IxWLAN™ User Guide Release 6.20 Part No.
Copyright © 2007 Ixia. All rights reserved. This publication may not be copied, in whole or in part, without Ixia’s consent. RESTRICTED RIGHTS LEGEND: Use, duplication, or disclosure by the U.S. Government is subject to the restrictions set forth in subparagraph (c)(1)(ii) of the Rights in Technical Data and Computer Software clause at DFARS 252.227-7013 and FAR 52.22719.
Table of Contents Chapter 1 Introduction Introduction to IxWLAN . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-1 Packaging Checklist . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-3 Features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-4 WPA/RSN . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-6 Files. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-8 System Needs . . .
Table of Contents Connecting Directly to a Command PC . . . . . . . . . . . . . . . . 2-2 Connecting Through an Ethernet Hub or Switch . . . . . . . . . 2-3 Connecting to the Serial Port . . . . . . . . . . . . . . . . . . . . . . . . 2-3 Chapter 3 First Setup Using the Ethernet Ports . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-1 Using the Serial Port . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-5 Chapter 4 The Web-Based User Interface Startup and Login. . . . . . . . . .
Table of Contents Chapter 5 The Command Line Interface (CLI) CLI Usage Notes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-3 User Login . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-3 User Logoff . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-4 CLI Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-4 System Under Test Commands. . . . . . . . . . . . . . . . . . . . . . .
Table of Contents wport Statistics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-16 Chapter 8 Troubleshooting Login Name and/or Password Recovery . . . . . . . . . . . . . . . 8-1 Using a Third-Party Load Generator . . . . . . . . . . . . . . . . . . 8-2 Chassis Installation and LEDs . . . . . . . . . . . . . . . . . . . . . . . 8-2 Web-Based User Interface Problems . . . . . . . . . . . . . . . . . 8-3 Missing Key File. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Table of Contents Appendix C Software Updates Using the Web-Based User Interface . . . . . . . . . . . . . . . . . .C-1 Using the CLI. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .C-3 Appendix D Cable Pin Assignments Standard Ethernet Cable . . . . . . . . . . . . . . . . . . . . . . . . . . . .D-1 Ethernet Crossover Cable . . . . . . . . . . . . . . . . . . . . . . . . . . .D-2 RJ-45 Connector . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .D-2 Serial Cable. .
Table of Contents RF Exposure Needs. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . G-2 EU Declarations of Conformity (Europe) . . . . . . . . . . . . . . . G-2 Glossary Index viii IxWLAN User Guide, Release 6.
Chapter 1: Introduction 1 This chapter covers the following topics: • Introduction to IxWLAN on page 1-1. • Packaging Checklist on page 1-3. • Features on page 1-4. • WPA/RSN on page 1-6. • Files on page 1-8. • System Needs on page 1-10. • Hardware Characteristics on page 1-10. • General Usage Notes on page 1-12. • Feature Key Dependent Parameters on page 1-13. Introduction to IxWLAN IxWLAN is a test and measurement device that emulates up to 128 wireless stations in an IEEE 802.
1 Introduction Introduction to IxWLAN performance and number-of-stations capacity. It allows a user to fine-tune system parameters to maximize performance during testing. The differences between IxWLAN and other IP load generators can be summarized as follows: • IP-based Load Generators are per-station devices that do not reduce the number of PCs and station NIC cards. You can configure only one IP per station and then send traffic.
Introduction Packaging Checklist IxWLAN SED-MR+ Figure 1-2 shows the IxWLAN SED-MR+ chassis. Figure 1-2.
1 Introduction Features Features Table 1-1. • Supports IEEE 802.11a, 802.11b, 802.11g • Supports 802.11h Dynamic Frequency Selection (DFS) and Transmit Power Control (TPC) • The IxWLAN SED chassis emulates up to 64 concurrent virtual stations, while the IxWLAN SED-MR+ chassis supports up to 128 virtual stations.
Introduction Features Table 1-1. Authentication (Continued) Authentication Cipher Security Configuration WPA TKIP or AES-CCM EAP Algorithm: TLS, TTLS, or PEAP WPA-PSK TKIP or AES-CCM Pre-Shared Key or Passphrase RSN TKIP or AES-CCM EAP Algorithm: TLS, TTLS, or PEAP RSN-PSK TKIP or AES-CCM Pre-Shared Key or Passphrase Additional Security Configuration User ID/Client Certificate File. For TTLS/PEAP, Inner Algorithm (MSCHAPv2, EAP-MS-CHAPv2), Outer ID, and Password.
1 Introduction WPA/RSN WPA/RSN This section covers the following topics: Introduction to WPA/RSN • Introduction to WPA/RSN on page 1-6. • EAP Algorithms on page 1-7. • Certificate Files on page 1-7. • Key Hierarchy and Configuration on page 1-7. • Protocol Conformance Testing on page 1-8. Individual virtual stations can be configured with WPA or RSN authentication. A vSTA can be configured to use either PSK or full 802.1X/EAP authentication. RSN does the strong security of IEEE 802.11i.
Introduction WPA/RSN 802.1X EAPOL-Key packets are used by WPA and RSN to negotiate and derive pairwise keys used to protect unicast traffic. Group key handshake is used to deliver the group key to each virtual station for protecting multicast and broadcast class 3 data frames. • Data Privacy (Encryption) – TKIP or AES-CCM (that is, CCMP) is used to replace WEP with more sophisticated cryptographic and security techniques.
1 Introduction Files The 4-way handshake (obtain/install PTK) is processed as follows: • EAPOL-Key Message exchange (four messages) • Verify that a live peer holds the PMK. • Verify that the PMK is current. • Obtain a fresh PTK from the PMK. • Install the Pairwise encryption and integrity keys into IEEE 802.11. • Confirm the installation of the keys. The Group Key Handshake (obtain/install Group Transient Key) is processed using an EAPOL-Key Message exchange (two messages).
Introduction Files Table 1-2. Directory Directories and Files Maintained in the Flash File System (Continued) Files Description • keyfile: The keyfile is a reserved file that contains the IxWLAN authorization code. It is a hidden file and is shown only in the directory list in the CLI administrative mode. Do not delete this file or try to access or modify it. The system needs it. /Cache Encapsulated certificate file passwords When a certificate file is imported into IxWLAN, a password is needed.
1 Introduction System Needs System Needs • A PC with an available serial port or 10/100 Ethernet port that can be used to send commands to IxWLAN • If the web-based user interface is used, the command PC must be equipped with: • Microsoft Windows 2000/XP • Microsoft Internet Explorer Version 6.0 or higher • Recommended Memory: 256 MB • Recommended Virtual Memory: 300 MB • Recommended Processor Speed: PIII 700 MHz. • One of the following ActiveX objects: Msxml2.XMLHTTP or Microsoft.XMLHTTP.
Introduction Hardware Characteristics • Serial Connector – This connector is used to connect a command PC to IxWLAN. The configuration of the serial port is: 115,200 b/s, 8 data bits, no parity, 1 stop bit, and no flow control. • Power Connector – The IxWLAN SED/SED-MR+ chassis uses a standard 3prong, 110 VAC power cable. IxWLAN SED/SED-MR+ can attach directly to 10BASE-T/100BASE-TX (twisted-pair) Ethernet LAN hubs or segments or a PC. All this must conform to the IEEE 802.3 specification.
