Smc-networks SMC2552W-G2-17 Bedienungsanleitung

Stöbern Sie online oder laden Sie Bedienungsanleitung nach Hardware Smc-networks SMC2552W-G2-17 herunter. SMC Networks SMC2552W-G2-17 User Manual Benutzerhandbuch

  • Herunterladen
  • Zu meinen Handbüchern hinzufügen
  • Drucken
  • Seite
    / 296
  • Inhaltsverzeichnis
  • FEHLERBEHEBUNG
  • LESEZEICHEN
  • Bewertet. / 5. Basierend auf Kundenbewertungen

Inhaltsverzeichnis

Seite 2 - 2.4GHz Wireless Access Point

COMPLIANCESviiVeuillez lire à fond l'information de la sécurité suivante avant d'installer le access point:AVERTISSEMENT: L’installation et

Seite 3 - Copyright

Radio Interface6-536CLI Commands for Radio Settings – From the global configuration mode, enter the interface wireless g command to access the 802.11g

Seite 4

System Configuration6-546Configuring VAP Radio SettingsTo configure VAP radio settings, select the Radio Settings page.Default VLAN ID – The VLAN ID a

Seite 5 - EC Conformance Declaration

Radio Interface6-556WPA2 PMKSA Life Time – WPA2 provides fast roaming for authenticated clients by retaining keys and other security settings in a cac

Seite 6

System Configuration6-566Rogue AP – A “rogue AP” is either an access point that is not authorized to participate in the wireless network, or an access

Seite 7

Radio Interface6-576rogue-ap scan command. To view the database of detected access points, use the show rogue-ap command from the Exec level.Configuri

Seite 8 - Safety Compliance

System Configuration6-586WMM Operation — WMM uses traffic priority based on the four ACs; Voice, Video, Best Effort, and Background. The higher the AC

Seite 9

Radio Interface6-596Figure 6-1. WMM Backoff Wait TimesFor high-priority traffic, the AIFSN and CW values are smaller. The smaller values equate to l

Seite 10 - OMPLIANCES

System Configuration6-606WMM – Sets the WMM operational mode on the access point. When enabled, the parameters for each AC queue will be employed on t

Seite 11 - COMPLIANCES

Radio Interface6-616CLI Commands for WMM – Enter interface wireless mode and type wmm required for clients that want to associate with the access poin

Seite 12

System Configuration6-626SecurityThe access point is configured by default as an “open system,” which broadcasts a beacon signal including the configu

Seite 13

COMPLIANCESviiiBitte unbedingt vor dem Einbauen des Access Point die folgenden Sicherheitsanweisungen durchlesen (Germany):WARNUNG: Die Installation u

Seite 14 - Table of Contents

Radio Interface6-636• Wi-Fi Protected Access (WPA or WPA2)page 6-73Both WEP and WPA security settings are configurable separately for each virtual acc

Seite 15

System Configuration6-646Note: You must enable data encryption through the web or CLI in order to enable all types of encryption (WEP, TKIP, or AES) i

Seite 16

Radio Interface6-656802.1x WPA only Interface Detail Settings:Authentication: WPAEncryption: EnableWPA Clients: RequiredCipher Suite: TKIP802.1x: Requ

Seite 17

System Configuration6-666Note: If you choose to configure RADIUS MAC authentication together with 802.1X, the RADIUS MAC address authentication occurs

Seite 18

Radio Interface6-676Before enabling the radio service for any VAP, first configure the WEP, WPA, and 802.1X security settings described in the followi

Seite 19

System Configuration6-686Enable – Enables radio communications on the VAP interface. (Default: Disabled)Note: You must first enable VAP interface 0 be

Seite 20

Radio Interface6-696• Alphanumeric: Enter keys as 5 alphanumeric characters for 64 bit keys, 13 alphanumeric characters for 128 bit keys, or 16 alphan

Seite 21 - Contents

System Configuration6-706Note: To use 802.1X on wireless clients requires a network card driver and 802.1X client software that supports the EAP authe

Seite 22 - Chapter 1: Introduction

Radio Interface6-716Enterprise AP(config)#interface wireless g 7-88Enter Wireless configuration commands, one per line.Enterprise AP(if-wireless g)#ke

Seite 23 - Antennas

System Configuration6-726----------------Security------------------------------------------------Closed System : DisabledMulticast c

Seite 24 - Component Description

COMPLIANCESixStromkabel. Dies muss von dem Land, in dem es benutzt wird geprüft werden: U.S.A und KanadaDer Cord muß das UL gepruft und war das CSA be

Seite 25 - Ethernet Port

Radio Interface6-736CLI Commands for WEP over 802.1X Security – Use the vap command to access each VAP interface to configure the security settings. F

Seite 26 - Features and Benefits

System Configuration6-746WPA Pre-Shared Key Mode (WPA-PSK, WPA2-PSK): For enterprise deployment, WPA requires a RADIUS authentication server to be con

Seite 27 - System Defaults

Radio Interface6-756the cipher used for broadcast frames is always TKIP. WEP encryption is not allowed.• Key Caching: WPA2 provides fast roaming for a

Seite 28

System Configuration6-766To configure WPA, click Security under Radio A or Radio G. Select one of the VAP interfaces by clicking More. Select one of t

Seite 29

Radio Interface6-776• WPA: Clients using WPA over 802.1X are accepted for authentication.• WPA-PSK: Clients using WPA with a Pre-shared Key are accept

Seite 30

System Configuration6-786CLI Commands for WPA Using Pre-shared Key Security – Be sure to first disable 802.1X port authentication using the 802.1X com

Seite 31

Radio Interface6-796CLI Commands for WPA Over 802.1X Security – First set 802.1X to required using the 802.1X command and set the 802.1X key refresh r

Seite 32

System Configuration6-806Open the Security page, and click More for one of the VAP interfaces.You can enable 802.1X as optionally supported or as requ

