AP3917E.wing 5 9 1 System Reference Guide Part 1 3831157
AP3917E.wing 5 9 1 System Reference Guide Part 1 3831157
1
Wireless Controller and Service Platform
System Reference Guide
9035204
Legal Notices
Extreme Networks, Inc. reserves the right to make changes in specifications and other
information contained in this document and its website without prior notice. The reader
should in all cases consult representatives of Extreme Networks to determine whether any
such changes have been made.
The hardware, firmware, software or any specifications described or referred to in this
document are subject to change without notice.
Trademarks
Extreme Networks and the Extreme Networks logo are trademarks or registered
trademarks of Extreme Networks, Inc. in the United States and/or other countries.
All other names (including any product names) mentioned in this document are the
property of their respective owners and may be trademarks or registered trademarks of
their respective companies/owners.
For additional information about Extreme Networks trademarks, go to:
www.extremenetworks.com/company/legal/trademarks/
Support
For product support, including documentation, visit: www.extremenetworks.com/support/
Table of Contents
Chapter 1, Overview
1.1 Distributed Intelligence ................................................................................................................................................................................................1-2
1.2 High Availability Networks .........................................................................................................................................................................................1-2
1.3 Gap Free Security ..........................................................................................................................................................................................................1-2
1.4 Outdoor Wireless and Mesh Networking .............................................................................................................................................................1-2
1.5 Network Services, Routing and Switching ..........................................................................................................................................................1-3
1.6 Management, Deployment and Troubleshooting ............................................................................................................................................1-3
Chapter 4, Dashboard
4.1 Summary .......................................................................................................................................................................................................................... 4-1
4.1.1 Device Listing ..................................................................................................................................................................................................... 4-2
4.2 System Screen ............................................................................................................................................................................................................. 4-3
4.2.1 Health ................................................................................................................................................................................................................... 4-3
4.2.2 Inventory ............................................................................................................................................................................................................ 4-5
4.3 RF Domain Screen ..................................................................................................................................................................................................... 4-6
4.3.1 RF Domain Health ........................................................................................................................................................................................... 4-7
4.3.2 RF Domain Inventory .................................................................................................................................................................................... 4-9
4.4 Controller .......................................................................................................................................................................................................................4-11
4.4.1 Controller Health .............................................................................................................................................................................................4-11
4.4.2 Controller Inventory .....................................................................................................................................................................................4-13
4.4.3 T5 Controller Dashboard ..........................................................................................................................................................................4-15
4.4.4 EX3500 Switch Dashboard .....................................................................................................................................................................4-21
4.5 Access Point Screen ................................................................................................................................................................................................4-24
4.5.1 Access Point Health .....................................................................................................................................................................................4-24
4.5.2 Access Point Inventory ..............................................................................................................................................................................4-26
4.6 Network View ............................................................................................................................................................................................................4-27
4.7 Debug Wireless Clients ..........................................................................................................................................................................................4-29
Chapter 9, RF Domains
9.1 Managing RF Domains .............................................................................................................................................................................................. 9-2
9.1.1 RF Domain Basic Configuration ................................................................................................................................................................. 9-3
9.1.2 RF Domain Sensor Configuration ............................................................................................................................................................. 9-6
9.1.3 RF Client Name Configuration ................................................................................................................................................................... 9-8
9.1.4 RF Domain Overrides .................................................................................................................................................................................... 9-9
9.1.5 RF Domain Network Alias ...........................................................................................................................................................................9-13
9.1.6 RF Domain Deployment Considerations ..............................................................................................................................................9-21
This manual supports the following Access Point, controller and service platform models:
• Wireless Controllers – RFS4000, RFS6000
• Service Platforms - NX5500, NX5500E, NX7500, NX75XX, NX7510E, NX9500, NX9510, NX9600, NX9610,
VX9000, VX9000E
• Access Points – AP6522, AP6532, AP6562, AP7161, AP7502, AP7522, AP7532, AP7562, AP7602, AP7612,
AP7622, AP7632, AP7662, AP8122, AP8132, AP8163, AP8232, AP8432 and AP8533.
NOTE: Throughout this guide, unless specific model references are needed,
AP8122, AP8132, AP8163 models are referred to as AP81XX.
Document Convention
The following conventions are used in this manual to draw your attention to important information:
! CAUTION: Indicates conditions that can cause equipment damage or data loss.
Switch Note: Indicates caveats unique to a particular RFS series controller or NX se-
ries service platform.
Notational Conventions
This document is an agreement (“Agreement”) between You, the end user, and Extreme Networks, Inc., on behalf
of itself and its Affiliates (“Extreme”) that sets forth your rights and obligations with respect to the “Licensed
Materials”. BY INSTALLING SOFTWARE AND/OR THE LICENSE KEY FOR THE SOFTWARE (“License Key”)
(collectively, “Licensed Software”), IF APPLICABLE, COPYING, OR OTHERWISE USING THE LICENSED SOFTWARE
AND/OR ANY OF THE LICENSED MATERIALS UNDER THIS AGREEMENT, YOU ARE AGREEING TO BE BOUND BY
THE TERMS OF THIS AGREEMENT, WHICH INCLUDES THE LICENSE(S) AND THE LIMITATION(S) OF WARRANTY
AND DISCLAIMER(S)/LIMITATION(S) OF LIABILITY. IF YOU DO NOT AGREE TO THE TERMS OF THIS AGREEMENT,
RETURN THE LICENSE KEY (IF APPLICABLE) TO EXTREME OR YOUR DEALER, IF ANY, OR DO NOT USE THE
LICENSED SOFTWARE AND/OR LICENSED MATERIALS AND CONTACT EXTREME OR YOUR DEALER WITHIN TEN
(10) DAYS FOLLOWING THE DATE OF RECEIPT TO ARRANGE FOR A REFUND. IF YOU HAVE ANY QUESTIONS
ABOUT THIS AGREEMENT, CONTACT EXTREME, Attn: [email protected].
1 DEFINITIONS. “Affiliates” means any person, partnership, corporation, limited liability company, or other form of
enterprise that directly or indirectly through one or more intermediaries, controls, or is controlled by, or is under
common control with the party specified. “Server Application” means the software application associated to
software authorized for installation (per License Key, if applicable) on one or more of Your servers as further
defined in the Ordering Documentation. “Client Application” shall refer to the application to access the Server
Application. “Network Device” for purposes of this Agreement shall mean a physical computer device,
appliance, appliance component, controller, wireless access point, or virtual appliance as further described
within the applicable product documentation, which includes the Order Documentation. “Licensed Materials”
means the Licensed Software (including the Server Application and Client Application), Network Device (if
applicable), Firmware, media embodying software, and the accompanying documentation. “Concurrent User”
shall refer to any of Your individual employees who You provide access to the Server Application at any one
time. “Firmware” refers to any software program or code embedded in chips or other media. “Standalone”
software is software licensed for use independent of any hardware purchase as identified in the Ordering
Documentation. “Licensed Software” collectively refers to the software, including Standalone software,
Firmware, Server Application, Client Application or other application licensed with conditional use parameters
as defined in the Ordering Documentation. “Ordering Documentation” shall mean the applicable price
quotation, corresponding purchase order, relevant invoice, order acknowledgement, and accompanying
documentation or specifications for the products and services purchased, acquired or licensed hereunder from
Extreme either directly or indirectly.
2 TERM. This Agreement is effective from the date on which You accept the terms and conditions of this
Agreement via click-through, commence using the products and services or upon delivery of the License Key if
applicable, and shall be effective until terminated. In the case of Licensed Materials offered on a subscription
basis, the term of “licensed use” shall be as defined within Your Ordering Documentation.
3 GRANT OF LICENSE. Extreme will grant You a non-transferable, non-sublicensable, non-exclusive license to use
the Licensed Materials and the accompanying documentation for Your own business purposes subject to the
terms and conditions of this Agreement, applicable licensing restrictions, and any term, user server networking
device, field of use, or other restrictions as set forth in Your Ordering Documentation. If the Licensed Materials
are being licensed on a subscription and/or capacity basis, the applicable term and/or capacity limit of the
license shall be specified in Your Ordering Documentation. You may install and use the Licensed Materials as
permitted by the license type purchased as described below in License Types. The license type purchased is
specified on the invoice issued to You by Extreme or Your dealer, if any. YOU MAY NOT USE, COPY, OR MODIFY
THE LICENSED MATERIALS, IN WHOLE OR IN PART, EXCEPT AS EXPRESSLY PROVIDED IN THIS AGREEMENT.
4 LICENSE TYPES.
• Single User, Single Network Device. Under the terms of this license type, the license granted to You by
Extreme authorizes You to use the Licensed Materials as bundled with a single Network Device as identified
by a unique serial number for the applicable Term, if and as specified in Your Ordering Documentation, or
any replacement for that network device for that same Term, for internal use only. A separate license, under
a separate License Agreement, is required for any other network device on which You or another individual,
employee or other third party intend to use the Licensed Materials. A separate license under a separate
License Agreement is also required if You wish to use a Client license (as described below).
• Single User, Multiple Network Device. Under the terms of this license type, the license granted to You by
Extreme authorizes You to use the Licensed Materials with a defined amount of Network Devices as defined
in the Ordering Documentation.
• Client. Under the terms of the Client license, the license granted to You by Extreme will authorize You to
install the License Key for the Licensed Materials on your server and allow the specific number of Concurrent
Users as ordered by you and is set forth in Your Ordering Documentation. A separate license is required for
each additional Concurrent User.
• Standalone. Software or other Licensed Materials licensed to You for use independent of any Network
Device.
• Subscription. Licensed Materials, and inclusive Software, Network Device or related appliance updates and
maintenance services, licensed to You for use during a subscription period as defined in Your applicable
Ordering Documentation.
• Capacity. Under the terms of this license, the license granted to You by Extreme authorizes You to use the
Licensed Materials up to the amount of capacity or usage as defined in the Ordering Documentation.
5 AUDIT RIGHTS. You agree that Extreme may audit Your use of the Licensed Materials for compliance with these
terms and Your License Type at any time, upon reasonable notice. In the event that such audit reveals any use
of the Licensed Materials by You other than in full compliance with the license granted and the terms of this
Agreement, Extreme reserves the right to charge You for all reasonable expenses related to such audit in
addition to any other liabilities and overages applicable as a result of such non-compliance, including but not
limited to additional fees for Concurrent Users, excess capacity or usage over and above those specifically
granted to You. From time to time, the Licensed Materials may upload information about the Licensed Materials
and the associated usage to Extreme. This is to verify the Licensed Materials are being used in accordance with
a valid license and/or entitlement. By using the Licensed Materials, you consent to the transmission of this
information.
6 RESTRICTION AGAINST COPYING OR MODIFYING LICENSED MATERIALS. Except as expressly permitted in this
Agreement, You may not copy or otherwise reproduce the Licensed Materials. In no event does the limited
copying or reproduction permitted under this Agreement include the right to decompile, disassemble,
electronically transfer, or reverse engineer the Licensed Materials, including the Licensed Software, or to
translate the Licensed Materials into another computer language. The media embodying the Licensed Materials
may be copied by You, in whole or in part, into printed or machine readable form, in sufficient numbers only for
backup or archival purposes, or to replace a worn or defective copy. However, You agree not to have more than
two (2) copies of the Licensed Software in whole or in part, including the original media, in your possession for
said purposes without Extreme’ prior written consent, and in no event shall You operate more copies of the
Licensed Software than the specific licenses granted to You. You may not copy or reproduce the
documentation. You agree to maintain appropriate records of the location of the original media and all copies
of the Licensed Software, in whole or in part, made by You. Any portion of the Licensed Software included in
any such modular work shall be used only on a single computer for internal purposes and shall remain subject
to all the terms and conditions of this Agreement. You agree to include any copyright or other proprietary
notice set forth on the label of the media embodying the Licensed Software on any copy of the Licensed
Software in any form, in whole or in part, or on any modification of the Licensed Software or any such modular
work containing the Licensed Software or any part thereof.
7 TITLE AND PROPRIETARY RIGHTS
a The Licensed Materials are copyrighted works and are the sole and exclusive property of Extreme, any
company or a division thereof which Extreme controls or is controlled by, or which may result from the
merger or consolidation with Extreme (its “Affiliates”), and/or their suppliers. This Agreement conveys a
limited right to operate the Licensed Materials and shall not be construed to convey title to the Licensed
Materials to You. There are no implied rights. You shall not sell, lease, transfer, sublicense, dispose of, or
otherwise make available the Licensed Materials or any portion thereof, to any other party.
b You further acknowledge that in the event of a breach of this Agreement, Extreme shall suffer severe and
irreparable damages for which monetary compensation alone will be inadequate. You therefore agree that in
the event of a breach of this Agreement, Extreme shall be entitled to monetary damages and its reasonable
attorney’s fees and costs in enforcing this Agreement, as well as injunctive relief to restrain such breach, in
addition to any other remedies available to Extreme.
8 PROTECTION AND SECURITY. In the performance of this Agreement or in contemplation thereof, You and your
employees and agents may have access to private or confidential information owned or controlled by Extreme
relating to the Licensed Materials supplied hereunder including, but not limited to, product specifications and
schematics, and such information may contain proprietary details and disclosures. All information and data so
acquired by You or your employees or agents under this Agreement or in contemplation hereof shall be and
shall remain Extreme’ exclusive property, and You shall use all commercially reasonable efforts to keep, and
have your employees and agents keep, any and all such information and data confidential, and shall not copy,
publish, or disclose it to others, without Extreme’ prior written approval, and shall return such information and
data to Extreme at its request. Nothing herein shall limit your use or dissemination of information not actually
derived from Extreme or of information which has been or subsequently is made public by Extreme, or a third
party having authority to do so
You agree not to deliver or otherwise make available the Licensed Materials or any part thereof, including
without limitation the object or source code (if provided) of the Licensed Software, to any party other than
Extreme or its employees, except for purposes specifically related to your use of the Licensed Materials on a
single computer as expressly provided in this Agreement, without the prior written consent of Extreme. You
acknowledge that the Licensed Materials contain valuable confidential information and trade secrets, and that
unauthorized use, copying and/or disclosure thereof are harmful to Extreme or its Affiliates and/or its/their
software suppliers.
9 MAINTENANCE AND UPDATES. Except as otherwise defined below, updates and certain maintenance and
support services, if any, shall be provided to You pursuant to the terms of an Extreme Service and Maintenance
Agreement, if Extreme and You enter into such an agreement. Except as specifically set forth in such
agreement, Extreme shall not be under any obligation to provide updates, modifications, or enhancements, or
maintenance and support services for the Licensed Materials to You. If you have purchased Licensed Materials
on a subscription basis then the applicable service terms for Your Licensed Materials are as provided in Your
Ordering Documentation. Extreme will perform the maintenance and updates in a timely and professional
manner, during the Term of Your subscription, using qualified and experienced personnel. You will cooperate in
good faith with Extreme in the performance of the support services including, but not limited to, providing
Extreme with: (a) access to the Extreme Licensed Materials (and related systems); and (b) reasonably requested
assistance and information. Further information about the applicable maintenance and updates terms can be
found on Extreme’s website at http://www.extremenetworks.com/company/legal/terms-of-support
10 DEFAULT AND TERMINATION. In the event that You shall fail to keep, observe, or perform any obligation under
this Agreement, including a failure to pay any sums due to Extreme, or in the event that you become insolvent
or seek protection, voluntarily or involuntarily, under any bankruptcy law, Extreme may, in addition to any other
remedies it may have under law, terminate the License and any other agreements between Extreme and You.
a Immediately after any termination of the Agreement, Your licensed subscription term, or if You have for any
reason discontinued use of Licensed Materials, You shall return to Extreme the original and any copies of the
Licensed Materials and remove the Licensed Materials, including an Licensed Software, from any modular
works made pursuant to Section 3, and certify in writing that through your best efforts and to the best of
your knowledge the original and all copies of the terminated or discontinued Licensed Materials have been
returned to Extreme
b Sections 1, 7, 8, 10, 11, 12, 13, 14 and 15 shall survive termination of this Agreement for any reason.
11 EXPORT REQUIREMENTS. You are advised that the Licensed Materials, including the Licensed Software is of
United States origin and subject to United States Export Administration Regulations; diversion contrary to
United States law and regulation is prohibited. You agree not to directly or indirectly export, import or transmit
the Licensed Materials, including the Licensed Software to any country, end user or for any Use that is
prohibited by applicable United States regulation or statute (including but not limited to those countries
embargoed from time to time by the United States government); or contrary to the laws or regulations of any
other governmental entity that has jurisdiction over such export, import, transmission or Use
12 UNITED STATES GOVERNMENT RESTRICTED RIGHTS. The Licensed Materials (i) were developed solely at
private expense; (ii) contain “restricted computer software” submitted with restricted rights in accordance with
section 52.227-19 (a) through (d) of the Commercial Computer Software-Restricted Rights Clause and its
successors, and (iii) in all respects is proprietary data belonging to Extreme and/or its suppliers. For
Department of Defense units, the Licensed Materials are considered commercial computer software in
accordance with DFARS section 227.7202-3 and its successors, and use, duplication, or disclosure by the U.S.
Government is subject to restrictions set forth herein.
13 LIMITED WARRANTY AND LIMITATION OF LIABILITY. Extreme warrants to You that (a) the initially-shipped
version of the Licensed Materials will materially conform to the Documentation; and (b) the media on which the
Licensed Software is recorded will be free from material defects for a period of ninety (90) days from the date
of delivery to You or such other minimum period required under applicable law. Extreme does not warrant that
Your use of the Licensed Materials will be error-free or uninterrupted.
NEITHER EXTREME NOR ITS AFFILIATES MAKE ANY OTHER WARRANTY OR REPRESENTATION, EXPRESS
OR IMPLIED, WITH RESPECT TO THE LICENSED MATERIALS, WHICH ARE LICENSED "AS IS". THE LIMITED
WARRANTY AND REMEDY PROVIDED ABOVE ARE EXCLUSIVE AND IN LIEU OF ALL OTHER WARRANTIES,
INCLUDING IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE,
WHICH ARE EXPRESSLY DISCLAIMED, AND STATEMENTS OR REPRESENTATIONS MADE BY ANY OTHER
PERSON OR FIRM ARE VOID. IN NO EVENT WILL EXTREME OR ANY OTHER PARTY WHO HAS BEEN
INVOLVED IN THE CREATION, PRODUCTION OR DELIVERY OF THE LICENSED MATERIALS BE LIABLE FOR
SPECIAL, DIRECT, INDIRECT, RELIANCE, INCIDENTAL OR CONSEQUENTIAL DAMAGES, INCLUDING LOSS OF
DATA OR PROFITS OR FOR INABILITY TO USE THE LICENSED MATERIALS, TO ANY PARTY EVEN IF
EXTREME OR SUCH OTHER PARTY HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. IN NO
EVENT SHALL EXTREME OR SUCH OTHER PARTY'S LIABILITY FOR ANY DAMAGES OR LOSS TO YOU OR
ANY OTHER PARTY EXCEED THE LICENSE FEE YOU PAID FOR THE LICENSED MATERIALS.
Some states do not allow limitations on how long an implied warranty lasts and some states do not allow the
exclusion or limitation of incidental or consequential damages, so the above limitation and exclusion may not
apply to You. This limited warranty gives You specific legal rights, and You may also have other rights which
vary from state to state.
14 JURISDICTION. The rights and obligations of the parties to this Agreement shall be governed and construed in
accordance with the laws and in the State and Federal courts of the State of California, without regard to its
rules with respect to choice of law. You waive any objections to the personal jurisdiction and venue of such
courts. None of the 1980 United Nations Convention on the Limitation Period in the International Sale of Goods,
and the Uniform Computer Information Transactions Act shall apply to this Agreement
15 FREE AND OPEN SOURCE SOFTWARE. Portions of the Software (Open Source Software) provided to you may
be subject to a license that permits you to modify these portions and redistribute the modifications (an Open
Source License). Your use, modification and redistribution of the Open Source Software are governed by the
terms and conditions of the applicable Open Source License. More details regarding the Open Source Software
and the applicable Open Source Licenses are available at www.extremenetworks.com/services/
SoftwareLicensing.aspx. Some of the Open Source software may be subject to the GNU General Public License
v.x (GPL) or the Lesser General Public Library (LGPL), copies of which are provided with the Licensed Materials
and are further available for review at www.extremenetworks.com/services/SoftwareLicensing.aspx, or upon
request as directed herein. In accordance with the terms of the GPL and LGPL, you may request a copy of the
relevant source code. See the Software Licensing web site for additional details. This offer is valid for up to
three years from the date of original download of the software.
16 GENERAL.
a This Agreement is the entire agreement between Extreme and You regarding the Licensed Materials, and all
prior agreements, representations, statements, and undertakings, oral or written, are hereby expressly
superseded and canceled.
b This Agreement may not be changed or amended except in writing signed by both parties hereto.
c You represent that You have full right and/or authorization to enter into this Agreement.
d This Agreement shall not be assignable by You without the express written consent of Extreme. The rights of
Extreme and Your obligations under this Agreement shall inure to the benefit of Extreme’ assignees,
licensors, and licensees.
e Section headings are for convenience only and shall not be considered in the interpretation of this
Agreement
f The provisions of the Agreement are severable and if any one or more of the provisions hereof are judicially
determined to be illegal or otherwise unenforceable, in whole or in part, the remaining provisions of this
Agreement shall nevertheless be binding on and enforceable by and between the parties hereto
g Extreme’s waiver of any right shall not constitute waiver of that right in future. This Agreement constitutes
the entire understanding between the parties with respect to the subject matter hereof, and all prior
agreements, representations, statements and undertakings, oral or written, are hereby expressly superseded
and canceled. No purchase order shall supersede this Agreement.
h Should You have any questions regarding this Agreement, You may contact Extreme at the address set forth
below. Any notice or other communication to be sent to Extreme must be mailed by certified mail to the
following address:
Extreme Networks, Inc.
16480 Via Del
San Jose, CA 95119 United States
Tel: +1 408-579-2800
Toll-free: +1 888-257-3000
Extreme Networks’ WiNG 5 operating system is the next generation in the evolution of WLAN
architectures. WiNG 5 OS is designed to scale efficiently from the smallest networks to large,
geographically dispersed deployments. The co-operative, distributed control plane innovation in the WiNG
5 architecture offers a software-defined networking (SDN)-ready operating system that can distribute
controller functionality to every Access Point in your network. Now, every Access Point is network aware,
providing the intelligence required to truly unleash optimal performance, all wireless LAN infrastructure can
work together to ensure every transmission is routed through the most efficient path, every time.
WiNG 5 brings you the resiliency of a standalone Access Point network without the vulnerability of a
centralized controller, with advancements that take performance, reliability, security, scalability and
manageability to a new level. The result? Maximum network uptime and security with minimal
management. And true seamless and dependable mobility for your users.
Comprehensive Wi-Fi support - WiNG supports all Wi-Fi protocols, including 802.11a/b/g/n/ac, allowing you
to create a cost-effective migration plan based on the needs of your business.
Extraordinary scalability - With WiNG, you can build any size network, from a small WLAN network in a
single location to a large multi-site network that reaches all around the globe.
Extraordinary flexibility - No matter what type of infrastructure you deploy, WiNG 5 delivers intelligence to
all: standalone independent Access Points or adaptive Access Points that can be adopted by a controller
but can switch to independent mode; virtual controllers; physical controllers in branch offices, the network
operating center (NOC) or the cloud.
The power of distributed intelligence - WiNG distributes intelligence right to the network edge, empowering
every controller and Access Point with the intelligence needed to be network-aware, able to identify and
dynamically route traffic over the most efficient path available at that time.
Extraordinary network flexibility and site survivability - WiNG provides the best of both worlds: true
hierarchical management that delivers a new level of management simplicity and resiliency by enabling
controllers to adopt and manage other controllers and Access Points, while allowing adopted infrastructure
to also stand on its own.
Gap-free security - When it comes to security, there can be no compromises. WiNG’s comprehensive
security capabilities keep your network and your data safe, ensuring compliance with PCI, HIPAA and other
government and industry security regulations.
Connectivity for the largest indoor and outdoor spaces - In addition to enabling a robust indoor WLAN, our
patented MeshConnex™ technology enables the extension of Wi-Fi networks to the largest of outdoor
spaces from an expansive outdoor campus environment to an entire city.
Powerful centralized management - With WiNG you get complete control over every aspect of your WLAN.
This single powerful windowpane enables zero touch infrastructure deployment, rich analytics that can help
you recognize and correct brewing issues before they impact service quality and user connectivity, along
with centralized and remote troubleshooting and issue resolution of the entire network.
Application Visibility and Control - With WiNG you get visibility & control over Layer-7 applications with an
embedded DPI engine at the Access Point. Extreme Networks’ NSight (an add-on module to WiNG)
provides real-time visibility and in-depth insight into every dimension of the network including layer-7
application visibility, client devices, device & OS types and users. At a glance the administrator can discern
the top applications by usage or by count at every level of the network from site level to Access Points and
clients. This is achieved by Deep Packet Inspection (DPI) of every flow of every user at the Access Point.
The embedded DPI engine in the WiNG OS can detect and identify thousands of applications real time and
report to NSight. In addition to detection, firewall and QOS policies can leverage the application context to
enforce policies.
WiNG 5 enables all WLAN infrastructure with the intelligence required to work together to determine the
most efficient path for every transmission. The need to route all traffic through a controller is eliminated,
along with the resulting congestion and latency, resulting in higher throughput and superior network
performance. Since all features are available at the access layer, they remain available even when the
controller is offline, for example, due to a WAN outage, ensuring site survivability and extraordinary
network resilience. In addition, you get unprecedented scalability, large networks can support as many as
10,000 nodes without impacting throughput or manageability, providing unprecedented scalability.
WiNG 5 enables the creation of highly reliable networks, with several levels of redundancy and failover
mechanisms to ensure continuous network service in case of outages. APs in remote sites coordinate with
each other to provide optimized routing and self-healing, delivering a superior quality of experience for
business critical applications. Even when WiNG 5 site survivable APs lose communication with the
controller, they continue to function, able to bridge traffic while still enforcing QoS and security policies,
including stateful inspection of Layer2 (locally bridged) or Layer 3 traffic.
When it comes to wireless security, one size does not fit all. A variety of solutions are required to meet the
varying needs and demands of different types of organizations. Regardless of the size of your WLAN or
your security requirements, our tiered approach to security allows you to deploy the features you need to
achieve the right level of security for your networks and your data. And where a hub-and-spoke
architecture can’t stop threats until they reach the controller inside your network, WiNG 5 distributes
security features to every access point, including those at the very edge of your network, creating an
around-the-clock constant network perimeter guard that prevents threats from entering your network for
unprecedented gap free security.
When you need to extend your wireless LAN to outdoor spaces, our patented MeshConnex technology
combines with comprehensive mesh networking features to enable you to create secure, high performance,
flexible and scalable mesh networks. With our mesh technology, you can cover virtually any area without
installing cabling, enabling the creation of cost-effective outdoor wireless networks that can provide
coverage to enterprise workers in vast campus-style environments as well as public safety personnel in
patrol cars.
WiNG 5 integrates network services like built-in DHCP server, AAA server and routing protocols like policy
based routing and OSPF, Layer 2 protocols like MSTP and Link Aggregation. Integration of services and
routing/ switching protocols eliminates the need for additional servers or other networking gear in small
offices thereby reducing Total Cost of Ownership (TCO). In large networks, where such services are
deployed on a dedicated server/ router at the NOC, this provides a backup solution for remote sites when
the WAN link to the NOC is temporarily lost. Integrating also provides the added benefit of coordination
across these services on failover from primary to standby, assisting a more meaningful behavior, rather
than when each fails over independently of the other for the same root cause.
The WiNG software contains a Web UI allowing network administrators to manage and view Access Point,
controller and service platform settings, configuration data and status. This Graphical User Interface (GUI)
allows full control of all administration features.
Access Points, controllers and service platforms also share a Command Line Interface (CLI) for managing and
viewing settings, configuration and status. For more information on the command line interface and a full list
of available commands, refer to the Wireless Services CLI Reference Guide available at
www.extremenetworks.com/support.
For information on how to access and use the Web UI, see:
• Accessing the Web UI
• Glossary of Icons Used
Access Points, controllers and service platforms use a UI accessed using any supported Web browser on a
client connected to the subnet the Web UI is configured on.
The following browsers are required to access the WiNG Web UI:
• Firefox 3.5 or higher
• Internet Explorer 7 or higher
• Google Chrome 2.0 or higher
• Safari 3 and higher
• Opera 9.5 and higher
NOTE: Throughout the Web UI leading and trailing spaces are not allowed in any
text fields. In addition, the “?” character is also not supported in text fields.
Once the computer has an IP address, point the browser to: https://192.168.0.1/ and the following login screen
will display.
The UI uses a number of icons used to interact with the system, gather information, and obtain status for the
entities managed by the system. This chapter is a compendium of the icons used. This chapter is organized as
follows:
• Global Icons
• Dialog Box Icons
• Table Icons
• Status Icons
• Configurable Objects
• Configuration Objects
• Configuration Operation Icons
• Access Type Icons
• Administrative Role Icons
• Device Icons
Add – Select this icon to add a row in a table. When selected, a new row is created
in the table or a dialog box displays where you can enter values for a particular list.
Delete – Select this icon to remove a row from a table. When selected, the selected
row is deleted.
Trash – Select this icon to remove a row from a table. When selected, the row is
immediately deleted.
Create new policy – Select this icon to create a new policy. Policies define different
configuration parameters that can be applied to individual device configurations,
profiles and RF Domains.
Edit policy – Select this icon to edit an existing configuration item or policy. To edit
a policy, select a policy and this icon.
Entry Update – States that an override has been applied to a device profile
configuration.
Mandatory Field – Indicates this control value is a mandatory configuration item. You
are not allowed to proceed further without providing all mandatory values in this
dialog.
Error in Entry – Indicates there is an error in a supplied value. A small red popup
provides a likely cause of the error.
Table Row Added – Indicates a new row has been added to a table and the change
is not implemented until saved. This icon represents a change from this device’s
profile assigned configuration.
Error – Indicates an error exits requiring intervention. An action has failed, but the
error is not system wide.
Warning – States a particular action has completed, but errors were detected that
did not prevent the process from completing. Intervention might still be required to
resolve subsequent warnings.
Success – Indicates everything is well within the network or a process has completed
successfully without error.
Information – This icon always precedes information displayed to the user. This may
either be a message displaying progress for a particular process, or just be a
message from the system.
Critical Resource Policy – States a critical resource policy has been applied. Critical
resources are resources whose availability is essential to the network. If any of these
resources is unavailable, an administrator is notified.
WLAN QoS Policy – States a quality of service policy (QoS) configuration has been
impacted.
Radio QoS Policy – Indicates a radio’s QoS configuration has been impacted.
Association ACL – Indicates an Access Control List (ACL) configuration has been
impacted. An ACL is a set of configuration parameters either allowing or denying
access to network resources.
Smart RF Policy – States a Smart RF policy has been impacted. Smart RF enables
neighboring Access Point radios to take over for an Access Point radio if it becomes
unavailable. This is accomplished by increasing the power of radios on nearby Access
Points to compensate for the coverage hole created by the non-functioning Access
Point.
Firewall Policy – Indicates a firewall policy has been impacted. Firewalls provide a
barrier that prevents unauthorized access to resources while allowing authorized
access to external and internal resources.
IP Firewall Rules – Indicates an IP firewall rule has been applied. An IP based firewall
rule implements restrictions based on the IP address in a received packet.
MAC Firewall Rules – States a MAC based firewall rule has been applied. A MAC based
firewall rule implements network allowance restrictions based on the MAC address in
a received data packet.
Wireless Client Role – Indicates a wireless client role has been applied to a managed
client. The role could be either sensor or client.
WIPS Policy – States the conditions of a WIPS policy have been invoked. WIPS
prevents unauthorized access to the network by checking for (and removing) rogue
Access Points and wireless clients.
Captive Portals – States a captive portal is being applied. Captive portal is used to
provide temporary controller, service platform or Access Point access to requesting
wireless clients.
DNS Whitelist – A DNS whitelist is used in conjunction with captive portal to provide
access to requesting wireless clients.
DHCP Server Policy – Indicates a DHCP server policy is being applied. DHCP provides
IP addresses to wireless clients. A DHCP server policy configures how DHCP provides
IP addresses.
RADIUS Group – Indicates the configuration of RADIUS group has been defined and
applied. A RADIUS group is a collection of RADIUS users with the same set of
permissions.
RADIUS User Pools – States a RADIUS user pool has been applied. RADIUS user
pools are a set of IP addresses that can be assigned to an authenticated RADIUS user.
RADIUS Server Policy – Indicates a RADIUS server policy has been applied. A
RADIUS server policy is a set of configuration attributes used when a RADIUS server
is configured for AAA.
View Events / Event History – Defines a list of events. Click this icon to view events
or view the event history.
Core Snapshots – Indicates a core snapshot has been generated. A core snapshot is
a file that records status events when a process fails on a wireless controller or
Access Point.
Panic Snapshots – Indicates a panic snapshot has been generated. A panic snapshot
is a file that records status when a wireless controller or Access Point fails without
recovery.
View UI Logs – Select this icon/link to view the different logs generated by the UI,
FLEX and the error logs.
Commit – When selected, all changes made to the configuration are written to the
system. Once committed, changes cannot be reverted.
Commit and Save – When selected, changes are saved to the configuration.
SSH – Indicates a SSH access permission. A user with this permission is permitted to
access an associated device using SSH.
System – States system user privileges. A system user is allowed to configure general
settings, such as boot parameters, licenses, auto install, image upgrades etc.
Help Desk – Indicates help desk privileges. A help desk user is allowed to use
troubleshooting tools like sniffers, execute service commands, view or retrieve logs
and reboot the controller or service platform.
Web User – Indicates a web user privilege. A Web user is allowed accessing the
device’s Web UI.
System – This icon represents the entire WiNG supported system, and all of its
member controller, service platform or Access Points that may be interacting at any
one time.
Service Platform – This icon indicates an NX5500, NX7500, or NX9000 series service
platform that’s part of the managed network
Wireless Controller – This icon indicates a RFS6000 wireless controller that’s part of
the managed network.
Wireless Controller – This icon indicates a RFS6000 wireless controller that’s part of
the managed network.
Access Point – This icon lists any Access Point that’s part of the managed network.
Wireless Client – This icon defines any wireless client connection within the network.
WiNG controllers and service platforms utilize an initial setup wizard to streamline getting on the network
for the first time. This wizard configures location, network and WLAN settings and assists in the discovery
of Access Points and their connected clients.
Once deployed and powered on, complete the following to get the controller or service platform up and
running and access more advanced user interface functions:
1 Connect one end of an Ethernet cable to a port on the front of the controller or service platform, and
connect the other end to a computer with a working Web browser.
2 Set the computer to use an IP address between 192.168.0.10 and 192.168.0.250 on the connected port.
Set a subnet/network mask of 255.255.255.0.
3 Once the computer has an IP address, point the Web browser to: https://192.168.0.1/. The following login
screen displays.
NOTE: When logging in for the first time, you are prompted to change the
password to enhance device security in subsequent logins.
NOTE: If you get disconnected when running the wizard, you can connect again
and resume the wizard setup.
NOTE: While you can scroll to any page in the Navigation Panel at any time, you
cannot complete the wizard until each task in the Navigation Panel has a green
checkmark displayed to the left of the task.
11 Select Next. The wizard displays the Networking Mode screen to define routing or bridging functionality.
15 Select Next. If Router was selected as the Access Point mode the wizard displays the WAN
Configuration screen. If Bridge was selected, the wizard proceeds to the Wireless LAN Setting screen.
The dashboard enables administrators to review and troubleshoot network device operation. Additionally, the
dashboard allows an administrative review of the network’s topology, an assessment of network’s component
health and a diagnostic review of device performance.
By default, the Dashboard displays the System screen, which is the top level in the device hierarchy. To view
information for Access Points, RF Domains or Controllers select the associated item in the tree.
4.1 Summary
The Dashboard displays information organized by device association and inter-connectivity between the connected
Access Points and wireless clients.
1 To review dashboard information, select Dashboard.
2 Select Summary if it’s not already selected by default.
The Dashboard displays the Health tab by default.
The Search option, at the bottom of the screen, enables you to filter (search amongst) RF Domains. The By drop-
down menu refines the search. You can further refine a search using the following:
• Auto – The search is automatically set to device type.
• Name – The search is performed for the device name specified in the Search text box.
• WLAN – The search is performed for the WLAN specified in the Search text box.
• IP Address – The search is performed for the IP Address specified in the Search text box.
• MAC Address – The search is performed for the MAC Address specified in the Search text box.
The System screen displays system-wide network status. The screen is partitioned into the following tabs:
• Health – The Health tab displays information about the state of the WiNG device managed system.
• Inventory – The Inventory tab displays information on the physical devices managed within the WiNG
wireless network.
4.2.1 Health
Health
The Health tab displays device performance status for managed devices, and includes their RF Domain
memberships.
4.2.2 Inventory
System Screen
The system screen’s Inventory tab displays granular data on specific devices supported within the network. The
screen provides a complete overview of the number and state WiNG managed devices. Information is displayed in
easy to read tables and graphs. This screen also provides links for more detailed information.
RF Domains allow administrators to assign configuration data to multiple devices deployed in a common coverage
area, such as in a floor, building or site. Each RF Domain contains policies that can determine a Smart RF or WIPS
configuration.RF Domains enable administrators to override WLAN SSID name and VLAN assignments. This
enables the deployment of a global WLAN across multiple sites and unique SSID name or VLAN assignments to
groups of Access Points servicing the global WLAN. This WLAN override technique eliminates the requirement for
defining and managing a large number of individual WLANs and profiles.
A configuration contains (at a minimum) one default RF Domain and can optionally use additional user defined RF
Domains:
• Default RF Domain - Automatically assigned to each controller or service platform and associated Access
Point by default.
• User Defined RF Domains - Created by administrators and manually assigned to individual controller or
service platforms, but can be automatically assigned to Access Points using adoption policies.
Each controller and service platform is assigned to only one RF Domain at a time. However, a user defined RF
Domain can be assigned to multiple controllers or service platforms as required. User defined RF Domains can be
manually assigned or automatically assigned to Access Points using an AP provisioning policy.
The RF Domain screen displays system-wide network status. The screen is partitioned into the following tabs:
• RF Domain Health – The Health tab displays information about the state of the RF Domain and network
performance as tallied from its collective device members.
• RF Domain Inventory – The Inventory tab displays information on the physical devices comprising the RF
Domain.
• The Client Quality table displays RF quality for the worst five performing clients.It is a function of the transmit
retry rate in both directions and the error rate. This area of the screen displays the average quality index across
all the defined RF Domain on the wireless controller. The quality is measured as:
• 0-20 - Very poor quality
• 20-40 - Poor quality
• 40-60 - Average quality
• 60-100 - Good quality
6 Select a client to view its statistics in greater detail.
• WLAN Utilization displays how efficiently the WLANs are used. Traffic utilization is defined as the
percentage of current throughput relative to the maximum possible throughput for the WLAN. The total
number of WLANs is displayed above the table. The table displays a list of the top five WLANs in terms of
overall traffic utilization. It displays the utilization level names, WLAN name and SSIDs for each of the top
five WLANs.
• Radio Traffic Utilization displays how efficiently the RF medium is used. Traffic utilization is defined as the
percentage of current throughput relative to the maximum possible throughput for the RF Domain. The
Traffic Index area displays an overall quality level for radio traffic and the Max User Rate displays the
maximum data rate of associated radios. The table displays a list of the top five radios in terms of overall
traffic utilization quality. It displays the radio names, MAC Addresses and radio types for each of the top five
radios.
• Client Traffic Utilization displays how efficiently the RF medium is utilized for connected clients. Traffic
utilization is defined as the percentage of current throughput relative to the maximum possible throughput
for the clients in the RF Domain. The table displays a list of the top five performing clients in respect to
overall traffic utilization. It displays the client names, MAC Addresses and vendor for each of the top five
clients.
• Wireless Security displays the overall threat index for the system. This index is based on the number of
Rogue/Unsanctioned APs and Wireless Intrusion Protection System (WIPS) events detected. The index is in
the range 0 - 5 where 0 indicates there are no detected threats. An index of 5 indicates a large number of
intrusion detection events or rogue/unsanctioned APs detected.
• Traffic Statistics include transmit and receive values for Total Bytes, Total Packets, User Data Rate,
Broadcast/Multicast Packets, Management Packets, Tx Dropped Packets and Rx Errors.
• The Clients by Band table displays the radio band utilization of connected RF Domain member clients.
Assess whether the client band utilization adequately supports the intended radio deployment objectives of
the connected RF Domain member Access Point radios.
• The Clients of Channel table displays a bar-graph of wireless clients classified by their frequency. Information
for each channel is further classified by their 802.11x band. In the 5GHz channel, information is displayed
classified under 802.11a and 802.11an bands. In the 2.4 GHz channel, information is displayed classified under
802.11b, 802.11bg, and 802.11bgn band.
4.4 Controller
The Wireless Controller screen displays system collected network status for controllers and service platforms. The
screen is partitioned into two tabs:
• Controller Health – The Health tab displays information about the state of the controller or service platform
managed wireless network.
• Controller Inventory – The Inventory tab displays information on the physical devices managed by the
controller or service platform.
NOTE: A T5 controller can also be selected from the dashboard’s controller level to
display a set of unique T5 dashboard screens. A T5 controller uses a different
operating system to manage its connected radio devices, as opposed to the WiNG
operating used by RFS controllers and NX service platforms. However, a T5
controller, once enabled as a supported external device, can provide data to WiNG
to assist in a T5’s management within a WiNG supported subnet populated by both
types of devices. For information on enabling controller adoption of external
devices (for T5 support specifically) refer to, Adoption Overrides (Controllers
Only) on page 5-48.
The Adopted Devices Health (w/ cluster members) displays a graph of Access Points in the system with the
available Access Points in green and unavailable Access Points in red.
The Radio RF Quality Index provides a table of RF quality on a per radio basis. It is a measure of the overall
effectiveness of the RF environment displayed in percentage. It is a function of the connect rate in both
directions, the retry rate and the error rate. The screen displays the average quality index within the Access
Point single radio. The table lists bottom five (5) of the RF quality values by Access Point radio. The quality is
measured as:
• 0-20 - Very poor quality
• 20-40 - Poor quality
• 40-60 - Average quality
• 60-100 - Good quality
6 Select a radio Id to view statistics in greater detail.
The Radio Utilization table displays how efficiently the RF medium is used. Radio utilization is defined as the
percentage of current throughput relative to the maximum possible throughput for the radio. The Radio
Utilization table displays the Access Point radios in terms of the number of associated wireless clients and the
percentage of utilization. It also displays a table of packets types transmitted and received.
The Client RF Quality Index displays a table of RF quality on a per client basis. It is a measure of the overall
effectiveness of the RF environment displayed in percentage. It is a function of the connect rate in both
directions, the retry rate and the error rate. This area of the screen displays the average quality index for a
client. The table lists bottom five (5) of the RF quality values by a client. Quality is measured as:
• 0-20 - Very poor quality
• 20-40 - Poor quality
• 40-60 - Average quality
• 60-100 - Good quality
7 Select a client MAC to view all the statistics for the selected client in greater detail.
The Inventory tab displays information on the devices managed by the controller or service platform. The
Inventory screen enables an administrator to overview of the number and state of controller or service platform
managed devices and their utilization. Refer to the following Inventory data:
• The Device Types field displays a ratio of devices managed by this controller or service platform in pie chart
format. The Device Type area displays an exploded pie chart that displays the type of device and their
numbers in the current system.
• The Radios Type field displays the total number of radios managed by this controller or service platform. The
graph lists the number of radios in both the 2.4 GHz and 5 GHz radio bands.
• The Wireless Clients table lists clients managed by this controller or service platform by connected client
count. Information is presented in two (2) tables and a graph. The first table lists the total number of clients
managed by the listed controller or service platform. The second lists the top five (5) radios in terms of the
number of connected clients. The graph just below the table lists the number of clients by radio type.
• The WLAN Utilization table displays utilization statistics for controller or service platform WLAN
configurations. Information displays in two tables. The first table lists the total number of WLANs managed
by this system. The second table lists the top five (5) WLANs in terms of the usage percentage along with
the name and network identifying SSID.
The Customer Premises Equipment (CPEs) are the T5 managed radio devices. These CPEs use Digital
Subscriber Line (DSL) as their high speed Internet access mechanism using the CPE’s physical wallplate
connection and phone jack.
DSL Average Lists each CPE’s DSL name and its average response time in microseconds.
Response Time Use this data to assess whether a specific DSL is experiencing response
latency negatively impacting performance.
DSL Downstream Displays each listed DSL’s number of coding violations as a measure of
Coding Violations erroneous data degrading the DSL’s performance within the T5’s network
coverage area.
DSL Utilization Lists each CPE’s DSL name and its transmit utilization by percentage of
overall load.
DSL Downstream Displays each listed DSL’s eroded seconds, as a negative measure of
Severely Eroded delivery latency degrading the DSL’s performance within the T5’s network
Seconds coverage area.
DSL Status Lists the name of the DSL utilized on T5 managed CPE devices, and their
downstream (transmit) data rate (in Mbps) and downstream throughput
margin (in dB).
CPE Reset The a selected CPE’s number of resets. A reset renders the CPE offline until
completed, and consequently should be carefully tracked to ensure
consistent online availability amongst CPEs in the same radio coverage
area.
7 Select a T5 device from amongst the devices listed in the dashboard’s controller level, and right click the arrow
to the right to list an additional menu of diagnostic activities that can be administrated for the selected T5
device.
10 Select Apply to save the T5 device firmware connection protocol settings. Select Close to exit the Firmware
Upgrade popup.
11 Select Reload to administrate current and next boot version available to the selected T5 device.
Next Boot Use the drop-down menu to specify whether the next boot is the primary
or secondary firmware image.
Next Boot Version Lists this version used the next time the T5 managed radio device is
booted.
13 Select Reload to apply the current and next boot settings to a T5 update. Select Close to exit the Reload
popup.
14 Expand the CPE Management item from the T5 dashboard and select CPE Reload. Customer Premises
Equipment (CPE) are the T5 managed radio devices.
16 Select Reload to make available the selected firmware images(s) to the T5 in advance of initiating device
upgrades. Select Close to exit the Reload popup.
17 Expand the CPE Management item from the T5 dashboard and select Firmware Upgrade to apply the defined
upgrade settings to the selected T5’s managed CPE devices.
19 Select Upgrade to initiate the update from the T5 to the selected CPE device(s). Select Close to exit the
Firmware Upgrade popup.
20 Expand the CPE Management item from the T5 dashboard and select Set LED State to administrate the LED
behavior of the T5 managed CPE devices.
21 Use the Set LED State screen to set the LED behavior T5 managed CPE devices.
Select all CPEs Select this option to apply the administrated LED state to each T5
managed CPE device.
Enter CPE Number If wanting to set a specific T5 managed CPE LED, use the spinner control to
set the CPE to be impacted by the ELD state setting. This setting could be
quite useful in deployments where a specific CPE’s LED illumination could
be disruptive (such as a hospital etc.). This option is enabled only when
Select all CPEs is disabled.
Set LED State Define whether the LEDs remain on or off for the selected T5 managed
CPE devices. The default setting is On.
22 Select Start LED State to initiate the LED behavior updates to the selected T5 managed CPE device(s). Select
Close to exit the Set LED State popup.
23 Select T5 File Management to set the Source and Destination addresses used for T5 device configuration file
updates.
24 Set the following T5 File Management Source and/or Destination transfer protocols and address information.
Options differ depending on selected Copy, Rename or Delete file management action.
Selected Action Select Copy to enable parameters where the correct source and destination
T5 device port, host IP address and directory path must be specified. Select
Rename to correctly provide the source and destination directory paths of
a renamed T5 configuration file. Select Delete to define the correct
directory path of a target T5 configuration file to delete and remove. The
default setting is Copy.
Protocol Select the FTP or TFTP communication protocol used for updating T5 file
transfers. This option is only available when Copy is the selected action.
Port Use the spinner control, or manually set, the T5 device port used by the
selected transfer protocol. This option is only available when Copy is the
selected action.
Host Provide the numeric IP address of the resource used to update the CPE
device firmware. This option is only available when Copy is the selected
action.
Path/File Specify the correct directory path to the location(s) of the source and
destination T5 device addresses. This option is only available when Copy is
the selected action.
Source If Renaming or Deleting a T5 configuration file, correctly enter the directory
path of the target file to be renamed or deleted.
Destination If Renaming a T5 configuration file, correctly enter the directory path of the
target file to be renamed.
25 Select OK to apply the selected file management action. Select Close to exit the T5 File Management popup.
Going forward NX9600, NX9500, NX7500, NX5500 WiNG managed services platforms and WiNG VMs can
discover, adopt and partially manage EX3500 series Ethernet switches, as DHCP option 193 has been added to
support external device adoption. DHCP option 193 is a simplified form of DHCP options 191 and 192 used by WiNG
devices currently. DHCP option 193 supports pool1, hello-interval and adjacency-hold-time parameters.
When adopted to a managing controller or service platform, an EX3500 switch can display a unique dashboard
helpful to administrators to better assess the interoperability of the selected EX3500 with its connected controller
or service platform.
6 Refer to the following System information to assess dashboard information for the selected EX3500 switch.
System Name Displays the administrator assigned system name of the selected EX3500
switch.
System Object ID Lists the numeric ID used to determine the monitoring capabilities of the
EX3500 switch.
System Contact Lists the EX3500 switch administrative contact assigned to respond to
events created by, or impacting, this selected EX3500 switch and the RF
Domain devices it helps support.
System Description Displays the administrator defined system description provided by the
administrator upon initial deployment of this particular EX3500 switch.
System Location Lists a 255 character maximum EX3500 switch location reflecting the
switch’s physical deployment location.
System Up Time Displays the cumulative time since this EX3500 was last rebooted or lost
power.
MAC Address (Unit Lists the factory encoded MAC address of the selected EX3500 as its
1) hardware identifier.
Web Server Port Displays the Web server port the EX3500 is using. Port 80 is the default
port the Web server expects to listen to.
Web Server Lists whether the Web server facility is enabled/disabled between this
selected EX3500 switch and its connected controller or service platform. A
Web server is a program using a client/server model and the Hypertext
Transfer Protocol (HTTP) to serve files forming Web pages to Web
resource requesting clients.
Web Secure Server Lists the numeric virtual server port providing secure Web resources with
Port the selected EX3500. Any system with multiple open ports, multiple
services and multiple scripting languages is vulnerable simply because it
has so many points of entry to watch. The secure open port has been
specifically designated and utilizes the latest security patches and
updates.
Web Secure Server Lists whether the secure Web server functionality has been enabled or
disabled for the selected EX3500’s management session with the WiNG
controller or service platform.
Jumbo Frame Lists whether support for jumbo Ethernet frames with more than 1500
bytes of payload has been enabled or disabled. Jumbo frames support up
to 9000 bytes, but variations must be accounted for. Many Gigabit
Ethernet switches and Gigabit Ethernet network interface cards support
jumbo frames. Some Fast Ethernet switches and Fast Ethernet network
interface cards also support jumbo frames.
Telnet Server Port Lists the numeric Telnet server port used with the selected EX3500’s
session with the WiNG controller or service platform to test for open
ports. The listed port is the port number where the server is listening.
Telnet Server Displays whether Telnet functionality is currently enabled or disabled for
the selected EX3500 switch.
7 Refer to the Upgrade field to assess the EX3500’s current firmware and upgrade configuration status.
Filename Lists the target firmware file queued for subsequent uploads to the
selected EX3500 switch.
Path Lists the complete relative path to the EX3500 switch firmware file
defined for subsequent upgrades.
Status‘ Lists whether a device firmware upgrade is currently enabled and queued
for the selected EX3500 or is currently disabled.
Reload Status Displays the selected EX3500’s current firmware reload status.
Periodically select Refresh to update the statistics counters to their latest values.
The Access Point screen displays system-wide network status for standalone or controller connected Access
Points. The screen is partitioned into the following tabs:
• Access Point Health – The Health tab displays information about the state of the Access Point managed
network.
• Access Point Inventory – The Inventory tab displays information on the physical devices managed within the
Access Point managed network.
The Device Detail field displays the following information about the selected Access Point:
• Hostname - Lists the administrator assigned name of the selected Access Point.
• Device MAC - Lists the factory encoded MAC address of the selected Access Point.
• Primary IP Address - Lists the IP address assigned to the Access Point as a network identifier.
• Type - Indicates the Access Point model type. An icon representing the Access Point is displayed along with
the model number.
• RF Domain Name - Lists the RF Domain to which the Access Point belongs. The RF Domain displays as a link
that can be selected to display Access Point RF Domain membership data in greater detail.
• Model Number - Lists the specific model number of the Access Point.
• Version - Lists the version of the firmware running on the Access Point. Compare this version against the
version currently on the support site to ensure the Access Point has the latest feature set available.
• Uptime - Displays the duration the Access Point has been running from the time it was last restarted.
• CPU - Displays the CPU installed on this Access Point.
• RAM - Displays the amount of RAM available for use in this system.
• System Clock - Displays the current time on the Access Point.
• The Radio RF Quality Index displays a table of RF quality per radio. It is a measure of the overall
effectiveness of the RF environment displayed in percentage. It is a function of the connect rate in both
directions, the retry rate and error rate. The quality is measured as:
The Network View functionality displays device association connectivity amongst controllers, service platforms,
Access Point radios and wireless clients. This association is represented by a number of different graphs.
To review the wireless controller’s Network Topology, select Dashboard > Network View.
The middle field displays a Network View, or graphical representation of the network. Nodes display whether or
not they are members of a cluster or mesh domain. Use this information to assess whether the topology of the
network has changed in such a manner that devices need to be added or moved. This field changes to display a
graphical network map.
Use the Lock / Unlock icon in the upper right of the screen to prevent users from moving APs around within the
specified area.
An administrator has the ability to select a RF Domain and capture connected client debug messages at an
administrator assigned interval and location. Client debug information can either be collected historically or in real-
time.
To troubleshoot issues with wireless client connectivity within a controller, service platform or Access Point
managed RF Domain:
1 Select Dashboard.
2 Expand the System node to display controller, service platform or Access Point managed RF Domains.
3 Select and expand a RF Domain and click on the down arrow to the right of the RF Domain’s name
4 Select Troubleshooting.
5 Select Debug Wireless Clients.
Select Debug Select All Debug Messages, to display all wireless client debug information
Messages for the selected wireless clients on the current RF Domain. Choose Selected
Debug Messages to specify which types of wireless client debug messages
to display. If the Selected Debug Messages radio button is selected, you can
display information for any combination of the following:
- 802.11 Management
- EAP
- Flow Migration
- RADIUS
- System Internal
- WPA/WPA2
Wireless Clients Select All Wireless Clients to display debug information for all wireless
clients currently associated to the current RF Domain. Choose Selected
Wireless Clients to display information only for specific wireless clients
(between 1 and 3). If the Selected Wireless Clients radio button is selected
enter the MAC address for up to three wireless clients. The information
displayed or logged to the file will only be from the specified wireless
clients.
