The Command Line Interface (CLI) Virtual Station Setup and Control Commands Cipher .................... Data Encryption ........... Shared-key Index .......... Fragmentation Threshold ... RTS Threshold ............. Mode ...................... Layer .................. Load Application .......... Target IP Address ......... Ping Transmit Count ....... Ping Data Size ............ WEP(RC4) Off 0 2346 2346 internal 3 ping 10.1.83.
5 The Command Line Interface (CLI) Virtual Station Setup and Control Commands Example: [wport1]IxWLAN -> clear vsta 1 stats [wport1]IxWLAN -> Valid objects are: : Clears vSTA certfile names. : Clears vSTA SSIDs. : Clears vSTA statistics. conf Configures a virtual station. It specifies a virtual station's IP address, WLAN MAC address, and load application mode. It also specifies the load application protocol, target host, and application specific parameters.
The Command Line Interface (CLI) Virtual Station Setup and Control Commands Table 5-1. Attributes Attribute Default Value authentication open-system certfile (not set) cipher wep csmode persistent dhcplease 3600 dhcpretry 4 dhcpinterval 8 dhcpoffers 1 dhcpserver 0.0.0.0 eapalgorithm tls encryption off fastradius disabled fragmentthreshold 2346 gateway 0.0.0.0 group 1 inneralgorithm ms-chapv2 ipmask 255.255.255.
5 The Command Line Interface (CLI) Virtual Station Setup and Control Commands Attribute Default Value userid (not set) wport 1 The set vsta command allows you to change any of these default values. Example: [wport1]IxWLAN 1024 [wport1]IxWLAN [wport1]IxWLAN [wport1]IxWLAN [wport1]IxWLAN [wport1]IxWLAN [wport1]IxWLAN [wport1]IxWLAN -> conf 3 10.1.40.20 00:0b:cd:59:00:01 internal ping 10.1.40.16 64000 -> -> -> -> -> -> -> OK conf 1 10.1.35.150 02:CF:1F:00:00:01 int ping 10.1.35.
The Command Line Interface (CLI) Virtual Station Setup and Control Commands del group Clears all configuration parameters for a specified group and removes the group from the system.
5 The Command Line Interface (CLI) Virtual Station Setup and Control Commands : Virtual Station ID (1…128) or all. If is set to all (that is, disassoc vsta all), the disassociation sequence starts for all virtual stations. The following command initiates the disassociation sequence for all virtual stations in a specified group.
The Command Line Interface (CLI) Virtual Station Setup and Control Commands • dhcpinterval: Displays the dhcpInterval attribute of the specified vSTA, all vSTAs, or all vSTAs within the specified group. • dhcpoffers: Displays the dhcpOffer attribute of the specified vSTA, all vSTAs, or all vSTAs within the specified group. • dhcpserver: Displays the dhcpServer attribute of the specified vSTA, all vSTAs, or all vSTAs within the specified group.
5 The Command Line Interface (CLI) Virtual Station Setup and Control Commands • ssid: Shows the group’s SSIDs. • state: Shows the current state of each virtual station in the group. • stats: Shows statistics counters for all virtual stations in a group. • summary: Shows cumulative summary statistics for all virtual stations in one or all groups. • target: If mode is internal, shows the configured target IP address.
The Command Line Interface (CLI) Virtual Station Setup and Control Commands • count: If mode is internal, shows the configured ping count (0…2,147,483,647). • csmode: Displays the virtual station’s connection mode: persistent or nonpersistent. • dhcpinfo: If dhcpmode is on or auto, shows DHCP information. • dhcpmode: Displays the DHCP Mode setting: on, off, or auto. • dhcplease: Displays the dhcpLease attribute of the specified vSTA.
5 The Command Line Interface (CLI) Virtual Station Setup and Control Commands • roamtype: Shows the virtual station’s Roam type: reassociation or disassociation. • rtsthreshold: Shows the RTS threshold setting (1…2346). • size: If mode is internal, shows the configured ping packet size (64…1024). • ssid: Shows the vSTA’s SSID. • state: Shows the virtual station’s current state.
The Command Line Interface (CLI) Virtual Station Setup and Control Commands Leased Address ... DHCP Server ...... Relay ............ Server/relay MAC . Subnet Mask ...... Gateway .......... DNS Server ....... [wport1]IxWLAN -> 10.1.35.56 10.2.10.10 10.1.35.1 00:00:00:00:00:00 255.255.255.0 10.1.35.1 0.0.0.0 Example for get vsta conf: [wport1]IxWLAN -> get vsta 1 conf vSTA Configuration: ID ........................ 1 Group ID .................. 1 wport...................... 1 IP Address .........
5 The Command Line Interface (CLI) Virtual Station Setup and Control Commands vSTA: 1 State: Running Mode: internal vStaPingRcv:Active vStaPingXmt:Active [wport1]IxWLAN -> Example for get vsta stats: [wport1]IxWLAN -> get vsta 1 stats vSTA 1: MAC 00:0b:cd:59:00:01, IP 10.1.35.
The Command Line Interface (CLI) Virtual Station Setup and Control Commands Authentications: 6 Deauthentications: 3 Associations: 6 Disassociations: 0 Pre-Authentication: 2 attempts, 1 successful, 1 failed PMKSA cache: 2 entries BSSID PMKID entry 0 00:12:d9:c4:1d:d0 0x62151d5ca3b2c4ea8545842f9a7adb6b entry 1 00:15:70:00:77:50 0x7dad3ec63036b7af087bd9c595035e50 Signal Quality: Min Max Avg Rcv Strength 0 61 36 Ack Strength 0 60 35 Rcv Rate 54 54 54 Tx SF Rate 54 54 54 Tx LF Rate 54 54 54 Rcv Frames: Min Max
5 The Command Line Interface (CLI) Virtual Station Setup and Control Commands TKIP Rply Fail TKIP ICV Err CCMP Dcrpt Err CCMP Rply Fail MIC Fail Rpt Tx [wport1]IxWLAN -> 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 Example for get vsta all wport: [wport2]IxWLAN -> get vsta all wport vSTA 1 Wport: 2 vSTA 2 Wport: 2 vSTA 3 Wport: 1 halt Starts an immediate halt of the load application currently being run by one or more virtual stations.
The Command Line Interface (CLI) Virtual Station Setup and Control Commands init group : Group ID (1…128) Example: [wport1]IxWLAN -> init vsta 1 [wport1]IxWLAN -> OK [wport1]IxWLAN -> preauth Starts the 802.11i pre-authentication with the indicated BSSID. The vSTA’s authentication mode must be RSN and the vSTA must be in the Ready or Running state with its current BSS. IxWLAN stores the PMKSA resulting from a successful Preauthentication completion in the corresponding vSTA PMKSA cache.
5 The Command Line Interface (CLI) Virtual Station Setup and Control Commands The following command releases the DHCP IP address lease for all virtual stations in a specified group. releaseip group : Group ID (1…128) Example: [wport1]IxWLAN -> releaseip vsta 1 [wport1]IxWLAN -> 10.1.35.10 (10.1.35.10) deleted OK reset group Resets all virtual stations in a group to the Initialized state and clears all group statistics counters.
The Command Line Interface (CLI) Virtual Station Setup and Control Commands : the BSSID to which the vSTA(s) are to roam Example for roam vsta all [noprobe] [noauth]: roam vsta all 00:06:2e:35:6b:1d noprobe Example for roam vsta [noprobe] [noauth]: roam vsta 6 00:06:2e:35:6b:1d noprobe Example for roam group [noprobe] [noauth]: roam group 2 00:06:2e:35:6b:1d noprobe run Starts running the load application for one or more virtual stations.
5 The Command Line Interface (CLI) Virtual Station Setup and Control Commands save group stats : Group ID (1…128) save group summary Saves cumulative summary statistics in a file for all virtual stations in one or all groups. Each group is saved to its own file. The file is stored in the /Statistics subdirectory and named Grp#Summ.dat (where # is the group ID). save group summary : Group ID (1…128) or all.
The Command Line Interface (CLI) Virtual Station Setup and Control Commands • The vSTA must be in Initialized state or higher • IxWLAN must be joined with an AP. sendprobe A given IxWLAN may have many SSIDs configured, a global SSID, and up to 128 per-vSTA SSIDs. The rules that determine which SSID is used when a specific vSTA probes, associates, and re-associates with an AP are: • If a vSTA’s SSID attribute is set, it is always used.
5 The Command Line Interface (CLI) Virtual Station Setup and Control Commands Example: sendprobe vsta 1 vSTA ID:1 NOTIFY Operation PROBE succeddedsendprobe vsta 2 vSTA ID:2 NOTIFY Operation PROBE failed-reason:No response from AP- set group Modifies configuration attributes for all virtual stations in a specified group. set group : Group Number (1…128) /: The allowable / combinations are defined in Table 5-2. Table 5-2.
