Defines the date and time (in dd:MM:yyyy-hh:mm format) to timeout guest users
defined with temporary permissions.
Available Groups Use the Available Groups Add -> and Remove <- functions to map groups (for
inclusion) for this specific user.
a. Refer to the Status field for the current state of the requests made from applet. This field displays
error messages if something goes wrong in the transaction between the applet and the switch.
b. Click OK to use the changes to the running configuration and close the dialog.
c. Click Cancel to close the dialog without committing updates to the running configuration
3. Refer to the user groups listed to review the following read-only attributes for each group:
Name Displays the unique name assigned to each group. The group name should be
indicative of the user population within and their shared activity within the switch
managed network.
Guest Group Displays whether a specific group has been defined as a guest group (indicated
with a green check mark) or has been configured as permanent group (indicated
with a red X). Guest users have temporary Radius server access.
VLAN ID Display the VLAN ID(s) used by each group. The VLAN ID is representative of the
shared SSID each group member (user) employs to interoperate with one another
within the switch managed network (once authenticated by the local Radius
server).
Time of Access Start Displays the time each group is authenticated to interoperate within the switch
managed network. Each user within the group is authenticated with the local
Radius server. Group members successfully authenticated are allowed access to
the switch managed network under the restrictions defined for that group.
Time of Access End Displays the time each group’s user base will loose access privileges. After this
time, users within this group will not be authenticated by the local Radius server.
However, if a user is part of a different group that has not exceeded their access
interval, then the user may still interoperate with the switch (remain
authenticated) as part of that group.
4. Refer to the WLANs Assigned area of the Groups tab to review which switch WLANs are available for
use with configured groups.
5. Refer to the Time of access in days field to assess the intervals (which days) the group has been
assigned access to the switch managed network (after each user has been authenticated). At least one
day is required.
Switch Security 6-79
This value is read-only within the Groups tab. Click Edit to modify the access assignments of an existing
group or click Add to create a new group with unique access assignments.
6. To modify the attributes of an existing group, select the group from the list of groups displayed and click
the Edit button.
Modify the existing group’s guest designation, VLAN ID, access period and WLAN assignment.
7. If an existing group is no longer needed (perhaps obsolete in function), select the group and click the
Delete button to permanently remove the group from the list. The group can only be removed if all the
users in the group are removed first.
8. To create a new group, click the Add button and provide the following information.
Name Define a unique group name that differentiates this new group from others with
similar attributes.
Guest Group Select the Guest Group checkbox to assign this particular group (and the users
within) only temporary access to the local Radius server, thus restricting their
authentication period to a user defined access interval.
VLAN ID Define the VLAN ID for the new group. The VLAN ID is representative of the shared
SSID each group member (user) employs to interoperate within the switch
managed network (once authenticated by the local Radius server).
Time of Access Start Set the time the group is authenticated to interoperate. Each user within the group
is authenticated with the local Radius server. Those group members successfully
authenticated are allowed access to the switch using the restrictions defined for
the group.
Time of Access End Set the time each group’s user base will loose access privileges within the switch
managed network. After this time, users within this group will not be
authenticated by the local Radius server. However, if a user is part of a different
group that has not exceeded their access end interval, the user may still
interoperate with the switch (remain authenticated) as part of that group.
Available WLANs Use the Available WLANs Add -> and Remove <- functions to move WLANs for
this new group from the available list to the configured list. Once on the
configured list (and the changes applied), the members of this group can
interoperate with the switch on these WLANs (once authenticated by the local
Radius server).
Configured WLANs The Configured WLANs columns displays the WLANs this new group can operate
within (once users are configured). Use the Add -> and Remove <- functions to
move WLANs from the available list to the configured list.
Time of access in Select the checkboxes corresponding to the days of the week you would like this
days new group to have access to the switch managed network. Of course, the user
base within the group still needs to be authenticated by the local Radius server
first.
9. Refer to the Status field for the current state of the requests made from applet. This field displays error
messages if something goes wrong in the transaction between the applet and the switch.
10.Click OK to use the changes to the running configuration and close the dialog.
11.Click Cancel to close the dialog without committing updates to the running configuration.
6-80 WS5100 Series Switch System Reference Guide
3. Refer to the following information as displayed within the Accounting Logs tab.
Filename Displays the name of each accounting log file. Use this information to differentiate
files with similar attributes.
NOTE: An explicit purge operation is not supported, the accounting logs are purged
automatically once they reach their limit.
Switch Security 6-81
A panel (on the far left of the screen) displays currently enrolled trustpoints.
The Server Certificate and CA Root Certificate tabs display read-only credentials for the certificates in
use by the switch. A table displays the following Issued To and Issued By details for each:
Issued To
Country (C) Displays the country of usage for which the certificate was assigned.
State (ST) Displays the state (if within the US) or province within the country listed above
wherein the certificate was issued.
City (L) Lists the city wherein the server certificate request was made. The city should
obviously be within the State/Prov stated.
Organization (O) Displays the name of the organization making the certificate request.
Org. Unit (OU) Displays the name of the organizational unit making the certificate request.
Common Name (CN) If there is a common name (IP address) for the organizational unit making the
certificate request, it displays here.
Issued By
State (ST) Displays the state or province for the country the certificate was issued.
City (L) Displays the city representing the state/province and country from which the
certificate was issued.
Organizational Unit If a unit exists within the organization that is representative of the certificate
issuer, that name should be displayed here.
Common Name If there is a common name (IP address) for the organizational unit issuing the
certificate, it displays here.
Validity
3. Click the Certificate Wizard button to create a self signed certificate, upload an external server
certificate (and/or a root certificate) or delete a server certificate (and/or a root certificate) of a trustpoint.
For more information, see Using the Wizard to Create a New Certificate on page 6-83.
1. Select the Create new self-signed certificate /certificate request radio button in the wizard and
click the Next button.
The second page of the wizard contains three editable fields, SelectCertificate Operation, Select a
Trustpoint, and Specify a key for you new certificate.
2. Use the second page to create either a self signed certificate or prepare a certificate request. For
certificate creation, select one of the following options:
• Generate a self signed certificate — Configure the properties of a new self-signed certificate. Once
the values of the certificate are defined, the user can create and install the certificate.
• Prepare a certificate request to send to a Certificate Authority — Configure and save a valid
certificate request. Once the values of the certificate are defined, the user can configure and enroll
the trustpoint.
Switch Security 6-85
If generating a new self-signed certificate (as selected in page 2 of the wizard), the wizard continues the
installation. Use the third page of the wizard to enter a unique trustpoint name and other credentials
required to create the new certificate.
3. Select the Configure the trustpoint checkbox to enable the new self signed certificate configured as a
trustpoint.
4. Select the Automatically generate certificate with default values checkbox to create a certificate
using values the switch assigns by default.
This option is recommended for generic certificates that do not represent a unique or custom switch
configuration.
5. Select the Enter certificate credentials radio button to manually enter the values of a unique
certificate. If you anticipate using generic (default) values, consider using the Automatically generate
certificate with default values option.
6. Provide the following information for the certificate:
Country Define the Country used in the Self-Signed Certificate. By default, the Country is
US. The field can be modified by the user to other values. This is a required field
and must not exceed 2 characters.
State Enter a State/Prov. for the state or province name used in the Self-Signed
Certificate. By default, the State/Prov. field is CA. This is a required field.
City Enter a City to represent the city name used in the Self-Signed Certificate. By
default, the City name is San Jose. This is a required field.
Organization Define an Organization for the organization used in the Self-Signed Certificate. By
default, it is Motorola, Inc. The user is allowed to modify the Organization name.
This is a required field.
Organization Unit Enter an Org. Unit for the name of the organization unit used in the Self-Signed
Certificate. By default, it is Wireless Switch Division. This is a required field.
Switch Security 6-87
Email Address Provide an email address used as the contact address for issues relating to this
certificate request.
FQDN Enter a fully qualified domain name (FQDN) is an unambiguous domain name that
specifies the node's position in the DNS tree hierarchy absolutely. To distinguish
an FQDN from a regular domain name, a trailing period is added. ex:
somehost.example.com. An FQDN differs from a regular domain name by its
absoluteness; as a suffix is not added.
IP Address Specify the switch IP address used as the switch destination for certificate
requests.
7. Select the Enroll the trustpoint checkbox to enroll the certificate request with the CA.
8. Click Next to proceed with the certificate creation.
If you selected to prepare a certificate request in the page 2, the wizard continues, prompting the user
for the required information to complete the certificate request. Click Next to continue.
9. Use the Enter trustpoint name parameter to assign a name to the trustpoint.
10.Provide Certificate Credential information for the following:
Country Define the Country used in the Self-Signed Certificate. By default, the Country is
US. The field can be modified by the user. This is a required field and must not
exceed a 2 character country code.
