Avaya Wireless AP Device Manager User Guide

73 

Loading....

Loading....

Loading....

Loading....

Loading....

Full text

(1)

AP Device

Manager

User Guide

(2)

Copyright Avaya Inc. 2003 ALL RIGHTS RESERVED

The products, specifications, and other technical information regarding the products contained in this document are subject to change without notice. All information in this document is believed to be accurate and reliable, but is presented without warranty of any kind, express or implied, and users must take full responsibility for their application of any products specified in this document. Avaya disclaims responsibility for errors which may appear in this document, and it reserves the right, in its sole discretion and without notice, to make substitutions and modifications in the products and practices described in this

document.

Avaya™, Cajun™, VisAbility™, and MSNM™ are registered trademarks and trademarks of Avaya Inc.

ALL OTHER TRADEMARKS MENTIONED IN THIS DOCUMENT ARE PROPERTY OF THEIR RESPECTIVE OWNERS.

(3)

Preface . . . vi

The Purpose of This Guide . . . vi

Who Should Use This Guide . . . vi

Organization of This Guide . . . vi

Chapter 1 — Introduction . . . 1

Avaya Wireless AP Manager Overview . . . .1

Starting and Stopping Avaya Wireless AP Manager . . . .2

The User Interface . . . .2

Tree View . . . .4

Chassis View . . . .4

Application Toolbar . . . .6

Get/Set Toolbar . . . .6

Dialog Area . . . .8

Desktop . . . .8

Status Line . . . .8

Managing Tables . . . .9

Using Avaya Wireless AP Help . . . .9

Opening the Help to the Contents Page . . . .9

Opening the Help to a Topic of Interest . . . .9

Chapter 2 — Device Configuration. . . 10

Viewing Device IP Configuration . . . .11

General Configuration Parameters . . . .11

Advanced Configuration Parameters . . . .13

Configuring an AP Device as a DHCP Server . . . .15

Adding IP Pools . . . .17

Removing IP Pools . . . .17

Viewing Ethernet Port Configuration . . . .18

Viewing Wireless Slot Configuration . . . .20

Wireless Slot Interface Configuration . . . .20

Wireless Slot Encryption Configuration . . . .22

(4)

Chapter 3 — Trap Managers Configuration . . . 26

Trap Manager Overview . . . .26

Configuring Traps . . . .27

Configuring Trap Managers . . . .28

Editing the Trap Managers Table . . . .30

Adding and Removing Managers . . . .30

Editing Trap Reporting Statuses . . . .30

Chapter 4 — Security. . . 31

Security Overview . . . .31

Configuring Security . . . .32

Configuring MAC Authentication . . . .32

Adding a User Entry . . . .34

Editing a User Entry . . . .34

Deleting a User Entry . . . .34

Configuring RADIUS Authentication . . . .35

Configuring RADIUS Accounting . . . .38

Configuring Manager Authentication . . . .40

Adding a Manager Entry . . . .41

Editing a Manager Entry . . . .42

Deleting a Manager Entry . . . .42

Configuring Port Authentication . . . .43

Chapter 5 — Filtering . . . 45

Filtering Overview . . . .45

Configuring Filtering . . . .46

Configuring Protocol Filtering . . . .46

Adding a Protocol Entry . . . .48

Editing a Protocol Entry . . . .48

Deleting a Protocol Entry . . . .48

Configuring Storm Filtering . . . .48

Configuring TCP/UDP Port Filtering . . . .51

Adding a Protocol Entry . . . .52

Modifying a Protocol Entry . . . .53

Deleting a Protocol Entry . . . .53

Chapter 6 — Wireless Distribution System . . . 54

Configuring the WDS . . . .54

Chapter 7 — Connected Addresses . . . 56

Connected Addresses Overview . . . .56

(5)

Chapter 8 — Troubleshooting . . . 59

Testing a Remote Link . . . .59

Appendix A — Menus . . . 62

File Menu . . . .62

View Menu . . . .62

Configure Menu . . . .62

Actions Menu . . . .63

Help Menu . . . .63

(6)

Welcome to Avaya Wireless AP Device Manager. This chapter provides an introduction to the structure and assumptions of this guide. It includes the following sections:

The Purpose of This Guide - A description of the goals of this guide.

