Wi-Fi Array filter The filter command [Xirrus_Wi-Fi_Array(config-filter)#] is used to manage protocol filters and filter lists. Command add add-list del del-list edit Description Add a filter. FORMAT: filter add [name] Add a filter list. FORMAT: filter add-list [name] Delete a filter. FORMAT: filter del [name] Delete a filter list. FORMAT: filter del-list [name] Edit a filter.
Wi-Fi Array Command off Disable a filter list. FORMAT: filter off on Enable a filter list. FORMAT: filter on reset 332 Description Delete all protocol filters and filter lists.
Wi-Fi Array fips The fips command [Xirrus_Wi-Fi_Array(config)# fips] is used to set the parameter values required for FIPS 140-2, Level 2 security. For more information, see Appendix D: Implementing Security Standards. Command Description disable Reverts FIPS settings to the values they had before performing a fips on command. FORMAT: fips disable enable Set FIPS security on the Array. Remembers the values of parameters prior to setting them.
Wi-Fi Array group The group command [Xirrus_Wi-Fi_Array(config)# group] is used to create and configure user groups. User groups allow administrators to assign specific network parameters to users through RADIUS privileges rather than having to map users to a specific SSID. Groups provide flexible control over user privileges without the need to create large numbers of SSIDs. For more information, see “Groups” on page 245. Command Description add Create a new user group.
Wi-Fi Array https The https command [Xirrus_Wi-Fi_Array(config)# https] is used to enable or disable the Web Management Interface (https), which is enabled by default. It also allows you to establish a timeout for your Web management session. Command Description disable Disable the https feature. FORMAT: https disable enable Enable the https feature. FORMAT: https enable off Disable the https feature. FORMAT: https off on Enable the https feature.
Wi-Fi Array interface The interface command [Xirrus_Wi-Fi_Array(config)# interface] is used to select the interface that you want to configure. To see a listing of the commands that are available for each interface, use the ? command at the selected interface prompt. For example, using the ? command at the Xirrus_Wi-Fi_Array(config-gig1}# prompt displays a listing of all commands for the gig1 interface. Command 336 Description console Select the console interface.
Wi-Fi Array load The load command [Xirrus_Wi-Fi_Array(config)# load] loads a configuration file. Command Description factory.conf Load the factory settings configuration file. FORMAT: load [factory.conf] lastboot.conf Load the configuration file from the last boot-up. FORMAT: load [lastboot.conf] [myfile].conf If you have saved a configuration, enter its name to load it. FORMAT: load [myfile.conf] saved.conf Load the configuration file with the last saved settings. FORMAT: load [saved.
Wi-Fi Array management The management command [Xirrus_Wi-Fi_Array(config)# management] enters management mode, where you may configure console management parameters. Command Description Enter management mode. FORMAT: management more The more command [Xirrus_Wi-Fi_Array(config)# more] is used to turn terminal pagination ON or OFF. Command 338 Description off Turn OFF terminal pagination. FORMAT: more off on Turn ON terminal pagination.
Wi-Fi Array netflow The netflow command [Xirrus_Wi-Fi_Array(config-netflow)#] is used to enable or disable, or configure sending IP flow information (traffic statistics) to the collector you specify. Command Description disable Disable netflow. FORMAT: netflow disable enable Enable netflow. FORMAT: netflow enable off Disable netflow. FORMAT: netflow off on Enable netflow. FORMAT: netflow on collector Set the netflow collector IP address or fully qualified domain name (host.domain).
Wi-Fi Array no The no command [Xirrus_Wi-Fi_Array(config)# no] is used to disable a selected element or set the element to its default value. Command acl dot11a dot11bg https Disable the Access Control List. FORMAT: no acl Disable all 802.11a(n) IAPs (radios). FORMAT: no dot11a Disable all 802.11bg(n) IAPs (radios). FORMAT: no dot11bg Disable https access. FORMAT: no https intrude-detect Disable intrusion detection.
Wi-Fi Array Command snmp ssh Description Disable SNMP features. FORMAT: no snmp Disable ssh access. FORMAT: no ssh syslog Disable the Syslog services. FORMAT: no syslog telnet Disable Telnet access. FORMAT: no telnet ETH-NAME Disable the selected Ethernet interface (eth0, gig1 or gig2). You cannot disable the console interface. with this command.
Wi-Fi Array pci-audit The pci-audit command [Xirrus_Wi-Fi_Array(config)# pci-audit] checks the configuration of the Array for conformance with PCI DSS standards. When you enter the pci-audit command, it lists any settings that violate PCI DSS requirements. In addition, if pci-audit is on (enabled), the Array will warn you if you change any parameters in a way that violates PCI DSS requirements.
Wi-Fi Array quit The quit command [Xirrus_Wi-Fi_Array(config)# quit] is used to exit the Command Line Interface. Command Description Exit the Command Line Interface. FORMAT: quit If you have made any configuration changes and your changes have not been saved, you are prompted to save your changes to Flash. At the prompt, answer Yes to save your changes, or answer No to discard your changes.
Wi-Fi Array reboot The reboot command [Xirrus_Wi-Fi_Array(config)# reboot] is used to reboot the Array. If you have unsaved changes, the command will notify you and give you a chance to cancel the reboot. Command Description Reboot the Array. FORMAT: reboot delay Reboot the Array after a delay of 1 to 60 seconds. FORMAT: reboot delay [n] reset The reset command [Xirrus_Wi-Fi_Array(config)# reset] is used to reset all settings to their default values then reboot the Array.
Wi-Fi Array run-tests The run-tests command [Xirrus_Wi-Fi_Array(run-tests)#] is used to enter runtests mode, which allows you to perform a range of tests on the Array. Command Description Enter run-tests mode. FORMAT: run-tests iperf Execute iperf utility. FORMAT: run-tests iperf kill-beacons Turn off beacons for selected single IAP. FORMAT: run-tests kill-beacons [off | iap-name] kill-proberesponses led Turn off probe responses for selected single IAP.
Wi-Fi Array Command radius-ping Description Special ping utility to test the connection to a RADIUS server.
Wi-Fi Array Command telnet Description Execute telnet utility. FORMAT: run-tests telnet [hostname | ip-addr] [command-line-switches (optional)] traceroute Execute traceroute utility. FORMAT: run-tests traceroute [host-name | ip-addr] security The security command [Xirrus_Wi-Fi_Array(config-security)#] is used to establish the security parameters for the Array. Command Description wep Set the WEP encryption parameters. FORMAT: security wep wpa Set the WEP encryption parameters.