State Enter a State/Prov. for the state or province name used in the Self-Signed
Certificate. By default, the State/Prov. field is Province. This is a required field.
City Enter a City to represent the city name used in the Self-Signed Certificate. By
default, the City name is City. This is a required field.
Organization Define an Organization for the organization used in the Self-Signed Certificate. By
default, it is Company Name. The user is allowed to modify the Organization
name. This is a required field.
Organization Unit Enter an Org. Unit for the name of the organization unit used in the Self-Signed
Certificate. By default, it is Department Name. This is a required field.
Common Name Define a Common Name for the switch URL. This is a required value. The Common
Name must match the URL used in your browser when invoking the switch applet.
FQDN Enter a fully qualified domain name (FQDN) as an unambiguous domain name that
specifies the node's position in the DNS tree hierarchy absolutely. To distinguish
an FQDN from a regular domain name, a trailing period is added
(somehost.example.com). An FQDN differs from a regular domain name by its
absoluteness; as a suffix is not added
IP Address Specify the switch IP address used as the switch destination for certificate
requests.
Key Name Displays the name of the key pair generated separately, or automatically when
selecting a certificate. Specify the option within the wizard.
Key Sizes Displays the size of the desired key. If not specified, a default key size of 1024 is
used.
3. Highlight a Key from the table and click the Delete button to delete it from the switch.
4. Click on Add button to add a new key label to the list of keys available to the switch. For more
information, see Adding a New Key on page 6-89.
5. Select the Delete All Keys options to delete all of the keys displayed.
6. Click on Transfer Keys to archive the keys to a user-specified location. For more information, see
Transferring Keys on page 6-90.
4. Enter a Key Label in the space provided to specify a name for the new key pair.
5. Define the Key Size between 1024 and 2048 bytes.
6. Refer to the Status field for the current state of the requests made from applet. This field displays error
messages if something goes wrong in the transaction between the applet and the switch.
7. Click OK to save the changes to the running configuration and close the dialog.
8. Click Cancel to close the dialog without committing updates to the running configuration.
1. Select Security > Server Certificate from the main menu tree.
2. Click the Keys Tab.
3. Highlight a target file, and select the Transfer Keys button.
4. Use the From drop-down menu to specify the location from which the log file is sent. If only the applet
is available as a transfer location, use the default switch option.
5. Select a target file for the file transfer from the File drop-down menu.
The drop-down menu contains the log files listed within the Server Certificate screen.
6. Use the To drop-down menu to define whether the target log file is to be sent to the system's local disk
(Local Disk) or to an external server (Server).
7. Provide the name of the file to be transferred to the location specified within the Target field.
Switch Security 6-91
8. Use the Using drop down-menu to configure whether the log file transfer is sent using FTP or TFTP.
9. Enter the IP Address of destination server or system receiving the target log file.
10.Enter the User ID credentials required to send the file to the target location.
Use the user ID for FTP transfers only.
11.Enter the Password required to send the file to the target location using FTP.
12.Specify the appropriate Path name to the target directory on the local system disk or server as
configured using the "To" parameter.
If the local server option is selected, use the browse button to specify the location on the local server.
13.Refer to the Status field for the current state of the requests made from applet. This field displays error
messages if something goes wrong in the transaction between the applet and the switch.
14.Click the Transfer button when ready to move the target file to the specified location.
Repeat the process as necessary to move each desired log file to the specified location.
15.Click the Abort button to terminate the transfer before completion. The abort option is helpful if
certificate credentials prove problematic in the transfer process.
16.Click the Close button to exit the screen after a transfer. There are no changes to save or apply.
Use the Enhanced Beacons/Probe screen to configure enhanced beacons/probes and their output reports.
The Enhanced Probes and Beacons screens displays four tabs supporting the following configuration
activities:
• Configuring the Beacon Table
• Configuring the Probe Table
• Reviewing Found Beacons
• Reviewing Found Probes
The switch is provided with a set of 802.11a and 802.11bg radio specific channels. The switch radio scans
scan each channel to detect the potential existence or rogues operating on the configured channel. On
completion of a scan, the switch moves the AP back to its original channel.
If, during the scan, an AP is detected on a different channel (due to a leaked signal), this channel is also
added to the channel set. The AP sends this information to the switch, which maintains a table with the
following information:
• MAC address of the detected rogue AP
• AP MAC address
• Signal strength of the detected rogue AP
• Channel on which the AP was detected
• Time when the AP was detected.
This information is used by the Motorola RF Management application (or Motorola RFMS) to locate the rogue
AP. Motorola RFMS uses this information to physically locate the position of rogues and authorized devices
within a site map representative of the physical dimensions of the actual device deployment area.
To configure enhanced beacons:
1. Select Security > Enhanced Probe/Beacon Table from the main menu tree.
2. Select the Beacon Table tab.
3. Select the Enable Enhanced Beacon Table checkbox to allow the AP to receive beacons and
association information.
4. Use Scan Interval value to enter the interval used by the radio between scans. The radio scans each
channel for the defined interval. The default value is 10 seconds.
5. Use the Scan Time value to enter the duration of the scan. The radio scans each channel for the defined
interval. The default value is 100 milliseconds.
Switch Security 6-93
6. Define a Max Number of APs value to set the number of detected APs displayed in the Beacon Found
table. The available range is from 0 to 512.
7. Refer to 802.11a Channel Set field to select channels for the 802.11a transmission band. The channel
information is provided to the switch, which then makes an 802.11a radio scan for the configured
channels.
Allowed Displays the channels available to the AP. The channel list is country specific and
differs from country to country.
Add -> Select a channel frequency and click the Add -> button to include the channel to
the Configured list box. You can select multiple channels and add them to the
Configured list box. Press the Ctrl button and use the mouse to select multiple
channels. The switch uses an 802.11a radio to scan the selected channels to
detect any rogue AP’s.
<- Remove Select the channel’s frequency from the Configured list box and click <- Remove
to remove a channel from the list of channels provided to the switch.
Configured Displays the channels provided to the switch. The switch makes all the 802.11a
radios move to the selected channel and scan (one at a time), for a configurable
interval.
Enable all Select the Enable all button (within the 802.11a Radios field) to enable all
802.11a radios from receive beacons.
Disable all Select the Disable all button (within the 802.11a Radios field) to disable all
802.11a radios from receiving beacons.
8. Refer to 802.11bg Channel Set field to select channels for the 802.11bg transmission band. The channel
information is provided to the switch, which conducts an 802.11bg scan for each channel.
Allowed Displays all the channels available to the AP. The channel list is country specific
and differs from country to country.
Add -> Select a channel frequency and click the Add -> button to include the channel to
the Configured list box. Select multiple channels and add them to the
Configured list box. Press the Ctrl button and use the mouse to select multiple
channels. The switch uses an 802.11a radio to scan the selected channels to
detect any non-adopted or rogue AP’s.
<- Remove Select the channel’s frequency from the Configured list box and click <- Remove
to remove a channel from the list of channels provided to the switch.
Configured Displays the channels provided to the switch. The switch makes all the 802.11bg
radios move to a channel from this channel-set and scan these channels, one at a
time, for a configurable duration.
Enable all Select the Enable button (within the 802.11bg Radios field) to enable all the
802.11bg radios receive enhanced beacons.
Disable all Select the Disable button (within the 802.11bg Radios field) to disable all the
802.11bg radios from receiving enhanced beacons.
9. Click Apply to save changes to the screen. Navigating away from the screen without clicking the Apply
button results in changes being discarded.
10.Click the Revert button to undo the changes to the screen and revert to the last saved configuration.
6-94 WS5100 Series Switch System Reference Guide
3. Select the Enable Enhanced Probe Table checkbox to allow an AP to forward MU probe requests to the
switch.
4. Define a Window Time (from 10 to 60 seconds) to set an interval used by the AP to record MU probe requests.
The MU radio probe entry with the highest signal strength during the window period is recorded in the table.
5. Set a Maximum Numbers of MU’s (from 0 to 512) to define the number of MUs configured in the switch
table. The default is 50 MUs.
6. The Preferred MUs table lists the MAC Addresses for all preferred MUs.
7. Select a MU from the Preferred MUs table and click the Delete button to remove the MU from the table.
8. Click the Add button to open a dialogue and add the MAC Address of a preferred MU to the table.
9. 802.11a Radios: Click the Enable All button to allow an AP’s 802.11a radio to receive MU probe requests
and forward them to the switch.
10. 802.11a Radios: Click the Disable button to stop AP’s 802.11a radios from forwarding MU probe requests to
the switch.