1 Introduction General Usage Notes IXWLAN SED-MR+ The IxWLAN SED-MR+ chassis has two LEDs associated with each WLAN port (wport) or Radio (that is, six LEDs in all). During power-up, the left LED blinks briefly, while the right LED goes off solid. After booting, the left LED turns on solid, while the right LED turns off solid. In the idle state (in which no wports are joined and there is no activity), the left LED turns solid on, while the right one goes off solid.
Introduction Feature Key Dependent Parameters less mode does not discover an 802.11b or 802.11g device. Make sure that the wireless mode that you select for IxWLAN is compatible with the device that you want to test. See IxWLAN->Configure IxWLAN on page 4-44 and Virtual Station Setup and Control Commands on page 5-14. 4. The IxWLAN Wireless LAN MAC address defaults to a specific address (typically in the 00:0b:16:xx:xx:xx range).
1 Introduction Feature Key Dependent Parameters Table 1-5. Feature Key Dependent Parameters (Continued) Web-Based User Interface Fields CLI Commands Feature Key Dependent Parameters Needed Feature Key IxWLAN->Configure IxWLAN-> Radio tab: Wireless Mode set wireless mode 802.
Introduction Feature Key Dependent Parameters Table 1-5.
1 Introduction Feature Key Dependent Parameters Table 1-5. Feature Key Dependent Parameters (Continued) Web-Based User Interface Fields CLI Commands Feature Key Dependent Parameters Needed Feature Key Config > Security->Fast RADIUS autoconf, get group, get vsta, set group, set vsta fastreconnect WPA/RSN Config > Security->PMKSA autoconf, get group, get vsta, set group, set vsta pmkcache WPA/RSN Table 1-6 describes the IxWLAN License Options. Table 1-6.
Chapter 2: Installation 2 This chapter covers the following topics: • Attaching the Antennas on page 2-1. • Connecting Directly to a Command PC on page 2-2. • Connecting Through an Ethernet Hub or Switch on page 2-3. • Connecting to the Serial Port on page 2-3. Attaching the Antennas To be able to use the IxWLAN SED/IxWLAN SED-MR+ chassis, the antennas must be attached. IxWLAN SED Chassis Twist the multiband antennas into the two antennas ports labeled 802.11bg and 802.11a.
2 Installation Connecting Directly to a Command PC Connecting Directly to a Command PC To connect the IxWLAN SED/IXWLAN SED-MR+ chassis to a command PC: 1. Connect one end of the supplied Ethernet crossover cable to the Ethernet port on the command PC. 2. Connect the other end of the crossover cable to the Mgmt. Port on the chassis, as shown in Figure 2-1. Figure 2-1. 2-2 Connecting the IxWLAN SED/SED-MR+ Chassis to a Command PC IxWLAN User Guide, Release 6.
Installation Connecting Through an Ethernet Hub or Switch Connecting Through an Ethernet Hub or Switch To connect the IxWLAN SED/IXWLAN SED-MR+ chassis through an Ethernet hub or switch: 1. Connect one end of a standard Ethernet cable (not included) to the Ethernet port on the command PC. Connect the other end of the cable to the Ethernet Connector on the Ethernet hub or switch. 2. Connect one end of a standard Ethernet cable to a port on the hub or switch. Connect the other end of the cable to the Mgmt.
2 Installation Connecting to the Serial Port 2-4 IxWLAN User Guide, Release 6.
Chapter 3: First Setup 3 This chapter covers the following topics: • Using the Ethernet Ports on page 3-1. • Using the Serial Port on page 3-5. Using the Ethernet Ports This section covers the following topics: Command PC Attached to Port on IxWLAN SED • Command PC Attached to Port on IxWLAN SED on page 3-1. • Web-Based User Interface on page 3-3. • Command Line Interface on page 3-4.
3 First Setup Using the Ethernet Ports Figure 3-1. Local Area Connection Properties 4. Click Internet Protocol (TCP/IP). 5. Click the Properties button and the Internet Protocol (TCP/IP) Properties dialog opens, as shown in Figure 3-2. Figure 3-2. TCP / IP Properties Dialog 6. Click the Use the following IP address radio button and type the IP address for the Ethernet connection. Use an IP Address that resides on the same IP subnet as IxWLAN. For example, use 192.168.0.
First Setup Using the Ethernet Ports Web-Based User Interface The command PC must be equipped with: • Microsoft Windows 2000/XP • Microsoft Internet Explorer version 6.0 or higher • Recommended Memory: 256 MB • Recommended Virtual Memory: 300 MB • Recommended Processor Speed: PIII 700 MHz • One of the following ActiveX objects: Msxml2.XMLHTTP or Microsoft.XMLHTTP. If either of these objects is not found, an alert message displays: “FATAL ERROR: Error creating ActiveX object XMLHTTP”.
3 First Setup Using the Ethernet Ports NOTE: Make sure that the Require server verification (https:) checkbox for all sites in this zone is not clicked. • Click OK in the Trusted sites dialog. • Click OK in the Internet Options dialog. Use the IxWLAN default IP address 192.168.0.50 for the first setup, as shown in Figure 3-4. Figure 3-4. First Setup Example For further information about how to use the web-based user interface, please refer to Chapter 4, The Web-Based User Interface.
First Setup Using the Serial Port Using the Serial Port If the command PC is connected to the IxWLAN chassis via the serial port, the web-based user interface is not available. To configure the Command PC and then access the CLI: 1. On the Command PC, start a terminal-emulation program such as HyperTerminal. 2. In the Connection Description dialog, type a name for the connection in the Name field (for example, IxWLAN). 3.
3 First Setup Using the Serial Port 5. Set the COM port settings as shown in Figure 3-6 on page 3-5: • Bits per second: 115200 for IxWLAN SED • Data bits: 8 • Parity: None • Stop bits: 1 • Flow control: None 6. Click OK to close the COM properties dialog. The POST messages appear on the HyperTerminal screen a few seconds after IxWLAN is connected to the power source. Attached TCP/IP interface to fei0 Attaching network interface lo0...done. Loading... 11443040 Starting at 0x308000...
First Setup Using the Serial Port When the IxWLAN logon prompt opens, use the information in Chapter 5, The Command Line Interface (CLI) to log on and access the CLI. IxWLAN User Guide, Release 6.
3 First Setup Using the Serial Port 3-8 IxWLAN User Guide, Release 6.
Chapter 4: 4 The Web-Based User Interface This chapter covers the following topics: • Startup and Login on page 4-1. • Choosing and Creating a Scenario on page 4-3. • Using the Main Page on page 4-14. • vSTA Side Bar on page 4-25. • IxWLAN Side Bar on page 4-40. • Monitors Side Bar on page 4-55. • Event Log Side Bar on page 4-63. • Reports Side Bar on page 4-66. • Configuration Side Bar on page 4-71. • Menus and Tool Bars on page 4-78.
4 The Web-Based User Interface Startup and Login NOTES: • The default user name is Admin. • The default password is IxWLAN. The user name and password are case-sensitive. Figure 4-1. Startup and Login 4. Click OK to access the IxWLAN web server. 5. After successful logon, a splash page opens for a few seconds. NOTE: If pop-up blocker software is installed on your system, this splash page opens an error message. For details, see Chapter 8, Troubleshooting. 4-2 IxWLAN User Guide, Release 6.
The Web-Based User Interface Choosing and Creating a Scenario Choosing and Creating a Scenario This section covers the following topics: Choosing How to Begin • Choosing How to Begin on page 4-3. • Creating an Internal Mode/Ping Test on page 4-6. • Creating an External Mode Test on page 4-7. • Running a Test on page 4-9. When IxWLAN already contains virtual station definitions, the dialog shown in Figure 4-2 opens. Figure 4-2.