Duration of Use the spinner controls to select how long to capture wireless client
Message Capture debug information. This can range between 1 second and 24 hours, with the
default value being 1 minute.
Maximum Events Use the spinner controls to select the maximum number of debug
Per Wireless Client messages displayed per wireless client. Set the number of messages from 1
- 9999 events with the default value being 100 events.
File Location When the Send Data To field is set to File, the File Location configuration
displays below the configuration section. If Basic is selected, enter the URL
in the following format:
URL Syntax:
tftp://<hostname|IP>[:port]/path/file
ftp://<user>:<passwd>@<hostname|IP>[:port]/path/file
When all configuration fields are complete, select Start to start the wireless client debug capture. If information is
being sent to the screen it displays in the Live Wireless Debug Events section. If the data is being sent to a file,
that file populates with remote debug information. If you have set a long message capture duration and wish to
end the capture early, select Stop.
An administrator can select a RF Domain and capture captive portal client and authentication debug messages at
an administrator assigned interval and location. Captive portal debug information can either be collected
historically or in real-time.
7 Select Debug Message settings to refine how captive portal client debug messages are trended:
All Debug Messages Select this option to capture all captive portal client and captive portal
authentication request events collectively without filtering by type.
Select Debug Choose Selected Debug Messages to specify the type of captive portal
Messages event messages to display. Options include captive portal client events and
events specific to captive portal authentication requests.
8 Set Captive Portal Clients filter options to refine which clients are included in the debug messages.
All Captive Portal Select All Captive Portal Clients to display debug information for each client
Clients utilizing a captive portal for network access within the selected RF Domain.
Select Captive Optionally display captive portal debug messages for specific clients (1 - 3).
Portal Clients (up to Enter the MAC address for up to three wireless clients. The information
3) displayed or logged to the file is only from the specified wireless clients.
Change the client MAC addresses as needed when clients are no longer
utilizing the RF Domain’s captive portal resources.
9 Define the following captive portal client Settings to determine how messages are trended:
Duration of Use the spinner controls to set the message capture interval for captive
Message Capture portal debug information. This can range between 1 second and 24 hours.
Maximum Events Use the spinner controls to select the maximum number of captive portal
Per Captive Portal event messages displayed per RF Domain member client. Set the number
Client of messages from 1 - 9999 events with the default value being 100 events.
10 When all configuration fields are complete, select Start to start the captive portal client debug message
capture. Information sent to the screen displays in the Live Captive Portal Debug Events field. If you have set a
long message capture duration and wish to end the capture early, select Stop.
An administrator can capture connected client packet data based on the packet’s address type or port on which
received. Dropped client packets can also be trended to assess RF Domain client connectivity health.
Filter (MAC, IP, Filter packet captures based on specific criteria. Select one or more of the
Protocol, Port) following and specify the relevant information:
- Filter by MAC
- Filter By IP
- IP Protocol
- Port
Maximum Packet Set the Maximum Packet Count to limit the number of packets captured for
Count trending. Set this value between 1 - 10000 packets, with a default value of
200.
7 Select Start to begin the packet capture. Information sent to the screen displays in the lower portion of the
window. If the data is being sent to a file, that file populates with the packet capture information. If you have
set a long message capture duration and wish to end the capture early, select Stop.
Managed devices can either be assigned unique configurations or have existing RF Domain or Profile
configurations modified (overridden) to support a requirement that dictates a device’s configuration be
customized from the configuration shared by its profiled peer devices.
When a device is initially managed by the controller or service platform, it requires several basic configuration
parameters be set (system name, deployment location etc.). Additionally, the number of permitted device licenses
needs to be accessed to determine whether a new Access Point can be adopted.
Refer to the following to set a device’s basic configuration, license and certificate usage:
• Basic Configuration
• Basic Device Configuration
• Auto Provisioning Policies
• Managing an Event Policy
• Managing MINT Policies
RF Domains allow administrators to assign configuration data to multiple devices deployed in a common coverage
area (floor, building or site). In such instances, there’s many configuration attributes these devices share as their
general client support roles are quite similar. However, device configurations may need periodic refinement
(overrides) from their original RF Domain administered design. For more information, see RF Domain Overrides on
page 5-32.
Profiles enable administrators to assign a common set of configuration parameters and policies to controller or
service platforms and Access Points. Profiles can be used to assign shared or unique network, wireless and security
parameters to wireless controllers and Access Points across a large, multi segment, site. The configuration
parameters within a profile are based on the hardware model the profile was created to support. The controller
and service platform supports both default and user defined profiles implementing new features or updating
existing parameters to groups of controllers, service platforms or Access Points.
However, device profile configurations may need periodic refinement from their original administered
configuration. Consequently, a device profile could be applied an override from the configuration shared amongst
numerous peer devices deployed within a particular site. For more information, see Profile Overrides on page 5-38.
Adoption is the process an Access Point uses to discover controller or service platforms available in the network,
pick the most desirable, establish an association, obtain its configuration and consider itself provisioned.
At adoption, an Access Point solicits and receives multiple adoption responses from available controllers or service
platforms on the network. Modify existing adoption policies or create a new one as needed to meet the adoption
requirements of a device and its assigned profile. For more information, see Auto Provisioning Policies on page 5-
268.
Lastly, use Configuration > Devices to define and manage a critical resource policy. A critical resource policy
defines a list of device IP addresses on the network (gateways, routers etc.). The support of these IP address is
interpreted as critical to the health of the network. These devices addresses are pinged regularly by the controller
or service platform. If there’s a connectivity issue, an event is generated stating a critical resource is unavailable.
For more information, see Overriding a Profile’s Critical Resource Configuration on page 5-233.
RF Domain Name Lists RF Domain memberships for each listed device. Devices can either
belong to a default RF Domain based on model type, or be assigned a
unique RF Domain supporting a specific configuration customized to that
device model.
Profile Name Lists the profile each listed device is currently a member of. Devices can
either belong to a default profile based on model type, or be assigned a
unique profile supporting a specific configuration customized to that
model.
Area List the physical area where the controller or service platform is deployed.
This can be a building, region, campus or other area that describes the
deployment location.
Floor List the building Floor name representative of the location within the area
or building the controller or service platform was physically deployed.
Assigning a building Floor name is helpful when grouping devices in RF
Domains and Profiles, as devices on the same physical building floor may
need to share specific configuration parameters in respect to radio
transmission and interference requirements specific to that location.
Overrides The Overrides column contains an option to clear all profile overrides for
any devices that contain overrides. To clear an override, select the clear
button to the right of the device.
3 Select Add to create a new device, select Edit to modify an existing device or select Delete to remove an
existing device.Optionally Copy or Rename a device as needed.
4 Use the Replace button to replace an existing access point with another Access Point. The Replace feature
enable you to swap an existing Access Point with a new one without disrupting normal operations. The
configuration of the old Access Point is automatically copied to the newly added Access Point. The following
screen is displayed.
administrators to assign configuration data to multiple devices deployed in a common coverage area, such as in a
floor, building or site. Each RF Domain contains policies that can determine a Smart RF or WIPS configuration.
Profiles enable administrators to assign a common set of configuration parameters and policies to controllers,
service platforms and Access Points. Profiles can be used to assign common or unique network, wireless and
security parameters to wireless controllers and Access Points across a large, multi segment, site. The configuration
parameters within a profile are based on the hardware model the profile was created to support. A controller and
service platform support both default and user defined profiles implementing new features or updating existing
parameters to groups of peer devices and Access Points. The central benefit of a profile is its ability to update
devices collectively without having to modify individual device configurations one at a time.
NOTE: Once devices have been assigned membership in either a profile or RF
Domain, an administrator must be careful not to assign the device a configuration
update that removes it from membership from a RF Domain or profile. A RF
Domain or profile configuration must be re-applied to a device once its
configuration has been modified in a manner that differentiates it from the
configuration shared by the devices comprising the RF Domain or profile.
Latitude Coordinate Set the latitude coordinate where devices are deployed within a floor.
When looking at a floor map, latitude lines specify the east-west position
of a point on the Earth's surface. The exact location of a device
deployment can be ascertained by aligning the latitude and longitude
points on the earth’s surface.
Longitude Set the longitude coordinate where devices are deployed within a floor.
Coordinate When looking at a floor map, longitude lines specify the north-south
position of a point on the Earth's surface. The exact location of a device
deployment can be ascertained by aligning the longitude and latitude
points on the earth’s surface.
5 Use the RF Domain drop-down menu to select an existing RF Domain for device membership.
6 If a RF Domain configuration does not exist suiting the deployment requirements of the target device, select
the Create icon to create a new RF Domain configuration, or select the Edit icon to modify the configuration of
a selected RF Domain. For more information, see About RF Domains on page 9-1 or Managing RF Domains on
page 9-2.
7 Use the Profile drop-down menu to select an existing device profile for multiple device deployment uniformity.
8 If a profile configuration does not exist suiting the deployment requirements of the target device, select the
Create icon to create a new profile configuration, or select the Edit icon to modify the configuration of a
selected profile. For more information, see General Profile Configuration on page 8-5.
9 If necessary, select the Clear Overrides button to remove all existing overrides from the device.
10 Refer to the Set Clock parameter to update the system time of the target device.
11 Refer to the Device Time parameter to assess the device’s current time, or whether the device time is
unavailable. Select Refresh as required to update the device’s reported system time.
12 Use the New Time parameter to set the calendar day, hour and minute for the target device. Use the AM and
PM radio buttons to refine whether the updated time is for the morning or afternoon/evening.
13 When completed, select Update Clock to commit the updated time to the target device.
14 If a T5 controller is deployed, select it from the Type drop-down menu and configure CPE VLAN Settings, in
addition to the other parameters described in this section.
A T5 controller uses the a somewhat different operating system to manage its connected radio devices, as
opposed to the WiNG operating used by RFS controllers and NX service platforms. However, a T5 controller,
once enabled as a supported external device, can provide data to WiNG to assist in a T5’s management within
a WiNG supported subnet populated by both types of devices. The Customer Premises Equipment (CPEs) are
the T5 controller managed radio devices. These CPEs use a Digital Subscriber Line (DSL) as their high speed
Internet access mechanism using the CPE’s physical wallplate connection and phone jack.
VLAN Set a VLAN from 1 - 4,094 used as a virtual interface for connections
between the T5 controller and its managed CPE devices.
Start IP Set a starting IP address used in a range of addresses available to T5
controller connecting CPE devices.
End IP Set an end IP address used in a range of addresses available to T5
controller connecting CPE devices.
15 Select OK to save the changes made to the screen. Selecting Reset reverts the screen to its last saved
configuration.
Managing infrastructure devices requires a license key to enable software functionality or define the number of
adoptable devices permitted. My Licenses is a Web based online application enabling you to request a license key
for license certificates for products.
The Licenses screen also contains a facility where new licenses can be applied to increase the number of device
adoptions permitted, or to allow the use of the advanced security features.
Each controller and service platform family has multiple models to choose from that range from zero licenses to
the maximum number that can be loaded for that specific SKU.
5 Review the AP Licenses table to assess the specific number of adoptions permitted, as dictated by the terms of
the current license. The Native tab displays by default. Select the Guest tab to display guest licenses.
AP Adoptions The Device column Lists the total number of AP adoptions made by the
controller or service platform. If the installed license count is 10 APs and
the number of AP adoptions is 5, 5 additional APs can still be adopted
under the terms of the license. The total number of APs adoptions varies
by platform, as well as the terms of the license. The Cluster column lists
the total number of AP adoptions made by the cluster membership (all
members). If the installed license count is 100 APs and the number of AP
adoptions is 50, 50 additional APs can still be adopted under the terms of
the AP licenses, pooled by the cluster members.
AP Licenses The Device column lists the number of APs available for adoption under
the restrictions of the license. This number applies to dependent mode
adaptive APs only, and not independent mode APs. The Cluster column
lists the number of APs available for adoption by cluster members under
the restrictions of the licenses, as pooled amongst the cluster members.
AP Lent Licenses Lent licenses are the total number of AP licenses the NOC controller lends
(if needed) to its site controllers so site controllers can adopt APs in
excess of its own installed AP license count. AP lent licenses can be non-
zero only in controllers currently configured as the NOC (NOC controller).
Lent Licenses is always zero in controllers configured as the site (site
controller).
AP Borrowed Borrowed licenses are the total number of AP licenses borrowed by the
Licenses site controller from the NOC controller (NOC controllers if a NOC
controller is in a cluster). AP borrowed licenses are always zero in the
NOC controller. AAP borrowed licenses can be non-zero only on site
controllers.
AP Total Licenses Lists the cumulative number of both Device and Cluster AP licenses
supported by the listed controller or service platform.
NOTE: The following is a licensing example: Assume there are two site controllers
(S1 and S2) adopted to a NOC controller (N1). S1 has 3 installed AP licenses, and S2
has 4 installed AP licenses. Eight APs seek to adopt on S1, and ten APs seek to
adopt on S2. N1 has 1024 installed licenses. N1 lends 5 (8-3) AP licenses to S1, and 6
(10-4) AP licenses to S2.
6 Review the AAP Licenses table to assess the specific number of adoptions permitted, as dictated by the terms
of the current license.
AAP Adoptions The Device column Lists the total number of AAP adoptions made by the
controller or service platform. If the installed license count is 10 APs and
the number of AAP adoptions is 5, 5 additional AAPs can still be adopted
under the terms of the license. The total number of AAPs adoptions varies
by platform, as well as the terms of the license. The Cluster column lists
the total number of AAP adoptions made by the cluster membership (all
members). If the installed license count is 100 APs and the number of
AAP adoptions is 50, 50 additional AAPs can still be adopted under the
terms of the AAP licenses, pooled by the cluster members.
AAP Licenses The Device column lists the number of AAPs available for adoption under
the restrictions of the license. This number applies to dependent mode
adaptive AAPs only, and not independent mode AAPs. The Cluster
column lists the number of AAPs available for adoption by cluster
members under the restrictions of the licenses, as pooled amongst the
cluster members.
AAP Lent Licenses Lent licenses are the total number of AAP licenses the NOC controller
lends (if needed) to its site controllers so site controllers can adopt
adaptive APs in excess of its own installed AAP license count. AAP lent
licenses can be non-zero only in controllers currently configured as the
NOC (NOC controller). Lent Licenses is always zero in controllers
configured as the site (site controller).
AAP Borrowed Borrowed licenses are the total number of AAP licenses borrowed by the
Licenses site controller from the NOC controller (NOC controllers if a NOC
controller is in a cluster). AAP borrowed licenses are always zero in the
NOC controller. AAP borrowed licenses can be non-zero only on site
controllers.
AAP Total Licenses Lists the cumulative number of both Device and Cluster AAP licenses
supported by the listed controller or service platform.
7 Refer to the Feature Licenses field to apply licenses and provision advanced security and analytics features:
Advanced Security Enter the provided license key required to install the Role Based Firewall
feature and increase the number of IPSec VPN tunnels. The number of
IPSec tunnels varies by platform.
Analytics Licenses Enter the provided license key required to install Analytics (an enhanced
statistical management tool) for NX7500 and NX9000 series service
platforms.
8 Refer to the Web Filtering License field if required to provide a 256 character maximum license string for the
Web filtering feature. Web filtering is used to restrict access to specific resources on the Internet.
9 Select OK to save the changes made to the applied licenses. Selecting Reset reverts the screen to its last saved
configuration.
certificate and is called a CA certificate. A browser must contain the CA certificate in its Trusted Root Library so it
can trust certificates signed by the CA's private key.
Depending on the public key infrastructure, the digital certificate includes the owner's public key, the certificate
expiration date, the owner's name and other public key owner information. Each certificate is digitally signed by a
trustpoint. The trustpoint signing the certificate can be a certificate authority, corporation or individual. A
trustpoint represents a CA/identity pair containing the identity of the CA, CA-specific configuration parameters,
and an association with an enrolled identity certificate.
SSH keys are a pair of cryptographic keys used to authenticate users instead of, or in addition to, a username/
password. One key is private and the other is public key. Secure Shell (SSH) public key authentication can be used
by a requesting client to access resources, if properly configured. A RSA key pair must be generated on the client.
The public portion of the key pair resides with the controller or service platform, while the private portion remains
on a secure local area of the client.
NOTE: Pending trustpoints and RSA keys are typically not verified as existing on a
device.
1 Select Launch Manager from either the HTTPS Trustpoint, SSH RSA Key, RADIUS Certificate Authority or RADIUS
Server Certificate parameters.
Host Provide the hostname string or numeric IP address of the server used to
import the trustpoint. Hostnames cannot include an underscore character.
This option is not valid for cf and usb1-4.
Select IPv4 Address to use an IPv4 formatted address as the host. Select
IPv6 Address to use an IPv6 formatted address as the host. IPV6 provides
enhanced identification and location information for computers on
networks routing traffic across the Internet. IPv6 addresses are composed
of eight groups of four hexadecimal digits separated by colons.
Path/File Specify the path to the trustpoint file. Enter the complete relative path to
the file on the server.
6 Select OK to import the defined trustpoint. Select Cancel to revert the screen to its last saved configuration.
7 To optionally import a CA certificate, select the Import CA button from the Certificate Management screen.
A CA is a network authority that issues and manages security credentials and public keys for message
encryption. The CA signs all digital certificates it issues with its own private key. The corresponding public key
is contained within the certificate and is called a CA certificate.
8 Define the following configuration parameters required for the Import of the CA certificate:
Trustpoint Name Enter the 32 character maximum name assigned to the target trustpoint
signing the certificate. A trustpoint represents a CA/identity pair
containing the identity of the CA, CA specific configuration parameters,
and an association with an enrolled identity certificate.
URL Provide the complete URL to the location of the trustpoint. If needed,
select Advanced to expand the dialog to display network address
information to the location of the target trustpoint. The number of
additional fields populating the screen is dependent on the selected
protocol.
Advanced / Basic Click the Advanced or Basic link to switch between a basic URL and an
advanced location to specify trustpoint location.
Protocol Select the protocol used for importing the target CA certificate. Available
options include:
tftp
ftp
sftp
http
cf
usb1-4
Port Use the spinner control to set the port. This option is not valid for cf and
usb1-4.
Host Provide the hostname string or numeric IP address of the server used to
import the CA. Hostnames cannot include an underscore character. This
option is not valid for cf and usb1-4.
Select IPv4 Address to use an IPv4 formatted address as the host. Select
IPv6 Address to use an IPv6 formatted address as the host. IPV6 provides
enhanced identification and location information for computers on
networks routing traffic across the Internet. IPv6 addresses are composed
of eight groups of four hexadecimal digits separated by colons.
Path/File Specify the path to the CA file. Enter the complete relative path to the file
on the server.
Cut and Paste Select the Cut and Paste radio button to simply copy an existing CA into
the cut and paste field. When pasting, no additional network address
information is required.
9 Select OK to import the defined CA certificate. Select Cancel to revert the screen to its last saved configuration.
10 Select the Import CRL button from the Certificate Management screen to optionally import a CRL to a controller
or service platform.
If a certificate displays within the Certificate Management screen with a CRL, that CRL can be imported. A
certificate revocation list (CRL) is a list of certificates that have been revoked or are no longer valid. A
certificate can be revoked if the CA had improperly issued a certificate, or if a private-key is compromised. The
most common reason for revocation is the user no longer being in sole possession of the private key.
For information on creating a CRL to use with a trustpoint, refer to Setting the Profile’s Certificate Revocation
List (CRL) Configuration on page 8-166.
Host Provide the hostname string or numeric IP address of the server used to
import the CRL. Hostnames cannot include an underscore character. This
option is not valid for cf and usb1-4.
Select IPv4 Address to use an IPv4 formatted address as the host. Select
IPv6 Address to use an IPv6 formatted address as the host. IPV6 provides
enhanced identification and location information for computers on
networks routing traffic across the Internet. IPv6 addresses are composed
of eight groups of four hexadecimal digits separated by colons.
Path/File Specify the path to the CRL file. Enter the complete relative path to the
file on the server.
Cut and Paste Select the Cut and Paste radio button to simply copy an existing CRL into
the cut and paste field. When pasting, no additional network address
information is required.
12 Select OK to import the CRL. Select Cancel to revert the screen to its last saved configuration.
13 To import a signed certificate, select the Import Signed Cert button from the Certificate Management screen.
Signed certificates (or root certificates) avoid the use of public or private CAs. A self-signed certificate is an
identity certificate signed by its own creator, thus the certificate creator also signs off on its legitimacy. The
lack of mistakes or corruption in the issuance of self signed certificates is central.
Self-signed certificates cannot be revoked which may allow an attacker who has already gained access to
monitor and inject data into a connection to spoof an identity if a private key has been compromised. However,
CAs have the ability to revoke a compromised certificate, preventing its further use.
14 Define the following parameters required for the Import of the CA certificate:
Certificate Name Enter the 32 character maximum trustpoint name with which the
certificate should be associated.
From Network Select the From Network radio button to provide network address
information to the location of the signed certificate. The number of
additional fields that populate the screen is dependent on the selected
protocol. From Network is the default setting.
URL Provide the complete URL to the location of the signed certificate. If
needed, select Advanced to expand the dialog to display network address
information to the location of the signed certificate. The number of
additional fields populating the screen is dependent on the selected
protocol.
Protocol Select the protocol for importing the signed certificate. Available options
include:
tftp
ftp
sftp
http
cf
usb1-4
Port Use the spinner control to set the port. This option is not valid for cf and
usb1-4.
Host Provide the hostname string or numeric IP address of the server used to
import the signed certificate. Hostnames cannot include an underscore
character. This option is not valid for cf and
usb1-4.
Select IPv4 Address to use an IPv4 formatted address as the host. Select
IPv6 Address to use an IPv6 formatted address as the host. IPV6 provides
enhanced identification and location information for computers on
networks routing traffic across the Internet. IPv6 addresses are composed
of eight groups of four hexadecimal digits separated by colons.
Path/File Specify the path to the signed certificate file. Enter the complete relative
path to the file on the server.
Cut and Paste Select the Cut and Paste radio button to simply copy an existing
certificate into the cut and paste field. When pasting, no additional
network address information is required.
15 Select OK to import the signed certificate. Select Cancel to revert the screen to its last saved configuration.
16 To optionally export a trustpoint to a remote location, select the Export button from the Certificate
Management screen.
Once a certificate has been generated on the controller or service platform’s authentication server, export the
self signed certificate. A digital CA certificate is different from a self signed certificate. The CA certificate
contains the public and private key pairs. The self certificate only contains a public key. Export the self
certificate for publication on a Web server or file server for certificate deployment or export it in to an active
directory group policy for automatic root certificate deployment.
17 Additionally export the key to a redundant RADIUS server so it can be imported without generating a second
key. If there’s more than one RADIUS authentication server, export the certificate and don’t generate a second
key unless you want to deploy two root certificates.
Host Provide the hostname string or numeric IP address of the server used to
export the trustpoint. Hostnames cannot include an underscore character.
This option is not valid for cf and usb1-4.
Select IPv4 Address to use an IPv4 formatted address as the host. Select
IPv6 Address to use an IPv6 formatted address as the host. IPV6 provides
enhanced identification and location information for computers on
networks routing traffic across the Internet. IPv6 addresses are composed
of eight groups of four hexadecimal digits separated by colons.
Path/File Specify the path to the signed trustpoint file. Enter the complete relative
path to the file on the server.
Cut and Paste Select the Cut and Paste radio button to simply copy an existing
trustpoint into the cut and paste field. When pasting, no additional
network address information is required.
19 Select OK to export the defined trustpoint. Select Cancel to revert the screen to its last saved configuration.
20 To optionally delete a trustpoint, select the Delete button from within the Certificate Management screen.
Provide the trustpoint name within the Delete Trustpoint screen and optionally select Delete RSA Key to
remove the RSA key along with the trustpoint. Select OK to proceed with the deletion, or Cancel to revert to
the Certificate Management screen
Rivest, Shamir, and Adleman (RSA) is an algorithm for public key cryptography. It’s an algorithm that can be used
for certificate signing and encryption. When a device trustpoint is created, the RSA key is the private key used
with the trustpoint.
To review existing device RSA key configurations, generate additional keys or import/export keys to and from
remote locations:
1 Select the Launch Manager button from either the SSH RSA Key, RADIUS Certificate Authority or RADIUS
Server Certificate parameters (within the Certificate Management screen).
2 Select RSA Keys from the Certificate Management screen.
7 To optionally import a CA certificate, select the Import button from the Certificate Management > RSA Keys
screen.
Host Provide a text string hostname or numeric IP address of the server used
to import the RSA key. Hostnames cannot include an underscore
character. This option is not valid for cf and
usb1-4.
Select IPv4 Address to use an IPv4 formatted address as the host. Select
IPv6 Address to use an IPv6 formatted address as the host. IPV6 provides
enhanced identification and location information for computers on
networks routing traffic across the Internet. IPv6 addresses are composed
of eight groups of four hexadecimal digits separated by colons.
Path/File Specify the path to the RSA key. Enter the complete relative path to the
key on the server.
9 Select OK to import the defined RSA key. Select Cancel to revert the screen to its last saved configuration.
10 To optionally export a RSA key to a remote location, select the Export button from the Certificate Management
> RSA Keys screen.
Export the key to a redundant RADIUS server to import it without generating a second key. If there’s more
than one RADIUS authentication server, export the certificate and don’t generate a second key unless you want
to deploy two root certificates.
Protocol Select the protocol used for exporting the RSA key. Available options
include:
tftp
ftp
sftp
http
cf
usb1-4
Port Use the spinner control to set the port. This option is not valid for cf and
usb1-4.
Host Provide a text string hostname or numeric IP address of the server used
to export the RSA key. Hostnames cannot include an underscore
character. This option is not valid for cf and
usb1-4.
Select IPv4 Address to use an IPv4 formatted address as the host. Select
IPv6 Address to use an IPv6 formatted address as the host. IPV6 provides
enhanced identification and location information for computers on
networks routing traffic across the Internet. IPv6 addresses are composed
of eight groups of four hexadecimal digits separated by colons.
Path / File Specify the path to the key. Enter the complete relative path to the key
on the server.
12 Select OK to export the defined RSA key. Select Cancel to revert the screen to its last saved configuration.
13 To optionally delete a key, select the Delete button from within the Certificate Management > RSA Keys screen.
Provide the key name within the Delete RSA Key screen and select Delete Certificates to remove the certificate.
Select OK to proceed with the deletion, or Cancel to revert back to the Certificate Management screen.
4 Set the following Certificate Subject Name parameters required for the creation of the certificate:
Certificate Subject Select either auto-generate to automatically create the certificate's
Name subject credentials or user-configurable to manually enter the credentials
of the self signed certificate. The default setting is auto-generate.
Country (C) Define the Country used in the certificate. The field can be modified by
the user to other values. This is a required field and must not exceed 2
characters.
State (ST) Enter a State/Prov. for the state or province name used in the certificate.
This is a required field.
City (L) Enter a City to represent the city used in the certificate. This is a required
field.
Organization (O) Define an Organization for the organization represented in the certificate.
This is a required field.
Organizational Unit Enter an Org. Unit for the organization unit represented in the certificate.
(OU) This is a required field.
Common Name (CN) If there’s a common name (IP address) for the organizational unit issuing
the certificate, enter it here.
5 Select the following Additional Credentials required for the generation of the self signed certificate:
Email Address Provide an Email Address used as the contact address for issues relating
to this certificate request.
Domain Name Enter a fully qualified domain name (FQDN) is an unambiguous domain
name that specifies the node's position in the DNS tree hierarchy
absolutely. To distinguish an FQDN from a regular domain name, a
trailing period is added. For example, somehost.example.com. An FQDN
differs from a regular domain name by its absoluteness, since a suffix is
not added.
IP Address Specify the IP address used as the destination for certificate
requests.Only IPv4 formatted IP addresses are permitted, not IPv6
formatted addresses.
6 Select the Generate Certificate button at the bottom of the Certificate Management > Create Certificate screen
to produce the certificate.
A RSA key must be either created or applied to the certificate request before the certificate can be generated. A
private key is not included in the CSR, but is used to digitally sign the completed request. The certificate created
with a particular CSR only works with the private key generated with it. If the private key is lost, the certificate is
no longer functional.The CSR can be accompanied by other identity credentials required by the certificate
authority, and the certificate authority maintains the right to contact the applicant for additional information.
If the request is successful, the CA sends an identity certificate digitally signed with the private key of the CA.
To create a CSR:
1 Select the Launch Manager button from either the SSH RSA Key, RADIUS Certificate Authority or RADIUS
Server Certificate parameters (within the Certificate Management screen).
2 Select Create CSR from the upper, left-hand, side of the Certificate Management screen.
State (ST) Enter a State/Prov. for the state or province name represented in the CSR.
This is a required field.
City (L) Enter a City represented in the CSR. This is a required field.
Organization (O) Define the Organization represented in the CSR. This is a required field.
Organizational Unit Enter the Org. Unit represented in the CSR. This is a required field.
(OU)
Common Name (CN) If there’s a common name (IP address) for the organizational unit issuing
the certificate, enter it here.
5 Select the following Additional Credentials required for the generation of the CSR:
Email Address Provide an email address used as the contact address for issues relating to
this CSR.
Domain Name Enter a fully qualified domain name (FQDN) is an unambiguous domain
name that specifies the node's position in the DNS tree hierarchy
absolutely. To distinguish an FQDN from a regular domain name, a trailing
period is added. ex: somehost.example.com. An FQDN differs from a
regular domain name by its absoluteness; as a suffix is not added.
IP Address Specify the IP address used as the destination for certificate requests.Only
IPv4 formatted IP addresses are permitted, not IPv6 formatted addresses.
6 Select the Generate CSR button to produce the CSR.
NOTE: Port mirroring is not supported on NX4500 or NX6500 models, as they only
utilize GE ports 1 - 2. Additionally, port mirroring is not supported on uplink (up)
ports or wired ports on any controller or service platform model.
Before authentication, the endpoint is unknown, and traffic is blocked. Upon authentication, the endpoint is known
and traffic is allowed. The controller or service platform uses source MAC filtering to ensure only the authenticated
endpoint is allowed to send traffic.
6 Select OK to save the changes made to the 802.1x configurations. Selecting Reset reverts the screen to its last
saved configuration.
RF Domains allow administrators to assign configuration data to multiple devices deployed in a common coverage
area (floor, building or site). In such instances, there’s many configuration attributes these devices share, since their
general client support roles are quite similar. However, device configurations may need periodic refinement from
their original RF Domain administered design.
A controller or service platform configuration contains (at a minimum) one default RF Domain, but can optionally
use additional user defined RF Domains:
• Default RF Domain - Automatically assigned to each controller, service platform and associated Access Points
by default. A default RF Domain is unique to a specific model.
• User Defined RF Domains - Created by administrators and manually assigned to individual controllers, service
platforms or Access Points, but can be automatically assigned to Access Points using adoption policies.
Each controller, service platform and Access Point is assigned one RF Domain at a time. However, a user defined
RF Domain can be assigned to multiple devices as required. User defined RF Domains can be manually assigned or
automatically assigned to Access Points using an auto provisioning policy. The more devices assigned a single RF
Domain, the greater the likelihood one of the device’s configurations will require an override deviating that device’s
configuration from the original RF Domain assignment shared by the others.
To review the RF Domain’s original configuration requirements and the options available for a target device, refer
to Managing RF Domains on page 9-2.
NOTE: A blue override icon (to the left of a parameter) defines the parameter as
having an override applied. To remove an override go to the Basic Configuration
section of the device and click the Clear Overrides button. This removes all
overrides from the device.
6 Refer to the Basic Configuration field to review the basic settings defined for the target device’s RF Domain
configuration, and optionally assign/remove overrides to and from specific parameters.
Location Provide the 64 character maximum deployment location set for the
controller or service platform as part of its RF Domain configuration.
Contact Enter the 64 character maximum administrative contact for the controller
or service platform as part of its RF Domain configuration.
Time Zone Set the time zone utilized by the selected device as part of its RF Domain
configuration.
Country Code Set the country code utilized by the device as part of its RF Domain
configuration. Selecting the correct country is central to legal operation.
Each country has its own regulatory restrictions concerning
electromagnetic emissions and the maximum RF signal strength that can
be transmitted.
7 Refer to the Smart RF section to configure Smart RF policy and dynamic channel settings.
2.4 GHz Radios Select an override group of channels Smart RF can use for channel
compensation adjustments in the 2.4 GHz band.
5 GHz Radios Select an override group of channels Smart RF can use for channel
compensation adjustments in the 5 GHz band.
8 Refer to the Smart Scan section to configure Smart RF policy and dynamic channel settings.
Enable Dynamic Select this option to enable dynamic channel switching for Smart RF
Channel radios.
2.4 GHz Channels Select legal channels (device radios transmit in specific channels unique
to their country of operation) from the drop-down menu for 2.4GHz
Smart RF radios.
5 GHz Channels Select legal channels (device radios transmit in specific channels unique
to their country of operation) from the drop-down menu for 5GHz Smart
RF radios.
9 Use the WIPS Policy drop-down menu to apply a WIPS policy to the RF Domain.
The Wireless Intrusion Protection System (WIPS) provides continuous protection against wireless threats and
act as an additional layer of security complementing wireless VPNs and encryption and authentication policies.
Controllers and service platforms support WIPS through the use of dedicated sensor devices, designed to
actively detect and locate unauthorized AP devices. After detection, they use mitigation techniques to block
devices using manual termination, air lockdown or port suppression.
Select the Create icon to define a new WIPS policy that can be applied to the RF Domain, or select the Edit
icon to modify or override an existing WIPS policy.
For an overview of WIPS and instructions on how to create a WIPS policy that can be used with a RF Domain,
see Intrusion Prevention on page 10-51.
10 Use the Licenses drop-down menu to obtain and leverage feature licenses from RF Domain member devices.
11 Select OK to save the changes and overrides made to the RF Domain configuration. Selecting Reset reverts the
screen to its last saved configuration.
12 Select Sensor from within the expanded RF Domain Overrides menu to define ADSP server credentials for
WiNG controller or service platform data exchanges.
Controllers and service platforms support dedicated sensor devices, designed to actively detect and locate
unauthorized AP devices. After detection, they use mitigation techniques to block devices using manual
termination, air lockdown or port suppression.
NOTE: The WLAN Override option does not appear as a sub menu option under RF
Domain Overrides for either controllers or service platforms, just Access Points.
NOTE: A blue override icon (to the left of a parameter) defines the parameter as
having an override applied. To remove an override go to the Basic Configuration
section of the device and click the Clear Overrides button. This removes all
overrides from the device.
21 Select OK to save the changes and overrides. Selecting Reset reverts the screen to its last saved configuration.
22 Select the Override VLAN tab to review any VLAN assignment overrides that may have been or optionally add
or edit override configurations.
NOTE: A blue override icon (to the left of a parameter) defines the parameter as
having an override applied. To remove an override go to the Basic Configuration
section of the device and click the Clear Overrides button. This removes all
overrides from the device.
24 Select OK to save the changes and overrides. Selecting Reset reverts the screen to its last saved configuration.
However, device profile configurations may need periodic refinement from their original administered design.
Consequently, a device profile could require modification from a profile configuration shared amongst numerous
devices deployed within a particular site.
Use Profile Overrides to define configurations overriding the parameters set by the target device’s original profile
assignment.
To review a profile’s original configuration requirements and the options available for a target device, refer to
General Profile Configuration on page 8-5.
NOTE: A blue override icon (to the left of a parameter) defines the parameter as
having an override applied. To remove an override go to the Basic Configuration
section of the device and click the Clear Overrides button. This removes all
overrides from the device.
6 Select the IP Routing option (within the Settings field) to enable routing for the device.
7 Set a NoC Update Interval of 0, or from 5-3600 seconds for updates from the RF Domain manager to the
controller or service platform.
8 Select + Add Row below the Network Time Protocol (NTP) table to launch a screen used to define (or override)
the configurations of NTP server resources the controller or service platform uses it obtain its system time. Set
the following parameters to define the NTP configuration:
Server IP Set the IP address of each server as a potential NTP resource. Provide
either a hostname or an IPv4 formatted IP address. Hostnames cannot
include an underscore character.
Key Number Select the number of the associated Authentication Key for the NTP
resource.
Key If an autokey is not being used, manually enter a 64 character maximum
key the controller or service platform and NTP resource share to securely
interoperate.
Preferred Select the radio button to designate this particular NTP resource as
preferred. If using multiple NTP resources, preferred resources are given
first opportunity to connect to the controller or service platform and
provide NTP calibration.
AutoKey Select the radio button to enable an Autokey configuration for the
controller or service platform and NTP resource. The default setting is
disabled.
Version Use the spinner control to specify the version number used by this NTP
server resource. The default setting is 0.
Minimum Polling Use the drop-down menu to select the minimum polling interval. Once
Interval set, the NTP resource is polled no sooner then the defined interval.
Options include 64, 128, 256, 512 or 1024 seconds. The default setting is 64
seconds.
Maximum Polling Use the drop-down menu to select the maximum polling interval. Once
Interval set, the NTP resource is polled no later then the defined interval. Options
include 64, 128, 256, 512 or 1024 seconds. The default setting is 1024
seconds.
9 Refer to the RF Domain Manager field to elect RF Domain Manager devices and assign them a priority in the
election process:
Capable Select this option to elect this controller a RF Domain manager capable of
storing and provisioning configuration and firmware images for other
members of the RF Domain. The RF-domain-manager updates any state
changes to the rest of the devices in the RF Domain. This setting is
enabled by default.
Priority Select this option to set the priority of this device becoming the RF
Domain Manager versus other capable RF Domain members. The higher
the value (1 - 255) the higher priority assigned to the device in the RF
Domain Manager election process.
10 Refer to the RAID Alarm field to either enable or disable the chassis alarm that sounds when events are
detected that degrade RAID support (drive content mirroring) on a service platform.
NOTE: RAID controller drive arrays are available within NX7530 and NX9000 series
service platforms only. However, they can be administrated on behalf of a profile by
a different model service platform or controller.
Service platforms include a single Intel MegaRAID controller (virtual drive) with RAID-1 mirroring support
enabled. The online virtual drive supports up to two physical drives that could require hot spare substitution if
a drive were to fail. An administrator can manage the RAID controller event alarm and syslogs supporting the
array hardware from the service platform user interface and is not required to reboot the service platform
BIOS.
For information on setting the service platform drive array configuration and diagnostic behavior of its member
drives, refer to RAID Operations. To view the service platform’s current RAID array status, drive utilization and
consistency check information, refer to RAID Statistics on page 15-114.
11 Select OK to save the changes and overrides made to the general profile configuration. Select Reset to revert to
the last saved configuration.
A cluster’s AP load balance is typically distributed evenly amongst the controllers or service platforms in the
cluster. Define how often this profile is load balanced for AP radio distribution as often as you feel required, as
radios can come and go and members can join and exit the cluster. For information on setting a profile’s original
cluster configuration (before applying an override), see Profile Cluster Configuration (Controllers and Service
Platforms) on page 8-8.
As cluster memberships increase or decrease and their load requirements change, a profile may need an override
applied to best suit a site’s cluster requirements.
Handle STP Select the radio button to enable Spanning Tree Protocol (STP)
Convergence convergence for the controller or service platform. In general, this
protocol is enabled in layer 2 networks to prevent network looping.
Spanning Tree is a network layer protocol that ensures a loop-free
topology in a mesh network of inter-connected layer 2 controller or
service platform. The spanning tree protocol disables redundant
connections and uses the least costly path to maintain a connection
between any two controllers or service platforms in the network. If
enabled, the network forwards data only after STP convergence.
Enabling STP convergence delays the redundancy state machine
execution until the STP convergence is completed (the standard
protocol value for STP convergence is 50 seconds). Delaying the state
machine is important to load balance APs at startup. The default
setting is disabled.
Force Configured State Select the radio button to allow this controller or service platform to
take over for an active member if it were to fail. A standby controller or
service platform in the cluster takes over APs adopted by the failed
active member. If the failed active member were to come back up, the
active member starts a timer based on the Auto Revert Delay interval.
At the expiration of the Auto Revert Delay, the standby member
releases all adopted APs and goes back to a monitoring mode. The
Auto Revert Delay timer is stopped and restarted if the active member
goes down and comes up during the Auto Revert Delay interval. The
default value is disabled.
Force Configured State Specify a delay interval in minutes (3 - 1,800). This is the interval a
Delay standby member waits before releasing adopted APs and goes back to
a monitoring mode when an active cluster member becomes active
again after a failure. The default interval is 5 minutes.
Radius Counter DB Sync Specify a sync time (from 1 - 1,440 minutes) a RADIUS counter
Time database uses as its synchronization interval with the dedicated NTP
server resource. The default interval is 5 minutes.
7 Within the Cluster Member field, select Cluster VLAN to enable a spinner control to designate the VLAN where
cluster members are reachable. Specify a VLAN from 1 - 4094.
Specify the IP addresses of the VLAN’s cluster members using the Member IP Address table.
8 Select Restore Configured State to restore this cluster member back into role of taking over for an active
member if it were to fail.
9 Select Force Active to revert this cluster member back into its default active state and provide the ability to
adopt Access Points.
10 Select Force Standby to only adopt Access Points when an active member has failed or sees an Access Point
that’s not yet adopted.
11 Select OK to save the changes and overrides made to the profile’s cluster configuration. Select Reset to revert
to the last saved configuration.
Use the Power screen to set or override one of two power modes (3af or Auto) for a managed Access Point. When
automatic is selected, the Access Point safely operates within available power. Once the power configuration is
determined, the Access Point configures its operating power characteristics based on its model and power
configuration.
An Access Point uses a complex programmable logic device (CPLD). The CPLD determines proper supply
sequencing, the maximum power available and other status information. One of the primary functions of the CPLD
is to determine the Access Point’s maximum power budget. When an Access Point is powered on (or performing a
cold reset), the CPLD determines the maximum power provided by the POE device and the budget available to
the Access Point. The CPLD also determines the access point hardware SKU and the number of radios. If the
Access Point’s POE resource cannot provide sufficient power (with all intended interfaces enabled), some of the
following interfaces could be disabled or modified:
• The Access Point’s transmit and receive algorithms could be negatively impacted
• The Access Point’s transmit power could be reduced due to insufficient power
• The Access Point’s WAN port configuration could be changed (either enabled or disabled)
To define an Access Point’s power configuration or apply an override to an existing parameter:
1 Select the Devices tab from the Web UI.
2 Select Profile Overrides to expand its sub menu items.
3 Select Power.
A screen displays where an Access Point’s power configuration can be defined or overridden for a profile.
NOTE: A blue override icon (to the left of a parameter) defines the parameter as
having an override applied. To remove an override go to the Basic Configuration
section of the device and click the Clear Overrides button. This removes all
overrides from the device.
4 Use the Power Mode drop-down menu to set or override the Power Mode Configuration on this AP.
NOTE: Single radio model Access Point’s always operate using a full power
configuration. The power management configurations described in this section do
not apply to single radio models.
When an Access Point is powered on for the first time, the system determines the power budget available to
the Access Point. Using the Automatic setting, the Access Point automatically determines the best power
configuration based on the available power budget. Automatic is the default setting.
If 802.3af is selected, the Access Point assumes 12.95 watts are available. If the mode is changed, the Access
Point requires a reset to implement the change. If 802.3at is selected, the Access Point assumes 23 - 26 watts
are available.
5 Set or override the Access Point radio’s 802.3af Power Mode and the radio’s 802.3at Power Mode.
Use the drop-down menu to define a mode of either Range or Throughput.
Select Throughput to transmit packets at the radio’s highest defined basic rate (based on the radio’s current
basic rate settings). This option is optimal in environments where the transmission range is secondary to
broadcast/multicast transmission performance. Select Range when range is preferred over performance for
broadcast/multicast (group) traffic. The data rates used for range are the lowest defined basic rates.
Throughput is the default setting for both 802.3af and 802.3at.
6 Select OK to save the changes and overrides made to the Access Point power configuration. Select Reset to
revert to the last saved configuration.
At adoption, an Access Point solicits and receives multiple adoption responses from controllers and service
platforms available on the network. These adoption responses contain loading policy information the Access Point
uses to select the optimum controller or service platform for adoption. By default, an auto provisioning policy
generally distributes AP adoption evenly amongst available controllers and service platforms. Modify existing
adoption policies or create a new one as needed to meet the adoption requirements of a device and their assigned
profile.
NOTE: A device configuration does not need to be present for an auto provisioning
policy to take effect. Once adopted, and the device’s configuration is defined and
applied by the controller or service platform, the auto provisioning policy mapping
does not have impact on subsequent adoptions by the same device.
An auto provisioning policy enables an administrator to define adoption rules for the supported Access Points
capable of being adopted by a wireless controller.
Auto-Provisioning Select an auto provisioning policy from the drop-down menu. To create
Policy a new auto provisioning policy, select the Create icon or modify an
existing one by selecting the Edit icon.
Learn and Save Network Select this option to learn and save the configuration of any device
Configuration requesting adoption. This setting is enabled by default.
7 Set the following Controller Hello Interval settings manage message exchanges and connection re-
establishments between adopting devices:
Hello Interval Define an interval (from 1 - 120 seconds) between hello keep alive
messages exchanged with the adopting device. These messages serve
as a connection validation mechanism to ensure the availability of the
adopting resource.
Adjacency Hold Time Set the time (from 2 - 600 seconds) after the last hello packet after
which the connection between the controller and Access Point is
defined as lost and their connection is re-established. When a hello
interval is set, an adjacency hold time is mandatory and should be
higher then the hello interval.
8 Use the spinner control to define an Offline Duration timeout (from 5 - 43,200 minutes) to detect whether an
adopted device is offline. The default setting is 10 minutes.
9 Use the spinner control to define a Controller VLAN. Select to enable this field and select the VLAN on which
the adopting controllers can be found by the Access Point.
10 Enter Controller Hostnames as needed to define or override resources for Access Point adoption.
11 Select + Add Row as needed to populate the table with IP Addresses or Hostnames used as Access Point
adoption resources into the managed network.
Host Use the drop-down menu to specify whether the adoption resource is
defined as a (non DNS) IP Address or a Hostname. Once defined,
provide the numerical IP or Hostname. A Hostname cannot exceed 64
characters and cannot include an underscore character.
Pool Use the spinner control to set a pool of either 1 or 2. This is the pool
the target controller or service platform belongs to.
Routing Level Define a routing level (either 1 or 2) for the link between adopting
devices. The default setting is 1.
IPSec Secure Enable this option to provide IPSec secure peer authentication on the
connection (link) between the adopting devices. This option is disabled
by default.
IPSec GW Select the numerical IP address or administrator defined hostname of
the adopting controller resource.
Force Enable this setting to create a forced link between an Access Point and
adopting controller, even when not necessarily needed. This setting is
disabled by default.
Remote VPN Client Displays whether a secure controller link has been established using a
remote VPN client.
12 Select OK to save the changes and overrides made to the Access Point profile adoption configuration. Select
Reset to revert to the last saved configuration.
At adoption, an Access Point solicits and receives multiple adoption responses from controllers and service
platforms available on the network. These adoption responses contain loading policy information the Access Point
uses to select the optimum controller or service platform for adoption. By default, an auto provisioning policy
generally distributes AP adoption evenly amongst available controllers and service platforms. Modify existing
adoption policies or create a new one as needed to meet the adoption requirements of a device and their assigned
profile.
NOTE: A device configuration does not need to be present for an auto provisioning
policy to take effect. Once adopted, and the device’s configuration is defined and
applied by the controller or service platform, the auto provisioning policy mapping
does not have impact on subsequent adoptions by the same device.
Learn and Save Network Select this option to enable allow the controller tor service platform to
Configuration maintain a local configuration records of devices requesting adoption
and provisioning. This feature is enabled by default.
Rerun Policy Rules Enabling this feature applies adoption rules on Access Points each time
Every Time AP Adopted they’re subsequently adopted, not just the first time. This setting is
disabled by default.
7 Set the following Controller Adoption Settings settings:
Allow Adoption of Select either Access Points or Controllers (or both) to refine whether
Devices this controller or service platform can adopt just networked Access
Points or peer controller devices as well.
Allow Adoption of Select this option to enable this controller or service platform to adopt
External Devices T5 model devices or EX3500 model switches.
Allow Monitoring of Select this option to enable monitoring only of T5 model devices or
External Devices EX3500 model switches by this controller or service platform. When
enabled, WiNG does not configure EX3500 switches or a T5, it only
monitors those devices for statistics and events.
Allow Adoption of this Select this option to enable this controller or service platform to be
Controller capable of adoption by other controllers or service platforms. This
setting is disabled by default, and must be selected to allow peer
adoptions and enable the four settings directly below it.
Preferred Group If Allow Adoption of this Controller is selected, provide the controller
group preferred as the adopting entity for this controller or service
platform. If utilizing this feature, ensure the appropriate group is
provided within the Controller Group field.
Hello Interval Select this option to define the hello packet exchange interval (from 1 -
120 seconds) between the controller or service platform and an
adoption requesting Access Point.
Adjacency Hold Time Select this option to set a hold time interval (from 2 - 600 seconds)
for the transmission of hello packets.
Offline Duration Use the spinner control to define a timeout (from 5 - 43,200 minutes)
to detect whether an adopted device is offline. The default setting is
10 minutes.
8 Enter Controller Hostnames as needed to define resources for adoption.
9 Select + Add Row as needed to populate the table with IP Addresses or Hostnames used as Access Point
adoption resources into the managed network.
Host Use the drop-down menu to specify whether the adoption resource is
defined as a (non DNS) IP Address or a Hostname. Once defined,
provide the numerical IP or Hostname. A Hostname cannot exceed 64
characters or contain an underscore.
Pool Use the spinner control to set a pool of either 1 or 2. This is the pool
the target controller or service platform belongs to.
Routing Level Define a routing level (either 1 or 2) for the link between adopting
devices. The default setting is 1.
IPSec Secure Enable this option to provide IPSec secure peer authentication on the
connection (link) between the adopting devices. This option is disabled
by default.
A controller or service platform requires its Virtual Interface be configured for layer 3 (IP) access or layer 3 service
on a VLAN. A Virtual Interface defines which IP address is associated with each VLAN ID the controller or service
platform is connected to.
If the profile is configured to support an Access Point radio, an additional Radios option is available, unique to the
Access Point’s radio configuration.
Each profile interface configuration can have overrides applied to customize the configuration to a unique
controller or service platform deployment. However, once an override is applied to this configuration it becomes
independent from the profile that may be shared by a group of devices in a specific deployment and my need
careful administration until a profile can be re-applied to the target controller or service platform. For more
information, refer to the following:
• Ethernet Port Override Configuration
• Virtual Interface Override Configuration
• Port Channel Override Configuration
• VM Interface Override Configuration
• Radio Override Configuration
• WAN Backhaul Override Configuration
• PPPoE Override Configuration
• Bluetooth Configuration
5.2.7.1 Ethernet Port Override Configuration
Profile Interface Override Configuration
The ports available on controllers vary depending RFS controller model. The following ports are available to
controllers:
• RFS4000 - ge1, ge2, ge3, ge4, ge5, up1
• RFS6000 - ge1, ge2, ge3, ge4, ge5, ge6, ge7, ge8, me1, up1
GE ports on RFS4000 and RFS6000 models are RJ-45 ports supporting 10/100/1000Mbps.
ME ports are available on RFS6000 and RFS7000 platforms. ME ports are out-of-band management ports used to
manage the controller via CLI or Web UI, even when the other ports on the controller are unreachable.
UP ports are available on RFS4000 and RFS6000 controller. An UP port supports either RJ-45 or fiber. The UP port is the
preferred means to connect to the backbone as it has a non-blocking 1gbps connection unlike the GE ports.
Mode Displays the profile’s switching mode as either Access or Trunk (as
defined within the Ethernet Port Basic Configuration screen). If Access is
selected, the listed port accepts packets only from the native VLAN.
Frames are forwarded untagged with no 802.1Q header. All frames
received on the port are expected as untagged and mapped to the native
VLAN. If set to Trunk, the port allows packets from a list of VLANs added
to the trunk. A port configured as Trunk supports multiple 802.1Q tagged
VLANs and one Native VLAN which can be tagged or untagged.
Native VLAN Lists the numerical VLAN ID (1 - 4094) set for the native VLAN. The
native VLAN allows an Ethernet device to associate untagged frames to a
VLAN when no 802.1Q frame is included in the frame. Additionally, the
native VLAN is the VLAN untagged traffic is directed over when using a
port in trunk mode.
Tag Native VLAN A green check mark defines the native VLAN as tagged. A red “X” defines
the native VLAN as untagged. When a frame is tagged, the 12 bit frame
VLAN ID is added to the 802.1Q header so upstream Ethernet devices
know which VLAN ID the frame belongs to. The device reads the 12 bit
VLAN ID and forwards the frame to the appropriate VLAN. When a frame
is received with no 802.1Q header, the upstream device classifies the
frame using the default or native VLAN assigned to the Trunk port. A
native VLAN allows an Ethernet device to associate untagged frames to a
VLAN when no 802.1Q frame is included in the frame.
Allowed VLANs Displays those VLANs allowed to send packets over the listed controller
or service platform port. Allowed VLANs are only listed when the mode
has been set to Trunk.
Overrides A Clear option appears for each Ethernet port configuration that has an
override applied to the profile’s configuration. Select Clear to revert this
specific interface configuration to the profile configuration originally
defined by the administrator for this interface.
8 To edit or override the configuration of an existing controller or service platform port, select it from amongst
those displayed and select the Edit button. The Ethernet Port Basic Configuration screen displays by default.
10 Enable or disable the following CDP/LLDP parameters used to configure Cisco Discovery Protocol (CDP) and
Link Layer Discovery Protocol (LLDP) for this profile’s Ethernet port configuration:
Cisco Discovery Select this option to allow the CDP to be received on this port. If enabled,
Protocol Receive the port sends out periodic interface updates to a multicast address to
advertise its presence to neighbors. This option is enabled by default.
Cisco Discovery Select this option to allow the CDP to be transmitted on this port. If
Protocol Transmit enabled, the port sends out periodic interface updates to a multicast
address to advertise its presence to neighbors.
Link Layer Discovery Select this option to allow the LLDP to be received on this port. If
Protocol Receive enabled, the port sends out periodic interface updates to a multicast
address to advertise its presence to neighbors. This option is enabled by
default.
Link Layer Discovery Select this option to allow the LLDP to be transmitted on this port. If
Protocol Transmit enabled, the port sends out periodic interface updates to a multicast
address to advertise its presence to neighbors.
11 If supported and applicable, set or override the following Power Over Ethernet (PoE) parameters used with this
profile’s Ethernet port configuration:
Enable POE Select this option to configure the selected controller or service platform
port to use Power over Ethernet. To disable PoE on a port, uncheck this
option. PoE is supported on RFS4000 and RFS6000 model controllers.
When enabled, the controller or service platform supports 802.3af PoE on
each of its ge ports. The PoE allows users to monitor port power
consumption and configure power usage limits and priorities for each ge
port.
Power Limit Use the spinner control to set the total watts available for PoE on the ge
port. Set a value from 0 - 40 watts.
Power Priority Set the power priority for the listed port to either to either Critical, High
or Low. This is the priority assigned to this port versus the power
requirements of the other supports available on the controller or service
platform.