Switch Security 6-95
11. 802.11bg Radios: Click the Enable button to allow the AP’s 802.11bg radios to receive MU probe requests
and forward them to the switch.
12. 802.11bg Radios: Click the Disable button to stop AP’s 802.11bg radios from forwarding MU probe requests
to the switch.
13. Click Apply to save any changes. Navigating away from the screen without clicking the Apply button results
in all the changes on the screen being discarded.
14. Click the Revert button to undo the changes to the screen and revert to the last saved configuration.
3. Refer to the following information as displayed within the Beacons Found tab.
Portal MAC Displays the MAC address of the unadopted AP detected by the enhanced beacon
supported AP.
Rogue AP MAC Displays the MAC address of the enhanced beacon supported AP.
Signal Strength Displays the signal strength when the unadopted AP was detected.
(dBm)
6-96 WS5100 Series Switch System Reference Guide
Heard Channel Displays the channel frequency when the unadopted AP was detected.
Heard Time Displays the time when the unadopted AP was detected.
4. Select the Clear Report button to clear the statistic counters and begin a new data calculation.
3. Refer to the following information as displayed within the Probes Found tab.
Portal MAC Displays the MAC address of the unadopted MU picked detected by the Enhanced
Probes enabled AP.
MU MAC Displays the MAC address of the Enhanced Probe detected MU.
Signal Strength Displays the signal strength when the unadopted MU was detected.
(dBm)
CHeard hannel Displays the channel frequency used when the unadopted MU was detected.
4. Select the Clear Report button to clear the statistic counters and begin a new data calculation.
Switch Management
This chapter describes the Management Access main menu items used to configure the switch. This chapter
consists of the following switch management activities:
• Displaying the Management Access Interface
• Configuring Access Control
• Configuring SNMP Access
• Configuring SNMP Traps
• Configuring SNMP Trap Receivers
• Configuring Management Users
NOTE: HTTPS must be enabled to access the switch applet. Ensure HTTPS access has
been enabled before using the login screen to access the switch applet.
NOTE: When the switch’s configuration is successfully updated (using the Web UI), the
effected screen is closed without informing the user their change was successful.
However, if an error were to occur, the error displays within the effected screen’s Status
field and the screen remains displayed. In the case of file transfer operations, the transfer
screen remains open during the transfer operation and remains open upon completion
(with status displayed within the Status field).
7-2 WS5100 Series Switch System Reference Guide
2. Refer to the Current Status field to review the following read-only information:
Firmware In Use The Firmware In Use value displays the software version currently running on the
switch. Use this information to assess whether a firmware update would improve
the switch feature set and functionality.
Log Output The Log Output value displays the target location for log files output by the switch.
NOTE: The Apply and Revert functions are greyed out within the Management Access
screen, as this screen is has no configurable parameters for the user to update and save.
1. Select Management Access > Access Control from the main menu tree.
2. Refer to the Management Settings field to enable or disable the following switch interfaces:
Secure Management Select this checkbox to allow management VLAN access to switch resources. The
(on Management management VLAN is used to establish an IP connection to the switch from a
VLAN only) workstation connected to a port in the VLAN. By default, the active management
VLAN is VLAN 1, but you can designate any VLAN as the management VLAN. Only
one management VLAN can be active at a time. This option is disabled (not
selected) by default.
Enable Telnet Select this checkbox to allow the switch to use a Telnet session for communicating
over the network. This setting is enabled by default.
Port Define the port number used for the Telnet session with the switch. This field is
enabled as long as the Enable Telnet option remains enabled. The default port is
port 23.
Enable SNMP v2 Select this checkbox to enable SNMPv2 access to the switch over the SNMPv2
interface. This setting is enabled by default.
Enable SNMP v3 Select this checkbox to enable SNMPv3 access to the switch over the SNMPv3
interface. This setting is enabled by default.
Retries Define the number of retries the switch uses to connect to the SNMP interface if
the first attempt fails. The default value is 3 retry attempts.
Timeout When the provided interval is exceeded, the user is logged out of the SNMP
session and forced re-initiate their connection. The default value is 10 minutes.
Enable HTTP Select this checkbox to enable HTTP access to the switch. The Hypertext Transfer
Protocol (HTTP) is an application-level protocol for distributed, collaborative,
hypermedia information systems. This setting is enabled by default.
7-4 WS5100 Series Switch System Reference Guide
Enable HTTPS Select this checkbox to enable HTTPS access to the switch. This setting is enabled
by default.
HTTPS Trustpoint Use the Trustpoint drop-down menu to select the local or default trustpoint used
with a HTTPS session with the switch. For information on creating a new
certificate, see Creating Server Certificates on page 6-81.
Enable FTP Select this checkbox to enable FTP access to the switch. File Transfer Protocol (FTP)
is the language used for file transfers across the Web. This setting is disabled by
default.
Port Displays the port number used for the FTP session with the switch (if using FTP).
Username Displays the read-only name of the user whose credentials are used for the FTP
session.
Password If FTP is enabled, a password is required (for the user specified in the Username
field) to use the switch with the FTP interface.
Root Dir. Define the root directory where the FTP server is located (if using FTP). Click the
Magnifying Glass icon to display a Select Directory File screen useful in
selecting the root directory. If necessary a new directory folder can be created.
Enable SSH Select this checkbox to enable SSH access to the switch. Secure Shell (SSH) is a
program designed to perform a number of functions, such as file transfer between
computers, command execution or logging on to a computer over a network. It is
intended to do these tasks with greater security than programs such as Telnet or
FTP. This setting is enabled by default.
Port Define the port number used for the SSH session with the switch.
RSA Key Pair Use the RSA Key Pair drop-down menu to select a public/private key pair used for
RSA authentication. The default setting is “default_ssh_rsa_key”
NOTE: You cannot establish a SSH session with the switch when a RSA Key with a length
of 360 is associated with the SSH-Server.
3. Click the Apply button to save changes made to the screen since the last saved configuration.
4. Click the Revert button to revert the screen back to its last saved configuration. Changes made since the
contents of the screen were last applied are discarded.
NOTE: The SNMP facility cannot retrieve a configuration file directly from its SNMP
interface. First deposit the configuration file to a computer, then FTP the file to the switch.
2. Refer to the Community Name and Access Control parameters for the following information:
Community Name Displays the read-only or read-write name used to associate a site-appropriate
name for the community. The name is required to match the name used within the
remote network management software. Click the Edit button to modify an existing
Community Name.
Access Control The Access Control field specifies a read-only (R) access or read/write (RW) access
for the community. Read-only access allows a remote device to retrieve
information, while read/write access allows a remote device to modify settings.
Click the Edit button to modify an existing Access Control permission.
7-6 WS5100 Series Switch System Reference Guide
3. Highlight an existing entry and click the Edit button to modify the properties of an existing SNMP V1/v2
community and access control definition. For more information, see Editing an Existing SNMP v1/v2
Community Name on page 7-6.
3. Modify the Community Name used to associate a site-appropriate name for the community. The name
revised from the original entry is required to match the name used within the remote network
management software.
4. Modify the existing read-only (R) access or read/write (RW) access for the community. Read-only
access allows a remote device to retrieve information, while read/write access allows a remote device
to modify settings.
5. Click OK to save and add the changes to the running configuration and close the dialog.
6. Refer to the Status field for the current state of the requests made from applet. This field displays error
messages if something goes wrong in the transaction between the applet and the switch
7. Click Cancel to return back to the SNMP v1/v2 screen without implementing changes.
CAUTION: The 3.x version WS5100 switch uses 3 unique (default) SNMPv3 user names
! and passwords for MD5 authentication and DES privacy. If upgrading your configuration
from a 1.4.x or 2.x baseline, you will need to change your SNMPv3 usernames and
passwords to ensure SNMPv3 interoperation. The unique SNMPv3 usernames and
passwords include:
3. Refer to the fields within the V3 screen for the following information:
User Name Displays a read-only SNMP v3 username of operator or Admin. An operator
typically has an Access Control of read-only and an Admin typically has an Access
Control of read/write.
Access Control Displays a read-only (R) access or read/write (RW) access for the v3 user. Read-only
access allows the user (when active) to retrieve information, while read/write
access grants the user modification privileges.
Authentication Displays the current authorization scheme used by this user for v3 access to the
switch. Click the Edit button to modify the password required to change
authentication keys.
Encryption Displays the current Encryption Standard (DES) protocol the user must satisfy for
SNMP v3 access to the switch. Click the Edit button to modify the password
required to change encryption keys.
Status Displays whether this specific SNMP v3 User Name is active on the switch. For
more information, see Accessing SNMP v2/v3 Statistics on page 7-9.