Seite 33 - Hardware Installation

Radio Interface6-816• 802.1X Reauthentication Refresh Rate: The time period after which a connected client must be re-authenticated. During the re-aut

Seite 34 - Chapter 3: External Antennas

System Configuration6-826Status InformationThe Status page includes information on the following items:Access Point StatusThe AP Status window display

Seite 36 - Installation Procedures

Status Information6-836AP System Configuration – The AP System Configuration table displays the basic system configuration settings:• System Up Time:

Seite 37

System Configuration6-846CLI Commands for Displaying System Settings – To view the current access point system settings, use the show system command f

Seite 38

Status Information6-856Station StatusThe Station Status window shows the wireless clients currently associated with the access point.The Station Confi

Seite 39 - Network Topologies

System Configuration6-866shared-key approach uses Wired Equivalent Privacy (WEP) to verify client identity by distributing a shared key to stations be

Seite 40 - Infrastructure Wireless LAN

Status Information6-876CLI Commands for Displaying Station Status – To view status of clients currently associated with the access point, use the show

Seite 41 - Network Configuration

System Configuration6-886Event LogsThe Event Logs window shows the log messages generated by the access point and stored in memory.The Event Logs tabl

Seite 42

Status Information6-896CLI Commands for Displaying Event Logs – To view the access point log entries, use the show event-log command from the Exec mod

Seite 43

System Configuration6-906

Seite 44 - Required Connections

7-1Chapter 7: Command Line InterfaceUsing the Command Line InterfaceAccessing the CLIWhen accessing the management interface for the over a direct con

Seite 45 - Initial Configuration Steps

Command Line Interface7-27If your corporate network is connected to another network outside your office or to the Internet, you need to apply for a re

Seite 46 - Logging In

xiTable of ContentsChapter 1: Introduction 1-1Package Checklist 1-2Hardware Description 1-2Component Description 1-3Features and Benefits 1-5Syst

Seite 47 - Initial Configuration

Entering Commands7-37Command CompletionIf you terminate input with a Tab key, the CLI will print the remaining characters of a partial keyword up to t

Seite 48

Command Line Interface7-47Partial Keyword LookupIf you terminate a partial keyword with a question mark, alternatives that match the initial letters a

Seite 49 - Advanced Configuration

Entering Commands7-57Exec CommandsWhen you open a new console session on an access point, the system enters Exec command mode. Only a limited number o

Seite 50 - System Identification

Command Line Interface7-67Command Line ProcessingCommands are not case sensitive. You can abbreviate commands and parameters as long as they contain e

Seite 51

General Commands7-77The access mode shown in the following tables is indicated by these abbreviations: Exec (Executive Mode), GC (Global Configuration

Seite 52 - TCP / IP Settings

Command Line Interface7-87configureThis command activates Global Configuration mode. You must enter this mode to modify most of the settings on the ac

Seite 53

General Commands7-97Example This example shows how to return to the Exec mode from the Interface Configuration mode, and then quit the CLI session:pin

Seite 54

Command Line Interface7-107resetThis command restarts the system or restores the factory default settings.Syntax reset <board | configuration> •

Seite 55

System Management Commands7-117show lineThis command displays the console port’s configuration settings.Command Mode ExecExampleThe console port setti

Seite 56

Command Line Interface7-127countryThis command configures the access point’s country code, which identifies the country of operation and sets the auth

Seite 57

xiiContentsVLAN 6-19WDS Settings 6-21AP Management 6-27Administration 6-28System Log 6-32SNMP 6-36Configuring SNMP and Trap Message Parameters 6-3

Seite 58 - SSH Settings

System Management Commands7-137Default Setting US - for units sold in the United States99 (no country set) - for units sold in other countriesCommand

Seite 59 - Authentication

Command Line Interface7-147Command Usage• If you purchased an access point outside of the United States, the country code must be set before radio fun

Seite 60

System Management Commands7-157Command Mode Global ConfigurationExample usernameThis command configures the user name for management access.Syntax use

Seite 61

Command Line Interface7-167ip ssh-server enable This command enables the Secure Shell server. Use the no form to disable the server.Syntax ip ssh-serv

Seite 62

System Management Commands7-177ip telnet-server enable This command enables the Telnet server. Use the no form to disable the server.Syntax ip telnet-

Seite 63

Command Line Interface7-187ip http serverThis command allows this device to be monitored or configured from a browser. Use the no form to disable this

Seite 64 - Filter Control

System Management Commands7-197Example ip https serverUse this command to enable the secure hypertext transfer protocol (HTTPS) over the Secure Socket

Seite 65

Command Line Interface7-207web-redirectUse this command to enable web-based authentication of clients. Use the no form to disable this function.Syntax

Seite 66

System Management Commands7-217APmgmtIPThis command specifies the client IP addresses that are allowed management access to the access point through v

Seite 67

Command Line Interface7-227APmgmtUIThis command enables and disables management access to the access point through SNMP, Telnet and web interfaces.Cau

Seite 68 - WDS Settings

xiiiContentscountry 7-12prompt 7-14system name 7-14username 7-15password 7-15ip ssh-server enable 7-16ip ssh-server port 7-16ip telnet-server enabl

Seite 69

System Management Commands7-237show systemThis command displays basic system configuration settings.Default SettingNoneCommand Mode ExecExampleEnterpr

Seite 70

Command Line Interface7-247show versionThis command displays the software version for the system.Command Mode ExecExample show configThis command disp

Seite 71

System Management Commands7-257Hardware Version Information===========================================Hardware version R01A===========================

Seite 72

Command Line Interface7-267Logging Information=====================================================Syslog State : DisabledLogging Consol

Seite 73

System Management Commands7-277 dot11InterfaceAGFail Enabled dot11InterfaceBFail Enabled dot11StationAssociation Enabled dot11Sta

Seite 74 - AP Management

Command Line Interface7-287show hardwareThis command displays the hardware version of the system.Command Mode ExecExample System Logging CommandsThese

