Access / One® Network The Inventory Function This function provides you with an inventory view of your Access/One Network and includes the following commands: ◗ Print Friendly Format ◗ Export to CSV The inventory list is displayed in a tree structure that can be expanded (default) or collapsed (show nodes only). The structure of the list consists of the Node ID, its serial number and name, IP address and MAC address, the node type, the technology it uses, and the current firmware version it is running.
Access / One® Network The inventory list allows you to manually add nodes, at your discretion. To add a node to the inventory list, enter the node’s serial number in the Node ID field then click on the Add button. Nodes that cannot be detected by the network will appear in the Unreachable Devices frame. The node’s alphanumeric serial number is case-sensitive, with all alpha characters being upper case. You also have the option of manually deleting nodes from the inventory list.
Access / One® Network Export to CSV This option allows you to export the inventory file to a CSV (Comma Separated Values) format that can be edited within a compatible spreadsheet application, such as Microsoft Excel®. Figure 89. CSV File Importing the CSV File to an Excel Spreadsheet When the CSV file is created, use the following procedure to import the file into an Excel spreadsheet for editing. 1. Click in the header of the CSV file to make the CSV window active. 2.
Access / One® Network The Monitor Function This function provides you with tools that allow you to view your network’s operation and performance, and includes the following commands: ◗ Tools • AP Monitor • Network Connect Monitor • Wireless Client Query • Rogue Monitor – Scan – Ignore All – Include All 5 Tools Clicking on Tools in Manager/One’s toolbar generates a pull-down menu containing all the commands that are available within the Monitor function.
Access / One® Network The table displayed in the AP Monitor window can be customized to show a defined number of entries in the table, and the table can be sorted in either ascending or descending order based on any selected column. For example, if you want to sort the table by channel, click in the column header for Channel—the table is then sorted according to the channels used by the Client Connects.
Access / One® Network Network Connect Monitor The Network Connect Monitor provides a snapshot in table form of all active Network Connect devices on a selected subnet. 5 Figure 92. Network Connect Monitor Although the displayed data is different, the organization of tables in all monitors is the same. For information about how to define the sort criteria within the Network Connect Monitor table, see Figure 91.
Access / One® Network Wireless Client Query The Wireless Client Query Monitor provides a search tool that allows you to run a query through the network and locate Wi-Fi clients based on the following search criteria: ◗ Find a client based on a specific MAC address ◗ Find clients with an RSSI value of less than -85 dBm 5 Figure 94. Wireless Client Query Monitor If you choose to search for a client based on its MAC address, the system prompts you for the address.
Access / One® Network Rogue Monitor The Rogue Monitor provides a snapshot in table form of all rogue devices detected on a selected subnet. Figure 96. Rogue Monitor 5 Although the displayed data is different, the organization of tables in all monitors is the same. For information about how to define the sort criteria within the Rogue Monitor table, see Figure 91.
Access / One® Network The Apply Configuration Function This function is used to apply any configuration changes that have been made at either the network or subnet level. When BLUE, click on this tab to propagate and apply your changes to all nodes and wireless modules within your Access/One Network or a specific subnet. Apply Configuration 5 Figure 97.
Access / One® Network It is recommended that you complete all of your configuration changes before using the Apply Configuration command to propagate your changes throughout the network. Once the Apply Configuration command has been initiated, you cannot make any further changes until the command cycle has been completed.
Access / One® Network Procedure Configure a single remote network server for each subnet (NY: 192.162.1.22) on the LA server. Within a few minutes, Strix’s mesh topology feature will cause all of the remote subnets to automatically appear in each network server. Your Access/One Network is now manageable from any of the network servers in the network. Removing the NS to NS Feature To remove the NS to NS communication feature, delete all of the remote server entries on the LA server.
Access / One® Network 5 124 Managing the Network
Access / One® Network Managing Subnets and Nodes This chapter covers management tasks at the subnet and node levels—you can only manage a subnet or node (you cannot configure subnets or nodes independent of the network). If you are managing your Access/One Network at the network level, or managing an individual module (for example, a wireless module or network server), go to the relevant chapter: ◗ “Managing the Network” on page 65. ◗ “Managing Modules” on page 131.