7-8 WS5100 Series Switch System Reference Guide
4. Highlight an existing v3 entry and click the Edit button to modify the password for the Auth Protocol and
Priv Protocol.
For additional information, see Editing an Existing SNMP v1/v2 Community Name on page 7-6
5. Highlight an existing SNMP v3 User Name and click the Enable button to enable the log-in for the
specified user. When selected the status of the user is defined as active.
6. Highlight an existing SNMP v3 User Name and click the Disable button to disable the log-in for the
specified user. When selected the status of the user is defined as inactive.
The Authentication Protocol is the existing protocol for the User Profile. The Authentication Protocol
is not an editable option. The Privacy Protocol is the existing protocol for the User Profile. The Privacy
Protocol is also not an editable option.
4. Enter the Old Password used to grant Authentication Protocol and Privacy Protocol permissions for the
User Profile.
5. Enter the New Password, then verify the new password within the Confirm New Password area.
6. Click OK to save and add the changes to the running configuration and close the dialog.
7. Refer to the Status field for the current state of the requests made from applet. This field displays error
messages if something goes wrong in the transaction between the applet and the switch.
8. Click Cancel to close the dialog without committing updates to the running configuration.
Switch Management 7-9
3. Refer to the following read-only statistics displayed within the SNMP Access Statistics screen:
V2/V3 Metrics Displays the individual SNMP Access events capable of having a value tracked for
them. The metrics range from general SNMP events (such as the number of SNMP
packets in and out) to specific error types that can be used for troubleshooting
SNMP events (such as Bad Value and Read-Only errors).
Values Displays the current numerical value for the SNMP V2/V3 Metric described on the
left-hand side of the screen. The value equals the number of times the target event
has occurred. This data is helpful in troubleshooting SNMP related problems within
the network.
7-10 WS5100 Series Switch System Reference Guide
Usm Statistics Displays SNMP v3 events specific to Usm. The User-based Security Model (USM)
decrypts incoming messages. The module then verifies authentication data. For
outgoing messages, the USM module encrypts PDUs and generates
authentication data. The module then passes the PDUs to the message processor,
which then invokes the dispatcher.
The USM module's implementation of the SNMP-USER-BASED-SM-MIB enables
SNMP to issue commands to manage users and security keys. The MIB also
enables the agent to ensure a requesting user exists and has the proper
authentication information. When authentication is done, the request is carried
out by the agent.
Values Displays the current numerical value for the Usm Metric described on the left-hand
side of the screen. The value equals the number of times the target event occurred.
This data is helpful in troubleshooting Usm (Authentication and Encryption) related
problems within the network.
1. Select Management Access > SNMP Trap Configuration from the main menu tree.
2. Select the Allow Traps to be generated checkbox to enable the selection (and employment) of all the
traps within the screen. Leaving the checkbox unselected means traps must be enabled by category or
individually.
3. Refer to trap categories within the Configuration screen to determine whether traps should be enabled
by group or individually enabled within parent groups.
4. Select an individual trap, by expanding the node in the tree view, to view a high-level description of this
specific trap within the Trap Description field. You can also select a trap family category heading (such
as "Redundancy" or "NSM") to view a high-level description of the traps within that trap category.
Redundancy Displays a list of sub-items (trap options) specific to the Redundancy (clustering)
configuration option. Select an individual trap within this subsection and click the
Enable button to enable this specific trap or highlight the trap family parent item
and click Enable all sub-items to enable all traps within the Cluster category.
Miscellaneous Displays a list of sub-items (trap options) specific to the Miscellaneous
configuration option (traps that do not fit in any other existing category). Select an
individual trap within this subsection and click the Enable button to enable this
specific trap or highlight the Miscellaneous trap family parent item and click
Enable all sub-items to enable all traps within the Miscellaneous category.
NSM Displays a list of sub-items (trap options) specific to the NSM configuration option.
Select an individual trap within this subsection and click the Enable button to
enable this specific trap or highlight the NSM trap family parent item and click
Enable all sub-items to enable all traps within the NSM category.
Mobility Displays a list of sub-items (trap options) specific to the Mobility configuration
option. Select an individual trap within this subsection and click the Enable button
to enable this specific trap or highlight the Mobility trap family parent item and click
Enable all sub-items to enable all traps within the Mobility category.
7-12 WS5100 Series Switch System Reference Guide
DHCP Displays a list of sub-items (trap options) specific to the DHCP configuration option.
Select an individual trap within this subsection and click the Enable button to
enable this specific trap or highlight the DHCP trap family parent item and click
Enable all sub-items to enable all traps within the DHCP category.
Radius Displays a list of sub-items (trap options) specific to the Radius configuration
option. Select an individual trap within this subsection and click the Enable button
to enable this specific trap or highlight the Radius trap family parent item and click
Enable all sub-items to enable all traps within the Radius category.
SNMP Displays a list of sub-items (trap options) specific to the SNMP configuration
option. Select an individual trap within this subsection and click the Enable button
to enable this specific trap or highlight the SNMP trap family parent item and click
Enable all sub-items to enable all traps within the SNMP category.
Diagnostics Displays a list of sub-items (trap options) specific to the Diagnostics configuration
option. Select an individual trap within this subsection and click the Enable button
to enable this specific trap or highlight the Diagnostics trap family parent item and
click Enable all
sub-items to enable all traps within the Diagnostics category.
Wireless Displays the list of sub-items (trap options) specific to Wireless configuration.
These include traps specific to wireless interoperability between the switch and its
associated devices. Select an individual trap and click the Enable button to enable
a specific trap or highlight the Wireless trap family parent item and click Enable
all sub-items to enable all traps within the Wireless category.
5. Click the Expand All Items button to display the sub-items within each trap category. Use this item to
display every trap that can be enabled.
Once expanded, traps can then be enabled by trap category or individually within each trap category.
6. Highlight a specific trap and click the Enable button to enable this specific trap as an active SNMP trap.
The items previously disabled (with an "X" to the left) now display with a check to the left of it.
7. Highlight a specific trap and click the Disable button to disable the item as an active SNMP trap.
The items previously enabled (with a check to the left) now display with an "X" to the left of it.
8. Highlight a sub-menu header (such as Redundancy or Update Server) and click the Enable all sub-items
button to enable the item as an active SNMP trap.
Those sub-items previously disabled (with an "X" to the left) now display with a check to the left of them.
Once the Apply button is clicked, the selected items are now active SNMP traps on the system.
9. Highlight a sub-menu header (such as Redundancy or SNMP) and click the Disable all sub-items button
to disable the item as an active SNMP trap.
Those sub-items previously enabled (with a check to the left) now display with an "X" to the left of them.
10.Click Apply to save the trap configurations enabled using the Enable or Enable all sub-items options.
11.Click Revert to discard any updates and revert back to its last saved configuration.
Switch Management 7-13
3. Refer to the following information for thresholds descriptions, conditions, editable threshold values and
units of measurement.
Threshold Name Displays the target metric for the data displayed to the right of the item. It defines
(Description) a performance criteria used as a target for trap configuration.
Threshold Conditions Displays the criteria used for generating a trap for the specific event. The Threshold
conditions appear as greater than, less then or worse then and define a baseline
for trap generation.
Threshold values for: Displays a threshold value for associated MUs. Use the Threshold Name and
MU Threshold Conditions as input criteria to define an appropriate Threshold Value
unique to the MUs within the network. For information on specific values, see
Wireless Trap Threshold Values on page 7-15.
Threshold values for: Set a threshold value for adopted APs. Use the Threshold Name and Threshold
AP Conditions as input criteria to define an appropriate Threshold Value unique to the
APs within the network. For information on specific values, see Wireless Trap
Threshold Values on page 7-15.
Threshold values for: Use the Threshold Name and Threshold Conditions as input criteria to define
WLAN an appropriate Threshold Value unique to the switch. For information on specific
values, see Wireless Trap Threshold Values on page 7-15.
7-14 WS5100 Series Switch System Reference Guide
Threshold values for: Use the Threshold Name and Threshold Conditions as input criteria to define
Switch an appropriate Threshold Value unique to the switch. For information on specific
values, see Wireless Trap Threshold Values on page 7-15.
Unit of Threshold Displays the measurement value used to define whether a threshold value has been
Values exceeded. Typical values include Mbps, retries and %. For information on specific
values, see Wireless Trap Threshold Values on page 7-15.
4. Select a threshold and click the Edit button to display a screen wherein threshold settings for the MU,
AP and WLAN can be modified.
Adjust the values as needed (between 0 -100) to initiate a trap when the value is exceeded for the MU,
AP or WLAN. Ensure the value set is realistic, in respect to the number of MUs and APs supporting
WLANs within the switch managed network.