12 Select Enforce Captive Portal to automatically apply captive portal access permission rules to data transmitted
over this specific Ethernet port. This setting is disabled by default.
A captive portal is an access policy for providing temporary and restrictive access using a standard Web
browser. Captive portals provides authenticated access by capturing and re-directing a wireless user's Web
browser session to a captive portal login page where the user must enter valid credentials to access to the
network. Once logged into the captive portal, additional Terms and Agreement, Welcome, Fail and No Service
pages provide the administrator with a number of options on captive portal screen flow and user appearance.
Captive portal enforcement allows wired network users to pass traffic through the captive portal without being
redirected to an authentication page. Authentication instead takes place when the RADIUS server is queried
against the wired user's MAC address. If the MAC address is in the RADIUS server's user database, the user can
pass traffic on the captive portal. If None is selected, captive portal policies are not enforced on the wired
interface. If Authentication Failure is selected, captive portal policies are enforced only when RADIUS
authentication of the client’s MAC address is not successful. If Always is selected, captive portal policies are
enforced regardless of whether the client's MAC address is in the RADIUS server's user database. For
information on configuring a captive portal policy, see Configuring Captive Portal Policies on page 11-1.
13 Define or override the following Switching Mode parameters applied to the Ethernet port configuration:
Mode Select either the Access or Trunk radio button to set the VLAN switching
mode over the port. If Access is selected, the port accepts packets only
form the native VLANs. Frames are forwarded out the port untagged with
no 802.1Q header. All frames received on the port are untagged and are
mapped to the native VLAN. If the mode is set to Trunk, the port allows
packets from a list of VLANs you add to the trunk. A port configured as
Trunk supports multiple 802.1Q tagged VLANs and one Native VLAN
which can be tagged or untagged. Access is the default mode.
Native VLAN Use the spinner control to define a numerical Native VLAN ID from 1 -
4094. The native VLAN allows an Ethernet device to associate untagged
frames to a VLAN when no 802.1Q frame is included in the frame.
Additionally, the native VLAN is the VLAN which untagged traffic will be
directed over when using a port in trunk mode. The default VLAN is 1.
Tag Native VLAN Select this option to tag the native VLAN. Controller and service
platforms support the IEEE 802.1Q specification for tagging frames and
coordinating VLANs between devices. IEEE 802.1Q adds four bytes to
each frame identifying the VLAN ID for upstream devices that the frame
belongs. If the upstream Ethernet device does not support IEEE 802.1Q
tagging, it does not interpret the tagged frames. When VLAN tagging is
required between devices, both devices must support tagging and be
configured to accept tagged VLANs. When a frame is tagged, the 12 bit
frame VLAN ID is added to the 802.1Q header so upstream Ethernet
devices know which VLAN ID the frame belongs to. The device reads the
12 bit VLAN ID and forwards the frame to the appropriate VLAN. When a
frame is received with no 802.1Q header, the upstream device classifies
the frame using the default or native VLAN assigned to the Trunk port.
The native VLAN allows an Ethernet device to associate untagged frames
to a VLAN when no 802.1Q frame is included in the frame. This feature is
disabled by default.
Allowed VLANs Selecting Trunk as the mode enables the Allowed VLANs parameter. Add
VLANs that exclusively send packets over the listed port.
14 Optionally select the Port Channel check box from the Port Channel Membership area and define or override a
setting from 1 - 8 using the spinner control. This sets the channel group for the port.
15 Select OK to save the changes and overrides made to the profile’s Ethernet Port Basic Configuration. Select
Reset to revert to the last saved configuration.
16 Select the Security tab.
NOTE: Some vendor solutions with VRRP enabled send ARP packets with Ethernet
SMAC as a physical MAC and inner ARP SMAC as VRRP MAC. If this configuration is
enabled, a packet is allowed, despite a conflict existing.
Quiet Period Set the quiet period for this port from 1 - 65,535 seconds.This is the
maximum wait time 802.1x waits upon a failed authentication attempt. The
default setting is 60 seconds.
Reauthenticate Period Use the spinner control to set the reauthentication period for this port from
1 - 65,535 seconds. The default setting is 60 seconds.
Port MAC When enabled, a port’s MAC address is authenticated, as only one MAC
Authentication address is supported per wired port. When successfully authenticated,
packets from the source are processed. Packets from all other sources are
dropped. Port MAC authentication is supported on RFS4000, RFS6000
model controllers and NX9000 series service platforms. Port MAC
authentication may be enabled on ports in conjunction with Wired 802.1x
settings for a MAC Authentication AAA policy.
24 Select Enable within the 802.1x supplicant (client) feature field to enable a username and password pair used
when authenticating users on this port. This setting is disabled by default. The password cannot exceed 32
characters.
25 Select OK to save the changes and overrides made to the Ethernet port’s security configuration. Select Reset to
revert to the last saved configuration.
26 Select the Spanning Tree tab.
27 Set or override the following parameters for the port’s MSTP Configuration:
Enable as Edge Port Select this option to define this port as an edge port. Using an edge
(private) port, you can isolate devices to prevent connectivity over this
port.
Link Type Select either the Point-to-Point or Shared radio button. Selecting Point-
to-Point indicates the port should be treated as connected to a point-to-
point link. Selecting Shared indicates this port should be treated as having
a shared connection. A port connected to a hub is on a shared link, while
one connected to a controller or service platform is a point-to-point link.
Cisco MSTP Select either the Enable or Disable radio buttons. This enables
Interoperability interoperability with Cisco’s version of MSTP over the port, which is
incompatible with standard MSTP.
Force Protocol Sets the protocol version to either STP(0), Not Supported(1), RSTP(2) or
Version MSTP(3). MSTP is the default setting.
Guard Determines whether the port enforces root bridge placement. Setting the
guard to Root ensures the port is a designated port. Typically, each guard
root port is a designated port, unless two or more ports (within the root
bridge) are connected together. If the bridge receives superior BPDUs on
a guard root-enabled port, the guard root moves the port to a root-
inconsistent STP state. This state is equivalent to a listening state. No data
is forwarded across the port. Thus, the guard root enforces the root
bridge position.
Enable PortFast Select this option to enable drop-down menus for both the Enable
Portfast BPDU Filter and Enable Portfast BPDU guard options for the
port.
Enable PortFast Enable PortFast to invoke a BPDU filter for this portfast enabled port.
BPDU Filter Enabling the BPDU filter feature ensures this PortFast enabled port does
not transmit or receive BPDUs.
Enable PortFast Enable PortFast to invoke a BPDU guard for this portfast enabled port.
BPDU Guard Enabling the BPDU Guard feature means this portfast-enabled port will
shutdown on receiving a BPDU.
28 Refer to the Spanning Tree Port Cost table.
Define or override an Instance Index using the spinner control and set the Cost. The default path cost depends
on the user defined speed of the port.The cost helps determine the role of the port in the MSTP network. The
designated cost is the cost for a packet to travel from this port to the root in the MSTP configuration. The
slower the media, the higher the cost.
Speed Default Path Cost
<=100000 bits/sec 200000000
<=1000000 bits/sec 20000000
<=10000000 bits/sec 2000000
<=100000000 bits/sec 200000
<=1000000000 bits/sec 20000
<=10000000000 bits/sec 2000
To review existing virtual interface configurations and create a new virtual interface configuration, modify
(override) an existing configuration or delete an existing configuration:
1 Select the Configuration tab from the Web UI.
2 Select Devices from the Configuration tab.
The Device Configuration screen displays a list of managed devices or peer controllers, service platforms or
Access Points.
3 Select a target device (by double-clicking it) from amongst those displayed within the Device Configuration
screen.
Devices can also be selected directly from the Device Browser in the lower, left-hand, side of the UI.
4 Select Profile Overrides from the Device menu to expand it into sub menu options.
5 Select Interface to expand its sub menu options.
6 Select Virtual Interfaces.
NOTE: A blue override icon (to the left of a parameter) defines the parameter as
having an override applied. To remove an override go to the Basic Configuration
section of the device and click the Clear Overrides button. This removes all
overrides from the device.
NOTE: Refer to Setting the Profile’s NAT Configuration on page 8-186 for
instructions on creating a profile’s NAT configuration.
12 Set the following DHCPv6 Client Configuration. The Dynamic Host Configuration Protocol for IPv6 (DHCPv6)
provides a framework for passing configuration information.
Stateless DHCPv6 Select this option to request information from the DHCPv6 server using
Client stateless DHCPv6. DHCPv6 is a networking protocol for configuring IPv6
hosts with IP addresses, IP prefixes or other configuration attributes
required on an IPv6 network. This setting is disabled by default.
Prefix Delegation Specify a 32 character maximum request prefix for prefix delegation from
Client a DHCPv6 server over this virtual interface. Devices use prefixes to
distinguish destinations that reside on-link from those reachable using a
router.
Request DHCPv6 Select this option to request DHCPv6 options on this virtual interface.
Options DHCPv6 options provide configuration information for a node that must
be booted using the network rather than locally. This setting is disabled
by default.
13 Set the Bonjour Gateway settings for the virtual interface.Bonjour is Apple’s implementation of zero-
configuration networking (Zeroconf). Zeroconf is a group of technologies that include service discovery, address
assignment and hostname resolution. Bonjour locates devices such as printers, other computers and services
that these computers offer over a local network. Bonjour provides a general method to discover services on a
local area network (LAN). It allows users to set up a network without any configuration. Services such as
printers, scanners and file-sharing servers can be found using Bonjour. Bonjour only works within a single
broadcast domain. However, with special DNS configuration, it can be extended to find services across
broadcast domains.
14 Select the Bonjour Gateway discover policy from the drop-down menu. Select the Create icon to define a new
Bonjour Gateway policy configuration or select the Edit icon to modify an existing Bonjour Gateway policy
configuration.
15 Set the following MTU settings for the virtual interface:
Maximum Set the PPPoE client maximum transmission unit (MTU) from 500 - 1,492.
Transmission Unit The MTU is the largest physical packet size in bytes a network can
(MTU) transmit. Any messages larger than the MTU are divided into smaller
packets before being sent. A PPPoE client should be able to maintain its
point-to-point connection for this defined MTU size. The default MTU is
1,492.
IPv6 MTU Set an IPv6 MTU for this virtual interface from 1,280 - 1,500. A larger MTU
provides greater efficiency because each packet carries more user data
while protocol overheads, such as headers or underlying per-packet
delays, remain fixed; the resulting higher efficiency means a slight
improvement in bulk protocol throughput. A larger MTU results in the
processing of fewer packets for the same amount of data. The default is
1,500.
16 Within the ICMP field, define whether ICMPv6 redirect messages are sent. Redirect requests data packets be
sent on an alternative route. This setting is enabled by default.
17 Within the Address Autoconfiguration field, define whether to configure IPv6 addresses on this virtual interface
based on the prefixes received in router advertisement messages. Router advertisements contain prefixes used
for link determination, address configuration and maximum hop limits. This setting is enabled by default.
18 Set the following Router Advertisement Processing settings for the virtual interface. Router advertisements are
periodically sent to hosts or sent in response to solicitation requests. The advertisement includes IPv6 prefixes
and other subnet and host information.
Accept RA Enable this option to allow router advertisements over this virtual
interface. IPv6 hosts can configure themselves automatically when
connected to an IPv6 network using the neighbor discovery protocol via
ICMPv6 router discovery messages. When first connected to a network, a
host sends a link-local router solicitation multicast request for its
configuration parameters; routers respond to such a request with a router
advertisement packet that contains Internet layer configuration
parameters.This setting is enabled by default.
No Default Router Select this option to consider routers unavailable on this interface for
default router selection. This setting is disabled by default.
No MTU Select this option to not use the existing MTU setting for router
advertisements on this virtual interface. If the value is set to zero no MTU
options are sent. This setting is disabled by default.
No Hop Count Select this option to not use the hop count advertisement setting for
router advertisements on this virtual interface. This setting is disabled by
default.
19 Select OK to save the changes. Select Reset to revert to the last saved configuration.
20 Select the IPv4 tab to set IPv4 settings for this virtual interface.
IPv4 is a connectionless protocol. It operates on a best effort delivery model that does not guarantee delivery
or assures proper sequencing or avoidance of duplicate delivery (unlike TCP).
22 Refer to the DHCP Relay field to set the DHCP relay server configuration used with the Virtual Interface.
Respond to DHCP Select this option to allow the onboard DHCP server to respond to relayed
Relay Packets DHCP packets on this interface. This setting is disabled by default.
DHCP Relay Provide IP addresses for DHCP server relay resources. DHCP relays
exchange messages between a DHCPv6 server and client. A client and
relay agent exist on the same link. When A DHCP request is received from
the client, the relay agent creates a relay forward message and sends it to
a specified server address. If no addresses are specified, the relay agent
forwards the message to all DHCP server relay multicast addresses. The
server creates a relay reply and sends it back to the relay agent. The relay
agent then sends back the response to the client.
23 Select OK to save the changes to the IPv4 configuration. Select Reset to revert to the last saved configuration.
24 Select the IPv6 tab to set IPv6 settings for this virtual interface.
IPv6 is the latest revision of the Internet Protocol (IP) designed to replace IPv4. IPV6 provides enhanced
identification and location information for computers on networks routing traffic across the Internet. IPv6
addresses are composed of eight groups of four hexadecimal digits separated by colons. IPv6 hosts can
configure themselves automatically when connected to an IPv6 network using the neighbor discovery protocol
via ICMPv6 router discovery messages. When first connected to a network, a host sends a link-local router
solicitation multicast request for its configuration parameters; routers respond to such a request with a router
advertisement packet that contains Internet layer configuration parameters.
25 Refer to the IPv6 Addresses field to define how IP6 addresses are created and utilized.
IPv6 Mode Select this option to enable IPv6 support on this virtual interface. IPv6 is
disabled by default.
IPv6 Address Static Define up to 15 global IPv6 IP addresses that can created statically. IPv6
addresses are represented as eight groups of four hexadecimal digits
separated by colons.
IPv6 Address Static Optionally set up to 15 global IPv6 IP addresses (in the EUI-64 format)
using EUI64 that can created statically. The IPv6 EUI-64 format address is obtained
through a 48-bit MAC address. The MAC is initially separated into two 24-
bits, with one being an OUI (Organizationally Unique Identifier) and the
other being client specific. A 16-bit 0xFFFE is then inserted between the
two 24-bits for the 64-bit EUI address. IEEE has chosen FFFE as a
reserved value which can only appear in EUI-64 generated from the an
EUI-48 MAC address.
IPv6 Address Link Provide the IPv6 local link address. IPv6 requires a link local address
Local assigned to every interface the IPv6 protocol is enabled, even when one
or more routable addresses are assigned.
26 Enable the Enforce Duplicate Address option to enforce duplicate address protection when any wired port is
connected and in a forwarding state. This option is enabled by default.
27 Refer to the IPv6 Address Prefix from Provider table to create IPv6 format prefix shortcuts as supplied by an
ISP.
28 Select + Add Row to launch a sub screen wherein a new delegated prefix name and host ID can be defined.
Figure 5-38 Virtual Interfaces - Basic Configuration screen - IPv6 tab - Add Address Prefix from Provider
Delegated Prefix Enter a 32 character maximum name for the IPv6 address prefix from
Name provider.
Host ID Define the subnet ID, host ID and prefix length.
29 Select OK to save the changes to the new IPv6 prefix from provider. Select Exit to close the screen without
saving the updates.
30 Refer to the IPv6 Address Prefix from Provider EUI64 table to set an (abbreviated) IP address prefix in EUI64
format.
31 Select + Add Row to launch a sub screen wherein a new delegated prefix name and host ID can be defined in
EUI64 format.
Figure 5-39 Virtual Interfaces - Basic Configuration screen - IPv6 tab - Add Address Prefix from Provider EUI64
Delegated Prefix Enter a 32 character maximum name for the IPv6 prefix from provider in
Name EUI format. Using EUI64, a host can automatically assign itself a unique
64-bit IPv6 interface identifier without manual configuration or DHCP.
Host ID Define the subnet ID and prefix length.
32 Select OK to save the changes to the new IPv6 prefix from provider in EUI64 format. Select Exit to close the
screen without saving the updates.
33 Refer to the DHCPv6 Relay table to set the address and interface of the DHCPv6 relay.
The DHCPv6 relay enhances an extended DHCP relay agent by providing support in IPv6. DHCP relays
exchange messages between a DHCPv6 server and client. A client and relay agent exist on the same link.
When A DHCP request is received from the client, the relay agent creates a relay forward message and sends it
to a specified server address. If no addresses are specified, the relay agent forwards the message to all DHCP
server relay multicast addresses. The server creates a relay reply and sends it back to the relay agent. The relay
agent then sends back the response to the client.
34 Select + Add Row to launch a sub screen wherein a new DHCPv6 relay address and interface VLAN ID can be
set.
Figure 5-40 Virtual Interfaces - Basic Configuration screen - IPv6 tab - Add DHCPv6 Relay
Address Enter an address for the DHCPv6 relay. These DHCPv6 relay receive
messages from DHCPv6 clients and forward them to DHCPv6 servers. The
DHCPv6 server sends responses back to the relay, and the relay then
sends these responses to the client on the local network.
Interface Select this option to enable a spinner control to define a VLAN ID from 1 -
4,094 used as the virtual interface for the DHCPv6 relay. The interface
designation is only required for link local and multicast addresses. A local
link address is a locally derived address designed for addressing on a
single link for automatic address configuration, neighbor discovery or
when no routing resources are available.
35 Select OK to save the changes to the DHCPv6 relay configuration. Select Exit to close the screen without saving
the updates.
36 Select the IPv6 RA Prefixes tab.
Figure 5-41 Virtual Interfaces - Basic Configuration screen - IPv6 RA Prefixes tab
37 Use the Router Advertisement Policy drop-down menu to select and apply a policy to the virtual interface.
Router advertisements are periodically sent to hosts or sent in response to solicitation requests. The
advertisement includes IPv6 prefixes and other subnet and host information.
38 Review the configurations of existing IPv6 advertisement policies. If needed select + Add Row to define the
configuration of an additional IPv6 RA prefix.
Figure 5-42 Virtual Interfaces - Basic Configuration screen - Add IPv6 RA Prefix
39 Set the following IPv6 RA Prefix settings:
Prefix Type Set the prefix delegation type used with this configuration. Options
include, Prefix, and prefix-from-provider. The default setting is Prefix. A
prefix allows an administrator to associate a user defined name to an IPv6
prefix. A provider assigned prefix is made available from an Internet
Service Provider (ISP) to automate the process of providing and informing
the prefixes used.
Prefix or ID Set the actual prefix or ID used with the IPv6 router advertisement.
Site Prefix The site prefix is added into a router advertisement prefix. The site
address prefix signifies the address is only on the local link.
Valid Lifetime Type Set the lifetime for the prefix's validity. Options include External (fixed),
decrementing and infinite. If set to External (fixed), just the Valid Lifetime
Sec setting is enabled to define the exact time interval for prefix validity. If
set to decrementing, use the lifetime date and time settings to refine the
prefix expiry period. If the value is set for infinite, no additional date or
time settings are required for the prefix and the prefix will not expire. The
default setting is External (fixed).
Valid Lifetime Sec If the lifetime type is set to External (fixed), set the Seconds, Minutes,
Hours or Days value used to measurement criteria for the prefix's
expiration. 30 days, 0 hours, 0 minutes and 0 seconds is the default
lifetime.
Valid Lifetime Date If the lifetime type is set to External (fixed), set the date in
MM/DD/YYYY format for the expiration of the prefix.
Valid Lifetime Time If the lifetime type is set to decrementing, set the time for the prefix's
validity.
Preferred Lifetime Set the administrator preferred lifetime for the prefix's validity. Options
Type include External (fixed), decrementing and infinite. If set to External
(fixed), just the Valid Lifetime Sec setting is enabled to define the exact
time interval for prefix validity. If set to decrementing, use the lifetime
date and time settings to refine the prefix expiry period. If the value is set
for infinite, no additional date or time settings are required for the prefix
and the prefix will not expire. The default setting is External (fixed).
Preferred Lifetime If the administrator preferred lifetime type is set to External (fixed), set
Sec the Seconds, Minutes, Hours or Days value used to measurement criteria
for the prefix's expiration. 30 days, 0 hours, 0 minutes and 0 seconds is
the default lifetime.
Preferred Lifetime If the administrator preferred lifetime type is set to External (fixed), set
Date the date in MM/DD/YYYY format for the expiration of the prefix.
Preferred Lifetime If the preferred lifetime type is set to decrementing, set the time for the
Time prefix's validity.
Autoconfig Autoconfiguration includes generating a link-local address, global
addresses via stateless address autoconfiguration and duplicate address
detection to verify the uniqueness of the addresses on a link. This setting
is enabled by default.
On Link Select this option to keep the IPv6 RA prefix on the local link. The default
setting is enabled.
40 Select OK to save the changes to the IPv6 RA prefix configuration. Select Exit to close the screen without
saving the updates.
41 Select OK to save the changes and overrides. Select Reset to revert to the last saved configuration.
42 Select the Security tab.
NOTE: A blue override icon (to the left of a parameter) defines the parameter as
having an override applied. To remove an override go to the Basic Configuration
section of the device and click the Clear Overrides button. This removes all
overrides from the device.
7 Refer to the following to review existing port channel configurations and status to determine whether a
parameter requires an override:
Name Displays the port channel’s numerical identifier assigned when it was
created. The numerical name cannot be modified as part of the edit
process.
Type Displays whether the type is port channel.
Description Lists a a short description (64 characters maximum) describing the port
channel or differentiating it from others with similar configurations.
Admin Status A green check mark defines the listed port channel as active and currently
enabled with the profile. A red “X” defines the port channel as currently
disabled and not available for use. The interface status can be modified
with the port channel configuration as required.
8 To edit or override the configuration of an existing port channel, select it from amongst those displayed and
select the Edit button. The port channel Basic Configuration screen displays by default.
Speed Select the speed at which the port channel can receive and transmit data.
Select either 10 Mbps, 100 Mbps or 1000 Mbps to establish a 10, 100 or
1000 Mbps data transfer rate for the selected half duplex or full duplex
transmission. These options are not available if Auto is selected. Select
Automatic to allow the port channel to automatically exchange
information about data transmission speeds and duplex capabilities. Auto
negotiation is helpful in an environment where different devices are
connected and disconnected on a regular basis. Automatic is the default
setting.
Duplex Select either half, full or automatic as the duplex option. Select Half
duplex to send data over the port channel, then immediately receive data
from the same direction in which the data was transmitted. Like a full-
duplex transmission, a half-duplex transmission can carry data in both
directions, just not at the same time. Select Full duplex to transmit data to
and from the port channel at the same time. Using full duplex, the port
channel can send data while receiving data as well. Select Automatic to
enable to the controller or service platform to dynamically duplex as port
channel performance needs dictate. Automatic is the default setting.
10 Use the Port Channel Load Balance drop-down menu from the Client Load Balancing section to define whether
port channel load balancing is conducted using a Source/Destination IP or a Source/Destination MAC. Source/
Destination IP is the default setting.
11 Define or override the following Switching Mode parameters to apply to the port channel configuration:
Mode Select either the Access or Trunk radio button to set the VLAN switching
mode over the port channel. If Access is selected, the port channel
accepts packets only from the native VLAN. Frames are forwarded
untagged with no 802.1Q header. All frames received on the port are
expected as untagged and are mapped to the native VLAN. If the mode is
set to Trunk, the port channel allows packets from a list of VLANs you
add to the trunk. A port channel configured as Trunk supports multiple
802.1Q tagged VLANs and one Native VLAN which can be tagged or
untagged. Access is the default setting.
Native VLAN Use the spinner control to define a numerical Native VLAN ID from
1 - 4094. The native VLAN allows an Ethernet device to associate
untagged frames to a VLAN when no 802.1Q frame is included in the
frame. Additionally, the native VLAN is the VLAN untagged traffic will be
directed over when using trunk mode. The default value is 1.
Tag the Native VLAN Select this option to tag the native VLAN. Controllers and service
platforms support the IEEE 802.1Q specification for tagging frames and
coordinating VLANs between devices. IEEE 802.1Q adds four bytes to
each frame identifying the VLAN ID for upstream devices that the frame
belongs. If the upstream Ethernet device does not support IEEE 802.1Q
tagging, it does not interpret the tagged frames. When VLAN tagging is
required between devices, both devices must support tagging and be
configured to accept tagged VLANs. When a frame is tagged, a 12 bit
frame VLAN ID is added to the 802.1Q header, so upstream Ethernet
devices know which VLAN ID the frame belongs to. The device reads the
12 bit VLAN ID and forwards the frame to the appropriate VLAN. When a
frame is received with no 802.1Q header, the upstream device classifies
the frame using the default or native VLAN assigned to the Trunk port.
The native VLAN allows an Ethernet device to associate untagged frames
to a VLAN when no 802.1Q frame is included in the frame. This setting is
disabled by default.
Allowed VLANs Selecting Trunk as the mode enables the Allowed VLANs parameter. Add
VLANs that exclusively send packets over the port channel.
12 Select OK to save the changes and overrides to the port channel Basic Configuration. Select Reset to revert to
the last saved configuration.
13 Select the Security tab.
15 Use the drop-down menus to select the firewall rules to apply to this profile’s Ethernet port configuration. The
firewall inspects IP and MAC traffic flows and detects attacks typically not visible to traditional wired firewall
appliances
16 Use the IPv4 Inbound Firewall Rules drop down menu to select the IPv4 specific firewall rules to apply to this
profile’s port channel configuration. IPv4 is a connectionless protocol for packet switched networking. IPv4
operates as a best effort delivery method, as it does not guarantee delivery, and does not ensure proper
sequencing or duplicate delivery (unlike (TCP). IPv4 hosts can use link local addressing to provide local
connectivity.
17 Use the IPv6 Inbound Firewall Rules drop down menu to select the IPv6 specific firewall rules to apply to this
profile’s port channel configuration. IPv6 is the latest revision of the Internet Protocol (IP) designed to replace
IPv4. IPV6 provides enhanced identification and location information for computers on networks routing traffic
across the Internet. IPv6 addresses are composed of eight groups of four hexadecimal digits separated by
colons.
18 If a firewall rule does not exist suiting the data protection needs of the target port channel configuration, select
the Create icon to define a new rule configuration or the Edit icon to modify an existing firewall rule
configuration.
19 Refer to the Trust section to define or override the following:
Trust ARP Responses Select this option to enable ARP trust on this port channel. ARP packets
received on this port are considered trusted, and information from these
packets is used to identify rogue devices. The default value is disabled.
Trust DHCP Responses Select this option to enable DHCP trust. If enabled, only DHCP
responses are trusted and forwarded on this port channel, and a DHCP
server can be connected only to a DHCP trusted port. The default value
is enabled.
ARP header Mismatch Select this option to enable a source MAC mismatch check in both the
Validation ARP and Ethernet header. The default value is enabled.
Trust 802.1p COS Select this option to enable 802.1p COS values on this port channel. The
values default value is enabled.
Trust IP DSCP Select this option to enable IP DSCP values on this port channel. The
default value is disabled.
20 Refer to the IPv6 Settings field to define the following:
Trust ND Requests Select the check box to enable neighbor discovery (ND) request trust on
this port channel (neighbor discovery requests received on this port are
considered trusted). Neighbor discovery allows the discovery of an
adjacent device’s MAC addresses, similar to Address Resolution Protocol
(ARP) on Ethernet in IPv4. The default value is disabled.
Trust DHCPv6 Select the check box to enable DHCPv6 trust. If enabled, only DHCPv6
Responses responses are trusted and forwarded on this port channel, and a
DHCPv6 server can be connected only to a trusted port. The default
value is enabled.
ND header Mismatch Select the check box to enable a mismatch check for the source MAC in
Validation both the ND header and link layer option. The default value is disabled.
RA Guard Select this option to allow router advertisements or IPv6 redirects from
this port. Router advertisements are periodically sent to hosts or sends
in response to solicitation requests. The advertisement includes IPv6
prefixes and other subnet and host information.This setting is enabled
by default.
21 Select OK to save the changes and overrides to the security configuration. Select Reset to revert to the last
saved configuration.
22 Select the Spanning Tree tab.
24 Set or override the following MSTP Configuration parameters for the port channel:
Enable as Edge Port Select this option to define this port as an edge port. Using an edge
(private) port, you can isolate devices to prevent connectivity over this
port channel. This setting is disabled by default.
Link Type Select either the Point-to-Point or Shared radio button. Selecting Point-
to-Point indicates the port should be treated as connected to a point-to-
point link. Selecting Shared indicates this port should be treated as
having a shared connection. A port connected to a hub is on a shared
link, while one connected to a controller or service platform is a point-
to-point link. Point-to-Point is the default setting.
Cisco MSTP Select either the Enable or Disable radio buttons. This enables
Interoperability interoperability with Cisco’s version of MSTP, which is incompatible with
standard MSTP. This setting is disabled by default.
Force Protocol Version Sets the protocol version to either STP(0), Not Supported(1), RSTP(2) or
MSTP(3). MSTP is the default setting.
Guard Determines whether the port channel enforces root bridge placement.
Setting the guard to Root ensures the port is a designated port.
Typically, each guard root port is a designated port, unless two or more
ports (within the root bridge) are connected together. If the bridge
receives superior (BPDUs) on a guard root-enabled port, the guard root
moves the port to a root-inconsistent STP state. This state is equivalent
to a listening state. No data is forwarded across the port. Thus, the
guard root enforces the root bridge position.
25 Refer to the Spanning Tree Port Cost table.
26 Define or override an Instance Index using the spinner control and then set the Cost. The default path cost
depends on the user defined port speed. The cost helps determine the role of the port channel in the MSTP
network.
The designated cost is the cost for a packet to travel from this port to the root in the MSTP configuration. The
slower the media, the higher the cost.
Speed Default Path Cost
<=100000 bits/sec 200000000
<=1000000 bits/sec 20000000
<=10000000 bits/sec 2000000
<=100000000 bits/sec 200000
<=1000000000 bits/sec 20000
<=10000000000 bits/sec 2000
<=100000000000 bits/ 200
sec
<=1000000000000 bits/ 20
sec
>1000000000000 bits/ 2
sec
27 Refer to the Spanning Tree Port Priority table.
Define or override an Instance Index using the spinner control, then set the Priority. The lower the priority, the
greater likelihood of the port becoming a designated port.
By default, VM interfaces are internally connected to the dataplane bridge via VMIF1. VMIF1 is an untagged port
providing access to VLAN 1 to support the capability to connect the VM interfaces to any of the VMIF ports. This
provides the flexibility to move a VM interface onto different VLANs as well as configure specific firewall and QOS
rules.
NOTE: A blue override icon (to the left of a parameter) defines the parameter as
having an override applied. To remove an override go to the Basic Configuration
section of the device and click the Clear Overrides button. This removes all
overrides from the device.
7 Refer to the following to review existing port channel configurations and status to determine whether a
parameter requires an override:
Name Displays the VM interface numerical identifier assigned when it was
created. The numerical name cannot be modified as part of the edit
process.
Type Displays whether the type is a VM interface.
Description Lists a short description (64 characters maximum) describing the VM
interface or differentiating it from others with similar configurations.
Admin Status A green check mark defines the listed VM interface as active and currently
enabled with the profile. A red “X” defines the VM interface as currently
disabled and not available for use. The interface status can be modified
with the VM interface Basic Configuration screen as required.
Mode Displays the layer 3 mode of the VM interface as either Access or Trunk
(as defined within the VM Interfaces Basic Configuration screen). If Access
is selected, the listed VM interface accepts packets only from the native
VLAN. Frames are forwarded untagged with no 802.1Q header. All frames
received on the port are expected as untagged and mapped to the native
VLAN. If set to Trunk, the port allows packets from a list of VLANs added
to the trunk. A VM interface configured as Trunk supports multiple 802.1Q
tagged VLANs and one Native VLAN which can be tagged or untagged.
Native VLAN Lists the numerical VLAN ID (1 - 4094) set for the native VLAN. The
native VLAN allows a VM interface to associate untagged frames to a
VLAN when no 802.1Q frame is included in the frame. Additionally, the
native VLAN is the VLAN untagged traffic is directed over when using a
VM interface in trunk mode.
Tag Native VLAN A green check mark defines the native VLAN as tagged. A red “X” defines
the native VLAN as untagged. When a frame is tagged, the 12 bit frame
VLAN ID is added to the 802.1Q header so upstream VM interface ports
know which VLAN ID the frame belongs to. The device reads the 12 bit
VLAN ID and forwards the frame to the appropriate VLAN. When a frame
is received with no 802.1Q header, the upstream VM interface classifies the
frame using the default or native VLAN assigned to the Trunk port. A
native VLAN allows a VM interface to associate untagged frames to a
VLAN when no 802.1Q frame is included in the frame.
Allowed VLANs Displays those VLANs allowed to send packets over the listed VM
interface. Allowed VLANs are only listed when the mode has been set to
Trunk.
8 To edit or override the configuration of an existing VM interface, select it from amongst those displayed and
select the Edit button. The VM Interfaces Basic Configuration screen displays by default.
10 Define or override the following Switching Mode parameters to apply to the VM Interface configuration:
Mode Select either the Access or Trunk radio button to set the VLAN switching
mode over the VM interface. If Access is selected, the VM interface
accepts packets only from the native VLAN. Frames are forwarded
untagged with no 802.1Q header. All frames received on the VMIF port are
expected as untagged and are mapped to the native VLAN. If the mode is
set to Trunk, the VM interface allows packets from a list of VLANs you
add to the trunk. A VM interface configured as Trunk supports multiple
802.1Q tagged VLANs and one Native VLAN which can be tagged or
untagged. Access is the default setting.
Native VLAN Use the spinner control to define a numerical Native VLAN ID from
1 - 4094. The native VLAN allows an Ethernet device to associate
untagged frames to a VLAN when no 802.1Q frame is included in the
frame. Additionally, the native VLAN is the VLAN untagged traffic will be
directed over when using trunk mode. The default value is 1.
Tag the Native VLAN Select this option to tag the native VLAN. Service platforms support the
IEEE 802.1Q specification for tagging frames and coordinating VLANs
between devices. IEEE 802.1Q adds four bytes to each frame identifying
the VLAN ID for upstream VMIF that the frame belongs. If the upstream
VMIF does not support IEEE 802.1Q tagging, it does not interpret the
tagged frames. When VLAN tagging is required between VM interface
ports, both VM interfaces must support tagging and be configured to
accept tagged VLANs. When a frame is tagged, a 12 bit frame VLAN ID is
added to the 802.1Q header, so upstream VM interfaces know which
VLAN ID the frame belongs to. The 12 bit VLAN ID is read and the frame
is forwarded to the appropriate VLAN. When a frame is received with no
802.1Q header, the upstream VMIF classifies the frame using the default or
native VLAN assigned to the Trunk port. The native VLAN allows a VM
interface to associate untagged frames to a VLAN when no 802.1Q frame
is included in the frame. This setting is disabled by default.
Allowed VLANs Selecting Trunk as the mode enables the Allowed VLANs parameter. Add
VLANs that exclusively send packets over the VM interface. The available
range is from 1 - 4094. The maximum number of entries is 256.
11 Select OK to save the changes and overrides to the VM interface basic configuration. Select Reset to revert to
the last saved configuration.
12 Select the Security tab.
To define a radio configuration override from the Access Point’s associated controller or service platform:
1 Select Devices from the Configuration tab.
The Device Configuration screen displays a list of managed devices or peer controllers, service platforms or
Access Points.
2 Select an Access Point (by double-clicking it) from amongst those displayed within the Device Configuration
screen.
Devices can also be selected directly from the Device Browser in the lower, left-hand, side of the UI.
3 Select Profile Overrides from the Device menu to expand it into sub menu options.
4 Select Interface to expand its sub menu options.
5 Select Radios.
NOTE: A blue override icon (to the left of a parameter) defines the parameter as
having an override applied. To remove an override go to the Basic Configuration
section of the device and click the Clear Overrides button. This removes all
overrides from the device.
6 Review the following radio configuration data to determine whether a radio configuration requires modification
or override to better support the managed network:
Name Displays whether the reporting radio is the Access Point’s radio1, radio2 or
radio3.
Type Displays the type of radio housed by each listed Access Point.
Description Displays a brief description of the radio provided by the administrator
when the radio’s configuration was added or modified.
Admin Status A green check mark defines the listed radio configuration as active and
enabled with its supported profile. A red “X” defines the Virtual Interface
as currently disabled. The interface status can be modified when a new
Virtual Interface is created or an existing one modified.
RF Mode Displays whether each listed radio is operating in the 802.11an or
802.11bgn radio band. If the radio is a dedicated sensor, it will be listed as
a sensor to define the radio as not providing typical WLAN support. If the
radio is a client-bridge, it provides a typical bridging function and does
not provide WLAN support. The radio band is set from within the Radio
Settings tab.
Channel Lists the channel setting for the radio. Smart is the default setting. If set
to smart, the Access Point scans non-overlapping channels listening for
beacons from other Access Points. After the channels are scanned, it
selects the channel with the fewest Access Points. In the case of multiple
access points on the same channel, it will select the channel with the
lowest average power level. The column displays smart if set for dynamic
Smart RF support.
Transmit Power Lists the transmit power for each radio displayed as a value in milliwatts.
Selecting smart allows the radio to perform power adjustments to
compensate for failed neighboring radios
Overrides A Clear link appears for each radio configuration that has an override
applied to the profile’s configuration. Select Clear to revert this specific
radio configuration to the profile configuration originally defined by the
administrator for this radio.
7 If required, select a radio configuration and select Edit to modify or override portions of its configuration.
8 Define or override the following radio configuration parameters from within the Properties field:
Description Provide or edit a description (1 - 64 characters in length) for the radio that
helps differentiate it from others with similar configurations.
Admin Status Either select the Enabled or Disabled radio button to define this radio’s
current status within the network. When enabled, the Access Point is
operational and available for client support within the network. The radio
is enabled by default and must be manually shutdown.
Radio QoS Policy Use the drop-down menu to specify an existing QoS policy to apply to the
Access Point radio in respect to its intended radio traffic. If there’s no
existing suiting the radio’s intended operation, select the Create icon to
define a new QoS policy that can be applied to this profile. For more
information, see Radio QoS Policy on page 6-66.
Association ACL Use the drop-down menu to specify an existing Association ACL policy to
apply to the Access Point radio. An Association ACL is a policy-based
Access Control List (ACL) that either prevents or allows wireless clients
from connecting to a managed Access Point radio. An ACL is a sequential
collection of permit and deny conditions that apply to controller or service
platform packets. When a packet is received on an interface, the controller
or service platform compares the fields in the packet against any applied
ACLs to verify the packet has the required permissions to be forwarded,
based on the criteria specified in the access lists. If a packet does not
meet any of the criteria specified in the ACL, the packet is dropped. Select
the Create icon to define a new Association ACL that can be applied to
this profile.
9 Set or override the following profile Radio Settings for the selected Access Point radio.
RF Mode Set the mode to either 2.4 GHz WLAN or 5 GHz WLAN depending on the
radio’s intended client support requirement. Set the mode to Sensor if
using the radio for rogue device detection. To set a radio as a detector,
disable sensor support on the other Access Point radio. Set the mode to
scan-ahead in DFS aware countries to allow a mesh points secondary
radio to scan for an alternative channel for backhaul transmission in the
event of a radar event on the principal radio. The secondary radio is
continually monitoring the alternate channel, which means the principal
radio can switch channels and transmit data immediately without waiting
for the channel availability check.
Lock RF Mode Select this option to lock Smart RF for this radio. The default setting is
disabled.
Channel Use the drop-down menu to select the channel of operation for the radio.
Only a trained installation professional should define the radio channel.
Select Smart for the radio to scan non-overlapping channels listening for
beacons from other Access Points. After channels are scanned, the radio
selects the channel with the fewest Access Points. In the case of multiple
Access Points on the same channel, it selects the channel with the lowest
average power level. The default value is Smart. Channels with a “w”
appended to them are unique to the 40 MHz band. Channels with a “ww”
appended to them are 802.11ac specific, only appear when using an
AP8232, and are unique to the 80 MHz band.
DFS Revert Home Select this option to revert to the home channel after a DFS evacuation
period.
DFS Duration Set the DFS duration between 30 to 3,600 minutes. This is the duration
for which the radio stays in the in the new channel. The default value is 90
minutes.
Transmit Power Set the transmit power of the selected Access Point radio. If using a dual
or three radio model Access Point, each radio should be configured with a
unique transmit power in respect to its intended client support function.
Select the Smart RF option to let Smart RF determine the transmit power.
A setting of 0 defines the radio as using Smart RF to determine its output
power. 20 dBm is the default value.
Antenna Gain Set the antenna between 0.00 - 15.00 dBm. The access point’s Power
Management Antenna Configuration File (PMACF) automatically
configures the access point’s radio transmit power based on the antenna
type, its antenna gain (provided here) and the deployed country’s
regulatory domain restrictions. Once provided, the access point calculates
the power range. Antenna gain relates the intensity of an antenna in a
given direction to the intensity that would be produced ideally by an
antenna that radiates equally in all directions (isotropically), and has no
losses. Although the gain of an antenna is directly related to its directivity,
its gain is a measure that takes into account the efficiency of the antenna
as well as its directional capabilities. Only a professional installer should
set the antenna gain. The default value is 0.00.
Antenna Mode Set the number of transmit and receive antennas on the Access Point. 1x1
is used for transmissions over just the single “A” antenna, 1x3 is used for
transmissions over the “A” antenna and all three antennas for receiving.
2x2 is used for transmissions and receipts over two antennas for dual
antenna models. The default setting is dynamic based on the Access Point
model deployed and its transmit power settings.
Enable Antenna Select this option to enable antenna diversity on supported antennas.
Diversity Antenna diversity uses two or more antennas to increase signal quality
and strength. This option is disabled by default.
Adaptivity Recovery Select this option to switch channels when an Access Point‘s radio is in
adaptivity mode. In adaptivity mode, an Access Point monitors
interference on its set channel and stops functioning when the radio’s
defined interference tolerance level is exceeded. When the defined
adaptivity timeout is exceeded, the radio resumes functionality on a
different channel. This option is enabled by default.
Adaptivity Timeout Set the adaptivity timeout from 30 to 3,600 minutes. The default setting
is 90 minutes.
Wireless Client Select this option to specify the transmit power on supported wireless
Power clients. If this is enabled set a client power level between 0 to 20 dBm.
This option is disabled by default.
Dynamic Chain Select this option for the radio to dynamically change the number of
Selection transmit chains. This option is enabled by default.
Rate Use the Select button to set rate options depending on the 802.11
protocols selected. If the radio band is set to Sensor or Detector, the Data
Rates drop-down menu is not enabled, as the rates are fixed and not user
configurable. If 2.4 GHz is selected as the radio band, select separate
802.11b, 802.11g and 802.11n rates and define how they are used in
combination. If 5 GHz is selected as the radio band, select separate 802.11a
and 802.11n rates then define how they are used together. When using
802.11n (in either the 2.4 or 5 GHz band), Set a MCS (modulation and
coding scheme) in respect to the radio’s channel width and guard interval.
A MCS defines (based on RF channel conditions) an optimal combination
of 8 data rates, bonded channels, multiple spatial streams, different guard
intervals and modulation types. Clients can associate as long as they
support basic MCS (as well as non-11n basic rates).
If dedicating an AP81XX model radio to either 2.4 or 5 Ghz support, a
Custom Rates option is available to set a modulation and coding scheme
(MCS) in respect to the radio’s channel width and guard interval. A MCS
defines (based on RF channel conditions) an optimal combination of rates,
bonded channels, multiple spatial streams, different guard intervals and
modulation types. Clients can associate as long as they support basic MCS
(as well as non-11n basic rates). If Basic is selected within the 802.11n Rates
field, the MCS0-7 option is auto selected as a Supported rate and that
option is greyed out. If Basic is not selected, any combination of MCS0-7,
MCS8-15 and MCS16-23 can be supported, including a case where MCS0-7
and MCS16-23 are selected and not MCS8-15. The MCS0-7 and MCS8-15
options are available to each support Access Point. However, the MCS16-
23 option is only available to AP81XX model Access Points and its ability
to provide 3x3x3 MIMO support.
Radio Placement Use the drop-down menu to specify whether the radio is located Indoors
or Outdoors. The placement should depend on the country of operation
selected and its regulatory domain requirements for radio emissions. The
default setting is Indoors.
Max Clients Use the spinner control to set a maximum permissible number of clients
to connect with this radio. The available range is from 0 - 256 clients. The
default is 256.
Rate Selection Specify a radio selection method for the radio. The selection methods are:
Methods Standard - standard monotonic radio selection method will be used.
Opportunistic - sets opportunistic radio link adaptation (ORLA) as the
radio selection method. This mode uses opportunistic data rate selection
to provide the best throughput. The ORLA rate selection mode is
supported only on the AP7161 and AP8163 model Access Points.
10 Set or override the following profile WLAN Properties for the selected Access Point radio:
Beacon Interval Set the interval between radio beacons in milliseconds (either 50, 100 or
200). A beacon is a packet broadcast by adopted radios to keep the
network synchronized. Included in a beacon is the WLAN service area,
radio address, broadcast destination addresses, a time stamp, and
indicators about traffic and delivery (such as a DTIM). Increase the DTIM/
beacon settings (lengthening the time) to let nodes sleep longer and
preserve battery life. Decrease these settings (shortening the time) to
support streaming-multicast audio and video applications that are jitter-
sensitive. The default value is 100 milliseconds.
DTIM Interval Set a DTIM Interval to specify a period for Delivery Traffic Indication
Messages (DTIM). A DTIM is periodically included in a beacon frame
transmitted from adopted radios. The DTIM indicates broadcast and
multicast frames (buffered at the Access Point) are soon to arrive. These
are simple data frames that require no acknowledgment, so nodes
sometimes miss them. Increase the DTIM/ beacon settings (lengthening
the time) to let nodes sleep longer and preserve their battery life.
Decrease these settings (shortening the time) to support streaming
multicast audio and video applications that are jitter-sensitive.
RTS Threshold Specify a Request To Send (RTS) threshold (between 1 - 65,636 bytes) for
use by the WLAN's adopted Access Point radios. RTS is a transmitting
station's signal that requests a Clear To Send (CTS) response from a
receiving client. This RTS/CTS procedure clears the air where clients are
contending for transmission time. Benefits include fewer data collisions
and better communication with nodes that are hard to find (or hidden)
because of other active nodes in the transmission path.
Control RTS/CTS by setting an RTS threshold. This setting initiates an
RTS/CTS exchange for data frames larger than the threshold, and sends
(without RTS/CTS) any data frames smaller than the threshold.
Consider the trade-offs when setting an appropriate RTS threshold for the
WLAN's Access Point radios. A lower RTS threshold causes more frequent
RTS/CTS exchanges. This consumes more bandwidth because of
additional latency (RTS/CTS exchanges) before transmissions can
commence. A disadvantage is the reduction in data-frame throughput. An
advantage is quicker system recovery from electromagnetic interference
and data collisions. Environments with more wireless traffic and
contention for transmission make the best use of a lower RTS threshold.
A higher RTS threshold minimizes RTS/CTS exchanges, consuming less
bandwidth for data transmissions. A disadvantage is less help to nodes
that encounter interference and collisions. An advantage is faster data-
frame throughput. Environments with less wireless traffic and contention
for transmission make the best use of a higher RTS threshold.
Short Preamble If using an 802.11bg radio, select this option to transmit using a short
preamble. Short preambles improve throughput. However, some devices
(SpectraLink/Polycomm phones) require long preambles. The default
value is disabled.
Guard Interval Use the drop-down menu to specify a Long or Any guard interval. The
guard interval is the space between characters being transmitted. The
guard interval eliminates inter-symbol interference (ISI). ISI occurs when
echoes or reflections from one character interfere with another character.
Adding time between transmissions allows echo's and reflections to settle
before the next character is transmitted. A shorter guard interval results in
shorter character times which reduces overhead and increases data rates
by up to 10%. The default value is Long.
Probe Response Rate Use the drop-down menu to specify the data rate used for the
transmission of probe responses. Options include, highest-basic, lowest-
basic and follow-probe-request (default setting).
Probe Response Select this option to retry probe responses if they are not acknowledged
Retry by the target wireless client. The default value is enabled.
11 Select a mode from the Feed WLAN Packets to Sensor check box in the Radio Share section to enable this
feature. Select either Inline or Promiscuous mode to allow the packets the radio is switching to also be used by
the WIPS analysis module. This feature can be enabled in two modes: an inline mode where the WIPS sensor
receives the packets from the radios with radio operating in normal mode. A promiscuous mode where the
radio is configured to a mode where it receives all packets on the channel whether the destination address is
the radio or not, and the WIPS module can analyze them.
12 Select the WLAN Mapping/Mesh Mapping tab.
Figure 5-54 Profile Overrides - Access Point Radio WLAN Mapping tab
13 Refer to the WLAN/BSS Mappings field to set or override WLAN BSSID assignments for an existing Access
Point deployment.
Administrators can assign each WLAN its own BSSID. If using a single-radio access point, there are 8 BSSIDs
available. If using a dual-radio access point there are 8 BSSIDs for the 802.11b/g/n radio and 8 BSSIDs for the
802.11a/n radio.
14 Select Advanced Mapping to enable WLAN mapping to a specific BSS ID.
15 Select OK to save the changes and overrides to the WLAN Mapping. Select Reset to revert to the last saved
configuration.
16 Select the Legacy Mesh tab.
Mesh Links Specify the number of mesh links allowed by the radio. The radio can
have from 1- 6 mesh links when the radio is configured as a Portal.
Mesh PSK Provide the encryption key in either ASCII or Hex format. Administrators
must ensure this key is configured on the Access Point when staged for
mesh, added to the mesh client and to the portal Access Point’s
configuration on the controller or service platform. Select Show to expose
the characters used in the PSK.
NOTE: Only single hop mesh links are supported at this time.
18 Refer to the Preferred Peer Devices table to add mesh peers. For each peer being added enter its MAC Address
and a Priority from 1 - 6. The lower the priority number assigned, the higher the priority it’s given when
connecting to the mesh infrastructure.
19 Select the + Add Row button to add preferred peer devices for the radio to connect to in mesh mode.
20 Select the Client Bridge Settings tab to configure the selected radio as a client-bridge. Note, before configuring
the client-bridge parameters, set the radio's rf-mode to bridge.
An Access Point's radio can be configured to form a bridge between its wireless/wired clients and an
infrastructure WLAN. The bridge radio authenticates and associates with an infrastructure WLAN Access Point.
After successful association, the Access Point switches frames between its bridge radio and wired/wireless
client(s) connected either to its GE port(s) or to the other radio, there by providing the clients access to the
infrastructure WLAN resources. This feature is supported only on the AP6522, AP6562, AP7602, AP7532,
AP7562, AP7602, and AP7622 model Access Points.
Channel Dwell Time Set the channel-dwell time from 50 to 2000 milliseconds. This is the time
the client-bridge radio dwells on each channel (configured in the list of
channels) when scanning for an infrastructure WLAN. The default is 150
milliseconds.
Authentication Set the mode of authentication with the infrastructure WLAN. The
authentication mode specified here should be the same as that
configured on the infrastructure WLAN. The options are None and EAP. If
selecting EAP, specify the EAP authentication parameters. The default
setting in None.
For information on WLAN authentication, see Configuring WLAN
Security.
Encryption Set the packet encryption mode. The encryption mode specified here
should be the same as that configured on the infrastructure WLAN. The
options are None, CCMP and TKIP. The default setting is None.
For information on WLAN encryption, see Configuring WLAN Security.
22 Refer to the EAP Parameters field and define the following EAP authentication parameters:
Type Use the drop-down menu to select the EAP authentication method used
by the supplicant. The options are TLS and PEAP-MS-CHAPv2. The
default EAP type is PEAP-MS-CHAPv2.
Username Set the 32 character maximum user name for an EAP authentication
credential exchange.
Password Set the 32 character maximum password for the EAP user name specified
above.
Pre-shared Key Set the pre-shared key (PSK) used with EAP. Note, the authenticating
algorithm and PSK configured should be same as that on the
infrastructure WLAN.
Handshake Basic Set the basic rate of exchange of handshake packets between the client-
Rate bridge and infrastructure WLAN Access Points. The options are highest
and normal. The default value is highest.
23 Refer to the Channel Lists field and define the list of channels the client-bridge radio scans when scanning for
an infrastructure WLAN.
Band A Define a list of channels for scanning across all the channels in the 5.0
GHz radio band.
Band BG Define a list of channels for scanning across all the channels in the 2.4
GHz radio band.
24 Refer to the Keepalive Parameters field and define the following configurations:
Keepalive Type Set the keepalive frame type exchanged between the client-bridge and
infrastructure Access Points. This is the type of packets exchanged
between the client-bridge and infrastructure Access Points, at specified
intervals, to keep the client-bridge link up and active. The options are null-
data and WNMP packets. The default value is null-data.
Keepalive Interval Set the keepalive interval from 0 - 86,400 seconds. This is the interval
between two successive keepalive frames exchanged between the client-
bridge and infrastructure Access Points. The default value is 300 seconds.
Inactivity Timeout Set the inactivity timeout for each bridge MAC address from 0 - 8,64,000
seconds. This is the time for which the client-bridge access point waits
before deleting a wired/wireless client’s MAC address from which a frame
has not been received for more than the time specified here. For example,
if the inactivity time is set at 120 seconds, and if no frames are received
from a client (MAC address) for 120 seconds, it is deleted. The default
value is 600 seconds.
25 Refer to the Radio Link Behaviour field and define the following configurations:
Shutdown Other Select this option to enable shutting down of the non-client bridge radio
Radio when Link (this is the radio to which wireless-clients associate) when the link
Goes Down between the client-bridge and infrastructure access points is lost. When
enabled, wireless clients associated with the non-client bridge radio are
pushed to search for and associate with other access points having
backhaul connectivity. This option is disabled by default.
If enabling this option, specify the time for which the non-client bridge
radio is shut down. Use the spinner to specify a time from 1 - 1,800
seconds.
Refresh VLAN Select this option to enable the SVI to refresh on re-establishing client
Interface when Link bridge link to the infrastructure Access Point. And, if using a DHCP
Comes Up assigned IP address, it also causes a DHCP renew. This option is enabled
by default.
26 Refer to the Roam Criteria field and define the following configuration:
Seconds for Missed Set this interval from 0 to 60 seconds. This is the time for which the
Beacons client-bridge Access Point waits, after missing a beacon from the
associated infrastructure WLAN Access Point, before roaming to another
infrastructure Access Point. For example, if the Seconds for Missed
Beacon is set to 30 seconds, and if more than 30 seconds have passed
since the last beacon received from the infrastructure Access Point, the
client-bridge Access Point resumes scanning for another infrastructure
Access Point. The default value s 20 seconds.
Minimum Signal Set the minimum signal-strength threshold for signals received from the
Strength infrastructure Access Point. Specify a value from -128 to -40 dBm. If the
RSSI value of signals received from the infrastructure access point falls
below the value specified here, the client-bridge access point resumes
scanning for another infrastructure access point. The default is -75 dBm.
27 Select OK to save or override the changes to the Client Bridge Settings screen. Select Reset to revert to the last
saved configuration.