4 The Web-Based User Interface Choosing and Creating a Scenario . Figure 4-3. Screen Opening When There Are No Virtual Stations Definitions • Click New Scenario to continue to the main page and create a new scenario. • Click Open Scenario to choose from a list of scenario files that have already been created. When you open an existing scenario, IxWLAN information is already stored with the scenario file. • Click Cancel to exit the dialog.
The Web-Based User Interface Choosing and Creating a Scenario • Click the Delete button to delete the selected file. • Click the Cancel button to close this dialog without opening a scenario file. You can create a new scenario or open an existing scenario in the main page. Main Page Figure 4-5 shows the format of the main page that opens after you select any of the options in the start-up dialogs.
4 The Web-Based User Interface Choosing and Creating a Scenario If you click the Cancel button or the Create New Scenario button, you must create a new scenario that contains one or more group(s) of one or more virtual station(s). Creating an Internal Mode/Ping Test For a simple internal mode/ping test: 1. Click New Group from the vSTA side bar to open the New IxWLAN Group dialog, as shown in Figure 4-6. . Figure 4-6. New IxWLAN Group Dialog 2.
The Web-Based User Interface Choosing and Creating a Scenario 3. Select the Traffic tab, as shown in Figure 4-7. Figure 4-7. Traffic Tab 4. Make sure that the Target IP Address field is set to the address of a target server to be pinged. The default IP address (0.0.0.0) shown in this example screen must be replaced by a valid IP address (for example, 10.205.15.95). Click the Create button to create a group with five virtual stations.
4 The Web-Based User Interface Choosing and Creating a Scenario 2. Select New Group from the vSTA side bar to open the New IxWLAN Group dialog, as shown in Figure 4-8. Figure 4-8. Select New Group from vSTA Side Bar 3. For layer 3, the source IP on your load generator must match the starting IP address assigned to the first vSTA on IxWLAN. For layer 2, the source MAC on your load generator must match the starting MAC address assigned to the first vSTA on IxWLAN. 4-8 IxWLAN User Guide, Release 6.
The Web-Based User Interface Choosing and Creating a Scenario 4. Select the Traffic tab, as shown in Figure 4-9. Figure 4-9. Traffic Tab 5. Select External in the Traffic Source field. Click the Layer 2 radio button to capture frames based on an 802.3 MAC source address. Click the Layer 3 radio button to capture frames based on an IP source address. A target IP address is not needed for an external mode test. 6. Click the Create button to create the scenario for an external mode test.
4 The Web-Based User Interface Choosing and Creating a Scenario Figure 4-10. Running a Test without Joining a SUT Click Yes to open the Select System Under Test dialog and join with the System Under Test. NOTE: It is always necessary to join with a System Under Test before running a test (internal or external). If there are no SSIDs listed in the main page, the Select System Under Test dialog does not show any systems to join.
The Web-Based User Interface Choosing and Creating a Scenario 3. Click the Select SUT button in the IxWLAN side bar. Figure 4-11. Select SUT Dialog If you have created a new scenario and have not saved it using the Save Scenario option in the File menu, the dialog shown in Figure 4-12 opens, asking you to save the scenario. Figure 4-12. Save Scenario Dialog IxWLAN User Guide, Release 6.
4 The Web-Based User Interface Choosing and Creating a Scenario Click Yes to open the Save Scenario dialog and save the scenario file, as shown in Figure 4-13. Figure 4-13. Save Scenario File Type a name in the File Name field. NOTE: Do not use colon (:), asterisk (*), question mark (?), quotes (“ “), lessthan/greater than signs (< >), vertical bar (|), or spaces in a file name. • Click the Save (IxWLAN) button to save the scenario in the IxWLAN flash file system.
The Web-Based User Interface Choosing and Creating a Scenario Type a name in the File Name field. NOTE: Do not use colon (:), asterisk (*), question mark (?), quotes (“ “), lessthan/greater than signs (< >), vertical bar (|), or spaces in a file name. A disk drive specification (for example, C:/, D:/) is optional. Click the Save button to save the scenario at the designated location on the command PC. The virtual stations start running a few seconds after the scenario is saved.
4 The Web-Based User Interface Using the Main Page Using the Main Page NOTE: The appearance of the main IxWLAN window differs depending on the type of chassis used to run the web-based interface: • In the main window of the IxWLAN SED chassis, the BSSIDs for the other two wports, which are available in the IxWLAN SED-MR+ chassis main window, are disabled, appearing dimmed, as well as the corresponding SUTselection buttons.
The Web-Based User Interface Using the Main Page For the IxWLAN SED chassis, the main window has a similar appearance, except for the two other wports, which are dimmed. Figure 4-16 shows a scenario with one virtual station group defined and the Group Control tab selected. Figure 4-16. IxWLAN SED Main Page IxWLAN User Guide, Release 6.
4 The Web-Based User Interface Using the Main Page When the Group Control tab is selected, the main page opens the Load Profile and a list of devices that have been discovered (if any) in a scan, as shown in Figure 4-17. Figure 4-17. Load Profile and List of Devices Menu tool bar: The top-left tool bar of the main page is a drop-down menu bar of all IxWLAN functions (Figure 4-18). Figure 4-18.
The Web-Based User Interface Using the Main Page >Configure IxWLAN on page 4-44 and to IxWLAN Busy or Not Responding on page 8-5. System Under Test status tool bar: It is located under the Menu and Status tool bars and shows the BSSID(s) and buttons to choose SUT(s) for specific wports. The status (for example, Not Found) next to the BSSID/MAC address indicates the current status of IxWLAN with a System Under Test (Figure 4-20). Figure 4-20.
4 The Web-Based User Interface Using the Main Page Test Clock: The clock icon and time (hh:mm:ss) immediately adjacent to the Reports tool bar shows the elapsed duration of a test that is in progress or the most recent test that completed (Figure 4-25). Figure 4-25. Test Clock Side Bar Buttons: The side bar buttons are used to select vSTA, IxWLAN, Monitor, Report, Event Log, and Configuration functions in the web-based user interface (Figure 4-26). Figure 4-26.
The Web-Based User Interface Using the Main Page Group Control Grid If the Group Control tab is selected, the table shows the status of each group and its associated virtual stations, as shown in Figure 4-27. Figure 4-27. Group Status Group: Shows the name of each group. The name is assigned in the New IxWLAN Group dialog (For more information, please refer to vSTA->New Group on page 4-26).
4 The Web-Based User Interface Using the Main Page wport Tabs: Each wport has its own tab. When a wport tab is selected, the table displays details on the vSTAs corresponding to the respective wport. The table columns are the same as for the Groups tabs, except for the wport column. NOTE: While in the wport tab view, the Edit and Group menu items are dimmed. Group Tabs: Each group defined in the scenario has its own tab.
The Web-Based User Interface Using the Main Page You can select one or more line items/virtual stations in the table and choose a menu item or tool bar button to execute a command for an individual or multiple virtual stations. You can double-click a virtual station line item in the table to open the Edit Virtual Station dialog. For more information about this dialog, please refer to vSTA>Add New vSTA to Group on page 4-39. You can right-click the selected virtual stations to open the vSTA menu.
4 The Web-Based User Interface Using the Main Page Figure 4-30. Load Profile When automatic scheduling is defined, the grid in the down side of the Scheduling/Group table charts the status of each virtual station over the period of the test. For further information about using this feature please refer to Using Load Profiles on page 4-23.