Access / One® Network Interface Features in the Subnet View The interface features that are unique to the subnet view have already been discussed in Chapter 4, The Manager/One Interface. They are listed here for your convenience, and include: ◗ “A Choice of Layouts” on page 45. ◗ “The Details Pane” on page 56. ◗ “Inventory or Auto Discovered” on page 63.
Access / One® Network Commands (at the Subnet Level) Load Firmware... This command allows you to load a new firmware image to each of the modules contained in all network nodes within your Access/One Network or to a specific subnet. However, before you can load a new image, your FTP server parameters must be established correctly to let Manager/One know where to locate the new image (BIN) file.
Access / One® Network Whenever you initiate the Reboot... command, the system warns you that this action will affect multiple devices on the network (or subnet) and asks you to confirm the request. If you want to proceed, click on the OK button to initiate the reboot process, otherwise click on the Cancel button to abort the command. See also, “Important Note About Rebooting” on page 4. Subnet Choose this option to reboot the selected subnet.
Access / One® Network To change a name, simply enter a new name in the text field below the node and select the Update Node Names command. When prompted, click on the OK button to apply your change. Update Network Membership The subnet (subcloud) displays all of the nodes residing in the network. Nodes already assigned to the network (members) are GREY in color and the check box below the node is checked. Figure 101.
Access / One® Network Use this Space for Your Notes 6 130 Managing Subnets and Nodes
Access / One® Network Managing Modules This chapter covers management and configuration tasks at the individual module level (for example, wireless modules or network servers). It is generally sufficient to configure your Access/One Network as a whole without configuring specific modules. If you are managing the network, a subnet or node, go to the relevant chapter: ◗ “Managing the Network” on page 65. ◗ “Managing Subnets and Nodes” on page 125.
Access / One® Network When you initiate a command at the module level, the configuration pages that are displayed contain the configuration settings that are currently applied to the selected module only (not the network or any other module). In most cases, the only difference between a configuration window generated at the network level and the same window generated at the module level is the inclusion of pre-configured module data (if any) in the fields contained within the window.
Access / One® Network Actions This area of Manger/One applies to all modules (wireless modules and network servers) and contains commands that allow you to establish factory default settings, load firmware and/or configuration files, and page or reboot the module. Factory Defaults This command allows you to set the module’s configuration settings to their factory default state or remove the subnet and/or network configuration parameters from the module. 7 Figure 102.
Access / One® Network Load Firmware/Configuration This command allows you to load a new firmware image and /or configuration file to the module, restore a previous version (or backup file), or upload a backup firmware image and /or configuration file. The following graphic shows the Load Firmware/Configuration window with its options set for uploading a backup configuration file. Figure 103.
Access / One® Network Page Device This command allows you to page the module (device) that you are currently logged in to. Figure 104. Paging a Device To page the module, simply click on the Page Device button. When an IWS (Indoor Wireless System) module is paged, the module’s LED blinks between GREEN and RED, indicating that communication with the module is successful. The module will be paged until you click on the Disable Page button. Reboot 7 This command allows you to reboot the module.
Access / One® Network The Configure Function This function provides you with the tools you need to configure individual modules and includes the following commands: ◗ System • User Login • Network Management – General – SNMP – Trusted IP Addresses • TCP/IP Settings • Priority/One - Class of Service • Radius Accounting • Syslog • Date and Time • Operating Environment • Firmware Updates ◗ Wi-Fi (Wireless Modules Only) 7 • Radio Parameters • Client Connect • Network Connect • Rogue Scan System This area of
Access / One® Network User Login This command allows you to establish the identity of this module, define its physical location within the environment based on latitude, longitude and elevation, and set up the module’s login parameters (username and password). Figure 106. Module Identity and User Management (Login) Parameters The following options are available with this command: ◗ Module Name Edit the existing name or enter a new name for this module.
Access / One® Network ◗ Longitude This field allows you to define the specific longitude for where this module is located (more relevant to OWS modules where physical location and environment can be extreme). This setting must be within the range of -180 degrees/minutes to +180 degrees/minutes. The default is +0.000000.