28 Select the Advanced Settings tab.
Figure 5-57 Profile Overrides - Access Point Radio Advanced Settings tab
29 Refer to the Aggregate MAC Protocol Data Unit (A-MPDU) field to define or override how MAC service frames
are aggregated by the Access Point radio.
A-MPDU Modes Use the drop-down menu to define the A-MPDU mode supported.
Options include Transmit Only, Receive Only, Transmit and Receive and
None. The default value is Transmit and Receive. Using the default value,
long frames can be both sent and received (up to 64 KB). When enabled,
define either a transmit or receive limit (or both).
Minimum Gap Use the drop-down menu to define the minimum gap between A-MPDU
Between Frames frames (in microseconds). The default value is 4 microseconds. A value of
auto designates the gap is set by the system.
Received Frame Size If a support mode is enabled allowing A-MPDU frames to be received,
Limit define an advertised maximum limit for received A-MPDU aggregated
frames. Options include 8191, 16383, 32767 or 65535 bytes. The default
value is 65535 bytes.
Transmit Frame Size Use the spinner control to set a limit on transmitted A-MPDU aggregated
Limit frames. The available range is from 2,000 - 65,535 bytes. The default
value is 65535 bytes.
30 Use the A-MSDU Modes drop-down menu in the Aggregate MAC Service Data Unit (A-MSDU) section to set or
override the supported A-MSDU mode.
Available modes include Receive Only and Transmit and Receive. Transmit and Receive is the default value.
Using Transmit and Receive, frames up to 4 KB can be sent and received. The buffer limit is not configurable.
31 Use the Airtime Fairness fields to optionally prioritize wireless access to devices.
Select Enable Fair Access to enable this feature and provide equal access client access to radio resources.
Select Prefer High Throughput Clients to prioritize clients with higher throughput (802.11n clients) over clients
with slower throughput (802.11 a/b/g) clients. Use the spinner control to set a weight for the higher throughput
clients.
32 Set or override the following Miscellaneous advanced radio settings:
RIFS Mode Define a RIFS mode to determine whether interframe spacing is applied
to Access Point transmissions or received packets, both, or neither The
default mode is Transmit and Receive. Interframe spacing is an interval
between two consecutive Ethernet frames to enable a brief recovery
between packets and allow target devices to prepare for the reception of
the next packet. Consider setting this value to None for high priority
traffic to reduce packet delay.
STBC Mode Select a space–time block coding (STBC) option to transmit multiple data
stream copies across Access Point antennas to improve signal reliability.
An Access Point’s transmitted signal traverses a problematic environment,
with scattering, reflection and refraction all prevalent. The signal can be
further corrupted by noise at the receiver. Consequently, some of the
received data copies are less corrupt and better than others. This
redundancy means there’s a greater chance of using one, or more, of the
received copies to successfully decode the signal. STBC effectively
combines all the signal copies to extract as much information from each
as possible.
Transmit Enable beamforming to steer signals to peers in a specific direction to
Beamforming enhance signal strength and improve throughput amongst meshed
devices (not clients). Each Access Point radio support up to 16
beamforming capable mesh peers. When enabled, a beamformer steers
its wireless signals to its peers. A beamformee device assists the
beamformer with channel estimation by providing a feedback matrix. The
feedback matrix is a set of values sent by the beamformee to assist the
beamformer in computing a steering matrix. A steering matrix is an
additional set of values used to steer wireless signals at the beamformer
so constructive signals arrive at the beamformee for better SNR and
throughput. Any beamforming capable mesh peer connecting to a radio
whose capacity is exhausted cannot enable beamforming itself. Transmit
beamforming is available on AP81XX (AP8122, AP8132 and AP8163) model
Access Points only, and is disabled by default.
33 Set or override the following Aeroscout Properties:
Forwarding Host Specify the Aeroscout engine’s IP address. When specified, the AP
forwards Aeroscout beacons directly to the Aeroscout locationing engine
without proxying through the controller or RF Domain manager.
Note: Aeroscout beacon forwarding is supported only on the AP6532, AP7502,
AP7522, AP7532, AP7562, AP8432, AP8533 model Access Points.
Forwarding Port Use the spinner control to set the port on which the Aeroscout engine is
reachable.
MAC to be forwarded Specify the MAC address to be forwarded.
Scan Interval Set the interval (from 2 - 100 dtims) off channel scans occur. The default
setting is 20dtims.
Sniffer Redirect Specify the IP address of the host to which captured off channel scan
packets are redirected.
38 If an AP7161 or AP7181 is deployed, refer to the following AP7161/AP7181 specific values to set outdoor antenna
characteristics:
Enable Antenna Enable this settings (on AP7181 models only) to allow the Access Point to
Downlift physically transmit in a downward orientation (ADEPT mode).
Extended Range Set an extended range (from 1 - 25 kilometers) to allow AP7161 and
AP7181 model Access Points to transmit and receive with their clients at
greater distances without being timed out.
39 Select OK to save or override the changes to the Advanced Settings screen. Select Reset to revert to the last
saved configuration.
NOTE: A blue override icon (to the left of a parameter) defines the parameter as
having an override applied. To remove an override go to the Basic Configuration
section of the device and click the Clear Overrides button. This removes all
overrides from the device.
6 Refer to the WAN (3G) Backhaul configuration to specify WAN card settings:
WAN Interface Name Displays the WAN Interface name for the WAN 3G Backhaul card.
Reset WAN Card If the WAN Card becomes unresponsive or is experiencing other errors
click the Reset WAN Card button to power cycle and reboot the WAN
card.
Enable WAN (3G) Check this box to enable 3G WAN card support on the device. A
supported 3G card must be connected to the device for this feature to
work properly.
7 Define or override the following authentication parameters from within the Basic Settings field:
Username Provide a username for authentication support by the cellular data carrier.
Password Provide a password for authentication support by the cellular data carrier.
Access Point Name Enter the name of the cellular data provider if necessary. This setting is
(APN) needed in areas with multiple cellular data providers using the same
protocols, such as Europe and Asia.
Authentication Type Use the drop-down menu to specify the authentication type used by the
cellular data provider. Supported authentication types are None, PAP,
CHAP, MSCHAP, and MSCHAP-v2.
8 Define or override the following NAT parameters from within the Network Address Translation (NAT) field:
NAT Direction Define the Network Address Translation (NAT) direction. Options include:
Inside - The inside network is transmitting data over the network its
intended destination. On the way out, the source IP address is changed in
the header and replaced by the (public) IP address.
Outside - Packets passing through the NAT on the way back to the
controller or service platform managed LAN are searched against to the
records kept by the NAT engine. There, the destination IP address is
changed back to the specific internal private class IP address in order to
reach the LAN over the network.
None - No NAT activity takes place. This is the default setting.
9 Define or override the following security parameters from within the Security Settings field:
IPv4 Inbound Use the drop-down menu to select an inbound IPv4 ACL to associate with
Firewall Rules traffic on the WAN backhaul. This setting pertains to IPv4 inbound traffic
only and not IPv6. IPv4 operates as a best effort delivery method, as it
does not guarantee delivery, and does not ensure proper sequencing or
duplicate delivery (unlike (TCP). IPv4 hosts can use link local addressing
to provide local connectivity. If an appropriate IP ACL does not exist,
select the Add button to create a new one.
VPN Crypto Map If necessary, specify a crypto map for the wireless WAN. A crypto map
can be up to 256 characters long. If a suitable crypto map is not available,
click the Create button to configure a new one.
Define or override the following route parameters from within the Default Route Priority field:
WWAN Default Route Use the spinner control to define a priority from 1 - 8,000 for the default
Priority route learned by the wireless WAN. The default value is 3000.
10 Select OK to save or override the changes to the Advanced Settings screen. Select Reset to revert to the last
saved configuration.
To provide this point-to-point connection, each PPPoE session learns the Ethernet address of a remote PPPoE
client, and establishes a session. PPPoE uses both a discover and session phase to identify a client and establish a
point-to-point connection. By using such a connection, a Wireless WAN fail over is available to maintain seamless
network access if the access point’s Wired WAN were to fail.
NOTE: Devices with PPPoE enabled continue to support VPN, NAT, PBR and 3G fail
over on the PPPoE interface. Multiple PPPoE sessions are supported using a single
user account user account if RADIUS is configured to allow simultaneous access.
When PPPoE client operation is enabled, it discovers an available server and establishes a PPPoE link for traffic
slow. When a wired WAN connection failure is detected, traffic flows through the WWAN interface in fail-over
mode (if the WWAN network is configured and available). When the PPPoE link becomes accessible again, traffic
is redirected back through the access point’s wired WAN link.
When the access point initiates a PPPoE session, it first performs a discovery to identify the Ethernet MAC address
of the PPPoE client and establish a PPPoE session ID. In discovery, the PPPoE client discovers a server to host the
PPPoE connection.
NOTE: A blue override icon (to the left of a parameter) defines the parameter as
having an override applied. To remove an override go to the Basic Configuration
section of the device and click the Clear Overrides button. This removes all
overrides from the device.
6 Use the Basic Settings field to enable PPPoE and define a PPPoE client
Admin Status Select Enable to support a high speed client mode point-to-point
connection using the PPPoE protocol. The default setting is disabled.
Service Enter the 128 character maximum PPPoE client service name provided by
the service provider.
DSL Modem Network Use the spinner control to set the PPPoE VLAN (client local network)
(VLAN) connected to the DSL modem. This is the local network connected to DSL
modem. The available range is 1 - 4,094. The default VLAN is VLAN1.
Client IP Address Provide the numerical (non hostname) IP address of the PPPoE client.
8 Define the following Connection settings for the PPPoE point-to-point connection with the PPPoE client:
Maximum Set the PPPoE client maximum transmission unit (MTU) from 500 - 1,492.
Transmission Unit The MTU is the largest physical packet size in bytes a network can
(MTU) transmit. Any messages larger than the MTU are divided into smaller
packets before being sent. A PPPoE client should be able to maintain its
point-to-point connection for this defined MTU size. The default MTU is
1,492.
Client Idle Timeout Set a timeout in either Seconds (1 - 65,535), Minutes (1 - 1,092) or Hours.
The Access Point uses the defined timeout so it does not sit idle waiting
for input from the PPPoE client and server that may never come. The
default setting is 10 minutes.
Keep Alive Select this option to ensure the point-to-point connect to the PPPoE
client is continuously maintained and not timed out. This setting is
disabled by default.
9 Set the Network Address Translation (NAT) direction for the PPPoE configuration.
Network Address Translation (NAT) converts an IP address in one network to a different IP address or set of IP
addresses in another network. The access point router maps its local (Inside) network addresses to WAN
(Outside) IP addresses, and translates the WAN IP addresses on incoming packets to local IP addresses. NAT is
useful because it allows the authentication of incoming and outgoing requests, and minimizes the number of
WAN IP addresses needed when a range of local IP addresses is mapped to each WAN IP address. The default
setting is None (neither inside or outside).
10 Define the following Security Settings for the PPPoE configuration:
IPV4 Inbound Use the drop-down menu to select a firewall (set of IPv4 formatted
Firewall Rules access connection rules) to apply to the PPPoE client connection. If a
firewall rule does not exist suiting the data protection needs of the PPPoE
client connection, select the Create icon to define a new rule configuration
or the Edit icon to modify an existing rule. For more information, see
Configuring IP Firewall Rules on page 10-20.
VPN Crypto Map Use the drop-down menu to apply an existing crypt map configuration to
this PPPoE interface.
11 Use the spinner control to set the Default Route Priority for the default route obtained using PPPoE.
Select from 1 - 8,000. The default setting is 2,000.
12 Select OK to save the changes to the PPPoE screen. Select Reset to revert to the last saved configuration.
Saved configurations are persistent across reloads.
NOTE: AP-8132 model Access Points support an external USB Bluetooth radio
providing ADSP Bluetooth classic sensing functionality only, not the Bluetooth low
energy beaconing functionality available for AP-8432 and AP-8533 model Access
Points described in this section.
AP-8432 and AP-8533 model Access Points support Bluetooth beaconing to emit either iBeacon or Eddystone-
URL beacons. The Access Point’s Bluetooth radio sends non-connectable, undirected low-energy (LE)
advertisement packets on a periodic basis. These advertisement packets are short, and sent on Bluetooth
advertising channels that conform to already-established iBeacon and Eddystone-URL standards. Portions of the
advertising packet are still customizable however.
Beacon Transmission When the Bluetooth radio’s mode is set to le-beacon, use the enabled
Pattern drop-down menu to set the beacon’s emitted transmission pattern to
either eddystone_url1, eddystone_url2 or ibeacon. An eddystone-URL
frame broadcasts a URL using a compressed encoding scheme to
better fit within a limited advertisement packet. Once decoded, the
URL can be used by a client for Internet access. iBeacon was created
by Apple for use in iOS devices (beginning with iOS version 7.0). There
are three data fields Apple has made available to iOS applications, a
UUID for device identification, a Major value for device class and a
Minor value for more refined information like product category.
10 Define the following Eddystone_Settings if the Beacon Transmission Pattern has been set to either
eddystone_url_1 or eddystone_url_2:
Eddystone Beacon Set the eddystone beacon measured calibration signal strength, from -
Calibration Signal 127 to 127 dBm, at 0 meters. Mobile devices can approximate their
Strength distance to beacons based on received signal strength. However,
distance readings can fluctuate since they depend on several external
factors. The closer you are to a beacon, the more accurate the
reported distance. This setting is the projected calibration signal
strength at 0 meters. The default setting is -19 dBm.
URL-1 to Transmit Enter a 64 character maximum eddystone-URL1. The URL must be 18
Eddystone-URL characters or less once auto-encoding is applied. The encoding process
is for getting the URL to fit within the beacon’s payload.
URL-2 to Transmit Enter a 64 character maximum eddystone-URL2. The URL must be 18
Eddystone-URL characters or less once auto-encoding is applied. The encoding process
is for getting the URL to fit within the beacon’s payload.
11 Define the following iBeacon_Settings if the Beacon Transmission Pattern has been set to iBeacon:
iBeacon Calibration Set the ibeacon measured calibration signal strength, from -127 to 127
Signal Strength dBm, at 1 meter. Mobile devices can approximate their distance to
beacons based on received signal strength. However, distance readings
can fluctuate since they depend on several external factors. The closer
you are to a beacon, the more accurate the reported distance. This
setting is the projected calibration signal strength at 1 meter. The
default setting is -60 dBm.
iBeacon Major Number Set the iBeacon Major value from 0 - 65,535. Major values identify
and distinguish groups. For example, each beacon on a specific floor in
a building could be assigned a unique major value. The default is 1,111.
iBeacon Minor Number Set the iBeacon Minor value from 0 - 65,535. Minor values identify and
distinguish individual beacons. Minor values help identify individual
beacons within a group of beacons assigned a major value. The
default setting is 2,222.
iBeacon UUID Define a 32 hex character maximum UUID. The Universally Unique
IDentifier (UUID) classification contains 32 hexadecimal digits. The
UUID distinguishes iBeacons in the network from all other beacons in
networks outside of your direct administration.
12 Select OK to save the changes to the Bluetooth configuration. Select Reset to revert to the last saved
configuration. Saved configurations are persistent across reloads.
As a resource is accessed (using human-friendly hostnames), it’s possible to access the resource even if the
underlying machine friendly notation name changes. Without DNS you need to remember a series of numbers
(123.123.123.123) instead of a domain name (www.domainname.com).
Controllers and service platforms maintain their own DNS facility that can assist in domain name translation. A
DNS assignment can be overridden as needed, but removes the device configuration from the managed profile
that may be shared with other similar device models.
NOTE: A blue override icon (to the left of a parameter) defines the parameter as
having an override applied. To remove an override go to the Basic Configuration
section of the device and click the Clear Overrides button. This removes all
overrides from the device.
6 Set or override the following Domain Name System (DNS) configuration data:
Domain Name Provide or override the default Domain Name used to resolve DNS names.
The name cannot exceed 64 characters.
Enable Domain Select this option to enable DNS on the controller or service platform.
Lookup When enabled, the controller or service platform can convert human
friendly domain names into numerical IP destination addresses. This
option is selected by default.
Enable DNS Server Click to enable the forwarding of DNS queries to external DNS servers if a
Forwarding DNS query cannot be processed by the controller or service platform’s
own DNS resources. This feature is disabled by default.
When an incoming packet destined for a host arrives at the controller or service platform, the gateway uses ARP
to find a physical host or MAC address that matches the IP address. ARP looks in its ARP cache and, if it finds the
address, provides it so the packet can be converted to the right packet length and format and sent to the
destination. If no entry is found for the IP address, ARP broadcasts a request packet in a special format to all the
machines on the LAN to see if one machine knows that it has that IP address associated with it. A machine that
recognizes the IP address as its own returns a reply so indicating. ARP updates the ARP cache for future reference
and then sends the packet to the MAC address that replied.
5 Select ARP.
NOTE: A blue override icon (to the left of a parameter) defines the parameter as
having an override applied. To remove an override go to the Basic Configuration
section of the device and click the Clear Overrides button. This removes all
overrides from the device.
Use L2TP V3 to create tunnels for transporting layer 2 frames. L2TP V3 enables controllers, service platforms and
Access Points to create tunnels for transporting Ethernet frames to and from bridge VLANs and physical ports.
L2TP V3 tunnels can be defined between WING devices and other vendor devices supporting the L2TP V3
protocol.
Multiple pseudowires can be created within an L2TP V3 tunnel. WING supported access points support an Ethernet
VLAN pseudowire type exclusively.
Ethernet VLAN pseudowires transport Ethernet frames to and from a specified VLAN. One or more L2TP V3
tunnels can be defined between tunnel end points. Each tunnel can have one or more L2TP V3 sessions. Each
tunnel session corresponds to one pseudowire. An L2TP V3 control connection (a L2TP V3 tunnel) needs to be
established between the tunneling entities before creating a session.
For optimal pseudowire operation, both the L2TP V3 session originator and responder need to know the
psuedowire type and identifier. These two parameters are communicated during L2TP V3 session establishment.
An L2TP V3 session created within an L2TP V3 connection also specifies multiplexing parameters for identifying a
pseudowire type and ID.
The working status of a pseudowire is reflected by the state of the L2TP V3 session. If a L2TP V3 session is down,
the pseudowire associated with it must be shut down. The L2TP V3 control connection keep-alive mechanism can
serve as a monitoring mechanism for the pseudowires associated with a control connection.
5 The General tab displays by default with additional L2RPv3 Tunnel and Manual Session tabs available.
Router ID If not using an IP address or a hostname for event logging, use a router ID
to capture and log L2TPv3 events. Use Any to log any router ID.
Critical Resource Specifies the critical resource that should exist for a tunnel between two
peers. Critical resources are device IP addresses or interface destinations
interopreted as critical to the health of the network. Critical resources
allow for the continuous monitoring of these defined addresses. A critical
resource, if not available, can result in the network suffering performance
degradation. A critical resource can be a gateway, AAA server, WAN
interface or any hardware or service on which the stability of the network
depends. Critical resources are pinged regularly. If there’s a connectivity
issue, an event is generated stating a critical resource is unavailable.
Peer IP Address Specifies the IP address of the tunnel destination peer device.
Hostname Specifies the administrator assigned hostname of the tunnel.
10 Either select Add to create a new L2TPv3 tunnel configuration, Edit to modify an existing tunnel configuration
or Delete to remove a tunnel from those available to this profile.
11 If creating a new tunnel configuration, assign it a 31 character maximum Name.
12 Select + Add Row to populate the table with configurable session parameters for this tunnel configuration.
Traffic Source Value Define a VLAN range to include in the tunnel session.
Native VLAN Select this option to provide a VLAN ID that will not be tagged in tunnel
establishment and packet transfer. Available VLAN ranges are from 1 -
4,094.
14 Select OK to save the updates to Exit to revert to the last configuration.
15 Select the Settings tab.
Local Router ID Specify the router ID sent in tunnel establishment messages with a target
peer device.
Establishment Specify the establishment criteria for creating a tunnel. The tunnel is only
Criteria created if this device is one of the following:
vrrp-master
cluster-master
rf-domain-manager
The tunnel is always created if Always is selected. This indicates the
device need not be any one of the above three (3) to establish a tunnel.
VRRP Group Set the VRRP group ID. VRRP groups is only enabled when the
Establishment Criteria is set to vrrp-master.
Critical Resource The Critical Resources table lists important resources defined for this
system. The tunnel is created and maintained only if these critical
resources are available. The tunnel is removed if any one of the defined
resources goes down or is unreachable.
17 Define the following Rate Limit settings for the L2TP tunnel configuration. Rate limiting manages the maximum
rate sent to or received from L2TPv3 tunnel members.
Session Name Use the drop-down menu to select the tunnel session that will have the
direction, burst size and traffic rate settings applied.
Direction Select the direction for L2TPv3 tunnel traffic rate limiting. Egress traffic is
outbound L2TPv3 tunnel data coming to the controller, service platform
or Access Point. Ingress traffic is inbound L2TPv3 tunnel data coming to
the controller, service platform or Access Point.
Maximum Burst Size Set the maximum burst size for egress or ingress traffic rate limiting
(depending on which direction is selected) on a L2TPv3 tunnel. Set a
maximum burst size between 2 - 1024 kbytes. The smaller the burst, the
less likely the upstream packet transmission will result in congestion for
L2TPv3 tunnel traffic. The default setting is 320 bytes.
Rate Set the data rate (from 50 - 1,000,000 kbps) for egress or ingress traffic
rate limiting (depending on which direction is selected) for an L2TPv3
tunnel. The default setting is 5000 kbps.
18 Refer to the Peer table to review the configurations of the peers destinations for tunnel connection.
19 Select + Add Row to populate the table with a maximum of two peer configurations.
21 From back at the Settings tab, set the following Fast Failover parameters.
Enable When enabled, the device starts sending tunnel requests on both peers,
and in turn, establishes the tunnel on both peers. If disabled, tunnel
establishment only occurs on one peer, with failover and other
functionality the same as legacy behavior. If fast failover is enabled after
establishing a single tunnel the establishment is restarted with two peers.
One tunnels defined as active and the other standby. Both tunnels
perform connection health checkups with individual hello intervals. This
setting is disabled by default.
Enable Aggressive When enabled, tunnel initiation hello requests are set to zero. For failure
Mode detections, hello attempts are not retried, regardless of defined retry
attempts. This setting is disabled by default.
25 Refer to the following manual session configurations to determine whether one should be created or modified:
IP Address Lists the IP address assigned as the local tunnel end point address, not
the interface IP address. This IP is used as the tunnel source IP address. If
this parameter is not specified, the source IP address is chosen
automatically based on the tunnel peer IP address. This parameter is
applicable when establishing the session and responding to incoming
requests.
Local Session ID Displays the numeric identifier assigned to each listed tunnel session. This
is the pseudowire ID for the session. This pseudowire ID is sent in a
session establishment message to the L2TP peer.
MTU Displays each sessions’s maximum transmission unit (MTU). The MTU is
the size (in bytes) of the largest protocol data unit the layer can pass
between tunnel peers in this session. A larger MTU means processing
fewer packets for the same amount of data.
Name Lists the name assigned to each listed manual session.
Remote Session ID Lists the remote session ID passed in the establishment of the tunnel,
used a a unique identifier for this tunnel session.
26 Select Add to create a new manual session, Edit to modify an existing session configuration or Delete to
remove a selected manual session.
29 Select OK to save the changes to the session configuration. Select Reset to revert to the last saved
configuration.
Using GRE, Access Points map one or more VLANs to a tunnel. The remote endpoint is a user-configured WLAN
gateway IP address, with an optional secondary IP address should connectivity to the primary GRE peer be lost.
VLAN traffic is expected in both directions in the GRE tunnel. A WLAN mapped to these VLANs can be either
open or secure. Secure WLANs require authentication to a remote RADIUS server available within your
deployment using standard RADIUS protocols. Access Points can reach both the GRE peer as well as the RADIUS.
Previous releases supported only IPv4 tunnel end points, now support for both IPv4 or IPv6 tunnel endpoints is
available. However, a tunnel needs to contain either IPv4 or IPv6 formatted device addresses and cannot be mixed.
With the new IPv6 tunnel implementation, all outbound packets are encapsulated with the GRE header, then the
IPv6 header. The header source IP address is the local address of the IPv6 address of tunnel interface, and the
destination address peer address of the tunnel. All inbound packets are de-capsulated by removing the IPv6 and
GRE header before sending it over to the IP stack.
NOTE: A blue override icon (to the left of a parameter) defines the parameter as
having an override applied. To remove an override, go to the Basic Configuration
section of the device and click the Clear Overrides button. This removes all
overrides from the device.
Tag Native VLAN Select this option to tag the native VLAN. The IEEE 802.1Q specification is
supported for tagging frames and coordinating VLANs between devices.
IEEE 802.1Q adds four bytes to each frame identifying the VLAN ID for
upstream devices that the frame belongs. If the upstream Ethernet device
does not support IEEE 802.1Q tagging, it does not interpret the tagged
frames. When VLAN tagging is required between devices, both devices
must support tagging and be configured to accept tagged VLANs. When
a frame is tagged, the 12 bit frame VLAN ID is added to the 802.1Q header
so upstream Ethernet devices know which VLAN ID the frame belongs to.
The device reads the 12 bit VLAN ID and forwards the frame to the
appropriate VLAN. When a frame is received with no 802.1Q header, the
upstream device classifies the frame using the default or native VLAN
assigned to the Trunk port. The native VLAN allows an Ethernet device to
associate untagged frames to a VLAN when no 802.1Q frame is included
in the frame. This feature is disabled by default.
MTU Set an IPv4 tunnel’s maximum transmission unit (MTU) from 128 - 1,476.
The MTU is the largest physical packet size (in bytes) transmittable within
the tunnel. Any messages larger than the MTU are divided into smaller
packets before being sent. A larger MTU provides greater efficiency
because each packet carries more user data while protocol overheads,
such as headers or underlying per-packet delays, remain fixed; the
resulting higher efficiency means a slight improvement in bulk protocol
throughput. A larger MTU results in the processing of fewer packets for
the same amount of data. For IPv4, the overhead is 24 bytes (20 bytes
IPv4 header + 4 bytes GRE Header), thus the default setting for an IPv4
MTU is 1,476.
MTU6 Set an IPv6 tunnel’s MTU from 128 - 1,456. The MTU is the largest physical
packet size (in bytes) transmit able within the tunnel. Any messages
larger than the MTU are divided into smaller packets before being sent. A
larger MTU provides greater efficiency because each packet carries more
user data while protocol overheads, such as headers or underlying per-
packet delays, remain fixed; the resulting higher efficiency means a slight
improvement in bulk protocol throughput. A larger MTU results in the
processing of fewer packets for the same amount of data. For IPv6, the
overhead is 44 bytes (40 bytes IPv6 header + 4 bytes GRE header), thus
the default setting for an IPv6 MTU is 1,456.
9 The Peer table lists the credentials of the GRE tunnel end points. Add new table rows as needed to add
additional GRE tunnel peers.
Select + Add Row to populate the table with a maximum of two peer configurations.
10 Define the following Peer parameters:
Peer Index Assign a numeric index to each peer to help differentiate tunnel end
points.
Peer IP Address Define the IP address of the added GRE peer to serve as a network
address identifier. Designate whether the IP is formatted as an IPv4 or
IPv6 address. IPv4 is a connectionless protocol for packet switched
networking. IPv4 operates as a best effort delivery method, as it does not
guarantee delivery, and does not ensure proper sequencing or duplicate
delivery (unlike TCP). IPv4 hosts can use link local addressing to provide
local connectivity. IPv6 is the latest revision of the Internet Protocol (IP)
designed to replace IPv4. IPV6 provides enhanced identification and
location information for computers on networks routing traffic across the
Internet. IPv6 addresses are eight groups of four hexadecimal digits
separated by colons.
11 Set the following Establishment Criteria for the GRE tunnel configuration:
Criteria Specify the establishment criteria for creating a GRE tunnel. In a multi-
controller within a RF domain, it’s always the master node with which the
tunnel is established. The tunnel is only created if the tunnel device is
designated one of the following:
vrrp-master
cluster-master
rf-domain-manager
The tunnel is automatically created if Always (default setting) is selected.
This indicates the device need not be any one of the above three (3) to
establish a tunnel.
VRRP Group Set the VRRP group ID only enabled when the Establishment Criteria is
set to vrrp-master. A virtual router redundancy group (VRRP) enables the
creation of a group of routers as a default gateway for redundancy.
Clients can point to the IP address of the VRRP virtual router as their
default gateway and utilize a different group member if a master
becomes unavailable.
12 Define or override the following Failover parameters to apply to the GRE tunnel configuration:
Enable Failover Select this option to periodically ping the primary gateway to assess its
availability. If the primary gateway is unreachable.
Ping Interval Set the duration between two successive pings to the gateway. Define
this value in seconds from 1 - 21,600.
Number of Retries Set the number of ping retries (from 1 - 63) when no response is received
before the session is terminated.
13 Select the OK button to save the changes and overrides to the GRE configuration. Select Reset to revert to the
last saved configuration.
interested hosts are connected. On the wired side of the network, the controller or service platform floods all the
wired interfaces. This feature reduces unnecessary flooding of multicast traffic in the network.
NOTE: A blue override icon (to the left of a parameter) defines the parameter as
having an override applied. To remove an override, go to the Basic Configuration
section of the device and click the Clear Overrides button. This removes all
overrides from the device.
Forward Unknown Select this option to enable the forwarding of multicast packets from
Multicast Packets unregistered multicast groups. If disabled (the default setting), the
unknown multicast forward feature is also disabled for individual VLANs.
Enable Fast leave Select this option to remove a Layer 2 LAN interface from the IGMP
processing snooping forwarding table entry without initially sending IGMP group-
specific queries to the interface. When receiving a group-specific
IGMPv2 leave message, IGMP snooping removes the interface from the
Layer 2 forwarding table entry for that multicast group, unless a
multicast router was learned on the port. Fast-leave processing
enhances bandwidth management for all hosts on the network.
7 Set or override the following IGMP Querier parameters for the profile’s bridge VLAN configuration:
Enable IGMP Querier Select this option to enable IGMP querier. IGMP snoop querier is used to
keep host memberships alive. It’s primarily used in a network where
there’s a multicast streaming server and hosts subscribed to the server
and no IGMP querier present. An IGMP querier sends out periodic IGMP
query packets. Interested hosts reply with an IGMP report packet. IGMP
snooping is only conducted on wireless radios. IGMP multicast packets
are flooded on wired ports. IGMP multicast packet are not flooded on
the wired port. IGMP membership is also learnt on it and only if present,
then it is forwarded on that port.
IGMP Version Use the spinner control to set the IGMP version compatibility to either
version 1, 2 or 3. IGMPv1 is defined by RFC 1112, IGMPv2 is defined by
RFC 2236 and IGMPv3 defined by RFC 4604 which defines both IGMPv3
and MLDv2. IGMPv2 improves over IGMPv1 by adding the ability for a
host to signal desire to leave a multicast group. IGMPv3 improves over
IGMPv2 by adding the ability to listen to multicast traffic originating
from a set of source IP addresses exclusively. The default setting is 3.
IGMP Query Interval Set the interval IGMP queries are made. Options include Seconds
(1 - 18,000), Minutes (1 - 300) and Hours (1 - 5). The default setting is
one minute.
IGMP Robustness IGMP utilizes a robustness value used by the sender of a query. Update
Variable the robustness variable to match the most recently received query
unless the value is zero.
Maximum Response Specify the maximum interval (from 1 - 25 seconds) before sending a
Time responding report. When no reports are received from a radio, radio
information is removed from the snooping table. The controller or
service platform only forwards multicast packets to radios present in the
snooping table. For IGMP reports from wired ports, the controller or
service platform forwards these reports to the multicast router ports.
The default setting is 10 seconds.
Other Querier Timer Specify an interval in either Seconds (60 - 300) or Minutes
Expiry (1 - 5) used as a timeout interval for other querier resource connections.
The default setting is 1 minute.
8 Select the OK button to save the changes and overrides to the IGMP Snooping tab. Select Reset to revert to the
last saved configuration.
MLD snooping caps the flooding of IPv6 multicast traffic on controller, service platform or Access Point VLANs.
When enabled, MLD messages are examined between hosts and multicast routers and to discern which hosts are
receiving multicast group traffic. The controller, service platform or Access Point then forwards multicast traffic
only to those interfaces connected to interested receivers instead of flooding traffic to all interfaces.
5 Define the following MLD Querier settings for the MLD snooping configuration:
Enable MLD Querier Select the option to enable MLD querier on the controller, service platform
or Access Point. When enabled, the device sends query messages to
discover which network devices are members of a given multicast group.
This setting is disabled by default.
MLD Version Define whether MLD version 1 or 2 is utilized as the MLD querier. MLD
version 1 is based on IGMP version 2 for IPv4. MLD version 2 is based on
IGMP version 3 for IPv4 and is fully backward compatible. IPv6 multicast
uses MLD version 2. The default MLD version is 2.
MLD Query Interval Set the interval in which query messages are sent to discover device
multicast group memberships. Set an interval in either Seconds (1 -
18,000), Minutes (1 - 300) or Hours (1 - 5). The default interval is 1 minute.
MLD Robustness Set a MLD IGMP robustness value (1 - 7) used by the sender of a query.
Variable The MLD robustness variable enables refinements to account for expected
packet loss on a subnet. Increasing the robust count allows for more
packet loss, but increases the leave latency of the subnetwork unless the
value is zero. The default variable is 2.
Maximum Response Specify the maximum response time (from 1 - 25,000 milliseconds) before
Time sending a responding report. Queriers use MLD reports to join and leave
multicast groups and receive group traffic. The default setting is 10
milliseconds.
Other Querier time Specify an interval in either Seconds (60 - 300) or Minutes
Expiry (1 - 5) used as a timeout interval for other querier resources. The default
setting is 1 minute.
6 Select the OK button located to save the changes. Select Reset to revert to the last saved configuration.
Traffic shaping regulates network data transfers to ensure a specific performance level. Traffic shaping delays the
flow of packets defined as less important than prioritized traffic streams. Traffic shaping enables traffic control out
an interface to match its flow to the speed of a remote target’s interface and ensure traffic conforms applied
policies. Traffic can be shaped to meet downstream requirements and eliminate network congestion when data
rates are in conflict.
QoS values are required to provide priority of service to some packets over others. For example, VoIP packets get
higher priority than data packets to provide a better quality of service for high priority voice traffic.
The profile QoS screen maps the 6-bit Differentiated Service Code Point (DSCP) code points to the older 3-bit IP
Precedent field located in the Type of Service byte of an IP header. DSCP is a protocol for specifying and
controlling network traffic by class so that certain traffic types get precedence. DSCP specifies a specific per-hop
behavior that is applied to a packet. This QoS assignment can be overridden as needed, but removes the device
configuration from the profile that may be shared with other similar device models.
Figure 5-73 Profile Overrides - Network QoS Traffic Shaping Basic Configuration screen
Apply traffic shaping to specific applications to apply application categories. When application and ACL rules
are conflicting, applications have priority, followed by application categories, then ACLs.
6 Select Enable to provide traffic shaping using the defined bandwidth, rate and class mappings.
7 Set the Total Bandwidth configurable for the traffic shaper. Set the value from either 1 - 1,000 Mbps, or from
250 - 1,000,000 Kbps.
8 Select + Add Row within the Rate Configuration table to set the Class Index and Rate (in either Kbps, Mbps or
percentage) for the traffic shaper class. Use the rate configuration to control the maximum traffic rate sent or
received on the device. Consider this form of rate limiting on interfaces at the edge of a network to limit traffic
into or out of the network. Traffic within the set limit is sent and traffic exceeding the set limit is dropped or
sent with a different priority.
9 Refer to the IP ACL Class Mapping table and select + Add Row to apply an IPv4 formatted ACL to the shaper
class mapping. Select + Add Row to add mappings. For more information on creating IP based firewall rules,
refer to Configuring IP Firewall Rules on page 10-20 and Setting an IPv4 or IPv6 Firewall Policy on page 10-21.
10 Refer to the IPv6 ACL Class Mapping table and select + Add Row to apply an IPv6 formatted ACL to the shaper
class mapping. Select + Add Row to add mappings. For more information on creating IP based firewall rules,
refer to Configuring IP Firewall Rules on page 10-20 and Setting an IPv4 or IPv6 Firewall Policy on page 10-21.
11 Refer to the App-Category to Class Mapping table and select + Add Row to apply an application category to
shaper class mapping. Select + Add Row to add mappings by selecting the application category and its traffic
shaper class. For more information on creating an application category, refer to Application on page 7-58.
12 Refer to the Application to Class Mapping table and select + Add Row to apply an application to shaper class
mapping. Select + Add Row to add mappings by selecting the application and its traffic shaper class. For more
information on creating an application, refer to Application on page 7-58.
13 Select the OK button located to save the changes to the traffic shaping basic configuration. Select Reset to
revert to the last saved configuration.
14 Select the Advanced Configuration tab.
Figure 5-74 Profile Overrides - Network QoS Traffic Shaping Advanced Configuration screen
NOTE: A blue override icon (to the left of a parameter) defines the parameter as
having an override applied. To remove an override go to the Basic Configuration
section of the device and click the Clear Overrides button. This removes all
overrides from the device.
22 Set or override the following parameters for IPv6 Traffic Class Mapping for untagged frames:
Traffic Class Devices that originate a packet must identify different classes or priorities
for IPv6 packets. Devices use the traffic class field in the IPv6 header to
set this priority.
802.1p Priority Assign a 802.1p priority as a 3-bit IPv6 precedence value in the Type of
Service field of the IPv6 header used to set the priority. The valid values
for this field are 0-7. Up to 64 entries are permitted. The priority values
are:
0 – Best Effort
1 – Background
2 – Spare
3 – Excellent Effort
4 – Controlled Load
5 – Video
6 – Voice
7 – Network Control
23 Use the spinner controls within the 802.1p Priority field for each DSCP row to change or override the assigned
priority value.
24 Select the OK button located to save the changes and overrides. Select Reset to revert to the last saved
configuration.
If there’s just one VLAN in the Access Point managed network, a single spanning tree works fine. However, if the
network contains more than one VLAN, the network topology defined by single STP would work, but it’s possible
to make better use of the alternate paths available by using an alternate spanning tree for different VLANs or
groups of VLANs.
A MSTP supported deployment uses multiple MST regions with multiple MST instances (MSTI). Multiple regions and
other STP bridges are interconnected using one single common spanning tree (CST).
MSTP includes all of its spanning tree information in a single Bridge Protocol Data Unit (BPDU) format. BPDUs are
used to exchange information bridge IDs and root path costs. Not only does this reduce the number of BPDUs
required to communicate spanning tree information for each VLAN, but it also ensures backward compatibility
with RSTP. MSTP encodes additional region information after the standard RSTP BPDU as well as a number of
MSTI messages. Each MSTI messages conveys spanning tree information for each instance. Each instance can be
assigned a number of configured VLANs. The frames assigned to these VLANs operate in this spanning tree
instance whenever they are inside the MST region. To avoid conveying their entire VLAN to spanning tree mapping
in each BPDU, the Access Point encodes an MD5 digest of their VLAN to an instance table in the MSTP BPDU. This
digest is used by other MSTP supported devices to determine if the neighboring device is in the same MST region
as itself.
NOTE: A blue override icon (to the left of a parameter) defines the parameter as
having an override applied. To remove an override go to the Basic Configuration
section of the device and click the Clear Overrides button. This removes all
overrides from the device.
Max Hop Count Define the maximum number of hops the BPDU will consider valid in the
spanning tree topology. The available range is from 7 -127. The default
setting is 20.
MST Config Name Define a 64 character maximum name for the MST region as an
identifier.
MST Revision Level Set a numeric revision value ID for MST configuration information. Set a
value from 0 - 255. The default setting is 0.
Cisco MSTP Select either the Enable or Disable radio buttons to enable/disable
Interoperability interoperability with Cisco’s version of MSTP, which is incompatible with
standard MSTP. This setting is disabled by default.
Hello Time Set a BPDU hello interval from 1 - 10 seconds. BPDUs are exchanged
regularly (every 2 seconds by default) and enable supported devices to
keep track of network changes and star/stop port forwarding as
required.
Forward Delay Set the forward delay time from 4 - 30 seconds. When a device is first
attached to a port, it does not immediately forward data. It first
processes BPDUs and determines the network topology. When a host is
attached the port always goes into the forwarding state, after a delay of
while it goes through the listening and learning states. The time spent in
listening and learning states is set by the forward delay (15 seconds by
default).
Maximum Age Use the spinner control to set the maximum time (in seconds) to listen
for the root bridge. The root bridge is the spanning tree bridge with the
smallest (lowest) bridge ID. Each bridge has a unique ID and a
configurable priority number, the bridge ID contains both. The available
range is from 6 - 40 seconds. The default setting is 20 seconds.
8 Set the following Error Disable parameters for the profile configuration:
Enable Recovery Select this option to enable a error disable timeout resulting from a
BPDU guard. This setting is disabled by default.
Recovery Interval Define the recovery interval used to enable disabled ports. The available
range is from 10 - 1,000,000 seconds with a default setting of 300.
9 Use the Spanning Tree Instance table to add indexes to the spanning tree topology.
10 Add up to 16 indexes and use the Priority setting to define the bridge priority used to determine the root
bridge. The lower the setting defined, the greater the likelihood of becoming the root bridge in the spanning
tree topology.
11 Use the Spanning Tree Instance VLANs table to add up to 15 VLAN instance indexes (by numeric ID) and VLANs
to the spanning tree topology as virtual route resources.
12 Select the OK button located at the bottom right of the screen to save the changes and overrides. Select Reset
to revert to the last saved configuration.
Both IPv4 and IPv6 routes are separately configurable using their appropriate tabs. For IPv6 networks, routing is
the part of IPv6 that provides forwarding between hosts located on separate segments within a larger IPv6
network where IPv6 routers provide packet forwarding for other IPv6 hosts.
NOTE: A blue override icon (to the left of a parameter) defines the parameter as
having an override applied. To remove an override go to the Basic Configuration
section of the device and click the Clear Overrides button. This removes all
overrides from the device.
DHCP Client Default Use the spinner control to set the priority value (1 - 8,000) for the
Route Priority default route learnt from the DHCP client. The default setting is 1000.
Enable Routing Failure When selected, all default gateways are monitored for activity. The
system will failover to a live gateway if the current gateway becomes
unusable. This feature is enabled by default.
9 Select the OK button located at the bottom right of the screen to save the changes to IPv4 routing
configuration. Select Reset to revert to the last saved configuration.
10 Select the IPv6 Routing tab. IPv6 networks are connected by IPv6 routers. IPv6 routers pass IPv6 packets from
one network segment to another.
14 Set a System ND Reachable Time (from 5,000 to 3,600,000 milliseconds) as the time a neighbor is assumed to
be reachable after receiving a receiving a neighbor discovery (ND) confirmation for their reachability. The
default is 30,000 milliseconds.
15 Set an IPv6 Hop Count (from 1 - 255) as the maximum number of hops considered valid when sending IP
packets. The default setting is 64.
16 Set the Router Advertisement Conversion to Unicast settings:
RA Convert Select this option to convert multicast router advertisements (RA) to
unicast router advertisements at the dot11 layer. Unicast addresses
identify a single network interface, whereas a multicast address is used
by multiple hosts. This setting is disabled by default.
Throttle Select this option to throttle RAs before converting to unicast. Once
enabled, set the throttle interval and maximum number of RAs. This
setting is disabled by default.
Throttle Interval Enable this setting to define the throttle interval (3 - 1,800 seconds). The
default setting is 3 seconds.
Max RAs Enable this setting to define the maximum number of router
advertisements per router (1 - 256) during the throttle interval. The
default setting is 1.
17 Select + Add Row as needed within the IPv6 Routes table to add an additional 256 IPv6 route resources.
Gateway Set the IPv6 route gateway. A network gateway in IPv6 is the same as
in IPv4. A gateway address designates how traffic is routed out of the
current subnet.
Interface If using a link local address, set the VLAN (1 - 4,094) used a virtual
routing interface for the local address.
18 Select the OK button located at the bottom right of the screen to save the changes to the IPv6 routing
configuration. Select Reset to revert to the last saved configuration.
OSPF detects changes in the topology, like a link failure, and plots a new loop-free routing structure. It computes
the shortest path for each route using a shortest path first algorithm. Link state data is maintained on each router
and is periodically updated on all OSPF member routers.
OSPF uses a route table managed by the link cost (external metrics) defined for each routing interface. The cost
could be the distance of a router (round-trip time), link throughput or link availability. Setting a cost value provides
a dynamic way to load balancing traffic between routes of equal cost.
An OSPF network can be subdivided into routing areas to simplify administration and optimize traffic utilization.
Areas are logical groupings of hosts and networks, including routers having interfaces connected to an included
network. Each area maintains a separate link state database whose information may be summarized towards the
rest of the network by the connecting router. Areas are identified by 32-bit IDs, expressed either in decimal, or
octet-based dot-decimal notation. Areas can defined as:
stub area - A stub area is an area which does not receive route advertisements external to the autonomous system
(AS) and routing from within the area is based entirely on a default route.
totally-stub - A totally stubby area does not allow summary routes and external routes. A default route is the only
way to route traffic outside of the area. When there’s only one route out of the area, fewer routing decisions are
needed, lowering system resource utilization.
non-stub - A non-stub area imports autonomous system external routes and send them to other areas. However. it
still cannot receive external routes from other areas.
nssa - NSSA is an extension of a stub that allows the injection of limited external routes into a stub area. If
selecting NSSA, no external routes, except a default route, enter the area.
totally nssa - Totally nssa is an NSSA using 3 and 4 summary routes are not flooded into this type of area. It is also
possible to declare an area both totally stubby and not-so-stubby, which means that the area will receive only the
default route from area 0.0.0.0, but can also contain an autonomous system boundary router (ASBR) that accepts
external routing information and injects it into the local area, and from the local area into area 0.0.0.0.
A router running OSPF sends hello packets to discover neighbors and elect a designated router. The hello packet
includes link state information and list of neighbors. OSPF is savvy with layer 2 topologies. If on a point-to-point
link, OSPF knows it is sufficient, and the link stays up. If on a broadcast link, the router waits for election before
determining if the link is functional.
Router ID Select this option to define a router ID (numeric IP address) for this
OSPF configuration. This ID must be established in every OSPF instance.
If not explicitly configured, the highest logical IP address is duplicated as
the router identifier. However, since the router identifier is not an IP
address, it does not have to be a part of any routable subnet in the
network.
Auto-Cost Select this option to specify the reference bandwidth (in Mbps) used to
calculate the OSPF interface cost if OSPF is either STUB or NSSA. The
default setting is 1.
Passive Mode on All When selected, all layer 3 interfaces are set as an OSPF passive
Interfaces interface. This setting is disabled by default.
Passive Removed If enabling Passive Mode on All Interfaces, use the spinner control to
select VLANs (by numeric ID) as OSPF non passive interfaces. Multiple
VLANs can be added to the list.
Passive Mode If disabling Passive Mode on All Interfaces, use the spinner control to
select VLANs (by numeric ID) as OSPF passive interfaces. Multiple
VLANs can be added to the list.
VRRP State Check Select this option to use OSPF only if the VRRP interface is not in a
backup state. The Virtual Router Redundancy Protocol (VRRP) provides
automatic assignments of available Internet Protocol (IP) routers to
participating hosts. This increases the availability and reliability of
routing paths via automatic default gateway selections on an IP
subnetwork. This setting is enabled by default.
Refer to the Route Redistribution table to set the types of routes that can be used by OSPF.
Select the + Add Row button to populate the table. Set the Route Type used to define the redistributed route.
Options include connected, kernal and static.
8 Select the Metric Type option to define the exterior metric type (1 or 2) used with the route redistribution.
Select the Metric option to define route metric used with the redistributed route.
9 Use the OSPF Network table to define networks (IP addresses) to connect using dynamic routes.
10 Select the + Add Row button to populate the table. Add the IP address and mask of the Network(s)
participating in OSPF. Additionally, define the OSPF area (IP address) to which the network belongs.
11 Set an OSPF Default Route Priority (1 - 8,000) as the priority of the default route learnt from OSPF. The default
setting is 7,000.
12 Select the Area Settings tab.
An OSPF Area contains a set of routers exchanging Link State Advertisements (LSAs) with others in the same
area. Areas limit LSAs and encourage aggregate routes.
14 Select Add to create a new OSPF configuration, Edit to modify an existing configuration or Delete to remove a
configuration.
16 Select the OK button to save the changes to the area configuration. Select Reset to revert to the last saved
configuration.
17 Select the Interface Settings tab.
19 Select the Add button to define a new set of virtual interface basic settings, or Edit to update the settings of an
existing virtual interface configuration.
Figure 5-84 OSPF Virtual Interface - Basic Configuration screen - General tab
20 Within the Properties field, enter a 32 character maximum Description to help differentiate the virtual interface
configuration used with this OSPF route. Enable/disable Admin Status as needed. They’re enabled by default.
21 Define the NAT Direction as either Inside, Outside or None. Network Address Translation (NAT), is an Internet
standard enabling a local area network (LAN) to use IP addresses for internal traffic (inside) and a second set of
addresses for external (outside) traffic.
22 Set the following DHCPv6 Client Configuration. The Dynamic Host Configuration Protocol for IPv6 (DHCPv6)
provides a framework for passing configuration information.
Stateless DHCPv6 Select this option to request information from the DHCPv6 server using
Client stateless DHCPv6. DHCPv6 is a networking protocol for configuring IPv6
hosts with IP addresses, IP prefixes or other configuration attributes
required on an IPv6 network. This setting is disabled by default.
Prefix Delegation Specify a 32 character maximum request prefix for prefix delegation from
Client a DHCPv6 server over this virtual interface.
Request DHCPv6 Select this option to request DHCPv6 options on this virtual interface.
Options DHCPv6 options provide configuration information for a node that must
be booted using the network rather than from locally. This setting is
disabled by default.
23 Set the following Bonjour Gateway settings.Bonjour is Apple’s implementation of zero-configuration networking
(Zeroconf). Zeroconf is a group of technologies that include service discovery, address assignment and
hostname resolution. Bonjour locates devices such as printers, other computers and services that these
computers offer over a local network.
Bonjour provides a general method to discover services on a local area network (LAN). It allows users to set up
a network without any configuration. Services such as printers, scanners and file-sharing servers can be found
using Bonjour. Bonjour only works within a single broadcast domain. However, with special DNS configuration,
it can be extended to find services across broadcast domains.
From the drop-down, select the Bonjour Gateway discover policy. Select the Create icon to define a new
Bonjour Gateway policy configuration or select the Edit icon to modify an existing Bonjour Gateway policy
configuration.
24 Set the following MTU settings for the virtual interface:
Maximum Set the PPPoE client maximum transmission unit (MTU) from 500 - 1,492.
Transmission Unit The MTU is the largest physical packet size in bytes a network can
(MTU) transmit. Any messages larger than the MTU are divided into smaller
packets before being sent. A PPPoE client should be able to maintain its
point-to-point connection for this defined MTU size. The default MTU is
1,492.
IPv6 MTU Set an IPv6 MTU for this virtual interface from 1,280 - 1,500. A larger MTU
provides greater efficiency because each packet carries more user data
while protocol overheads, such as headers or underlying per-packet
delays, remain fixed; the resulting higher efficiency means a slight
improvement in bulk protocol throughput. A larger MTU results in the
processing of fewer packets for the same amount of data. The default is
1,500.
25 Within the ICMP field, define whether ICMPv6 redirect messages are sent. Redirect requests data packets be
sent on an alternative route. This setting is enabled by default.
26 Within the Address Autoconfiguration field, define whether to configure IPv6 addresses on this virtual interface
based on the prefixes received in router advertisement messages. This setting is enabled by default.
27 Set the following Router Advertisement Processing settings for the virtual interface. Router advertisements are
periodically sent to hosts or sent in response to solicitation requests. The advertisement includes IPv6 prefixes
and other subnet and host information.
Accept RA Enable this option to allow router advertisements over this virtual
interface. IPv6 hosts can configure themselves automatically when
connected to an IPv6 network using the neighbor discovery protocol via
ICMPv6)router discovery messages. When first connected to a network, a
host sends a link-local router solicitation multicast request for its
configuration parameters; routers respond to such a request with a router
advertisement packet that contains Internet Layer configuration
parameters.This setting is enabled by default.
No Default Router Select this option to not consider routers present on this interface for
default router selection. This setting is disabled by default.
No MTU Select this option to not use the set MTU value for router advertisements
on this virtual interface. This setting is disabled by default.
No Hop Count Select this option to not use the hop count advertisement setting for
router advertisements on this virtual interface. This setting is disabled by
default.
28 Select OK to save the changes. Select Reset to revert to the last saved configuration.
29 Select the IPv4 tab to set IPv4 settings for this virtual interface.
IPv4 is a connectionless protocol. It operates on a best effort delivery model that does not guarantee delivery
or assures proper sequencing or avoidance of duplicate delivery (unlike TCP).
31 Refer to the DHCP Relay field to set the DHCP relay server configuration used with the Virtual Interface.
Respond to DHCP Select this option to allow the onboard DHCP server to respond to relayed
Relay Packets DHCP packets on this interface. This setting is disabled by default.
DHCP Relays Provide IP addresses for DHCP server relay resources. DHCP relays
exchange messages between a DHCPv6 server and client. A client and
relay agent exist on the same link. When a DHCP request is received from
the client, the relay agent creates a relay forward message and sends it to
a specified server address. If no addresses are specified, the relay agent
forwards the message to all DHCP server relay multicast addresses. The
server creates a relay reply and sends it back to the relay agent. The relay
agent then sends back the response to the client.
32 Select OK to save the changes to the IPv4 configuration. Select Reset to revert to the last saved configuration.
33 Select the IPv6 tab to set IPv6 settings for this virtual interface.
IPv6 is the latest revision of the Internet Protocol (IP) designed to replace IPv4. IPV6 provides enhanced
identification and location information for computers on networks routing traffic across the Internet. IPv6
addresses are composed of eight groups of four hexadecimal digits separated by colons. IPv6 hosts can
configure themselves automatically when connected to an IPv6 network using the neighbor discovery protocol
via ICMPv6 router discovery messages. When first connected to a network, a host sends a link-local router
solicitation multicast request for its configuration parameters; routers respond to such a request with a router
advertisement packet that contains Internet Layer configuration parameters.
34 Refer to the IPv6 Addresses field to define how IP6 addresses are created and utilized.
IPv6 Mode Select this option to enable IPv6 support on this virtual interface.
IPv6 Address Static Define up to 15 global IPv6 IP addresses that can created statically. IPv6
addresses are represented as eight groups of four hexadecimal digits
separated by colons.
IPv6 Address Static Optionally set up to 15 global IPv6 IP addresses (in the EUI-64 format)
using EU164 that can created statically. The IPv6 EUI-64 format address is obtained
through a 48-bit MAC address. The MAC is initially separated into two 24-
bits, with one being an OUI (Organizationally Unique Identifier) and the
other being client specific. A 16-bit 0xFFFE is then inserted between the
two 24-bits for the 64-bit EUI address. IEEE has chosen FFFE as a
reserved value which can only appear in EUI-64 generated from the an
EUI-48 MAC address.