Seite 75 - Administration

System Logging Commands7-297logging onThis command controls logging of error messages; i.e., sending debug or error messages to memory. The no form di

Seite 76 - Upgrading Firmware

Command Line Interface7-307Example logging consoleThis command initiates logging of error messages to the console. Use the no form to disable logging

Seite 77

System Logging Commands7-317Command Usage Messages sent include the selected level down to Emergency level.Example logging facility-typeThis command s

Seite 78

Command Line Interface7-327Command Usage The command specifies the facility type tag sent in syslog messages. (See RFC 3164.) This type has no effect

Seite 79 - System Log

xivContentssnmp-server host 7-43snmp-server trap 7-44snmp-server engine-id 7-46snmp-server user 7-46snmp-server targets 7-48snmp-server filter

Seite 80

System Clock Commands7-337show event-logThis command displays log messages stored in the access point’s memory.Syntaxshow event-logCommand Mode ExecEx

Seite 81 - Configuring SNTP

Command Line Interface7-347sntp-server ipThis command sets the IP address of the servers to which SNTP time requests are issued. Use the this command

Seite 82

System Clock Commands7-357Command Mode Global ConfigurationCommand Usage The time acquired from time servers is used to record accurate dates and time

Seite 83

Command Line Interface7-367sntp-server daylight-savingThis command sets the start and end dates for daylight savings time. Use the no form to disable

Seite 84

System Clock Commands7-377Command Usage This command sets the local time zone relative to the Coordinated Universal Time (UTC, formerly Greenwich Mean

Seite 85

Command Line Interface7-387DHCP Relay CommandsDynamic Host Configuration Protocol (DHCP) can dynamically allocate an IP address and other configuratio

Seite 86

DHCP Relay Commands7-397dhcp-relayThis command configures the primary and secondary DHCP server addresses.Syntaxdhcp-relay <primary | secondary>

Seite 87

Command Line Interface7-407SNMP CommandsControls access to this access point from management stations using the Simple Network Management Protocol (SN

Seite 88

SNMP Commands7-417snmp-server communityThis command defines the community access string for the Simple Network Management Protocol. Use the no form to

Seite 89 - Configuring SNMPv3 Users

Command Line Interface7-427Command Mode Global ConfigurationExample Related Commandssnmp-server location (7-43)snmp-server locationThis command sets t

Seite 90

xvContentsFiltering Commands 7-73filter local-bridge 7-73filter ap-manage 7-74filter uplink enable 7-74filter uplink 7-75filter ethernet-type ena

Seite 91

SNMP Commands7-437Command Mode Global ConfigurationCommand Usage • This command enables both authentication failure notifications and link-up-down not

Seite 92

Command Line Interface7-447Command Usage The snmp-server host command is used in conjunction with the snmp-server enable server command to enable SNMP

Seite 93 - Configuring SNMPv3 Targets

SNMP Commands7-457- dot1xAuthFail - A 802.1X client station has failed RADIUS authentication.- dot1xSuppAuthenticated - A supplicant station has been

Seite 94

Command Line Interface7-467snmp-server engine-idThis command is used for SNMP v3. It is used to uniquely identify the access point among all access po

Seite 95

SNMP Commands7-477• The SNMP engine ID is used to compute the authentication/privacy digests from the pass phrase. You should therefore configure the

Seite 96

Command Line Interface7-487Example snmp-server targetsThis command configures SNMP v3 notification targets. Use the no form to delete an SNMP v3 targe

Seite 97

SNMP Commands7-497snmp-server filterThis command configures SNMP v3 notification filters. Use the no form to delete an SNMP v3 filter or remove a subt

Seite 98

Command Line Interface7-507snmp-server filter-assignmentsThis command assigns SNMP v3 notification filters to targets. Use the no form to remove an SN

Seite 99

SNMP Commands7-517Example show snmp usersThis command displays the SNMP v3 users and settings.Syntax show snmp usersCommand ModeExecExample show snmp

Seite 100 - Radio Interface

Command Line Interface7-527Example show snmp targetThis command displays the SNMP v3 notification target settings.Syntaxshow snmp targetCommand Mode E

Seite 101 - System Configuration

xviContentsbeacon-interval 7-101dtim-period 7-102fragmentation-length 7-102rts-threshold 7-103super-g 7-104description 7-104ssid 7-105closed-system 7-

Seite 102

SNMP Commands7-537show snmp filter-assignmentsThis command displays the SNMP v3 notification filter assignments.Syntaxshow snmp filter-assignmentsComm

Seite 103

Command Line Interface7-547show snmpThis command displays the SNMP configuration settings.Command Mode ExecExampleEnterprise AP#show snmpSNMP Informat

Seite 104 - Configuring Wi-Fi Multimedia

Flash/File Commands7-557Flash/File CommandsThese commands are used to manage the system code or configuration files.bootfileThis command specifies the

Seite 105

Command Line Interface7-567copy This command copies a boot file, code image, or configuration file between the access point’s flash memory and a FTP/T

Seite 106

Flash/File Commands7-577The following example shows how to download a configuration file: deleteThis command deletes a file or image.Syntaxdelete <

Seite 107

Command Line Interface7-587dirThis command displays a list of files in flash memory.Command Mode ExecCommand Usage File information is shown below:Exa

Seite 108

RADIUS Client7-597RADIUS ClientRemote Authentication Dial-in User Service (RADIUS) is a logon authentication protocol that uses software running on a

Seite 109 - Security

Command Line Interface7-607Command Mode Global ConfigurationExample radius-server portThis command sets the RADIUS server network port. Syntaxradius-s

Seite 110

RADIUS Client7-617radius-server retransmitThis command sets the number of retries. Syntaxradius-server [secondary] retransmit number_of_retries• secon

Seite 111

Command Line Interface7-627radius-server port-accountingThis command sets the RADIUS Accounting server network port. Syntaxradius-server [secondary] p