The Command Line Interface (CLI) Virtual Station Setup and Control Commands Default layer 2 or 3 3 lp ping ping mode external or internal internal outeridentity up to 64 ASCII characters none (displayed as “Not Set”) passphrase up to 63 ASCII characters none (displayed as “Not Set”) password up to 64 ASCII characters none (displayed as “Not Set”) pmkcache on/off on psk 64 ASCII-hex characters none (displayed as “Not Set”) retry 0…2,147,483,647 2 roamtype d
5 The Command Line Interface (CLI) Virtual Station Setup and Control Commands running a ping test, the ping test continues. If it was in an associated state, the virtual station reissues the associate request. 5-44 • dhcpmode: The DHCP mode allows virtual stations to have IP addresses dynamically acquired from a DHCP server on the network rather than a fixed, configured IP address. If dhcpmode is off, DHCP mode is not active and virtual stations must have a static IP address.
The Command Line Interface (CLI) Virtual Station Setup and Control Commands • keyindex: If authentication is shared-key, this attribute assigns a shared key index number (1…4) to all virtual stations in the specified group. The shared keys are defined by the set key command. • kmTimeout: AKMP Timeout sets a wait state timer for virtual stations in the specified group.
5 The Command Line Interface (CLI) Virtual Station Setup and Control Commands the frame is transmitted. The minimum value (1) effectively needs RTS/CTS for all transmit frames. The maximum value (2346) is the maximum 802.11 frame size and effectively disables RTS. The default value is 2346. • size: If mode is internal, this attribute defines the Ping Packet Size (64…1024). • ssid: Defines the SSID to be used in probes and association.
The Command Line Interface (CLI) Virtual Station Setup and Control Commands Default dhcpmode on, off, or auto off dhcplease 300...-1 3600 dhcpretry 0...5 4 dhcpinterval 1...64 4 dhcpoffers 1...3 1 dhcpserver IP address of the server 0.0.0.
5 The Command Line Interface (CLI) Virtual Station Setup and Control Commands Default ssid text string or hexadecimal string (not set) target an IP address in ASCII Dotted Decimal Notation: nnn.nnn.nnn.nnn (for example, 10.1.35.100). none timeout 0…2,147,483,647 300 userid user ID string none wport 1...3 1 The attributes are: 5-48 • authentication: Sets the authentication mode for virtual station(s) configured by this command.
The Command Line Interface (CLI) Virtual Station Setup and Control Commands • dhcpoffers: Sets the dhcpOffer attribute of the specified vSTA to the given value, specifying the number of offers to ignore before generating a request. • dhcpserver: Sets the dhcpServer attribute of the specified vSTA to the given value, specifying the DHCP server from which a vSTA is to accept offers. • eapalgorithm: If authentication is rsn or wpa, this parameter specifies the authentication protocol: tls, peap, or ttls.
5 The Command Line Interface (CLI) Virtual Station Setup and Control Commands 5-50 • outeridentity: If eapalgorithm is peap or ttls, this parameter assigns a separate user ID for use in Phase 1 authentication. It can be up to 64 characters in the range A…Z, a…z, 0…9, or other legal characters: period (.), dash (-), atsign (@). • passphrase: If authentication is rsn-psk or wpa-psk, this attribute defines a passphrase of up to 63 ASCII characters.
The Command Line Interface (CLI) Statistics File Commands Example: [wport1]IxWLAN [wport1]IxWLAN [wport1]IxWLAN [wport1]IxWLAN [wport1]IxWLAN [wport1]IxWLAN [wport1]IxWLAN [wport1]IxWLAN [wport1]IxWLAN [wport1]IxWLAN [wport1]IxWLAN [wport1]IxWLAN -> -> -> -> -> -> -> -> -> -> -> -> set OK set OK set OK set OK set OK set OK vsta 1 count 100 vsta 1 csmode persistent vsta 1 csmode non-persistent vsta 1 dhcpmode auto vsta 1 fragmentthreshold 1000 vsta 1 rtsthreshold 1000 Statistics File Commands The follow
5 The Command Line Interface (CLI) Statistics File Commands : Virtual Station ID (1…128), all, or master. If is set to all (that is, del statfile vsta all), this command deletes the statistics file for all virtual stations. If is set to master (that is, del statfile vsta master), this command deletes the statistics file for IxWLAN.
The Command Line Interface (CLI) Event Log Commands get summfile group Shows cumulative statistics from a summary statistics file for all virtual stations in one or all groups. get summfile group : Group ID (1…128) or all. If is set to all (that is, get summfile group all), group summary statistics are shown for all groups. get summfile vsta all Shows cumulative statistics from a summary statistics file for all virtual stations.
5 The Command Line Interface (CLI) Event Log Commands clear evlog file Clears a log file. clear evlog file : A or B Example: [wport1]IxWLAN -> clear evlog file A [wport1]IxWLAN -> Get/Display Event Log get evlog buffer Shows event log data from the event log buffer. get evlog buffer : the number of records to show. The CLI shows the last number of records in the buffer. Omit this parameter to view all records in the buffer.
The Command Line Interface (CLI) Event Log Commands set evlog file Shows event log data from an event log file. get evlog file [ []] get evlog file ? : A or B : The first record to be shown. Omit this parameter to start with the first record in the file. : The number of records to be shown. Omit this parameter to show all remaining records in the file. This parameter can only be used if is specified.
5 The Command Line Interface (CLI) Event Log Commands Event log verbosity : critical events only WLANTX module: disabled WLANRX module: disabled IxWLAN module: enabled VSTA module: enabled UI module: enabled WPA/RSN module: enabled DHCP module: disabled Event data to console: disabled Event data to file : disabled [wport2]IxWLAN -> If Event data to console shows enabled, this command also shows whether logging to console is enabled to this or another CLI console.
The Command Line Interface (CLI) Event Log Commands set evlog console : enable/disable When set evlog console enable is entered at a CLI console (that is, connected to the serial port or via a telnet session), event data is posted to that console only. No more than one console receives event data at a given time. When set evlog console disable is entered at a CLI console, event logging is disabled to all consoles.
5 The Command Line Interface (CLI) IxWLAN Commands : WLANTX = 802.11 WLAN frame transmissions, WLANRX = 802.11 WLAN frame receptions, IxWLAN = IxWLAN control, vSTA = Virtual station control, UI = User interface actions, WPA = WPA/RSN Events. : enable/disable Example: [wport1]IxWLAN -> set evlog module IxWLAN enable [wport1]IxWLAN -> IxWLAN Commands The commands in this group allow to show and modify the IxWLAN configuration.
The Command Line Interface (CLI) IxWLAN Commands get wlanmask get wport help history import ping quit reboot reset wlanmac set bkjoin set bootscan set countrycode set date set factorydefault set features set gateway set ipaddr set ipmask set key set keyentrymethod set login set mic set multiradiomode set password set pmmode set power set psinterval set rate set sntpserver set systemname set telnet set time set tzone set wirelessmode set wlanmac set wlanmask set wport timeofday version --------------------
5 The Command Line Interface (CLI) IxWLAN Commands This section describes the following commands: 5-60 • clear sntpserver on page 5-62. • clear systemname on page 5-62. • cryptotest on page 5-62. • del key on page 5-63. • exec on page 5-63. • ftp on page 5-64. • get association on page 5-65. • get bkjoin on page 5-65. • get bootscan on page 5-65. • get channel on page 5-66. • get config on page 5-66. • get countrycode on page 5-68. • get cryptocap on page 5-68.
The Command Line Interface (CLI) IxWLAN Commands • get uptime on page 5-73. • get wirelessmode on page 5-73. • get wlanmac on page 5-73. • get wlanmask on page 5-74. • get wport on page 5-74. • help on page 5-75. • history on page 5-75. • import on page 5-75. • ping on page 5-76. • quit on page 5-77. • reboot on page 5-77. • reset wlanmac on page 5-77. • set bkjoin on page 5-77. • set bootscan on page 5-77. • set countrycode on page 5-78. • set date on page 5-78.
5 The Command Line Interface (CLI) IxWLAN Commands clear sntpserver • set tzone on page 5-85. • set wirelessmode on page 5-85. • set wlanmac on page 5-85. • set wlanmask on page 5-85. • set wport on page 5-85. • timeofday on page 5-86. • version on page 5-86. Clears the IP Address of the SNTP server. clear sntpserver clear systemname Clears the IxWLAN system name. clear systemname cryptotest Starts a self-test of the crypto hardware.
The Command Line Interface (CLI) IxWLAN Commands -------------------------Raw RC4 : OK Passed 40-bit WEP * Faulted FAILED: status 5 (0x00000005): EXCRYPT_STAT_INSUFF_RESOURCE: insufficient resources TKIP : OK Passed Raw AES : OK Passed AES-CCM : OK Passed 3DES : OK Passed MD5 : OK Passed HMAC_MD5 : OK Passed SHA-1 : OK Passed HMAC_SHA-1 : OK Passed ModExp : OK Passed RSA : OK Passed RNG : OK Passed Driver-specific error code 0 (0x00000000): OK If any faults were detected in a previous self-test but the cu
5 The Command Line Interface (CLI) IxWLAN Commands : The name of the command file to be executed Example: The try.txt file in this example contains the version and get association CLI commands. [wport1]IxWLAN -> exec try.txt run -> version Ixia IxWLAN Rev 5.00 run -> get association STA MAC Address 0 00:04:E2:38:56:78 SUT 00:04:E2:38:A8:D2 [wport1]IxWLAN -> State up up NOTE: Use the ftp command to download the command file from the command PC to the IxWLAN flash file system.