Who Should Use This Guide - The intended audience of this guide.

Organization of This Guide - A brief description of the subjects contained in the various sections of this manual.

The Purpose of This Guide

The Avaya Wireless AP Device Manager guide contains information needed to use the management system efficiently and effectively. This guide is relevant for the AP-3/4/5 Device Managers.

Who Should Use This Guide

This guide is intended for network managers familiar with network management and its fundamental concepts.

Organization of This Guide

This guide is structured to reflect the following conceptual divisions: • Preface - This section describes the guide’s purpose, intended

audience, and organization.

Introduction - An introduction to the Avaya Wireless AP Device Manager, including instructions on starting the Avaya Wireless AP Manager and using the on-line help, and a description of the Avaya Wireless AP Manager user interface.

(7)

Device Configuration - Viewing and modifying the device’s configuration, and configuring the device as a DHCP Server.

Trap Managers Configuration - Viewing and modifying the Trap Managers Table.

Security - Viewing and modifying the device’s security configuration.

Filtering - Viewing and modifying the device’s filtering configuration.

Wireless Distribution System - Viewing and modifying the device’s WDS configuration, and testing the wireless links. • Connected Addresses - Viewing devices connected to the

device’s ports.

Troubleshooting - Testing wireless links to clients using AP-3 and AP-4 devices.

Menus - The full structure of the menus in the Avaya Wireless AP Manager.

(8)

1

This chapter provides an introduction to the Avaya Wireless AP Device Manager. It includes the following sections:

Avaya Wireless AP Manager Overview - An overview of the Avaya Wireless AP Manager.

Starting and Stopping Avaya Wireless AP Manager - Instructions on how to access the Avaya Wireless AP Manager. • The User Interface - An introduction to the Avaya Wireless AP

Manager user interface, including instructions on how to select elements and use the toolbar buttons.

Managing Tables - An explanation of the symbols used to label table rows.

Using Avaya Wireless AP Help - An explanation of the options for accessing on-line help in the Avaya Wireless AP Manager.

Avaya Wireless AP Manager Overview

The Avaya Wireless AP devices are switches that provide wireless connectivity for enterprise networks. These devices include an Ethernet port for connectivity to the LAN or the Internet and one or two radio cards for wireless transmission.

The Avaya Wireless AP Manager enables you to configure the Avaya Wireless AP devices. You can configure each device’s Ethernet port and wireless slots, as well as its security settings.

(9)

Starting and Stopping Avaya Wireless AP

Manager

To start Avaya Wireless AP Manager from Avaya MultiService Console: 1. Double-click the desktop icon representing the Avaya Wireless AP

device you want to manage. Or

1. Select the label representing the Avaya Wireless AP device you want to manage.

2. Select Tools >Device Manager.

To start Avaya Wireless AP Manager from HP-OV NNM: 1. Select an Avaya Wireless AP device.

2. Click . Or

Select Tools >Avaya > Device Manager. Or

1. Right-click on an Avaya Wireless AP device. 2. Select Avaya > Device Manager.

To exit Avaya Wireless AP Manager, select File > Exit. Avaya Wireless AP Manager closes.

The User Interface

The user interface consists of the following elements:

Tree View - A resizeable window containing a hierarchical representation of the ports of the Avaya Wireless AP device and its ports.

Chassis View - A graphical representation of the Avaya Wireless AP device.

Menu Bar - Menus for accessing Avaya Wireless AP management functions.

(10)

Application Toolbar - Toolbar buttons for accessing Avaya Wireless AP management functions.

Get/Set Toolbar - Toolbar buttons for viewing and changing the configuration of the device’s wireless ports.

Dialog Area - A resizeable window where all dialog boxes and tables first open.

Desktop - A resizeable window where the Chassis View and all floating and minimized dialog boxes and tables are displayed. • Status Line - An area at the bottom of the screen displaying the

communication status between the Avaya Wireless AP Manager and the Avaya Wireless AP device.

The figure below shows the user interface, with its various parts labeled. * Note: This guide is relevant for AP-3, AP-4, and AP-5 models, all

referred to in this guide as ‘Wireless AP’. Only the AP-3 is shown in the examples provided.