5. Use the Maximum Number of Packets to Send a Trap field (at the bottom of the screen) to enter a
value used as the minimum number of data packets required for a trap to be generated for a target event.
Ensure the value is realistic, as setting it to low could generate traps unnecessarily. Refer to Wireless
Trap Threshold Values on page 7-15 for additional information.
6. Click the Apply button to save changes made to the screen since the last saved configuration.
7. Click the Revert button to revert the screen back to its last saved configuration. Changes made since the
contents of the screen were last applied are discarded.
Switch Management 7-15
2. Refer to the following SNMP trap receiver data to assess whether modifications are required.
Destination Address The Destination Address defines the numerical (non DNS name) destination IP
address for receiving traps sent by the SNMP agent.
Port The Port specifies a destination User Datagram Protocol (UDP) receiving traps.
Community String/ Enter a Community name specific to the SNMP-capable client that receives the
User Name traps. The community name is public.
Trap Version The Trap Version defines the trap version (v1/2 or v3) defined by the SNMP-
capable client receiving the trap. A trap designation cannot be modified.
3. Highlight an existing Trap Receiver and click the Edit button to display a sub-screen used to modify the
v2c or v3 Trap Receiver.
Edit Trap Receivers as needed if existing trap receiver information is insufficient. You can only modify the
IP address, port and v2c or v3 trap designation within the Edit screen. For more information, see Editing
SNMP Trap Receivers on page 7-17.
4. Highlight an existing Trap Receiver and click the Delete button to remove the Trap Receiver from the list
of available destinations available to receive SNMP trap information.
Remove Trap Receivers as needed if the destination address information is no longer available on the
system.
Switch Management 7-17
5. Click the Add button to display a sub-screen used to assign a new Trap Receiver IP Address, Port Number
and v2c or v3 designation to the new trap.
Add trap receivers as needed if the existing trap receiver information is insufficient. For more
information, see Adding SNMP Trap Receivers on page 7-17.
3. Create a new (non DNS name) destination IP address for the new trap receiver to be used for receiving
the traps sent by the SNMP agent.
4. Define a Port Number for the trap receiver.
5. Use the Protocol Options drop-down menu to specify the trap receiver as either a SNMP v2c or v3
receiver.
6. Click OK to save and add the changes to the running configuration and close the dialog.
7. Refer to the Status field for the current state of the requests made from applet. This field displays error
messages if something goes wrong in the transaction between the applet and the switch.
8. Click Cancel to close the dialog without committing updates to the running configuration.
Switch Management 7-19
4. Click on the Edit button to modify the associated roles and access modes of the selected user. By default,
the switch has two default users – Admin and Operator. Admin’s role is that of a superuser and Operator
the role will be monitored (read only).
5. Click on Add button to add and assign rights to a new user.
6. Click on Delete button to delete the selected user from the Users frame.
3. Enter the login name for the user in the Username field. Ensure this name is practical and identifiable
to the user.
4. Enter the authentication password for the new user in the Password field and reconfirm the same again
in the Confirm Password field.
Switch Management 7-21
5. Select the role you want to assign to the new user from the options provided in the Associated Roles
panel. Select one or more of the following options:
Monitor Select Monitor to assign regular user permissions without any administrative
rights. The Monitor option provides read-only permissions.
Help Desk Manager Assign this role to someone who typically troubleshoots and debugs problems
reported by the customer. The Help Desk Manager typically runs troubleshooting
utilities (like a sniffer), executes service commands, views/retrieves logs and
reboots the switch.
Network The Network Administrator has privileges to configure all wired and wireless
Administrator parameters like IP config, VLANs, L2/L3 security, WLANs, radios, IDS and hotspot.
System Administrator Select System Administrator to allow the user to configure general settings like
NTP, boot parameters, licenses, perform image upgrade, auto install, manager
redundancy/clustering and control access.
Web User Assign Web User Administrator privileges to add users for Web authentication
Administrator (hotspot).
Super User Select Super User to assign complete administrative rights.
NOTE: There are some basic operations/CLI commands (exit, logout and help) available to
all user roles. All the roles except Monitor can perform Help Desk role operations.
NOTE: By default, the switch is HTTPS enabled with a self signed certificate. This is
required since the Web UI uses HTTPS for user authentication.
6. Select the access modes to assign to the new user from the options provided in the Access Modes
panel. Select one or more of the following options:
Console This option provides the new user access to the switch using the console.
SSH This option provides the new user access to the switch using SSH.
Telnet This option provides the new user access to the switch using a Telnet session.
Applet This option provides the new user access to the switch through the Web UI (applet).
7. Refer to the Status field for the current state of the requests made from applet. This field displays error
messages if something goes wrong in the transaction between the applet and the switch.
8. Click the OK button to create the new user.
9. Click Cancel to revert back to the last saved configuration without saving any of your changes.
5. Select the user role from the options provided in the Associated Roles field. Select one or more of the
following options:
Monitor If necessary, modify user permissions without any administrative rights. The
Monitor option provides read-only permissions.
Help Desk Manager Optionally assign this role to someone who typically troubleshoots and debugs
problems reported by the customer. the Help Desk Manager typically runs
troubleshooting utilities (like a sniffer), executes service commands, views/
retrieves logs and reboots the switch.
Network The Network Administrator provides configures all wired and wireless
Administrator parameters like IP config, VLANs, L2/L3 security, WLANs, radios, IDS and hotspot.
System Administrator Select System Administrator (if necessary) to allow the user to configure general
settings like NTP, boot parameters, licenses, perform image upgrade, auto install,
manager redundancy/clustering and control access.
Web User Assign Web User Administrator privileges (if necessary) to add users for Web
Administrator authentication (hotspot).
Super User Select Super User (if necessary) to assign complete administrative rights.
NOTE: By default, the switch is HTTPS enabled with a self signed certificate. This is
required since the applet uses HTTPS for user authentication.
NOTE: There are some basic operations/CLI commands like exit, logout and help available
to all user roles. All roles except Monitor can perform Help Desk role operations.
6. Select the access modes you want to assign to the user from the options provided in the Access Modes
panel. Select one or more of the following options:
Console Provides the new user access to the switch using the console (applet)
SSH Provides the new user access to the switch using SSH.
Telnet Provides the new user access to the switch using Telnet
Applet Provides the new user access to the switch using the Web UI (applet)
7. Refer to the Status field for an indication of any problems that may have arisen.
The Status is the current state of the requests made from applet. This field displays error messages if
something goes wrong in the transaction between the applet and the switch.
8. Click on OK to complete the modification of the users privileges.
9. Click Cancel to revert back to the last saved configuration without saving any of your changes.
Switch Management 7-23
3. Enter the new guest-admin login name for the user in the Username field.
4. Enter the authentication password for the guest-admin in the Password field and reconfirm the same
again in the Confirm Password field.
7-24 WS5100 Series Switch System Reference Guide
6. Add guest users by name, start date and time, expiry date and time and user group.
7. Optionally, click the Generate button to automatically create a username and password for each guest
user.
8. Repeat this process as necessary until all required guest users have been created with relevant
passwords and start/end guest group permissions.
1. Select Management Access > Users from the main menu tree.
Switch Management 7-25
If authentication services are not available, due to technical reasons, then select the option
provided in the panel to avail read-only access.
4. Click the Apply button to commit the authentication method for the switch.
5. Click the Revert button to rollback to the previous authentication configuration.
6. Refer to the bottom half of the Authentication screen to view the Radius Servers configured for switch
authentication. The servers are listed in order of their priority.
Index Displays a numerical Index for the Radius Server to help distinguish this Radius
Server from other servers with a similar configuration. The maximum number that
can be assigned is 32.
IP Address Displays the IP address of the external Radius server. Ensure this address is a valid
IP address and not a DNS name.
Port Displays the TCP/IP port number for the Radius Server. The port range available for
assignment is from 1 - 65535.
7-26 WS5100 Series Switch System Reference Guide
Shared Secret Displays the shared secret used to verify Radius messages (with the exception of
the Access-Request message) are sent by a Radius-enabled device configured with
the same shared secret. The shared secret is a case-sensitive string (password) that
can include letters, numbers, or symbols. Ensure the shared secret is at least 22
characters long to protect the Radius server from brute-force attacks.
Retries Displays the maximum number of times the switch can retransmit a Radius Server
frame before it times out of the authentication session.
Timeout Displays the maximum time (in seconds) the switch waits for the Radius Server’s
acknowledgment of authentication request packets before the switch times out of
the session.
7. Select a Radius server from the table and click the Edit button to modify how the authentication method
is used. For more information, see Modifying the Properties of an Existing Radius Server on page 7-26.
8. Highlight a Radius Server from those listed and click the Delete button to remove the server from the list
of available servers.