The Command Line Interface (CLI) IxWLAN Commands download or upload: download Getting @192.168.0.2:c:\ixwlan.sys -> ixwlanNEW.
5 The Command Line Interface (CLI) IxWLAN Commands get channel Shows the radio channel/frequency used by IxWLAN. The channel is set automatically when it joins with the System Under Test. get channel Example: [wport1]IxWLAN -> get channel Radio Frequency: 5260 MHz (IEEE 52) [wport1]IxWLAN -> get config Shows the IxWLAN configuration. get config Example: [wport2]IxWLAN -> get config ========== System Attributes ========== IxWLAN Cfg Rev: 4 System Name: Login Username: Admin IP Address: 10.10.10.
The Command Line Interface (CLI) IxWLAN Commands ****************************** SSID: IxWLAN Test Wireless Network BSSID of System Under Test: 00:0b:6b:30:05:9f WLAN MAC Address: 00:0b:6b:4f:ef:7f (set by user) WLAN MAC Address Mask: ff:ff:ff:ff:00:00 Wireless Mode: 802.11a Data Rate: best DTIM: 1 HW Transmit Retry Limit: 4 Configured Transmit Power: full Current Runtime Transmit Output Power 18.
5 The Command Line Interface (CLI) IxWLAN Commands get countrycode Shows the country code that is currently configured in IxWLAN. get countrycode Example: [wport1]IxWLAN -> get country code Country Code: US [wport1]IxWLAN -> get cryptocap Identifies the crypto hardware installed on the IxWLAN SED/SED-MR+ chassis, the capabilities supported by that hardware, and includes an indication of the cumulative fault status.
The Command Line Interface (CLI) IxWLAN Commands get features Shows features that have been enabled by your authorization code/feature key: get features Example: [wport1]IxWLAN -> get features Features: 802.11A, 802.11B, 802.11G, WPA/RSN [wport1]IxWLAN -> See 802.11b/g Commands on page 5-86 for more commands that are available if your feature set includes 802.11B or 802.11G.
5 The Command Line Interface (CLI) IxWLAN Commands get ipaddr Shows IxWLAN's IP address. get ipaddr Example: [wport1]IxWLAN -> get ipaddr IP Address: 192.168.0.50 [wport1]IxWLAN -> get ipmask Shows IxWLAN's IP subnet mask defined in the configuration file (set by set ipmask). get ipmask Example: [wport1]IxWLAN -> get ipmask IP Subnet Mask: 255.255.0.0 (config file value) [wport1]IxWLAN -> get key Shows an encryption key.
The Command Line Interface (CLI) IxWLAN Commands Example: [wport1]IxWLAN -> get login Login Username: My_User_Name [wport1]IxWLAN -> get mic Shows the MIC check setting that is currently configured on the IxWLAN chassis. get mic Example: [wport1]IxWLAN -> get mic MIC check enabled get multiradiomode Displays the multi-radio mode. get multiradiomode Example: [wport1]IxWLAN -> get multiradiomode Multi-radio mode: Dynamic get pmmode Shows the IxWLAN power management mode.
5 The Command Line Interface (CLI) IxWLAN Commands Example: [wport1]IxWLAN -> get psinterval Power Save listen interval ... 3 beacon periods Power Management mode ........ Power Save [wport1]IxWLAN -> get rate Shows the IxWLAN data rate. get rate Example: [wport1]IxWLAN -> get rate Data Rate: best [wport1]IxWLAN -> get sntpserver Shows the IP Address of the SNTP server. get sntpserver get station Shows the status of an 802.11 STA from the IxWLAN station’s information base.
The Command Line Interface (CLI) IxWLAN Commands get systemname Shows the IxWLAN system name. get systemname get telnet Shows the telnet mode and the current state of telnet connections. get telnet Example: [wport1]IxWLAN -> get telnet Telnet Access: Enabled 1 of 4 connections active 2 connection attempts 2 good logins 0 failed logins [wport1]IxWLAN -> get tzone Shows the current time zone setting.
5 The Command Line Interface (CLI) IxWLAN Commands Example: [wport1]IxWLAN -> get wlanmac WLAN MAC Address: 00:0b:cd:59:23:44 [wport1]IxWLAN -> get wlanmask Shows the Wireless LAN Address Mask. get wlanmask Example: [wport1]IxWLAN -> get wlanmask WLAN Address Mask: ff:ff:ff:ff:00:00 [wport1]IxWLAN -> get wport Displays wport information. get wport [stats] get wport Displays a summary status report for wport . get wport : the wport number. The default value is 1. Must be in the 1.
The Command Line Interface (CLI) IxWLAN Commands Wport 2: MAC 00:02:6f:05:16:34 Authentications: 10, Associations: 10, Reassociations: 0 Rcv Sig Strength: 49, Rcv Rate: 6, Tx SF Rate: 18, Frame counts: MSDUs Data Rcv 3429 700 Tx 595 525 Rcv Errors: Rcv PHY Errors: Rcv CRC Errors: Rcv Duplicates: Rcv Discarded: Ack Rcv Fails: Encryption: Rcv Decrypt Errs: 0, 0, 0, 0, 0, 0, n/a, 0, Deauthentications: Disassociations: 0 0 Ack Sig Strength: Tx LF Rate: 18 Mcast Mgmt 0 3729 0 70 58 Ctrl 0 0 Tx Errors: Exc
5 The Command Line Interface (CLI) IxWLAN Commands Example: [wport1]IxWLAN -> import certfile Remote Certfile: c:\myCert.pfx Certfile password: **** FTP Hostname: 192.168.0.2 FTP Username: FTP Password: Importing @192.168.0.2:c:\myCert.pfx -> /Certificates/ myCert.pfx ##### myCert.pfx imported successfully remote certfile []: The file name on the remote host. The full path name must be included (for example, c:\myCert.pfx).
The Command Line Interface (CLI) IxWLAN Commands quit Exits the CLI. quit You must reopen the telnet connection to log on after this command is used. reboot Reboots IxWLAN. reboot reset wlanmac Resets the Wireless LAN MAC Address to its default value: reset wlanmac Example: [wport1]IxWLAN -> reset wlanmac ** ** DO NOT REMOVE POWER FROM THE IxWLAN HARDWARE! ** Wait for the IxWLAN to update the configuration file in Flash ** or use the "reboot" command for immediate update & reboot.
5 The Command Line Interface (CLI) IxWLAN Commands The default setting for Scan in Boot mode is enabled. set bootscan enabled/allmode/disabled Example: [wport1]IxWLAN -> set bootscan allmode Scan at Boot mode: allmode set countrycode Updates the IxWLAN configuration with the new country code and reboots the system.
The Command Line Interface (CLI) IxWLAN Commands Example: [wport1]IxWLAN -> set date 06/04/03 06:14:15 System date & time: THU JUL 31 09:00:00 2003 Use the "set date" or "set time" command to adjust [wport1]IxWLAN -> set factorydefault Resets the IxWLAN configuration to default factory settings and reboots the system.
5 The Command Line Interface (CLI) IxWLAN Commands set gateway : A valid IP address in ASCII dotted-decimal notation (nn.nn.nn.nn). Use an IP address that is compatible with the network addressing scheme at your facility. The default gateway address is 0.0.0.0. set ipaddr Sets the IxWLAN IP address. set ipaddr : A valid IP address in ASCII dotted-decimal notation (nn.nn.nn.nn).
The Command Line Interface (CLI) IxWLAN Commands Example: [wport1]IxWLAN -> set login Your_User_Name Login Username: Your_User_Name [wport1]IxWLAN -> set mic Sets the MIC check configuration parameter for IxWLAN. set mic : enable, disable, or spot. The default value is enabled. set multiradiomode Sets the multi-radio mode. set multiradiomode static|dynamic static: Sets the multi-radio mode to be static.
5 The Command Line Interface (CLI) IxWLAN Commands set pmmode : active (always awake) or psave (Power Save: doze for the specified listen interval set by set psinterval). Default: active. When Power Management mode is set to active, IxWLAN remains in the awake state at all times. When the Power Management mode is set to psave, IxWLAN enters a dozing state until awakened by the listen interval set by set psinterval. When dozing: • IxWLAN does not accept WLAN frames transmitted to any vSTA.
The Command Line Interface (CLI) IxWLAN Commands ** Wait for the IxWLAN to update the configuration file in Flash ** or use the "reboot" command for immediate update & reboot. ** Automatic update will be done within one minute. ** [wport1]IxWLAN -> ...Configuration file update completed.
5 The Command Line Interface (CLI) IxWLAN Commands Example: [wport1]IxWLAN -> get wirelessmode Wireless LAN Mode: 11g [wport1]IxWLAN -> set rate rate best -- Select best data rate rate 1 -- Select 1 Mbps rate 2 -- Select 2 Mbps rate 5.5 -- Select 5.
The Command Line Interface (CLI) IxWLAN Commands Example: [wport1]IxWLAN -> set time 07:01:15 System date & time: THU JUL 31 09:00:00 2003 Use the "set date" or "set time" command to adjust [wport1]IxWLAN -> set tzone Sets the local time zone. If no time zone is defined, GMT time is used. For example, use set tzone -8 to set the time zone for the west coast of North America. set tzone : -12…14 set wirelessmode Sets the IxWLAN Wireless LAN Mode: set wirelessmode : 11a = 802.