The Web-Based User Interface Using the Main Page If there are multiple monitors defined, use the horizontal tabs at the top of this section to select and view each monitor, as shown in Figure 4-33. Figure 4-33. Multiple Monitors A maximum of four monitors can be defined in each scenario. The tool bar in the top right corner of the monitor area allows you to define a new monitor, delete a monitor, run a paused monitor, pause a running monitor, and clear a monitor’s view.
4 The Web-Based User Interface Using the Main Page Figure 4-35. Load Profile Settings When using the Unscheduled mode, the virtual stations can be manually controlled. When using the Scheduled mode, the virtual stations can be run incrementally based on groups (all virtual stations within the group) or by individual virtual stations. NOTE: When requests are batched for transmission, they may not be sent at the scheduled interval defined by the Load Profile.
The Web-Based User Interface vSTA Side Bar Figure 4-36. Load Profile Setup and Graph After a five-second delay, the web-based user interface instructs IxWLAN to run four virtual stations. Every five seconds thereafter, the web-based user interface instructs IxWLAN to run another four virtual stations until all virtual stations are executed. The graph depicts this scheduling scheme.
4 The Web-Based User Interface vSTA Side Bar vSTA->New Group The New Group dialog allows you to define new groups of virtual stations in a scenario. It is a tabbed dialog with the following sections: vSTA, Traffic, Runtime, On Error, and Security. • The Create button allows you to create the group. • The Cancel button allows you to exit the dialog.
The Web-Based User Interface vSTA Side Bar Number of Virtual Stations: Type the number of virtual stations to create in this scenario group. The maximum number of vSTAs for the IxWLAN SED chassis is 64, and 128 for the IxWLAN SED-MR+ chassis. The default value is 5. If you specify zero virtual stations in this dialog, you must use the Add vSTA to Group dialog to add one or more virtual stations to this group. The Add vSTA to Group dialog uses the default parameters that you set in this group definition.
4 The Web-Based User Interface vSTA Side Bar Ending MAC Address: Type the ending MAC address to be used by virtual stations in this group. SSID: Set the SSID to a string. The user can create a vSTA with a SSID. This is an optional field. vSTA->New Group->Traffic The Traffic section of the New IxWLAN Group dialog defines the type of traffic (Internal/Ping or External/Load Generator) to be used by the virtual station(s), as shown in Figure 4-38. Figure 4-38.
The Web-Based User Interface vSTA Side Bar virtual station's IP address as a source are translated at the MAC layer to appear as if sourced from the virtual station's MAC address. Target IP Address: Type the target IP address where ICMP Echo (Ping) Requests should be sent. The default IP address (0.0.0.0) shown in this example dialog must be replaced by a valid IP address (for example, 192.168.0.19). Packet Length: Specify the size of the ping data buffer (64…1024). The default is 1024.
4 The Web-Based User Interface vSTA Side Bar Number of Iterations: Type the number of times (1…10000) to repeat the virtual station’s task (Ping) or click the Infinite checkbox to continuously iterate indefinitely. Iteration Delay: Type the delay (in ms) to be introduced between iterations of the test. It can be set to a value in the 0 to 300000 ms (5 min) range. Before Running Next Iteration->Reset vSTA State to: Select a state from the list box.
The Web-Based User Interface vSTA Side Bar Figure 4-40. vSTA Error Number of Retries: Specifies the number of times IxWLAN should issue authentication and association requests before failing the operation. It can be a value in the 0 to 10 range. Persist: Click the checkbox to enable or disable persistence. When enabled, virtual stations in this group remain persistent (connected) if the System Under Test deauthenticates or disassociates.
4 The Web-Based User Interface vSTA Side Bar vSTA->New Group->Security This section of the New Group dialog defines whether the virtual station uses security, the type of authentication to be used for authenticating with the System Under Test, and the associated cipher to use. Encryption: Select On or Off from the drop-down list box to enable/disable encryption. Authentication: Select an authentication type: Open System, Shared Key, RSN, RSN-PSK, WPA, or WPA-PSK.
The Web-Based User Interface vSTA Side Bar Figure 4-41. Security Keys Key 1…4: This section of the dialog shows the shared keys that were defined in the Security Configuration dialog. For further information, please refer to Configuration->Security on page 4-71. Select the shared key to be used. These keys are used for encryption by virtual stations in this group with the System Under Test. Edit Keys: The Edit Keys button allows you to change the keys in this dialog. IxWLAN User Guide, Release 6.
4 The Web-Based User Interface vSTA Side Bar vSTA->New Group->Security PSK Tab If you have selected WPA-PSK or RSN-PSK in the Authentication field, this section of the dialog defines a Pre-Shared Key or passphrase, as shown in Figure 4-42. Figure 4-42. Security PSK Tab Pre-Shared Key (64 hex digits): Defines a Pre-Shared Key (64 ASCII-hex characters) for all virtual stations in this group. NOTE: When using a Pre-Shared Key, it is not necessary to specify the passphrase.
The Web-Based User Interface vSTA Side Bar vSTA->New Group->Security EAP Tab If you have selected RSN or WPA in the Authentication field, this dialog allows you to define user credential parameters, as shown in Figure 4-43. Figure 4-43. Security EAP Tab EAP Algorithm: Select TLS, TTLS, or PEAP from the drop-down list box. If you select PEAP or TTLS, define Inner Algorithm, Outer ID, and Password in the PEAP/TTLS section. User ID: Defines the user ID for virtual stations in this group.
4 The Web-Based User Interface vSTA Side Bar Outer ID: Type an outer identity to use in Phase 1 authentication. It can be up to 64 characters in the range A…Z, a…z, 0…9, or other legal characters: period (.), dash (-), at-sign (@). Password: Type a password to use in Phase 2 authentication. It can be up to 64 characters. NOTE: Inner Algorithm, Outer ID, and Password are only used for TTLS and PEAP. They are ignored for TLS.
The Web-Based User Interface vSTA Side Bar Figure 4-45. Import Certfile Dialog NOTE: Certificate files must be in PKCS#12 format, which is usually indicated by a .p12 or a .pfx file extension. Certpass: After a file name is typed or selected, enter the password needed for the certificate file. • The OK button allows you to transfer the specified file to IxWLAN with the same file name and extension. The newly-added certificate file is then listed as one of the available certificates.
4 The Web-Based User Interface vSTA Side Bar vSTA->Edit Group The Edit IxWLAN Group dialog opens, as shown in Figure 4-46, when the Edit Group button is selected in the vSTA side bar. Figure 4-46. Edit IxWLAN Group Dialog Figure 4-46 is the same as the vSTA->New Group dialog, except for the vSTA tab, which is different. Thus, in the vSTA tab, after the virtual stations have been created, the wport, Netmask, and Gateway group attributes cannot be changed.
The Web-Based User Interface vSTA Side Bar vSTA->Delete Group When the Delete Group button is clicked from the vSTA side bar, a confirmation dialog prompts you to confirm this selection, as shown in Figure 4-47. Figure 4-47. Confirmation Dialog vSTA->Add New vSTA to Group • Click Yes to remove the group and all virtual stations that it contains from the system. • Click No to close this dialog without removing the group.
4 The Web-Based User Interface IxWLAN Side Bar • The Add button allows you to add the virtual station. • The Cancel button allows you to close this dialog. IxWLAN Side Bar The buttons in this side bar are used to configure and manage IxWLAN and to select and join with a System Under Test. Select SUT: Opens the Select System Under Test dialog. Join SUT(s): Joins with the System Under Test. Configure IxWLAN: Configures IxWLAN. Reconnect IxWLAN: Reconnects to IxWLAN.