9. Click the Add button at the bottom of the screen to display a sub-screen used to add a Radius Server to
the list of servers available to the switch. For more information, see
Adding a New Radius Server on page 7-27.
5. Refer to the Status field for the current state of the requests made from applet. This field displays error
messages if something goes wrong in the transaction between the applet and the switch.
6. Click on OK to complete the modification of the Radius Server.
7. Click Cancel to revert back to the last saved configuration without saving any of your changes.
5. Refer to the Status field for the current state of the requests made from applet. This field displays error
messages if something goes wrong in the transaction between the applet and the switch.
6. Click on OK to complete the addition of the Radius Server.
7. Click Cancel to revert back to the last saved configuration without saving any of your changes.
Diagnostics
This chapter describes the various diagnostic features available for monitoring switch performance. This
chapter consists of the following switch diagnostic activities:
• Displaying the Main Diagnostic Interface
• Configuring System Logging
• Reviewing Core Snapshots
• Reviewing Panic Snapshots
• Debugging the Applet
• Configuring a Ping
NOTE: HTTPS must be enabled to access the switch applet. Ensure HTTPS access has
been enabled before using the login screen to access the switch applet.
NOTE: When the switch’s configuration is successfully updated (using the Web UI), the
effected screen is closed without informing the user their change was successful.
However, if an error were to occur, the error displays within the effected screen’s Status
field and the screen remains displayed. In the case of file transfer operations, the transfer
screen remains open during the transfer operation and remains open upon completion
(with status displayed within the Status field).
Keep the monitoring interval at a shorter time increment when periods of heavy wireless traffic are
anticipated.
NOTE: Enabling switch diagnostics is recommended, as the diagnostics facilities provide
detailed information on the physical performance of the switch and may provide
indicators in advance of actual problems. Enabling diagnostics also assists in
troubleshooting problems associated with data transfers and the monitoring of network
traffic.
5. Use the Temperature Sensors field to monitor the CPU and system temperatures. This information is
extremely useful in assessing if the switch exceeds its critical limits. Unlike a WS5100 Series Switch, a
RF7000 Series Switch has six sensors.
6. Refer to the Fans field to monitor the CPU and system fan speeds. Unlike a RFS7000 model switch, a
WS5100 has two fans (not three).
7. Click the Apply button to commit and apply the changes.
8. Click the Revert button to revert back to the last saved configuration.
4. The Load Limits field displays the maximum CPU load limits for the last 1, 5, and 15 minutes. The limits
displayed coincide with periods of increased or decreased switch activity. The maximum CPU load
threshold can be manually configured.
5. The CPU Usage field displays real time CPU consumption values. Use this information to periodically
determine if performance is negatively impacted by the overusage of switch CPU resources. If CPU usage
is substantial during periods of low network activity, then perhaps, the situation requires
troubleshooting.
6. Click the Apply button to commit and apply the changes.
7. Click the Revert button to revert back to the last saved configuration.
5. The Buffers field displays buffer usage information. The Buffers field consists the following information:
3. This Disk tab displays the status of the switch flash, nvram and system disk resources. Each field
displays the following:
• Free Space Limit
• Free INodes
• Free INode Limit
4. Define the Free Space Limit variable carefully, as disk space may be required during periods of high
bandwidth traffic and file transfers.
5. Click the Apply button to commit and apply the changes.
6. Click the Revert button to revert back to the last saved configuration.
8-6 WS5100 Series Switch System Reference Guide
Keep the Cache allocation in line with cache expectations required within the switch managed network.
3. Define the maximum limit for each resource accordingly as you expect these resources to be utilized
within the switch managed network.
4. Click the Apply button to commit and apply any changes to any of the resources maximum limit.
5. Click the Revert button to revert back to the last saved configuration
3. Select the Enable Logging Module checkbox to enable the switch to log system events to a user
defined log file or a syslog server.
4. Select the Enable Logging to Buffer checkbox to enable the switch to log system events to a buffer.
The log levels are categorized by their severity. The default level is 3, (errors detected by the switch).
However, more granular log levels can be selected for system level information detected by the switch
that may be useful in assessing overall switch performance or troubleshooting.
5. Select the Enable Logging to Console checkbox to enable the switch to log system events to the
system console.
Use the drop-down menu to select the desired log level for tracking system events to a local log file. This
setting logs warning events (and those more severe) by default.
6. Select the Enable Logging to Syslog Server checkbox to enable the switch to log system events send
them to an external syslog server. Selecting this option also enables the Server Facility feature. Use the
drop-down menu to select the desired log level for tracking system events to a local log file.
a. Use the Server Facility drop-down menu to specify the local server facility (if used) for the transfer.
b. Specify the numerical (non DNS name) IP address for the first choice syslog server to log system
events (within the Server 1 field.
c. Optionally, use the Server 2 parameter to specify the numerical (non DNS name) IP address of an
alternative syslog server if the first syslog server is unavailable.
d. Optionally, use the Server 3 parameter to specify the numerical (non DNS name) IP address of a third
syslog server to log system events if the first two syslog servers are unavailable.
NOTE: 255.255.255.255 is accepted as a valid entry for the IP address of a logging server.
Diagnostics 8-9
7. Use the Logging aggregation time parameter to define the increment (or interval) system events are
logged (0-60 seconds). The shorter the interval, the sooner the event is logged.
8. Click Apply to save the changes made to the screen. This will overwrite the previous configuration.
9. Click the Revert button to move the display back to the last saved configuration.
3. The File Mgmt tab displays existing log files. Refer to the following for log file details:
Name Displays a read-only list of the log files (by name) created since the last time the
display was cleared. To define the type of log files created, click the Log Options
tab to enable logging and define the log level.
Size Displays the log file size in bytes. This is the current size of the file, if
modifications were made, they have been accounted for.
Created Displays the date, year and time of day the log file was initially created. This value
only states the time the file was initiated, not the time it was modified or
appended.
Modified Displays the date, year and time of day the log file was modified since its initial
creation date.
8-10 WS5100 Series Switch System Reference Guide
4. Highlight an existing log file to display the file's first page within the Preview field. Once a file is
selected, its name is appended within the preview field, and its contents are displayed.
The time, module, severity, mnemonic and description of the file are displayed.
5. Highlight a file from the list of log files available within the File Mgt tab and click the View button to
display a detailed description of the entire contents of the log file.
To view the entire content of an individual log file, see
Viewing the Entire Contents of Individual Log Files on page 8-10.
6. Click the Clear Buffer button to remove the contents of the File Mgt tab. This is only recommended if
you consider the contents of this file obsolete and wish to begin gathering new log file data.
When the button is selected, a confirmation prompt displays verifying whether the contents of the log
files is cleared.
7. Click the Transfer Files button to display a sub-screen wherein log files can be sent to an external
location (defined by you) using a user-defined file transfer medium.
Transferring files is recommended when the log file is frequently cleared, but an archive of the log files
is required in a safe location. For more information on transferring individual log files, see Transferring
Log Files on page 8-12.
3. Select an individual log file whose properties you wish to display in detail and click the View button.
4. Refer to the following for information on the elements that can be viewed within a log file:
Timestamp Displays the date, year and time of day the log file was initially created. This value
only states the time the file was initiated, not the time it was modified or
appended.
Module Displays the name of the switch logging the target event. This metric is important
for troubleshooting issues of a more serious priority, as it helps isolate the switch
resource detecting the problem.
Severity The Severity level coincides with the logging levels defined within the Log Options
tab. Use these numeric identifiers to assess the criticality of the displayed event.
The severity levels include:
• 0 - Emergency
• 1 - Alert
• 2 - Critical
• 3 - Errors
• 4 - Warning
• 5 - Notice
• 6 - Info
• 7 - Debug
8-12 WS5100 Series Switch System Reference Guide
Mnemonic Use the Mnemonic as a text version of the severity code information. A
mnemonic is convention for the classification, organization, storage and
recollection of switch information.
Description Displays a high-level overview of the event, and (when applicable) message type,
error or completion codes for further clarification of the event. Use this
information for troubleshooting or for data collection.
5. Refer to the Status field for the current state of the requests made from applet. This field displays error
messages if something goes wrong in the transaction between the applet and the switch.
6. Click the Refresh button to update the contents of the screen to the latest values.
7. Click the Close button to exit the screen. Clicking Close does not lose any data, as there are no values
configured within this screen (it is view-only).
4. Use the From drop-down menu (within the Source field) to specify the location from which the log file is
sent. If only the applet is available as a transfer location, use the default switch option.
5. Select a target file for transfer from the File drop-down menu. The drop-down menu contains the log files
listed within the File-Mgt screen.