Wi-Fi Array snmp The snmp command [Xirrus_Wi-Fi_Array(config-snmp)#] is used to enable, disable, or configure SNMP. Command Description v2 Enable SNMP v2. FORMAT: snmp v2 v3 Enable SNMP v3. FORMAT: snmp v3 trap Configure traps for SNMP. Up to four trap destinations may be configured, and you may specify whether to send traps for authentication failure. FORMAT: snmp trap ssh The ssh command [Xirrus_Wi-Fi_Array(config)# ssh] is used to enable or disable the SSH feature.
Wi-Fi Array Command Description off Disable SSH. FORMAT: ssh off on Enable SSH. FORMAT: ssh on timeout Set the SSH inactivity timeout.
Wi-Fi Array ssid The ssid command [Xirrus_Wi-Fi_Array(config-ssid)#] is used to establish your SSID parameters. Command Description add Add an SSID. FORMAT: ssid add [newssid] del Delete an SSID. FORMAT: ssid del [oldssid] edit Edit an existing SSID. FORMAT: ssid edit [existingssid] reset Delete all SSIDs and restore the default SSID. FORMAT: ssid reset standby The standby command [Xirrus_Wi-Fi_Array(config-ssid)#] sets this Array to function as a standby unit for another Array.
Wi-Fi Array syslog The syslog command [Xirrus_Wi-Fi_Array(config-syslog)#] is used to enable, disable, or configure the Syslog server. Command Description console Enable or disable the display of Syslog messages on the console, and set the level to be displayed. All messages at this level and lower (i.e., more severe) will be displayed. FORMAT: syslog console [on/off] level [0-7] disable Disable the Syslog server. FORMAT: syslog disable email Disable the Syslog server.
Wi-Fi Array Command Description off Disable the Syslog server. FORMAT: syslog off on Enable the Syslog server. FORMAT: syslog on primary secondary Set the IP address of the primary Syslog server and/or the severity level of messages to be logged. FORMAT: syslog primary [1.2.3.4] level [0-7] Set the IP address of the secondary (backup) Syslog server and/or the severity level of messages to be logged. FORMAT: syslog primary [1.2.3.
Wi-Fi Array Command Description off Disable Telnet. FORMAT: telnet off on Enable Telnet. FORMAT: telnet on timeout Set the Telnet inactivity timeout.
Wi-Fi Array uptime The uptime command [Xirrus_Wi-Fi_Array(config)# uptime] is used to display the elapsed time since you last rebooted the Array. Command Description Display time since last reboot. FORMAT: uptime vlan The vlan command [Xirrus_Wi-Fi_Array(config-vlan)#] is used to establish your VLAN parameters. Command add default-route delete edit native-vlan 354 Description Add a VLAN. FORMAT: vlan add [newvlan] Assign a VLAN for the default route (for outbound management traffic).
Wi-Fi Array Command Description no Disable the selected feature. FORMAT: vlan no [feature] reset Delete all existing VLANs.
Wi-Fi Array Sample Configuration Tasks This section provides examples of some of the common configuration tasks used with the Wi-Fi Array, including: z “Configuring a Simple Open Global SSID” on page 357. z “Configuring a Global SSID using WPA-PEAP” on page 358. z “Configuring an SSID-Specific SSID using WPA-PEAP” on page 359. z “Enabling Global IAPs” on page 360. z “Disabling Global IAPs” on page 361. z “Enabling a Specific IAP” on page 362. z “Disabling a Specific IAP” on page 363.
Wi-Fi Array Configuring a Simple Open Global SSID This example shows you how to configure a simple open global SSID. Figure 163.
Wi-Fi Array Configuring a Global SSID using WPA-PEAP This example shows you how to configure a global SSID using WPA-PEAP encryption in conjunction with the Array’s Internal RADIUS server. Figure 164.
Wi-Fi Array Configuring an SSID-Specific SSID using WPA-PEAP This example shows you how to configure an SSID-specific SSID using WPAPEAP encryption in conjunction with the Array’s Internal RADIUS server. Figure 165.
Wi-Fi Array Enabling Global IAPs This example shows you how to enable all IAPs (radios), regardless of the wireless technology they use. Figure 166.
Wi-Fi Array Disabling Global IAPs This example shows you how to disable all IAPs (radios), regardless of the wireless technology they use. Figure 167.
Wi-Fi Array Enabling a Specific IAP This example shows you how to enable a specific IAP (radio). In this example, the IAP that is being enabled is a1 (the first IAP in the summary list). Figure 168.
Wi-Fi Array Disabling a Specific IAP This example shows you how to disable a specific IAP (radio). In this example, the IAP that is being disabled is a2 (the second IAP in the summary list). Figure 169.
Wi-Fi Array Setting Cell Size Auto-Configuration for All IAPs This example shows how to set the cell size for all enabled IAPs to be autoconfigured (auto). (See “Fine Tuning Cell Sizes” on page 53.) The auto_cell option may be used with global_settings, global_a_settings, or global_bg_settings. It sets the cell size of the specified IAPs to auto, and it launches an autoconfiguration to adjust the sizes.
Wi-Fi Array Setting the Cell Size for All IAPs This example shows you how to establish the cell size for all IAPs (radios), regardless of the wireless technology they use. Be aware that if the intrude-detect feature is enabled on abg(n)2 the cell size cannot be set globally—you must first disable the intrude-detect feature on abg(n)2. In this example, the cell size is being set to small for all IAPs. You have the option of setting IAP cell sizes to small, medium, large, or max.
Wi-Fi Array Setting the Cell Size for a Specific IAP This example shows you how to establish the cell size for a specific IAP (radio). In this example, the cell size for a2 is being set to medium. You have the option of setting IAP cell sizes to small, medium, large, or max (the default is max). See also, “Fine Tuning Cell Sizes” on page 53. Figure 172.
Wi-Fi Array Configuring VLANs on an Open SSID This example shows you how to configure VLANs on an Open SSID. # Setting the default route enables the Array to send management traffic, such as Syslog messages and SNMP information to a destination behind a router. Figure 173.
Wi-Fi Array Configuring Radio Assurance Mode (Loopback Tests) The Array uses the built-in monitor radio, IAP abg(n)2, to monitor other radios in the Array. Tests include sending probes on all channels and checking for a response, and checking whether beacons are received from the other radio. If a problem is detected, corrective actions are taken to recover. Loopback mode operation is described in detail in “Array Monitor and Radio Assurance Capabilities” on page 408.
Wi-Fi Array Figure 174.
Wi-Fi Array 370 The Command Line Interface
Wi-Fi Array Appendices 371
Wi-Fi Array Page is intentionally blank 372
Wi-Fi Array Appendix A: Servicing the Wi-Fi Array This appendix contains procedures for servicing the Xirrus Wi-Fi Array, including the removal and reinstallation of major hardware components. Topics include: z “Removing the Access Panel” on page 375. z “Reinstalling the Access Panel” on page 378. z “Replacing the FLASH Memory Module” on page 380. z “Replacing the Main System Memory” on page 382. z “Replacing the Integrated Access Point Radio Module” on page 384.