The Web-Based User Interface IxWLAN Side Bar IxWLAN->Select SUT You can access the Select System Under Test dialog (Figure 4-49) in two ways: 1. Click one of the wport-specific Select SUT buttons in the System Under Test status tool bar at the top of the main window. In this case, when the Select System Under Test dialog opens, only the wport checkbox corresponding to the checked button is selected. 2. Click the Select SUT(s) button in the IxWLAN side bar.
4 The Web-Based User Interface IxWLAN Side Bar • Click the Rescan button to update the list of BSSIDs. The merged list of new wport1 BSSIDs and old BSSIDs for wport2 and wport3 displays. NOTE: If no wport checkbox is selected, the Rescan and Join buttons are dimmed, as shown in Figure 4-49 on page 4-41. • The Select button adjacent to a wport adds the respective BSSID in the list box to the edit box left of it. • The Set button sets the wport adjacent to it to the BSSID left of it.
The Web-Based User Interface IxWLAN Side Bar If the web-based user interface is running on an IxWLAN SED chassis, clicking this icon results in an attempt to join wport1, provided it is not already joined. When on an IxWLAN SED-MR+ chassis, clicking this button results in an attempt to join a combination of wport1, wport2, and wport3 (whichever is not already joined).
4 The Web-Based User Interface IxWLAN Side Bar For each wport that is already joined with a SUT, either Figure 4-54, Figure 4-55, or Figure 4-56 opens. Figure 4-54. Join SUT wport1 Re-initiation Confirmation Dialog Figure 4-55. Join SUT wport2 Re-initiation Confirmation Dialog Figure 4-56.
The Web-Based User Interface IxWLAN Side Bar IxWLAN->Configure IxWLAN->UI The Configure IxWLAN button in the IxWLAN side bar opens the Configure IxWLAN dialog, as shown in Figure 4-57. Figure 4-57. Configure IxWLAN Dialog Receive Parameters IxWLAN Polling Interval: Defines the interval (in ms) during which the Command PC polls IxWLAN for command and control messages from the virtual stations. It can be set to a value in the 250…60000 ms (1 min) range.
4 The Web-Based User Interface IxWLAN Side Bar frequently, a larger value should be assigned to the IxWLAN Polling Timeout. Also see IxWLAN Busy or Not Responding on page 8-5. NOTE: Also see the Monitor Update Interval and Monitor Update Timeout in Monitors->Config Monitors on page 4-62 for the interval and update timeout values that are used by the command PC to collect statistics. Transmit Parameters Batch IxWLAN Requests: The checkbox enables/disables batching of request messages to be sent to IxWLAN.
The Web-Based User Interface IxWLAN Side Bar Figure 4-58. Basic Configuration of IxWLAN IP Address: Type IxWLAN's new IP address. Use an IP address that is compatible with the network addressing scheme at your facility. The default IP address is 192.168.0.50. If you change this field, you must select the Reboot option from the IxWLAN side bar, exit the web-based user interface, and reconnect to IxWLAN using the new IP address. IP Netmask: Type IxWLAN's network mask.
4 The Web-Based User Interface IxWLAN Side Bar IxWLAN->Configure IxWLAN->IxWLAN/Radio This section of the IxWLAN->Configure IxWLAN dialog defines the wireless mode and data rate of IxWLAN, as shown in Figure 4-59. Figure 4-59. IxWLAN Radio Wireless Mode: Select a wireless mode (11a, 11b, or 11g) from the list box. The items that are available in this list box are different depending on the feature set that you ordered from Ixia.
The Web-Based User Interface IxWLAN Side Bar the WLAN MAC is set to 00:0b:cd:59:23:44 and the mask is set to ff:ff:ff:ff:00:00, the only MAC addresses that can be detected on WLAN and received by IxWLAN are 00:0b:cd:59:00:00 - 00:0b:cd:59:ff:ff. All other MAC addresses are filtered out. The mask limits the range of MAC addresses that are assigned to virtual stations on a wport.
4 The Web-Based User Interface IxWLAN Side Bar Figure 4-60. IxWLAN Power Transmit Power: Select full, half, quarter, eighth, or min from the list box. The dBm/mW values in Table 4-1 are applicable only when the country code is US. In other countries, power settings are relative to the maximum transmit power available for the country. If you change the transmit power setting, you must select the Reboot option from the IxWLAN side bar in order for the new transmit power to be recognized and used in IxWLAN.
The Web-Based User Interface IxWLAN Side Bar NOTES: When the Power Management mode is set to Active, IxWLAN remains in the awake state at all times. When the Power Management mode is set to Power save, IxWLAN enters a dozing state until awakened by the listen interval. When dozing: • IxWLAN does not accept WLAN frames transmitted to any vSTA. • IxWLAN awakens at each listen interval to receive the next beacon and poll for frames buffered for any vSTA in accordance with the 802.11 Power Management needs.
4 The Web-Based User Interface IxWLAN Side Bar IxWLAN->Configure IxWLAN->IxWLAN/Other This section of the Configure IxWLAN dialog enables/disables the MIC check on received TKIP-encrypted frames, as shown in Figure 4-61. Figure 4-61. IxWLAN Other MIC Check: Select Enable, Disable, or Spot from this list box. The MIC is an integrity check that is run on all received TKIP data frames and is achieved via the CPU-intensive Michael algorithm.
The Web-Based User Interface IxWLAN Side Bar • Click Yes to reconnect to IxWLAN. • Click No to cancel the reconnect selection. Following successful reconnect, the web-based user interface restores the scenario (if any) in IxWLAN. IxWLAN->Reset IxWLAN The Reset IxWLAN button in the IxWLAN side bar opens a confirmation dialog (Figure 4-63). Figure 4-63.
4 The Web-Based User Interface IxWLAN Side Bar IxWLAN->Update IxWLAN The Update IxWLAN button in the IxWLAN side bar or the Update IxWLAN… selection in the About menu opens the Update IxWLAN dialog, as shown in Figure 4-66. Figure 4-66. Update IxWLAN Firmware: To update IxWLAN firmware, check this box and type the location of the firmware image file on the command PC or select the Browse… button to select the location on the command PC.
The Web-Based User Interface Monitors Side Bar If the Reboot IxWLAN checkbox is not clicked, a warning dialog opens, as shown in Figure 4-67. Figure 4-67. Warning Dialog • Click OK to continue IxWLAN Update without rebooting. • Click Cancel to return to the Update IxWLAN dialog. If any errors occur during firmware update (for example, flash file system is full), the error is reported in an error message dialog. If an invalid or corrupted firmware image file is specified, the IxWLAN reboot fails.
4 The Web-Based User Interface Monitors Side Bar A monitor is one or more user-selected statistics counters that the web-based user interface collects from IxWLAN and displays in the user-selected format (that is, line graph, bar graph, or table). All collected data can be exported. Monitors are based on Line graphs, Bar graphs, and Tables. You can use them to monitor the summary statistics of IxWLAN or a summary Master vSTA that shows virtual station statistics across all virtual stations.
The Web-Based User Interface Monitors Side Bar Display Style: Select a display style from the list box. It can be one of the following: Line Graph, Bar Graph, or Table. Monitors->Selected Monitors: Select one of the monitors to be maintained. Use the [>>] button (or double-click the line item) to transfer the predefined monitor to the Selected Monitors column. See Chapter 7, Statistics Counters for a description of each of these statistics counters.