6. Use the To drop-down menu (within the Target field) to define whether the target log file is to be sent to
the system's local disk (Local Disk) or to an external server (Server).
7. Provide the name of the file to be transferred within the File parameter. Ensure the file name is correct
or the transfer will not take place.
8. If Server has been selected as the source, use the Using drop down-menu to configure whether the log
file transfer is conducted using FTP or TFTP.
Diagnostics 8-13
9. If Server has been selected as the source, enter the IP Address of the destination server or system
receiving the log file. Ensure the IP address is valid or risk jeopardizing the success of the log file transfer.
10.If Server has been selected as the source, enter the User ID credentials required to send the log file to
the target location.
11.If Server has been selected as the source, use the Password parameter to enter the password required
to send the log file to the target location.
12.Specify the appropriate Path name to the target directory on the local system disk or server as
configured using the To parameter. If the local disk is selected, a browse button is available.
13.Click the Transfer button when ready to move the target file to the specified location. Repeat the
process as necessary to move each desired log file to the specified location.
14.If a problem condition is discovered during the file transfer, click the Abort button to terminate the
transfer.
15.Refer to the Status field for the current state of the requests made from applet. This field displays error
messages if something goes wrong in the transaction between the applet and the switch.
16.Click the Close button to exit the screen. No values need to be saved once the transfer has been made.
8-14 WS5100 Series Switch System Reference Guide
2. Refer to the following table headings within the Core Snapshots screen:
Name Displays the title of the process, process ID (pid) and build number separated by
underscores. The file extension is always .core for core files.
Created Displays the date and time the core file was generated. This information may be
useful in troubleshooting issues.
3. Select a target file and click the Delete button to remove the selected file. This option is not
recommended until the severity of the core snapshot has been assessed.
4. Click the Transfer Files button to open the transfer dialogue to enable a file to be copied to another
location. For more information on transferring core snapshots, see
Transferring Core Snapshots on page 8-14.
3. Use the From drop-down menu to specify the location from which the log file is sent.
If only the applet is available as a transfer location, use the default switch option.
4. Select a target file for the file transfer from the File drop-down menu.
The drop-down menu contains the core files listed within the File-Mgmt screen.
5. Use the To drop-down menu (within the Target field) to define whether the target log file is to be sent to
the system's local disk (Local Disk) or to an external server (Server).
6. Provide the name of the file to be transferred to the location specified within the File field.
7. If Server has been selected as the source, use the Using drop down-menu to configure whether the log
file transfer is sent using FTP or TFTP.
8. If Server has been selected as the source, enter the IP Address of destination server or system receiving
the target log file.
9. If Server has been selected as the source, enter the User ID credentials required to send the file to the
target location. Use the user ID for FTP transfers only.
10.If Server has been selected as the source, enter the Password required to send the file to the target
location using FTP.
11.Specify the appropriate Path to the target directory on the local system disk or server as configured using
the To parameter. If the local disk option is selected, use the browse button to specify the location on the
local disk.
12.Refer to the Status field for the current state of the requests made from applet. This field displays error
messages if something goes wrong in the transaction between the applet and the switch.
13.Click the Transfer button when ready to move the target file to the specified location. Repeat the
process as necessary to move each desired log file to the specified location.
14.If a problem condition is discovered during the file transfer, click the Abort button to terminate the
transfer.
15.Click the Close button to exit the screen after a transfer. There are no changes to save or apply.
8-16 WS5100 Series Switch System Reference Guide
2. Refer to the following table headings within the Panic Snapshots screen:
Name Displays the title of the panic file. Panic files are named n.panic where n is in the
range 0-9. 0 is always the oldest saved panic file and the highest number is the
most recent. If the system experiences a panic, there are ten existing panics, the
oldest is deleted and the remaining nine are renamed so the newest can be saved
as 9.
Created Displays the date and time the panic file was created. The panic file is created after
the system reboots, however the panic information within the file contains the date
and time the panic actually occurred.
3. Refer to the Preview field for panic information in ASCII text. When a panic file is selected, the
corresponding text is displayed in the preview screen and the name of the file displays. Use this
information as a high-level overview of the panic.
4. Select a target panic file and click the Delete button to remove the file.
5. Select a target panic file and click the View button to open a separate viewing screen to display the
panic information in greater detail. For more information, see Viewing Panic Details on page 8-17.
Diagnostics 8-17
6. Click the Transfer Files button to open the transfer dialogue to transfer the file to another location. For
more information, see Transferring Panic Files on page 8-17.
Main The Main parameter displays detailed panic information for the selected file.
Page Panic information may be spread across multiple pages. The Page value allows the
user to view complete information on the panic. Use the < and > options to
navigate through the contents of the file.
Refresh Click the Refresh button to update the data displayed within the screen to the
latest values.
3. Use the From drop-down menu to specify the location from which the file is sent. If only the applet is
available as a transfer location, use the default switch option.
4. Select a file for the file transfer from the File drop-down menu. The drop-down menu contains the panic
files listed within the File-Mgmt screen.
8-18 WS5100 Series Switch System Reference Guide
5. Use the To drop-down menu (within the Target field) to define whether the target panic file is to be sent
to the system's local disk (Local Disk) or to an external server (Server).
6. Provide the name of the file to be transferred to the location specified within the File field.
7. If Server has been selected as the source, use the Using drop down-menu to configure whether the panic
file transfer will be sent using FTP or TFTP.
8. If Server has been selected as the source, enter the IP Address of the destination server or system
receiving the target panic file.
9. If Server has been selected as the source, enter the User ID credentials required to send the file to the
target location. The User ID is required for FTP transfers only.
10.If Server has been selected as the source, enter the Password required (for FTP transfers) to send the
file to the target location.
11.Specify the appropriate path name to the target directory on the local system disk or server as configured
using the "To" parameter. If local server is selected, use the Browse button to specify a location on your
local machine.
12. Refer to the Status field for the current state of the requests made from applet. This field displays error
messages if something goes wrong in the transaction between the applet and the switch.
13.Click the Transfer button when ready to move the target file to the specified location. Repeat the
process as necessary to move each desired log file to the specified location.
14.If a problem condition is discovered during the file transfer, click the Abort button to terminate the
transfer.
15. Click the Close button to exit the dialogue and abandon the transfer.
Diagnostics 8-19
2. To use this window, select the Enable Web-UI Debug Mode checkbox.
The Applet Debugging field is partitioned into the following editable fields:
• Send log message to a file.
• Use SNMP v2 only.
• Message Severity.
• What kinds of message should be seen.
3. Select the Send log message to a file checkbox if you wish to store the log message.
Enabling this checkbox allows you to select the file location where you wish to store the log message.
4. Select the Use SNMP V2 only checkbox to use SNMP v2 to debug the applet.
Check whether you have access to SNMP v2 by clicking on the Test SNMP V2 access button. If SNMP
v2 access is available, the test icon will change from grey to green, indicating the SNMPv2 interface is
viable on the switch.
5. Select the severity of the message you wish to store in the log file.
The Message Severity section allows you to report a bug and log it as per the following severity levels:
• Fatal - loss of data or switch functionality
• Error - switch data compilation problem, could result in data loss
• Warning - potential data loss of configuration corruption
• Informational - data that may be useful in assessing a potential error
• Debug - information relevant to troubleshooting
• None - no impact.
8-20 WS5100 Series Switch System Reference Guide
Description Displays the user assigned description of the ping test. The name is read-only. Use
this title to determine whether this test can be used as is or if a new ping test is
required.
Destination IP Displays the IP address of the target device. This is the numeric destination for the
device sent the ping packets. If this address does not accurately reflect the ping
destination target, the ping test will not be successful.
Timeout (sec) Displays the timeout value (in seconds) used to timeout the ping test if a round trip
packet is not received from the target device.
No. of Probes Displays the number of packets transmitted to the target IP address to discern the
round trip time between the switch and its connected device.
Frequency Define the interval (in seconds) between ping packet transmissions. Define a
longer interval if high levels of network congestion are anticipated between the
switch and its target device. Use a value of 0 to execute a single ping test or stop
a currently executing ping test.
3. To edit the properties of an existing ping test, select a ping based on the description listed and click the
Edit button. For more information, see
Modifying the Configuration of an Existing Ping Test on page 8-22.
4. Select an existing ping test from those displayed within the Configure tab and click the Delete button to
remove the ping test from those displayed.
5. Click the Add button to display a screen used to define the attributes of a new ping test. For more
information, see Adding a New Ping Test on page 8-23.
8-22 WS5100 Series Switch System Reference Guide
3. Modify the following information (as needed) to edit the existing ping test:
Description If necessary, modify the description for the ping test. Ensure this description is
representative of the test, as this is the description displaying within the
Configuration tab.