Wi-Fi Array See Also Reinstalling the Access Panel Removing the Access Panel Replacing the FLASH Memory Module Replacing the Integrated Access Point Radio Module Replacing the Main System Memory Replacing the Power Supply Module 374 Appendix A: Servicing the Wi-Fi Array
Wi-Fi Array Removing the Access Panel Use this procedure when you want to remove the system’s access panel. You must remove this panel whenever you need to service the internal components of the Array. 1. Turn OFF the Array’s main power switch (XS-3900 and XS-3700 only). 2. Disconnect the AC power cord or Ethernet cable supplying power from the Array. 3. Place the Array face-down on a flat surface. Avoid moving the unit to reduce the risk of damage (scratching) to the finished enclosure. 4.
Wi-Fi Array 5. Lift up the access panel to reveal the main system board. Lift up the access panel Figure 177. Removing the Access Panel 6. Disconnect the connectors to the power supply and the fan. Fan connector Power supply connector Figure 178. Disconnecting the Power Supply and Fan 7. 376 The access panel can now be safely removed.
Wi-Fi Array See Also Reinstalling the Access Panel Replacing the FLASH Memory Module Replacing the Integrated Access Point Radio Module Replacing the Main System Memory Replacing the Power Supply Module Appendix A: Servicing the Wi-Fi Array Appendix A: Servicing the Wi-Fi Array 377
Wi-Fi Array Reinstalling the Access Panel Use this procedure when you need to reinstall the access panel after servicing the Array’s internal components. 1. Reconnect the fan and power supply. Fan connector Power supply connector Figure 179. Reconnecting the Fan and Power Supply 2. Reinstall the access panel and secure the panel with the three screws. Screw ! Do not overtighten Screw ! Do not overtighten Screw ! Do not overtighten Figure 180.
Wi-Fi Array 3. Reconnect the power source and turn ON the main power switch (if applicable).
Wi-Fi Array Replacing the FLASH Memory Module Use this procedure when you want to replace the system’s FLASH memory module. 1. Remove the system’s access panel. Refer to “Removing the Access Panel” on page 375. 2. Remove the FLASH memory module, taking care not to “wiggle” the module and risk damaging the connection points. FLASH memory module Figure 181. Removing the FLASH Memory Module 3. 380 The removal procedure is complete.
Wi-Fi Array 4. Reinstall the access panel (refer to “Reinstalling the Access Panel” on page 378).
Wi-Fi Array Replacing the Main System Memory Use this procedure when you want to replace the main system memory. 1. Remove the access panel (refer to “Removing the Access Panel” on page 375). 2. Remove the DIMM memory module, taking care not to “wiggle” the module and risk damaging the connection points. DIMM memory module Push down on the two locking tabs to release the DIMM memory module Figure 182. Removing the DIMM Memory Module 3. The removal procedure is complete.
Wi-Fi Array Replacing the Integrated Access Point Radio Module Replacing the Power Supply Module Appendix A: Servicing the Wi-Fi Array Appendix A: Servicing the Wi-Fi Array 383
Wi-Fi Array Replacing the Integrated Access Point Radio Module Use this procedure when you want to replace the integrated access point radio module. 1. Remove the access panel (refer to “Removing the Access Panel” on page 375). 2. Remove the locking screws (8 places) that secure the chassis cover to the main body of the Wi-Fi Array. Screws (8 places) Figure 183. Removing the Chassis Cover Screws 3. Lift and remove the chassis cover. Remove the chassis cover Figure 184.
Wi-Fi Array 4. Lift the edge of the integrated access point module. Lift here (do not force) Figure 185. Lifting the Integrated Access Point Module 5. Slide the integrated access point module away from the unit to disconnect it from the main system board. Disconnect the module Figure 186. Disconnect the Integrated Access Point Module 6. The removal procedure is complete. You can now reinstall the integrated access point module (or install a new module).
Wi-Fi Array 7. Reinstall the chassis cover (see warnings). ! When reinstalling the chassis cover, take care to align the cover correctly to avoid damaging the antenna modules. Do not force the chassis cover onto the body of the unit. ! Do not overtighten the locking screws. 8. Reinstall the locking screws (8 places) to secure the chassis cover in place—do not overtighten. 9. Reinstall the access panel (refer to “Reinstalling the Access Panel” on page 378).
Wi-Fi Array Replacing the Power Supply Module Use this procedure when you want to replace the power supply module. 1. Remove the access panel (refer to “Removing the Access Panel” on page 375). 2. Because the power supply unit is molded into the access panel, you must install a new access panel assembly (with the power supply attached). Refer to “Reinstalling the Access Panel” on page 378. Access panel (with power supply and fan) Figure 187.
Wi-Fi Array Use this Space for Your Notes 388 Appendix A: Servicing the Wi-Fi Array
Wi-Fi Array Appendix B: Quick Reference Guide This section contains product reference information. Use this section to locate the information you need quickly and efficiently. Topics include: z “Factory Default Settings” on page 389. z “Keyboard Shortcuts” on page 396. Factory Default Settings The following tables show the Wi-Fi Array’s factory default settings.
Wi-Fi Array Gigabit 1 and Gigabit 2 Setting Default Value Enabled Yes DHCP Bind Yes Default IP Address 10.0.2.1 Default IP Mask 255.255.255.0 Default Gateway None Auto Negotiate On Duplex Full Speed 1000 Mbps MTU Size 1504 Management Enabled Yes Fast Ethernet Setting Enabled Yes DHCP Bind Yes Default IP Address 390 Default Value 10.0.1.1 Default IP Mask 255.255.255.
Wi-Fi Array Setting Default Value MTU Size 1500 Management Enabled Yes Integrated Access Points (IAPs) Setting IAP abg2 Defaults Enabled (Radio State) Default Value Enabled Mode = Monitor Channel = Monitor Cell Size = Manual Antenna = Internal-Omni No Mode z XS16, XS-3900 802.11a for a1 to a12 802.11bg for abg1 to abg4 z XS12 802.11a for a1 to a8 802.11bg for abg1 to abg4 z XS8, XS-3700 802.11a for a1 to a4 802.11bg for abg1 to abg4 z XS4, XS-3500 802.
Wi-Fi Array Server Settings NTP Setting Default Value Enabled No Primary time.nist.gov Secondary pool.ntp.
Wi-Fi Array Setting Default Value Trap Port 162 Authorization Fail Port On DHCP Setting Enabled Default Value No Maximum Lease Time 300 minutes Default Lease Time 300 minutes IP Start Range 192.168.1.2 IP End Range 192.168.1.