Seite 112

38 TeslaIrvine, CA 92618Phone: (949) 679-8000EliteConnect™ SMC2552W-G2 2.4GHz Wireless Access PointThe easy way to make all your network connectionsMa

Seite 113 - Enabling the VAPs

xviiContentswmm 7-131wmm-acknowledge-policy 7-131wmmparam 7-132Appendix A: Troubleshooting A-1Appendix B: Cables and Pinouts B-1Twisted-Pair Cable A

Seite 114

RADIUS Client7-637Example radius-server radius-mac-formatThis command sets the format for specifying MAC addresses on the RADIUS server.Syntaxradius-s

Seite 115

Command Line Interface7-647show radiusThis command displays the current settings for the RADIUS server.Default SettingNoneCommand Mode ExecExample Ent

Seite 116

802.1X Authentication7-657802.1X AuthenticationThe access point supports IEEE 802.1X access control for wireless clients. This control feature prevent

Seite 117

Command Line Interface7-667Command ModeGlobal ConfigurationCommand Usage• When 802.1X is disabled, the access point does not support 802.1X authentica

Seite 118

802.1X Authentication7-677command specifies the interval after which unicast session keys are changed.• Dynamic broadcast key rotation allows the acce

Seite 119

Command Line Interface7-687Command ModeGlobal ConfigurationExample802.1x-supplicant enableThis command enables the access point to operate as an 802.1

Seite 120 - Wi-Fi Protected Access (WPA)

802.1X Authentication7-697Command ModeGlobal ConfigurationCommand UsageThe access point currently only supports EAP-MD5 CHAP for 802.1X supplicant aut

Seite 121

Command Line Interface7-707MAC Address Authentication Use these commands to define MAC authentication on the access point. For local MAC authenticatio

Seite 122

MAC Address Authentication7-717Related Commandsaddress filter entry (7-72)802.1x-supplicant user (7-69)address filter entryThis command enters a MAC a

Seite 123

Command Line Interface7-727Command ModeGlobal ConfigurationExampleRelated Commands802.1x-supplicant user (7-69)mac-authentication serverThis command s

Seite 124

xviiiContents

Seite 125

Filtering Commands7-737Default0 (disabled)Command ModeGlobal ConfigurationExampleFiltering CommandsThe commands described in this section are used to

Seite 126 - Configuring 802.1X

Command Line Interface7-747Global ConfigurationCommand UsageThis command can disable wireless-to-wireless communications between clients via the acces

Seite 127

Filtering Commands7-757filter uplinkThis command adds or deletes MAC addresses from the uplink filtering table.Syntaxfilter uplink <add | delete>

Seite 128

Command Line Interface7-767ExampleRelated Commandsfilter ethernet-type protocol (7-77)filter ethernet-type protocolThis command sets a filter for a sp

Seite 129 - Status Information

WDS Bridge Commands7-777show filtersThis command shows the filter options and protocol entries in the filter table. Command ModeExecExampleWDS Bridge

Seite 130

Command Line Interface7-787bridge role (WDS)This command selects the bridge operation mode for the radio interface.Syntaxbridge role <ap | repeater

Seite 131

WDS Bridge Commands7-797Default Setting NoneCommand Mode Interface Configuration (Wireless)Command Usage Every bridge (except the root bridge) in the

Seite 132 - Station Status

Command Line Interface7-807bridge dynamic-entry age-timeThis command sets the time for aging out dynamic entries in the WDS forwarding table.Syntaxbri

Seite 133

WDS Bridge Commands7-817show bridge filter-entryThis command displays current entries in the WDS forwarding table.Command Mode ExecExample show bridge

Seite 134

Command Line Interface7-827Example Enterprise AP#show bridge link wireless aInterface Wireless A WDS Information====================================AP

Seite 135 - Event Logs

1-1Chapter 1: IntroductionThe 2.4 GHz Wireless Access Point is an IEEE 802.11b/g access point that provides transparent, wireless high-speed data comm

Seite 136

Spanning Tree Commands7-837Spanning Tree CommandsThe commands described in this section are used to set the MAC address table aging time and spanning

Seite 137

Command Line Interface7-847bridge stp forwarding-delayUse this command to configure the spanning tree bridge forward time globally for the wireless br

Seite 138 - Command Line Interface

Spanning Tree Commands7-857Example bridge stp max-ageUse this command to configure the spanning tree bridge maximum age globally for the wireless brid

Seite 139 - Entering Commands

Command Line Interface7-867Command Mode Global ConfigurationCommand Usage Bridge priority is used in selecting the root device, root port, and designa

Seite 140 - Showing Commands

Spanning Tree Commands7-877Default Setting 128Command Mode Interface ConfigurationCommand Usage • This command defines the priority for the use of a p

Seite 141 - Enterprise AP#show s

Command Line Interface7-887Ethernet Interface Commands The commands described in this section configure connection parameters for the Ethernet port an

Seite 142 - Configuration Commands

Ethernet Interface Commands7-897dns serverThis command specifies the address for the primary or secondary domain name server to be used for name-to-ad

Seite 143 - Command Groups

Command Line Interface7-907Command Mode Interface Configuration (Ethernet)Command Usage • DHCP is enabled by default. To manually configure a new IP a

Seite 144 - General Commands

Ethernet Interface Commands7-917• When you use this command, the access point will begin broadcasting DHCP client requests. The current IP address (i.