5 The Command Line Interface (CLI) 802.11b/g Commands timeofday Shows the current system time. timeofday Example: [wport1]IxWLAN -> timeofday System date & time: THU JUL 31 09:00:00 2003 Use the "set date" or "set time" command to adjust [wport1]IxWLAN -> version Shows the software version. Use the get version command to show the version of the configuration file saved in Flash. versionExample: [wport1]IxWLAN -> version Ixia IxWLAN(tm) software version 6.00.m4 Jan 16 2006, 19:02:38 802.
The Command Line Interface (CLI) 802.11b/g Commands • basic11b (get/set) shortslottime (get/set) on page 5-89. get basic11b (11b only) Shows the current setting of the basic 802.11b mode (enabled or disabled): get basic 11b Example: [wport1]IxWLAN -> get basic11b Use only basic 11b Rates (1, 2): Disabled [wport1]IxWLAN -> set basic11b (11b only) Enables or disables the use of basic 802.11b rates only. When enabled, only basic 802.11b rates (1 and 2Mbps) are used. When disabled, all rates are used.
5 The Command Line Interface (CLI) 802.11b/g Commands : none = never use CTS protection, always = always use CTS Protection, or auto = use CTS protection when an 802.11b device is detected. ctsrate (get/set) get ctsrate (11g only) Shows the current CTS rate.
The Command Line Interface (CLI) 802.11b/g Commands get shortpreamble (11b/11g) Shows the current Short Preamble (11b/11g) Usage setting (enabled or disabled). get shortpreamble Example: [wport1]IxWLAN -> get shortpreamble Short Preamble (11b/11g) Usage: Enabled [wport1]IxWLAN -> set shortpreamble (11b/11g) Enables or disables Short Preamble (11b/11g) usage. set shortpreamble : enable = Enable Short and Long Preamble, disable = Disable Short Preamble (use only long).
5 The Command Line Interface (CLI) Administrative Mode Commands Administrative Mode Commands The following commands are available only in the administrative mode in the Command Line Interface. They are not available in the user mode or in IxWLAN's web-based user interface. Warning: Do not use these commands unless instructed to do so by Ixia.
The Command Line Interface (CLI) Administrative Mode Commands You must use the admin command to activate the administrative mode before using any of the following commands. This section describes the following commands: admin (clear) • admin (clear) on page 5-91. • basic (get/set) on page 5-91. • boot on page 5-92. • bootrom on page 5-93. • calibration (get/set) on page 5-93. • cp on page 5-94. • format on page 5-94. • hostipaddr (get/set) on page 5-94.
5 The Command Line Interface (CLI) Administrative Mode Commands Example: [wport1]IxWLAN -> get basic11g Basic Rate Set (11g): (1, 2, 5.5, 11) [wport1]IxWLAN -> set basic11g (11g only) This command sets the basic rates to be used in the 802.11g wireless mode. set basic11g : 11 = Use Basic rates (1, 2), 11b = Use Basic rates (1, 2, 5.5, 11), 11g = Use Basic rates (1, 2, 5.5, 11, 6, 12, 24), ofdm = Use Basic rates (6, 12, 24). boot Reboots IxWLAN from flash or from the network.
The Command Line Interface (CLI) Administrative Mode Commands Example for booting from Flash: [wport1]IxWLAN -> boot boot device : unit number : processor number : host name : file name : inet on ethernet (e) : host inet (h) : user (u) : ftp password (pw) : flags (f) : other (o) : bootrom flash ixwlan.sys ata: 0 0 host /ata0a/ixwlan.sys 10.10.10.40:ffffff00 10.10.10.20 anonymous my_password 0x0 fei Allows you to update the IxWLAN boot ROM image.
5 The Command Line Interface (CLI) Administrative Mode Commands cp Copies a file in the IxWLAN SED/SED-MR+ chassis flash file system. IxWLAN -> cp format Formats the IxWLAN SED/SED-MR+ chassis flash file system. [wport1]IxWLAN -> format hostipaddr (get/set) get hostipaddr This command is used for debugging purposes only.
The Command Line Interface (CLI) Administrative Mode Commands ** [wport1]IxWLAN -> ls Lists the files in the IxWLAN SED/SED-MR+ chassis flash file system. [wport1]IxWLAN -> ls Example: [wport1]IxWLAN -> ls Directory listing of ".": 11/21/2002 8:33:02 12/01/2002 9:03:32 12/06/2002 11:03:06 2/18/2003 17:12:24 1009597 1/21/2003 14:06:00 598 3/05/2003 12:27:24 598 4 directories, 5 files 1839104 bytes free [wport1]IxWLAN -> mv Logs Scenarios Statistics ixwlan.sys config.
5 The Command Line Interface (CLI) Administrative Mode Commands none = Disable all IxWLAN debug trace functions ctask = Toggle virtual station control debug trace function mtask = Toggle virtual station master debug trace function prdr = Toggle Ping Reader debug trace function pwrt = Ping Writer debug trace function dso = Toggle DS Out debug trace function dsi = Toggle DS In debug trace function arp = Toggle ARP debug trace function show = Display IxWLAN debug trace status NOTES: • If you are running a lo
The Command Line Interface (CLI) Example Configurations Example Configurations This section covers the following topics: Example First Time Configuration • Example First Time Configuration on page 5-97. • Example Security Configurations on page 5-99. • Changing the IxWLAN IP Address on page 5-111. IxWLAN is shipped with default configuration parameters. You can change configuration settings using the CLI or the web-based user interface.
5 The Command Line Interface (CLI) Example Configurations Table 5-4. First Time Configuration Parameter Default CLI Command Example IP address 192.168.0.50 set ipaddr set ipaddr 10.1.35.16 Subnet mask 255.255.255.0 set ipmask set ipmask 255.255.255.0 Gateway 0.0.0.0 set gateway set gateway 10.1.35.
The Command Line Interface (CLI) Example Configurations Example Security Configurations These example configurations show how to configure a virtual station to use one of the following authentication methods: • Shared-Key • WPA-PSK • WPA/EAP-TLS • RSN-PSK • RSN/EAP-TTLS • RSN/EAP-PEAP Example Shared-Key Authentication Configuration Step 1: Configure the virtual station. [wport1]IxWLAN -> conf 1 10.1.40.18 04:cf:1f:00:00:01 internal ping 10.1.40.
5 The Command Line Interface (CLI) Example Configurations Step 6: (Optional) Display the virtual station's configuration to verify that all parameters are correctly set. [wport1]IxWLAN -> get vsta 1 vSTA Configuration: ID ........................ Group ID .................. IP Address ................ DHCP ................... MAC Address ............... Connection Mode ........... Auth/Assoc Retry .......... Authentication Timeout .... Association Timeout ....... Authentication ............
The Command Line Interface (CLI) Example Configurations Step 2: Turn on authentication using wpa-psk. [wport1]IxWLAN -> set vsta 1 authentication wpa-psk [wport1]IxWLAN -> OK Step 3: Set the cipher mode to tkip. [wport1]IxWLAN -> set vsta 1 cipher tkip [wport1]IxWLAN -> OK Step 4: Turn on data encryption for the specified virtual station. [wport1]IxWLAN -> set vsta 1 encryption on [wport1]IxWLAN -> OK Step 5: Set the shared secret passphrase.
5 The Command Line Interface (CLI) Example Configurations RTS Threshold ............. Mode ...................... Layer .................. Load Application .......... Target IP Address ......... Ping Transmit Count ....... Ping Data Size ............ [wport1]IxWLAN -> 2346 internal 3 ping 10.1.40.16 1000 1024 NOTE: The parameters needed to configure WPA-PSK can be set individually as shown in this example or all at once, using the autoconf command.
The Command Line Interface (CLI) Example Configurations [wport1]IxWLAN -> set vsta 1 encryption on [wport1]IxWLAN -> OK Step 5: Select the EAP algorithm. [wport1]IxWLAN -> set vsta 1 eapalgorithm tls [wport1]IxWLAN -> OK Step 6: Set the certificate file. [wport1]IxWLAN -> set vsta 1 certfile MyCert.pfx [wport1]IxWLAN -> OK Step 7: Set the user ID.
5 The Command Line Interface (CLI) Example Configurations Target IP Address ......... 10.1.40.16 Ping Transmit Count ....... 1000 Ping Data Size ............ 1024 [wport1]IxWLAN -> NOTE: The parameters needed to configure WPA can be set individually as shown in this example or all at once, using the autoconf command. If the vSTA authentication is wpa, the vSTA tries WPA authentication using EAP-TLS and succeeds or fails based on the values of the other attributes.
The Command Line Interface (CLI) Example Configurations Step 6: (Optional) Show the virtual station's configuration to verify that all parameters are correctly set. [wport1]IxWLAN -> get vsta 1 vSTA Configuration: ID ........................ Group ID .................. IP Address ................ DHCP ................... MAC Address ............... Connection Mode ........... Auth/Assoc Retry .......... Authentication Timeout .... Association Timeout ....... Authentication ............ Pre-Shared Key .....