Access / One® Network Network Management This command generates three sub-commands (General, SNMP, and Trusted IP Addresses) that allow you to define parameters for how the module is managed within your Access/One Network. For the most part, these commands are the same as their corresponding commands at the network level (with some minor exceptions that are documented here). General Unless you are logged in to a network server, this command is the same as its corresponding command at the network level.
Access / One® Network When finished, click on the Update button to update this page and apply your changes, then click on the Reboot button to reboot the module. If necessary, you can click on the Refresh button in the toolbar to reset all parameters on this page to their original values.
Access / One® Network Trusted IP Addresses This command is the same as its corresponding command at the network level. To configure these options for the module, go to “Trusted IP Addresses” on page 141. When finished, click on the Update button to update this page and apply your changes, then click on the Reboot button to reboot the module. If necessary, you can click on the Refresh button in the toolbar to reset all parameters on this page to their original values.
Access / One® Network When finished, click on the Update button to update this page and apply your changes, then click on the Reboot button to reboot the module. If necessary, you can click on the Refresh button in the toolbar to reset all parameters on this page to their original values. Priority/One - Class of Service This command is the same as its corresponding command at the network level. To configure these options for the module, go to “Priority/One - Class of Service” on page 81.
Access / One® Network Date and Time This command is the same as its corresponding command at the network level. To configure these options for the module, go to “Date and Time” on page 88. When finished, click on the Update button to update this page and apply your changes, then click on the Reboot button to reboot the module. If necessary, you can click on the Refresh button in the toolbar to reset all parameters on this page to their original values.
Access / One® Network ◗ File Name If you are calling a file other than accessone.bin or accessone_m.bin for this module, enter the name of the file in this field. When finished, click on the Update button to update this page and apply your changes, then click on the Reboot button to reboot the module. If necessary, you can click on the Refresh button in the toolbar to reset all parameters on this page to their original values.
Access / One® Network Radio Parameters This command is similar to the Radio Parameters command used at the network level, but with fields that are relevant only to the selected wireless module. To avoid confusion, the page generated by this command will be documented here in full. All changes made to this page will be applied only to the module you are currently logged in to (not to the entire network). The following graphic shows an example of the Radio Parameters page for an 802.11a wireless module.
Access / One® Network The following options are available with this command: ◗ Active Country Code This field (not editable) shows the currently active country code. ◗ Config Country Code This field is not editable because this model of your Access/One Network applies only to the United States (which is the only country code available).
Access / One® Network – 802.11g Super: This mode provides support for the Atheros Super G FastFrames throughput enhancement technology, with data rates up to 108Mbps and compatible with the 802.11g (54 Mbps) wireless technology. This translates to nearly double the throughput, but there are some limitations, including: – Only one operating channel is supported. – All user devices must also be capable of running 802.11g Super G and be configured for it. Super G is not an industry standard and so not all 802.
Access / One® Network • Data Rate This option allows you to select the data rate for the wireless module from the choices available in the pull-down list. All data rates are specified in Mbps (Megabits per second). You can choose a specific data rate from the pull-down list, or choose the Best option, which will instruct the system to select the best data rate for the wireless module automatically. The available data rates are determined by which type of wireless module (802.11a or 802.
Access / One® Network ◗ 802.11a Channel Selector These options extend the range of 802.11a wireless capability by allowing you to select 802.11a wireless channels. Check the corresponding box to enable an 802.11a channel of your choice. ◗ 802.11g Channel Selector These options extend the range of 802.11g wireless capability by allowing you to select 802.11g wireless channels. Check the corresponding box to enable an 802.11g channel of your choice. ◗ 802.
Access / One® Network – Auto This is the default mode and will enable protection for 802.11g stations if your Access/One Network finds an 802.11b client. In this mode, if the 802.11b client leaves the network the protection mode will revert to None automatically. • Protection Rate Sets the data rate at which the RTS-CTS (Request-to-Send and Clear-toSend) packets are sent (either 1 Mbps, 2 Mbps, 5.5 Mbps, or 11 Mbps). The 11 Mbps data rate is the default.