Seite 145

Command Line Interface7-927shutdown This command disables the Ethernet interface. To restart a disabled interface, use the no form.Syntax shutdownno s

Seite 146

Introduction1-21Package ChecklistThe 2.4 GHz Wireless Access Point package includes:• One 2.4 GHz Wireless Access Point • One Category 5 network cab

Seite 147

Wireless Interface Commands7-937Example Wireless Interface CommandsThe commands described in this section configure connection parameters for the wire

Seite 148 - System Management Commands

Command Line Interface7-947beacon-interval Configures the rate at which beacon signals are transmitted from the access pointIC-W 7-102dtim-period Conf

Seite 149

Wireless Interface Commands7-957interface wirelessThis command enters wireless interface configuration mode.Syntaxinterface wireless <g>• g - 80

Seite 150

Command Line Interface7-967speedThis command configures the maximum data rate at which the access point transmits unicast packets. Syntaxspeed <spe

Seite 151

Wireless Interface Commands7-977channelThis command configures the radio channel through which the access point communicates with wireless clients. Sy

Seite 152

Command Line Interface7-987Default Setting fullCommand Mode Interface Configuration (Wireless)Command Usage • The “min” keyword indicates minimum powe

Seite 153

Wireless Interface Commands7-997ExamplepreambleThis command sets the length of the signal preamble that is used at the start of a 802.11b/g data trans

Seite 154

Command Line Interface7-1007to the access point LEDs). Select this method when using an optional external antenna that is connected to the right anten

Seite 155

Wireless Interface Commands7-1017Example antenna locationThis command selects the antenna mounting location for the radio interface.Syntaxantenna loca

Seite 156

Command Line Interface7-1027The beacon signals allow wireless clients to maintain contact with the access point. They may also carry power-management

Seite 157

Hardware Description1-31Rear PanelComponent DescriptionAntennasThe access point includes integrated diversity antennas for wireless communications. A

Seite 158 - APmgmtIP

Wireless Interface Commands7-1037Syntaxfragmentation-length <length>length - Minimum packet size for which fragmentation is allowed. (Range: 256

Seite 159 - APmgmtUI

Command Line Interface7-1047to 2347, the access point never sends RTS signals. If set to any other value, and the packet size equals or exceeds the RT

Seite 160

Wireless Interface Commands7-1057Default Setting NoneCommand Mode Interface Configuration (Wireless-VAP)ExamplessidThis command configures the service

Seite 161

Command Line Interface7-1067Command Usage When closed system is enabled, the access point will not include its SSID in beacon messages. Nor will it re

Seite 162

Wireless Interface Commands7-1077Command Mode Interface Configuration (Wireless-VAP)Exampleauth-timeout-valueThis command configures the time interval

Seite 163

Command Line Interface7-1087Example show interface wirelessThis command displays the status for the wireless interface.Syntaxshow interface wireless &

Seite 164

Rogue AP Detection Commands7-1097show stationThis command shows the wireless clients associated with the access point.Command Mode ExecExample Rogue A

Seite 165 - System Logging Commands

Command Line Interface7-1107rogue-ap enableThis command enables the periodic detection of nearby access points. Use the no form to disable periodic de

Seite 166

Rogue AP Detection Commands7-1117Example rogue-ap authenticateThis command forces the unit to authenticate all access points on the network. Use the n

Seite 167

Command Line Interface7-1127Default Setting350 millisecondsCommand Mode Interface Configuration (Wireless)Command Usage • During a scan, client access

Seite 168

Introduction1-41Security SlotThe access point includes a Kensington security slot on the rear panel. You can prevent unauthorized removal of the acces

Seite 169

Rogue AP Detection Commands7-1137rogue-ap scanThis command starts an immediate scan for access points on the radio interface.Default SettingDisabledCo

Seite 170 - System Clock Commands

Command Line Interface7-1147Wireless Security CommandsThe commands described in this section configure parameters for wireless security on the 802.11g

Seite 171

Wireless Security Commands7-1157• wpa2-psk - Clients using WPA2 with a Pre-shared Key are accepted for authentication.• wpa-wpa2-mixed - Clients using

Seite 172

Command Line Interface7-1167association request to the access point. For mixed-mode operation, the cipher used for broadcast frames is always TKIP. WE

Seite 173

Wireless Security Commands7-1177ExampleRelated Commandskey (7-118)key This command sets the keys used for WEP encryption. Use the no form to delete a

Seite 174

Command Line Interface7-1187match those configured in the clients.ExampleRelated Commandskey (7-118)encryption (7-117)transmit-key (7-119)transmit-key

Seite 175 - DHCP Relay Commands

Wireless Security Commands7-1197cipher-suite This command defines the cipher algorithm used to encrypt the global key for broadcast and multicast traf

Seite 176

Command Line Interface7-1207• AES-CCMP (Advanced Encryption Standard Counter-Mode/CBCMAC Protocol): WPA2 is backward compatible with WPA, including th

Seite 177 - SNMP Commands

Wireless Security Commands7-1217Example wpa-pre-shared-key This command defines a Wi-Fi Protected Access (WPA/WPA2) preshared-key.Syntaxwpa-pre-shared

Seite 178

Command Line Interface7-1227Command Mode Interface Configuration (Wireless-VAP)Command Usage • WPA2 provides fast roaming for authenticated clients by

Seite 179

Features and Benefits1-51Reset ButtonThis button is used to reset the access point or restore the factory default configuration. If you hold down the

Seite 180

Link Integrity Commands7-1237known to be already authenticated, so it proceeds directly to key exchange and association.• To support pre-authenticatio

Seite 181

Command Line Interface7-1247link-integrity ping-detectThis command enables link integrity detection. Use the no form to disable link integrity detecti

Seite 182

Link Integrity Commands7-1257link-integrity ping-intervalThis command configures the time between each Ping sent to the link host. Syntaxlink-integrit

Seite 183

Command Line Interface7-1267Command Mode Global ConfigurationExample show link-integrityThis command displays the current link integrity configuration

Seite 184

IAPP Commands7-1277IAPP CommandsThe command described in this section enables the protocol signaling required to ensure the successful handover of wir

Seite 185

Command Line Interface7-1287VLAN CommandsThe access point can enable the support of VLAN-tagged traffic passing between wireless clients and the wired

Seite 186

VLAN Commands7-1297• Traffic entering the Ethernet port must be tagged with a VLAN ID that matches the access point’s native VLAN ID, or with a VLAN t