5 The Command Line Interface (CLI) Example Configurations Example RSN/EAP-TTLS Authentication Configuration In this example configuration, the following parameters are used to configure a vSTA for RSN/EAP-TTLS authentication: • authentication: rsn • cipher: aes-ccm • encryption: on • eapalgorithm: ttls • certfile: an imported certfile found in the IxWLAN Flash file system in the / Certificates directory.
The Command Line Interface (CLI) Example Configurations Step 6: Select the inner algorithm. [wport1]IxWLAN -> set vsta 2 inneralgorithm ms_chapv2 [wport1]IxWLAN -> OK Step 7: Set the outer identity. [wport1]IxWLAN -> set vsta 1 outeridentity MyOuterId [wport1]IxWLAN -> OK Step 8: Set the password. [wport1]IxWLAN -> set vsta 1 password MyPass [wport1]IxWLAN -> OK Step 9: Set the certificate file. [wport1]IxWLAN -> set vsta 1 certfile MyCert.pfx [wport1]IxWLAN -> OK Step 10: Set the user ID.
5 The Command Line Interface (CLI) Example Configurations AKMP Timeout .............. Cipher .................... Data Encryption ........... Shared-key Index .......... Fragmentation Threshold ... RTS Threshold ............. Mode ...................... Layer .................. Load Application .......... Target IP Address ......... Ping Transmit Count ....... Ping Data Size ............ [wport1]IxWLAN -> 0 Seconds aes-ccm On 1 2346 2346 internal 3 ping 10.1.40.
The Command Line Interface (CLI) Example Configurations Step 2: Turn on authentication using rsn. [wport1]IxWLAN -> set vsta 1 authentication rsn [wport1]IxWLAN -> OK Step 3: Set the cipher mode to aes-ccm. [wport1]IxWLAN -> set vsta 1 cipher aes-ccm [wport1]IxWLAN -> OK Step 4: Turn on data encryption for the specified virtual station. [wport1]IxWLAN -> set vsta 1 encryption on [wport1]IxWLAN -> OK Step 5: Select the EAP algorithm.
5 The Command Line Interface (CLI) Example Configurations Step 10: Set the user ID. [wport1]IxWLAN -> set vsta 1 userid MyUser [wport1]IxWLAN -> OK Step 11: Set the use of cached peap. [wport1]IxWLAN -> set vsta 1 fastreconnect enabled [wport1]IxWLAN -> OK Step 12: (Optional) Show the virtual station's configuration to verify that all parameters are correctly set. [wport1]IxWLAN -> get vsta 1 vSTA Configuration: ID ........................ 1 Group ID .................. 1 IP Address ................ 10.
The Command Line Interface (CLI) Example Configurations Changing the IxWLAN IP Address The following example describes how to change the IxWLAN IP address to match the IP subnet addressing scheme of the network where it is being installed. The example assumes the IP subnet of the network is 10.1.40.x. Step 1: Change the IP Address and subnet mask of the command PC as follows: • Select Control Panel from the Start menu on the PC. • Double-click the Network Connections icon.
5 The Command Line Interface (CLI) Example Configurations Figure 5-2. TCP / IP Properties • Select the Use the following IP address radio button and enter the IP address for the Ethernet connection. Use an IP Address that resides on the same IP subnet as IxWLAN. For example, use 192.168.0.2 if you are using the IxWLAN default IP address 192.168.0.50. • Click OK to close the Internet Protocol (TCP/IP) Properties dialog. • Click Close to close the Local Area Connection Properties dialog.
The Command Line Interface (CLI) Example Configurations WLAN MAC address ............. 00:02:8a:b6:1e:c9 WLAN address mask ............ ff:ff:ff:ff:00:00 LAN MAC address .............. 00:0b:16:00:00:57 BSSID of System Under Test ... 00:04:e2:38:a7:9c IxWLAN-SUT connection status ..... SUT not detected in most recent scan Power Management mode ........ Active (always awake) MIC Check .................... Enabled Crypto Hardware............... OK 0 vSTAs now in the system.
5 The Command Line Interface (CLI) CLI Editor CLI Editor After you have entered one or more CLI commands, press the ESC key to enter the edit mode. In the edit mode, you can use UNIX vi-style commands to quickly navigate, edit, and resubmit previous CLI commands. Use the history (hi) command to show a history of the last up-to-20 commands. This section covers the following topics: Movement and Search Commands • Movement and Search Commands on page 5-114. • Insert Commands on page 5-115.
The Command Line Interface (CLI) CLI Editor Fc: Find character c, searching backward. ^: Move cursor to first non-blank character in line. $: Go to end of line. 0 (zero): Go to beginning of line. Insert Commands In the following commands, input is expected until you press the ESC key. a: Append. A: Append at end of line. c SPACE: Change character. cl: Change character. cw: Change word. cc or S: Change entire line. c$ or C: Change everything from cursor to end of line. i: Insert.
5 The Command Line Interface (CLI) CLI Editor u: Undo last command. ~: Toggle case, lower to upper or vice versa. Special Commands CTRL-U: Delete line and exit edit mode. CTRL-L: Redraw line. CTRL-D: Fill in symbol name. RETURN: Give line to shell and exit edit mode. 5-116 IxWLAN User Guide, Release 6.
The Command Line Interface (CLI) CLI Editor IxWLAN User Guide, Release 6.
5 The Command Line Interface (CLI) CLI Editor 5-118 IxWLAN User Guide, Release 6.
Chapter 6: 6 The Programming Interface (Perl) The IxWLAN SDK is a set of Perl modules that provide an application programming interface to the Ixia IxWLAN family of products. With this interface, users can create Perl scripts that configure IxWLAN Virtual Stations and perform other functions programmatically, as provided by the IxWLAN CLI and the IxWLAN Web-Based User Interface. Note that the Perl scripts execute on the command PC, not on IxWLAN. IxWLAN User Guide, Release 6.
6 The Programming Interface (Perl) 6-2 IxWLAN User Guide, Release 6.
Chapter 7: Statistics Counters 7 The statistics counters defined in this chapter can be: • Selected when creating a new monitor in the Monitoring/New Monitor dialog. • Shown as legends or table headings in a monitor or reports page. • Displayed using CLI commands. This chapter covers the following topics: • Individual Virtual Station Counters on page 7-1. • Summary Statistics on page 7-7. • wport Statistics on page 7-16.
7 Statistics Counters Individual Virtual Station Counters Individual Virtual Station DHCP Statistics Example: [wport2]IxWLAN -> get vsta 1 dhcpinfo ** vSTA 1 DHCP Lease Information ** State ............ NULL Last XID ......... 0x00000000 Try limit ........ 0 Current try ...... 0 Offer limit ...... 0 Current offer .... 0 Try interval ..... 0 (Secs) Current timer .... 0 (Secs) Pkts xmtd ok ..... 0 DISCOVERs ...... 0 REQUESTs ....... 0 RENEWALs ...... 0 REBINDs ........ 0 RELEASEs ....... 0 DECLINEs ....
Statistics Counters Individual Virtual Station Counters Individual Virtual Station 802.
7 Statistics Counters Individual Virtual Station Counters Individual Virtual Station Ping Statistics These counters display only if the virtual station was configured for the internal mode: Bytes Received: Number of data bytes that were received in ICMP Echo Response packets Bytes Transmitted: Number of data bytes that were transmitted in ICMP Echo packets Packets Received: Number of ICMP Echo Response packets that were received Packets Transmitted: Number of ICMP Echo packets that were transmitted Round
Statistics Counters Individual Virtual Station Counters EAPOL Key Frames Rx: Number of EAPOL key frames received by this virtual station EAPOL Key Frames Tx: Number of EAPOL key frames transmitted by this virtual station Eapol Length Error Frames Rx: Number of EAPOL frames that were received by this virtual station in which the Packet Body Length field of the EAPOL header is invalid EAPOL Request Frames Rx: Number of EAP (Extensible Authentication Protocol) Request frames (other than Rq/Id frames) that wer
7 Statistics Counters Individual Virtual Station Counters Total EAPOL Frames Tx: Number of EAPOL frames of any type that were transmitted by this virtual station WPA Auth Failure Ct: Total number of failed WPA Authentications WPA Authentication Ct: Total number of successful WPA Authentications Individual Virtual Station Statistics Ack Rcv Fails: ACK receipt failures Authentication Type: Virtual station authentication type Encryption: Virtual station encryption mode (on/off) Excess Retries: Transmit ret
Statistics Counters Summary Statistics Summary Statistics Summary statistics provide a summary report taken over a set of virtual stations. The virtual stations set can be a defined group or all virtual stations currently in the system. By contrast, the individual virtual station statistics report offers a list of statistics and counters for an individual virtual station. The summary report provides a summary of the statistics and counters taken over the indicated set of virtual stations.