Access / One® Network ◗ Advanced Settings These advanced settings are preconfigured with the optimum settings for your wireless module. Changing any of these settings may negatively affect the module’s performance. For best results, leave these settings at their default values. • Beacon Interval The beacon is a uniframe system packet broadcast by the AP to keep the module synchronized. Enter a value in this field between 20 and 1000 (milliseconds) that specifies the beacon interval.
Access / One® Network Client Connect This command is similar to its corresponding command at the network level. The only difference between the configuration windows is that the Client Connect Privacy Tags option is not displayed at the module level. To configure your Client Connect options for a wireless module, go to “Client Connect” on page 98. 7 Figure 113.
Access / One® Network Network Connect This command is similar to its corresponding command at the network level, with the addition of the Target MAC Address and Ignore RTD options. For all other configuration options, go to “Network Connect” on page 106. Figure 114. Network Connect Configuration Window ◗ Target MAC Address Enter the MAC address for the wireless module to enable peer-to-peer connectivity based on the module’s MAC address.
Access / One® Network When finished, click on the Update button to update this page and apply your changes, then click on the Reboot button to reboot the module. If necessary, you can click on the Refresh button in the toolbar to reset all parameters on this page to their original values.
Access / One® Network The Monitor Function This function provides you with the tools you need to monitor the performance of individual modules and includes the following commands: ◗ Reports • Radio Statistics Applicable to wireless modules only. • Wireless Neighbors Applicable to wireless modules only. • Wireless Client Monitor Applicable to wireless Client Connect modules only. • SSIDs / VLANs List Applicable to wireless Client Connect modules only.
Access / One® Network Reports This area of Manger/One applies to all wireless modules and network servers and contains commands that allow you to monitor the performance of individual modules within your Access/One Network. It should be noted that the menu structure under the Reports option is slightly different, depending on whether you are logged in to a single band wireless module or a dual band wireless module.
Access / One® Network Radio Statistics This command is used to generate a statistical performance report relative to the selected wireless module. You can Clear the data or Recalculate the data that is displayed on this page, as required. Clearing the data resets all values to zero. If you recalculate (refresh) the data, the wireless module is polled and current operating data is displayed. Clicking on the Refresh button in the toolbar has the same effect as recalculating the data.
Access / One® Network Wireless Neighbors This command is used to generate a report that shows all wireless neighbors for the module, including any rogue devices (if enabled). To generate the report, click on the Scan button—it may take up to one minute to complete the scan for wireless neighbors and return the results. To include rogue devices in the scan, simply check the Show Rogue Devices check box. The default is to include rogue devices. Scan for Neighbors 7 Show Rogue Devices Figure 117.
Access / One® Network Wireless Client Monitor This command is used to generate a report that shows all Client Connects that are currently associated with the module you are logged in to. Figure 118. Wireless Client Monitor The table displayed in the Wireless Client Monitor window can be customized to show a defined number of entries in the table, and the table can be sorted in either ascending or descending order based on any selected column.
Access / One® Network SSIDs / VLANs List This command is used to generate a report that shows all SSIDs and VLANs currently associated with the module you are logged in to. Figure 119. SSID / VLANs List 7 The table displayed in the SSIDs / VLANs List window can be sorted in either ascending or descending order based on any selected column.
Access / One® Network Device Information This command is used to generate a report that shows information about the module you are logged in to. Figure 120 shows the Device Information window generated while logged in to an 802.11a wireless module. Unlike most monitoring windows, pages generated by the Device Information command are not configurable. Figure 120. Device Information (802.11a Module) Figure 121 shows the Device Information window generated while logged in to a network server module.
Access / One® Network The Rogue Devices Function This function provides you with a rogue scanning tool that allows you to scan for all rogue devices. The scanning tool offered here is similar to the Rogue Monitor tool provided at the network level, but applies only to rogue devices detected by the wireless module that you are logged in to. Commands This area of Manger/One applies to wireless modules only. Scan Use this command if you want to initiate an active scan for rogue devices.