4 The Web-Based User Interface Monitors Side Bar Monitors->New Monitor->vSTA Use the vSTA section of the Define New Monitor dialog to select the master (summary) virtual station statistics counters, as shown in Figure 4-70. Figure 4-70. vSTA Section vSTA (s): Select a virtual station from the list box. The Master Station is a summary that shows virtual station statistics across all virtual stations.
The Web-Based User Interface Monitors Side Bar When you select one or more counters and choose the Create button, the bottom half of the screen shows the current results in the selected display style, as shown in Figure 4-71. Figure 4-71. More Counters Selected As you run scenario tests, the monitors update with current data from IxWLAN. For chart display styles, the legends on the right side of the monitor indicate the statistics counters selected in the New Monitor dialog.
4 The Web-Based User Interface Monitors Side Bar Monitors->Delete Monitor The Delete Monitor button in the Monitors side bar or the monitor tool bar opens a confirmation dialog, as shown in Figure 4-72. Figure 4-72. Delete Monitor Confirmation Monitors->Clear Monitor • Click Yes to delete the current monitor. • Click No to cancel the delete selection. The Clear Monitor button in the Monitors side bar or the Monitor tool bar opens a confirmation dialog, as shown in Figure 4-73. Figure 4-73.
The Web-Based User Interface Monitors Side Bar The Export Monitor button in the Monitors side bar opens the Export Monitor dialog, as shown in Figure 4-74. Figure 4-74. The Export Monitor Dialog Select one or more monitors in the list box. • Click the Export button to export the monitors in the Selected Monitors list box. • Click the Cancel button to close this dialog without exporting monitors. The Export button opens the Save HTML Document dialog, as shown in Figure 4-75. Figure 4-75.
4 The Web-Based User Interface Monitors Side Bar Monitors->Config Monitors The Config Monitors button in the Monitors side bar opens the Configure Monitors dialog, as shown in Figure 4-76. Figure 4-76. Configure Monitors Dialog IxWLAN Address: Shows the IP address of IxWLAN. Monitor Update Interval: Defines the interval (in milliseconds) that the Command PC polls IxWLAN for new statistics counters. It can be set to a value in the 250 to 60000 ms (1 min) range.
The Web-Based User Interface Event Log Side Bar Event Log Side Bar The buttons in the Event Log side bar are used to display, clear, export, and configure the Event Log as follows: Event Log: Shows the last 100 event log entries. Clear Log: Clears the current contents of the event log. Export Log: Exports the last 100 event log entries to a file. Configure Log: Configures event logging.
4 The Web-Based User Interface Event Log Side Bar Event Log->Clear Log • Click the Close button to close this dialog. • Click the Export button to export this event log information to a file. • Click the Refresh button to update the dialog with new events. The Clear Log button in the Event Log side bar opens a confirmation dialog, as shown in Figure 4-78. Figure 4-78. Clear Log Confirmation Event Log->Export Log • Click Yes to clear the event log.
The Web-Based User Interface Event Log Side Bar Event Log>Configure Log The Configure Log button in the Event Log side bar opens the Event Log Configuration dialog, as shown in Figure 4-80. Figure 4-80. Configure Log IxWLAN Address: Defines the IP address of IxWLAN where the log file resides. Logging: Enables/disables event logging. Logging to Console: Enables/disables event logging to the CLI console.
4 The Web-Based User Interface Reports Side Bar Reports Side Bar The options in the Reports side bar can be used to display statistics counters that are maintained by IxWLAN during the execution of a test. IxWLAN Configuration: Opens the IxWLAN configuration report. Scenario Summary: Shows summary statistics of IxWLAN and all virtual stations. Group Summary: Shows summary statistics of a scenario group. vSTA Master: Shows statistics collected for all virtual stations.
The Web-Based User Interface Reports Side Bar Reports->IxWLAN Configuration The IxWLAN Configuration button in the Reports side bar displays the IxWLAN Configuration Report, as shown in Figure 4-81. Figure 4-81. IxWLAN Configuration Report This report shows the status and configuration of IxWLAN. If WPA/RSN is enabled, the status section of the report includes an indication of the cumulative crypto hardware status (that is, Crypto hardware…OK).
4 The Web-Based User Interface Reports Side Bar Figure 4-82. Scenario Summary Report Summary statistics give a summary report taken over a set of virtual stations. The virtual station set can be a defined group or all virtual stations currently in the system. By contrast, the individual virtual station statistics report gives a list of statistics and counters for all virtual stations. The summary report gives a summary of the statistics and counters taken over the indicated set of virtual stations.
The Web-Based User Interface Reports Side Bar Figure 4-83. Group Summary Report For more information about the statistics counters that can be displayed in this report, please refer to Chapter 7, Statistics Counters. Reports->vSTA Master The vSTA Master button in the Reports side bar opens the Summary Statistics (All vSTA) Report, as shown in Figure 4-84. Figure 4-84.
4 The Web-Based User Interface Reports Side Bar Reports->vSTA Detail The vSTA Detail button in the Reports side bar opens the vSTA Detail Report, as shown in Figure 4-85. Figure 4-85. vSTA Detail Report For more information about the statistics counters that can be shown in this report, please refer to Chapter 7, Statistics Counters. Reports->Export Reports The Export Reports button in the Reports side bar opens the Generate Report dialog, as shown in Figure 4-86. Figure 4-86.
The Web-Based User Interface Configuration Side Bar • Click the Export button to export the report(s) to a comma-separated values (.CSV) file. • Click the View button to show the selected report(s). • Click the Cancel button to exit this dialog. Configuration Side Bar The buttons in the Configuration side bar are used to define default security, default ping settings, the appearance of the web-based user interface, and available certificates.
4 The Web-Based User Interface Configuration Side Bar Figure 4-87. Configuration Security Encryption: Select On or Off from the drop-down list box to enable/disable encryption. Authentication: Select an authentication type: Open System, Shared Key, RSN, RSN-PSK, WPA, or WPA-PSK. If you select RSN or WPA, define user credential parameters in the EAP tab. If you select RSN-PSK or WPA-PSK, define a pre-shared key or passphrase in the PSK tab.
The Web-Based User Interface Configuration Side Bar Configuration->Security WEP Tab The WEP tab in this dialog is used to define up to four shared keys for WEP security. WEP encrypts data using an RC4 stream cipher seeded with a key of 40, 104, or 128 bits plus a 24-bit initialization vector, before transmission to the wireless network. If you change any of the fields, you must click Reboot from the IxWLAN side bar in order for the new encryption selections to be recognized and used by IxWLAN.
4 The Web-Based User Interface Configuration Side Bar Pre-Shared Key (64 hex digits): Defines a Pre-Shared Key (64 ASCII-hex characters) for all virtual stations in this group. If using a Pre-Shared Key, it is not necessary to specify the passphrase. Passphrase (up to 63 characters): Defines a passphrase of up to 63 ASCII characters. If a passphrase is defined, it is not necessary to specify the Pre-Shared Key. The passphrase is used to generate the Pre-Shared Key.
The Web-Based User Interface Configuration Side Bar PEAP/TTLS Parameters: When PEAP or TTLS is selected in the EAP Algorithm list box, use this section of the dialog to define the PEAP/TTLS parameters. EAP Algorithm: Select the EAP algorithm to be used in Phase 2 authentication. MS-CHAPv2 is normally used for TTLS. EAP-MS-CHAPv2 is normally used for PEAP. Outer ID: Type an outer identity to be used in Phase 1 authentication.
4 The Web-Based User Interface Configuration Side Bar log opens if the certificate file is in use by any vSTA, or otherwise the certificate file is deleted. • Click the Cancel button to exit the dialog. • Click the Import… button to open the Import Certfile dialog, as shown in Figure 4-91 on page 4-76. Figure 4-91.