Figure 1-1. Avaya Wireless AP-3 User Interface

When you hold the cursor over an icon in the Chassis View, a label appears with information about the element represented by the icon. To resize the three main areas of the user interface, the Tree View, the Desktop, and the Dialog Area, use the splitter bars and their arrows.

Menu Bar Get/Set

Toolbar

Tree View

Desktop Application

Toolbar

Chassis View

Dialog Area

Status

(11)

Tree View

The Tree View shows a hierarchical representation of the structure of the Avaya Wireless AP device. To select the device or its ports, click on their icons in the Tree View. When an element is selected in the Tree View, the corresponding element is selected in the Chassis View.

The highest level of the Tree View shows the device. The second level shows ports.

To expand the view of a contracted element in the tree or to contract the view of an expanded element in the tree, double-click the element. You can select the device and ports from the Tree View or the Chassis View.

To select the device:

In the Chassis View, click the device’s label. Or

In the Tree View, click the device’s icon. The device’s label is highlighted in the Chassis View and the Tree View.

To select a wireless port:

In the Chassis View, click the wireless port. Or

In the Tree View, click the wireless port’s icon. The wireless port is highlighted in the Chassis View and the Tree View.

Chassis View

The Chassis View is a graphical representation of the Avaya Wireless AP device. The Chassis View shows all of the device’s ports, including Ethernet, wireless, and serial ports. The color of the device and its elements in the Chassis View reflects their status.

(12)

The figure below shows the Chassis View, with its various parts labeled.

Figure 1-2. Avaya Wireless AP Chassis View

The figure below shows the chassis view for the AP-5. The AP-4 chassis view is similar.

Figure 1-3. Avaya Wireless AP-5 Chassis View

LEDs

Wireless Slot B with PCMCIA Card

Wireless Slot A with no PCMCIA Card

Ethernet Port Symbol Serial Port

Symbol Device Symbol

(13)

Application Toolbar

The Application Toolbar provides shortcuts to the main Chassis View functions.

The table below describes the buttons on the Application Toolbar and gives the equivalent menu options.

When you place the cursor on a toolbar icon for one second, a label appears with the name of the button.

Get/Set Toolbar

The Get/Set Toolbar provides buttons for getting and setting configuration parameters for selected wireless ports. When a wireless port is selected, its configuration is reflected on the Get/Set Toolbar. Each group of buttons represents the various possible states of a configuration parameter. For example, the first group of buttons shows whether the device accepts association requests to this interface from client stations configured with a network name of ANY.

Table 1-1. Application Toolbar

Button Description Menu Item

Changes to configuration mode.

View > Configuration

Displays addresses of devices connected to the Avaya Wireless AP device.

View > Connected Addresses

Displays the VLAN dialog box.

Configure > VLAN Manager

Displays the WDS dialog box.

Configure > Wireless Distribution System

Displays the Security dialog box.

Configure > Security

Displays the Managers Trap Table.

Configure > Trap Managers

Displays the Filtering dialog box.

Configure > Filtering

(14)

Selected wireless ports can be configured using the Get/Set Toolbar. To change the configuration of a wireless port, select the value of the parameter you want to apply to the wireless port. Click apply to update the device with the changes. Click cancel to discard the changes. Options not applicable to the selected wireless port are dimmed.

Multiple wireless ports can be simultaneously configured using the Get/Set Toolbar. When multiple wireless ports with non-identical configurations are selected, only the parameters whose settings are identical on the selected wireless ports are reflected in the Get/Set Toolbar. For example, if a wireless port using Key 1 for transmitting data and a wireless port using Key 4 for transmitting are selected, no value appears in the Transmission Key section of the Get/Set Toolbar.

The table below displays the buttons on the Get/Set Toolbar and explains their functions and settings.

You can toggle the display of the Get/Set toolbar. To toggle the display of the Get/Set toolbar, select View > Toolbars > Show Get/Set Toolbar.

Table 1-2. Get/Set Toolbar

Button Description

Get and set the wireless port’s closed system status: Enabled, Disabled.

Get and set the state of WEP encryption on the slot: Enable, Disable.