Access / One® Network You can refresh the data on this page by clicking on the Refresh button in the toolbar. In addition, you can view the RSSI legend by clicking on the Information button (i) in the toolbar. In addition, you can click on a rogue’s BSSID and view the BSSID information associated with the rogue device. For example: Figure 123. BSSID Information for Rogue Device For more information about rogue devices, go to: ◗ “Detecting Rogue Devices” on page 13. 7 ◗ “Rogue Scan” on page 111.
Access / One® Network Use this Space for Your Notes 7 164 Managing Modules
Access / One® Network Power Settings for Antennas The following tables show the maximum power settings based on the type of antenna1 being used and the wireless band. Channels for IEEE 802.11b/g 12 dBi Omni Antenna (2.
Access / One® Network 16.4 dBi Sector Antenna (2.
Access / One® Network Channels for IEEE 802.11a 12 dBi Omni Antenna (5.25 – 5.35 GHz) Power Level (dBm) * Channel Identifier Frequency (MHz) Filter 52 5260 No Quarter (+17dBm) 56 5280 No Quarter (+17dBm) 60 5300 No Quarter (+17dBm) 64 5320 No Quarter (+17dBm) ODFM * Listed power level settings are average power. 12 dBi Omni Antenna (5.725 – 5.
Access / One® Network 23 dBi Patch Panel Antenna (5.25 – 5.35 GHz) Power Level (dBm) * Channel Identifier Frequency (MHz) Filter 52 5260 No Minimum (+5dBm) 56 5280 No Minimum (+5dBm) 60 5300 No Minimum (+5dBm) 64 5320 No Minimum (+5dBm) ODFM * Listed power level settings are average power. 23 dBi Patch Panel Antenna (5.725 – 5.
Access / One® Network Technical Support Strix has partnered with industry leading resellers and system integrators and has equipped them with all of the training and support tools needed to service our enduser customers. Strix Partners may log in to the Partner Page for detailed support information. Figure 124. Partner Login Page Warranty Our Access/One Network ships with a standard warranty of one year for hardware and software.
Access / One® Network Strix recognizes our customers’ reliance on our products to gain a competitive edge in their respective industries. Therefore, Strix offers priority assignment of our technical resources and expertise for those support situations where there is a critical impact to the customers’ business operations.
Access / One® Network Syslog Messages Format The following format is used for all Access/One Network syslog messages:
Access / One® Network Severity Levels The following severity levels are assigned to syslog messages (shown here in descending order from the most severe): ◗ EMERGENCY ◗ ALERT ◗ CRITICAL ◗ ERROR ◗ WARNING ◗ NOTICE ◗ INFORM ◗ DEBUG Assigning a severity level informs the system to automatically log all messages in that level, and all messages above that level (messages below the assigned level are not logged). Message Listing The following tables list syslog messages by subsystem.
Access / One® Network Severity Syslog Message WARNING CLI login failed, invalid password. WARNING Too many invalid login attempts. NOTICE Telnet user logged in, user:XXXXX. NOTICE CLI user logged in, user:XXXXX. NOTICE Telnet user logged out, user:XXXXX. NOTICE CLI user logged out, user:XXXXX. NOTICE Super user logged in. Wireless Subsystem Severity Syslog Message EMERGENCY Failed to start the radio. EMERGENCY AP/STA features not enabled. EMERGENCY Error while starting the module.
Access / One® Network Severity B 174 Syslog Message ERROR Reassociation fails, not authenticated, ssid:XXXXX,vlan:[id=x tag=x], mac:xx.xx.xx.xx.xx.xx. ERROR Association fails, already associated, ssid:XXXXX,vlan:[id=x tag=x], mac:xx.xx.xx.xx.xx.xx. ERROR Reassociation fails, already associated, ssid:XXXXX,vlan:[id=x tag=x], mac:xx.xx.xx.xx.xx.xx. ERROR Association fails, can't authenticate during scan, ssid:ssid:XXXXX, vlan:[id=x tag=x], mac:xx.xx.xx.xx.xx.xx.