Wi-Fi Array Setting Broadcast Default Value On Security Global Settings - Encryption Setting Enabled Default Value Yes WEP Keys null (all 4 keys) WEP Key Length null (all 4 keys) Default Key ID 1 WPA Enabled No TKIP Enabled Yes AES Enabled Yes EAP Enabled Yes PSK Enabled No Pass Phrase null Group Rekey Disabled External RADIUS (Global) Setting Enabled 394 Default Value Yes Primary Server None Primary Port 1812 Appendix B: Quick Reference Guide
Wi-Fi Array Setting Primary Secret Default Value xirrus Secondary Server Secondary Port null (no IP address) 1812 Secondary Secret Time Out (before primary server is retired) Accounting null (no secret) 600 seconds Disabled Interval 300 seconds Primary Server None Primary Port 1813 Primary Secret xirrus Secondary Server None Secondary Port 1813 Secondary Secret null (no secret) Internal RADIUS Setting Enabled Default Value No The user database is cleared upon reset to the factory def
Wi-Fi Array Administrator Account and Password Setting Default Value ID admin Password admin Management Setting SSH Default Value On SSH timeout 300 seconds Telnet Off Telnet timeout 300 seconds Serial On Serial timeout 300 seconds Management over IAPs http timeout Off 300 seconds Keyboard Shortcuts The following table shows the most common keyboard shortcuts used by the Command Line Interface. Action 396 Shortcut Cut selected data and place it on the clipboard.
Wi-Fi Array Action Shortcut Paste data from the clipboard into a document (at the insertion point). Ctrl + V Go to top of screen. Ctrl + Z Copy the active window to the clipboard. Copy the entire desktop image to the clipboard. Abort an action at any time. Alt + Print Screen Print Screen Esc Go back to the previous screen. b Access the Help screen.
Wi-Fi Array Use this Space for Your Notes 398 Appendix B: Quick Reference Guide
Wi-Fi Array Appendix C: Technical Support This appendix provides valuable support information that can help you resolve technical difficulties. Before contacting Xirrus, review all topics below and try to determine if your problem resides with the Wi-Fi Array or your network infrastructure.
Wi-Fi Array z If you are deploying multiple units, the Array should be oriented so that the abg(n)2 radio is oriented in the direction of the least required coverage, because when in monitor mode the abg(n)2 radio does not function as an AP servicing stations. z The Wi-Fi Array should only be used with Wi-Fi certified client devices.
Wi-Fi Array Q. What would I use SSIDs for? A. The creation of different wireless network names allows system administrators to separate types of users with different requirements. The following policies can be tied to an SSID: z Minimum security required to join this SSID. z The wireless Quality of Service (QoS) desired for this SSID. z The wired VLAN associated with this SSID.
Wi-Fi Array 6. If desired (optional), you can select which radios this SSID will not be available on—the default is to make this SSID available on all radios. 7. Click on the Apply button to apply your changes to this session. 8. Click on the Save button to save your changes. 9. If you need to edit any of the SSID settings, you can do so from the SSID Management page. See Also Contact Information General Hints and Tips Security SSIDs SSID Management VLAN Support Security Q.
Wi-Fi Array Be aware that Telnet is not secure over network connections and should be used only with a direct serial port connection. When connecting to the unit’s Command Line Interface over a network connection, you must use a Secure SHell (SSH) utility. The most commonly used freeware providing SSH tools is PuTTY. The Array only allows SSH-2 connections, so your SSH utility must be set up to use SSH-2. z Configuration auditing Do not change approved configuration settings.
Wi-Fi Array TKIP solves security issues with WEP. It also allows you to establish encryption keys on a per-user-basis, with key rotation for added security. In addition, TKIP provides Message Integrity Check (MIC) functionality and prevents active attacks on the wireless network. AES is the strongest encryption standard and is used by government agencies; however, old legacy hardware may not be capable of supporting the AES mode (it probably won’t work on older wireless clients).
Wi-Fi Array z MAC Address ACLs (Access Control Lists) MAC address ACLs provide a list of client adapter MAC addresses that are allowed or denied access to the wireless network. Access Control Lists work well when there are a limited number of users—in this case, enter the MAC addresses of each user in the Allow list. In the event of a lost or stolen MAC adapter, enter the affected MAC address in the Deny list. Q. Why do I need to authenticate my Wi-Fi Array units? A.
Wi-Fi Array particular VLAN can be on any segment of the physical network but logically only members of a particular VLAN can see each other. VLANs are defined and implemented using the wired network switches that are VLAN capable. Packets are tagged for transmission on a particular VLAN according to the IEEE 802.1Q standard, with VLAN switches processing packets according to the tag. Q. What would I use VLANs for? A.
Wi-Fi Array selected VLAN, but would be able to access other privileged network resources.
Wi-Fi Array Array Monitor and Radio Assurance Capabilities All models of the Wi-Fi Array have a monitor radio, abg(n)2, that checks that the Array’s radios are functioning correctly, and acts as a dedicated threat sensor to detect and prevent intrusion from rogue access points. Enabling Monitoring on the Array IAP abg(n)2 may be set to monitor the Array or to be a normal IAP radio.
Wi-Fi Array Radio Assurance The Array is capable of performing continuous, comprehensive tests on its radios to assure that they are operating properly. Testing is enabled using the Radio Assurance Mode setting on the Advanced RF Settings window (Step 5 in “Advanced RF Settings” on page 275). When this mode is enabled, IAP abg(n)2 performs loopback tests on the Array. Radio Assurance Mode requires Intrusion Detection to be set to Standard (See Step 1 in “Advanced RF Settings” on page 275).
Wi-Fi Array Radio Assurance Options If the monitor detects a problem with an Array radio as described above, it will take action according to the preference that you have specified in the Radio Assurance Mode setting on the Advanced RF Settings window (see Step 5 page 278): 410 z Failure alerts only—The Array will issue alerts in the Syslog, but will not initiate repairs or reboots.
Wi-Fi Array Upgrading the Array via CLI If you are experiencing difficulties communicating with the Array using the Web Management Interface, the Array provides lower-level facilities that may be used to accomplish an upgrade via the CLI and the Xirrus Boot Loader (XBL). 1. Download the latest software update from the Xirrus FTP site using your Enhanced Care FTP username and password. If you do not have an FTP username and password, contact Xirrus Customer Service for assistance (support@xirrus.com).
Wi-Fi Array Boot your Array and watch the progress messages. When Press space bar to exit to bootloader: is displayed, press the space bar. The rest of this procedure is performed using the bootloader. The following steps assume that you are running DHCP on your local network. 5. Type dhcp and hit return. This instructs the Array to obtain a DHCP address and use it during this boot in the bootloader environment. 6. Type dir and hit return to see what's currently in the compact flash. 7.