Destination IP If necessary, modify the IP address of the target device. This is the numeric (non
DNS address) destination for the device transmitted the ping packets.
No. of Probes If necessary, modify the number of packets transmitted to the target IP address to
discern the round trip time between the switch and its connected device.
Timeout(sec) If necessary, modify the timeout value (in seconds) used to timeout the ping test if
a round trip packet is not received by the switch from its target device. Ensure this
interval is long enough to account for network congestion between the switch and
its target device.
Frequency If necessary, modify the interval (in seconds) between ping packet transmissions.
Define a longer interval if high levels of network congestion are anticipated
between the switch and its target device. Use a value of 0 to execute a single ping
or stop a currently executing ping test.
4. Click OK to save and add the changes to the running configuration and close the dialog.
5. Refer to the Status field for the current state of the requests made from applet. This field displays error
messages if something goes wrong in the transaction between the applet and the switch.
6. Click Cancel to return back to the Configuration tab without implementing changes.
Diagnostics 8-23
3. Enter the following information to define the properties of the new ping test:
Test Name Enter a short name for the ping test to describe either the target destination of the
ping packet or the ping test’s expected result. Use the name provided in
combination with the ping test description to convey the overall function of the
test.
Description Ensure the description is representative of the test, as this is the description
displaying within the Configuration tab.
Destination IP Enter the IP address of the target device. This is the numeric (non DNS address)
destination for the device transmitted the ping packets.
No. of Probes Define the number of ping packets transmitted to the target device. This value
represents the number of packets transmitted to the target IP address to discern
the round trip time between the switch and its connected device.
Timeout(sec) Configure the timeout value (in seconds) used to timeout the ping test if a round
trip packet is not received from the target device. Ensure this interval is long
enough to account for network congestion between the switch and its target
device.
Frequency Define the interval (in seconds) between ping packet transmissions. Define a
longer interval if high levels of network congestion are anticipated between the
switch and its target device. Use a value of 0 to execute a single ping test or stop
a currently running ping test.
4. Click OK to save and add the changes to the running configuration and close the dialog.
8-24 WS5100 Series Switch System Reference Guide
5. Refer to the Status field for the current state of the requests made from applet. This field displays error
messages if something goes wrong in the transaction between the applet and the switch
6. Click Cancel to return back to the Configuration tab without implementing changes.
3. Refer to the following content within the Statistics tab to assess the connection with the target device:
Destination IP Displays the numeric (non DNS address) destination for the device transmitted the
ping packets.
Packets Sent Displays the number of packets transmitted to the target device IP address.
Compare this value with the number of packets received to assess the connection
quality with the target device.
Packets Received Displays the number of packets received from the target device. If this number is
significantly lower than the number sent to the target device, consider removing
this device from consideration for permanent connection with the switch.
Min RTT Displays the quickest round trip time for ping packets transmitted from the switch
to its destination IP address. This may reflect the time when data traffic was at its
lowest for the two devices.
Diagnostics 8-25
Max RTT Displays the longest round trip time for ping packets transmitted from the switch
to its destination IP address. This may reflect the time when data traffic was at its
most congested for the two devices.
Average RTT Displays the average round trip time for ping packets transmitted between the
switch and its destination IP address. Use this value as a general baseline (along
with packets sent vs packets received) for the overall connection and association
potential between the switch and target device.
Last Response Displays the time (in seconds) the switch last “heard” the destination IP address
over the switch managed network. Use this time (in contention with the RTT
values displayed) to determine whether this device warrants a permanent switch
connection.
8-26 WS5100 Series Switch System Reference Guide
Appendix A Customer Support
NOTE An AAP cannot support a firmware download from the wireless switch.
NOTE Configuration changes made on the AP-5131 will not be updated on the
switch. To change the AAP configuration for the AP-5131 make the
changes using the switch’s interface.
Once an access point connects to a switch and receives its AAP configuration, its WLAN and radio
configuration is similar to a thin access port. An AAP's radio mesh configuration can also be
configured from the switch. However, non-wireless features (DHCP, NAT, Firewall etc.) cannot be
configured from the switch and must be defined using the access point's resident interfaces before
its conversion to an AAP.
Appendix B: Adaptive AP B - 3
B.1.4 Licensing
An AAP uses the same licensing scheme as a thin access port. This implies an existing license
purchased with a switch can be used for an AAP deployment. Regardless of how many AP300
and/or AAPs are deployed, you must ensure the license used by the switch supports the number of
radio ports (both AP300s and AAPs) you intend to adopt.
B-4 WS5100 Series Switch System Reference Guide
** The AP-51xx uses an encryption key to hash passphrases and security keys. To obtain the
encryption passphrase, configure an AP-51xx with the passphrase and export the configuration file.
The WAN has no PoE support and has a default static AP address of 10.1.1.1/8.
NOTE For a dependant AAP, independent WLANs continue to beacon for three
days in the absence of a switch.
To avoid a lengthy broken connection with the switch, Motorola recommends generating an
SNMP trap when the AAP loses adoption with the switch.
NOTE For additional information (in greater detail) on the AP configuration
activities described above, see “B.4.1 Adaptive AP Configuration”.
3. Enter up to 12 Switch IP Addresses constituting the target switches available for AAP
connection.
The AAP will begin establishing a connection with the first addresses in the list. If
unsuccessful, the AP will continue down the list (in order) until a connection is established.
4. If a numerical IP address is unknown, but you know a switch’s fully qualified domain name
(FQDN), enter the name as the Switch FQDN value.
Appendix B: Adaptive AP B - 13
5. Select the Enable AP-Switch Tunnel option to allow AAP configuration data to reach a
switch using a secure VPN tunnel.
6. If using IPSec as the tunnel resource, enter the IPSec Passkey to ensure IPSec connectivity.
7. Click Apply to save the changes to the AAP setup.
NOTE The manual AAP adoption described above can also be conducted using
the access point’s CLI interface using the admin(system.aapsetup)>
command.
NOTE Options 189 and 192 are mandatory to trigger adoption using DHCP
options. Unlike an AP300, option 189 alone won’t work. These options can
be embedded in Vendor Specific Option 43 and sent in the DHCP Offer.
Any WLAN configured on the switch becomes an extended WLAN by default for an AAP.
4. Select Network > Wireless LANs from the switch main menu tree.
5. Select the target WLAN you would like to use for AAP support from those displayed and click the Edit
button.
6. Select the Independent Mode (AAP Only) checkbox.
Selecting the checkbox designates the WLAN as independent and prevents traffic from being
forwarded to the switch. Independent WLANs behave like WLANs as used on a a standalone access
point. Leave this option unselected (as is by default) to keep this WLAN an extended WLAN (a typical
centralized WLAN created on the switch).
Appendix B: Adaptive AP B - 15
Once an AAP is adopted by the switch, it displays within the switch Access Port Radios
screen (under the Network parent menu item) as an AP-5131 or AP-5181 within the AP Type
column.
!
ip http server
ip http secure-trustpoint default-trustpoint
ip http secure-server
ip ssh
no service pm sys-restart
timezone America/Los_Angeles
license AP
xyxyxyxyxyxyxyxyxyxyxyxyxyxyxyxyxyxyxyxyxyxyxyxyxyxyxyxyxyxyxyxyxyxyxyxyxyxyxyxyxyxyxxyxyxyx
!
wireless
no adopt-unconf-radio enable
manual-wlan-mapping enable
wlan 1 enable
wlan 1 ssid qs5-ccmp
wlan 1 vlan 200
wlan 1 encryption-type ccmp
wlan 1 dot11i phrase 0 Symbol123
wlan 2 enable
wlan 2 ssid qs5-tkip
wlan 2 vlan 210
wlan 2 encryption-type tkip
wlan 2 dot11i phrase 0 Symbol123
wlan 3 enable
wlan 3 ssid qs5-wep128
wlan 3 vlan 220
wlan 3 encryption-type wep128
wlan 4 enable
wlan 4 ssid qs5-open
wlan 4 vlan 230
wlan 5 enable
wlan 5 ssid Mesh
wlan 5 vlan 111
wlan 5 encryption-type ccmp
wlan 5 dot11i phrase 0 Symbol123
!
To configure a WLAN as an independent WLAN
!
wlan 5 independent
wlan 5 client-bridge-backhaul enable
wlan 6 enable
wlan 6 ssid test-mesh
wlan 6 vlan 250
radio add 1 00-15-70-00-79-30 11bg aap5131
radio 1 bss 1 3
radio 1 bss 2 4
radio 1 bss 3 2
radio 1 channel-power indoor 11 8
Appendix B: Adaptive AP B - 19
72E-103894-01 Revision A
January 2008