Get and set the wireless port’s transmission key: 1-4. Get and set the state of automatic frequency

selection on the slot: Enable, Disable.

Get and set the radio frequency channel for the wireless interface. Select a radio frequency channel from the pull-down list box.

Apply or cancel the configuration changes made with the Get/Set Toolbar.

(15)

Dialog Area

The area to the right of the Chassis View is where all dialog boxes and tables first open. This area can be resized by dragging the vertical splitter bar with the mouse. When a dialog box or table opens, it replaces the current dialog box open in the Dialog Area. To view more than one dialog box or table simultaneously, click on the pushpin in the upper right-hand corner of the dialog box. The dialog box becomes a floating dialog box and moves to the Desktop.

To restore a dialog box to the Dialog Area, click on the toolbar button or symbol that opened the dialog box. The dialog box returns to the Dialog Area.

Desktop

The central section of the application window is the Desktop. This area can be resized by dragging the vertical splitter bar with the mouse. Floating dialog boxes and tables can be resized. The Chassis View and floating dialog boxes and tables can also be minimized. Minimized windows are shown at the bottom of the Desktop.

Status Line

The Status Line shows the communication status between the application and the Avaya Wireless AP device. The Status Line displays a status message and an appropriate graphic. The table below shows the possible statuses with their corresponding graphics, and gives a short explanation for each status.

Table 1-3. Communication Statuses

Status Graphic Description

Ready The application is ready to

communicate with the Avaya Wireless AP device. Communicating The application is currently

communicating with the Avaya Wireless AP device. Communication

Error

The last attempted communication with the Avaya Wireless AP device was not successful.

(16)

Managing Tables

The Avaya Wireless AP Device Manager interface informs you of the status of each row in a table. The following table shows a list of symbols which can appear at the start of a table row, with their corresponding explanations.

To undo all the changes made to a table, click Refresh. To undo changes made to a selected row, click Undo. To update the device with the changes, click Apply.

Using Avaya Wireless AP Help

This section explains how to use the on-line help in the Avaya Wireless AP Manager. The on-line help can be opened to the contents page or directly to a topic of interest.

Opening the Help to the Contents Page

To open the help to the contents page, select Help >Contents. The on-line help opens to the contents page.

Opening the Help to a Topic of Interest

To open the help directly to a topic of interest: 1. Click .

Or

Select Help > Help On. The cursor changes to the shape of a hand. 2. Click on a point of interest in the Avaya Wireless AP Device

Manager. The help opens to a topic explaining the feature that was Table 1-4. Table Symbols

Symbol Explanation

The row is a new entry. The row is to be deleted.

The information in the row has been changed by the user.

(17)

2

This chapter explains how to view and set the various configuration parameters relevant to the Avaya Wireless AP devices. It includes the following sections:

• Viewing Device IP Configuration - View high-level information about the Avaya Wireless AP devices.

Configuring an AP Device as a DHCP Server - View DHCP information about the Wireless AP device.

Viewing Ethernet Port Configuration - View information specific to the ports on the Avaya Wireless AP devices.

Viewing Wireless Slot Configuration - View information specific to the wireless slots on the Avaya Wireless AP devices. • Viewing/Configuring VLAN Information - View VLAN

(18)

Viewing Device IP Configuration

To view the Device IP Configuration dialog box, select Configure >Device Configuration. The Device IP Configuration dialog box opens.

The Device IP Configuration dialog box has the following tabs: • General - Refer to General Configuration Parameters for

configuration options.

Advanced - Refer to Advanced Configuration Parameters for configuration options

General Configuration Parameters

The Device IP Configuration dialog box provides you with high-level information specific to an Avaya Wireless AP device and information about the device’s IP configuration.

Figure 2-1. Device IP Configuration Dialog Box - General Tab

The Device IP Configuration dialog box provides detailed IP information and other configuration information about the device.

(19)

The following table provides a list of the fields in the Device IP Configuration dialog box General tab and their descriptions:

For more information on the User Interface, refer to ”Managing Tables” on page 9.

Table 2-1. Device IP Configuration Parameters

Field Description

IP Address Assignment Type

The source of the device’s IP address. Possible sources are:

• Dynamic - The device receives its IP address via DHCP.