IPv6 Address Link Provide the IPv6 local link address. IPv6 requires a link local address
Local assigned to every interface the IPv6 protocol is enabled, even when one
or more routable addresses are assigned.
35 Enable the Enforce Duplicate Address option to enforce duplicate address protection when any wired port is
connected and in a forwarding state. This option is enabled by default.
36 Refer to the IPv6 Address Prefix from Provider table use prefix abbreviations (in EUI64 format) as shortcuts of
the entire character set comprising an IPv6 formatted IP address.
37 Select + Add Row to launch a sub screen wherein a new delegated prefix name and host ID can be defined.
Figure 5-87 Virtual Interfaces - Basic Configuration screen - IPv6 tab - Add Address Prefix from Provider
Delegated Prefix Enter a 32 character maximum name for the IPv6 address prefix from
Name provider.
Host ID Define the subnet ID, host ID and prefix length.
38 Select OK to save the changes to the new IPv6 prefix from provider. Select Exit to close the screen without
saving the updates.
39 Refer to the IPv6 Address Prefix from Provider EUI64 table to review ISP provided prefix abbreviations.
40 Select + Add Row to launch a sub screen wherein a new delegated prefix name and host ID can be defined in
EUI64 format.
Figure 5-88 Virtual Interfaces - Basic Configuration screen - IPv6 tab - Add Address Prefix from Provider EUI64
Delegated Prefix Enter a 32 character maximum name for the IPv6 address prefix from
Name provider in EUI format.
Host ID Define the subnet ID and prefix length.
41 Select OK to save the changes to the new IPv6 prefix from provider in EUI64 format. Select Exit to close the
screen without saving the updates.
42 Refer to the DHCPv6 Relay table to set the address and interface of the DHCPv6 relay.
The DHCPv6 relay enhances an extended DHCP relay agent by providing support in IPv6. DHCP relays
exchange messages between a DHCPv6 server and client. A client and relay agent exist on the same link.
When A DHCP request is received from the client, the relay agent creates a relay forward message and sends it
to a specified server address. If no addresses are specified, the relay agent forwards the message to all DHCP
server relay multicast addresses. The server creates a relay reply and sends it back to the relay agent. The relay
agent then sends back the response to the client.
43 Select + Add Row to launch a sub screen wherein a new DHCPv6 relay address and interface VLAN ID can be
set.
Figure 5-89 Virtual Interfaces - Basic Configuration screen - IPv6 tab - Add DHCPv6 Relay
Address Enter an address for the DHCPv6 relay. These DHCPv6 relay receive
messages from DHCPv6 clients and forward them to DHCPv6 servers. The
DHCPv6 server sends responses back to the relay, and the relay then
sends these responses to the client on the local network link.
Interface Select this option to enable a spinner control to define a VLAN ID from 1 -
4,094 used as the virtual interface for the DHCPv6 relay. The interface
designation is only required for link local and multicast addresses. A local
link address is a locally derived address designed for addressing on a
single link for automatic address configuration, neighbor discovery or
when no routing resources are available.
44 Select OK to save the changes to the DHCPv6 relay configuration. Select Exit to close the screen without saving
the updates.
45 Select the IPv6 RA Prefixes tab.
Figure 5-90 Virtual Interfaces - Basic Configuration screen - IPv6 RA Prefixes tab
46 Use the Router Advertisement Policy drop-down menu to select and apply a policy to the virtual interface.
Router advertisements are periodically sent to hosts or sent in response to solicitation requests. The
advertisement includes IPv6 prefixes and other subnet and host information.
Review the configurations of existing IPv6 advertisement policies. If needed select + Add Row to define the
configuration of an additional IPv6 RA prefix.
Figure 5-91 Virtual Interfaces - Basic Configuration screen - Add IPv6 RA Prefix
47 Set the following IPv6 RA Prefix settings:
Prefix Type Set the prefix delegation type used with this configuration. Options
include, Prefix, and prefix-from-provider. The default setting is Prefix. A
prefix allows an administrator to associate a user defined name to an IPv6
prefix. A provider assigned prefix is made available from an Internet
Service Provider (ISP) to automate the process of providing and informing
the prefixes used.
Prefix or ID Set the actual prefix or ID used with the IPv6 router advertisement.
Site Prefix The site prefix is added into a router advertisement prefix. The site
address prefix signifies the address is only on the local link.
Valid Lifetime Type Set the lifetime for the prefix's validity. Options include External (fixed),
decrementing and infinite. If set to External (fixed), just the Valid Lifetime
Sec setting is enabled to define the exact time interval for prefix validity.
If set to decrementing, use the lifetime date and time settings to refine
the prefix expiry period. If the value is set for infinite, no additional date
or time settings are required for the prefix and the prefix will not expire.
The default setting is External (fixed).
Valid Lifetime Sec If the lifetime type is set to External (fixed), set the Seconds, Minutes,
Hours or Days value used to measurement criteria for the prefix's
expiration. 30 days, 0 hours, 0 minutes and 0 seconds is the default
lifetime.
Valid Lifetime Date If the lifetime type is set to External (fixed), set the date in
MM/DD/YYYY format for the expiration of the prefix.
Valid Lifetime Time If the lifetime type is set to decrementing, set the time for the prefix's
validity.
Preferred Lifetime Set the administrator preferred lifetime for the prefix's validity. Options
Type include External (fixed), decrementing and infinite. If set to External
(fixed), just the Valid Lifetime Sec setting is enabled to define the exact
time interval for prefix validity. If set to decrementing, use the lifetime
date and time settings to refine the prefix expiry period. If the value is set
for infinite, no additional date or time settings are required for the prefix
and the prefix will not expire. The default setting is External (fixed).
Preferred Lifetime If the administrator preferred lifetime type is set to External (fixed), set
Sec the Seconds, Minutes, Hours or Days value used to measurement criteria
for the prefix's expiration. 30 days, 0 hours, 0 minutes and 0 seconds is
the default lifetime.
Preferred Lifetime If the administrator preferred lifetime type is set to External (fixed), set
Date the date in MM/DD/YYYY format for the expiration of the prefix.
Preferred Lifetime If the preferred lifetime type is set to decrementing, set the time for the
Time prefix's validity.
Autoconfig Autoconfiguration entails generating a link-local address, global addresses
via stateless address autoconfiguration and duplicate address detection to
verify the uniqueness of the addresses on a link. This setting is enabled by
default.
On Link Select this option to keep the IPv6 RA prefix on the local link. The default
setting is enabled.
48 Select OK to save the changes to the IPv6 RA prefix configuration. Select Exit to close the screen without
saving the updates.
49 Select the Security tab.
50 Use the IPv4 Inbound Firewall Rules drop down menu to select the IPv4 specific inbound firewall rules to apply
to this profile’s virtual interface configuration. Select the Create icon to define a new IPv4 firewall rule
configuration or select the Edit icon to modify an existing configuration.
IPv4 is a connectionless protocol for packet switched networking. IPv4 operates as a best effort delivery
method, since it does not guarantee delivery, and does not ensure proper sequencing or duplicate delivery
(unlike (TCP).
IPv4 and IPv6 are different enough to warrant separate protocols. IPv6 devices can alternatively use stateless
address autoconfiguration. IPv4 hosts can use link local addressing to provide local connectivity.
51 Use the IPv6 Inbound Firewall Rules drop down menu to select the IPv6 specific inbound firewall rules to apply
to this profile’s virtual interface configuration. Select the Create icon to define a new IPv6 firewall rule
configuration or select the Edit icon to modify an existing configuration.
IPv6 is the latest revision of the Internet Protocol (IP) replacing IPv4. IPV6 provides enhanced identification and
location information for systems routing traffic across the Internet. IPv6 addresses are composed of eight
groups of four hexadecimal digits separated by colons.
52 Refer to the VPN Crypto Map drop down menu to attach an existing crypto map to this virtual interface. New
crypto map configuration can be added by selecting the Create icon, or existing configurations can be modified
by selecting the Edit icon.
Crypto Map entries are sets of configuration parameters for encrypting packets that pass through the VPN
Tunnel. If a Crypto Map configuration does not exist suiting the needs of this virtual interface, select the Create
icon to define a new Crypto Map configuration or the Edit icon to modify an existing configuration. For more
information, see Overriding a Profile’s VPN Configuration on page 5-207.
53 Use the Web Filter drop-down menu to select or override the URL Filter configuration applied to this virtual
interface. Web filtering is used to restrict access to resources on the Internet.
54 Select OK to save the changes to the configuration. Select Reset to revert to the last saved configuration.
55 Select the Dynamic Routing tab.
57 Select the authentication type from the Chosen Authentication Type drop-down used to validate credentials
within the OSPF dynamic route. Options include simple-password, message-digest, null and None. The default is
None.
58 Select the + Add Row button at the bottom of the MD5 Authentication table to add the Key ID and Password
used for an MD5 validation of authenticator credentials. Use the spinner control to set the OSPF message digest
authentication key ID. The available range is from 1 - 255. The password is the OSPF key either displayed as
series or asterisks or in plain text (by selecting Show).
MD5 is a message digest algorithm using a cryptographic hash producing a 128-bit (16-byte) hash value, usually
expressed in text as a 32 digit hexadecimal number. MD5 has been utilized in a wide variety of cryptographic
applications, and is also commonly used to verify data integrity.
59 Select OK to save the changes to the configuration. Select Reset to revert to the last saved configuration.
An Autonomous System (AS) is a set of routers under the same administration that use Interior Gateway Protocol
(IGP) and common metrics to define how to route packets within the AS. AS uses inter-AS routing to route
packets to other ASs. For an external AS, an AS appears to have a single coherent interior routing plan and
presents a consistent picture of the destinations reachable through it.
Routing information exchanged through BGP supports only destination based forwarding (it assumes a router
forwards packets based on the destination address carried in the IP header of the packet).
BGP uses TCP as its transport protocol. This eliminates the need to implement explicit update fragmentation,
retransmission, acknowledgement, and sequencing. BGP listens on TCP port 179. The error notification mechanism
used in BGP assumes that TCP supports a graceful close (all outstanding data is delivered before the connection is
closed).
Deterministic Med Multi-exit Discriminator (MED) is used by BGP peers to select the best
route among multiple routes. When enabled, MED route values (from the
same AS) are compared to select the best route. This best route is then
compared with other routes in the BGP route table to select the best
overall route. This option is mutually exclusive to the Always Compare
MED option.
Enforce First AS Select this option to deny any updates received from an external
neighbor that does not have the neighbor’s configured AS at the
beginning of the received AS path parameter. This enhances security by
not allowing traffic from an unauthorized AS. This setting is disabled by
default.
Fast External Failover Select this option to immediately reset the BGP session on the interface
once the BGP connection goes down. Normally, when a BGP connection
goes down, the device waits for the expiry of the duration specified in
Holdtime parameter before bringing down the interface. This setting is
enabled by default.
Log Neighbor Select this option to enable logging of changes in routes to neighbor
Changes BGP peers. This enables the logging of only the changes in neighbor
routes. All other events must be explicitly turned on using debug
commands. This setting is disabled by default.
Network Import Select this option to enable a network import check to ensure
Check consistency in advertisements. This setting is disabled by default.
Router ID Select this option to manually configure the router ID for this BGP
supported controller or service platform. The router ID identifies the
device uniquely. When no router ID is specified, the IP address of the
interface is considered the router ID. This setting is disabled by default.
Scan Time Select this option to set the scanning interval for updating BGP routes.
This interval is the period between two consecutive scans the BGP
device checks for the validity of routes in its routing table. To disable this
setting, set the value to Zero (0). The default setting is 60 seconds.
7 Optionally select the Missing AS Worst option to treat any path that does not contain a MED value as the least
preferable route. This setting is disabled by default.
8 Review the following Bestpath parameters:
AS-Path Ignore Select this option to prevent an AS path from being considered as a
criteria for selecting a preferred route. The route selection algorithm uses
the AS path as one of the criteria when selecting the best route. When
this option is enabled, the AS path is ignored.
Compare Router Id Select this option to use the router ID as a selection criteria when
determining a preferred route. The route selection algorithm uses various
criteria when selecting the best route. When this option is enabled, the
router ID is used to select the best path between two identical BGP
routes. The route with the lower route ID is selected over a route with a
higher route id.
9 Set or override the following Distance for Route Types. The distance parameter is a rating of route
trustworthiness. The greater the distance, the lower the trust rating. The distance can be set for each type of
route indicating its trust rating.
External Routes External routes are those routes learned from a neighbor of this BGP
device. Set a value from 1 - 255.
Internal Routes Internal routes are those routes learned from another router within the
same AS. Set a value from 1 - 255.
Local Routes Local routes are those routes being redistributed from other processes
within this BGP router. Set a value from 1 - 255.
10 Set or override the following Route Limit parameters:
Number of Routes Configures the number of routes that can be stored on this BGP router.
Set this value based on the available memory on this BGP router.
Configure a value from 1 - 4,294,967,295. The default value is 9,216
routes.
Reset Time Configures the reset time. This is the time limit after which the Retry
Count value is set to Zero (0). Set a value from 1- 86,400 seconds.
Retry Count Configures the number of time the BGP process is reset before it is shut
down. Once shut down, the BGP process has to be started manually. The
BGP process is reset if it is flooded with route entries that exceed its
number of routes. Set a value from 1 - 32.
Retry Timeout Configures the time duration in seconds the BGP process is shutdown
temporarily before a reset of the process is attempted. Set a value from 1
- 3,600 seconds.
11 Set or override the following Timers:
Keepalive Set the duration, in seconds, for the keep alive timer used to maintain
connections between BGP neighbors. Set a value from 0 - 65,535
seconds.
Holdtime Set the time duration, in seconds, for the hold (delay) of packet
transmissions.
12 Set the following Aggregate Address parameters:
Aggregate addresses are used to minimize the size of the routing tables. Aggregation combines the attributes
of several different routes and advertises a single route. This creates an aggregation entry in the BGP routing
table if more specific BGP routes are available in the specified address range.
IP Prefix Enter an IP address and mask used as the aggregate address.
Summary Only Select this option to advertise the IP Prefix route to the BGP neighbor
while suppressing the detailed and more specific routes.
As Set Generates AS set path information. Select to enable. When selected, it
creates an aggregate entry advertising the path for this route, consisting
of all elements contained in all the paths being summarized. Use this
parameter to reduce the size of path information by listing the AS
number only once, even if it was included in the multiple paths that were
aggregated.
13 Set the following Distance for IP Source Prefix fields:
IP Source Prefix Enter an IP address and mask used as the prefix source address.
Admin Distance Use the spinner control to set the BGP route’s admin distance from 1 -
255.
IP Access List Provide the IP address used to define the prefix list rule.
Advertisement Use the Advertisement Interval to set the minimum interval between
Interval sending BGP router updates. Sending too many router updates creates
flapping of routes leading to possible disruptions. Set a minimum interval
so that the BGP routing updates are sent after the set interval in
seconds. The default is 5 seconds.
Disable Capability Select to disable capability negotiation with BGP neighbors. This is to
Negotiate allow compatibility with older BGP versions that have no capability
parameters used in the open messages between peers. This setting id
disabled by default.
Description Provide a 80 character maximum description for this BGP neighbor
device.
Disable Connected If utilizing loopback interfaces to connect single-hop BGP peers, enable
Check the neighbor disable connected check before establishing a the BGP
peering session.This setting is disabled by default.
Enforce Multihop A multihop route is a route to external peers on indirectly connected
networks. Select to enforce neighbors to perform multi-hop check. This
setting is disabled by default.
Next Hop Self Select to enable Next Hop Self. Use this to configure this device as the
next hop for a BGP speaking neighbor or peer group. This allows the
BGP device to change the next hop information that is sent to iBGP
peers. The next hop address is set to the IP address of the interface used
to communicate with the eBGP neighbor. This setting is disabled by
default.
Override Capability Select this to enable the ability to override capability negotiation result.
This setting is disabled by default.
Passive Select this option to set this BGP neighbor as passive. When a neighbor
is set as passive, the local device should not attempt to open a
connection to this device. This setting is disabled by default
Reconnect Interval Set a reconnection interval for peer BGP devices from 0 - 65,535
seconds. The default setting is 120 seconds.
Send Community Select this option to ensure the community attribute is sent to the BGP
neighbor. The community attribute groups destinations in a certain
community and applies routing decisions based on the community. On
receiving community attribute, the BGP router announces it to the
neighbor.
Shutdown Select this option to administratively shutdown this BGP neighbor. This
setting is disabled by default.
Soft Reconfiguration Select this option to store updates for inbound soft reconfiguration. Soft-
Inbound reconfiguration can be used in lieu of BGP route refresh capability.
Selecting this option enables local storage of all received routes and their
attributes. This requires additional memory on the BGP device.
When a soft reset (inbound) is performed on the neighbor device, the
locally stored routes are reprocessed according to the inbound policy.
The BGP neighbor connection is not affected.
Update Source Select this option to allow internal BGP sessions to use any operational
interface for TCP connections. Use Update Source in conjunction with
any specified interface on the router. The loopback interface is the
interface that is most commonly used with this command. The use of
loopback interface eliminates a dependency and BGP does not have to
rely on the availability of a particular interface for making TCP
connections. This setting is disabled by default.
Unsuppress Map Enable Unsuppress Map to selectively advertise more precise routing
information to this neighbor. Use this in conjunction with the Route
Aggregate command.
The route aggregate command creates a route map with a IP/mask
address that consolidates the subnets under it. This enables a reduction
in number of route maps on the BGP device to one entry that
encompasses all the different subnets. Use Unsuppress Map to
selectively allow/deny a subnet or a set of subnets.
Use the Create icon to create a new route map. Use the Edit icon to edit
an existing route map list after selecting it.
Weight Select to set the weight of all routes learned from this BGP neighbor.
Weight is used to decide the preferred route when the same route is
learned from multiple neighbors. The highest weight is always chosen.
20 Configure or set the following Default Originate parameters. Default originate is used by the local BGP router to
send the default route 0.0.0.0 to its neighbor for use as a default route.
Enable Select to enable Default Originate on this BGP neighbor. This setting is
disabled by default.
Route Map Use the drop-down menu to select a route map (enhanced packet filter)
to use as the Default Originate route.
21 Configure or set the following Route Map parameters. This configures how route maps are applied for this BGP
neighbor.
Direction Use the drop-down menu to configure the direction on which the
selected route map is applied. Select one from in, out, export or import.
Route Map Use the drop-down menu to select the route map to use with this BGP
neighbor. Use the Create icon to create a new route map. Use the Edit
icon to edit an existing route map after selecting it.
22 Configure or set the following Distribute List parameters. Up to 2 distribute list entries can be created.
Direction Use the drop-down menu to configure the direction on which the
selected IP access list is applied. Select either in or out.
Name Use the drop-down menu to select the route map to use with this BGP
neighbor. Use the Create icon to create a new IP Access list. Use the Edit
icon to edit an existing IP Access list after selecting it.
23 Configure or set the following eBGP Multihop parameters. This configures the maximum number of hops that
can be between eBGP neighbors not directly connected to each other.
Enable Select to enable eBGP Multihop on this BGP neighbor.
Max Hops Set the maximum number of hops between eBGP neighbors not
connected directly. Select a value from 1 - 255.
24 Configure or set the following Filter List parameters. Up to 2 filter list entries can be created.
Direction Use the drop-down menu to configure the direction on which the
selected AS Path list is applied. Select either in or out.
Name Use the drop-down menu to select the AS Path list to use with this BGP
neighbor. Use the Create icon to create a new AS Path list. Use the Edit
icon to edit an existing AS Path list after selecting it.
25 Configure or set the following Local AS parameters.
AS Number Specify the local Autonomous System (AS) number. Select from 1 -
4,294,967,295.
No Prepend Select to enable. When enabled, the local AS number is not prepended
to route updates from eBGP peers.
26 Configure or set the following Maximum Prefix value. This configures the maximum number of prefix that can
be received from a BGP neighbor.
Prefix Limit Sets the maximum number of prefix that can be received from a BGP
neighbor. Select from 1 - 4,294,967,295. Once this threshold is reached,
the BGP peer connection is reset.
Threshold Percent Sets the threshold limit for generating a log message. When this percent
of the Prefix Limit is reached, a log entry is generated. For example if the
Prefix Limit is set to 100 and Threshold Percent is set to 65, then after
receiving 65 prefixes, a log entry is created.
Restart Limit Sets the number of times a reset BGP peer connection is restarted.
Select a value from 1 - 65535.
Warning Only Select to enable. When the number of prefixes specified in Prefix Limit
field is exceeded, the connection is reset. However, when this option is
enabled, the connection is not reset and an event is generated instead.
This setting is disabled by default.
27 Configure or set the following Prefix List parameters. Up to 2 prefix list entries can be created.
Direction Use the drop-down menu to configure the direction on which the
selected IP prefix list is applied. Select either in or out.
Name Use the drop-down menu to select the IP prefix list to use with this BGP
neighbor. Use the Create icon to create a new IP prefix list or select the
Edit icon to edit an existing IP prefix list after selecting it.
28 Set or override the following Timers for this BGP neighbor:
Keepalive Set the time duration in seconds for keepalive. The keep alive timer is
used to maintain connections between BGP neighbors. Set a value from 1
- 65,535 seconds.
Holdtime Set the time duration in seconds for the hold time.
29 Select OK to save the changes and overrides. Select Reset to revert to the last saved configuration.
Remove Private AS Select this option to remove the private Autonomous System (AS)
number from outbound updates. Private AS numbers are not advertised
to the Internet. This option is used with external BGP (eBGP) peers only.
The router removes the AS numbers only if the update includes private
AS numbers.
If the update includes both private and public AS numbers, the system
treats it as an error.
Route Reflector Client Select this option to enable this BGP neighbor as a route reflector client
for the local router. Route reflectors control large numbers of iBGP
peering.Using route reflection, the number of iBGP peers is reduced.
This option configures the local BGP device as a route reflector and the
neighbor as its route reflector client. This setting is disabled by default.
Route Server Client Select this option to enable this neighbor BGP device to act as a route
server client. This setting is disabled by default.
Strict Capability Select this option to enable a strict capability match before allowing a
Match neighbor BGP peer to open a connection. When capabilities do not
match, the BGP connection is closed. This setting is disabled by default.
TCP Port Select to enable configuration of non-standard BGP port for this BGP
neighbor. By default the BGP port number is 179. To configure a non
standard port for this BGP neighbor, use the control to set the port
number. Select a value from 1 - 65,535.
32 Configure or set the following Allowas In parameters.
This configures the Provider Edge (PE) routers to allow the re-advertisement of all prefixes containing
duplicate Autonomous System Numbers (ASN). This creates a pair of VPN Routing/Forwarding (VRF)
instances on each PE router to receive and re-advertise prefixes. The PE router receives prefixes with ASNs
from all PE routers and advertises to its neighbor PE routers on one VRF. The other VRF receives prefixes with
ASNs from the Customer Edge (CE) routers and re-advertises them to all PE routers in the configuration.
Enable Select this option to enable re-advertisement of all prefixes containing
duplicate ASNs.
Allowed Occurrences Set the maximum number of times an ASN is advertised. Select a value
in the rage 1 - 10.
33 Select OK to save the changes and overrides. Select Reset to revert to the last saved configuration. Select Exit
to close this window and go back to the main screen.
34 Select the Experimental tab from the BGP main screen.
(filter) it. If it’s determined the destination MAC is on a different network segment, it forwards the packet to the
segment. If the destination MAC is on the same network segment, the packet is dropped (filtered). As nodes
transmit packets through the bridge, the bridge updates its forwarding database with known MAC addresses and
their locations on the network. This information is then used to decide to filter or forward the packet.
This forwarding database assignment can be overridden as needed, but removes the device configuration from the
managed profile that may be shared with other similar device models.
NOTE: A blue override icon (to the left of a parameter) defines the parameter as
having an override applied. To remove an override go to the Basic Configuration
section of the device and click the Clear Overrides button. This removes all
overrides from the device.
Administrators often need to route traffic to interoperate between different VLANs. Bridging VLANs are only for
non-routable traffic, like tagged VLAN frames destined to some other device which will untag it. When a data
frame is received on a port, the VLAN bridge determines the associated VLAN based on the port of reception.
Using forwarding database information, the Bridge VLAN forwards the data frame on the appropriate port(s).
VLAN's are useful to set separate networks to isolate some computers from others, without actually having to have
separate cabling and Ethernet switches. Controllers and service platforms can do this on their own, without need
for the computer or other gear to know itself what VLAN it's on (this is called port-based VLAN, since it's assigned
by port of the switch). Another common use is to put specialized devices like VoIP Phones on a separate network
for easier configuration, administration, security, or quality of service.
NOTE: A blue override icon (to the left of a parameter) defines the parameter as
having an override applied. To remove an override go to the Basic Configuration
section of the device and click the Clear Overrides button. This removes all
overrides from the device.
IPv6 Firewall Lists whether IPv6 is enabled on this bridge VLAN. A green checkmark
defines this setting as enabled. A red X defines this setting as disabled.
IPV6 provides enhanced identification and location information for
computers on networks routing traffic across the Internet. IPv6
addresses are composed of eight groups of four hexadecimal digits
separated by colons. IPv6 hosts can configure themselves automatically
when connected to an IPv6 network using the neighbor discovery
protocol via ICMPv6 router discovery messages. When first connected to
a network, a host sends a link-local router solicitation multicast request
for its configuration parameters; routers respond to such a request with
a router advertisement packet that contains Internet Layer configuration
parameters.
DHCPv6 Trust Lists whether DHCPv6 responses are trusted on this bridge VLAN. A
green checkmark defines this setting as enabled. A red X defines this
setting as disabled. If enabled, only DHCPv6 responses are trusted and
forwarded over the bridge VLAN.
RA Guard Lists whether router advertisements (RA) are allowed on this bridge
VLAN. A green checkmark defines this setting as enabled. A red X
defines this setting as disabled. RAs are periodically sent to hosts or
sent in response to solicitation requests. The advertisement includes
IPv6 prefixes and other subnet and host information.
7 Select Add to define a new Bridge VLAN configuration, Edit to modify or override an existing Bridge VLAN
configuration or Delete to remove a VLAN configuration.
Figure 5-101 Profile Overrides - Network Bridge VLAN screen, General tab
The General tab displays by default.
8 If adding a new Bridge VLAN configuration, use the spinner control to define or override a VLAN ID between 1 -
4094. This value must be defined and saved before the General tab can become enabled and the remainder of
the settings defined. VLAN IDs 0 and 4095 are reserved and unavailable.
9 Set or override the following General bridge VLAN parameters:
Description If creating a new Bridge VLAN, provide a description (up to 64
characters) unique to the VLAN’s specific configuration to help
differentiate it from other VLANs with similar configurations.
Per VLAN Firewall Enable this setting to provide firewall allow and deny conditions over the
bridge VLAN. This setting is enabled by default.
10 Set or override the following URL Filter parameters. URL filters are used to control access to specific resources
on the Internet.
URL Filter Use the drop-down menu to select a URL filter to use with this Bridge
VLAN.
11 Use the drop-down to select the appropriate Application Policy to use with this Bridge VLAN configuration. An
application policy defines the rules or actions executed on recognized HTTP (Facebook), enterprise (Webex)
and peer-to-peer (gaming) applications or application-categories.
12 Set or override the following Extended VLAN Tunnel parameters:
Bridging Mode Specify one of the following bridging mode for use on the VLAN.
• Automatic - Select automatic mode to let the controller or service
platform determine the best bridging mode for the VLAN.
• Local - Select Local to use local bridging mode for bridging traffic on the
VLAN.
• Tunnel - Select Tunnel to use a shared tunnel for bridging traffic on the
VLAN.
• Isolated Tunnel - Select isolated-tunnel to use a dedicated tunnel for
bridging traffic on the VLAN.
IP Outbound Tunnel Select an IP Outbound Tunnel ACL for outbound traffic from the drop-
ACL down menu. If an appropriate outbound IP ACL is not available, select
the Create button.
IPv6 Outbound Tunnel Select an IPv6 Outbound Tunnel ACL for outbound IPv6 traffic from the
ACL drop-down menu. If an appropriate outbound IPv6 ACL is not available,
select the Create button.
MAC Outbound Tunnel Select a MAC Outbound Tunnel ACL for outbound traffic from the drop-
ACL down menu. If an appropriate outbound MAC ACL is not available, select
the Create button.
Tunnel Over Level 2 Select this option to allow VLAN traffic to be tunneled over level 2 links.
This setting is disabled by default.
NOTE: Local and Automatic bridging modes do not work with ACLs. ACLs can only
be used with tunnel or isolated-tunnel modes.
13 Select the Level 2 Tunnel Broadcast Optimization checkbox to enable broadcast optimization on this bridge
VLAN. L2 Tunnel Broadcast Optimization prevents flooding of ARP packets over the virtual interface. Based on
the learned information, ARP packets are filtered at the wireless controller level. This option is enabled by
default.
14 If enabling L2 tunnel broadcast optimization, set the Level 2 Forward Additional Packet Types as None or
WNMP to specify if additional packet types are forwarded or not across the L2 tunnel. By default, L2 tunnel
broadcast optimization disables Wireless Network Management Protocol (WNMP) packet forwarding also
across the L2 tunnel. Use this option to enable the forwarding of only WNMP packets. The default value is
None.
network. Once logged into the captive portal, additional Terms and Agreement, Welcome, Fail and No Service
pages provide the administrator with a number of options on captive portal screen flow and user appearance.
If an existing captive portal does not suite the bridge VLAN configuration, either select the Edit icon to modify
an existing configuration or select the Create icon to define a new configuration that can be applied to the
bridge VLAN. For information on configuring a captive portal policy, see Configuring Captive Portal Policies on
page 11-1.
19 Refer to the Captive Portal Snoop IPv6 Subnet field to configure the subnet on which IPv6 snooping is enabled/
disabled for wired captive portal support. Up to 16 excluded addresses are permitted.
20 Select the IGMP Snooping tab.
Figure 5-102 Profile Overrides - Network Bridge VLAN screen, IGMP Snooping tab
21 Define the following General settings:
Enable IGMP Snooping Select this option to enable IGMP snooping. If disabled, snooping on a
per VLAN basis is also disabled. This feature is enabled by default. If
disabled, the settings under the bridge configuration are overridden. For
example, if IGMP snooping is disabled, but the bridge VLAN is enabled,
the setting is disabled.
Forward Unknown Select this option to enable the forwarding of multicast packets from
Multicast Packets unregistered multicast groups. If disabled (the default setting), the
unknown multicast forward feature is also disabled for individual VLANs.
Enable Fast leave Select this option to remove a Layer 2 LAN interface from the IGMP
processing snooping forwarding table entry without initially sending IGMP group-
specific queries to the interface. When receiving a group specific
IGMPv2 leave message, IGMP snooping removes the interface from the
Layer 2 forwarding table entry for that multicast group, unless a
multicast router was learned on the port. Fast-leave processing
enhances bandwidth management for all hosts on the network. This
setting is disabled by default.
Last Member Query Specify the number (1 - 7) of group specific queries sent before
Count removing an IGMP snooping entry. The default settings is 2.
22 Define the following Multicast Router settings
Interface Names Select the ge1 or radio interfaces used to IGMP snooping over a
multicast router.
Multicast Router Learn Set the pim-dvmrp or static multicast routing learn mode. DVMRP
Mode builds a parent-child database using a constrained multicast model to
build a forwarding tree rooted at the source of the multicast packets.
Multicast packets are initially flooded down this source tree. If
redundant paths are on the source tree, packets are not forwarded
along those paths.
23 Define the following IGMP Querier settings:
Enable IGMP Querier Select this option to enable IGMP querier. IGMP snoop querier is used to
keep host memberships alive. It’s primarily used in a network where
there’s a multicast streaming server and hosts subscribed to the server
and no IGMP querier present. An IGMP querier sends out periodic IGMP
query packets. Interested hosts reply with an IGMP report packet. IGMP
snooping is only conducted on wireless radios. IGMP multicast packets
are flooded on wired ports. IGMP multicast packet are not flooded on
the wired port. IGMP membership is also learnt on it and only if present,
then it is forwarded on that port.
Source IP Address If enabling IGMP querier, set the source IP address used for IGMP
snooping over a multicast router.
IGMP Version Use the spinner control to set the IGMP version compatibility to either
version 1, 2 or 3. IGMPv1 is defined by RFC 1112, IGMPv2 is defined by
RFC 2236 and IGMPv3 defined by RFC 4604 which defines both
IGMPv3 and MLDv2. IGMPv2 improves over IGMPv1 by adding the ability
for a host to signal desire to leave a multicast group. IGMPv3 improves
over IGMPv2 by adding the ability to listen to multicast traffic
originating from a set of source IP addresses exclusively.
Maximum Response Specify the maximum interval (from 1 - 25 seconds) before sending a
Time responding report. When no reports are received from a radio, radio
information is removed from the snooping table. The controller or
service platform only forwards multicast packets to radios present in the
snooping table. For IGMP reports from wired ports, the controller or
service platform forwards these reports to the multicast router ports.
The default setting is 1 seconds.
Other Querier Timer Specify an interval (from 60 - 300 seconds) used as a timeout interval
Expiry for other querier resources.
24 Select the OK button located at the bottom right of the screen to save the changes to the IGMP Snooping tab.
Select Reset to revert to the last saved configuration.
Figure 5-103 Profile Overrides - Network Bridge VLAN screen, MLD Snooping tab
26 Define the following General MLD snooping parameters for the bridge VLAN configuration:
Multicast Listener Discovery (MLD) snooping enables a controller, service platform or Access Point to examine
MLD packets and make forwarding decisions based on content. MLD is used by IPv6 devices to discover
devices wanting to receive multicast packets destined for specific multicast addresses. MLD uses multicast
listener queries and multicast listener reports to identify which multicast addresses have listeners and join
multicast groups.
MLD snooping caps the flooding of IPv6 multicast traffic on controller, service platform or Access Point VLANs.
When enabled, MLD messages are examined between hosts and multicast routers and to discern which hosts
are receiving multicast group traffic. The controller, service platform or Access Point then forwards multicast
traffic only to those interfaces connected to interested receivers instead of flooding traffic to all interfaces.
Enable MLD Snooping Enable MLD snooping to examine MLD packets and support content
forwarding on this bridge VLAN. Packets delivered are identified by a
single multicast group address. Multicast packets are delivered using
best-effort reliability, just like IPv6 unicast. MLD snooping is enabled by
default.
Forward Unknown Use this option to either enable or disable IPv6 unknown unicast
Unicast Packets forwarding. This setting is enabled by default.
NOTE: A blue override icon (to the left of a parameter) defines the parameter as
having an override applied. To remove an override go to the Basic Configuration
section of the device and click the Clear Overrides button. This removes all
overrides from the device.
on a IEEE 802 LAN network. The protocol is formally referred to by the IEEE as Station and Media Access Control
Connectivity Discovery. Both LLDP snooping and ability to generate and transmit LLDP packets will be provided.
Information obtained via CDP and LLDP snooping is available in the UI. In addition, information obtained via CDP /
LLDP snooping is provided by an AP during the adoption process, so the L2 switch device name detected by the
AP can be used as a criteria in the auto provisioning policy.
Figure 5-105 Profile Overrides - Network Link Layer Discovery Protocol screen
NOTE: A blue override icon (to the left of a parameter) defines the parameter as
having an override applied. To remove an override go to the Basic Configuration
section of the device and click the Clear Overrides button. This removes all
overrides from the device.
6 Check the Enable LLDP box to enable Link Layer Discovery Protocol on the device.
7 Refer to the Hold Time field and use the spinner control to define a hold time between 10 - 1800 seconds for
transmitted LLDP Packets. The default value is 180 seconds.
8 Refer to the Timer field and use the spinner control to define the interval between 5 - 900 seconds to transmit
LLDP packets. The default value is 60 seconds.
9 Check the Inventory Management Discovery box to enable this feature. Inventory Management Discovery is
used to track and identify inventory attributes including manufacturer, model, or software version.
10 Extended Power via MDI Discovery provides detailed power information through end points and other
connected devices. Select the Extended Power via MDI Discovery box to enable this feature. or select the
Default for Type option to use a WiNG internal default value.
11 Select the OK button to save the changes and overrides. Select Reset to revert to the last saved configuration.
NOTE: A blue override icon (to the left of a parameter) defines the parameter as
having an override applied. To remove an override go to the Basic Configuration
section of the device and click the Clear Overrides button. This removes all
overrides from the device.
and increase in throughput for connections between two peers. LACP provides automatic recovery in cases
where one or more of the physical links - making up the aggregation - fail. Similarly, LACP also provides a
theoretical boost in speed compared to an individual physical link.
NOTE: Disable or physically disconnect interfaces that do not use spanning tree to
prevent loop formation until LACP is fully configured on both the local WiNG device
and the remote device.
8 To enable critical resource monitoring for the device, select a Critical Resource Policy from the drop-down
menu in the Critical Resource Monitoring section. If a new critical resource monitoring policy is needed click the
Create button and specify the Ping Interval, IP Address, Ping Mode and VLAN for the devices being monitored.
9 Select the OK button to save the changes and overrides. Select Reset to revert to the last saved configuration.
Also, this practice does not scale gracefully for quick growing deployments.
An alias enables an administrator to define a configuration item, such as a hostname, as an alias once and use the
defined alias across different configuration items such as multiple ACLs.
Once a configuration item, such as an ACL, is utilized across remote locations, the Alias used in the configuration
item (ACL) is modified to meet local deployment requirement. Any other ACL or other configuration items using
the modified alias also get modified, simplifying maintenance at the remote deployment.
Aliases have scope depending on where the Alias is defined. Alias are defined with the following scopes:
• Global aliases are defined from the Configuration > Network > Alias screen. Global aliases are available for use
globally across all devices, profiles and RF Domains in the system.
• Profiles aliases are defined from the Configuration > Devices > System Profile > Network > Alias screen. Profile
aliases are available for use to a specific group of wireless controllers or Access Points. Alias values defined in a
profile override the alias values defined within global aliases.
• RF Domain aliases are defined from the Configuration > Devices > RF Domain > Alias screen. RF Domain aliases
are available for use for a site as a RF Domain is site specific. RF Domain alias values override alias values
defined in a global alias or a profile alias configuration.
• Device aliases are defined from the Configuration > Devices > Device Overrides > Network > Alias screen.
Device aliases are utilized by a singular device only. Device alias values override global, profile or RF Domain
alias configurations.
Using an alias, configuration changes made at a remote location override any updates at the management center.
For example, if an network alias defines a network range as 192.168.10.0/24 for the entire network, and at a remote
deployment location, the local network range is 172.16.10.0/24, the network alias can be overridden at the
deployment location to suit the local requirement. For the remote deployment location, the network alias work
with the 172.16.10.0/24 network. Existing ACLs using this network alias need not be modified and will work with the
local network for the deployment location. This simplifies ACL definition and management while taking care of
specific local deployment requirements.
A basic alias is a set of configurations consisting of VLAN, Host, Network and Address Range alias configurations.
A VLAN alias is a configuration for optimal VLAN re-use and management for local and remote deployments. A
host alias configuration is for a particular host device’s IP address. A network alias configuration is utilized for an IP
address on a particular network. An address range alias is a configuration for a range of IP addresses.
the remote location’s ACL can be overridden using an alias. At the remote location, the ACL works with the
172.16.13.20-110 address range. A new ACL need not be created specifically for the remote deployment location.
Name If adding a new Address Alias, provide it a distinguishing name up to 32
characters. The alias name always starts with a dollar sign ($).
Start IP Set a starting IP address used with a range of addresses utilized with the
address range alias.
End IP Set an ending IP address used with a range of addresses utilized with the
address range alias.
8 Select + Add Row to define String Alias settings:
Use the String Alias field to create aliases for hosts that can be utilized at different deployments. For example,
if the main domain at a remote location is called loc1.domain.com and at another deployment location it is
called loc2.domain.com, the alias can be overridden at the remote location to suit the local (but remote)
requirement. At one remote location, the alias functions with the loc1.domain.com domain and at the other with
the loc2.domain.com domain.
Name If adding a new String Alias, provide it a distinguishing name up to 32
characters. The alias name always starts with a dollar sign ($).
Value Provide a string value to use in the alias.
9 Select + Add Row to define Host Alias settings:
Use the Host Alias field to create aliases for hosts that can be utilized at different deployments. For example, if
a central network DNS server is set a static IP address, and a remote location’s local DNS server is defined, this
host can be overridden at the remote location. At the remote location, the network is functional with a local
DNS server, but uses the name set at the central network. A new host need not be created at the remote
location. This simplifies creating and managing hosts and allows an administrator to better manage specific
local requirements.
Name If adding a new Host Alias, provide it a distinguishing name up to 32
characters. The alias name always starts with a dollar sign ($).
Host Set the IP address of the host machine.
10 Select + Add Row to define Network Alias settings:
Use the Network Alias field to create aliases for IP networks that can be utilized at different deployments. For
example, if a central network ACL defines a network as 192.168.10.0/24, and a remote location’s network range
is 172.16.10.0/24, the ACL can be overridden at the remote location to suit their local (but remote) requirement.
At the remote location, the ACL functions with the 172.16.10.0/24 network. A new ACL need not be created
specifically for the remote deployment. This simplifies ACL definition and allows an administrator to better
manage specific local requirements.
Name If adding a new Network Alias, provide it a distinguishing name up to 32
characters. The alias name always starts with a dollar sign ($).
Network Provide a network address in the form of host/mask.
11 Select OK when completed to update the set of basic alias rules. Select Reset to revert the screen back to its
last saved configuration.
A network group alias is a set of configurations consisting of host and network configurations. Network
configurations are complete networks in the form of 192.168.10.0/24 or an IP address range in the form of
192.168.10.10-192.168.10.20. Host configurations are in the form of a single IP address, 192.168.10.23.
A network group alias can contain multiple definitions for a host, network, and IP address range. A maximum of
eight (8) Host entries, eight (8) network entries and eight (8) IP addresses range entries can be configured inside
a network group alias. A maximum of 32 network group alias entries can be created.
Host Displays all the host aliases configured in the listed network group alias.
Displays a blank column if no host alias is defined.
Network Displays all network aliases configured in the listed network group alias.
Displays a blank column if no network alias is defined.
7 Select Add to create a new policy, Edit to modify the attributes of an existing policy or Delete to remove
obsolete policies.
8 Select the added row to expand it into configurable parameters for defining the network alias rule.
A network service alias is a set of configurations that consist of protocol and port mappings. Both source and
destination ports are configurable. For each protocol, up to 2 source port ranges and up to 2 destination port
ranges can be configured. A maximum of 4 protocol entries can be configured per network service alias.
Use a service alias to associate more than one IP address to a network interface, providing multiple connections to
a network from a single IP node.
Upon receiving a neighbor solicitation message, the destination replies with neighbor advertisement (NA). The
source address in the NA is the IPv6 address of the device sending the NA message. The destination address in
the neighbor advertisement message is the IPv6 address of the device sending the neighbor solicitation. The data
portion of the NA includes the link layer address of the node sending the neighbor advertisement.
Neighbor solicitation messages also verify the availability of a neighbor once its the link layer address is identified.
When a node wants to verify the reachability of a neighbor, the destination address in a neighbor solicitation
message is the unicast address of the neighbor.
A neighbor is interpreted as reachable when an acknowledgment is returned indicating packets have been
received and processed. If packets are reaching the device, they’re also reaching the next hop neighbor, providing
a confirmation the next hop is reachable.
5 Select + Add Row to define the configuration of IPv6 Neighbor Discovery configurations. A maximum of 256
neighbor entries can be defined.
IPv6 Address Provide a static IPv6 IP address for neighbor discovery. IPv6 hosts can
configure themselves automatically when connected to an IPv6 network
using the Neighbor Discovery Protocol via Internet Control Message
Protocol version 6 (ICMPv6) router discovery messages. When first
connected to a network, a host sends a link-local router solicitation
multicast request for its configuration parameters; routers respond to
such a request with a router advertisement packet that contains Internet
Layer configuration parameters. IPv6 addresses are composed of eight
groups of four hexadecimal digits separated by colons.
MAC Address Enter the hardware encoded MAC addresses of up to 256 IPv6 neighbor
devices. A neighbor is interpreted as reachable when an
acknowledgment is returned indicating packets have been received and
processed. If packets are reaching the device, they’re also reaching the
next hop neighbor, providing a confirmation the next hop is reachable.
Switch VLAN Interface Use the spinner control to set the virtual interface (from 1 - 4094) used
for neighbor advertisements and solicitation messages.
Device Type Specify the device type for this neighbor solicitation is for. Options
include Host, Router and DHCP Server. The default setting is Host.
6 Select OK to save the changes. Select Reset to revert to the last saved configuration.
For more information on applying an override to an existing device profile, refer to the following sections:
• Overriding a Profile’s General Security Settings
• Overriding a Profile’s Certificate Revocation List (CRL) Configuration
• Overriding a Profile’s RADIUS Trustpoint Configuration
• Overriding a Profile’s VPN Configuration
• Overriding a Profile’s Auto IPSec Tunnel Configuration
• Overriding a Profile’s NAT Configuration
• Overriding a Profile’s Bridge NAT Configuration
• Overriding a Profile’s Application Visibility Settings
5.2.9.1 Overriding a Profile’s General Security Settings
Overriding a Profile’s Security Configuration
A profile can leverage existing firewall, wireless client role and WIPS policies and apply them to the profile’s
configuration. This affords each profile a truly unique combination of data protection policies best meeting the
data protection requirements the profile supports. However, as deployment requirements arise, an individual device
may need some or all of its general security configuration overridden from the profile’s settings.
NOTE: A blue override icon (to the left of a parameter) defines the parameter as
having an override applied. To remove an override go to the Basic Configuration
section of the device and click the Clear Overrides button. This removes all
overrides from the device.
The Device Configuration screen displays a list of managed devices or peer controllers, service platforms or Access
Points within the managed network.
2 Select a target device (by double-clicking it) from amongst those displayed within the Device Configuration
screen.
Devices can also be selected directly from the Device Browser in the lower, left-hand, side of the UI.
3 Select Profile Overrides from the Device menu to expand it into sub menu options.
4 Select Security to expand its sub menu options.
5 Select Certificate Revocation.
NOTE: A blue override icon (to the left of a parameter) defines the parameter as
having an override applied. To remove an override go to the Basic Configuration
section of the device and click the Clear Overrides button. This removes all
overrides from the device.
To define a RADIUS Trustpoint configuration, utilize an existing stored trustpoint or launch the certificate manager
to create a new one:
1 Select Devices from the Configuration tab.
The Device Configuration screen displays a list of managed devices or peer controllers, service platforms or
Access Points within the managed network.
2 Select a target device (by double-clicking it) from amongst those displayed within the Device Configuration
screen.
Devices can also be selected directly from the Device Browser in the lower, left-hand, side of the UI.
3 Select Profile Overrides from the Device menu to expand it into sub menu options.
4 Select Security to expand its sub menu options.
5 Select Trustpoints.
Tunnels are sets of security associations (SA) between two peers. SAs define the protocols and algorithms applied
to sensitive packets and specify the keying mechanisms used by tunneled peers. SAs are unidirectional and exist in
both the inbound and outbound direction. SAs are established per the rules and conditions of defined security
protocols (AH or ESP).
Use crypto maps to configure IPSec VPN SAs. Crypto maps combine the elements comprising IPSec SAs. Crypto
maps also include transform sets. A transform set is a combination of security protocols, algorithms and other
settings applied to IPSec protected traffic. One crypto map is utilized for each IPSec peer, however for remote VPN
deployments one crypto map is used for all the remote IPSec peers.
Internet Key Exchange (IKE) protocol is a key management protocol standard used in conjunction with IPSec. IKE
enhances IPSec by providing additional features, flexibility, and configuration simplicity for the IPSec standard. IKE
automatically negotiates IPSec SAs, and enables secure communications without time consuming manual pre-
configuration.
The Quick Setup Wizard creates a VPN configuration with minimum administration. Default values are retained for
most parameters.
Peer Configure the peer for this tunnel. The peer device can be specified
either by its hostname or by its IP address.
Authentication Set the authentication used to identify the peers with each other on
opposite ends of the VPN tunnel connection. The following can be
configured:
• Certificate – Use a certificate to authenticate (default value).
• Pre-Shared Key – Use a pre-shared key to authenticate. Enter the
secret key in the space provided for it.
Local Identity Configure the local identity used with this peer configuration for an IKE
exchange with the target VPN IPSec peer. Options include IP Address,
Distinguished Name, FQDN, email and string. The default setting is
string.
Remote Identity Configure the Access Point remote identifier used with this peer
configuration for an IKE exchange with the target VPN IPSec peer.
Options include IP Address, Distinguished Name, FQDN, email and
string. The default setting is string.
IKE Policy Configure the IKE policy to use. IKE is used to exchange authentication
keys. Select from one of the following:
• All – Use any IKE policy (default value).
• IKE1 – Use IKE 1 only
• IKE2 – Use IKE 2 only
Transform Set Configure the transform set used to specify how traffic is protected
within the crypto ACL defining the traffic that needs to be protected.
Select the appropriate traffic set from the drop-down list.
3 Select Save to save the VPN quick setup tunnel configuration. To exit without saving, select Cancel.
5.2.9.4.5 Step By Step Wizard
The Step-By-Step wizard creates a VPN connection with more manual configuration than the Quick Setup Wizard.
Use this wizard to manually configure Access Control Lists, IKE Policy, and Transform Sets to customize the VPN
Tunnel.
1 Select the Step-By-Step Wizard option from the VPN screen.
2 Select the Start button.
6 Click the Add Peer button to add the tunnel peer information into the Peer(s) table. This table lists all the peers
set for the VPN Tunnel.
7 Select Next to proceed to the step 3 screen. Use the Back button to go to the previous step.
If any of the required values within the step 2 screen are not set properly, the third wizard screen will not
display until they are properly set.
Mode This field is enabled when Create New Policy is selected in Transform Set
field. This indicates how packets are transported through the tunnel.
• Tunnel – Use this mode when the Tunnel is between two routers or servers.
• Transport – Use this mode when the Tunnel is created between a client
and a server.
Security Association Configures the lifetime of a security association (SA). Keys and SAs
should be periodically renewed to maintain security of the tunnel. The
field defines the parameters that set the lifetime of a security association.
• Lifetime – Set the duration (in seconds) after which the keys should be
changed. Set a value from 500-2,147,483,646 seconds.
• Data – This is the amount of data in KBs the key can use. The key is
changed after this quantity of data has be encrypted/decrypted. Set a
value from 500-2,147,483,646 KBs.
9 Select Next to proceed to the fourth configuration screen. Use the Back button to navigate to the previous step.
If any of the required values within the step 3 screen are not set properly, the fourth wizard screen will not
display until they are properly set.
The advanced VPN configuration option does not utilize a setup wizard. Rather, it utilizes and its own screen flow
where just about every facet of a VPN tunnel configuration can be set by a qualified network administrator.
For detailed information on creating a VPN tunnel configuration, refer to Setting the Profile’s VPN Configuration on
page 8-168.
Tunnels are sets of security associations (SA) between two peers. SAs define the protocols and algorithms applied
to sensitive packets and specify the keying mechanisms used by tunnelled peers. SAs are unidirectional and exist
in both the inbound and outbound direction. SAs are established per the rules and conditions of defined security
protocols (AH or ESP).
Internet Key Exchange (IKE) protocol is a key management protocol standard used in conjunction with IPSec. IKE
enhances IPSec by providing additional features, flexibility, and configuration simplicity for the IPSec standard. IKE
enables secure communications without time consuming manual pre-configuration for auto IPSec tunneling.
To define an Auto IPSec Tunnel configuration or override that can be applied to a profile:
1 Select Devices from the Configuration tab.
The Device Configuration screen displays a list of managed devices or peer controllers, service platforms or
Access Points.
2 Select a target device (by double-clicking it) from amongst those displayed within the Device Configuration
screen.
Devices can also be selected directly from the Device Browser in the lower, left-hand, side of the UI.
3 Select Profile Overrides from the Device menu to expand it into sub menu options.
4 Select Security to expand its sub menu options.
5 Select Auto IPSec Tunnel.
The Settings field lists those Auto IPSec tunnel policies created thus far. Any of these policies can be selected
and applied to a profile.
NOTE: A blue override icon (to the left of a parameter) defines the parameter as
having an override applied. To remove an override go to the Basic Configuration
section of the device and click the Clear Overrides button. This removes all
overrides from the device.
Additionally, NAT is a process of modifying network address information in IP packet headers while in transit
across a traffic routing device for the purpose of remapping one IP address to another. In most deployments NAT
is used in conjunction with IP masquerading which hides RFC1918 private IP addresses behind a single public IP
address.
NAT can provide a profile outbound Internet access to wired and wireless hosts connected to either an Access
Point or a wireless controller. Many-to-one NAT is the most common NAT technique for outbound Internet access.
Many-to-one NAT allows an Access Point or wireless controller to translate one or more internal private IP
addresses to a single, public facing, IP address assigned to a 10/100/1000 Ethernet port or 3G card.
NOTE: A blue override icon (to the left of a parameter) defines the parameter as
having an override applied. To remove an override go to the Basic Configuration
section of the device and click the Clear Overrides button. This removes all
overrides from the device.
NOTE: A blue override icon (to the left of a parameter) defines the parameter as
having an override applied. To remove an override go to the Basic Configuration
section of the device and click the Clear Overrides button. This removes all
overrides from the device.
6 Select Add to create a new NAT policy that can be applied to a profile. Select Edit to modify or override the
attributes of a existing policy or select Delete to remove obsolete NAT policies from the list of those available to
a profile.
actual address of the server from users on insecure interfaces. Casual access by unauthorized users becomes
much more difficult. Static NAT requires a dedicated address on the outside network for each host.
Protocol Select the protocol for use with static translation (TCP, UDP and Any
are available options). TCP is a transport layer protocol used by
applications requiring guaranteed delivery. It’s a sliding window
protocol handling both time outs and retransmissions. TCP establishes
a full duplex virtual connection between two endpoints. Each endpoint
is defined by an IP address and a TCP port number. The User Datagram
Protocol (UDP) offers only a minimal transport service, non-guaranteed
datagram delivery, and provides applications direct access to the
datagram service of the IP layer. UDP is used by applications not
requiring the level of service of TCP, or are using communications
services (multicast or broadcast delivery) not available from TCP. The
default setting is Any.
Destination IP Enter the local address used at the (source) end of the static NAT
configuration. This address (once translated) is not exposed to the
outside world when the translation address is used to interact with the
remote destination.
Destination Port Use the spinner control to set the local port number used at the
(source) end of the static NAT configuration. The default value is port 1.
NAT IP Enter the IP address of the matching packet to the specified value. The
IP address modified can be either source or destination based on the
direction specified.
NAT Port Enter the port number of the matching packet to the specified value.
This option is valid only if the direction specified is destination.
Network Select Inside or Outside NAT as the network direction. Inside is the
default setting.
16 Select OK to save the changes or overrides made to the static NAT configuration. Select Reset to revert to the
last saved configuration.
17 Select the Dynamic NAT tab.
Dynamic NAT configurations translate the IP address of packets going out from one interface to another
interface based on configured conditions. Dynamic NAT requires packets be switched through a NAT router to
generate translations in the translation table.