Seite 187

Command Line Interface7-1307Default Setting 1Command Mode Interface Configuration (Wireless-VAP)Command Usage • To implement the default VLAN ID setti

Seite 188

WMM Commands7-1317wmmThis command sets the WMM operational mode on the access point. Use the no form to disable WMM.Syntax[no] wmm <supported | req

Seite 189

Command Line Interface7-1327interpretability with other wired network QoS policies. While the four ACs are specified for specific types of traffic, WM

Seite 190

Introduction1-61System DefaultsThe following table lists some of the access point’s basic system defaults. To reset the access point defaults, use the

Seite 191

WMM Commands7-1337• admission_control - The admission control mode for the access category. When enabled, clients are blocked from using the access ca

Seite 192 - Flash/File Commands

Command Line Interface7-1347

Seite 193

A-1Appendix A: TroubleshootingCheck the following items before you contact local Technical Support.1. If wireless clients cannot access the network, c

Seite 194

TroubleshootingA-2A3. If you cannot access the on-board configuration program via a serial port connection:• Be sure you have set the terminal emulato

Seite 195

B-1Appendix B: Cables and PinoutsTwisted-Pair Cable Assignments For 10/100BASE-TX connections, a twisted-pair cable must have two pairs of wires. Each

Seite 196 - RADIUS Client

Cables and PinoutsB-2BStraight-Through WiringBecause the 10/100 Mbps port on the access point uses an MDI pin configuration, you must use “straight-th

Seite 197

Console Port Pin AssignmentsB-3BCrossover WiringBecause the 10/100 Mbps port on the access point uses an MDI pin configuration, you must use “crossove

Seite 198

Cables and PinoutsB-4BWiring Map for Serial Cable Table B-2. Wiring Map for Serial CableDB9 Male (AP Console) DB9 Male (PC DTE)Pin Function Pin Func

Seite 199

C-1Appendix C: SpecificationsGeneral SpecificationsMaximum Channels802.11g:US & Canada: 13 (normal mode), 5 (turbo mode)Japan: 4 (normal mode), 1

Seite 200

SpecificationsC-2CAC Power AdapterInput: 100-240 AC, 50-60 HzOutput: 5.1 VDC, 3APower consumption: 13.2 wattsUnit Power SupplyDC Input: 5 VDC, 2 A max

Seite 201

System Defaults1-71MAC Authentication MAC DisabledAuthentication Session Timeout 0 minutes (disabled)Local MAC System Default AllowedLocal MAC Permiss

Seite 202 - 802.1X Authentication

General SpecificationsC-3CMPT RCR std.33 (D33 1~13 Channel, T66 Channel 14)SafetycCSAus(CSA 22.2 No. 60950-1 & UL60950-1)EN60950-1 (TÜV/GS), IEC60

Seite 203

SpecificationsC-4CSensitivityTransmit Power IEEE 802.11gData Rate Sensitivity (dBm) 6 Mbps -889 Mbps -8712 Mbps -8617 Mbps -8524 Mbps -8136 Mbps -7748

Seite 204 - 802.1x session-timeout

Transmit PowerC-5CIEEE 802.11b Maximum Output Power (GHz - dBm)Data Rate 2.412 2.417~2.467 2.4721 Mbps 15 16 152 Mbps 15 16 155.5 Mbps 15 16 1511 Mbp

Seite 205 - 802.1x-supplicant user

SpecificationsC-6COperating RangeImportant NoticeMaximum distances posted below are actual tested distance thresholds. However, there are many variabl

Seite 206

Glossary-1Glossary10BASE-TIEEE 802.3 specification for 10 Mbps Ethernet over two pairs of Category 3 or better UTP cable.100BASE-TXIEEE 802.3u specifi

Seite 207 - MAC Address Authentication

Glossary-2GlossaryBroadcast KeyBroadcast keys are sent to stations using 802.1X dynamic keying. Dynamic broadcast key rotation is often used to allow

Seite 208

Glossary-3GlossaryIEEE 802.11gA wireless standard that supports wireless communications in the 2.4 GHz band using using Orthogonal Frequency Division

Seite 209

Glossary-4GlossaryRADIUSA logon authentication protocol that uses software running on a central server to control access to the network.RoamingA wirel

Seite 210 - Filtering Commands

Glossary-5GlossaryVirtual Access Point (VAP)Virtual AP technology multiplies the number of Access Points present within the RF footprint of a single p

Seite 211

Glossary-6Glossary

Seite 212

Introduction1-81System Logging Syslog DisabledLogging Host DisabledLogging Console DisabledIP Address / Host Name 0.0.0.0Logging Level InformationalLo

Seite 213

Index-1Numerics802.11g 7-95AAES 6-75antennas, positioning 2-2authentication 6-12, 7-114cipher suite 6-78, 7-115closed system 7-106configuring 6-12, 7-

Seite 214 - WDS Bridge Commands

IndexIndex-2filter 6-17, 7-70address 6-12, 7-70between wireless clients 6-17, 7-73local bridge 6-17, 7-73local or remote 6-12, 7-72management access 6

Seite 215

IndexIndex-3PoE 1-4specifications C-2port prioritySTA 7-86power connection 2-2Power over Ethernet See PoEpower supply, specifications C-2PSK 6-75Rrad

Seite 216

IndexIndex-4VVLANconfiguration 6-54, 7-128native ID 6-54WWEP 6-69configuring 6-69shared key 6-70, 7-117Wi-Fi Multimedia See WMMWi-Fi Protected Access

Seite 218

Model Number: SMC2552W-G2-17Pub. Number: 150000030500EE052006-DT-R01

Seite 219

38 TeslaIrvine, CA 92618Phone: (949) 679-8000TECHNICAL SUPPORTFrom U.S.A. and Canada (24 hours a day, 7 days a week)(800) SMC-4-YOUPhn: (949) 679-8000