Access / One® Network Severity Syslog Message ERROR Association fails, module is not ready, mac:xx:xx:xx:xx:xx:xx. ERROR Reassociation fails, module is not ready, mac:xx:xx:xx:xx:xx:xx. WARNING Authentication[3] fails, auth:shared, wlanmode:X, mac:xx.xx.xx.xx.xx.xx. WARNING Unsupported 802.11 authentication request, auth:LEAP, wlanmode:X, mac:xx.xx.xx.xx.xx.xx. WARNING Unsupported 802.11 authentication request, auth:x(hex), wlanmode:X, mac:xx.xx.xx.xx.xx.xx.
Access / One® Network B 176 Severity Syslog Message NOTICE Stack ID is available, stackId:XXXXXX. NOTICE The unit/Radio x will operate as - Network Connect. NOTICE The unit/Radio x will operate as - Client Connect. NOTICE The unit/Radio x will switch to - Client Connect. NOTICE Added station, mac:xx.xx.xx.xx.xx.xx. NOTICE Deauthentication completed, mac:xx.xx.xx.xx.xx.xx. NOTICE Association with AP done, response NOT sent, wlanmode:X, ssid:XXXX, mac:xx:xx:xx:xx:xx:xx.
Access / One® Network Severity Syslog Message NOTICE Authentication failed, type=XXX, reason=XXXX, mac:xx:xx:xx:xx:xx:xx. NOTICE Authentication done, type=XXX, mac:xx:xx:xx:xx:xx:xx. NOTICE Device will switch to Access Point. Management Subsystem Severity Syslog Message WARNING Fan failed. WARNING Temperature alarm on. WARNING DHCP Bind failed. WARNING Image load failed. NOTICE xx.xx.xx.xx detected rogue device [xx:xx:xx:xx:xx:xx] with RSSI [xxxx] channel [xxxx] SSID [XXXXX].
Access / One® Network Severity B 178 Syslog Message NOTICE Include list updated. INFORM Load image file XXXXX from XXXXXX. INFORM Image load is done. INFORM Received DHCP, IP - xx.xx.xx.xx, Gateway - xx.xx.xx.xx.
Access / One® Network Supported MIBs MIBs that are supported with Access/One Network include the following: Strix Private MIBs STRIX-PRODUCTS.mib Define the object identifiers assigned to various Strix hardware platforms. STRIX-CONFIG-SYSTEM.mib Configuration MIB for system wide parameters, including Usernames and Passwords, DHCP, DNS, SNTP, FTP, CoS, Trusted IPs, Syslog, and RADIUS accounting. STRIX-CONFIG-WIFI.mib Configuration MIB for 802.
Access / One® Network STRIX-ENT-TRAPS.mib List of traps that Strix devices can generate. STRIX-CONFIG-TRAPS.mib Configuration MIB for enabling and disabling specific traps per trap manager. STRIX-ACCESSONE-CAPABILITY.mib Indicates the level of support implemented by an SNMP agent on the Access/ One Network with respect to standard MIBs.
Access / One® Network Glossary of Terms 802.11a A supplement to the IEEE 802.11 wireless LAN (WLAN) specification that describes transmission through the physical layer (PHY) based on orthogonal frequency division multiplexing (OFDM), at a frequency of 5 GHz and data rates of up to 54 Mbps. See also, OFDM. 802.1D The IEEE LAN specification for remote media access control (MAC) bridging. 802.11g A supplement to the IEEE 802.
Access / One® Network 802.11x An IEEE specification that defines wireless LAN (WLAN) data link and physical layers. The specification includes data link layer media access control (MAC) sub-layer, and two sub-layers of the physical (PHY) layer-a frequency-hopping spread-spectrum (FHSS). See also, FHSS. 802.2 IEEE specification that describes the logical link control (LLC) encapsulation common to all 802 series LANs. 802.
Access / One® Network baud rate The number of pulses of a signal that occur in one second. Thus, baud rate is the speed at which digital signal pulses travel. Beacon A uniframe system packet broadcast by the AP to keep the network synchronized. A beacon Includes the Net_ID (ESSID), the AP address, the broadcast destination addresses, a time stamp, a DTIM (Delivery Traffic Indicator Maps) and the TIM (Traffic Indicator Message). bit rate The transmission rate of binary symbols ('0' and '1').