The Web-Based User Interface Configuration Side Bar Any changes made in this dialog affect all future group/virtual station creation defaults for this session. Target IP: Type the target IP address where ICMP Echo (Ping) Request/ Response messages should be sent. Data Length: Specify the size (64…1024) of each message. Count: Specify the total number of pings to send: 0…10000 (0=None). Configuration>Preferences • Click OK to save the default Ping configuration.
4 The Web-Based User Interface Menus and Tool Bars Show Welcome Screen on Startup: Click the checkbox to enable/disable the welcome screen that is shown when you successfully log on to the web-based user interface. Configuration>Available Certificates • Click OK to close this page and save the configuration. • Click Cancel to close this dialog without saving this configuration.
The Web-Based User Interface Menus and Tool Bars Save Scenario: Saves the current scenario. Print: Prints the scenario configuration. Scenario Tool Bar The buttons in this section of the tool bar can be used to run, pause, stop, restart, or refresh the entire scenario of all virtual stations (Figure 4-96). Figure 4-96. Scenario Tool Bar Run Scenario: Runs the test for all groups and all virtual stations in a scenario.
4 The Web-Based User Interface Menus and Tool Bars Authenticate: Causes the currently selected virtual stations or all virtual stations in a group to initiate the 802.11 authentication sequence with the System Under Test. Associate: Causes the currently selected virtual stations or all virtual stations in a group to initiate the 802.11 association sequence with the System Under Test. The 802.11 association sequence automatically transits through any necessary 802.
The Web-Based User Interface Menus and Tool Bars Refresh: Refreshes a test for selected groups or virtual stations. Quiesce: Causes the currently selected virtual stations to gracefully end. The vSTA completes any currently active iteration, then stops. A quiesced vSTA must be reset before it can run again. Reports Tool Bar The buttons in this tool bar are used to view the reports and event log (Figure 498). Figure 4-98.
4 The Web-Based User Interface Menus and Tool Bars File Menu Figure 4-100 shows the File menu. Figure 4-100.File Menu New Scenario…: Creates a new scenario in which groups and virtual stations can be defined. Open Scenario…: Opens the Open Scenario dialog, where you can choose from a list of existing scenario files on IxWLAN or browse your PC for scenario files. Save Scenario…: Opens the Save Scenario dialog. Save Scenario As…: Saves a scenario as a new instance.
The Web-Based User Interface Menus and Tool Bars • Click Yes to continue by exiting the web-based user interface. • Click No to return to the currently running test. If the current scenario has been modified during this web-based user interface session, the dialog shown in Figure 4-102 allows you to save these changes. Figure 4-102.Save Scenario Modified • Click Yes to open the Save Scenario dialog and save the scenario on your PC or in the flash on the IxWLAN SED/SED-MR+ chassis.
4 The Web-Based User Interface Menus and Tool Bars Edit Menu Figure 4-104 shows the Edit menu. Figure 4-104.Edit Menu Select All: If a group tab is selected, selects all virtual stations in a scenario group. If the Group Control tab opens, selects all groups. Unselect All: If a group tab is selected, unselects all virtual stations in a scenario group. If the Group Control tab opens, unselects all groups.
The Web-Based User Interface Menus and Tool Bars Authenticate: If clicked, all virtual stations defined in a scenario initiate the 802.11 authentication sequence to the System Under Test. Associate: If clicked, all virtual stations defined in a scenario initiate the 802.11 association sequence to the System Under Test. The 802.11 association sequence automatically transits through any necessary 802.1X authentication and key management if the virtual station is configured for RSN, RSN-PSK, WPA, or WPAPSK.
4 The Web-Based User Interface Menus and Tool Bars Figure 4-107.Select Remote BSS Roam: Opens the Roam dialog, as shown in Figure 4-108. This command applies to all currently selected vSTAs in the Group or wport tabs. Figure 4-108.Roam Dialog Click the Select button to select a BSS from a list or to manually type a BSSID, as shown in Figure 4-107. The two checkboxes select the Probe on Roam and Authenticate on Roam options. 4-86 IxWLAN User Guide, Release 6.
The Web-Based User Interface Menus and Tool Bars • Include Probe Request – Selects whether to issue a Probe Request during the Roam.When enabled, a Probe Request is issued (and a Probe Response expected) by each roaming virtual station during the Roam just before the 802.11 Authentication stage. When disabled, no Probe Request is sent. • Include 802.11 Authentication – Selects whether to perform basic 802.11 Authentication during the Roam.
4 The Web-Based User Interface Menus and Tool Bars Initialize: Starts all virtual stations defined in the currently selected group. Probe: A Probe Request is sent by all virtual stations in the currently selected group. When invoked from the tool bar, probing does not change the Run State. Authenticate: If clicked, all virtual stations in the currently selected group initiate the 802.11 authentication sequence to the System Under Test.
The Web-Based User Interface Menus and Tool Bars vSTA Menu Figure 4-110 shows the vSTA menu. Figure 4-110. vSTA Menu Edit vSTA…: Opens the virtual station configuration dialog. Initialize: Starts the currently selected virtual station(s). Probe: A Probe Request is sent by all virtual stations in the currently selected group. Authenticate: If clicked, the currently selected virtual station(s) start(s) the 802.11 authentication sequence to the System Under Test.
4 The Web-Based User Interface Menus and Tool Bars Reset: Resets the currently selected virtual station(s). Quiesce: This selection causes the currently selected virtual stations to gracefully stop. The vSTA completes any currently active iteration, then stops. A quiesced vSTA must be reset before it can run again. Reports Menu Figure 4-111 shows the Reports menu. Figure 4-111. Reports Menu IxWLAN Configuration…: Shows the IxWLAN configuration report.
The Web-Based User Interface Menus and Tool Bars Options Menu Figure 4-112 shows the Options menu. Figure 4-112. Options Menu Configure IxWLAN…: Opens the Configure IxWLAN dialog. Configure Monitors…: Opens the Configure Monitoring dialog. Configure Ping…: Opens the Configure Ping dialog. Configure Security…: Opens the Security Configuration dialog. Configure Event Log…: Opens the Configure Event Log dialog. Configure UI…: Opens the UI (User Interface) Configuration dialog.
4 The Web-Based User Interface Menus and Tool Bars 4-92 IxWLAN User Guide, Release 6.
Chapter 5: 5 The Command Line Interface (CLI) This chapter covers the following topics: • CLI Usage Notes on page 5-3. • User Login on page 5-3. • User Logoff on page 5-4. • CLI Commands on page 5-4. • System Under Test Commands on page 5-7. • Virtual Station Setup and Control Commands on page 5-14. • Statistics File Commands on page 5-51. • Event Log Commands on page 5-53. • IxWLAN Commands on page 5-58. • 802.11b/g Commands on page 5-86. • Administrative Mode Commands on page 5-90.
5 The Command Line Interface (CLI) 5-2 • get basic11g (11g only) on page 5-91. • set basic11g (11g only) on page 5-92. • get basic11b (11b only) on page 5-87. • set basic11b (11b only) on page 5-87. • get bssid on page 5-8. • set bssid on page 5-8. • clear bssid on page 5-8. • get channel on page 5-66. • get ctsmode (11g only) on page 5-87. • set ctsmode (11g only) on page 5-87. • get ctsrate (11g only) on page 5-88. • set ctsrate (11g only) on page 5-88.