Seite 220 - Spanning Tree Commands

CopyrightInformation furnished by SMC Networks, Inc. (SMC) is believed to be accurate and reliable. However, no responsibility is assumed by SMC for i

Seite 221

System Defaults1-91Wireless Interface 802.11b/g (contd.)Antenna ID 0x0000Antenna Location IndoorWireless Security 802.11b/gAuthentication Type Open Sy

Seite 222

Introduction1-101

Seite 223

2-1Chapter 2: Hardware Installation1. Select a Site – Choose a proper place for the access point. In general, the best location is at the center of yo

Seite 224

Hardware Installation2-223. Connect the Power Cord – Connect the power adapter to the access point, and the power cord to an AC power outlet. Otherwis

Seite 225 - Ethernet Interface Commands

3-1Chapter 3: External AntennasThe SMC2552W-G2 provides a variety of external antenna options for extending the radio range and shaping the coverge ar

Seite 226

External Antennas3-23• Omnidirectional Antennas - Consider these factors when selecting a location for these antennas:• Always mount the antenna in

Seite 227

Installation Procedures3-33To connect pigtail cables to the access point, follow these steps:1. Disable the access point radio using the web browser i

Seite 228

External Antennas3-435. Reconnect power to the access point.Note: Before enabling the radio with an external antenna attached, be sure to first config

Seite 229

4-1Chapter 4: Network Configuration Wireless networks support a stand-alone configuration as well as an integrated configuration with 10/100 Mbps Ethe

Seite 230 - Wireless Interface Commands

Network Configuration4-24Network TopologiesAd Hoc Wireless LAN (no Access Point)An ad hoc wireless LAN consists of a group of computers, each equipped

Seite 231

iCOMPLIANCESFederal Communication Commission Interference StatementThis equipment has been tested and found to comply with the limits for a Class B di

Seite 232

Network Topologies4-34Infrastructure Wireless LANThe access point also provides access to a wired LAN for wireless workstations. An integrated wired/w

Seite 233

Network Configuration4-44Infrastructure Wireless LAN for Roaming Wireless PCsThe Basic Service Set (BSS) defines the communications domain for each ac

Seite 234

Network Topologies4-54Infrastructure Wireless BridgeThe IEEE 802.11 standard defines a WIreless Distribution System (WDS) for bridge connections betwe

Seite 235

Network Configuration4-64Infrastructure Wireless RepeaterThe access point can also operate in a bridge “repeater” mode to extend the range of links to

Seite 236

5-1Chapter 5: Initial ConfigurationThe 2.4 GHz Wireless Access Point offers a variety of management options, including a web-based interface, a direc

Seite 237

Initial Configuration5-25Note: When using HyperTerminal with Microsoft® Windows® 2000, make sure that you have Windows 2000 Service Pack 2 or later in

Seite 238

Logging In5-35After configuring the access point’s IP parameters, you can access the management interface from anywhere within the attached network. T

Seite 239

Initial Configuration5-45The home page displays the Main Menu.

Seite 240

6-1Chapter 6: System ConfigurationBefore continuing with advanced configuration, first complete the initial configuration steps described in Chapter 4

Seite 241

System Configuration6-26Advanced ConfigurationThe Advanced Configuration pages include the following options.Table 6-2. MenuMenu Description PageSys

Seite 242

COMPLIANCESiiaux appareils numériques de Classe B prescrites dans la norme sur le matérial brouilleur: “Appareils Numériques,” NMB-003 édictée par l’I

Seite 243

Advanced Configuration6-36System IdentificationThe system name for the access point can be left at its default setting. However, modifying this parame

Seite 244

System Configuration6-46CLI Commands for System Identification – Enter the global configuration mode, and use the system name command to specify a new

Seite 245

Advanced Configuration6-56TCP / IP SettingsConfiguring the access point with an IP address expands your ability to manage the access point. A number o

Seite 246 - Rogue AP Detection Commands

System Configuration6-66• Subnet Mask: The mask that identifies the host address bits used for routing to specific subnets.• Default Gateway: The defa

Seite 247

Advanced Configuration6-76RADIUSRemote Authentication Dial-in User Service (RADIUS) is an authentication protocol that uses software running on a cent

Seite 248

System Configuration6-86

Seite 249

Advanced Configuration6-96MAC Address Format – MAC addresses can be specified in one of four formats, using no delimeter, with a single dash delimeter

Seite 250

System Configuration6-106CLI Commands for RADIUS – From the global configuration mode, use the radius-server address command to specify the address of

Seite 251 - Wireless Security Commands

Advanced Configuration6-116SSH SettingsTelnet is a remote management tool that can be used to configure the access point from anywhere in the network.

Seite 252

System Configuration6-126CLI Commands for SSH – To enable the SSH server, use the ip ssh-server enable command from the CLI Ethernet interface configu

Seite 253

COMPLIANCESiii• This device will automatically limit the allowable channels determined by the current country of operation. Incorrectly entering the c

Seite 254

Advanced Configuration6-136MAC Authentication – You can configure a list of the MAC addresses for wireless clients that are authorized to access the n

Seite 255

System Configuration6-146802.1X Supplicant – The access point can also operate in a 802.1X supplicant mode. This enables the access point itself to be

Seite 256

Advanced Configuration6-156CLI Commands for Local MAC Authentication – Use the mac-authentication server command from the global configuration mode to

Seite 257

System Configuration6-166CLI Commands for RADIUS MAC Authentication – Use the mac-authentication server command from the global configuration mode to

Seite 258

Advanced Configuration6-176Filter ControlThe access point can employ network traffic frame filtering to control access to network resources and increa

Seite 259

System Configuration6-186• MAC Address: Specifies a MAC address to filter, in the form xx-xx-xx-xx-xx-xx.• Permission: Adds or deletes a MAC address f

Seite 260 - Link Integrity Commands

Advanced Configuration6-196VLANThe access point can employ VLAN tagging support to control access to network resources and increase security. VLANs se