Access / One® Network DHCP (Dynamic Host Configuration Protocol) A method for dynamically assigning IP addresses to devices on a network. Issues IP addresses automatically within a specified range to devices such as PCs when they are first powered up. The device retains the use of the IP address for a specific license period defined by the system administrator. EAP (Extensible Authentication Protocol) A general point-to-point protocol that supports multiple authentication mechanisms.
Access / One® Network FHSS (Frequency-Hopping Spread-Spectrum) One of two types of spread-spectrum radio technology used in wireless LAN (WLAN) transmissions. The FHSS technique modulates the data signal with a narrowband carrier signal that “hops” in a predictable sequence from frequency to frequency as a function of time over a wide band of frequencies.
Access / One® Network IAPP (InterAP Protocol) A protocol being developed as the 802.11f version of the IEEE 802.11 wireless LAN (WLAN) specification to support interoperability, mobility, handover, and coordination among Access Points (APs). Implemented on top of IP, IAPP uses UDP/IP and Sub-network Access Protocol (SNAP) as transfer protocols. See also, 802.11x. IAS (Internet Authentication Service) Microsoft's RADIUS server. See also, RADIUS.
Access / One® Network MD5 (Message Direct algorithm 5) A one-way hashing algorithm used in many authentication algorithms to derive cryptographic keys. MD5 takes a message of an arbitrary length and creates a 128-bit message digest. See also, authentication. MIB (Management Information Base) A set of parameters an SNMP management station can query or establish in the SNMP agent of a network device (for example, a router).
Access / One® Network OFDM (Orthogonal Frequency Division Multiplexing) A technique that splits a wide frequency band into a number of narrow frequency bands and sends data across the sub-channels. The 802.11a and 802.11g standards are based on OFDM. See also, 802.11a and 802.11g. open system authentication The IEEE 802.11 default authentication method.
Access / One® Network PKCS (Public-Key Cryptography Standards) A group of specifications produced by RSA and secure systems developers, and first published in 1991. Among many other features and functions, the standards define syntax for digital certificates, certificate signing requests and key exchanges. PKI (Public-Key Infrastructure) Software that enables users of an insecure public network such as the Internet to exchange information securely and privately.
Access / One® Network PPTP (Point-to-Point Tunneling Protocol) A protocol from Microsoft that is used to create a virtual private network (VPN) over the Internet. It uses Microsoft's Pointto-Point Encryption (MPPE), which is based on RSA's RC4. It only uses static keys and should not be used to secure WLANs. See also, VPN. pre-master secret A key generated during the handshake process in Transport Layer Security (TLS) protocol negotiations and used to derive a master secret. See also, TLS.
Access / One® Network RADIUS (Remote Authentication Dial-In User Service) A client-server security protocol described in RFC 2865 and RFC 2866. Developed to authenticate, authorize, and account for dial-up users, RADIUS has been widely extended to broadband and enterprise networking. The RADIUS server stores user profiles, which include passwords and authorization attributes. See also, authentication and authorization. RC4 (River Cipher 4) A common encryption algorithm, designed by RSA.
Access / One® Network RSN (Robust Security Network) A secure wireless LAN (WLAN) based on the developing IEEE 802.11i standard. See also, 802.11i. shared secret A static key distributed by an out-of-band mechanism to both the sender and receiver. Also known as a shared key or pre-shared key (PSK), a shared secret is used as input to a one-way hash algorithm.
Access / One® Network SSID (Service Set Identifier) The unique name shared among all devices in a wireless LAN (WLAN). station In IEEE 802.11 networks, any device that contains an IEEE 802.11-compliant media access control and physical layers. See also, 802.11x. TKIP (Temporal Key Integrity Protocol) A wireless encryption protocol that fixes the known problems in the Wired-Equivalent Privacy (WEP) protocol for existing 802.11 products.
Access / One® Network Tunneling A technology that enables one network to send its data via another network's connections. Tunneling works by encapsulating a network protocol within packets carried by the second network. For example, Microsoft's PPTP technology enables organizations to use the Internet to transmit data across a Virtual Private Network (VPN). It does this by embedding its own network protocol within the TCP/IP packets carried by the Internet. See also, PPTP and VPN.