The Command Line Interface (CLI) CLI Usage Notes • set wlanmac on page 5-85. • reset wlanmac on page 5-77. CLI Usage Notes 1. CLI commands are not case sensitive (for example, set Date is the same as set date). 2. You do not need to type the entire command string to execute a command.
5 The Command Line Interface (CLI) User Logoff NOTE: If the CLI shows the “This IxWLAN has not been Node Locked” message after you type the IxWLAN logon name and password, see Missing Key File on page 8-7. User Logoff Use the quit command to log off from the CLI. IxWLAN -> quit After logoff, you must re-establish the telnet connection to log on to the CLI. CLI Commands The help command shows a list of all CLI commands.
The Command Line Interface (CLI) CLI Commands get frequency get gateway get group get hardware get ipaddr get ipmask get key get keyentrymethod get login get mic get multiradiomode get pmmode get power get psinterval get rate get sntpserver get ssid get statfile get station get status get summfile get systemname get telnet get tzone get uptime get version get vsta get wirelessmode get wlanmac get wlanmask get wport halt help history import init join ping preauth quit reboot releaseip reset group reset vsta
5 The Command Line Interface (CLI) CLI Commands set evlog set factorydefault set features set gateway set group set ipaddr set ipmask set key set keyentrymethod set login set mic set multiradiomode set password set pmmode set power set psinterval set rate set sntpserver set ssid set systemname set telnet set time set tzone set vsta set wirelessmode set wlanmac set wlanmask set wport timeofday version [wport1]IxWLAN -> ------------------------------- Set event log controls Restore to Default Factory Sett
The Command Line Interface (CLI) System Under Test Commands System Under Test Commands These commands are used to scan for and join with a device that can be tested by IxWLAN. These commands must be used to select and join with a System Under Test before you can use the following Virtual Station Set-Up and Control Commands.
5 The Command Line Interface (CLI) System Under Test Commands bssid (get/set/clear) • join on page 5-10 • scan on page 5-11 • ssid (get/set) on page 5-13 get bssid Shows the current BSSID/MAC address of the system being tested. get bssid Example: [wport1]IxWLAN -> get bssid BSSID of System Under Test: 00:04:e2:34:e0:a8 [wport1]IxWLAN -> set bssid Specifies the BSSID/MAC address of the system to be tested. This is the System Under Test that IxWLAN scans for and joins with.
The Command Line Interface (CLI) System Under Test Commands bsslist (get) Shows the Basic Service Sets discovered in the most recent scan. See scan on page 5-11. get bsslist [detail] Use the [detail] option to view detailed information regarding each BSS’s rate capabilities and needs, country code and channel capabilities, and security information.
5 The Command Line Interface (CLI) System Under Test Commands Country: US [ 52 (5260) 4 23] [ 36 (5180) 4 AP BSS 5.745 (149) 39 00:12:d9:c4:0a:90 Rates: *6, *9, *12, *18, *24, *36, *48, *54 Security: WPA/PSK/TKIP AP BSS 5.785 (157) 51 00:0b:6b:30:05:65 * * This is the System Under Test * * Rates: *6, 9, *12, 18, *24, 36, 48, 54 Security: RSN/PSK/AES/TKIP Country: US [ 52 (5260) 4 23] [ 36 (5180) 4 AP BSS 5.
The Command Line Interface (CLI) System Under Test Commands IxWLAN: wport1 Join: Checking channel ... OK IxWLAN: wport1 Join: Initiating JOIN ... Infrastructure 5.
5 The Command Line Interface (CLI) System Under Test Commands If the active mode is selected, the CLI prompts for the following scanning options: Broadcast or directed probe request [b/d: d]? Channel (0 = all, m=all modes) [0]? Channel timeout in msec [300]? In response to the Channel prompt, you may type zero for all channels or any valid 802.11a or 802.11b/g channel number or frequency. The range of channels/ frequencies depends on the wireless mode and the features that are enabled on IxWLAN.
The Command Line Interface (CLI) System Under Test Commands Channel (0 = all) [0]? 2412 Channel timeout in msec [300]? Attempt a join with SUT 00:04:e2:38:a8:d2 [y/n: n]? The scan should take about 1 sec [wport1]IxWLAN -> OK [wport1]IxWLAN -> [wport1]IxWLAN -> InitSingleScan -- 2412, a00 cck 2.4 Active scanning 2.4GHz 11Mbps (802.11b) channels for 1 seconds... wlanMlmeProbeRequest -- channel 2412 Select BSS: Looking for .. 00:04:E2:38:A8:D2 Select BSS: Found ........
5 The Command Line Interface (CLI) Virtual Station Setup and Control Commands Virtual Station Setup and Control Commands The following commands configure and activate virtual stations.
The Command Line Interface (CLI) Virtual Station Setup and Control Commands NOTE: Most of the commands in this group need that you specify a virtual station ID in the 1 to 64 range for the IxWLAN SED chassis, and in the 1 to 128 range for the IxWLAN SED-MR+.
5 The Command Line Interface (CLI) Virtual Station Setup and Control Commands acquireip Starts the DHCP negotiation process for the specified virtual station(s). The virtual station must be in the 802.11 Associated state or 802.1X authenticated if security is turned on and the vSTA’s DHCP mode (dhcpmode) must be set to on. See autoconf on page 5-18, conf on page 5-24 and set vsta on page 5-46 for information about setting the DHCP mode.
The Command Line Interface (CLI) Virtual Station Setup and Control Commands Example: [wport1]IxWLAN -> assoc vsta 1 [wport1]IxWLAN -> OK [wport1]IxWLAN -> vSTA ID:1 NOTIFY Operation ASSOC succeeded - TUE JUL 15 03:08:38 2003 [wport1]IxWLAN -> When a virtual station is configured for WPA-PSK authentication, this command shows additional AKMP information.
5 The Command Line Interface (CLI) Virtual Station Setup and Control Commands The following command starts the authentication sequence for all virtual stations in a specified group.
The Command Line Interface (CLI) Virtual Station Setup and Control Commands addresses defined by the WLAN Base MAC Address and WLAN MAC Mask configured for the specified wport (see set wlanmac on page 5-85 and set wlanmask on page 5-85). ip : Specifies the base/starting value to be used for virtual station IP addresses. This parameter is needed for the first autoconf command and should not be specified for subsequent commands. Default: Last IP address + 1.
5 The Command Line Interface (CLI) Virtual Station Setup and Control Commands [mode internal | external]: If mode is internal, virtual station(s) generate data using Ping (ICMP Echo Request) packets. Each virtual station runs a ping transmitter process. The packets contain virtual station IP and MAC source address. If internal is specified, the target parameter must also be specified. If mode is external, data for virtual station(s) is generated by an external host connected to the same LAN as IxWLAN.
The Command Line Interface (CLI) Virtual Station Setup and Control Commands 802.3 MAC address. If layer is 3, frames are captured based on the source IP address. The default value is 3. [fragmentthreshold ]: can be a value in the 256…2346 range and defines the fragmentation threshold for the virtual station(s) configured by this command. The fragmentation threshold limits the number of bytes in any 802.11 frame transmitted by the vSTA. If is set to 2346 (that is, the maximum 802.
5 The Command Line Interface (CLI) Virtual Station Setup and Control Commands [outeridentity ]: If eapalgorithm is peap or ttls, this parameter assigns a separate user ID for use in Phase 1 authentication. It can be up to 64 characters in the range A…Z, a…z, 0…9, or other legal characters: period (.), dash (-), at-sign (@). [password ]: If eapalgorithm is peap or ttls, this parameter assigns a user password for use in Phase 2 authentication.