7 Statistics Counters Summary Statistics Summary Transmit Statistics TxCtrlAvg: Average Control Frames transmitted per virtual station TxCtrlFrames: Total Control Frames transmitted by all virtual stations TxCtrlMax: Maximum Control Frames transmitted per virtual station TxCtrlMin: Minimum Control Frames transmitted per virtual station TxDataAvg: Average data frames transmitted per virtual station TxDataFrames: Total data frames transmitted by all virtual stations TxDataMax: Maximum data frames transmitt
Statistics Counters Summary Statistics TxRetryMin: Minimum transmission retries per virtual station TxTotalRetries: Total transmission retries by all virtual stations Summary Receive Statistics RxCtrlAvg: Average Control Frames received per virtual station RxCtrlFrames: Total Control Frames received by all virtual stations RxCtrlMax: Maximum Control Frames received per virtual station RxCtrlMin: Minimum Control Frames received per virtual station RxDataAvg: Average data frames received per virtual statio
7 Statistics Counters Summary Statistics Summary Error Statistics Ack_Rcv_Fails: ACK receipt failures FCS_Fails: Frame checksum errors in received frames Rcv_CRC_Errors: CRC errors in received frames Rcv_Decrypt_Errors: Received frame decryption CRC errors Rcv_Discarded: Total received frames discarded Rcv_Duplicates: Duplicate frames received Rcv_PHY_Errors: Receive errors at the PHY level Tx_Discarded: Total transmit frames discarded Tx_Excess_Retries: Transmit retry tries exceeded WEP_Excluded: Receiv
Statistics Counters Summary Statistics WpaCcmpRplFail: Total received CCMP MPDUs discarded by the replay mechanism per virtual station WpaCcmpRplFailAvg: Average received CCMP MPDUs discarded by the replay mechanism per virtual station WpaCcmpRplFailMax: Maximum received CCMP MPDUs discarded by the replay mechanism per virtual station WpaCcmpRplFailMin: Minimum received CCMP MPDUs discarded by the replay mechanism per virtual station WpaRxEapol: Total EAPOL frames received (any type) per virtual station Wp
7 Statistics Counters Summary Statistics WpaRxEapolMin: Minimum EAPOL frames received (any type) per virtual station WpaRxEapolReq: Total EAPOL Request frames received (other than Rq/Id) per virtual station WpaRxEapolReqAvg: Average EAPOL Request frames received (other than Rq/ Id) per virtual station WpaRxEapolReqId: Total EAP Req/Id frames received per virtual station WpaRxEapolReqIdAvg: Average EAP Req/Id frames received per virtual station WpaRxEapolReqIdMax: Maximum EAP Req/Id frames received per vir
Statistics Counters Summary Statistics WpaRxMsg3Max: Maximum 4Way Handshake Msg3 frames received per virtual station WpaRxMsg3Min: Minimum 4Way Handshake Msg3 frames received per virtual station WpaTkipIcvErr: Total TKIP ICV errors detected when decrypting packets per virtual station WpaTkipIcvErrAvg: Average TKIP ICV errors detected when decrypting packets per virtual station WpaTkipIcvErrMax: Maximum TKIP ICV errors detected when decrypting packets per virtual station WpaTkipIcvErrMin: Minimum TKIP ICV e
7 Statistics Counters Summary Statistics WpaTxEapolKeyMin: Minimum EAPOL Key frames transmitted per virtual station WpaTxEapolMax: Maximum EAPOL frames transmitted (any type) per virtual station WpaTxEapolMin: Minimum EAPOL frames transmitted (any type) per virtual station WpaTxEapolRsp: Total EAP response frames (other than Resp/Id) transmitted per virtual station WpaTxEapolRspAvg: Average EAP response frames (other than Resp/Id) transmitted per virtual station WpaTxEapolRspId: Total EAP Resp/Id frames t
Statistics Counters Summary Statistics WpaTxMicFail: Total EAPOL MIC failure report events transmitted per virtual station WpaTxMicFailAvg: Average EAPOL MIC failure report events transmitted per virtual station WpaTxMicFailMax: Maximum EAPOL MIC failure report events transmitted per virtual station WpaTxMicFailMin: Minimum EAPOL MIC failure report events transmitted per virtual station WpaTxMsg2: Total 4Way Handshake Msg2 frames transmitted per virtual station WpaTxMsg2Avg: Average 4Way Handshake Msg2 fra
7 Statistics Counters wport Statistics wport Statistics If statistics for a particular wport are selected, one or more of the following values may display: DFS Statistics These statistics display solely if there has been at least one DFS Channel Switch event for a given wport. Ch Sw Tx Discarded: Transmit frames discarded during the last DFS channel switch execution. Ch Sw Tx Discarded Tot: Total transmit frames discarded during all DFS channel switch executions since last power on.
Statistics Counters wport Statistics wport Counters The wport counters provide an aggregation of all vSTAs on a specific wport. For further information, please refer to Individual Virtual Station Counters on page 7-1 and Summary Statistics on page 7-7. IxWLAN User Guide, Release 6.
7 Statistics Counters wport Statistics 7-18 IxWLAN User Guide, Release 6.
Chapter 8: Troubleshooting 8 This chapter covers the following topics: \ • Login Name and/or Password Recovery on page 8-1. • Using a Third-Party Load Generator on page 8-2. • Chassis Installation and LEDs on page 8-2. • Web-Based User Interface Problems on page 8-3. • Missing Key File on page 8-7. • Recovering a Corrupted Firmware File on page 8-9. • Configuration Records on page 8-14.
8 Troubleshooting Using a Third-Party Load Generator You may now log on using the factory default logon name (Admin) and password (IxWLAN). Following successful logon, you may use the set login or set password CLI commands to set these parameters as desired. Be sure to record the new settings for future reference. See Configuration Records on page 8-14. Using a Third-Party Load Generator Symptom: Telnet or the Web Client becomes unresponsive during a test or cannot connect at the conclusion of a test.
Troubleshooting Web-Based User Interface Problems Web-Based User Interface Problems The following section describes how to correct some of the more common problems that may occur in the Web-Based User Interface: Security Settings • Security Settings on page 8-3. • Login Error on page 8-4. • Splash Page Error on page 8-5. • IxWLAN Busy or Not Responding on page 8-5. • Loading Files from the Command PC on page 8-7.
8 Troubleshooting Web-Based User Interface Problems • In the Trusted sites dialog, enter the IxWLAN IP address in the Add this Web site to the zone field and click the Add button. Make sure that the Require server verification (https:) for all sites in this zone field is not checked. • Click OK in the Trusted sites dialog. • Click OK in the Internet Options dialog. Startup Error The web-based user interface needs Internet Explorer 6.0 or higher.
Troubleshooting Web-Based User Interface Problems If this error dialog opens, simply click No to continue. This error has no impact on the operation of the web-based user interface or IxWLAN. Splash Page Error The web-based user interface needs pop-ups. If pop-up blocker software is enabled on the command PC, the main page does not display and a message on the splash screen indicates that a pop-up blocker is running, as shown in Figure 8-4.
8 Troubleshooting Web-Based User Interface Problems The status (for example, Online) next to the IxWLAN IP address indicates the current status of IxWLAN with the web-based user interface. This status may intermittently show Busy. If the Busy condition lasts longer than the Polling Timeout specified in the Configure IxWLAN dialog, the status changes to Not Responding and the dialog shown in Figure 8-6 opens. Figure 8-6.
Troubleshooting Missing Key File Loading Files from the Command PC If you try to load a scenario file from the command PC using the web-based user interface, the browser may open the warning dialog shown in Figure 8-8. Figure 8-8. Loading Files from the Command PC If Figure 8-8 opens: • Click Internet Options from the Tools menu in Internet Explorer. • Click the Security tab in the Internet Options dialog. • Click the Trusted sites icon. • Set the Security level for this zone to Low.
8 Troubleshooting Missing Key File NOTE: The web-based user interface does not give any indication of a missing keyfile. When the keyfile is missing, the IxWLAN web server does not respond to the browser. If the keyfile is corrupted or does not exist, or you have requested a feature upgrade, you are asked to enter your unique key or authorization code when you establish a telnet or serial connection and log on to the CLI. Example: C:\>telnet 192.168.0.
Troubleshooting Recovering a Corrupted Firmware File When this message displays, the keyfile is created in flash and this procedure is no longer needed. Recovering a Corrupted Firmware File If you cannot re-establish a telnet connection to the CLI or access the web-based user interface after a new firmware file is loaded, use the supplied serial cable to establish a serial connection between the IxWLAN chassis and the command PC.
8 Troubleshooting Recovering a Corrupted Firmware File Step 2: Connect the serial cable and start a terminal emulation session. • Use the serial cable that is supplied with the unit to connect the IxWLAN chassis to the command PC. • On the command PC, run a terminal emulation program such as HyperTerminal, or some other suitable application. The PC’s COM port must be configured at 115200 baud, 8 data bits, 1 stop bit, and no parity.
Troubleshooting Recovering a Corrupted Firmware File • Press RETURN to end each changed field. Press CTRL-D when finished or press RETURN past any remaining fields. Example: [Boot]: c '.' = clear field; '-' = go to previous field; boot device : processor number : host name : file name : inet on ethernet (e) : inet on backplane (b): host inet (h) : gateway inet (g) : user (u) : ^D = quit ata:0 fei0 0 /ata0a/ixwlan.sys C:\Temp\Ixia\ixwlan.sys 192.168.0.20:ffffff00 192.168.0.101 192.168.0.