Seite 261

System Configuration6-206When setting up VLAN IDs for each user on the RADIUS server, be sure to use the RADIUS attributes and values as indicated in

Seite 262

Advanced Configuration6-216WDS SettingsEach access point radio interface can be configured to operate in a bridge or repeater mode, which allows it to

Seite 263

System Configuration6-226• Bridge: Operates as a bridge to other access points. The “Parent” link to the root bridge must be configured. Up to five ot

Seite 264 - IAPP Commands

COMPLIANCESivDeclaration of Conformity in Languages of the EuropeanCommunityEnglish Hereby, SMC, declares that this Radio LAN device is in compliance

Seite 265 - VLAN Commands

Advanced Configuration6-236Spanning Tree Protocol – STP uses a distributed algorithm to select a bridging device (STP-compliant switch, bridge or rout

Seite 266

System Configuration6-246designated ports. After determining the lowest cost spanning tree, it enables all root ports and designated ports, and disabl

Seite 267 - WMM Commands

Advanced Configuration6-256• Link Path Cost – This parameter is used by the STP to determine the best path between devices. Therefore, lower values sh

Seite 268

System Configuration6-266CLI Commands for STP Settings – If the role of a radio interface is set to Repeater, Bridge or Root Bridge, STP can be enable

Seite 269

Advanced Configuration6-276AP ManagementThe Web, Telnet, and SNMP management interfaces are enabled and open to all IP addresses by default. To provid

Seite 270

System Configuration6-286CLI Commands for AP Management features.AdministrationChanging the PasswordManagement access to the web and CLI interface on

Seite 271

Advanced Configuration6-296Upgrading FirmwareYou can upgrade new access point software from a local file on the management workstation, or from an FTP

Seite 272 - Appendix A: Troubleshooting

System Configuration6-306Before upgrading new software, verify that the access point is connected to the network and has been configured with a compat

Seite 273 - Troubleshooting

Advanced Configuration6-316CLI Commands for Downloading Software from a TFTP Server – Use the copy tftp file command from the Exec mode and then speci

Seite 274 - 10/100BASE-TX Pin Assignments

System Configuration6-326System Log The access point can be configured to send event and error messages to a System Log Server. The system clock can a

Seite 275 - Straight-Through Wiring

COMPLIANCESvSafety CompliancePower Cord SafetyPlease read the following safety information carefully before installing the access point:WARNING: Insta

Seite 276 - Crossover Wiring

Advanced Configuration6-336Logging Level – Sets the minimum severity level for event logging. (Default: Informational)The system allows you to limit t

Seite 277 - Wiring Map for Serial Cable

System Configuration6-346CLI Commands for System Logging – To enable logging on the access point, use the logging on command from the global configura

Seite 278 - Appendix C: Specifications

Advanced Configuration6-356Note: The access point also allows you to disable SNTP and set the system clock manually. Set Time Zone – SNTP uses Coordin

Seite 279 - °C (32 to 158 °F)

System Configuration6-366CLI Commands for the System Clock – The following example shows how to manually set the system time when SNTP server support

Seite 280 - General Specifications

SNMP6-376Configuring SNMP and Trap Message ParametersThe access point SNMP agent must be enabled to function (for versions 1, 2c, and 3 clients). Man

Seite 281 - Transmit Power

System Configuration6-386Community Name (Read/Write) – Defines the SNMP community access string that has read/write access. Authorized management stat

Seite 282

SNMP6-396Trap Configuration – Allows selection of specific SNMP notifications to send. The following items are available:• sysSystemUp - The access po

Seite 283 - Operating Range

System Configuration6-406• dot11StationAuthenticateFail - A client station has tried and failed to authenticate to the network.• Enable All Traps - Cl

Seite 284 - Glossary

SNMP6-416To view the current SNMP settings, use the show snmp command.Enterprise AP#show snmp 7-54SNMP Information====================================

Seite 285

System Configuration6-426Configuring SNMPv3 UsersThe access point allows up to 10 SNMP v3 users to be configured. Each user must be defined by a uniqu

Seite 286

COMPLIANCESviImportant! Before making connections, make sure you have the correct cord set. Check it (read the label on the cable) against the followi

Seite 287

SNMP6-436CLI Commands for Configuring SNMPv3 Users – Use the snmp-server engine-id command to define the SNMP v3 engine before assigning users to grou

Seite 288 - WPA Pre-shared Key (PSK)

System Configuration6-446Configuring SNMPv3 Trap FiltersSNMP v3 users can be configured to receive notification messages from the access point. An SNM

Seite 289

SNMP6-456Note: Only the New Filter page allows the Filter ID to be configured.Filter ID – A user-defined name that identifies the filter. (Maximum len

Seite 290

System Configuration6-466Configuring SNMPv3 TargetsAn SNMP v3 notification Target ID is specified by the SNMP v3 user, IP address, and UDP port. A use

Seite 291

SNMP6-476Target ID – A user-defined name that identifies a receiver of notifications. The access point supports up to 10 target IDs. (Maximum length:

Seite 292

System Configuration6-486Radio InterfaceThe IEEE 802.11b/g interface includes configuration options for radio signal characteristics and wireless secu

Seite 293

Radio Interface6-496Radio Channel – The radio channel that the access point uses to communicate with wireless clients. When multiple access points are

Seite 294

System Configuration6-506Maximum Station Data Rate – The maximum data rate at which the access point transmits unicast packets on the wireless interfa

Seite 295 - E052006-DT-R01

Radio Interface6-516Super G – The Atheros proprietary Super G performance enhancements are supported by the access point. These enhancements include b

Seite 296 - Phone: (949) 679-8000

System Configuration6-526Fragmentation Length – Configures the minimum packet size that can be fragmented when passing through the access point. Fragm

Verwandte Modelle: SMC2552W-G2

Kommentare zu diesen Handbüchern

Keine Kommentare