Wi-Fi Array L1 cache | Data: 32 KB Inst: 32 KB Status : Enabled Watchdog | Enabled (5 secs) I2C Bus | 400 KHz DTT | CPU:34C RF0:34C RF1:34C RF2:27C RF3:29C RTC | Wed 2007-Nov-05 6:43:14 GMT System DDR | 256 MB, Unbuffered Non-ECC (2T) L2 cache | 256 KB, Enabled FLASH | 4 MB, CRC: OK FPGA | 2 Devices programmed Packet DDR | 256 MB, Unbuffered Non-ECC, Enabled Network | Mot FEC Mot TSEC1 [Primary] Mot TSEC2 IDE Bus 0 | OK CFCard | 122 MB, Model: Hitachi XXM2.3.
Wi-Fi Array XBL>del * [CFCard] Delete : 2 file(s) deleted XBL>update server 192.168.39.102 xs-3.0-0425.bin [TFTP ] Device : Mot TSEC1 1000BT Full Duplex [TFTP ] Client : 192.168.39.195 [TFTP ] Server : 192.168.39.102 [TFTP ] File : xs-3.0-0425.bin [TFTP ] Address : 0x1000000 [TFTP ] Loading : ################################################## [TFTP ] Loading : ################################################## [TFTP ] Loading : ###### done [TFTP ] Complete: 12.9 sec, 2.
Wi-Fi Array L2 cache | 256 KB, Enabled FLASH | 4 MB, CRC: OK FPGA | 2 Devices programmed Packet DDR | 256 MB, Unbuffered Non-ECC, Enabled Network | Mot FEC Mot TSEC1 [Primary] Mot TSEC2 IDE Bus 0 | OK CFCard | 122 MB, Model: Hitachi XXM2.3.0 Environment| 4 KB, Initialized In: serial Out: serial Err: serial Press space bar to exit to bootloader: [CFCard] File : xs*.bin [CFCard] Address : 0x1000000 [CFCard] Loading : ############################################### done [CFCard] Complete: 26.9 sec, 1.
Wi-Fi Array Power over Gigabit Ethernet Compatibility Matrix The Xirrus Power over Gigabit Ethernet (PoGE) solution includes different modules to be used with particular Array models. The following two tables indicate the proper PoGE injector/splitters to use with each Array. X indicates products are INCOMPATIBLE. NA=Not Applicable. # IMPORTANT NOTE: Only use -H versions of injectors/splitters together, and use non-H versions of injectors/splitters together - do not mix or match the two types.
Wi-Fi Array Table 2: Legacy PoGE Models XP1-MSI-HX Injector XP8-MSI-H Injector Works with any PoGE injector/splitter 3 3 3 3 XS8 Works with any PoGE injector, no splitter required 3 3 3 NA XS16/XS12 Works with two injector options, no splitter required X 3 3 NA XS-3500-4 Works with any PoGE injector/splitter 3 3 3 3 XS-3700-8, DC (modified)1 Works only with -H version injector/splitters 3 3 3 3 XS-3900-16, DC (modified)1 Works only with -HX or XP8 version injector/splitters
Wi-Fi Array Determining If an XS-3700 or XS-3900 is Modified for PoGE The following pictures show how different Array power supply types look. On the XS-3700/XS-3900 Arrays, it is VERY important to note the yellow sticker (Figure 189 on page 418) that differentiates between modified and unmodified DC power versions. Connect Data OUT to Gig1 or Gig2 port with short cable Connect Cat 5e (from PoGE Injector) to IN port Figure 188.
Wi-Fi Array Contact Information Xirrus, Inc. is located in Thousand Oaks, California, just 55 minutes northwest of downtown Los Angeles and 40 minutes southeast of Santa Barbara. Xirrus, Inc. 2101 Corporate Center Drive Thousand Oaks, CA 91320 USA Tel: Fax: 1.805.262.1600 1.800.947.7871 Toll Free in the US 1.866.462.3980 www.xirrus.com support.xirrus.
Wi-Fi Array 420 Appendix C: Technical Support
Wi-Fi Array Appendix D: Implementing Security Standards This Appendix discusses two security standards which are supported by the Wi-Fi Array, and discusses their implementation.
Wi-Fi Array The pci-audit command checks the following items: z Telnet is disabled. z Admin RADIUS is enabled (admin login authentication is via RADIUS server). z An external Syslog server is in use. z All SSIDs must set encryption to WPA or better (which also enforces 802.1x authentication) Sample output from this command is shown below. SS-Array(config)# pci-audit PCI audit failure: telnet enabled. PCI audit failure: admin RADIUS authentication disabled.
Wi-Fi Array To implement FIPS 140-2, Level 2 using WMI 1. Apply the supplied tamper-evident seals to the unit as indicated in the figures below. The procedure is slightly different, depending on the model. • Before you apply the tamper-evident seal, clean the area of any grease, dirt, or oil. We recommend using alcohol-based cleaning pads for this. • Each seal must be applied to straddle both sides of an opening so that it will show if an attempt has been made to open the Array.
Wi-Fi Array • XS4 or XS-3500—Apply two seals, one on either side of the Array about 180° apart from each other, as shown. IMPORTANT: Make sure that each seal straddles a seam. 1 2 Figure 192. Applying Two Tamper-evident seals to the XS4 or XS-3500 2. Enable HTTPS using the CLI if it is not already enabled, using the following command: Xirrus_Wi-Fi_Array(config)# https on This allows the Web Management Interface to be used for the rest of this procedure. HTTPS is enabled on Arrays by default.
Wi-Fi Array 3. Select the SSIDs/SSID Management window. Set Encryption Type to WPA2 (Figure 193 ). Click Modify, then Save. Make sure that this is set for each SSID. Figure 193.
Wi-Fi Array 4. In the Security/Global Settings window, select No for TKIP Enabled and Yes for AES Enabled. Click Apply, then Save. Figure 194.
Wi-Fi Array 5. In the Security/Management Control window, select Yes for Enable Management over SSH. Select No for Enable Management over Telnet and for Enable Management over IAPs. Click Apply, then Save. Figure 195. Security/Management Control Window 6. In the Services/SNMP window, select No for Enable SNMP. Click Apply, then Save. Figure 196.
Wi-Fi Array 7. In the IAPs/Global Settings window, select Off for Fast Roaming. Click Apply, then Save. Figure 197. IAPs/Global Settings Screen To check if an Array is in FIPS mode: You may determine whether or not the Array is running in FIPS mode by verifying that the settings described in the previous procedure are in effect. To implement FIPS 140-2, Level 2 using CLI: 1. The following CLI command will perform all of the settings required to put the Array in FIPS mode:.