Using Bridge NAT, a tunneled VLAN (extended VLAN) is created between the NoC and a remote location. When a
remote client needs to access the Internet, Internet traffic is routed to the NoC, and from there routed to the
Internet. This increases the access time for the end user on the client.
To resolve latency issues, Bridge NAT identifies and segregates traffic heading towards the NoC and outwards
towards the Internet. Traffic towards the NoC is allowed over the secure tunnel. Traffic towards the Internet is
switched to a local WLAN link with access to the Internet.
The Device Configuration screen displays a list of managed devices or peer controllers, service platforms or Access
Points.
2 Select a target device (by double-clicking it) from amongst those displayed within the Device Configuration
screen.
Devices can also be selected directly from the Device Browser in the lower, left-hand, side of the UI.
3 Select Profile Overrides from the Device menu to expand it into sub menu options.
4 Select Security to expand its sub menu options.
5 Select Bridge NAT.
NOTE: A blue override icon (to the left of a parameter) defines the parameter as
having an override applied. To remove an override go to the Basic Configuration
section of the device and click the Clear Overrides button. This removes all
overrides from the device.
7 Select Add to create a new Bridge VLAN configuration, Edit to modify an existing configuration or Delete to
remove a configuration.
10 Select + Add Row to set the interface, overload and NAT pool settings for the Bridge NAT configuration.
NOTE: A blue override icon (to the left of a parameter) defines the parameter as
having an override applied. To remove an override go to the Basic Configuration
section of the device and click the Clear Overrides button. This removes all
overrides from the device.
Enable HTTP Metadata Select this option to enable the metadata extraction from HTTP flows.
The default setting is disabled.
Enable SSL Metadata Select this option to enable the metadata extraction from SSL flows. The
default setting is disabled.
Enable TCP RTT Select this option to enable extraction of RTT information from TCP
flows. The default setting is disabled.
7 Review the Custom Applications for DPI field to select the custom applications available for this device profile.
For information on creating custom applications and their categories, see Application on page 7-58.
8 If enabling TCP-RTT metadata collection, in the App Groups for TCP RTT field, specify the application groups for
which TCP-RTT metadata collection is to be enabled. Select the Application Groups from the drop-down menu
and use the green, down arrow to move the selection to the box below. Note, you can add maximum of 8
(eight) groups to the list. If the desired application group is not available, select the Create icon to define a new
application group configuration or select the Edit icon to modify an existing application group. For information
on creating custom application groups, see Application on page 7-58.
9 Select OK to save the changes or overrides. Select Reset to revert to the last saved configuration.
Define an external Virtual Router Redundancy Protocol (VRRP) configuration when router redundancy is required
in a wireless network requiring high availability.
The election of a VRRP master is central to the configuration of VRRP. A VRRP master (once elected) performs the
following functions:
• Responds to ARP requests
• Forwards packets with a destination link layer MAC address equal to the virtual router MAC address
• Rejects packets addressed to the IP address associated with the virtual router, if it is not the IP address owner
• Accepts packets addressed to the IP address associated with the virtual router, if it is the IP address owner or
accept mode is true.
Nodes losing the election process enter a backup state where they monitor the master for any failures, and in case
of a failure, one of the backups become the master and assumes the management of the designated virtual IPs. A
backup does not respond to an ARP request, and discards packets destined for a virtual IP resource.
4 Select VRRP.
NOTE: A blue override icon (to the left of a parameter) defines the parameter as
having an override applied. To remove an override go to the Basic Configuration
section of the device and click the Clear Overrides button. This removes all
overrides from the device.
6 Select the Version tab to define the VRRP version scheme used with the configuration.
Preempt Select this option to ensure a high priority backup router is available to preempt a
lower priority backup router resource. The default setting is enabled. When
selected, the Preempt Delay option becomes enabled to set the actual delay
interval for pre-emption. This setting determines if a node with a higher priority
can take over all the Virtual IPs from the nodes with a lower priority.
Preempt Delay If the Preempt option is selected, use the spinner control to set the delay interval
(in seconds) for pre-emption.
Interface Select this value to enable/disable VRRP operation and define the VLAN (1 -
4,094) interface where VRRP will be running. These are the interfaces monitored
to detect a link failure.
10 Refer to the Protocol Extension field to define the following:
Sync Group Select the option to assign a VRRP sync group to this VRRP ID’s group of virtual
IP addresses. This triggers VRRP fail over if an advertisement is not received from
the virtual masters that are part of this VRRP sync group. This setting is disabled
b y default.
Network Monitoring: Select wwan1, pppoe1 and VLAN ID(s) as needed to extend VRRP monitoring to
Local Interface these local Access Point interfaces. Once selected, these interfaces can be
assigned an increasing or decreasing level or priority for virtual routing within the
VRRP group.
Network Monitoring: Assign the priority level for the selected local interfaces. Backup virtual routers
Critical Resource can increase or decrease their priority in case the critical resources connected to
the master router fail, and then transition to the master state themselves.
Additionally, the master virtual router can lower its priority if the critical resources
connected to it fails, so the backup can transition to the master state. This value
can only be set on the backup or master router resource, not both. Options
include None, increment-priority, decrement priority.
Network Monitoring: Select each critical resource needed for monitoring. The action specified in the
Critical Resource critical resource drop-down menu is applied to each selected critical resource.
Name
Network Monitoring: Use this setting to decrement the configured priority (by the set value) when the
Delta Priority monitored interface is down. When critical resource monitoring, the value is
incremented by the setting defined.
11 Select OK to save the changes made to the VRRP configuration. Select Reset to revert to the last saved
configuration.
Critical resources can be monitored directly through the interfaces on which they’re discovered. For example, a
critical resource on the same subnet as the access point can be monitored by its IP address. However, a critical
resource located on a VLAN must continue to monitored on that VLAN.
Critical resource can be configured for Access Points and wireless controllers using their respective profiles.
The screen lists the destination IP addresses or interfaces (VLAN, WWAN, or PPPoE) used for critical resource
connection. IP addresses can be monitored directly by the controller, service platform or Access Point whereas a
VLAN, WWAN or PPPoE must be monitored behind an interface.
5 The Critical Resource Name table displays the name of the resource(s) configured on this device.
6 Click the Add button at the bottom of the screen to add a new critical resource and connection method, or
select an existing resource and select Edit to update the resource’s configuration. If adding a new critical
resource, assign it a name up to 32 characters.
Mode Set the ping mode used when the availability of a critical resource is validated.
Select from:
arp-only – Use the Address Resolution Protocol (ARP) for only pinging the critical
resource. ARP is used to resolve hardware addresses when only the network layer
address is known.
arp-and-ping – Use both ARP and Internet Control Message Protocol (ICMP) for
pining the critical resource and sending control messages (device not reachable,
requested service not available, etc.).
Port Define the interface on which to monitor critical resource. This field lists the
available hardware interfaces. This option is only available if the selected mode is
ARP Only.
VLAN Define the VLAN on which the critical resource is available using the spinner
control.
13 Select the Monitor Interval tab.
Set Monitor Interval as the duration between two successive pings to the critical resource. Define this value in
seconds from 5 - 86,400. The default setting is 30 seconds.
14 Set the Source IP for Port-Limited Monitoring to define the IP address used as the source address in ARP
packets used to detect a critical resource on a layer 2 interface. Generally, the source address 0.0.0.0 is used in
the APR packets used to detect critical resources. However, some devices do not support the above IP address
and drop the ARP packets. Use this field to provide an IP address specifically used for this purpose. The IP
address used for Port-Limited Monitoring must be different from the IP address configured on the device.
15 Set the Monitoring Retries before Marking Resource as DOWN for the number of retry connection attempts (1 -
10) permitted before this device connection is defined as down (offline). The default setting is three connection
attempts.
16 Select OK to save the changes to the critical resource configuration and monitor interval. Select Reset to revert
to the last saved configuration.
NOTE: A blue override icon (to the left of a parameter) defines the parameter as
having an override applied. To remove an override go to the Basic Configuration
section of the device and click the Clear Overrides button. This removes all
overrides from the device.
NOTE: A blue override icon (to the left of a parameter) defines the parameter as
having an override applied. To remove an override go to the Basic Configuration
section of the device and click the Clear Overrides button. This removes all
overrides from the device.
5 Refer to the Captive Portal Hosting field to set or override the guest access configuration (captive portal) for
this profile.
A captive portal is an access policy for providing guests temporary and restrictive access to the wireless
network.
A captive portal configuration provides secure authenticated controller or service platform access using a
standard Web browser. Hotspots provides authenticated access by capturing and re-directing a wireless user's
Web browser session to a captive portal login page where the user must enter valid credentials to access to
the wireless network. Once logged into the captive portal additional Agreement, Welcome and Fail pages
provide the administrator with a number of options on the hotspot’s screen flow and user appearance.
Either select an existing captive portal policy, use the default captive portal policy or select the Create link to
create a new configuration that can be applied to this profile. For more information, see Configuring Captive
Portal Policies on page 11-1.
6 Use the RADIUS Server Application Policy drop-down menu to select an application policy to authenticate users
and authorize access to the network. A RADIUS policy provides the centralized management of authentication
data (usernames and passwords). When an client attempts to associate, the controller or service platform sends
the authentication request to the RADIUS server.
If an existing RADIUS server policy does not meet your requirements, select the Create link to create a new
policy.
7 Use the DHCP Server Policy drop-down menu assign this profile a DHCP server policy. If an existing DHCP
policy does not meet the profile’s requirements, select the Create icon to create a new policy configuration that
can be applied to this profile or the Edit icon to modify the parameters of an existing DHCP Server policy.
Dynamic Host Configuration Protocol (DHCP) allows hosts on an IP network to request and be assigned IP
addresses as well as discover information about the network where they reside. Each subnet can be configured
with its own address pool. Whenever a DHCP client requests an IP address, the DHCP server assigns an IP
address from that subnet’s address pool. When the onboard DHCP server allocates an address for a DHCP
client, the client is assigned a lease, which expires after an pre-determined interval. Before a lease expires,
wireless clients (to which leases are assigned) are expected to renew them to continue to use the addresses.
Once the lease expires, the client is no longer permitted to use the leased IP address. The profile’s DHCP server
policy ensures all IP addresses are unique, and no IP address is assigned to a second client while the first
client's assignment is valid (its lease has not expired).
8 Use the DHCPv6 Server Policy drop-down menu assign this profile a DHCPv6 server policy. If an existing DHCP
policy for IPv6 does not meet the profile’s requirements, select the Create icon to create a new policy
configuration that can be applied to this profile or the Edit icon to modify the parameters of an existing DHCP
Server policy.
DHCPv6 is a networking protocol for configuring IPv6 hosts with IP addresses, IP prefixes or other
configuration attributes required on an IPv6 network. DHCP in IPv6 works in with IPv6 router discovery. With
the proper RA flags, DHCPv6 works like DHCP for IPv4. The central difference is the way a device identifies
itself if assigning addresses manually instead of selecting addresses dynamically from a pool.
For more information, see Configuring a Captive Portal Policy on page 11-2.
9 Use the Guest Management Policy drop-down menu to select an existing Guest Management policy to use as a
mechanism to manage guest users with this profile.
10 Use the RADIUS Server Policy drop-down menu to select an existing RADIUS server policy to use as a user
validation security mechanism with this profile.
A profile can have its own unique RADIUS server policy to authenticate users and authorize access to the
network. A profile’s RADIUS policy provides the centralized management of controller or service platform
authentication data (usernames and passwords). When an client attempts to associate, an authentication
request is sent to the RADIUS server.For more information, see Configuring RADIUS Server Policies on page 11-
57.
11 Set Bonjour Gateway settings. Bonjour is Apple’s implementation of zero-configuration networking (Zeroconf).
Zeroconf is a group of technologies that include service discovery, address assignment and hostname
resolution. Bonjour locates devices such as printers, other computers and services that these computers offer
over a local network.
Bonjour provides a general method to discover services on a local area network (LAN). It allows users to set up
a network without any configuration. Services such as printers, scanners and file-sharing servers can be found
using Bonjour. Bonjour only works within a single broadcast domain. However, with special DNS configuration,
it can be extended to find services across broadcast domains.
12 From the Forwarding Policy drop-down, select the Bonjour Gateway forwarding policy. n.
13 Select OK to save the changes or overrides made to the profile’s services configuration. Select Reset to revert
to the last saved configuration.
Additionally, an administrator can define a profile with unique configuration file and device firmware upgrade
support. In a clustered environment, these operations can be performed on one controller or service platform, then
propagated to each member of the cluster and onwards to devices managed by each cluster member.
NOTE: A blue override icon (to the left of a parameter) defines the parameter as
having an override applied. To remove an override go to the Basic Configuration
section of the device and click the Clear Overrides button. This removes all
overrides from the device.
NOTE: A blue override icon (to the left of a parameter) defines the parameter as
having an override applied. To remove an override go to the Basic Configuration
section of the device and click the Clear Overrides button. This removes all
overrides from the device.
5 Refer to the Management Policy field to set or override a management configuration for this profile. A default
management policy is also available if no existing policies are usable.
Use the drop-down menu to select an existing management policy to apply to this profile. If no management
policies exist meeting the data access requirements of this profile, select the Create icon to access screens
used to define administration, access control and SNMP configurations. Select an existing policy and select the
Edit icon to modify the configuration of an existing management policy. For more information, see Viewing
Management Access Policies on page 12-1.
6 Refer to the Message Logging field to define how the profile logs system events. It’s important to log individual
events to discern an overall pattern potentially impacting performance.
Enable Message Select this option to enable the profile to log system events to a log file or a
Logging syslog server. Selecting this check box enables the rest of the parameters
required to define the profile’s logging configuration. This option is disabled by
default.
Remote Logging Host Use this table to define numerical (non DNS) IP addresses for up to three
external resources where logged system events can be sent on behalf of the
profile. Select the Delete icon as needed to remove an IP address.
Facility to Send Log Use the drop-down menu to specify the local server (if used) for profile event
Messages log transfers.
Syslog Logging Level Event severity coincides with the syslog logging level defined for the profile.
Assign a numeric identifier to log events based on criticality. Severity levels
include 0 - Emergency, 1 - Alert, 2 - Critical, 3 - Errors, 4 - Warning, 5 - Notice,
6 - Info and 7 - Debug. The default logging level is 4.
Console Logging Level Event severity coincides with the syslog logging level defined for the profile.
Assign a numeric identifier to log events based on criticality. Severity levels
include 0 - Emergency, 1 - Alert, 2 - Critical, 3 - Errors, 4 - Warning, 5 - Notice,
6 - Info and 7 - Debug. The default logging level is 4.
Buffered Logging Level Event severity coincides with the syslog logging level defined for the profile.
Assign a numeric identifier to log events based on criticality. Severity levels
include 0 - Emergency, 1 - Alert, 2 - Critical, 3 - Errors, 4 - Warning, 5 - Notice,
6 - Info and 7 - Debug. The default logging level is 4.
Time to Aggregate Define the increment (or interval) system events are logged on behalf of the
Repeated Messages profile. The shorter the interval, the sooner the event is logged. Either define
an interval in Seconds
(0 - 60) or Minutes (0 -1). The default value is 0 seconds.
Forward Logs to Select the check box to define a log level for forwarding event logs. Log levels
Controller include Emergency, Alert, Critical, Error, Warning, Notice, Info and Debug. The
default logging level is Error.
7 Refer to the System Event Messages section to define or override how controller or service platform system
messages are logged and forwarded on behalf of the profile.
Event System Policy Select an Event System Policy from the drop-down menu. If an appropriate
policy does not exist, select the Create button to make a new policy.
Enable System Events Select the Enable System Events check box to allow the profile to capture
system events and append them to a log file. It’s important to log individual
events to discern an overall pattern that may be negatively impacting
controller or service platform performance. This setting is enabled by default.
Enable System Event Select the Enable System Event Forwarding radio button to forward system
Forwarding events to another controller, service platform or cluster member. This setting is
enabled by default.
8 Refer to the Events E-mail Notification section to define or override how system event notification Emails are
sent.
SMTP Server Specify either the Hostname or IP Address of the outgoing SMTP server where
notification Emails are originated. Hostnames cannot include an underscore
character.
Port of SMTP If a non-standard SMTP port is used on the outgoing SMTP server, select this
option and specify a port from 1 - 65,535 for the outgoing SMTP server to use.
Sender E-mail Address Specify the Email address from which notification Email is originated. This is
the from address on notification Email.
Recipient’s E-mail Specify up to 6 Email addresses to be the recipient’s of event Email
Address notifications.
Username for SMTP Specify the sender username on the outgoing SMTP server. Many SMTP
Server servers require users to authenticate with a username and password before
sending Email through the server.
Password for SMTP Specify the password associated with the username of the sender on the
Server outgoing SMTP server. Many SMTP servers require users to authenticate with a
username and password before sending Email through the server.
9 Refer to the Persist Configurations Across Reloads section to define or override how configuration settings are
handled after reloads.
Configure Use the drop-down menu to configure whether configuration overrides should
persist when the device configuration is reloaded. Available options are
Enabled, Disabled and Secure.
10 Refer to the HTTP Analytics field to define analytic compression settings and update intervals.
Compress Select this option to use compression to when sending updates to the
controller. This option is disabled by default.
Update Interval Define an interval in either Seconds (1 - 3,600), Minutes (1 - 60) or Hours (1) for
interval to push buffered packets. The default setting in 1 minute.
11 Refer to the External Analytics Engine section to define or override analytics engine login information for an
external host.
The Guest Access & Analytics software module is a site-wide Enterprise License available only on service
platforms. When a customer visits a store, they connect to the Wireless LAN via guest access using a mobile
device. The user needs to authenticate only on their first visit, and will automatically connect to the network for
subsequent visits. The Analytics module helps gather data about customer behavior such as web sites visited,
search terms used, mobile device types, number of new users vs. repeat users. This data provides a better
understanding of pricing strategies and promotions being run by competitors. The data can be exported for
additional in-depth analysis.
Controller Select this option to provide service platform analytics to a local device. This
setting is enabled by default.
URL When using an external analytics engine with a NX9000 series service
platform, enter the IP address or uniform resource locator (URL) for the
system providing external analytics functions.
User Name Enter the user name needed to access the external analytics engine.
Password Enter the password associated with the username on the external analytics
engine.
Update Interval Set the interval in either Seconds (1 - 3,600), Minutes (1 - 60) or Hours (1) to
forward buffered information to an external server resource, even when the
buffers are not full. The default setting in 1 minute.
12 Select OK to save the changes and overrides made to the profile’s Management Settings. Select Reset to revert
to the last saved configuration.
13 Select Firmware from the Management menu.
14 Refer to the Auto Install via DHCP Option field to configure automatic configuration file and firmware updates.
Enable Configuration Select Enable Configuration Update (from within the Automatic Configuration
Update Update field) to enable automatic profile configuration file updates from an
external location.
If enabled (the setting is disabled by default), provide a complete path to the
target configuration file used in the update.
Enable Firmware Select this option to enable automatic firmware upgrades (for this profile)
Update from a user defined remote location. This value is disabled by default.
Start Time (minutes) Use the spinner control to set the number of minutes to delay the start of an
auto upgrade operation. Stagger the start of an upgrade operation as needed
in respect to allowing an Access Point to complete its current client support
activity before being rendered offline during the update operation. The default
setting is 10 minutes.
15 Refer to the parameters within the Legacy Device Firmware Management field to set legacy Access Point
firmware provisions:
Migration Firmware Provide a path to a firmware image used to provision AP71xx model Access
from AP71xx 4.x path Points currently utilizing a 4.x version legacy firmware file. Once a valid path is
provided, the update is enabled to the version maintained locally for AP71xx
models.
Legacy AP650 Auto Select this option to provision AP650 model Access Points from their legacy
Update firmware versions to the version maintained locally for that model. This setting
is enabled by default, making updates to AP650 models automatic if a newer
AP650 image is maintained locally.
16 Use the parameters within the Automatic Adopted AP Firmware Upgrade section to define an automatic
firmware upgrade from a local file.
Enable Controller Select the device model to upgrade using the most recent firmware file on the
Upgrade of Device controller, service platform or Virtual Controller AP. This parameter is enabled
Firmware by default. Select All to update all the listed device types
Number of Concurrent Use the spinner control to define the maximum number (1 - 128) of adopted
Upgrades APs that can receive a firmware upgrade at the same time. The default value is
10. Keep in mind that during a firmware upgrade, the Access Point is offline
and unable to perform its normal client support role until the upgrade process
is complete.
17 Select the Persist AP Images on Controller button (from within the Firmware Persistence for Adopted Devices
field) to enable the RF domain manager to retain and store the new image of an Access Point selected for a
firmware update. The image is only stored on the RF domain manager when there’s space to accommodate it.
The upgrade sequence is different depending on whether the designated RF domain manager is a controller/
service platform or Access Point.
• When the RF domain manager is an Access Point - The NOC uploads a provisions an Access Point model’s
firmware on to the Access Point RF domain manager. The NOC initiates an auto-update for Access Points
using that model’s firmware. If the Persist Image on Controller option is selected, the RF domain manager
retains the image for that model. The NOC then provisions the firmware of the next Access Point type to the
RF domain manager. The auto-update process is then repeated for that model. Once all the selected models
have been updated, the RF domain manager’s model is updated last.
• When the RF domain manager is a controller or service platform - The NOC adopts controllers to the NOC’s
cluster within its RF domain. The NOC triggers an update on active controllers or service platforms and
reboots them as soon as the update is complete. As soon as the active nodes come back up, the NOC
triggers an update on standby controllers or service platforms and reboots them as soon as the update is
complete. When the standby controllers or service platforms come back up the following conditions apply:
- If the reboot is not scheduled - The Access Points adopted to RF domain members are not updated. It’s
expected the controllers and service platforms have auto-upgrade enabled which will update the Access
Points when re-adopted.
- If the reboot is scheduled - The NOC pushes the first Access Point model’s firmware to the RF domain
manager. The NOC initiates an Access Point upgrade on all Access Points on the RF domain manager for that
model. If the Persist Image on Controller option is selected, the RF domain manager retains the image for
that model. The NOC then provisions the firmware of the next Access Point type to the RF domain manager.
This process is repeated until each selected Access Point model is updated.
The Firmware Persistence feature is enabled for all controller and service platform RF domain managers with
the flash memory capacity to store firmware images for the selected Access Point models they provision. This
feature is disabled for Access Point RF Domain managers that do not typically have the flash memory capacity
needed.
18 Select Heartbeat from the Management menu. Select the Service Watchdog option to implement heartbeat
messages to ensure associated devices are up and running and capable of effectively interoperating. The
Service Watchdog is enabled by default.
19 Select OK to save the changes and overrides made to the profile’s configuration. Select Reset to revert to the
last saved configuration.
NOTE: When using 4.9GHz, the root preferences selection for the radio’s preferred
interface still displays as 5GHz.
Figure 5-145 Mesh Point Auto Channel Selection - Dynamic Root Selection screen
The Dynamic Root Selection screen displays by default. The Dynamic Root Selection screen provides
configuration for the 2.4 GHz and 5.0/4.9 GHz frequencies.
9 Refer to the following. These descriptions are common for configuring either the 2.4 GHZ and 5.0/4.9 GHz
frequencies
Channel Width Set the channel width the meshpoint’s automatic channel scan assigns to the
selected radio. Available options include:
• Automatic – Defines the channel width is calculated automatically. This is the
default value.
• 20 MHz – Sets the width between two adjacent channels as 20 MHz.
• 40 MHz – Sets the width between two adjacent channels as 40 MHz.
• 80 MHz – Utilized for 802.11ac Access Points in the 5 GHz frequency.
Priority Meshpoint Configure the meshpoint monitored for automatic channel scans. This is the
meshpoint assigned priority over other available mesh points. When
configured, a mesh connection is established with this mesh point. If not
configured, a meshpoint is automatically selected. This setting is disabled by
default.
Off-channel Duration Set the duration (from 20 - 250 milliseconds) the scan dwells on each channel
when performing an off channel scan. The default is 50 milliseconds.
Off-channel Scan Set the duration (from 1- 60 seconds) between two consecutive off channel
Frequency scans. The default is 6 seconds.
Meshpoint Root: Sample Configure the number of scan samples (from 1- 10) for data collection before a
Count mesh channel is selected. The default is 5.
Meshpoint Root: Channel Configure the duration (from 0 - 1440 minutes) to remain on a channel before
Hold Time channel conditions are reassessed for a possible channel change. Set this
value to zero (0) to prevent an automatic channel selection from occurring.
The default setting is 30 minutes.
10 Select the Path Method SNR tab to configure signal to noise (SNR) ratio values when selecting the path to the
meshpoint root.
Figure 5-146 Mesh Point Auto Channel Selection - Path Method SNR screen
11 Set the following 2.4 GHz and 5.0/4.9 GHz path method SNR data:
Channel Width Set the channel width the meshpoint automatic channel scan assigns to the
selected radio. Available options include:
• Automatic – Defines the channel width calculation automatically. This is the
default value.
• 20 MHz – Sets the width between two adjacent channels as 20 MHz.
• 40 MHz – Sets the width between two adjacent channels as 40 MHz.
• 80 MHz – Utilized for 802.11ac Access Points in the 5 GHz frequency.
Priority Meshpoint Set the meshpoint monitored for automatic channel scans. This is the
meshpoint assigned priority over other available mesh points. When
configured, a mesh connection is established with this mesh point. If not
configured, a meshpoint is automatically selected. This setting is disabled by
default.
SNR Delta Set the signal to noise (SNR) ratio delta (from 1 - 100 dB) for mesh path
selections.
When path selection occurs, the defined value is utilized for selecting the
optimal path. A better candidate, on a different channel, must have a signal
strength that exceeds this delta value when compared to the signal strength
of the next hop in the mesh network. The default setting is 5 dB.
SNR Threshold Set the SNR threshold for mesh path selections (from -100 to 0 dB).
If the signal strength of the next mesh hop falls below this set value, a scan is
triggered to select a better next hop. the default setting is -65 dB.
Off-channel Duration Configure the duration (from 20 - 250 milliseconds) for scan dwells on each
channel, when performing an off channel scan. The default setting is 50
milliseconds.
12 Select the Path Method Root Path Metric tab to calculate root path metrics.
Figure 5-147 Mesh Point Auto Channel Selection - Root Path Metric screen
13 Set the following Path Method Root Path Metrics (applying to both the 2.4 GHz and 5.0/4.9 GHz frequencies):
Channel Width Set the channel width meshpoint automatic channel scan should assign to the
selected radio. The available options are:
• Automatic – Defines the channel width as calculated automatically. This is the
default value.
• 20 MHz – Set the width between two adjacent channels as 20 MHz.
• 40 MHz – Set the width between two adjacent channels as 40 MHz
• 80 MHz – Utilized for 802.11ac Access Points in the 5 GHz frequency.
Priority Meshpoint Define the meshpoint assigned priority over other available mesh points.
When configured, a mesh connection is established with this mesh point. If
not configured, a meshpoint is automatically selected.
Meshpoint: Path Set the minimum path metric (from 100 - 20,000) for mesh connection
Minimum establishment. The default setting is 1000.
Meshpoint: Path Metric Configure a minimum threshold (from 800 - 65535) for triggering an
Threshold automatic channel selection for meshpoint selection. The default is 1500.
Meshpoint: Tolerance Configure a duration to wait before triggering an automatic channel selection
Period for the next mesh hop. The default is one minute.
Meshpoint Root: Sample Set the number of scans (from 1- 10) for data collection before a mesh point
Count root is selected. The default is 5.
Meshpoint Root: Configure the duration in the range of 20 - 250 milliseconds for the Off
Off-channel Duration Channel Duration field. This is the duration the scan dwells on each channel
when performing an off channel scan. The default is 50 milliseconds.
Meshpoint Root: Configure the delta (from 5 - 35 dBm) that triggers a meshpoint root
Channel Switch Delta automatic channel selection when exceeded. The default is 10 dBm.
Meshpoint Root: Configure the duration (from 1 -60 seconds) between two consecutive off
Off-channel Scan channel scans for meshpoint root. The default is 6 seconds.
Frequency
Meshpoint Root: Set the minimum duration (from 0 - 1440 minutes) to remain on a selected
Channel Hold Time channel before channel conditions are reassessed for a possible channel
change. Set this value to zero (0) to prevent an automatic channel selection
from occurring. The default is 30 minutes.
14 Select OK to save the updates or overrides to the Mesh Point configuration. Select Reset to revert to the last
saved configuration.
5.2.9.13.7 Vehicle Mounted Modem (VMM) Deployment Considerations
Before defining a VMM configuration (mounting an AP7161 mesh point on a moving vehicle), refer to the following
deployment guidelines to ensure the configuration is optimally effective:
• Disable layer 2 stateful packet inspection from the firewall policy. For more information, see Firewall Policy
Advanced Settings on page 10-10.
• Set the RTS threshold value to 1 on all mesh devices. The default is 2347. For more information on defining radio
settings, refer to Access Point Radio Configuration on page 8-55.
• Use Opportunistic as the rate selection setting for the AP7161 radio. The default is Standard. For more
information on defining this setting, see Radio Override Configuration.
• Disable Dynamic Chain Selection (radio setting). The default is enabled. This setting can be disabled in the CLI
using the dynamic-chain-selection command, or in the UI (refer to Radio Override Configuration).
• Disable A-MPDU Aggregation if the intended vehicular speed is greater than 30 mph. For more information, see
Radio Override Configuration.
• Set a misconfiguration recovery time for the non-root AP profile. This configuration should delay the rejection
of the newest configuration push from the controller, potentially causing adoption loss.
The additional delay is to support cases when the new configuration from the controller causes the root AP to
move from current channel to other channels, resulting in a mesh link going down, and in turn non-root APs
losing adoption. This delay accommodates the time needed for the non-root AP to scan all channels and
finding the best root node. The non-root AP can begin operating on the new channel, and establish the mesh
link re-adopt to the controller. (For countries using DFS, the scan time is also factored in for the configured
value). If the AP fails to find a suitable root node within this time, this new config is a misconfigured and the
device would reject the latest config.
For outdoor APs, it is recommended the misconfiguration-recovery-time be disabled. This can be accomplished
by setting the value to 0. Update non root ap71xx profiles on the controller to include this change.
Using an appropriate console terminal and or connection to your device log on to the CLI and follow these
steps:
rfs6000-xxxxxx>enable
rfs6000-xxxxxx #configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
rfs6000-xxxxxx (config)#profile ap71xx Non-Root-AP71xx
rfs6000-xxxxxx (config-profile-Non-Root-AP71xx)#misconfiguration-recovery-time
0
rfs6000-xxxxxx (config-profile-Non-Root-AP71xx)#
To set or override an environmental sensor configuration for an AP8132 model Access Point:
1 Select the Configuration > Devices from the Web UI.
2 Select Profile Overrides to expand its menu items
3 Select Environmental Sensor.
10 Enable Balance AP Loads (within the AP Load Balancing field) to distribute client traffic evenly amongst
neighbor Access Points.
11 Set the following Advanced Parameters for client load balancing:
Max. 2.4 GHz Difference Set the maximum load difference (from 1 - 100%) considered equal when
Considered Equal comparing 2.4 GHz client loads. The default setting is 1%.
Min. Value to Trigger Set the threshold (from 1 - 100%) beyond which channel load balancing is
2.4 Ghz Channel triggered in the 2.4 GHz radio band. The default setting is 5%.
Balancing
Weightage given to Set the weightage (from 1- 100%) applied to client count calculations in the 2.4
Client Count GHz radio band. The default setting is 90%.
Weightage given to Set the weightage (from 1- 100%) applied to client throughput calculations in
Throughput the 2.4 GHz radio band. The default setting is 10%.
Max. 5 GHz Difference Set the maximum load difference (from 1 - 100%) considered equal when
Considered Equal comparing 5 GHz client loads. The default setting is 1%.
Min. Value to Trigger 5 Set the threshold (from 1 - 100%) beyond which channel load balancing is
Ghz Channel Balancing triggered in the 5 GHz radio band. The default setting is 5%.
Weightage given to Set the weightage (from 1- 100%) applied to client count calculations in the 5
Client Count GHz radio band. The default setting is 90%.
Weightage given to Set the weightage (from 1- 100%) applied to client throughput calculations in
Throughput the 5 GHz radio band. The default setting is 10%.
12 Define the following AP Load Balancing settings:
Min. Value to Trigger Set a value (from 1 - 100%) used to trigger client load balancing when
Balancing exceeded. The default setting is 5%.
Max. AP Load Set the maximum load balance differential (from 1 - 100%) considered equal
Difference Considered when comparing neighbor Access Point client loads. The default setting is 1%.
Equal
Weightage given to Set the weightage (from 1- 100%) applied to client count in an Access Point’s
Client Count overall load calculation. The default setting is 90%.
Weightage given to Set the weightage (from 1- 100%) applied to client throughput in an Access
Throughout Point’s overall load calculation. The default setting is 10%.
13 Set the following Band Control values:
Max. Band Load Set the maximum load difference (from 1 - 100%) considered equal when
Difference Considered comparing band loads. The default setting is 1%.
Equal
Band Ratio (2.4 GHz) Set the relative load for the 2.4 GHz radio band as a leveled ratio from 1 - 10.
The default setting is 0.
Band Ratio (5 GHz) Set the relative load for the 5 GHz radio band as a leveled ratio from 1 - 10. The
default setting is 0.
5 GHz load at which Define the 5 GHz radio load value (from 1 - 100%) above which the 5 GHz radio
both bands enabled is equally preferred in the overall load balance distribution. The default is 75%.
2.4 GHz load at which Define the 2.4 GHz radio load value (from 1 - 100%) above which the 2.4 GHz
both bands enabled radio is equally preferred in the overall load balance distribution. The default is
75%.
The security context contains the transient keys used for encryption and authentication. A secure network requires
users to know about certificates and PKI. However, administrators do not need to define security parameters for
Access Points to be adopted (secure WISPe being an exception, but that isn’t a commonly used feature). Also,
users can replace any device on the network or move devices around and they continue to work. Default security
parameters for MiNT are such that these scenarios continue to function as expected, with minimal user
intervention required only when a new network is deployed
MLCP VLAN Check this box to enable MLCP by VLAN. MLCP is used to create one VLAN
link from the device to a neighbor. That neighboring device does not need to
be a controller or service platform, it can be another Access Point with a path
to the controller or service platform. This setting is enabled by default.
Tunnel MiNT across Select this option to tunnel MiNT protocol packets across an extended VLAN.
extended VLAN This setting is disabled by default.
9 Select Tunnel Controller Load Balancing (Level 1) to enable load balance distribution via a WLAN tunnel
controller. This setting is disabled by default.
10 Select Inter Tunnel Bridging (Level 2) to enable inter tunnel bridging. This setting is disabled by default.
11 Enter a 64 character maximum Tunnel Controller Name for this tunneled-WLAN-controller interface.
12 Enter a 64 character maximum Preferred Tunnel Controller Name this Access Point prefers to tunnel traffic to
via an extended VLAN.
13 Select OK to save the updates and overrides to the MINT Protocol configuration. Select Reset to revert to the
last saved configuration.
14 Select the IP tab to display the link IP network address information shared by the devices managed by the
MINT configuration.
17 Select OK to save the updates and overrides to the MINT Protocol’s network address configuration. Select Reset
to revert to the last saved configuration.
18 Select the VLAN tab to display link IP VLAN information shared by the devices managed by the MINT
configuration.
Max Burst Size Use the spinner to set the maximum burst size from 0 - 1024 kb. The smaller the
burst, the less likely the upstream packet transmission will result in congestion for
the WLAN’s client destinations. By trending the typical number of ARP, broadcast,
multicast and unknown unicast packets over a period of time, the average rate for
each access category can be obtained. Once a baseline is obtained, administrators
should add a 10% margin (minimally) to allow for traffic bursts. The default burst
size is 320 kbytes.
Background Configures the random early detection threshold (as a percentage) for low priority
background traffic. Background packets are dropped and a log message
generated if the rate exceeds the set value. Background traffic consumes the least
bandwidth of any access category, so this value can be set to a lower value once a
general upstream rate is known by the network administrator (using a time trend
analysis). The default setting
is 50%.
Best-Effort Configures the random early detection threshold (as a percentage) for low priority
best-effort traffic. Best-effort packets are dropped and a log message generated if
the rate exceeds the set value. Best effort traffic consumes little bandwidth, so
this value can be set to a lower value once a general upstream rate is known by
the network administrator (using a time trend analysis).The default setting is 50%.
Video Configures the random early detection threshold (as a percentage) for high
priority video traffic. Video packets are dropped and a log message generated if
the rate exceeds the set value. Video traffic consumes significant bandwidth, so
this value can be set to a higher value once a general upstream rate is known by
the network administrator (using a time trend analysis).The default setting is 25%.
Voice Configures the random early detection threshold (as a percentage) for high
priority voice traffic. Voice packets are dropped and a log message generated if
the rate exceeds the set value. Voice applications consume significant bandwidth,
so this value can be set to a higher value once a general upstream rate is known
by the network administrator (using a time trend analysis).The default setting is
0%.
24 Select OK to save the updates and overrides to the MINT Protocol’s rate limit configuration. Select Reset to
revert to the last saved configuration.
5.2.9.15.10 Advanced Profile Miscellaneous Configuration
Overriding a Profile’s Advanced Configuration
Refer to the advanced profile’s Miscellaneous menu item to set or override a profile’s NAS configuration. The
profile database on the RADIUS server consists of user profiles for each connected network access server (NAS)
port. Each profile is matched to a username representing a physical port. When the wireless controller authorizes
users, it queries the user profile database using a username representative of the physical NAS port making the
connection. Access Point LED behavior and RF Domain management can also be defined from within the
Miscellaneous screen.
1 Select the Configuration > Devices from the Web UI.
2 Select Profile Overrides to expand its menu items
3 Select Advanced to expand its sub menu items.
4 Select Miscellaneous from the Advanced menu item.
When a client requests access to a CISCO ISE RADIUS server supported network, the server presents the client
with a URL where a device’s compliance is checked for definition file validity (this form of file validity checking
is called posture). If the client device complies, it is allowed access to the network.
14 Enable Bluetooth Detection to scan for Bluetooth devices over the WiNG managed 2.4 GHz Access Point radio.
Bluetooth is a technology for exchanging data over short distances using short-wavelength UHF radio waves in
the 2.4 GHz band from mobile wireless clients.
15 Select OK to save the changes made to the profile’s Advanced Miscellaneous configuration. Select Reset to
revert to the last saved configuration.
Once created an auto provisioning policy can be used in profiles or device configuration objects. An auto
provisioning policy contains a set of ordered by precedence rules that either deny or allow adoption based on
potential adoptee properties and a catch-all variable that determines if the adoption should be allowed when none
of the rules is matched. All rules (both deny and allow) are evaluated sequentially starting with the rule with the
lowest precedence. The evaluation stops as soon as a rule has been matched, no attempt is made to find a better
match further down in the set.
The evaluation is performed using various matching criteria. The matching criteria supported include:
MAC Matches the MAC address of a device attempting to be adopted. Either a single
MAC address or a range of MAC addresses can be specified.
VLAN Matches when adoption over a Layer 2 link matches the VLAN ID of an adoption
request. Note that this is a VLAN ID as seen by the recipient of the request, in
case of multiple hops over different VLANs this may different from VLAN ID set
by the sender. A single VLAN ID is specified in the rule. This rule is ignored for
adoption attempts over Layer 3.
IP Address Matches when adoption is using a Layer 3 link matches the source IP address of
an adoption request. In case of NAT the IP address may be different from what
the sender has used. A single IP, IP range or IP/mask is specified in the rule. This
rule is ignored for adoption attempts over Layer 2.
Serial Number Matches exact serial number (case insensitive).
DHCP Option Matches the value found in DHCP vendor option 191 (case insensitive). DHCP
vendor option 191 can be setup to communicate various configuration parameters
to an AP. The value of the option in a string in the form of tag=value separated by
a semicolon, e.g.’tag1=value1;tag2=value2;tag3=value3’. The access point includes
the value of tag’rf-domain’, if present. This value is matched against the auto
provisioning policy.
FQDN Matches a substring to the FQDN of a device (case insensitive).
CDP Matches a substring in a list of CDP snoop strings (case insensitive). For example,
if an Access Point snooped 3 devices: controller1.extremenetworks.com,
controller2.extremenetworks.com and
controller3.extremenetworks.com,’controller1’,’extremenetworks’,
’extremenetworks.com’, are examples of the substrings that will match.
LLDP Matches a substring in a list of LLDP snoop strings (case insensitive). For
example, if an Access Point snooped 3 devices: controller1.extremenetworks.com,
controller2.extremenetworks.com and
controller3.extremenetworks.com,’controller1’, ’extremenetworks’,
’extremenetworks.com’, are substrings match.
Auto Provisioning is the process to discover controllers or service platforms available in the network, pick the most
desirable controller or service platform, establish an association, optionally obtain an image upgrade and obtain its
configuration.
At adoption, an Access Point solicits and receives multiple adoption responses from controllers and service
platforms available on the network. These adoption responses contain loading policy information the Access Point
uses to select the optimum controller or service platform for adoption. By default, an auto provisioning policy
generally distributes AP adoption evenly amongst available controller or service platform. Modify existing adoption
policies or create a new one as needed to meet the adoption requirements of a device and their assigned profile.
NOTE: A device configuration does not need to be present for an auto provisioning
policy to take effect. Once adopted, and the device’s configuration is defined and
applied by the controller or service platform, the auto provisioning policy mapping
does not have impact on subsequent adoptions by the same device.
An auto provisioning policy enables an administrator to define adoption rules an Access Point’s adoption by a
wireless controller.
Auto provisioning policies set the different restrictions on how an Access Point gets adopted to a wireless
controller.
To add a new Auto Provisioning Policy or edit an existing Auto-Provisioning Policy configuration:
1 From the Adoption screen, either select Add or select an existing Auto-Provisioning Policy and select Edit.
2 If adding a new Auto-Provisioning Policy, provide a name in the Auto-Provisioning Policy field. The name must
not exceed 32 characters. Select Continue to enable the remaining parameters of the Auto-Provisioning Policy
screen.
The Rules tab displays by default.
Match Type Lists the matching criteria used in the policy. This is like a filter and further refines
the APs that can be adopted. The Match Type can be one of the following:
MAC Address – The filter type is a MAC Address of the selected Access Point model.
IP Address – The filter type is the IP address of the selected Access Point model.
VLAN – The filter type is a VLAN.
Serial Number – The filter type is the serial number of the selected Access Point
model.
Model Number – The filter type is the Access Point model number.
DHCP Option – The filter type is the DHCP option value of the selected Access Point
model.
Argument 1 The number of arguments vary on the Match Type. This column lists the first
argument value. This value is not set as part of the rule creation or edit process.
Argument 2 The number of arguments vary on the Match Type. This column lists the second
argument value. This value is not set as part of the rule creation or edit process.
RF Domain Name Sets the name of the RF Domain to which the device is adopted automatically.
Select the Create icon to define a new RF Domain configuration or select the Edit
icon to revise an existing configuration.
Profile Name Defines the name of the profile used when the Auto Provisioning Policy is applied to
a device. Select the Create icon to define a new Profile configuration or the Edit icon
to revise an existing configuration. For more information, see General Profile
Configuration on page 8-5.
4 If a rule requires addition or modification, select either Add or Edit to define the required parameters using the
Rule screen.
Match Type Set the matching criteria used in the policy. This is like a filter and further refines Access
Points capable of adoption. The Match Type can be one of the following:
MAC Address – The filter type is a MAC Address of the selected Access Point model.
IP Address – The filter type is the IP address of the selected Access Point model.
VLAN – The filter type is a VLAN.
Serial Number – The filter type is the serial number of the selected Access Point model.
Model Number – The filter type is the Access Point model number.
DHCP Option – The filter type is the DHCP option value of the selected Access Point
model.
RF Domain Name Set the RF Domain to which the device is adopted automatically. Select the Create icon
to define a new RF Domain configuration or select the Edit icon to revise an existing
configuration. For more information, see to General Profile Configuration on page 8-5.
Profile Name Define the profile used when an Auto Provisioning Policy is applied to a device. Select
the Create icon to define a new Profile configuration or select the Edit icon to revise an
existing configuration. For more information, see General Profile Configuration on page
8-5.
Area Enter a 64 character maximum deployment area name assigned to this policy.
Floor Enter a 32 character maximum deployment floor name assigned to this policy.
1st Controller When redirect is selected as the operation, provide a 1st choice steering controller
Hostname or IP Address and port to forward network credentials for a controller resource
to initiate the provisioning process.
2nd Controller When redirect is selected as the operation, provide a 2nd choice steering controller
Hostname or IP Address and port to forward network credentials for a controller resource
to initiate the provisioning process.
Routing Level When redirect is selected as the operation, specify the routing level as 1 or 2.
6 Select OK to save the updates and overrides to the Auto-Provisioning policy rule configuration. Select Reset to
revert to the last saved configuration.
7 Select the Default tab to define the Auto Provisioning Policy’s rule matching adoption configuration.
When initially displayed, the Event Policy screen lists interfaces. Existing policies can have their event notification
configurations modified as device profile requirements warrant.
1 Select Configuration > Devices > MINT Policy to display the MINT Policy screen.
A Wireless Local Area Network (WLAN) is a data-communications system and wireless local area network that
flexibly extends the functionalities of a wired LAN. A WLAN links two or more computers or devices using spread-
spectrum or OFDM modulation based technology. A WLAN does not require lining up devices for line-of-sight
transmission, and are thus, desirable for wireless networking. Roaming users can be handed off from one wireless
controller connected Access Point to another, like a cellular phone system. WLANs can therefore be configured
around the needs of specific user groups, even when they are not in physical proximity.
WLANs can be used to provide an abundance of services, including data communications (allowing mobile devices
to access applications), E-mail, file and print services or even specialty applications (such as guest access control
and asset tracking).
Each wireless controller WLAN configuration contains encryption, authentication and QoS policies and conditions
for user connections. Connected Access Point radios transmit periodic beacons for each BSS. A beacon advertises
the SSID, security requirements, supported data rates of the wireless network to enable clients to locate and
connect to the WLAN.
WLANs are mapped to radios on each connected Access Point. A WLAN can be advertised from a single Access
Point radio or can span multiple Access Points and radios. WLAN configurations can be defined to only provided
service to specific areas of a site. For example a guest access WLAN may only be mapped to a 2.4GHz radio in a
lobby or conference room providing limited coverage while a data WLAN is mapped to all 2.4GHz and 5GHz radios
at the branch site providing complete coverage.
RFS4000 and RFS6000 series wireless controllers support a maximum of 32 WLANs. The NX7500 service
platforms support up to 256 WLANs. NX9000 series service platforms support up to 1000 WLANs.
These policies can be separately selected within the Configuration > Wireless pane located in top, left-hand, side of
the UI.
To review the attributes of existing WLANs and, if necessary, modify their configurations:
1 Select Configuration > Wireless > Wireless LANs to display a high-level display of the existing WLANs.
2 Refer to the following (read only) information to assess the attributes of the each WLAN available to the
wireless controller:
WLAN Displays the name of each available WLAN. Individual WLANs can
selected and their SSID and client management properties modified.
RFS4000 and RFS6000 series wireless controllers support a maximum
of 32 WLANs. The NX7500 service platforms support up to 256
WLANs. NX9000 series service platforms support up to 1000 WLANs.
SSID Displays the name of the SSID assigned to the WLAN when created or
last modified. Optionally, select a WLAN and click the Edit button to
update the WLAN’s SSID.
Description Displays the brief description set for each listed WLAN when it was
either created or modified.
WLAN Status Lists each WLAN’s current status as either Active or Shutdown. A
green check mark defines the WLAN as available to clients on all
radios where it has been mapped. A red “X” defines the WLAN as
shutdown, meaning even if the WLAN is mapped to radios, it’s not
available for clients to associate.
VLAN Pool Lists each WLAN’s current VLAN mapping. The wireless controller
permits mapping a WLAN to more than one VLANs. When a client
associates with a WLAN, the client is assigned a VLAN by load balance
distribution. The VLAN is picked from a pool assigned to the WLAN.
Keep in mind however, typical deployments only map a single VLAN to
a WLAN. The use of a pool is strictly optional.
Bridging Mode Displays the bridging mode used by each WLAN. Available bridging
modes are Local and Tunnel.
DHCP Option 82 DHCP Option 82 is commonly used in large enterprise deployments to
provide client physical attachment information. Option 82 is used in
distributed DHCP server/relay environments, where relays insert
additional information to identify the client’s point of attachment. A
red “X” defines DHCP option 82 as disabled, a green check means its
enabled.
DHCPv6 LDRA Lightweight DHCPv6 Relay Agent (LDRA) is used to insert relay-agent
options in DHCPv6 message exchanges that identify client-facing
interfaces. These relay agents are deployed to forward DHCPv6
messages between clients and servers when they are not on the same
IPv6 link. A red “X” indicates this WLAN acts as a DHCPv6 LDRA.
Authentication Type Displays the name of the authentication scheme this WLAN is using to
secure its client membership transmissions. None is listed if
authentication is not used within this WLAN. Refer to the Encryption
type column if no authentication is used to verify there is some sort of
data protection used with the WLAN or risk no protection at all.
Encryption Type Displays the name of the encryption scheme this WLAN is using to
secure its client membership transmissions. None is listed if encryption
is not used within this WLAN. Refer to the Authentication type column
if no encryption is used to verify there is some sort of data protection
used with the WLAN or risk using this WLAN with no protection at all.
QoS Policy Lists the QoS policy applied to each listed WLAN. A QoS policy needs
to be custom selected (or created) for each WLAN in respect to the
WLAN’s intended client traffic and the voice, video or normal data
traffic it supports.
Association ACL Lists the Association ACL policy applied to each listed WLAN. An
Association ACL is a policy-based Access Control List (ACL) that either
prevents or allows wireless clients from connecting to a WLAN. The
mapping of an Association ACL is strictly optional.
Use the sequential set of WLAN screens to define a unique configuration for each WLAN. Refer to the
following to set WLAN configurations:
• Basic WLAN Configuration
• Configuring WLAN Security
• Configuring WLAN Firewall Support
• Configuring Client Settings
• Configuring WLAN Accounting Settings
• Configuring WLAN Service Monitoring Settings
• Configuring Client Load Balancing Settings
• Configuring Advanced WLAN Settings
• Configuring Auto Shutdown Settings
QoS Policy Use the drop-down menu to assign an existing QoS policy to the
WLAN or select the Create icon to define a new QoS policy or select
the Edit icon to modify the configuration of the selected QoS Policy.
QoS helps ensure each WLAN receives a fair share of the overall
bandwidth, either equally or per the proportion configured. For
information on creating a QoS policy that can be applied to WLAN,
see Configuring WLAN QoS Policies.
Bridging Mode Use the drop-down menu to specify a bridging mode for the WLAN.
Available bridging policy modes are Local, Tunnel or
split-tunnel.
DHCP Option 82 Select this option to enable DHCP option 82. DHCP Option 82 provides
client physical attachment information. This setting is disabled by
default.
DHCPv6 LDRA Select this option to enable the DHCPv6 relay agent. The DHCPv6
LDRA (Lightweight DHCP Relay Agent) allows for DHCPv6 messages
to be transmitted on existing networks that do not currently support
IPv6 or DHCPv6.
Bonjour Gateway Select an existing Bonjour configuration to apply to the WLAN
Discovery Policy configuration. Bonjour provides a method to discover services on a
WLAN. Bonjour allows users to set up a network without any
configuration. Services such as printers, scanners and file-sharing
servers can be found using Bonjour. Bonjour only works within a single
broadcast domain. However, with a special DNS configuration, it can
be extended to find services across broadcast domains.
4 Refer to the Other Settings field to define broadcast behavior within this specific WLAN.
Broadcast SSID Select this check box to enable the wireless controller to broadcast
SSIDs within beacons. If a hacker tries to isolate and hack a client SSID
via a client, the ESSID will display since the ESSID is in the beacon.
This feature is enabled by default.
Answer Broadcast Select this check box to associate a client with a blank SSID
Probes (regardless of which SSID the wireless controller is currently using).
This feature is enabled by default.
5 Refer to the VLAN Assignment field to add or remove VLANs for the selected WLAN, and define the number of
clients permitted. Remember, users belonging to separate VLANs can share the same WLAN. It’s not necessary
to create a new WLAN for every VLAN in the network.
Single VLAN Select the Single VLAN radio button to assign just one VLAN to this
WLAN. Enter the name of the VLAN within the VLAN parameter field
when the Single VLAN radio button is selected. Utilizing a single VLAN
per WLAN is a more typical deployment scenario than using a VLAN
pool.
VLAN Pool Select the VLAN Pool radio button to display a table with VLAN and
wireless client columns (representing configurable options). Define the
VLANs available to this WLAN. Additionally, define the number of
wireless clients supported by each VLAN. Use the radio button’s on
the left-hand side of the table to enable or disable each VLAN and
wireless client configuration for the WLAN. Select the + Add Row
button to add additional VLANs to the WLAN.
6 Select the Allow Radius Override check box in the RADIUS VLAN Assignment to allow an override to the WLAN
configuration. If, as part of the authentication process, the RADIUS server returns a client’s VLAN-ID in a
RADIUS Access-Accept packet, and this feature is enabled, all client traffic is forward on that VLAN. If disabled,
the RADIUS server returned VLAN-ID is ignored and the VLAN configuration (defined above) is used.
7 Use the URL Filter field to configure user access restrictions to resources on the controller or service platform
managed Internet. User access is controlled with URL Filters. Use the URL Filter drop down menu to select a
preconfigured URL Filter. To create a new URL Filter, use the Create button. To edit an existing URL Filter, use
the Edit button.
8 Select OK when completed to update the WLAN’s basic configuration. Select Reset to revert the screen back to
the last saved configuration.
Authentication ensures only known and trusted users or devices access a WLAN. Authentication is enabled per
WLAN to verify the identity of both users and devices. Authentication is a challenge and response procedure for
validating user credentials such as username, password and sometimes secret-key information.
A client must authenticate to an Access Point to receive resources from the network. Controllers and service
platforms support EAP, EAP PSK, EAP-MAC, MAC and PSK/None authentication options.
A captive portal configuration provides secure authenticated access using a standard Web browser. Captive portals
provide authenticated access by capturing and re-directing a wireless user's Web browser session to a captive
portal login page where the user must enter valid credentials to access to the network. Once logged into captive
portal, additional Agreement, Welcome and Fail pages provide the administrator with a number of options on
captive portal screen flow and user appearance. Refer to Captive Portal on page 6-13 for information on assigning
a captive portal policy to a WLAN.
A passpoint policy provides an interoperable platform for streamlining Wi-Fi access to Access Points deployed as
public hotspots. Passpoint is supported across a wide range of wireless network deployment scenarios and client
devices. For more information, see Passpoint Policy.
Encryption is central for WLAN security, as it provides data privacy for traffic forwarded over a WLAN. When the
802.11 specification was introduced, Wired Equivalent Privacy (WEP) was the primary encryption mechanism. WEP
has since been interpreted as flawed in many ways, and is not considered an effective standalone encryption
scheme for securing a wireless controller WLAN. WEP is typically used WLAN deployments designed to support
legacy clients. New device deployments should use either WPA or WPA2 encryption.