Access / One® Network VPN (Virtual Private Network) A virtual private network (VPN) is a way to use a public telecommunication infrastructure, such as the Internet, to provide remote offices or individual users with secure access to their organization's network. A VPN works by using the shared public infrastructure while maintaining privacy through security procedures and tunneling protocols such as the Layer Two Tunneling Protocol (L2TP).
Access / One® Network XML (eXtensible Markup Language) A simpler and easier-to-use subset of the Standard Generalized Markup Language (SGML), with unlimited, self-defining markup symbols (tags). Developed by the World Wide Web Consortium (W3C), the XML specification provides a flexible way to create common information formats and share both the format and the data on the Internet, Intranets, and elsewhere.
Access / One® Network Index Numerics 802.11a 93 802.11g 93 A about this user’s guide 1 access control list 103 accessone.bin 36 accessone_m.
Access / One® Network D data input 64 data rate 147, 148 data trust level 110 date and time 88, 143 daylight saving time 89 default gateway 78 deployment 8 details pane 38 device information 161 DHCP server 23 options 24 DNS server 79 DTIM 151 dual radio 18 dynamic operation 14 G general 73, 139 getting started 23 glossary of terms 181 GPS positioning 19 H hardware specifications 22 host network requirements 23 DHCP server 23 FTP server 23, 25 Internet browser 26 E I elevation 138 encryption 14, 17, 1
Access / One® Network lightning protection 18 load firmware 134 load firmware on network 68 logical mesh view 19 long distances 147 longitude 138 M Manage function 65, 132 Management Information Base 20 Manager/One 18 accessing for the first time 31 an overview 43 auto-discovered 63 choice of layouts 45 commands 60 details pane 56 exporting inventory 63 factory default 62 general layout 44 icon view 49 installing 27 intuitive mouse-over 18 inventory 63 launching 29 legends 61 list view 49 logical mesh view
Access / One® Network Wireless Client Query 119 mouse-over 18, 64 multi-version environment 35 N Network Connect 17, 106, 153 network management 15, 65, 73, 139 general 139 SNMP 140 network name 137 network scenarios metro 5 transportation 10 Network Server 14 network topology 79 node commands update network membership 129 update node names 128 notes 3 notices 6 European Community 6 Industry Canada 6 non-modification 6 RF exposure 6 VCCI 6 NTP setting up 33 Windows 2000 33 O IX operating environment 91,
Access / One® Network ping 30 PoE 20 power 147, 148 power settings 165 power supply 7 Power-over-Eternet 20 printing an inventory 114 prioritising traffic 15 priority assignment 169 Priority/One 20, 81, 142 product images 4 protection mode 95, 149 protection rate 150 protection type 150 R radio parameters 92, 145 radio statistics 157 RADIUS accounting 21, 84, 142 reboot 135 reboot network 68 rebooting 4 registry editor 33 remote management 20 remote network server 70 exclude 70 include 70 remote subnets 12
Access / One® Network reboot 127 subnet management 125 Super G 22 support 165, 169 symbols used in this guide 3 Syslog 85 syslog 21, 142 system 71, 136 network management 139 TCP/IP settings 141 user login 137 system and security 19 Ethernet segments 20 factory defaults 19 GPS positioning 19 inventory control 19 network server 20 PoE 20 Power-over-Ethernet 20 Priority/One 20 RADIUS accounting 21 remote management 20 syslog 21 system logging 21 system and securityzero configuration 21 system logging 21 T I
Access / One® Network W warnings 7, 3 antenna placement 8 battery 8 electrical power 7 general safety 7 grounding the unit 8 lightning activity 7 warranty 169 welcome 5 WEP 21 why choose Access/One Network 8 Wi-Fi 144 radio parameters 145 Windows 2000 33 wireless 22 channel coordination 22 channel list 22 client query 22 Super G 22 WLAN associations 22 wireless client monitor 159 wireless mode 146 wireless neighbors 158 Wireless Workgroups 17 WLAN associations 22 WPA 21 Z zero configuration 21 IX Index
Access / One® Network IX 204 Index