Wi-Fi Array See Also The Web Management Interface The Command Line Interface Appendix D: Implementing Security Standards 429
Wi-Fi Array 430 Appendix D: Implementing Security Stan-
Wi-Fi Array Appendix E: Notices This appendix contains the following information: z “Notices” on page 431 z “EU Directive 1999/5/EC Compliance Information” on page 434 z “Safety Warnings” on page 442 z “Translated Safety Warnings” on page 443 z “Software Warranty and License Agreement” on page 444 z “Hardware Warranty Agreement” on page 451 Notices FCC Notice This device complies with Part 15 of the FCC Rules, with operation subject to the following two conditions: (1) This device may not cause
Wi-Fi Array RF Radiation Hazard Warning To ensure compliance with FCC RF exposure requirements, this device must be installed in a location where the antennas of the device will have a minimum distance of at least 25 cm (9.84 inches) from all persons. Using higher gain antennas and types of antennas not certified for use with this product is not allowed. The device shall not be co-located with another transmitter.
Wi-Fi Array Maximum Antenna Gain Currently, the maximum antenna gain for external antennas is limited to 5.2dBi for operation in the 2400MHz to 2483.5MHz, 5150MHz to 5250MHz and 5725MHz to 5825MHz bands. The antenna gains must not exceed maximum EIRP limits set by the FCC / Industry Canada. High Power Radars High power radars are allocated as primary users (meaning they have priority) in the 5150MHz to 5250MHz and 5650MHz to 5850MHz bands.
Wi-Fi Array EU Directive 1999/5/EC Compliance Information This section contains compliance information for the Xirrus Wi-Fi Array family of products, which includes the XN16, XN12, XN8, XN4, XS16, XS12, XS8, XS4, XS3900, XS-3700 and XS-3500. The compliance information contained in this section is relevant to the European Union and other countries that have implemented the EU Directive 1999/5/EC.
Wi-Fi Array ĺslenska [Icelandic] Þetta tæki er samkvæmt grunnkröfum og öðrum viðeigandi ákvæðum Tilskipunar 1999/5/EC. Italiano [Italian] Questo apparato é conforme ai requisiti essenziali ed agli altri principi sanciti dalla Direttiva 1999/5/CE. Latviski [Latvian] Šī iekārta atbilst Direktīvas 1999/5/EK būtiskajā prasībām un citiem ar to saistītajiem noteikumiem. Lietuvių [Lithuanian] Šis įrenginys tenkina 1995/5/EB Direktyvos esminius reikalavimus ir kitas šios direktyvos nuostatas.
Wi-Fi Array Slovensky [Slovak] Toto zariadenie je v zhode so základnými požadavkami a inými prislušnými nariadeniami direktiv: 1999/5/EC. Suomi [Finnish] Tämä laite täyttää direktiivin 1999/5//EY olennaiset vaatimukset ja on siinä asetettujen muiden laitetta koskevien määräysten mukainen. Svenska [Swedish] Denna utrustning är i överensstämmelse med de väsentliga kraven och andra relevanta bestämmelser i Direktiv 1999/5/EC.
Wi-Fi Array WEEE Compliance Appendix E: Notices z Natural resources were used in the production of this equipment. z This equipment may contain hazardous substances that could impact the health of the environment. z In order to avoid harm to the environment and consumption of natural resources, we encourage you to use appropriate take-back systems when disposing of this equipment.
Wi-Fi Array National Restrictions In the majority of the EU and other European countries, the 2.4 GHz and 5 GHz bands have been made available for the use of Wireless LANs. The following table provides an overview of the regulatory requirements in general that are applicable for the 2.4 GHz and 5 GHz bands. Frequency Band (MHz) Max Power Level (EIRP) (mW) Indoor Outdoor 2400–2483.
Wi-Fi Array Les liasons sans fil pour une utilisation en extérieur d’une distance supérieure à 300 mèters doivent être notifiées à l’Institut Belge des services Postaux et des Télécommunications (IBPT). Visitez www.bipt.be pour de plus amples détails. France The use of the band from 5470 MHz to 5725 MHz is not allowed in France. The band from 5150 MHz to 5350 MHz can only be used indoors.
Wi-Fi Array Greece A license from EETT is required for the outdoor operation in the 5470 MHz to 5725 MHz band. Xirrus recommends checking www.eett.gr for more details. Η δη ιουργβάικτ ωνεξωτερικο ρουστη ζ νησυ νοτ των 5470–5725 ΜΗz ε ιτρ ετάιωνο ετάά όάδειά της ΕΕΤΤ, ου ορηγεβτάι στερά ά ό σ φωνη γν η του ΓΕΕΘΑ. ερισσότερες λε τομ ρειεωστο www.eett.gr Italy This product meets the National Radio Interface and the requirements specified in the National Frequency Allocation Table for Italy.
Wi-Fi Array Antennas The Xirrus Wi-Fi Array employs integrated antennas that cannot be removed and which are not user accessible. Nevertheless, as regulatory limits are not the same throughout the EU, users may need to adjust the conducted power setting for the radio to meet the EIRP limits applicable in their country or region. Adjustments can be made from the product’s management interface—either Web Management Interface (WMI) or Command Line Interface (CLI).
Wi-Fi Array Safety Warnings ! Safety Warnings ! Explosive Device Proximity Warning ! Lightning Activity Warning ! Circuit Breaker Warning Read all user documentation before powering this device. All Xirrus interconnected equipment should be contained indoors. This product is not suitable for outdoor operation. Please verify the integrity of the system ground prior to installing Xirrus equipment. Additionally, verify that the ambient operating temperature does not exceed 50°C.
Wi-Fi Array Translated Safety Warnings Avertissements de Sécurité ! Sécurité ! Proximité d'appareils explosifs ! Foudre ! Disjoncteur Lisez l'ensemble de la documentation utilisateur avant de mettre cet appareil sous tension. Tous les équipements Xirrus interconnectés doivent être installés en intérieur. Ce produit n'est pas conçu pour être utilisé en extérieur. Veuillez vérifier l'intégrité de la terre du système avant d'installer des équipements Xirrus.
Wi-Fi Array Software Warranty and License Agreement THIS SOFTWARE LICENSE AGREEMENT (THE “AGREEMENT”) IS A LEGAL AGREEMENT BETWEEN YOU (“CUSTOMER”) AND LICENSOR (AS DEFINED BELOW) AND GOVERNS THE USE OF THE SOFTWARE INSTALLED ON THE PRODUCT (AS DEFINED BELOW).
Wi-Fi Array 2. Grant of Rights 2.1 Software. Subject to the terms and conditions of this Agreement, Licensor hereby grants to Customer a perpetual, non-exclusive, nonsublicenseable, non-transferable right and license to use the Software solely as installed on the Product in accordance with the accompanying Documentation and for no other purpose. 2.2 Ownership. The license granted under Sections 2.