8 Troubleshooting Recovering a Corrupted Firmware File Example: IxWLAN login: Admin Password: ** • Use the ls and ls {dirName} commands to examine the available space in the file system. • It may be necessary to delete unused files to create enough available space for the firmware file. You may want to use the ftp command to save an archive before deleting. Use the rm command to delete a file. Step 6: Restore the boot image in flash.
Troubleshooting Recovering a Corrupted Firmware File Step 8: Done! Reboot and resume operations. NOTE: If you have installed firmware version 4.1 or later on an IxWLAN unit that was manufactured before the release of version 4.1, your unit may fail in the bootloader process due to an older boot ROM version. This can be recovered using a boot ROM update procedure that is provided in a separate document that is included with version 4.1+ downloads.
8 Troubleshooting Configuration Records Configuration Records Print the page shown in Table 8-1 and use the form to keep a record of the IxWLAN configuration parameters. Table 8-1. 8-14 IxWLAN Configuration Parameters Parameters Default CLI Commands IP address 192.168.0.50 set ipaddr Subnet mask 255.255.255.0 set ipmask Gateway 0.0.0.
Troubleshooting Configuration Records Table 8-1. Parameters IxWLAN User Guide, Release 6.
8 Troubleshooting Configuration Records 8-16 IxWLAN User Guide, Release 6.
Appendix A: Specifications A This appendix covers the following topics: • Hardware on page A-1. • Software on page A-2. Hardware Standards: IEEE 802.3, 802.3u, 802.11a, 802.11b, 802.11g, 802.11i, 802.1X Ports: • IxWLAN SED/SED-MR+ Ports: • (1) 10/100Base-T Ethernet management port, RJ-45 (UTP) • (1) 10/100/1000Base-T Ethernet data port, RJ-45 (UTP) • (1) RS-232 (DB9) • (1) 3-prong power cord receptacle Frequency Range: 802.11a: 5GHz UNII band, 802.11b/g: 2.4 GHz band.
A Software • 4.900 to 5.825 GHz LEDs: • Ethernet Link/Activity • Wireless Activity Antenna Type: Dual 1.5dBi stable diversity antenna (2.4G/5G). Power software configurable.
Software • Internal traffic ping rate: 4 pings/s/vSTA with packet size 0...1024 bytes. Maximum rate for IxWLAN SED: 4 x 64=256 packets/s Maximum rate for IxWLAN SED-MR+: 4x128 =512 packets/s. • Rate of vSTA authentication/association management frames: 1 authentication or association each 50 ms.
A Performance Maximum 802.3 packet size: 1518 bytes 802.11 Emulation: Fully emulates 802.11 station states in terms of: authentication, association, disassociation, de-authentication Operational Mode: Constant Awake Mode (CAM) or Power Save Mode External mode: Layer 2 traffic or Layer 3 IP/ARP traffic, per vSTA DHCP client: available per vSTA Internal Login: user name and password Flash size: 3.0 MBytes Total/1.
Performance NOTES: 1. Frames include the TCP/IP header, plus the data packet. 2. Data Packet is the payload within the frame. 3. pps = Packets-per-Second. 4. Detailed performance results for IxWLAN in terms of throughput (Mb/s and Packets-per-Second) are available upon request from Ixia. IxWLAN User Guide, Release 6.
A Performance A-6 IxWLAN User Guide, Release 6.
Appendix B: Event Logging B This chapter covers the following topics: • Overview on page B-1. • Event Record Format on page B-2. • CLI Commands on page B-3. • The Web-Based User Interface on page B-4. Overview During normal operation, IxWLAN processes and can log various types of events. When an event is logged, a record of the event is stored for future analysis.
B Event Record Format module enable (controlled by set evlog module enable/disable) Each event is processed by a given module or process within IxWLAN. The various processes of the system can be individually enabled for event logging. The event logging function stores event records into a buffer area in memory. The log buffer is a circular buffer that can store 512 event records. The get evlog buffer command can be used to display the contents of the buffer at any time.
CLI Commands CLI Commands The following CLI commands control event logging: set evlog enable/disable: This is the master control to enable/disable event logging (that is, to the event log buffer in RAM). The default is enabled. set evlog level : Sets the verbosity level (0/critical, 1/low, 2/medium, or 3/high) for event logging. The default is critical.
B The Web-Based User Interface The Web-Based User Interface You can configure and display the event log by selecting the Logging tab in the web-based user interface side bar. For details, see Event Log Side Bar on page 463. B-4 IxWLAN User Guide, Release 6.
Appendix C: Software Updates C This appendix covers the following topics: • Using the Web-Based User Interface on page C-1. • Using the CLI on page C-3. Using the Web-Based User Interface IxWLAN software can be updated using the web-based user interface or the CLI. Click the Update button in the IxWLAN side bar or select Update IxWLAN... from the About menu to open the Update IxWLAN dialog, as shown in Figure C-1. Figure C-1.
C Using the Web-Based User Interface Feature Key: To update the IxWLAN feature key, check this box and enter the feature key hex string. The Feature Key must be a valid ASCII hex string of exactly 52 characters and a valid feature key. Reboot IxWLAN: Check this box to reboot IxWLAN after the new firmware image or feature key is successfully loaded.
Using the CLI Using the CLI Complete the following steps to load a new software file on the IxWLAN chassis flash file system using the CLI. Step 1: If you are already logged on to the CLI, type reboot to return IxWLAN to a known state. reboot Step 2: Use Telnet to log back on to the CLI. C:\>telnet 192.168.0.50 IxWLAN login: Admin Password: ****** Ixia IxWLAN Rev 5.00 [wport1]IxWLAN -> This step uses the IxWLAN default IP address (192.168.0.50).
C Using the CLI Remote File: c:\ixwlan.sys Local File: ixwlanNEW.sys download or upload: down Getting @192.168.0.2:c:\ixwlan.sys -> ixwlanNEW.
Using the CLI If you are using the web-based user interface, you must clear the Internet Explorer cache after a software upgrade. • From Internet Explorer, select Tools->Internet Options. • From Internet Options, under Temporary Internet files, click the Delete Files…button. • From Delete Files, click Delete all offline content, then OK. IxWLAN User Guide, Release 6.
C Using the CLI C-6 IxWLAN User Guide, Release 6.
Appendix D: Cable Pin Assignments D This appendix covers the following topics: • Standard Ethernet Cable on page D-1. • Ethernet Crossover Cable on page D-2. • RJ-45 Connector on page D-2. • Serial Cable on page D-3. Standard Ethernet Cable A straight cable can be used to connect the Command PC to a hub and the hub to the IxWLAN SED/SED-MR+ chassis. For a straight cable, the wires match one for one (Figure D-1). This cable is not provided with IxWLAN.
D Ethernet Crossover Cable Ethernet Crossover Cable A crossover cable must be used to connect the Command PC directly to the IxWLAN SED/SED-MR+ chassis (Figure D-2). This cable is provided with IxWLAN. Pin 1: Rx+ Pin 2: RxPin 3: Tx+ Pin 4: Not Used Pin 5: Not Used Pin 6: TxPin 7: Not Used Pin 8: Not Used Figure D-2. Connecting via Ethernet Crossover Cable RJ-45 Connector Refer to Figure D-3. Figure D-3. D-2 RJ-45 Connector IxWLAN User Guide, Release 6.
Serial Cable Serial Cable Table D-1 shows the connector pin assignments for the DB9 connector. The provided serial cable is a straight cable with female and male connectors. In this table, DTE refers to the local or IxWLAN side of the connection, while DCE is the remote side. Table D-1.
D Serial Cable D-4 IxWLAN User Guide, Release 6.
Error and Status Messages Appendix E: E The CLI may show the following error and status messages in response to incorrect or unexpected user actions or WLAN activity. • IxWLAN or Virtual Station Control Messages on page E-1. • WLAN Driver Error Messages on page E-5. • MAC Layer Management Messages on page E-6. • Standard 802.11 WLAN Reason Codes on page E-7. • Standard 802.11 WLAN Status Codes on page E-8.
E IxWLAN or Virtual Station Control Messages Can't resolve gateway's address: The target IP address (internal mode vSTA) is not on the same IP subnet/net as IxWLAN. IxWLAN must forward the Ping frames to a gateway (through which the target may be reached). To forward frames to the gateway, IxWLAN must resolve the gateway's MAC address. This is done by issuing ARP (Address Resolution Protocol) requests for the gateway's MAC address.
IxWLAN or Virtual Station Control Messages vSTA Timed out TLS handshake: The TLS (Transport Layer Security) handshake has been timed out by IxWLAN for a given vSTA. This occurs when IxWLAN is expecting a TLS response from the Authenticator that has not arrived within a specified time period. Internal system error: Requested operation resulted in an unspecified internal error. Invalid message identifier: Internal error—the vSTA control task received a Command message with an invalid message identifier.
E IxWLAN or Virtual Station Control Messages indicate some problem with a certificate, namely, wrong format, invalid content, and so on. The following is an example of the event log output generated by using an invalid certificate: IxWLAN -> assoc vsta 1 IxWLAN -> Error:TLS Error, see event log IxWLAN -> get evlog file a 10/24/2004,2:19:54,245860.029095,42, vSTA 1: SSL error: pk12_read:Error reading PKCS#12 file 10/24/2004,2:19:54,245860.