Encryption applies a specific algorithm to alter its appearance and prevent unauthorized hacking. Decryption
applies the algorithm in reverse, to restore the data to its original form. A sender and receiver must employ the
same encryption/decryption method to interoperate. When both TKIP and CCMP are both enabled a mix of clients
are allowed to associate with the WLAN. Some use TKIP, others use CCMP. Since broadcast traffic needs to be
understood by all clients, the broadcast encryption type in this scenario is TKIP.
TKIP-CCMP, WPA2-CCMP, WEP 64, WEP 128 and Keyguard encryption options are supported.
The EAP process begins when an unauthenticated supplicant (client device) tries to connect with an authenticator
(in this case, the authentication server). An Access Point passes EAP packets from the client to an authentication
server on the wired side of the Access Point. All other packet types are blocked until the authentication server
(typically, a RADIUS server) verifies the client’s identity.
802.1X EAP provides mutual authentication over the WLAN during authentication. The 802.1X EAP process uses
credential verification to apply specific policies and restrictions to WLAN users to ensure access is only provided to
specific wireless controller resources.
802.1X requires a 802.1X capable RADIUS server to authenticate users and a 802.1X client installed on each devices
accessing the EAP supported WLAN. An 802.1X client is included with most commercial operating systems,
including Microsoft Windows, Linux and Apple OS X.
The RADIUS server authenticating 802.1X EAP users can reside either internally or externally to a controller, service
platform or Access Point. User account creation and maintenance can be provided centrally using ADSP or
individually maintained on each device. If an external RADIUS server is used, EAP authentication requests are
forwarded.
When using PSK with EAP, the controller, service platform or Access Point sends a packet requesting a secure link
using a pre-shared key. The authenticating device must use the same authenticating algorithm and passcode
during authentication. EAP-PSK is useful when transitioning from a PSK network to one that supports EAP. The
only encryption types supported with this are TKIP, CCMP and TKIP-CCMP.
7 Select OK when completed to update the WLAN’s EAP configuration. Select Reset to revert back to the last
saved configuration.
EAP, EAP-PSK and EAP MAC Deployment Considerations
802.1x EAP, EAP-PSK and EAP MAC
Before defining a 802.1x EAP, EAP-PSK or EAP MAC supported configuration on a WLAN, refer to the following
deployment guidelines to ensure the configuration is optimally effective:
• A valid certificate should be issued and installed on devices providing 802.1X EAP. The certificate should be
issued from an Enterprise or public certificate authority to allow 802.1X clients to validate the identity of the
authentication server prior to forwarding credentials.
• If using an external RADIUS server for EAP authentication, the round trip delay over the WAN should not
exceed 150ms. Excessive delays over a WAN can cause authentication and roaming issues and impact wireless
client performance. If experiencing excessive delays, consider using local RADIUS resources.
6.1.2.2 MAC Authentication
Configuring WLAN Security
MAC is a device level authentication method used to augment other security schemes when legacy devices are
deployed using static WEP.
MAC authentication can be used for device level authentication by permitting WLAN access based on device MAC
address. MAC authentication is typically used to augment WLAN security options that do not use authentication
(such as static WEP, WPA-PSK and WPA2-PSK) MAC authentication can also be used to assign VLAN
memberships, Firewall policies and time and date restrictions.
MAC authentication can only identify devices, not users. MAC authentication only references a client wireless
interface card MAC address when authenticating the device, it does not distinguish the device’s user credentials.
MAC authentication is somewhat poor as a standalone data protection technique, as MAC addresses can be easily
spoofed by hackers who can provide a device MAC address to mimic a trusted device within the network.
MAC authentication is enabled per WLAN profile, augmented with the use of a RADIUS server to authenticate
each device. A device’s MAC address can be authenticated against the local RADIUS server built into the device or
centrally (from a datacenter). For RADIUS server compatibility, the format of the MAC address can be forwarded
to the RADIUS server in non-delimited and or delimited formats:
NOTE: Although None implies no authentication, this option is also used when pre-
shared keys are used for encryption (thus the PSK in the description).
6.1.2.5 Passpoint
Configuring WLAN Security
A passpoint policy provides an interoperable platform for streamlining Wi-Fi access to Access Points deployed as
public hotspots (captive portals). Passpoint is supported across a wide range of wireless network deployment
scenarios and client devices.
6.1.2.6 Registration
Configuring WLAN Security
Registration requires the validation of devices by address to continue the authentication process.
5 Use the Type of Registration drop-down menu to set the self-registration type for the selected WLAN. Options
include None, device, user and device-OTP.
When captive portal guest users are authenticating using their User ID (Email Address/Mobile Number/
Member ID) and the received pass code in order to complete the registration process. The WLAN
authentication type should be MAC-Authentication and the WLAN registration type should be configured as
device-OTP.
When captive portal device registration is through social media, the WLAN registration type should be set as
device registration, and the captive portal needs to be configured for guest user social authentication.
Enter a 64 character maximum RADIUS Group Name to which the registering user associates. When left blank,
users are not associated with a RADIUS group.
Use the Expiry Time spinner control to set the amount of time (from 1 - 43,800 hours) before registration
addresses expire and must be re-entered.
Set the Agreement Refresh as the amount of time (from 0 - 144,000 minutes) before the agreement page is
displayed if the user has not been logged during the specified period. The default setting is 0 days.
6 Select OK when completed to update the Registration settings. Select Reset to revert the WLAN Policy Security
screen back to the last saved configuration.
7 Select the Send Mode as either UDP, HTTP or HTTPS. The default setting is UDP.
8 Select OK when completed to update the External Controller configuration. Select Reset to revert the WLAN
Policy Security screen back to the last saved configuration.
6.1.2.8 TKIP-CCMP
Configuring WLAN Security
CCMP is a security standard used by the Advanced Encryption Standard (AES). AES serves the same function TKIP
does for WPA-TKIP. CCMP computes a Message Integrity Check (MIC) using the proven Cipher Block Chaining
(CBC) technique. Changing just one bit in a message produces a totally different result.
The encryption method is Temporal Key Integrity Protocol (TKIP). TKIP addresses WEP’s weaknesses with a re-
keying mechanism, a per-packet mixing function, a message integrity check and an extended initialization vector.
However TKIP also has vulnerabilities.
Before defining a TKIP-CCMP supported configuration on a WLAN, refer to the following deployment guidelines to
ensure the configuration is optimally effective:
• TKIP-CCMP should only be enabled for legacy device support when WPA2-CCMP support is not available.
• Though TKIP offers better security than WEP, it can be vulnerable to certain attacks.
• When both TKIP and CCMP are both enabled a mix of clients are allowed to associate with the WLAN. Some
use TKIP, others use CCMP. Since broadcast traffic needs to be understood by all clients, the broadcast
encryption type in this scenario is TKIP.
6.1.2.9 WPA2-CCMP
Configuring WLAN Security
WPA2 is a newer 802.11i standard that provides even stronger wireless security than Wi-Fi Protected Access (WPA)
and WEP. CCMP is the security standard used by the Advanced Encryption Standard (AES). AES serves the same
function TKIP does for WPA-TKIP. CCMP computes a Message Integrity Check (MIC) using the proven Cipher Block
Chaining (CBC) technique. Changing just one bit in a message produces a totally different result.
WPA2/CCMP is based on the concept of a Robust Security Network (RSN), which defines a hierarchy of keys with
a limited lifetime (similar to TKIP). Like TKIP, the keys the administrator provides are used to derive other keys.
Messages are encrypted using a 128-bit secret key and a 128-bit block of data. The end result is an encryption
scheme as secure as any the wireless controller provides for its associated clients.
WEP can be used with open, shared, MAC and 802.1 X EAP authentications. WEP is optimal for WLANs supporting
legacy deployments when also used with 802.1X EAP authentication to provide user and device authentication and
dynamic WEP key derivation and periodic key rotation. 802.1X provides authentication for devices and also reduces
the risk of a single WEP key being deciphered. If 802.1X support is not available on the legacy device, MAC
authentication should be enabled to provide device level authentication.
WEP 64 uses a 40 bit key concatenated with a 24-bit initialization vector (IV) to form the RC4 traffic key. WEP 64
is a less robust encryption scheme than WEP 128 (containing a shorter WEP algorithm for a hacker to potentially
duplicate), but networks that require more security are at risk from a WEP flaw. WEP is only recommended if there
are client devices incapable of using higher forms of security. The existing 802.11 standard alone offers
administrators no effective method to update keys.
Before defining a WEP 64 supported configuration on a wireless controller WLAN, refer to the following
deployment guidelines to ensure the configuration is optimally effective:
• Additional layers of security (beyond WEP) should be enabled to minimize the likelihood of data loss and
security breaches. WEP enabled WLANs should be mapped to an isolated VLAN with firewall policies restricting
access to hosts and suspicious network applications.
• WEP enabled WLANs should only be permitted access to resources required by legacy devices.
• If WEP support is needed for WLAN legacy device support, 802.1X EAP authentication should be also
configured in order for the WLAN to provide authentication and dynamic key derivation and rotation.
6.1.2.11 WEP 128
Configuring WLAN Security
Wired Equivalent Privacy (WEP) is a security protocol specified in the IEEE Wireless Fidelity (Wi -Fi) standard.
WEP is designed to provide a WLAN with a level of security and privacy comparable to that of a wired LAN.
WEP can be used with open, shared, MAC and 802.1 X EAP authentications. WEP is optimal for WLANs supporting
legacy deployments when also used with 802.1X EAP authentication to provide user and device authentication and
dynamic WEP key derivation and periodic key rotation. 802.1X provides authentication for devices and also reduces
the risk of a single WEP key being deciphered. If 802.1X support is not available on the legacy device, MAC
authentication should be enabled to provide device level authentication.
WEP 128 uses a 104 bit key which is concatenated with a 24-bit initialization vector (IV) to form the RC4 traffic
key. WEP may be all a small-business user needs for the simple encryption of wireless data. However, networks
that require more security are at risk from a WEP flaw. WEP is only recommended if there are client devices
incapable of using higher forms of security. The existing 802.11 standard alone offers administrators no effective
method to update keys.
WEP 128 provides a more robust encryption algorithm than WEP 64 by requiring a longer key length and pass key.
Thus, making it harder to hack through the replication of WEP keys.
• Additional layers of security (beyond WEP) should be enabled to minimize the likelihood of data loss and
security breaches. WEP enabled WLANs should be mapped to an isolated VLAN with firewall policies restricting
access to hosts and suspicious network applications.
• WEP enabled WLANs should only be permitted access to resources required by legacy devices.
• If WEP support is needed for WLAN legacy device support, 802.1X EAP authentication should be also
configured in order for the WLAN to provide authentication and dynamic key derivation and rotation.
6.1.2.12 Keyguard
Configuring WLAN Security
Keyguard is a form of WEP, and could be all a small business needs for the simple encryption of wireless data.
KeyGuard is a proprietary encryption method, and an enhancement to WEP encryption, and was developed before
the finalization of WPA-TKIP. The Keyguard encryption implementation is based on the IEEE Wi-Fi standard, 802.11i.
Keys 1-4 Use the Key #1-4 areas to specify key numbers. For Keyguard (104-bit
key), the keys are 26 hexadecimal characters in length. Select one of
these keys for default activation by clicking its radio button. Selecting
Show displays a key in exposed plain text.
Restore Default WEP If you feel it necessary to restore the Keyguard algorithm back to its
Keys default settings, click the Restore Default WEP Keys button. This may
be the case if the latest defined algorithm has been compromised and
no longer provides its former measure of data security.
Default WEP Keyguard keys are as follows:
• Key 1 101112131415161718191A1B1C
• Key 2 202122232425262728292A2B2C
• Key 3 303132333435363738393A3B3C
• Key 4 404142434445464748494A4B4C
6 Select OK when completed to update the WLAN’s Keyguard encryption configuration. Select Reset to revert the
screen back to its last saved configuration.
KeyGuard Deployment Considerations
Keyguard
Before defining a Keyguard configuration on a WLAN, refer to the following deployment guidelines to ensure the
configuration is optimally effective:
• Authentication techniques can also be enabled on WLANs supporting other proprietary techniques, such as
KeyGuard.
• A WLAN using KeyGuard to support legacy devices should also use largely limited to the support of just those
legacy clients using KeyGuard.
6.1.2.13 T5 Controller Security
Configuring WLAN Security
A T5 controller, once enabled as a supported external device, can provide data to WiNG to assist in a T5’s
management within a WiNG supported subnet populated by both types of devices. The Customer Premises
Equipment (CPEs) are the T5 controller managed radio devices. These CPEs use Digital Subscriber Line (DSL) as
their high speed Internet access mechanism using the CPE’s physical wallplate connection and phone jack.
To configure WLAN security settings for a T5 controller and its connected CPEs:
1 Select Configuration > Wireless > Wireless LAN Policy to display available WLANs.
2 Select the Add button to create an additional WLAN or select Edit to modify the properties of an WLAN.
3 Select Security.
4 Refer to the T5 PowerBroadband Security field at the bottom of the screen.
6 Select OK when completed to update the T5 PowerBroadband Security configuration. Select Reset to revert the
screen back to its last saved configuration.
WLANs use firewalls like Access Control Lists (ACLs) to filter/mark packets based on the WLAN from which they
arrive, as opposed to filtering packets on Layer 2 ports. An ACL contains an ordered list of Access Control Entries
(ACEs). Each ACE specifies an action and a set of conditions (rules) a packet must satisfy to match the ACE. The
order of conditions in the list is critical since filtering is stopped after the first match.
IPv4 and IPv6 based firewall rules are specific to source and destination IP addresses and the unique rules and
precedence orders assigned. Both IP and non-IP traffic on the same Layer 2 interface can be filtered by applying
both an IP ACL and a MAC.
Additionally, administrators can filter Layer 2 traffic on a physical Layer 2 interface using MAC addresses. A MAC
firewall rule uses source and destination MAC addresses for matching operations, where the result is a typical
allow, deny or mark designation to WLAN packet traffic.
Keep in mind IP and non-IP traffic on the same Layer 2 interface can be filtered by applying both an IP ACL and a
MAC ACL to the interface.
To review access policies, create a new policy or edit the properties of an existing policy:
1 Select Configuration > Wireless LANs > Wireless LAN Policy to display available WLANs.
2 Select the Add button to create a new WLAN or Edit to modify the properties of an existing WLAN.
3 Select Firewall from the Wireless LAN Policy options.
NOTE: Only those selected IP ACL filter attributes display. Each value can have its
current setting adjusted by selecting that IP ACL’s column to display a pop-up to
adjust that one value.
Source Port If using either tcp or udp as the protocol, define whether the source port
for incoming IP ACL rule application is any, equals or an administrator
defined range. If not using tcp or udp, this setting displays as N/A. This is
the data local origination port designated by the administrator. Selecting
equals invokes a spinner control for setting a single numeric port. Selecting
range displays spinner controls for Low and High numeric range settings. A
source port cannot be a destination port.
Destination Port If using either tcp or udp as the protocol, define whether the destination
port for outgoing IP ACL rule application is any, equals or an administrator
defined range. If not using tcp or udp, this setting displays as N/A. This is
the data destination virtual port designated by the administrator. Selecting
equals invokes a spinner control for setting a single numeric port. Selecting
range displays spinner controls for Low and High numeric range settings.
ICMP Type Selecting ICMP as the protocol for the IP rule displays an additional set of
ICMP specific options for ICMP type and code. The Internet Control
Message Protocol (ICMP) uses messages identified by numeric type. ICMP
messages are used for packet flow control or generated in IP error
responses. ICMP errors are directed to the source IP address of the
originating packet. Assign an ICMP type from 1-10.
ICMP Code Selecting ICMP as the protocol for the IP rule displays an additional set of
ICMP specific options for ICMP type and code. Many ICMP types have a
corresponding code, helpful for troubleshooting network issues (0 - Net
Unreachable, 1 Host Unreachable, 2 Protocol Unreachable etc.).
Start VLAN Select a Start VLAN icon within a table row to set (apply) a start VLAN
range for this IP ACL filter. The Start VLAN represents the virtual LAN
beginning numeric identifier arriving packets must adhere to in order to
have the IP ACL rules apply.
End VLAN Select an End VLAN icon within a table row to set (apply) an end VLAN
range for this IP ACL filter. The End VLAN represents the virtual LAN end
numeric identifier arriving packets must adhere to in order to have the IP
ACL rules apply.
Mark Select an IP Firewall rule’s Mark checkbox to enable or disable event
marking and set the rule’s 8021p or dscp level (from 0 - 7).
Log Select an IP Firewall rule’s Log checkbox to enable or disable event logging
for this rule’s usage.
Enable Select an IP Firewall rule’s Enable or Disable icon to determine this rule’s
inclusion with the IP firewall policy.
Description Lists the administrator assigned description applied to the IP ACL rule.
Select a description within the table to modify its character string as
filtering changes warrant. Select the icon within the Description table
header to launch a Select Columns screen used to add or remove IP ACL
criteria from the table.
8 Select existing inbound and outbound MAC Firewall Rules using the drop-down menu. If no rules exist, select
Create to display a screen where Firewall rules can be created. MAC firewall rules can also be applied to an
EX3500 Ethernet PoE switch connected and utilized by a WiNG managed device.
9 Select the + Add Row button.
10 Select the added row to expand it into configurable parameters.
Enable TCP RTT Select this option to enable the extraction of Round Trip Time (RTT)
from Transmission Control Protocol (TCP) flows. When enabled, the RTT
information from TCP flows detected on the VLAN interface associated
with the WLAN is extracted and forwarded to the NSight server by
Access Points. However, this TCP-RTT metadata is viewable only on the
NSight dashboard. Therefore, ensure the NSight server is up, an NSight
policy (pointing to the NSight server) is applied on the Access Point’s
RF Domain, and NSight analytics data collection is enabled. This setting
is disabled by default.
14 Set the following Trust Parameters:
ARP Trust Select the check box to enable ARP Trust on this WLAN. ARP packets
received on this WLAN are considered trusted and information from
these packets is used to identify rogue devices within the network. This
setting is disabled by default.
Validate ARP Header Select this option to verify the mismatch for source MAC in the ARP
Mismatch and Ethernet headers. By default, mismatch verification is enabled.
DHCP Trust Select the check box to enable DHCP trust on this WLAN. This setting
is disabled by default.
17 Set a Firewall Session Hold Time in either Seconds (1 - 300) or Minutes (1 - 5). This is the hold time for caching
user credentials and firewall state information when a client roams. The default setting is 30 seconds.
18 Select OK when completed to update this WLAN’s Firewall settings. Select Reset to revert the screen back to its
last saved configuration.
WLAN Firewall Deployment Considerations
Before defining an access control configuration on a WLAN, refer to the following deployment guidelines to ensure
the configuration is optimally effective:
• IP and non-IP traffic on the same Layer 2 interface can be filtered by applying both an IP ACL and a MAC ACL
to the interface.
Proxy ND Mode Use the drop-down menu to define the proxy neighbor discovery (ND)
mode for WLAN member clients as either Strict or Dynamic. ND Proxy
is used in IPv6 to provide reachability by allowing the a client to act as
proxy. Proxy certificate signing can be done either dynamically
(requiring exchanges of identity and authorization information) or
statically when the network topology is defined. Dynamic is the default
value.
Enforce DHCP-Offer Select the check box to enforce DHCP offer validation. The default
Validation setting is disabled.
5 Define the following Wing Client Extensions to potentially increase client roaming reliability and handshake
speed:
Move Operations Select the check box to enable the use of Hyper-Fast Secure Roaming
(HFSR) for clients utilizing this WLAN. This feature applies only to
certain client devices. This feature is disabled by default.
Smart Scan Enable smart scan to adjust clients channel scans to a few channels as
opposed to all available channels. This feature is disabled by default.
Symbol Information Select the check box to support the Symbol Information Element with
Element legacy Symbol Technology clients, thus making them optimally
interoperable with the latest Extreme Networks Access Points. The
default setting is enabled.
WMM Load Information Select the check box to support a WMM Load Information Element in
Element radio transmissions with legacy clients. The default setting is disabled.
Scan Assist Enable scan assist to achieve faster roams on DFS channels by
eliminating passive scans. Clients would get channel information
directly from possible roam candidates. This setting is disabled by
default.
FT Aggregate Enable fast transition (FT) aggregate to increase roaming speed by
eliminating separate key exchange handshake frames with potential
roam candidates. Enable fast transition to complete an initial FT over
DS handshake with multiple roam candidates (up to 6) at once,
eliminating the need to send separate FT over DS handshakes to each
roam candidate. This setting is disabled by default.
Channel Info Interval Configure the channel information interval to periodically retrieve
channel information directly from potential roam candidates without
making a scan assist request.
6 Define the following Coverage Hole Detection settings to determine how detected coverage holes are managed:
Enable Enable this setting to inform an Access Point when it experiences a
coverage hole (area of poor wireless coverage). This setting is disabled
by default.
Use 11k Clients Optionally enable this setting to also use 802.11k-only-capable clients
to detect coverage holes. This is a reduced set of coverage hole
detection capabilities (only standard 11k messages and behaviors). This
setting is disabled by default.
Threshold Use the spinner control to set the Access Point signal strength (as seen
by the client) below which a coverage hole incident is reported. The
threshold can be set from -80 to -60.
Offset Use the spinner control to set the offset added to the threshold to
obtain the Access Point signal strength (as seen by the client)
considered adequate. The offset can be set from 5 to 20.
7 Set the following AP Attributes Information:
Enable Select this option to include the AP-Attributes information element in
the beacon. The information element helps clients recognize which
wing-extensions are supported by the AP. This setting is enabled by
default.
Include Hostname Select this option to include the AP's hostname in the AP-Attributes
information element. This setting is disabled by default.
8 Define the following Timeout Settings for the WLAN:
Credential Cache Set a timeout period for the credential cache in Days, Hours, Minutes
Timeout or Seconds.
VLAN Cache Timeout Set a timeout period for the VLAN cache in Days, Hours, Minutes or
Seconds.
9 Select Controller Assisted Mobility, within the Mobility field, to use a controller or service platform’s mobility
database to assist in roaming between RF Domains. This feature is disabled by default.
10 Use the Device ID settings, within the OpenDNS field, to specify a 16 character maximum OpenDNS device ID
forwarded in a DNS query. OpenDNS extends DNS by adding additional features such as misspelling correction,
phishing protection, and optional content filtering.
11 Select Client Isolation, within the T5 PowerBroadband Client Settings field, to disallow clients connecting to the
WLAN to communicate with one another. This setting applies exclusively to CPE devices managed by a T5
controller and is disabled by default.
Use the Inactivity Time Out field to define the inactivity timeout specific to T5 clients. Set the maximum
amount of time T5 clients are allowed to be idle within this WLAN. Set the idle time in either Seconds (60 -
86,400), Minutes (1 - 1,440), Hours (0 - 24) or Days (0 - 1). When this setting is exceeded, the client is no
longer able to access resources and must reauthenticate. The default value is 1,800 seconds.
A T5 controller, once enabled as a supported external device, can provide data to WiNG to assist in a T5’s
management within a WiNG supported subnet populated by both types of devices. The Customer Premises
Equipment (CPEs) are the T5 controller managed radio devices. These CPEs use a Digital Subscriber Line (DSL)
as their high speed Internet access mechanism using the CPE’s physical wallplate connection and phone jack.
12 Select OK when completed to update the WLAN’s client setting configuration. Select Reset to revert the screen
back to the last saved configuration.
Accounting can be enabled and applied to WLANs, to uniquely log accounting events specific to the WLAN.
Accounting logs contain information about the use of remote access services by users. This information is of great
assistance in partitioning local versus remote users and how to best accommodate each. Remote user information
can be archived to an external location for periodic network and user permission administration.
External services can be rendered unavailable due to any of the following instances:
• When the RADIUS authentication server becomes unavailable. The RADIUS server could be local or external
to the controller, service platform or Access Point.
7 Refer to the DHCP Server Monitoring field to set the WLAN’s adoption service monitoring configuration.
Enable Select enable to monitor activity over the defined DHCP Server. When
the connection to the DHCP server is lost, captive portal users are
automatically migrated a defined VLAN. The feature is disabled by
default.
VLAN Select the VLAN users are migrated to when the defined DHCP server
resource becomes unavailable. The available range is from 1 - 4,094.
CRM Name Enter the DHCP server to monitor for availability. When this DHCP
server resource becomes unavailable, the device falls back to defined
VLAN. This VLAN has a DHCP server configured that provides a pool
of IP addresses and with a lease time less than the main DHCP server.
8 Refer to the DNS Server Monitoring field to set the WLAN’s DNS service monitoring configuration.
Enable Select enable to monitor activity over the defined DNS Server. When
the connection to the DNS server is lost, captive portal users are
automatically migrated a defined VLAN. The feature is disabled by
default.
VLAN Select the VLAN users are migrated to when the defined DNS server
resource becomes unavailable. The available range is from 1 - 4,094.
CRM Name Enter the DNS server to monitor for availability. When this DNS server
resource becomes unavailable, the device falls back to defined VLAN.
This VLAN has a DNS server configured that provides DNS address
resolution till the main DNS server becomes available.
9 Select OK when completed to update this WLAN’s service monitor settings. Select Reset to revert the screen
back to its last saved configuration.
6 Refer to the Load Balancing Settings (5GHz) section to configure load balancing for the 5 GHz WLAN.
Single Band Clients Select this option to enable the association of single band clients on
5GHz, even if load balancing is available. This setting is enabled by
default.
Max Probe Requests Enter a value from 0 - 10,000 for the maximum number of probe
requests for clients using 5GHz. The default value is 60.
Probe Request Interval Enter a value in seconds from 0 - 10,000 to configure the interval for
client probe requests. When exceeded, clients can associate using
5GHz. The default setting is 10 seconds.
7 Select OK when completed to update this WLAN’s advanced settings. Select Reset to revert the screen back to
its last saved configuration.
NAS Port The profile database on the RADIUS server consists of user profiles for
each connected network access server (NAS) port. Each profile is
matched to a username representing a physical port. When authorizing
users, it queries the user profile database using a username
representative of the physical NAS port making the connection. Set the
numeric port value from 0-4,294,967,295.
RADIUS Dynamic Select the check box to enable a mechanism that extends the RADIUS
Authorization protocol to support unsolicited messages sent from the RADIUS server.
These messages allow administrators to issue change of authorization
(CoA) messages, which affect session authorization, or Disconnect
Messages (DM), which terminated a session immediately. This feature is
disabled by default.
6 Refer to the Radio Rates field to define selected data rates for both the 2.4 and 5.0 GHz bands.
8 Enable HTTP Analysis for log file analysis on this WLAN. This setting is disabled by default.
9 Set the following HTTP analysis Filter settings for the WLAN:
Filter Out Images Select this option to filter images out of this WLAN’s log files. This
setting is disabled by default.
Filter Post Select this option to filter posts out of this WLAN’s log files. This
setting is disabled by default.
Strip Query String Select this option to filter query strings out of this WLAN’s log files.
This setting is disabled by default.
10 Set the following Forward to Syslog Server settings for HTTP analysis on this WLAN:
Enable Select the check box to forward any firewall HTTP Analytics to a
specified syslog server for this WLAN. This setting is disabled by
default.
Host Enter a Hostname or IP Address for the syslog server to forward HTTP
Analytics. Hostnames cannot include an underscore character.
Port Specify the port number utilized by the syslog server. The default port
is 514.
Proxy Mode If a proxy is needed to connect to the syslog server, select a proxy
mode of either Through RF Domain Manager or Through Wireless
Controller. If no proxy is needed, select None.
11 Select OK when completed to update this WLAN’s advanced settings. Select Reset to revert the screen back to
its last saved configuration.
Start Time This value sets the starting time the WLAN is activated. Use the
spinner controls to select the hour and minute, in a 12h time format.
Then use the radio button to choose AM or PM.
End Time This value sets the ending time of day(s) that the WLAN will be
disabled. Use the spinner controls to select the hour and minute, in a
12h time format. Then use the radio button to choose AM or PM.
7 Select OK when completed to update the auto shutdown settings. Select Reset to revert the screen back to its
last saved configuration.
QoS helps ensure each WLAN receives a fair share of the overall bandwidth, either equally or as per the proportion
configured. Packets directed towards clients are classified into categories such as Video, Voice and Data. Packets
within each category are processed based on the weights defined for each WLAN.
The Quality of Service screen displays a list of QoS policies available to WLANs. If none of the exiting QoS policies
supports an ideal QoS configuration for the intended data traffic of this WLAN, select the Add button to create
new policy. Select the radio button of an existing WLAN and select Ok to map the QoS policy to the WLAN
displayed in the banner of the screen.
Use the WLAN Quality of Service (QoS) Policy screen to add a new QoS policy or edit the attributes of an existing
policy.
NOTE: WLAN QoS configurations differ significantly from QoS policies configured
for radios. WLAN QoS configurations are designed to support the data requirements
of wireless clients, including the data types they support and their network
permissions. Radio QoS policies are specific to the transmit and receive
characteristics of the connected radio’s themselves, independent from the wireless
clients the Access Point radios supported.
1 Select Configuration > Wireless > WLAN QoS Policy to display existing QoS policies available to WLANs.
SVP Prioritization A green check mark defines the policy as having Spectralink Voice
Prioritization (SVP) enabled to allow the wireless controller to identify
and prioritize traffic from Spectralink/Polycomm phones using the SVP
protocol. Phones using regular WMM and SIP are not impacted by SVP
prioritization. A red “X” defines the QoS policy as not supporting SVP
prioritization.
WMM Power Save Enables support for the WMM based power-save mechanism, also
known as Unscheduled Automatic Power Save Delivery (U-APSD). This
is primarily used by voice devices that are WMM capable. The default
setting is enabled.
Multicast Mask Primary Displays the primary multicast mask defined for each listed QoS policy.
Normally all multicast and broadcast packets are buffered until the
periodic DTIM interval (indicated in the 802.11 beacon frame), when
clients in power save mode wake to check for frames. However, for
certain applications and traffic types, the administrator may want the
frames transmitted immediately, without waiting for the DTIM interval.
By configuring a primary and secondary multicast mask, an
administrator can indicate which frames are transmitted immediately.
Setting masks is optional and only needed if there are traffic types
requiring special handling.
Multicast Mask Displays the secondary multicast mask defined for each listed QoS
Secondary policy.
NOTE: When using a wireless client classification other than WMM, only legacy rates
are supported on that WLAN.
3 Either select the Add button to define a new WLAN QoS policy, or select an existing WLAN QoS policy and
select Edit to modify its existing configuration. Existing QoS policies can be selected and deleted as needed.
Optionally Copy a policy or Rename a WLAN QoS Policy as needed.
A Quality of Service (QoS) policy screen displays for the new or selected WLAN. The screen displays the WMM
tab by default, but additional tabs also display for WLAN and wireless client rate limit configurations. For more
information, refer to the following:
• Configuring a WLAN’s QoS WMM Settings
• Configuring Rate Limit Settings
WMM’s prioritization capabilities are based on the four access categories. The higher the access category, the
higher the probability to transmit this kind of traffic over the WLAN. Access categories were designed to
correspond to 802.1d priorities to facilitate interoperability with QoS policy management mechanisms. WMM
enabled wireless controllers/Access Points coexist with legacy devices (not WMM-enabled).
Packets not assigned to a specific access category are categorized by default as having best effort priority.
Applications assign each data packet to a given access category packets are then added to one of four
independent transmit queues (one per access category - voice, video, best effort or background) in the client. The
client has an internal collision resolution mechanism to address collision among different queues, which selects the
frames with the highest priority to transmit.
The same mechanism deals with external collision, to determine which client(s) should be granted the opportunity
to transmit (TXOP). The collision resolution algorithm responsible for traffic prioritization is probabilistic and
depends on two timing parameters that vary for each access category.
• The minimum interframe space, or Arbitrary Inter-Frame Space Number (AIFSN)
• The contention window, sometimes referred to as the random backoff wait
Both values are smaller for high-priority traffic. The value of the contention window varies through time. Initially
the contention window is set to a value that depends on the AC. As frames with the highest AC tend to have the
lowest backoff values, they are more likely to get a TXOP.
After each collision the contention window is doubled until a maximum value (also dependent on the AC) is
reached. After successful transmission, the contention window is reset to its initial, AC dependant value. The AC
with the lowest backoff value gets the TXOP.
3 Configure the following in respect to the WLAN’s intended WMM radio traffic and user requirements:
Wireless Client Use the drop-down menu to select the Wireless Client Classification for
Classification this WLAN's intended traffic type. The classification categories are the
different WLAN-WMM options available to the radio. Classification
types include:
WMM – Implies WiFi Multimedia QoS extensions are enabled on this
radio. This allows different traffic streams between the wireless client
and the Access Point to be prioritized according to the type of traffic
(voice, video etc). The WMM classification is required to support the
high throughput data rates required of 802.11n device support. WMM is
the default setting.
Voice – Optimized for voice traffic. Implies all traffic on this WLAN is
prioritized as voice traffic on the radio.
Video – Optimized for video traffic. Implies all traffic on this WLAN is
prioritized as video traffic on the radio.
Normal – Optimized for best effort traffic. Implies all traffic on this
WLAN is prioritized as best effort traffic on the radio.
Low – Optimized for background traffic. Implies all traffic on this
WLAN is low priority on the radio.
Non-Unicast Use the drop-down menu to select the Non-Unicast Classification for
Classification this WLAN's intended traffic. Non-unicast classification types include:
Voice – Optimized for voice traffic. Implies all traffic on this WLAN is
prioritized as voice traffic on the radio.
Video – Optimized for video traffic. Implies all traffic on this WLAN is
prioritized as video traffic on the radio.
Normal – Optimized for best effort traffic. Implies all traffic on this
WLAN is prioritized as best effort traffic on the radio.
Low – Optimized for background traffic. Implies all traffic on this
WLAN is low priority on the radio.
Enable Voice Select this option if Voice traffic is prioritized on the WLAN. This gives
Prioritization priority to voice and voice management packets supported only on
certain legacy VOIP phones. This feature is disabled by default.
Enable SVP Enabling Spectralink Voice Prioritization (SVP) allows the identification
Prioritization and prioritization of traffic from Spectralink/Polycomm phones. This
gives priority to voice on certain legacy VOIP phones. If the wireless
client classification is WMM, non WMM devices recognized as voice
devices have their traffic transmitted at voice priority. Devices are
classified as voice when they emit SIP, SCCP, or H323 traffic. Thus,
selecting this option has no effect on devices supporting WMM. This
feature is disabled by default.
Enable WMM Power Enables support for the WMM based power-save mechanism, also
Save known as Unscheduled Automatic Power Save Delivery (U-APSD). This
is primarily used by voice devices that are WMM capable. The default
setting is enabled.
Enable QBSS Load IE Check this option to enable a QoS Basis Service Set (QBSS)
information element (IE) in beacons and probe response packets
advertised by Access Points. The default value is enabled.
Configure Non WMM Use the drop-down menu to select the Non-WMM client traffic
Client Traffic Classification.
Non-WMM classification types include:
Voice – Optimized for voice traffic. Implies all traffic on this WLAN is
prioritized as voice traffic on the radio.
Video – Optimized for video traffic. Implies all traffic on this WLAN is
prioritized as video traffic on the radio.
Normal – Optimized for best effort traffic. Implies all traffic on this
WLAN is prioritized as best effort traffic on the radio.
Low – Optimized for background traffic. Implies all traffic on this
WLAN is low priority on the radio.
4 Set the following Voice Access settings for the WLAN’s QoS policy:
Transmit Ops Use the slider to set the maximum device transmit duration after
obtaining a transmit opportunity. The default value is 47.
AIFSN Set the current Arbitrary Inter-frame Space Number (AIFSN) between
2-15. Higher-priority traffic voice categories should have lower AIFSNs
than lower-priority traffic categories. This will cause lower-priority
traffic to wait longer before attempting access. The default value is 2.
ECW Min The ECW Min is combined with the ECW Max to create the contention
value in the form of a numerical range. From this range, a random
number is selected for the back off mechanism. Lower values are used
for higher priority traffic. The available range is from 0-15. The default
value is 2.
ECW Max The ECW Max is combined with the ECW Min to create the contention
value in the form of a numerical range. From this range, a random
number is selected for the back off mechanism. Lower values are used
for higher priority traffic. The available range is from 0-15. The default
value is 3.
5 Set the following Normal (Best Effort) Access settings for the WLAN’s QoS policy:
Transmit Ops Use the slider to set the maximum duration a device can transmit after
obtaining a transmit opportunity. The default value is 0.
AIFSN Set the current AIFSN between 2-15. Lower priority traffic categories
should have higher AIFSNs than higher priority traffic categories. This
will cause lower priority traffic to wait longer before attempting
access. The default value is 3.
ECW Min The ECW Min is combined with the ECW Max to create the contention
value in the form of a numerical range. From this range, a random
number is selected for the back off mechanism. Higher values are used
for lower priority traffic (like Normal). The available range is from 0-15.
The default value is 4.
ECW Max The ECW Max is combined with the ECW Min to create the contention
value in the form of a numerical range. From this range, a random
number is selected for the back off mechanism. Higher values are used
for lower priority traffic (like Normal). The available range is from 0-15.
The default value is 10.
6 Set the following Video Access settings for the WLAN’s QoS policy:
Transmit Ops Use the slider to set the maximum duration a device can transmit after
obtaining a transmit opportunity. The default values is 94.
AIFSN Set the current Arbitrary Inter-frame Space Number (AIFSN) between
2-15. Higher-priority traffic video categories should have lower AIFSNs
than lower-priority traffic categories. This will cause lower-priority
traffic to wait longer before attempting access. The default value is 2.
ECW Min The ECW Min is combined with the ECW Max to create the contention
value in the form of a numerical range. From this range, a random
number is selected for the back off mechanism. Lower values are used
for higher priority traffic (like video). The available range is from 0-15.
The default value is 3.
ECW Max The ECW Max is combined with the ECW Min to create the contention
value in the form of a numerical range. From this range, a random
number is selected for the back off mechanism. Lower values are used
for higher priority traffic (like video). The available range is from 0-15.
The default value is 4.
7 Set the following Low (Background) Access settings for the WLAN’s QoS policy:
Transmit Ops Use the slider to set the maximum duration a device can transmit after
obtaining a transmit opportunity. For higher-priority traffic categories,
this value should be set to a low number. The default value is 0.
AIFSN Set the current AIFSN between 2-15. Lower priority traffic categories
should have higher AIFSNs than higher priority traffic categories. This
will cause lower priority traffic to wait longer before attempting
access. The default value is 7.
ECW Min The ECW Min is combined with the ECW Max to create the contention
value in the form of a numerical range. From this range, a random
number is selected for the back off mechanism. Higher values are used
for lower priority traffic (like Low). The available range is from 0-15.
The default value is 4.
ECW Max The ECW Max is combined with the ECW Min to create the contention
value in the form of a numerical range. From this range, a random
number is selected for the back off mechanism. Higher values are used
for lower priority traffic (like Low). The available range is from 0-15.
The default value is 10.
8 Set the following Other Settings for the WLAN’s QoS policy:
Trust IP DSCP Select this option to trust IP DSCP values for WLANs. The default
value is enabled.
Trust 802.11 WMM QoS Select this option to trust 802.11 WMM QoS values for WLANs. The
default value enabled.
9 Select OK when completed to update this WLAN’s QoS settings. Select Reset to revert the screen back to its
last saved configuration.
has infected on one or more devices. Rate limiting reduces the maximum rate sent or received from the wireless
network (and WLAN) per wireless client. It prevents any single user from overwhelming the wireless network. It
can also provide differential service for service providers. The uplink and downlink rate limits are usually configured
on a RADIUS server using vendor specific attributes. Rate limits are extracted from the RADIUS server’s response.
When such attributes are not present, the settings defined on the controller, service platform or Access Point are
applied. An administrator can set separate QoS rate limit configurations for data transmitted from the network
(upstream) and data transmitted from a WLAN’s wireless clients back to associated radios (downstream).
Before defining rate limit thresholds for WLAN upstream and downstream traffic, define the normal number of
ARP, broadcast, multicast and unknown unicast packets that typically transmit and receive from each supported
WMM access category. If thresholds are defined too low, normal network traffic (required by end-user devices) will
be dropped resulting in intermittent outages and performance problems.
Connected wireless clients can also have QoS rate limit settings defined in both the upstream and downstream
direction.
Maximum Burst Size Set a maximum burst size between 2 - 1024 kbytes. The smaller the
burst, the less likely the upstream packet transmission will result in
congestion for the WLAN’s client destinations. By trending the typical
number of ARP, broadcast, multicast and unknown unicast packets
over a period of time, the average rate for each access category can
be obtained. Once a baseline is obtained, administrators should add a
10% margin (minimally) to allow for traffic bursts. The default burst
size is 320 kbytes.
5 Set the following WLAN Upstream Random Early Detection Threshold settings for each access category. An
early random drop is done when a traffic stream falls below the set threshold.
Background Traffic Set a percentage value for background traffic in the upstream
direction. This is a percentage of the maximum burst size for low
priority traffic. Background traffic exceeding the defined threshold is
dropped and a log message is generated. Background traffic
consumes the least bandwidth of any access category, so this value
can be set to a lower value once a general upstream rate is known by
the network administrator (using a time trend analysis). The default
threshold is 50%.
Best Effort Traffic Set a percentage value for best effort traffic in the upstream direction.
This is a percentage of the maximum burst size for normal priority
traffic. Best effort traffic exceeding the defined threshold is dropped
and a log message is generated. Best effort traffic consumes little
bandwidth, so this value can be set to a lower value once a general
upstream rate is known by the network administrator (using a time
trend analysis). The default threshold is 50%.
Video Traffic Set a percentage value for video traffic in the upstream direction. This
is a percentage of the maximum burst size for video traffic. Video
traffic exceeding the defined threshold is dropped and a log message
is generated. Video traffic consumes significant bandwidth, so this
value can be set to a higher value once a general upstream rate is
known by the network administrator (using a time trend analysis). The
default threshold is 25%.
Voice Traffic Set a percentage value for voice traffic in the upstream direction. This
is a percentage of the maximum burst size for voice traffic. Voice
traffic exceeding the defined threshold is dropped and a log message
is generated. Voice applications consume significant bandwidth, so this
value can be set to a higher value once a general upstream rate is
known by the network administrator (using a time trend analysis). The
default threshold is 0%.
6 Configure the following parameters in respect to the intended WLAN Downstream Rate Limit, or traffic from
wireless clients to associated Access Point radios and the controller or service platform:
Enable Select the Enable radio button to enable rate limiting for data
transmitted from the controller or service platform to its associated
Access Point radios and connected wireless clients. Enabling this
option does not invoke rate limiting for data traffic in the upstream
direction. This feature is disabled by default.
Rate Define an upstream rate limit between 50 - 1,000,000 kbps. This limit
constitutes a threshold for the maximum the number of packets
transmitted or received over the WLAN (from all access categories).
Traffic that exceeds the defined rate is dropped and a log message is
generated. The default setting is 5000 kbps.
Maximum Burst Size Set a maximum burst size between 2 - 1024 kbytes. The smaller the
burst, the less likely the downstream packet transmission will result in
congestion for the WLAN’s client destinations. By trending the typical
number of ARP, broadcast, multicast and unknown unicast packets
over a period of time, the average rate for each access category can be
obtained. Once a baseline is obtained, administrators should add a 10%
margin (minimally) to allow for traffic bursts. The default burst size is
320 kbytes.
7 Set the following WLAN Downstream Random Early Detection Threshold settings for each access category. An
early random drop is done when the amount of tokens for a traffic stream falls below the set threshold.
Background Traffic Set a percentage value for background traffic in the downstream
direction. This is a percentage of the maximum burst size for low
priority traffic. Background traffic exceeding the defined threshold is
dropped and a log message is generated. Background traffic
consumes the least bandwidth of any access category, so this value
can be set to a lower value once a general downstream rate is known
by the network administrator (using a time trend analysis). The default
threshold is 50%.
Best Effort Traffic Set a percentage value for best effort traffic in the downstream
direction. This is a percentage of the maximum burst size for normal
traffic. Best effort traffic exceeding the defined threshold is dropped
and a log message is generated. Best effort traffic consumes little
bandwidth, so this value can be set to a lower value once a general
downstream rate is known by the network administrator (using a time
trend analysis). The default threshold is 50%.
Video Traffic Set a percentage value for video traffic in the downstream direction.
This is a percentage of the maximum burst size for video traffic. Video
traffic exceeding the defined threshold is dropped and a log message
is generated. Video traffic consumes significant bandwidth, so this
value can be set to a higher value once a general downstream rate is
known by the network administrator (using a time trend analysis). The
default threshold is 25%.
Voice Traffic Set a percentage value for voice traffic in the downstream direction.
This is a percentage of the maximum burst size for voice traffic. Voice
traffic exceeding the defined threshold is dropped and a log message
is generated. Voice applications consume significant bandwidth, so this
value can be set to a higher value once a general upstream rate is
known by the network administrator (using a time trend analysis). The
default threshold is 0%. 0% means no early random drops will occur.
8 Configure the following parameters in respect to the intended Wireless Client Upstream Rate Limit:
Enable Select the Enable radio button to enable rate limiting for data
transmitted from the client to its associated Access Point radio and
connected wireless controller. Enabling this option does not invoke
client rate limiting for data traffic in the downstream direction. This
feature is disabled by default.
Rate Define an upstream rate limit between 50 - 1,000,000 kbps. This limit
constitutes a threshold for the maximum the number of packets
transmitted or received (from all access categories). Traffic that
exceeds the defined rate is dropped by the client and a log message is
generated. The default rate is 1,000 kbps.
Maximum Burst Size Set a maximum burst size between 2 - 1024 kbytes. The smaller the
burst, the less likely the upstream packet transmission will result in
congestion for the wireless client. The default burst size is 64 kbytes.
9 Set the following Wireless Client Upstream Random Early Detection Threshold settings for each access
category:
Background Traffic Set a percentage value for background traffic in the upstream
direction. This is a percentage of the maximum burst size for low
priority traffic. Background traffic exceeding the defined threshold is
dropped by the client and a log message is generated. The default
threshold is 50%.
Best Effort Traffic Set a percentage for best effort traffic in the upstream direction. This
is a percentage of the maximum burst size for normal traffic. Best
effort traffic exceeding the defined threshold is dropped by the client
and a log message is generated. The default threshold is 50%.
Video Traffic Set a percentage value for video traffic in the upstream direction. This
is a percentage of the maximum burst size for video traffic. Video
traffic exceeding the defined threshold is dropped by the client and a
log message is generated. The default threshold is 25%.
Voice Traffic Set a percentage value for voice traffic in the downstream direction.
This is a percentage of the maximum burst size for voice traffic. Voice
traffic exceeding the defined threshold is dropped by the client and a
log message is generated. The default threshold is 0%.0% implies no
early random drops occur.
10 Configure the following parameters in respect to the intended Wireless Client Downstream Rate Limit (traffic
from a controller or service platform to associated Access Point radios and the wireless client):
Enable Select the Enable radio button to enable rate limiting for data
transmitted from connected wireless clients to the controller or service
platform. Enabling this option does not invoke rate limiting for data
traffic in the upstream direction. This feature is disabled by default.
Rate Define a downstream rate limit between 50 - 1,000,000 kbps.This limit
constitutes a threshold for the maximum the number of packets
transmitted or received by the client. Traffic that exceeds the defined
rate is dropped and a log message is generated. The default rate is
1,000 kbytes.
Maximum Burst Size Set a maximum burst size between 2 - 64 kbytes. The smaller the
burst, the less likely the downstream packet transmission will result in
congestion for the wireless client. The default burst size is 64 kbytes.
11 Set the following Wireless Clients Downstream Random Early Detection Threshold settings:
Background Traffic Set a percentage value for background traffic in the downstream
direction. This is a percentage of the maximum burst size for low
priority traffic. Background traffic exceeding the defined threshold is
dropped by the client and a log message is generated. The default is
50%.
Best Effort Traffic Set a percentage value for best effort traffic in the downstream
direction. This is a percentage of the maximum burst size for normal
traffic. Best effort traffic exceeding the defined threshold is dropped by
the client and a log message is generated. The default is 50%.
Video Traffic Set a percentage value for video traffic in the downstream direction.
This is a percentage of the maximum burst size for video traffic. Video
traffic exceeding the defined threshold is dropped by the client and a
log message is generated. The default is 25%.
Voice Traffic Set a percentage value for voice traffic in the downstream direction.
This is a percentage of the maximum burst size for voice traffic. Voice
traffic exceeding the defined threshold is dropped by the client and a
log message is generated. The default threshold is 0%.0% means no
early random drops occur.
12 Select OK to update this WLAN’s QoS rate limit settings. Select Reset to revert to the last saved configuration.
To configure multimedia optimizations for a controller, service platform or Access Point managed WLAN:
1 Select Configuration > Wireless > WLAN QoS Policy to display existing QoS policies available to WLANs.
2 Either select the Add button to define a new WLAN QoS policy, or select an existing WLAN QoS policy and
select Edit to modify its existing configuration.
3 Select the Multimedia Optimizations tab.
Automatically Detect Select this option to have multicast packets converted to unicast to
Multicast Streams provide better overall airtime utilization and performance. The
administrator can either have the system automatically detect multicast
streams and convert all detected multicast streams to unicast, or
specify which multicast streams are converted to unicast. When the
stream is converted and queued for transmission, there are a number
of classification mechanisms that can be applied to the stream and the
administrator can select what type of classification they wan.
Manually Configure Select this option and specify a list of multicast addresses and
Multicast Adddresses classifications. Packets are accelerated when the destination addresses
matches.
6 Select OK when completed to update this WLAN's Multimedia Optimizations settings. Select Reset to revert the
screen back to its last saved configuration.
Without a dedicated QoS policy, a wireless network operates on a best-effort delivery basis, meaning all traffic has
equal priority and an equal chance of being delivered in a timely manner. When congestion occurs, all traffic has
an equal chance of being dropped!
When configuring a QoS policy for a radio, select specific network traffic, prioritize it, and use congestion-
management and congestion-avoidance techniques to provide deployment customizations best suited to each
QoS policy’s intended wireless client base.
Wireless devices, associated Access Point radios and connected clients support several Quality of Service (QoS)
techniques enabling real-time applications (such as voice and video) to co-exist simultaneously with lower priority
background applications (such as Web, E-mail and file transfers). A well designed QoS policy should:
• Classify and mark data traffic to accurately prioritize and segregate it (by access category) throughout the
network.
• Minimize the network delay and jitter for latency sensitive traffic.
• Ensure higher priority traffic has a better likelihood of delivery in the event of network congestion.
• Prevent the ineffective utilization of Access Points degrading session quality by configuring admission control
mechanisms within each radio QoS policy
Wireless clients supporting low and high priority traffic contend with one another for access and data resources.
The IEEE 802.11e amendment has defined Enhanced Distributed Channel Access (EDCA) mechanisms stating high
priority traffic can access the network sooner then lower priority traffic. The EDCA defines four traffic classes (or
access categories); voice (highest), video (next highest), best effort and background (lowest).The EDCA has
defined a time interval for each traffic class, known as the Transmit Opportunity (TXOP). The TXOP prevents traffic
of a higher priority from completely dominating the wireless medium, thus ensuring lower priority traffic is still
supported by controller or service platform associated Access Points and their connected radios.
IEEE 802.11e includes an advanced power saving technique called Unscheduled Automatic Power Save Delivery (U-
APSD) that provides a mechanism for wireless clients to retrieve packets buffered by an Access Point. U-APSD
reduces the amount of signaling frames sent from a client to retrieve buffered data from an Access Point. U-APSD
also allows Access Points to deliver buffered data frames as bursts, without backing-off between data frames.
These improvements are useful for voice clients, as they provide improved battery life and call quality.
The Wi-Fi alliance has created Wireless Multimedia (WMM) and WMM Power Save (WMM-PS) certification
programs to ensure interoperability between 802.11e WLAN infrastructure implementations and wireless clients. A
WiNG wireless network supports both WMM and WMM-Power Save techniques. WMM and WMM-PS (U-APSD) are
enabled by default in each WLAN profile.
Enabling WMM support on a WLAN just advertises the WLAN’s WMM capability and radio configuration to
wireless clients. The wireless clients must be also able to support WMM and use the values correctly while
accessing the WLAN.
WMM includes advanced parameters (CWMin, CWMax, AIFSN and TXOP) specifying back-off duration and inter-
frame spacing when accessing the network. These parameters are relevant to both connected Access Point radios
and their wireless clients. Parameters impacting Access Point transmissions to their clients are controlled using per
radio WMM settings, while parameters used by wireless clients are controlled by a WLAN’s WMM settings.
WiNG wireless devices include a Session Initiation Protocol (SIP), Skinny Call Control Protocol (SCCP) and
Application Layer Gateway (ALGs) enabling devices to identify voice streams and dynamically set voice call
bandwidth. Controllers and service platforms use the data to provide prioritization and admission control to these
devices without requiring TSPEC or WMM client support.
WiNG wireless devices support static QoS mechanisms per WLAN to provide prioritization of WLAN traffic when
legacy (non WMM) clients are deployed. When enabled on a WLAN, traffic forwarded to a client is prioritized and
forwarded based on the WLAN’s WMM access control setting.
NOTE: Statically setting a WLAN WMM access category value only prioritizes traffic
from the to the client, not from the client.
Rate limits can be applied to WLANs using groups defined locally or externally from a RADIUS server using Vendor
Specific Attributes (VSAs). Rate limits can be applied to authenticating users using 802.1X, captive portal
authentication and MAC authentication.
Implicit TSPEC A green check mark defines the policy as requiring wireless clients to
send their traffic specifications to a controller or service platform
managed Access Point before they can transmit or receive data. If
enabled, this setting applies to just this radio’s QoS policy. When
enabled, the Access Point simulates the reception of frames for any
traffic class by looking at the amount of traffic the client is receiving
and sending. If the client sends more traffic than has been configured
for an admission controlled traffic class, the traffic is forwarded at the
priority of the next non admission controlled traffic class. This applies
to clients that do not send TSPEC frames only.
Voice A green check mark indicates that Voice prioritization QoS is enabled
on the radio. A red X indicates Voice prioritization QoS is disabled on
the radio.
Best Effort A green check mark indicates that Best Effort QoS is enabled on the
radio. A red X indicates Best Effort QoS is disabled on the radio.
Video A green check mark indicates that Video prioritization QoS is enabled
on the radio. A red X indicates Video prioritization QoS is disabled on
the radio.
Background A green check mark indicates that Background prioritization QoS is
enabled on the radio. A red X indicates Background prioritization QoS
is disabled on the radio.
3 Either select Add to create a new radio QoS policy, or select one of the existing policies listed and select the
Edit button to modify its configuration. Optionally Copy or Rename QoS policies as needed.
4 Set the following Voice Access settings for the Radio QoS policy:
Transmit Ops Use the slider to set the maximum duration a device can transmit after
obtaining a transmit opportunity. When resources are shared between
a Voice over IP (VoIP) call and a low priority file transfer, bandwidth is
normally exploited by the file transfer, thus reducing call quality or
even causing the call to disconnect. With voice QoS, a VoIP call (a real-
time session), receives priority, maintaining a high level of voice quality.