Wi-Fi Array computer software or hardware which is designated to defeat any copy protection or other use limiting device, including any device intended to limit the number of users or devices accessing the Product. 3. Limited Warranty and Limitation of Liability 3.1 Limited Warranty & Exclusions.
Wi-Fi Array DEVICES OR SYSTEMS IN WHICH A MALFUNCTION OF THE SOFTWARE WOULD RESULT IN FORESEEABLE RISK OF INJURY OR DEATH TO THE OPERATOR OF THE DEVICE OR SYSTEM OR TO OTHERS (“HAZARDOUS APPLICATIONS”). CUSTOMER ASSUMES ANY AND ALL RISKS, INJURIES, LOSSES, CLAIMS AND ANY OTHER LIABILITIES ARISING OUT OF THE USE OF THE SOFTWARE IN ANY HAZARDOUS APPLICATIONS. 3.4 Limitation of Liability. (a) TOTAL LIABILITY.
Wi-Fi Array 4. Confidential Information 4.1 Generally. The Software (and its accompanying Documentation) constitutes Licensor's and its suppliers' proprietary and confidential information and contains valuable trade secrets of Licensor and its suppliers (“Confidential Information”).
Wi-Fi Array 5.3 Effect of Termination. (a) Upon termination of this Agreement, in whole or in part, Customer shall pay Licensor for all amounts owed up to the effective date of termination. Termination of this Agreement shall not constitute a waiver for any amounts due. (b) The following Sections shall survive the termination of this Agreement for any reason: Sections 1, 2.2, 2.4, 3, 4, 5.3, and 6.
Wi-Fi Array Information Transactions Act (as promulgated by any State) to this Agreement. Suits or enforcement actions must be brought within, and each party irrevocably commits to the exclusive jurisdiction of, the state and federal courts located in Ventura County, California. Customer may not assign this Agreement by operation of law or otherwise, without the prior written consent of Licensor and any attempted assignment in violation of the foregoing shall be null and void.
Wi-Fi Array Hardware Warranty Agreement PLEASE READ THIS AGREEMENT CAREFULLY BEFORE USING THIS PRODUCT BY USING THIS PRODUCT, YOU ACKNOWLEDGE THAT YOU HAVE READ AND UNDERSTOOD ALL THE TERMS AND CONDITIONS OF THIS AGREEMENT AND THAT YOU ARE CONSENTING TO BE BOUND BY THIS AGREEMENT. IF YOU DO NOT AGREE TO ALL OF THE TERMS OF THIS AGREEMENT, RETURN THE UNUSED PRODUCT TO THE PLACE OF PURCHASE FOR A FULL REFUND. LIMITED WARRANTY.
Wi-Fi Array whether in contract, tort (including negligence), or otherwise, exceed the price paid by Customer. The foregoing limitations shall apply even if the above-stated warranty fails of its essential purpose. SOME STATES DO NOT ALLOW LIMITATION OR EXCLUSION OF LIABILITY FOR CONSEQUENTIAL OR INCIDENTAL DAMAGES. The above warranty DOES NOT apply to any evaluation Equipment made available for testing or demonstration purposes. All such Equipment is provided AS IS without any warranty whatsoever.
Wi-Fi Array Glossary of Terms 802.11a A supplement to the IEEE 802.11 WLAN specification that describes radio transmissions at a frequency of 5 GHz and data rates of up to 54 Mbps. 802.11b A supplement to the IEEE 802.11 WLAN specification that describes radio transmissions at a frequency of 2.4 GHz and data rates of up to 11 Mbps. 802.11d A supplement to the Media Access Control (MAC) layer in 802.11 to promote worldwide use of 802.11 WLANs.
Wi-Fi Array authentication The process that a station, device, or user employs to announce its identify to the network which validates it. IEEE 802.11 specifies two forms of authentication, open system and shared key. bandwidth Specifies the amount of the frequency spectrum that is usable for data transfer. In other words, it identifies the maximum data rate a signal can attain on the medium without encountering significant attenuation (loss of power).
Wi-Fi Array cell The basic geographical unit of a cellular communications system. Service coverage of a given area is based on an interlocking network of cells, each with a radio base station (transmitter/receiver) at its center. The size of each cell is determined by the terrain and forecasted number of users. channel A specific portion of the radio spectrum—the channels allotted to one of the wireless networking protocols. For example, 802.11b and 802.11g use 14 channels in the 2.
Wi-Fi Array DNS (Domain Name System) A system that maps meaningful domain names with complex numeric IP addresses. DNS is actually a separate network—if one DNS server cannot translate a domain name, it will ask a second or third until a server is found with the correct IP address. domain The main name/Internet address of a user's Internet site as registered with the InterNIC organization, which handles domain registration on the Internet. For example, the “domain” address for Xirrus is: http://www.
Wi-Fi Array EDCF (Enhanced Distributed Coordinator Function) A QoS extension which uses the same contention-based access mechanism as current devices but adds “offset contention windows” that separate high priority packets from low priority packets (by assigning a larger random backoff window to lower priorities than to higher priorities). The result is “statistical priority,” where high-priority packets usually are transmitted before low-priority packets.
Wi-Fi Array Gigabit 2 The secondary Gigabit Ethernet interface. See also, Gigabit Ethernet. Gigabit Ethernet The newest version of Ethernet, with data transfer rates of 1 Gigabit (1,000 Mbps). Group A user group, created to define a set of attributes (such as VLAN, traffic limits, and Web Page Redirect) and privileges (such as fast roaming) that apply to all users that are members of the group. This allows a uniform configuration to be easily applied to multiple user accounts.
Wi-Fi Array MTU (Maximum Transmission Unit) The largest physical packet size—measured in bytes—that a network can transmit. Any messages larger than the MTU are divided into smaller packets before being sent. Every network has a different MTU, which is set by the network administrator. Ideally, you want the MTU to be the same as the smallest MTU of all the networks between your machine and a message's final destination.
Wi-Fi Array preamble Preamble (sometimes called a header) is a section of data at the head of a packet that contains information that the access point and client devices need when sending and receiving packets. PLCP has two structures, a long and a short preamble. All compliant 802.11b systems have to support the long preamble.
Wi-Fi Array SDMA (Spatial Division Multiple Access) A wireless communications mode that optimizes the use of the radio spectrum and minimizes cost by taking advantage of the directional properties of antennas. The antennas are highly directional, allowing duplicate frequencies to be used for multiple zones. SNMP (Simple Network Management Protocol) A standard protocol that regulates network management over the Internet. SNTP (Simple Network Time Protocol) A simplified version of NTP.
Wi-Fi Array subnet mask A mask used to determine what subnet an IP address belongs to. An IP address has two components: (1) the network address and (2) the host address. For example, consider the IP address 150.215.017.009. Assuming this is part of a Class B network, the first two numbers (150.215) represent the Class B network address, and the second two numbers (017.009) identify a particular host on this network.