WLAN Driver Error Messages vStaControl() Err writing NOTIFY into UI's queue: The vSTA control task cannot post a message because the UI task queue is full. This may occur if a web user logs out while IxWLAN is running. vStaControl() Task for NOTIFY no longer exists: The vSTA control task cannot post a message because the UI task is no longer present. This may occur if a telnet user logs out while IxWLAN is running.
E MAC Layer Management Messages MAC Layer Management Messages Invalid parameter: Internal error—an MLME function was invoked with an invalid parameter. MLME Already in BSS: Internal error—a requested MLME function was rejected because IxWLAN is already a member of a BSS. MLME Driver error: Internal error—an MLME function encountered an unspecified error in the device driver. MLME Op not supported: Internal error—an MLME function was invoked that is not supported in the current configuration.
Standard 802.11 WLAN Reason Codes Standard 802.11 WLAN Reason Codes Table E-1. 802.11 Reason Codes 802.11 Reason Code Message Text: Description 1 1: Unspecified: Unspecified reason 2 2: Authentication expired: Previous authentication of a station is no longer valid.
E Standard 802.11 WLAN Status Codes Table E-1. 802.11 Reason Codes (Continued) 802.11 Reason Code Message Text: Description 23 23: 802.1X Authentication failed 24 24: Cipher suite rejected per security policy Standard 802.11 WLAN Status Codes Table E-2. E-8 802.11 WLAN Status Codes 802.
Standard 802.11 WLAN Status Codes Table E-2. 802.11 WLAN Status Codes (Continued) 802.
E Standard 802.11 WLAN Status Codes E-10 IxWLAN User Guide, Release 6.
Additional Copyright and Trademark Notices Appendix F: F Some or all of the following notices may or may not apply depending on the features in IxWLAN. • The GoAhead WebServer: Copyright © 2003 GoAhead Software, Inc. All rights reserved. • OpenSSL: Copyright (c) 1998-2003 The OpenSSL Project. All rights reserved.
F ABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
THIS SOFTWARE IS GIVEN BY ERIC YOUNG “AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
F • All advertising materials mentioning features or use of this software must display the following acknowledgement: This product includes software developed by the University of Maryland at College Park, the Open1x team, and its contributors. • Neither the name of the University or Open1x team, nor the names of its contributors may be used to endorse or promote products derived from this software without specific prior written permission.
PROMISES, REPRESENTATIONS OR WARRANTIES, EITHER EXPRESS,IMPLIED,STATUTORY, OR OTHERWISE, WITH RESPECT TO THE SOFTWARE, INCLUDING ITS CONDITION,ITS CONFORMITY TO ANY REPRESENTATION OR DESCRIPTION, OR THE EXISTENCE OF ANY LATENT OR PATENT DEFECTS, AND CAVIUM SPECIFICALLY DISCLAIMS ALL IMPLIED (IF ANY) WARRANTIES OF TITLE, MERCHANTABILITY, NONINFRINGEMENT,FITNESS FOR A PARTICULAR PURPOSE,LACK OF VIRUSES, ACCURACY OR COMPLETENESS, QUIET ENJOYMENT, QUIET POSSESSION OR CORRESPONDENCE TO DESCRIPTION.
F F-6 IxWLAN User Guide, Release 6.
Appendix G: Regulatory Information G This appendix covers the following topics: • Radio Frequency Interference Needs on page G-1. • FCC Declarations of Conformity and Warning on page G-1. • RF Exposure Needs on page G-2. • EU Declarations of Conformity (Europe) on page G-2. Radio Frequency Interference Needs 802.11a devices transmit in the 5 GHz band. 802.11b and 802.11g devices transmit in the 2.4 GHz band.
G RF Exposure Needs RF Exposure Needs To ensure compliance with FCC RF exposure needs, the antenna used for this device must be installed to give a separation distance of at least 20 cm from all persons and must not be found or operating in conjunction with any other antenna or radio transmitter. Installers and end-users must follow the installation instructions given in this guide.
Glossary A AAA Authentication, Authorization and Accounting AES Advanced Encryption Standard AKMP Authentication Key Management Protocol AP Access Point API Application Key Management Protocol ARP Address Resolution Protocol B BPSK Binary Phase Shift Keying BSS Basic Service Set is population of 802.11 stations (STA) communicating with each other. BSSID The Basic Service Set Identifier is the unique identifier for a given BSS (AP). The used format is the IEEE 48 bit MAC address.
Glossary CCMP Counter Mode with Cipher Block Chaining Message Authentication Protocol CHAP PPP Challenge Handshake Authentication Protocol CLI Command Line Interface CSMA/CA Carrier Sense Multiple Access/Collision Avoidance CSV Comma-Separated-Values D DA Destination Address dBm/mW Power ratio in dB (decibel) of the measured power referenced to one milliwatt.
Glossary H HMAC keyed-Hash Message Authentication Code I IAPP Inter-Access Point Protocol IBSS An Infrastructure BSS is the same as a BSS with one STA implementing the Distribution Services function (aka AP). It is the acronym for an independent BSS.
Glossary O OFDM Orthogonal Frequency Division Multiplexing P PEAP Protected Extensible Authentication Protocol PHY Physical Layer PKCS Public-Key Cryptography Standards PKI Public Key Infrastructure PMK Pairwise Master Key PMKD Pairwise Master Key Identifier PMKA Pairwise Master Key Security Association POST Power On Self-Test PPP Point-to-Point Protocol PSK Pre-Shared Key PTK Pairwise Transient Key Q QPSK Quadrature Phase Shift Keying R RF Radio Frequency RSN Robust Security N
Glossary S SDK Software Developer Kit SHA Secure Hash Algorithm SNTP Simple Network Time Protocol SSID The Service Set Identity is one of the information defined by the 802.11 specifications. The SSID Information Element is present in all 802.11 association requests, re-association requests, probe requests, probe responses and beacons. The SSID is the Service Set Identity of the IEEE 802.11 WLAN and, as such, it is often the name of a network.
Glossary WLANA Wireless LAN Association WPA WiFi Protected Access Glossary-6 IxWLAN User Guide, Release 6.
Index Numerics 802.
Index config 5-67 countrycode 5-69 cp 5-95 cryptocap 5-69 cryptotest 5-63 ctsmode 5-88 ctsrate 5-89 ctstype 5-89 date 5-79 deauth 5-26 disassoc 5-27 evlog 5-54 exec 5-64 factorydefault 5-80 features 5-70 format 5-95 frequency 5-70 ftp 5-65 halt 5-36 help 5-76 history 5-76 hostipaddr 5-95 hwtxretries 5-95 import certfile 5-76 init 5-36 ipaddr 5-71 join 5-10 key 5-64 keyentrymethod 5-71 login 5-71 ls 5-96 mv 5-96 password 5-82 ping 5-77 pmmode 5-72 power 5-72 psinterval 5-72 quit 5-78 rate 5-73 reboot 5-78 r
Index G geet multiradiomode 5-72 Get 5-53, 5-55 get 5-28, 5-30, 5-66, 5-67, 5-69, 5-70, 5-71, 5-72, 5-73, 574, 5-75 get wport 5-75 GID 4-20 Group Control 4-19 H halt 5-36 I import 5-76 Individual 7-1, 7-3, 7-4, 7-6 init 5-36 Insert 5-116 Internal Mode 4-6, 4-28, 5-20, 5-24 Interval IxWLAN Polling 4-45 Monitor Update 4-62 IP Address 5-71 Iteration 4-20, 4-29, 4-30, 4-77 IxWLAN 8-5 Busy 4-16, 4-45 Changing IP Address 5-112 CLI Commands 5-60 Configuration 5-67 Not Reponding 8-6 Not Responding 4-45 Polling Int
Index releaseip 5-37 Reports Export 4-70 Group Summary 4-68 Master Station 4-69 Templates 4-70 Virtual Station Detail 4-70 reset 5-38 rm 5-96 roam 5-38 RSN 1-6 EAP Algorithm 4-35 Events 4-65, 5-59 Example Configuration 5-107, 5-109 Passphrase 4-35, 5-11 PEAP/TTLS Parameters 4-35 RSN-PSK Example Configuration 5-105 Virtual Station Configuration 4-34 RTS Threshold per vSTA 4-30, 5-21, 5-46, 5-51 run 5-39 S Save 5-57 save 5-39, 5-40 scan 5-11 Scenario Group 4-87 Menu 4-84 Open Existing 4-4 Run 4-9 Save 4-12,
Index Transitional States 4-77 vSTA 4-25 W Web 8-3 Web-Based User Interface 4-1 Welcome Screen 4-78 Wireless Mode 4-42 WPA 1-6, 7-10 AKMP Information 5-17 EAP Algorithm 4-35 Event 5-59 Events 4-65 Example Configuration 5-103 Passphrase 4-35, 5-7, 5-11 PEAP/TTLS Parameters 4-35 Pre-Shared Key 4-34, 4-74 WPA Certificate Files 1-7 WPA-PSK Example Configuration 5-101 Virtual Station Configuration 4-34 IxWLAN User Guide, Release 6.
Index Index-6 IxWLAN User Guide, Release 6.