For higher-priority traffic categories (like voice), the Transmit Ops
value should be set to a low number. The default value is 47.
AIFSN Set the current AIFSN between 1-15. Higher-priority traffic voice
categories should have lower AIFSNs than lower-priority traffic
categories. This will cause lower-priority traffic to wait longer before
attempting access. The default value is 1.
ECW Min The ECW Min is combined with the ECW Max to create a contention
value in the form of a numerical range. From this range, a random
number is selected for the back off mechanism. Lower values are used
for higher priority traffic. The available range is from 0-15. The default
value is 2.
ECW Max The ECW Max is combined with the ECW Min to create a contention
value in the form of a numerical range. From this range, a random
number is selected for the back off mechanism. Lower values are used
for higher priority traffic. The available range is from 0-15. The default
value is 3.
5 Set the following Normal (Best Effort) Access settings for the radio QoS policy:
Transmit Ops Use the slider to set the maximum duration a device can transmit after
obtaining a transmit opportunity. For higher-priority traffic categories,
this value should be set to a low number. The default value is 0.
AIFSN Set the current AIFSN between1-15. Lower priority traffic categories
should have higher AIFSNs than higher priority traffic categories. This
will cause lower priority traffic to wait longer before attempting
access. The default value is 3.
ECW Min The ECW Min is combined with the ECW Max to create a contention
value in the form of a numerical range. From this range, a random
number is selected for the back off mechanism. Higher values are used
for lower priority traffic (like Normal). The available range is from 0-15.
The default value is 4.
ECW Max The ECW Max is combined with the ECW Min to create a contention
value in the form of a numerical range. From this range, a random
number is selected for the back off mechanism. Higher values are used
for lower priority traffic (like Normal). The available range is from 0-15.
The default value is 6.
6 Set the following Video Access settings for the Radio QoS policy:
Transmit Ops Use the spinner control to set the maximum duration a radio can
transmit after obtaining a transmit opportunity. For higher-priority
traffic categories (like video), this value should be set to a low number.
The default value is 94.
AIFSN Set the current AIFSN between 1-15. Higher-priority traffic categories
should have lower AIFSNs than lower-priority traffic categories. This
will cause lower-priority traffic to wait longer before attempting
access. The default value is 1.
ECW Min The ECW Min is combined with the ECW Max to create a contention
value in the form of a numerical range. From this range, a random
number is selected for the back off mechanism. Lower values are used
for higher priority traffic (like video). The available range is from 0-15.
The default value is 3.
ECW Max The ECW Max is combined with the ECW Min to create a contention
value in the form of a numerical range. From this range, a random
number is selected for the back off mechanism. Lower values are used
for higher priority traffic (like video). The available range is from 0-15.
The default value is 4.
7 Set the following Low (Background) Access settings for the radio QoS policy:
Transmit Ops Use the slider to set the maximum duration a device can transmit after
obtaining a transmit opportunity. For higher-priority traffic categories,
this value should be set to a low number. The default value is 0.
AIFSN Set the current AIFSN between 1-15. Lower priority traffic categories
should have higher AIFSNs than higher priority traffic categories. This
will cause lower priority traffic to wait longer before attempting
access. The default value is 7.
ECW Min The ECW Min is combined with the ECW Max to create a contention
value in the form of a numerical range. From this range, a random
number is selected for the back off mechanism. Higher values are used
for lower priority traffic (like Low). The available range is from 0-15.
The default value is 4.
ECW Max The ECW Max is combined with the ECW Min to create a contention
value in the form of a numerical range. From this range, a random
number is selected for the back off mechanism. Lower values are used
for higher priority traffic (like video). The available range is from 0-15.
The default value is 10.
8 Select OK when completed to update the radio QoS settings for this policy. Select Reset to revert the WMM
screen back to its last saved configuration.
9 Select the Admission Control tab to configure an admission control configuration for selected radio QoS policy.
Admission control requires clients send their traffic specifications (TSPEC) to a controller or service platform
managed Access Point before they can transmit or receive data.
The name of the Radio QoS policy for which the admission control settings apply displays in the banner of the
QoS Policy screen.
Maximum Wireless Set the number of voice supported wireless clients allowed to exist
Clients (and consume bandwidth) within the radio’s QoS policy. Select from
an available range of 0-256 clients. Consider setting this value
proportionally to the number of other QoS policies supporting the
voice access category, as wireless clients supporting voice use a
greater proportion of resources than lower bandwidth traffic (like low
and best effort categories). The default value is 100 clients.
Maximum Roamed Set the number of voice supported wireless clients allowed to roam to
Wireless Clients a different radio. Select from a range of 0-256 clients. The default
value is 10 roamed clients.
Reserved for Roam Set the roam utilization (in the form of a percentage of the radio’s
bandwidth) allotted to admission control for voice supported clients
who have roamed to a different radio. The available percentage range
is from 0-150%, with 150% available to account for over-subscription.
The default value is 10%.
13 Set the following Normal (Best Effort) Access admission control settings for this radio QoS policy
Enable Best Effort Select the check box to enable admission control for this policy’s video
traffic. Only normal background traffic admission control is enabled,
not any of the other access categories (each access category must be
separately enabled and configured). This feature is disabled by default.
Maximum Airtime Set the maximum airtime (in the form of a percentage of the radio’s
bandwidth) allotted to admission control for normal background client
traffic. The available percentage range is from 0-150%, with 150%
being available to account for over-subscription. This value helps
ensure the radio’s bandwidth is available for lower bandwidth normal
traffic (if anticipated to proliferate the wireless medium). Normal
background traffic only needs a short radio airtime to process, so set
an intermediate airtime value if this radio QoS policy is reserved for
background data support. The default value is 75%.
Maximum Wireless Set the number of wireless clients supporting background traffic
Clients allowed to exist (and consume bandwidth) within the radio’s QoS
policy. Select from an available range of 0-256 clients. The default
value is 100 clients.
Maximum Roamed Set the number of voice supported wireless clients allowed to roam to
Wireless Clients a different radio. Select from a range of 0-256 clients. The default
value is 10 roamed clients.
Reserved for Roam Set the roam utilization (in the form of a percentage of the radio’s
bandwidth) allotted to admission control for normal background
supported clients who have roamed to a different radio. The available
percentage range is from 0-150%, with 150% available to account for
over-subscription. The default value is 10%.
14 Set the following Video Access admission control settings for this radio QoS policy:
Enable Video Select the check box to enable admission control for this policy’s video
traffic. Only video traffic admission control is enabled, not any of the
other access categories (each access category must be separately
enabled and configured). This feature is disabled by default.
Maximum Airtime Set the maximum airtime (in the form of a percentage of the radio’s
bandwidth) allotted to admission control for video supported client
traffic. The available percentage range is from 0-150%, with 150% being
available to account for over-subscription. This value helps ensure the
radio’s bandwidth is available for high bandwidth video traffic (if
anticipated on the wireless medium) or other access category traffic if
video support is not prioritized. Video traffic requires longer radio
airtime to process, so set a longer airtime value if this radio QoS policy
is intended to support video. The default value is 75%.
Maximum Wireless Set the number of wireless clients supporting background traffic
Clients allowed to exist (and consume bandwidth) within the radio’s QoS
policy. Select from an available range of 0-256 clients. The default
value is 100 clients.
Maximum Roamed Set the number of video supported wireless clients allowed to roam to
Wireless Clients a different radio. Select from a range of 0-256 clients. The default
value is 10 roamed clients.
Reserved for Roam Set the roam utilization (in the form of a percentage of the radio’s
bandwidth) allotted to admission control for video supported clients
who have roamed to a different radio. The available percentage range
is from 0-150%, with 150% accounting for over-subscription. The
default value is 10%.
15 Set the following Low (Background) Access admission control settings for this radio QoS policy:
Enable Background Select the check box to enable admission control for this policy’s lower
priority best effort traffic. Only low best effort traffic admission control
is enabled, not any of the other access categories (each access
category must be separately enabled and configured).
Maximum Airtime Set the maximum airtime (in the form of a percentage of the radio’s
bandwidth) allotted to admission control for low, best effort, client
traffic. The available percentage range is from 0-150%, with 150% being
available to account for over-subscription. Best effort traffic only needs
a short radio airtime to process, so set an intermediate airtime value if
this radio QoS policy is reserved to support background data. The
default value is 75%.
Maximum Wireless Set the number of low and best effort supported wireless clients
Clients allowed to exist (and consume bandwidth) within the radio’s QoS
policy. Select from an available range of 0-256 clients. The default
value is 100 clients.
Maximum Roamed Set the number of low and best effort supported wireless clients
Wireless Clients allowed to roam to a different radio. Select from a range of 0-256
clients. The default value is 10 roamed clients.
Reserved for Roam Set the roam utilization (in the form of a percentage of the radio’s
bandwidth) allotted to admission control for normal background
supported clients who have roamed to a different radio. The available
percentage range is from 0-150%, with 150% available to account for
over-subscription. The default value is 10%.
16 Select the Multimedia Optimizations tab to set the advanced multimedia QoS and Smart Aggregation
configuration for selected radio QoS policy.
• When an administrator defined interval has elapsed since the first frame (of a set of frames to be
aggregated) was received
• When an administrator defined interval has elapsed since the last frame (not necessarily the final frame) of a
set of frames to be aggregated was received
With this enhancement, an aggregation delay is set uniquely for each traffic class. For example, voice traffic
might not be aggregated, but sent immediately. Whereas, background data traffic is set a delay for
aggregating frames, and these aggregated frames are sent.
Smart Aggregation Select to enable smart aggregation and dynamically define when an
aggregated frame is transmitted. Smart aggregation is disabled by
default.
Max Delay for Best Set the maximum time (in milliseconds) to delay best effort traffic. The
Effort default setting is 150 milliseconds.
Max Delay for Set the maximum time (in milliseconds) to delay background traffic.
Background The default setting is 250 milliseconds.
Max Delay for Streaming Set the maximum time (in milliseconds) to delay streaming video
Video traffic. The default setting is 150 milliseconds.
Max Delay for Video Set the maximum time (in milliseconds) to delay video conferencing
Conferencing traffic. The default setting is 40 milliseconds.
Max Delay for Voice Set the maximum time (in milliseconds) to delay voice traffic. The
default setting is 0 milliseconds.
Minimum frames per Set the minimum number of frames to aggregate in a frame before it
Aggregate limit is transmitted. The default setting is 8 frames.
Max Mesh Links Set the maximum number of mesh hops for smart aggregation. The
default setting is 3.
Select OK to update the radio QoS settings for this policy. Select Reset to revert to the last saved configuration.
An association ACL is a policy-based ACL that either prevents or allows wireless clients from connecting to a
WLAN.
An association ACL affords a system administrator the ability to grant or restrict client access by specifying a
wireless client MAC address or range of MAC addresses to either include or exclude from connectivity.
Association ACLs are applied to WLANs as an additional access control mechanism. They can be applied to
WLANs from within a WLAN Policy’s Advanced configuration screen. For more information on applying an existing
Association ACL to a WLAN, see Configuring Advanced WLAN Settings.
Self Monitoring At Run Time RF Management (Smart RF) is a WiNG innovation designed to simplify RF
configurations for new deployments, while (over time) providing on-going deployment optimization radio
performance improvements.
A Smart RF policy can reduce deployment costs by scanning the RF environment to determine the best channel
and transmit power configuration for each radio. Smart RF policies can be applied to specific RF Domains, to apply
site specific deployment configurations and self-healing values to groups of devices within pre-defined physical RF
coverage areas.
Smart RF centralizes the decision process and makes intelligent RF configuration decisions using information
obtained from the RF environment. Smart RF helps reduce ongoing management and maintenance costs by
constantly monitoring the network for external interference, neighbor interference, non-WiFi interference and client
connectivity. Smart RF then intelligently applies various algorithms to arrive at the optimal channel and power
selection for all Access Points in the network and constantly reacts to changes in the RF environment.
Smart RF also provides self-healing functions by monitoring the network in real-time and provides automatic
mitigation from potentially problematic events such as radio interference, non-WiFi interference (noise), external
WiFi interference, coverage holes and radio failures. Smart RF employs self-healing to enable a WLAN to better
maintain wireless client performance and site coverage during dynamic RF environment changes, which typically
require manual reconfiguration to resolve.
Smart RF is supported on any RF Domain manager. In standalone environments, individual controllers, service
platforms or Access Points manage the calibration and monitoring phases. In clustered environments, a single
controller or service platform is elected a Smart RF master and the remaining cluster members operate as Smart
RF clients. In cluster operation, the Smart RF master co-ordinates the calibration and configuration and during the
monitoring phase receives information from the Smart RF clients.
If a Smart RF managed radio is operating in WLAN mode on a channel requiring DFS, it will switch channels if
radar is detected.
• If Smart RF is enabled, the radio picks a channel defined in the Smart RF policy.
• If Smart RF is disabled, but a Smart RF policy is mapped, the radio picks a channels specified in the Smart RF
policy
• If no SMART RF policy is mapped, the radio selects a random channel
If the radio is a dedicated sensor, it stops termination on that channel if a neighboring Access Points detects radar.
The Access Point attempts to come back to its original channel (statically configured or selected by Smart RF)
after the channel evacuation period has expired.
Change this behavior using a no dfs-rehome command from the controller or service platform CLI. This keeps the
radio on the newly selected channel and prevents the radio from coming back to the original channel, even after
the channel evacuation period.
The user has the option of displaying the configurations of each Smart RF Policy defined thus far, or referring to
the Smart RF Browser and either selecting individual Smart RF polices or selecting existing RF Domains to review
which Smart RF policies have been applied. For more information on how RF Domains function, and how to apply
a Smart RF policy, see About RF Domains and Managing RF Domains.
Coverage Hole Recovery Displays a green check mark if coverage hole recovery has been
enabled for the listed policy. A red “X” designates coverage hole
recovery being disabled.
Neighbor Recovery Displays a green check mark if neighbor recovery has been enabled
for the listed policy. A red “X” designates neighbor recovery being
disabled.
3 Select Add to create a new Smart RF policy, Edit to modify the attributes of a existing policy or Delete to
remove obsolete policies from the list of those available. Optionally Copy or Rename a list as needed.
The Basic Configuration screen displays by default for the new or modified Smart RF policy.
Interference Recovery Select the check box to enable Interference Recovery from neighboring
radios and other sources of WiFi and non-WiFi interference when
excess noise and interference is detected within the Smart RF
supported radio coverage area. Smart RF provides mitigation from
interference sources by monitoring the noise levels and other RF
parameters on an Access Point radio’s current channel. When a noise
threshold is exceeded, Smart RF can select an alternative channel with
less interference. To avoid channel flapping, a hold timer is defined
which disables interference avoidance for a specific period of time
upon detection. Interference Recovery is enabled by default.
Coverage Hole Recovery Select the check box to enable Coverage Hole Recovery when a radio
coverage hole is detected within the Smart RF supported radio
coverage area. When coverage hole is detected, Smart RF first
determines the power increase needed based on the signal to noise
ratio for a client as seen by the Access Point radio. If a client’s signal to
noise value is above the threshold, the transmit power is increased
until the signal to noise rate falls below the threshold.
Neighbor Recovery Select the check box to enable Neighbor Recovery when a failed radio
is detected within the Smart RF supported radio coverage area. Smart
RF can provide automatic recovery by instructing neighboring APs to
increase their transmit power to compensate for the coverage loss.
Neighbor recovery is enabled by default when the sensitivity setting is
medium.
5 Refer to the Calibration Assignment field to define whether Smart RF Calibration and radio grouping is
conducted by area or floor. Both options are disabled by default.
6 Select OK to update the Smart RF Basic Configuration settings for this policy. Select Reset to revert to the last
saved configuration.
7 Select Channel and Power.
Use the Channel and Power screen to refine Smart RF power settings over both 5 and 2.4 GHz radios and
select channel settings in respect to the device channel usage.
NOTE: The Power Settings and Channel Settings parameters are only enabled when
Custom or Medium is selected as the Sensitivity setting from the Basic Configuration
screen.
8 Refer to the Power Settings field to define Smart RF recovery settings for either the selected 5.0 GHz (802.11a)
or 2.4 GHz (802.11bg) radio.
5 GHz Minimum Power Use the spinner control to select a 1 - 20 dBm minimum power level for
Smart RF to assign to a radio in the 5 GHz band. 4 dBm is the default
setting.
5 GHz Maximum Power Use the spinner control to select a 1 - 20 dBm maximum power level
Smart RF can assign a radio in the 5 GHz band. 17 dBm is the default
setting.
2.4 GHz Minimum Power Use the spinner control to select a 1 - 20 dBm minimum power level
Smart RF can assign a radio in the 2.4 GHz band. 4 dBm is the default
setting.
2.4 GHz Maximum Use the spinner control to select a 1 - 20 dBm maximum power level
Power Smart RF can assign a radio in the 2.4 GHz band. 17 dBm is the default
setting.
9 Set the following Channel Settings for the 5.0 GHz and 2.4 GHz radios:
5 GHz Channels Use the Select drop-down menu to define the 5 GHz channels used for
Smart RF assignments.
5 GHz Channel Width 20 and 40 MHz channel widths are supported by the 802.11a radio. 20/
40 MHz operation (the default setting for the 5 GHz radio) allows the
Access Point to receive packets from clients using 20 MHz of
bandwidth while transmitting a packet using 40 MHz bandwidth. This
mode is supported for 11n users on both the 2.4 and 5 GHz radios. If an
11n user selects two channels (a Primary and Secondary channel), the
system is configured for dynamic 20/40 operation. When 20/40 is
selected, clients can take advantage of wider channels. 802.11n clients
experience improved throughput using 40 MHz while legacy clients
(either 802.11a or 802.11b/g depending on the radio selected) can still
be serviced without interruption using 20 MHz. Select Automatic to
enable automatic assignment of channels to working radios to avoid
channel overlap and avoid interference from external RF sources.
40MHz is the default setting. If deploying an 802.11ac supported
Access Point, 80MHz channel width options are available as well.
2.4 GHz Channels Set the 2.4 GHz channels used in Smart RF scans.
2.4 GHz Channel Width 20 and 40 MHz channel widths are supported by the 802.11a radio. 20
MHz is the default setting for 2.4 GHz radios. 20/40 MHz operation
(the default setting for the 5 GHz radio) allows the Access Point to
receive packets from clients using 20 MHz of bandwidth while
transmitting a packet using 40 MHz bandwidth. This mode is
supported for 11n users on both the 2.4 and 5 GHz radios. If an 11n user
selects two channels (a Primary and Secondary channel), the system is
configured for dynamic 20/40 operation. When 20/40 is selected,
clients can take advantage of wider channels. 802.11n clients
experience improved throughput using 40 MHz while legacy clients
(either 802.11a or 802.11b/g depending on the radio selected) can still
be serviced without interruption using 20 MHz. Select Automatic to
enable automatic assignment of channels to working radios to avoid
channel overlap and avoid interference from external RF sources.
20MHz is the default setting.
10 Select + Add Row and set the following Area Based Channel Settings for the Smart RF policy:
Area Specify the deployment area assigned to the listed policy when
deployed a means of identifying the devices physical locations.
Band Specify the radio band, either 2.4 GHz or 5 GHz, for the Smart RF
policy assigned to the specified area.
Channel List Specify the channels associated with the Smart RF policy for the
specified area and band.
11 Select OK to update the Smart RF Channel and Power settings for this policy. Select Reset to revert to the last
saved configuration.
12 Select the Scanning Configuration tab.
NOTE: The monitoring and scanning parameters within the Scanning Configuration
screen are only enabled when Custom is selected as the Sensitivity setting from the
Basic Configuration screen.
Index Select an Index value from 1 - 3 for awareness overrides. The overrides
are executed based on index, with the lowest index being executed
first.
Day Use the drop-down menu to select a day of the week to apply the
override. Selecting All will apply the policy every day. Selecting
weekends will apply the policy on Saturdays and Sundays only.
Selecting weekdays will apply the policy on Monday, Tuesday,
Wednesday, Thursday and Friday. Selecting individual days of the week
will apply the policy only on the selected day.
Start Time This value sets the starting time of day(s) that the overrides will be
activated. Use the spinner controls to select the hour and minute, in
12h time format. Then use the radio button to choose AM or PM.
End Time This value sets the ending time of day(s) that the overrides will be
disabled. Use the spinner controls to select the hour and minute, in 12h
time format. Then use the radio button to choose AM or PM.
15 Set the following Scanning Configurations for both the 2.4 and 5.0 GHz radio bands:
Duration Set a channel scan duration (from 20 - 150 milliseconds) Access Point
radios use to monitor devices within the network and, if necessary,
perform self healing and neighbor recovery to compensate for
coverage area losses within a RF Domain. The default setting is 50
milliseconds for both the 2.4 and 5 GHz bands.
Frequency Set the scan frequency using the drop-down menu. Set a scan
frequency in either Seconds (1 - 120) or Minutes (0 - 2). The default
setting is 6 seconds for both the 5 and 2.4 GHz bands.
Extended Scan Use the spinner control to set an extended scan frequency between 0 -
Frequency 50. This is the frequency radios scan channels on other than their peer
radios. The default setting is 5 for both the 5 and 2.4 GHz bands.
Sample Count Use the spinner control to set a sample scan count value between 1 -
15. This is the number of RF readings radios gather before they send
the data to the Smart RF master. The default setting is 5 for both the 5
and 2.4 GHz bands
Client Aware Scanning Set a client awareness count (number of clients from 1 - 255) for off
channel scans of either the 5 GHz or 2.4 GHz band.
Power Save Aware Select either the Dynamic, Strict or Disable radio button to define how
Scanning power save scanning is set for Smart RF. Strict disables smart
monitoring as long as a power save capable client is associated to a
radio. Dynamic disables smart monitoring as long as there is data
buffered for a power save client at the radio. The default setting is
Dynamic for both the 5 and 2.4 GHz bands.
Voice Aware Scanning Select either the Dynamic, Strict or Disable radio button to define how
voice aware recognition is set for Smart RF. Strict disables smart
monitoring as long as a voice client is associated to a radio. Dynamic
disables smart monitoring as long as there is data buffered for a voice
client at the radio. The default setting is Dynamic for both the 5 and
2.4 GHz bands.
Transmit Load Aware Select this option to set a transmit load percentage from 1 - 100
Scanning serving as a threshold before scanning is avoided for an Access Point’s
2.4 GHz radio.
16 Select OK to update the Smart RF Scanning Configuration settings for this policy. Select Reset to revert to the
last saved configuration.
17 Select Recovery.
NOTE: The recovery parameters within the Neighbor Recovery, Interference and
Coverage Hole Recovery tabs are only enabled when Custom is selected as the
Sensitivity setting from the Basic Configuration screen.
The Neighbor Recovery tab displays by default. Use the Neighbor, Interference and Coverage Hole recovery
tabs to define how 5 and 2.4 GHz radios compensate for failed neighbor radios, interference impacting the
Smart RF supported network and detected coverage holes requiring neighbor radio intervention.
18 Set the Hold Time for the Smart RF configuration.
Power Hold Time Defines the minimum time between two radio power changes during
neighbor recovery. Set the time in either Seconds (0 - 3,600), Minutes
(0 - 60) or Hours (0 - 1). The default setting is 0 seconds.
Noise Factor Define the noise factor (level of network interference detected) taken
into account by Smart RF during interference recovery calculations.
The default setting is 1.50.
Channel Hold Time Defines the minimum time between channel changes during neighbor
recovery. Set the time in either Seconds (0 - 86,400), Minutes (0 -
1,440) or Hours (0 - 24) or Days (0 - 1). The default setting is 30
minutes.
Client Threshold Use the spinner to set a client threshold for the Smart RF policy
between 1 - 255. If the set threshold number of clients are connected
to a radio, it does not change its channel even though it requires one,
based on the interference recovery determination made by the smart
master. The default is 50.
5 GHz Channel Switch Use the spinner to set a channel interference delta (between 5 - 35
Delta dBm) for the 5.0 GHz radio. This parameter is the difference between
interference levels on the current channel and a prospective channel. If
the difference is below the configured threshold, the channel will not
change. The default setting is 20 dBm.
2.4 GHz Channel Switch Use the spinner to set a channel interference delta (between 5 - 35
Delta dBm) for the 2.4 GHz radio. This parameter is the difference between
interference levels on the current channel and a prospective channel. If
the difference is below the configured threshold, the channel will not
change. The default setting is 20 dBm.
24 Select OK to update the Smart RF Interference Recovery settings for this policy. Select Reset to revert to the
last saved configuration.
25 Select the Coverage Hole Recovery tab.
Figure 6-47 Smart RF Advanced Configuration screen - Coverage Hole Recovery tab
26 Set the following Coverage Hole Recovery for 2.4 GHz and 5.0 GHz parameters:
Client Threshold Use the spinner to set a client threshold for the Smart RF policy
between 1 - 255. This is the minimum number of clients a radio should
have associated in order for coverage hole recovery to trigger. The
default setting is 1.
SNR Threshold Use the spinner control to set a signal to noise threshold (between 1 -
75 dB). This is the signal to noise threshold for an associated client as
seen by its associated Access Point radio. When exceeded, the radio
increases its transmit power in order to increase coverage for the
associated client. The default value is 20 dB.
Coverage Interval Define the interval coverage hole recovery should be initiated after a
coverage hole is detected. The default is 10 seconds for both the 2.4
and 5.0 GHz radios.
Interval Define the interval coverage hole recovery should be conducted before
a coverage hole is detected. The default is 30 seconds for both the 2.4
and 5.0 GHz radios.
27 Select OK to update the Smart RF coverage hole recovery settings for this policy. Select Reset to revert to the
last saved configuration.
Change this behavior using a no dfs-rehome command from the controller or service platform CLI. This keeps the
radio on the newly selected channel and prevents the radio from coming back to the original channel, even after
the channel evacuation period.
MeshConnex is a mesh networking technology that is comparable to the 802.11s mesh networking specification.
MeshConnex meshing uses a hybrid proactive/on-demand path selection protocol, similar to Ad hoc On Demand
Distance Vector (AODV) routing protocols. This allows it to form efficient paths using multiple attachment points
to a distribution WAN, or form purely ad-hoc peer-to-peer mesh networks in the absence of a WAN. Each device
in the MeshConnex mesh proactively manages its own path to the distribution WAN, but can also form peer-to-
peer paths on demand to improve forwarding efficiency. MeshConnex is not compatible with MiNT Based meshing,
though the two technologies can be enabled simultaneously in certain circumstances.
MeshConnex is designed for large-scale, high-mobility outdoor mesh deployments. MeshConnex continually
gathers data from beacons and transmission attempts to estimate the efficiency and throughput of each MP-to-MP
link. MeshConnex uses this data to dynamically form and continually maintain paths for forwarding network
frames.
In MeshConnex systems, a mesh point (MP) is a virtual mesh networking instance on a device, similar to a WLAN
AP. On each device, up to 4 MPs can be created and 2 can be created per radio. MPs can be configured to use one
or both radios in the device. If the MP is configured to use both radios, the path selection protocols will continually
select the best radio to reach each destination. Each MP participates in a single Mesh Network, defined by the
MeshID. The MeshID is typically a descriptive network name, similar to the SSID of a WLAN. All MPs configured to
use the same MeshID attempt to form a mesh and interoperate. The MeshID allows overlapping mesh networks to
discriminate and disregard MPs belonging to different networks.
Control VLAN Displays the VLAN (virtual interface ID) for the control VLAN on each
of the configured mesh points.
Allowed VLANs Displays the list of VLANs allowed on each configured mesh point.
Security Mode Displays the security assigned to each configured mesh point. The field
displays None for no security or PSK for pre-shared key authentication.
Mesh QoS Policy Displays the mesh Quality of Service policy associated to each
configured mesh point.
3 Select Add to create a new MeshConnex policy, Edit to modify the attributes of a existing policy or Delete to
remove obsolete policies from the list of those available. Optionally Copy or Rename a policy as needed.
The Configuration screen displays by default for the new or modified MeshConnex policy.
Is Root Select this option to specify the mesh point as a root in the mesh
topology.
Control VLAN Use the spinner control to specify a VLAN to carry meshpoint control
traffic. The valid range for control VLAN is between 1 and 4094. The
default value is VLAN 1.
Allowed VLANs Specify the VLANs allowed to pass traffic on the mesh point. Separate
all VLANs with a comma. To specify a range of allowed VLANs
separate the starting VLAN and the ending VLAN with a hyphen.
Neighbor Inactivity Specify a timeout in seconds, minutes, hours or days, up to a maximum
Timeout of 1 day. This represents the allowed interval between frames received
from a neighbor before their client privileges are revoked. The default
value is 2 minutes.
Description Enter a 64 character maximum description about the mesh point
configuration.
5 Select OK to update the MeshConnex Configuration settings for this policy. Select Reset to revert to the last
saved configuration.
6 Select the Security tab.
7 Refer to the Select Authentication field to define an authentication method for the mesh policy.
Security Mode Select a security authentication mode for the mesh point. Select None
to have no authentication for the mesh point. Select EAP to use a
secured credential exchange, dynamic keying and strong encryption. If
selecting EAP, refer to the EAP PEAP Authentication field at the
bottom of the screen and define the credentials of an EAP user and
trustpoint. Select PSK to set a pre-shared key as the authentication for
the mesh-point. If PSK is selected, enter a pre-shared key in the Key
Settings field.
8 Set the following Key Settings for the mesh point:
Pre-Shared Key When the security mode is set as PSK, enter a 64 character HEX or an
8-63 ASCII character passphrase used for authentication on the mesh
point.
9 Set the following Key Rotation for the mesh point:
Unicast Rotation Interval Define an interval for unicast key transmission (30 -86,400 seconds).
Broadcast Rotation When enabled, the key indices used for encrypting/decrypting
Interval broadcast traffic is alternatively rotated based on the defined interval.
Define an interval for broadcast key transmission in seconds (30-
86,400). Key rotation enhances the broadcast traffic security on the
WLAN.
10 Set the following EAP PEAP Authentication settings if using EAP to secure the mesh point:
User ID Create a 32 character maximum user name for a peap-mschapv2
authentication credential exchange.
Password Define a 32 character maximum password for the EAP PEAP username
created above.
Trust Point Provide the 64 character maximum name of the trustpoint used for
installing the CA certificate and validating the server certificate.
EAP TLS Provide the 64 character maximum name of the trustpoint used for
installing the client certificate, client private key and CA certificate.
Type Use the drop-down menu to select the EAP authentication method
used by the supplicant. The default EAP type is PEAP-MS-CHAPv2.
EAP Identity Enter the 32 character maximum identity string used during phase 1
authentication. This string does not need to represent the identity of
the user, rather an anonymous identity string.
AAA Policy Select an existing AAA Policy from the drop-down menu to apply to
this user’s mesh point EAP configuration. Authentication, authorization,
and accounting (AAA) is a framework for intelligently controlling
access to the network, enforcing user authorization policies and
auditing and tracking usage. These combined processes are central for
securing wireless client resources and wireless network data flows.
11 Select OK to save the changes made to the configuration. Select Reset to revert to the last saved configuration.
12 Select the Radio Rates tab.
combination of 8 data rates, bonded channels, multiple spatial streams, different guard intervals and
modulation types. Clients can associate as long as they support basic MCS (as well as non-11n basic rates).
14 Select OK to save the changes made to the configuration. Select Reset to revert to the last saved configuration.
Mesh Quality of Service (QoS) provides a data traffic prioritization scheme. QoS reduces congestion from excessive
traffic. If there is enough bandwidth for all users and applications (unlikely because excessive bandwidth comes at
a very high cost), then applying QoS has very little value. QoS provides policy enforcement for mission-critical
applications and/or users that have critical bandwidth requirements when bandwidth is shared by different users
and applications.
Mesh QoS helps ensure each mesh point on the mesh network receives a fair share of the overall bandwidth, either
equally or as per the proportion configured. Packets directed towards clients are classified into categories such as
video, voice and data. packets within each category are processed based on the weights defined for each mesh
point.
The Quality of Service screen displays a list of Mesh QoS policies available to mesh points. Each mesh QoS policy
can be selected to edit its properties. If none of the exiting Mesh QoS policies supports an ideal QoS configuration
for the intended data traffic of this mesh point, select the Add button to create new policy. Select an existing mesh
QoS policy and select Edit to change the properties of the Mesh QoS policy.
5 Set the following From Air Upstream Random Early Detection Threshold settings for each access category. An
early random drop is done when a traffic stream falls below the set threshold.
Background Traffic Set a percentage value for background traffic in the transmit direction.
This is a percentage of the maximum burst size for low priority traffic.
Background traffic exceeding the defined threshold is dropped and a
log message is generated. Background traffic consumes the least
bandwidth of any access category, so this value can be set to a lower
value once a general transmit rate is known by the network
administrator (using a time trend analysis). The default threshold is
50%.
Best Effort Traffic Set a percentage value for best effort traffic in the transmit direction.
This is a percentage of the maximum burst size for normal priority
traffic. Best effort traffic exceeding the defined threshold is dropped
and a log message is generated. Best effort traffic consumes little
bandwidth, so this value can be set to a lower value once a general
transmit rate is known by the network administrator (using a time
trend analysis). The default threshold is 50%.
Video Traffic Set a percentage value for video traffic in the transmit direction. This is
a percentage of the maximum burst size for video traffic. Video traffic
exceeding the defined threshold is dropped and a log message is
generated. Video traffic consumes significant bandwidth, so this value
can be set to a higher value once a general transmit rate is known by
the network administrator (using a time trend analysis). The default
threshold is 25%.
Voice Traffic Set a percentage value for voice traffic in the transmit direction. This is
a percentage of the maximum burst size for voice traffic. Voice traffic
exceeding the defined threshold is dropped and a log message is
generated. Voice applications consume significant bandwidth, so this
value can be set to a higher value once a general upstream rate is
known by the network administrator (using a time trend analysis). The
default threshold is 0%.
6 Configure the following parameters in respect to the intended To Air Downstream Rate Limit, or traffic from
neighbors to associated Access Point radios and the controller or service platform:
Mesh Rx Rate Limit Select the check box to enable rate limiting for all data transmitted by
the device to any mesh point in the mesh. This feature is disabled by
default.
Rate Define an transmit rate limit between 50 - 1,000,000 kbps. This limit
constitutes a threshold for the maximum the number of packets
transmitted or received over the mesh point (from all access
categories). Traffic that exceeds the defined rate is dropped and a log
message is generated. The default setting is 5000 kbps.
Maximum Burst Size Set a maximum burst size between 2 - 1024 kbytes. The smaller the
burst, the less likely the receive packet transmission will result in
congestion for the mesh points wireless client destinations. By
trending the typical number of ARP, broadcast, multicast and unknown
unicast packets over a period of time, the average rate for each access
category can be obtained. Once a baseline is obtained, administrators
should then add a minimum of a 10% margin to allow for traffic bursts
at the site. The default burst size is 320 kbytes.
7 Set the following To Air Downstream Random Early Detection Threshold settings for each access category. An
early random drop occurs when the amount of tokens for a traffic stream falls below the set threshold.
Background Traffic Set a percentage value for background traffic in the receive direction.
This is a percentage of the maximum burst size for low priority traffic.
Background traffic exceeding the defined threshold is dropped and a
log message is generated. Background traffic consumes the least
bandwidth of any access category, so this value can be set to a lower
value once a general receive rate is known by the network
administrator (using a time trend analysis). The default threshold is
50%.
Best Effort Traffic Set a percentage value for best effort traffic in the receive direction.
This is a percentage of the maximum burst size for normal traffic. Best
effort traffic exceeding the defined threshold is dropped and a log
message is generated. Best effort traffic consumes little bandwidth, so
this value can be set to a lower value once a general receive rate is
known by the network administrator (using a time trend analysis). The
default threshold is 50%.
Video Traffic Set a percentage value for video traffic in the receive direction. This is
a percentage of the maximum burst size for video traffic. Video traffic
exceeding the defined threshold is dropped and a log message is
generated. Video traffic consumes significant bandwidth, so this value
can be set to a higher value once a general receive rate is known by
the network administrator (using a time trend analysis). The default
threshold is 25%.
Voice Traffic Set a percentage value for voice traffic in the receive direction. This is
a percentage of the maximum burst size for voice traffic. Voice traffic
exceeding the defined threshold is dropped and a log message is
generated. Voice applications consume significant bandwidth, so this
value can be set to a higher value once a general transmit rate is
known by the network administrator (using a time trend analysis). The
default threshold is 0%. 0% means no early random drops will occur.
8 Configure the following parameters in respect to the intended Neighbor Settings From Air Upstream Rate Limit:
Neighbor Rx Rate Limit Select the radio button to enable rate limiting for data transmitted
from the client to its associated Access Point radio and connected
controller or service platform. Enabling this option does not invoke
client rate limiting for data traffic in the receive direction. This feature
is disabled by default.
Rate Define an transmit rate limit between 50 - 1,000,000 kbps. This limit
constitutes a threshold for the maximum the number of packets
transmitted or received (from all access categories). Traffic that
exceeds the defined rate is dropped by the client and a log message is
generated. The default rate is 1,000 kbps.
Maximum Burst Size Set a maximum burst size between 2 - 1024 kbytes. The smaller the
burst, the less likely the transmit packet transmission will result in
congestion for the wireless client. The default burst size is 64 kbytes.
9 Set the following Neighbor Settings From Air Upstream Random Early Detection Threshold for each access
category:
Background Traffic Set a percentage value for background traffic in the transmit direction.
This is a percentage of the maximum burst size for low priority traffic.
Background traffic exceeding the defined threshold is dropped by the
client and a log message is generated. The default threshold is 50%.
Best Effort Traffic Set a percentage value for best effort traffic in the transmit direction.
This is a percentage of the maximum burst size for normal traffic. Best
effort traffic exceeding the defined threshold is dropped by the client
and a log message is generated. The default threshold is 50%.
Video Traffic Set a percentage value for video traffic in the transmit direction. This is
a percentage of the maximum burst size for video traffic. Video traffic
exceeding the defined threshold is dropped by the client and a log
message is generated. The default threshold is 25%.
Voice Traffic Set a percentage value for voice traffic in the receive direction. This is
a percentage of the maximum burst size for voice traffic. Voice traffic
exceeding the defined threshold is dropped by the client and a log
message is generated. The default threshold is 0%.0% implies no early
random drops will occur.
10 Configure the following parameters in respect to the intended Neighbor To Air Downstream Rate Limit, or traffic
from a controller or service platform to associated Access Point radios and the wireless client:
Neighbor Tx Rate Limit Select the radio button to enable rate limiting for data transmitted
from connected wireless clients. Enabling this option does not invoke
rate limiting for data traffic in the transmit direction. This feature is
disabled by default.
Rate Define a receive rate limit between 50 - 1,000,000 kbps.This limit
constitutes a threshold for the maximum the number of packets
transmitted or received by the client. Traffic that exceeds the defined
rate is dropped and a log message is generated. The default rate is
1,000 kbytes.
Maximum Burst Size Set a maximum burst size between 2 - 64 kbytes. The smaller the
burst, the less likely the receive packet transmission will result in
congestion for the wireless client. The default burst size is 64 kbytes.
11 Set the following To Air Downstream Random Early Detection settings for each access category:
Background Traffic Set a percentage value for background traffic in the receive direction.
This is a percentage of the maximum burst size for low priority traffic.
Background traffic exceeding the defined threshold is dropped by the
client and a log message is generated. The default is 50%.
Best Effort Traffic Set a percentage value for best effort traffic in the receive direction.
This is a percentage of the maximum burst size for normal traffic. Best
effort traffic exceeding the defined threshold is dropped by the client
and a log message is generated. The default is 50%.
Video Traffic Set a percentage value for video traffic in the receive direction. This is
a percentage of the maximum burst size for video traffic. Video traffic
exceeding the defined threshold is dropped by the client and a log
message is generated. The default is 25%.
Voice Traffic Set a percentage value for voice traffic in the receive direction. This is
a percentage of the maximum burst size for voice traffic. Voice traffic
exceeding the defined threshold is dropped by the client and a log
message is generated. The default threshold is 0%.0% means no early
random drops occur.
12 Select OK when completed to update this Mesh QoS rate limit settings. Select Reset to revert the screen back
to its last saved configuration.
13 Select the Multimedia Optimizations tab.
Manually Configure Select + Add Row and specify a list of multicast addresses and
Multicast Addresses classifications. Packets are accelerated when the destination addresses
matches.
15 Select OK when completed to update the Mesh Multimedia Optimizations settings. Select Reset to revert the
screen back to its last saved configuration.
A passpoint policy provides an interoperable platform for streamlining Wi-Fi access to Access Points deployed as
public hotspots. Passpoint is supported across a wide range of wireless network deployment scenarios and client
devices.
Passpoint makes connecting to Wi-Fi networks easier by authenticating the user with an account based on an
existing relationship, such as the user's mobile carrier or broadband ISP.
The Passpoint Policy screen displays a list of passpoint polices for network hotspots. Each passpoint policy can be
selected to edit its properties. If no exiting passpoint policies supports the required deployment, select Add to
create a new policy.
Venue Name Displays the administrator assigned name of the venue (or physical
location) of the deployed Access Point hotspot.
3 Select Add to define a new passpoint policy, or select an existing policy and select Edit to modify its
configuration. Existing policies can be selected and deleted, copied, or renamed as needed. Optionally Copy or
Rename a policy as needed.
IPv4 Address Type Use the drop-down menu to select the IPv4 formatted address type
for this passpoint policy. IPv4 is a connectionless protocol operating on
a best effort delivery model. IPv4 does not guarantee delivery or
assures proper sequencing or avoidance of duplicate delivery (unlike
TCP). Options include, not available, public, port-restricted, port-
restricted-double-nat, single-nat, double-nat, port-restricted-single-nat
and unknown.
IPv6 Address Type Use the drop-down menu to select the IPv4 formatted address type
for this passpoint policy. IPv6 is the latest revision of the Internet
Protocol (IP) designed to replace IPv4. IPV6 provides enhanced
identification and location information for computers on networks
routing traffic across the Internet. Options include, available,
unavailable and unknown.
OSU SSID Optionally define a 32 character maximum sign-on ID that must be
correctly provided to access the passpoint policy’s hotspot resources.
ROAM Consort Provide a 0 - 255 character roaming consortium number. A roaming
consort ID is sent as roaming consortium information in a hotspot
query response.
5 Set the following WAN Metrics for upstream and downstream bandwidth:
Up Speed Enable this option to estimate the maximum upstream bandwidth from
0 - 4,294,967,295 Kbps.
Down Speed Enable this option to estimate the maximum downstream bandwidth
from 0 - 4,294,967,295 Kbps.
6 Set the following Connection Capability for passpoint policy’s FTP, HTTP, ICMP, IPSec VPN, PPTP VPN, SIP, SSH
and TLS VPN interfaces:
7 Use the drop-down menu to define these interfaces as open, closed or unknown for this passpoint policy
configuration. Disabling unused interfaces is recommended to close unnecessary security holes.
8 Select + Add Row to set a Connection Capability Variable to make specific virtual ports open or closed for Wi-Fi
connection attempts, set rules for how the user is to connect with routing preference using this passpoint
policy.
9 Select + Add Row and set a Network Authentication Type to select how Wi-Fi connection attempts are
authenticated and validated using a dedicated redirection URL resource.
10 Refer to the Basic Configuration field to set the following:
Access Network Type Use the drop-down menu to select the network access method for this
passpoint policy. Access network types include:
private – General access to a private network hotspot (default setting)
private-guest – Access to a private network hotspot with guest
services
chargeable-public – Access to a public hotspot with billable services
personal-device – Access to a hotspot for personal devices such as
wireless routers
emergency services – Dedicated network hotspot access for
emergency services only
14 Set the following EAP Method attributes to secure the NAI realm used by the passpoint policy:
Index Select an EAP instance index from 1 - 10 to apply to this hotspot’s EAP
credential exchange and verification session. NAIs are often user
identifiers in the EAP authentication protocol.
Method Set an EAP method for the NAI realm. Options include identity, otp,
gtc, rsa-public-key, tls, sim, ttls, peap, ms-auth, ms-authv2, fast, psk
and ikev2.
Authentication Type Use the drop-menu to specify the EAP method authentication type.
Options include expanded-eap, non-eap-inner, inner-eap, expanded-
inner-eap, credential, tunn-eap-credential and vendor.
Authentication Value If setting the authentication type to either non-eap-inner, inner-eap,
credential or tunnel-eap-credential define an authentication value that
must be shared with the EAP credential validation server resource.
Authentication Vendor If the authentication type is set to either, expanded-eap or expanded-
ID inner-eap, set a 6 character authentication vendor ID that must match
the one utilized by the EAP server resource.
Authentication Vendor If required, add 2 - 510 character vendor specific authentication data
Specific required for the selected authentication type. Enter the value is an a-
FA -F0-9 format.
Authentication Vendor Set a 8 character authentication vendor type used exclusively for the
Type expanded-eap or expanded-inner-eap authentication types.
15 Select OK to save the updates to the NAI realm.
16 Select the OSU Provider tab.
WiNG managed clients can use Online Sign-Up (OSU) for registration and credential provisioning to obtain
hotspot network access. Service providers have an OSU AAA server and certificate authority (CA). For a client
and hotspot to trust one another, the OSU server holds a certificate signed by a CA whose root certificate is
issued by a CA authorized by the Wi-Fi Alliance, and CA certificates are installed on the client device. A CA
performs four functions:
• Issues certificates (creates and signs)
• Maintains certificate status information and issues certificate revocation lists (CRLs)
• Publishes current (non-expired) certificates and CRLs
• Maintains status archives for the expired or revoked certificates it has issued
Passpoint certificates are governed by the Hotspot 2.0 OSU Certificate Policy Specification. An OSU server
certificate should be obtained from any of the CAs authorized by the Wi-Fi Alliance. Once an OSU provider is
selected, the client connects to the OSU WLAN. It then triggers an HTTPS connection to the OSU server, which
was received with the OSU providers list. The client validates the server certificate to ensure it's a trusted OSU
server. The client is prompted to complete an online registration through their browser. When the client has a
valid credential for the hotspot 2.0 WLAN, it disassociates from the OSU WLAN and connects to the hotspot
2.0 WLAN.
The OSU Provider screen displays those provider configurations created thus far for utilization with a passpoint
policy.
Method SOAP XML SPP Select this option to apply a SOAP-XML subscription provisioning
Priority protocol priority of either 1 or 2. The simple object access protocol
(SOAP) is a protocol for exchanging structured information in Web
services. SOAP uses XML as its message format, and relies on other
application layer protocols, like HTTP or SMTP for message negotiation
and transmission.
20 Refer to the Name field to optionally set a 252 character English language sign up name, then provide a 3
character maximum ISO-639 language Code to apply the sign up name in a language other then English. Apply
a 252 character maximum hexadecimal online sign up Name to encode in the ISO-639 language code applied to
the sign up name.
21 Refer to the OSU Provider Description field to set an online sign up description in a language other then
English.
Select + Add Row and provide a 3 character maximum ISO-639 language Code to apply the sign up name in a
language other then English. Apply a 252 character maximum hexadecimal online sign up Description to
encode in the ISO-639 language code applied to the sign up name.
22 Optionally provide an OSU Provider Icon by selecting + Add Row. Apply the following configuration attributes to
the icon.
Code Enter a 3 character maximum ISO-639 language Code to define the
language used in the OSU provider icon.
File Name Provide a 255 character maximum icon name and directory path
location to the icon file.
Height Provide the icon height size in pixels from 0 - 65,535. The default
setting is 0.
MIME Type Set the icon MIME file type from 0 - 64. The MIME associates filename
extensions with a MIME type. A MIME enables a fallback on an
extension and are frequently used by Web servers.
Width Provide the icon width size in pixels from 0 - 65,535. The default
setting is 0.
23 Select OK to save the updates to the OSU provider configuration. Select Reset to revert to the last saved
configuration.
In addition to WIPS support, sensor functionality has now been added for Extreme Networks’ MPact locationing
system. The MPact system for Wi-Fi locationing includes WiNG controllers and Access Points functioning as
sensors. Within the MPact architecture, sensors scan for RSSI data on an administrator defined interval and send to
a dedicated MPact Server resource, as opposed to an ADSP server. The MPact Server collects the RSSI data from
WiNG sensor devices, and calculates the location of Wi-Fi devices for MPact administrators.
1 Select Configuration > Wireless > Sensor Policy to display existing policies.
NOTE: If a dedicated sensor is utilized with WIPS for rogue detection, any sensor
policy selected from the Sensor Policy drop-down menu is discarded and not
utilized by the sensor. To avoid this situation, use ADSP channel settings exclusively
to configure the sensor and not the WiNG interface.
4 If creating a new sensor policy, assign it a Name up to 32 characters. No character spaces are permitted within
the name. Define a name unique to the policy’s channel and scan mode configuration to help differentiate it
from other policies. If adding a new sensor policy, the Name must be provided and Continue selected to enable
the remaining configuration parameters.
Use the RSSI Scan Interval drop-down menu to set a scan interval from 1 - 60 seconds. This is the scan period
dedicated sensors (Access Point radios) utilize for RSSI (signal strength) assessments. Once obtained, the
sensor sends the RSSI data to a specified MPact server resource (not an ADSP server) for the calculation of Wi-
Fi device locations. The default is 1 second.
5 Set the following Scan Mode values depending on whether Default-Scan, Custom Scan or Channel Lock has
been selected as the mode of scan operation:
Channel Default-Scan - The list of available scan channels is fixed and defaulted
in a spread pattern of 1, 6, 11, 36, 40, 44 and 48. No alternations to this
channel pattern are available to the administrator.
Custom-Scan - A list of unique channels in the 2.4, 4.9, 5 and 6 GHz
band can be collectively or individually enabled for customized
channel scans and RSSI reporting.
Channel-Lock - Once selected, the existing Channel, Channel Width
and Scan Weight table items are replaced by a Lock Frequency drop-
down menu. Use this menu to lock the RSSI scan to one specific
channel.
Channel Width Default-Scan - Each channel’s width is fixed and defaulted to either
40MHz-Upper (Ch 1), 40MHz-Lower (Ch 6 and CH 11) or 80MHz (CH
36, CH 40, CH 44 and CH 48).
Custom-Scan - When custom channels are selected for RSSI scans,
each selected channel can have its own width defined. Numerous
channels have their width fixed at 20MHz, 802.11a radios support 20
and 40 MHz channel widths.
Channel-Lock - If a specific channel is selected and locked for an RSSI
scan, there’s no ability to refine the width between adjacent channels,
as only one channel is locked.
Scan Weight Default-Scan - Each default channel’s scan is of equal duration (1000)
within the defined RSSI scan interval. No one channel receives scan
priority within the defined RSSI scan interval.
Custom-Scan - Each selected channel can have its weight prioritized in
respect to the amount of time a scan is permitted within the defined
RSSI scan interval.
Channel-Lock - If a specific channel is selected and locked for an RSSI
scan, there’s no ability to refine the scan weightage in respect to all
the remaining unlocked channels.
6 Select OK when completed to update the sensor policy settings. Select Reset to revert the screen back to the
last saved configuration.
Controllers, service platforms and Access Points allow packet routing customizations and unique network
resources for deployment specific routing configurations.
Define a policy based routing (PBR) configuration to direct packets to selective paths. PBR can optionally mark
traffic for preferential services. PBR minimally provides the following:
• A means to use source address, protocol, application and traffic class as traffic routing criteria
• The ability to load balance multiple WAN uplinks
• A means to selectively mark traffic for QoS optimization
Since PBR is applied to incoming routed packets, a route-map is created containing a set of filters and associated
actions. Based on the actions defined in the route-map, packets are forwarded to the next relevant hop. Route-
maps are configurable under a global policy called routing-policy, and applied to profiles and devices.
Route-maps contain a set of filters which select traffic (match clauses) and associated actions (set clauses) for
routing. A routemap consists of multiple entries, each carrying a precedence value. An incoming packet is matched
against the route-map with the highest precedence (lowest numerical value). If it matches, the routing decision is
based on this route-map. If the packet does not match the route-map, the route-map entry with next highest
precedence is matched. If the incoming packet does not match any of the route-map entries, it’s subjected to
typical destination based routing. Each route-map entry can optionally enable/disable logging.
The following criteria can optionally be used as traffic selection segregation criteria:
• IP Access List - A typical IP ACL can be used for traffic permissions. The mark and log actions in ACL rules
however are neglected. Route-map entries have separate logging. Only one ACL can be configured per route
map entry.
• IP DSCP - Packet filtering can be performed by traffic class, as determined from the IP DSCP field. One DSCP
value is configurable per route map entry. If IP ACLs on a WLAN, ports or SVI mark the packet, the new/
marked DSCP value is used for matching.
• Incoming WLAN - Packets can be filtered by the incoming WLAN. There are two ways to match the WLAN:
- If the device doing policy based routing has an onboard radio and a packet is received on a local WLAN, then
this WLAN is used for selection.
- If the device doing policy based routing does not have an onboard radio and a packet is received from an
extended VLAN, then the device which received the packet passes the WLAN information in the MINT packet
for the PBR router to use as match criteria.
• Client role - The client role can be used as match criteria, similar to a WLAN. Each device has to agree on a
unique identifier for role definition and pass the same MINT tunneled packets.
• Incoming SVI - A source IP address qualifier in an ACL typically satisfies filter requirements. But if the host
originating the packet is multiple hops away, the incoming SVI can be used as match criteria. In this context
the SVI refers to the device interface performing policy based routing, and not the originating connected
device.
Each route map entry has a set of match and set (action) clauses. ACL rules configured under route map entries
merge to create a single ACL. Route map precedence values determine the prioritization of the rules in this
merged ACL. An IP DSCP value is also added to the ACL rules.
Set (or action) clauses determine the routing function when a packet satisfies match criteria. If no set clauses are
defined, the default is to fallback to destination based routing for packets satisfying the match criteria. If no set
clause is configured and fallback to destination based routing is disabled, then the packet is dropped. The
following can be defined within set clauses:
• Next hop - The IP address of the next hop or the outgoing interface through which the packet should be
routed. Up to two next hops can be specified. The outgoing interface should be a PPP, a tunnel interface or a
SVI which has DHCP client configured. The first reachable hop should be used, but if all the next hops aren’t
reachable, typical destination based route lookup is performed.
• Default next hop - If a packet subjected to PBR does not have an explicit route to the destination, the
configured default next hop is used. This can be either the IP address of the next hop or the outgoing interface.
Only one default next hop can be defined. The difference between the next hop and the default next-hop is in
case of former, PBR occurs first, then destination based routing. In case of the latter, the order is reversed. With
both cases:
a If a defined next hop is reachable, it’s used. If fallback is configured refer to (b).
b Do normal destination based route lookup. If a next hop is found its used, if not refer to (c).
c If default next hop is configured and reachable, it’s used. If not, drop the packet.
• Fallback - Fallback to destination based routing if none of the configured next hops are reachable (or not
configured). This is enabled by default.
• Mark IP DSCP - Set IP DSCP bits for QoS using an ACL. The mark action of the route maps takes precedence
over the mark action of an ACL.
NOTE: A packet should optimally satisfy all the match criteria, if no match clause is
defined in a route-map, it would match everything. Packets not conforming to any
of the match clauses are subjected to normal destination based routing.