Wi-Fi Array multiple switches from different vendors. This interoperability and traffic containment across different switches is the result of a switch's ability to use and recognize 802.1Q tag headers—called VLAN tagging. Switches that implement 802.1Q tagging add this tag header to the frame directly after the destination and source MAC addresses. The tag header indicates: 1. That the packet has a tag. 2. Whether the packet should have priority over other packets. 3.
Wi-Fi Array WPA2 (Wi-Fi Protected Access 2) WPA2 is the follow-on security method to WPA for wireless networks and provides stronger data protection and network access control. It offers Enterprise and consumer Wi-Fi users with a high level of assurance that only authorized users can access their wireless networks. Like WPA, WPA2 is designed to secure all versions of 802.11 devices, including 802.11a, 802.11b, 802.11g, and 802.11n, multi-band and multi-mode.
Wi-Fi Array Index Numerics 11n see IEEE 802.11n 59 4.9 GHz Public Safety Band 282 802.11a 7, 8, 254, 266 802.11a/b/g 48 802.11a/b/g/n 17 802.11a/n 17, 107, 238 802.11b 7, 8, 269 802.11b/g 254, 269 802.11b/g/n 17, 107, 238, 273 802.11e 19 802.11g 7, 8, 269 802.11i 8, 112, 174 802.11n see IEEE 802.11n 59 802.11p 19 802.11q 19 802.
Wi-Fi Array authority certificate 211, 219 auto negotiate 181 auto-blocking rogue APs 276 auto-configuration 112, 259, 266, 269 channel and cell size 275 B backhaul see WDS 76 backup unit see standby mode 275 band association 238 beacon interval 259 Beacon World Mode 259 beam distribution 17 benefits 16 blocking rogue APs 276 blocking rogue APs 275 broadcast 264 fast roaming 264 browser certificate error 211, 219 BSS 400 BSSID 147, 400 buttons 124 C cdp 322 CDP (Cisco Discovery Protocol) settings 189 cdp
Wi-Fi Array contact-info 324 date-time 325 dhcp-server 326 dns 327 file 328 filter 331 fips 333 group 334 hostname 334 https 335 interface 336 load 337 location 337 management 338 more 338 netflow 339 no 340 pci-audit 342 quit 343 radius-server 343 reboot 344, 354 reset 344 run-tests 345 security 347 show 315 snmp 348 ssh 348 ssid 350 standby 350 statistics 318 syslog 351 telnet 352 vlan 354 Community String 392 configuration 173, 402 express setup 174 configuration changes applying 126 connection tracking
Wi-Fi Array dynamic VLAN overridden by group 248 E EAP 394, 402 EAP-MDS 18 EAP-PEAP 402 EAP-TLS 18, 70, 402 EAP-TTLS 18, 70, 402 EDCF 259 Encryption 394, 402 encryption 18 encryption method recommended (WPA2 with AES) 209 setting 209 support of multiple methods 209 encryption method (encryption mode) Open, WEP, WPA, WPA2, WPABoth 208 encryption standard AES, TKIP, both 209 setting 209 End User License Agreement 81 Enterprise 2, 7, 402 WLAN 7 Enterprise Class Management 8 Enterprise Class Security 8 ESS 400
Wi-Fi Array global settings 259, 266, 269 glossary of terms 453 Group management 247 group 245 CLI command 334 VLAN overrides dynamic VLAN 248 Group Rekey 394 H Help button 120 help button 124 host name 112, 120, 174, 188 HTTPS certificate, see certificate 219 HyperTerminal 46, 83 I IAP 50, 107, 112, 174, 254, 266, 269, 283, 391 fast roaming 253 naming 4 settings 254 IAP LED 107, 283 IAP LED settings 283 IAPs default channels 280 IEEE 7, 112, 174 IEEE 802.
Wi-Fi Array Login 126 login via Console port 214 long retry limit 259 loopback see radio assurance 368 loopback testing radio assurance mode 275 M MAC 70, 110, 400, 402 MAC Access Control Lists 70 MAC Access List 221 MAC address 221, 400, 402 Main System Memory 382 Management 396, 402 maximum lease 392 Maximum Lease Time 392 Megabit 112 Message Integrity Check 402 MIC 18, 402 monitoring intrusion detection 147 see intrusion detection 277 mounting 86 mounting plate 86, 94, 95 mounting the unit 86 MTU 181 si
Wi-Fi Array power 69 security 70 switch failover 67 WDS 76 PoGE 12, 45 see Power over Gigabit Ethernet 12 port failover 67 port requirements 72 power cord 375 power distribution 12 power outlet 45 Power over Gigabit Ethernet 3, 12, 21, 27, 35, 40, 45, 69, 84 compatibility with Array models 416 Power over Gigabit Ethernet (PoGE) 12 power planning 69 Power Supply 375, 378, 387 power supply replacing 387 power switch 375 pre-shared key 70, 79, 402 Print button 120 print button 124 probe see Netflow 194 product
Wi-Fi Array Rogue AP 8, 75, 147, 231, 402 rogue AP blocking 276 Rogue AP List 147 rogue APs blocking 275 Rogue Control List 231 rogue detection 17 rogues setting as known or approved 147 root command prompt 311 routing table window 138 RSSI 147 RTS 266, 269 RTS threshold 266, 269 S Save button 120 scalability 7 schedule auto channel configuration 275 Secondary Port 392 Secondary Server 392 secret 392 Secure Shell 46 secure Shell 45 Security FIPS 422 PCI DSS 421 security 8, 18, 207, 400, 402 certificate, se
Wi-Fi Array netflow 194 per-station 170 stations 169 WDS 168 status bar 120, 124 submitting comments 124 subnet 45, 67, 112, 181 switch failover 67 synchronize 112, 174, 192 Syslog 112, 120, 174, 191, 195, 392 time-stamping 112 Syslog reporting 195 Syslog Server 195 System Configuration Reset 295 System Log 195 system log viewing window 171 system memory replacing 382 System Reboot 295 System Tools 295 T T-bar 86 T-bar clips 86 TCP port requirements 72 technical support contact information 419 frequently a
Wi-Fi Array VoWLAN 19 VPN 112, 174, 402 VTS Virtual Tunnel Server 203, 206 VTun specifying tunnel server 203, 206 understanding 203 W wall thickness considerations 48 warning messages 123 WDS 285, 287 about 76 planning 76 statistics 168 WDS Client Links 287 Web interface 119 structure and navigation 123 Web Management Interface 75, 94, 107, 110, 126, 400 WEP 18, 70, 112, 174, 207, 238, 394, 402 WEP (Wired Equivalent Privacy) encryption method 209 Wi-Fi Protected Access 8, 70, 112, 174, 402 Wired Equivalent