• Static - A static IP address is assigned to the device. A static IP address can be assigned using the CLI (command line interface). For more information, refer to the Avaya AP-3, or AP-4 and AP-5 User’s Guide. The AP Scantool, included with the AP device, or by pointing a Web browser to the IP address of the device and using the device manager.

IP Address The IP address of the device.

Subnet Mask The IP subnet mask of the device.

Default Router IP Address

The IP address of the device’s default router.

MAC Address The MAC address of the device’s Ethernet port.

Name A user-assigned name for the device.

Location The physical location of the device.

Contact Name The name of the person responsible for the device.

Description A user-assigned description of the device.

Software Image Version

The version of the embedded software running on the device.

Configuration Version The version of the device. The version is updated whenever there is a functional modification to the device.

Boot Loader Version The version of the boot loader software.

Firmware Version The version of the firmware.

Hardware Version The version of the device hardware.

Hardware Serial Number

(20)

Advanced Configuration Parameters

The Advanced tab of the Device Configuration dialog box provides advanced configuration parameters.

Figure 2-2. Device IP Configuration Dialog Box - Advanced Tab

The following table provides a list of the fields in the Device IP Configuration dialog box Advanced tab and their descriptions:

Table 2-2. Device IP Configuration Parameters

Field Description

Packet Forwarding Status

The status of the mechanism. When enabled, all traffic generated by wireless clients

associated with the same AP is forwarded to the same MAC address.

Forwarding MAC Address

The MAC address to forward all unicast, multicast, and broadcast packets from wireless clients.

(21)

Forwarding Interface Port

The interface port to forward all unicast, multicast, and broadcast packets from wireless clients. Possible values are:

• Ethernet - Forward to an ethernet connection.

• WDS connection - A link to another AP device that has an ethernet connection (AP-3 and AP-4 only).

• Any - Traffic redirected to a port based on the Wireless AP device’s MAC learning process.

Intra BSS Traffic Filter Status

Enables blocking traffic between clients

associated with a specific AP (Basic Service Set). Possible values are:

• Block - Disable traffic. • Allow - Enable traffic.

Enable DNS Client Enables using host names of network servers instead of IP addresses. Possible values are:

• Disable • Enable

DNS Primary Server IP Address

The IP address of the network’s primary DNS server.

DNS Secondary Server IP Address

The IP address of the network’s secondary DNS server.

DNS Client Default Domain Name

The default name for the AP devices’s network.

Enable Syslog Enables the AP to transmit event messages to a central server for monitoring and

troubleshooting. Possible values are: • Disable

• Enable

Syslog IP Address The IP address of the central server for sending Syslog messages.

Table 2-2. Device IP Configuration Parameters (Continued)

(22)

Configuring an AP Device as a DHCP Server

The DHCP Server dialog box provides information for the DHCP Server, when configured. This section discusses configuring an AP device as a DHCP server, as well as the following topics:

Adding IP Pools

Removing IP Pools

If your network does not have a DHCP Server, you can configure the Wireless AP device to be a DHCP Server and assign dynamic IP addresses to ethernet nodes and wireless clients. You can define different ranges of IP addresses that the Wireless AP device acting as a DHCP Server assigns to the Wireless AP devices. Each group of IP addresses is called an IP Pool.

CAUTION

Verify that there are no other DHCP servers on the network before configuring the Wireless AP device as a DHCP Server. First configure the Wireless AP device with a static IP address before enabling it as a DHCP Server.

Syslog Lowest Priority Logged

The lowest priority of messages to forward to server. All priorities higher than this are forwarded. The possible priority values are:

• 0 = System is unusable.

• 1 = Action must be taken immediately. • 2 = Critical conditions.

• 3 = Error conditions. • 4 = Warning conditions.

• 5 = Normal, but significant condition. • 6 = Informational messages.

• 7 = Debug-level messages.

The lower the priority number, the higher the message priority.

SpectraLink Status Enables compatibility for SpectraLink phones (for AP-3 and AP-4 devices only). Possible values are:

• Enable • Disable

Table 2-2. Device IP Configuration Parameters (Continued)

(23)

To view the DHCP Server dialog box, select Configure >DHCP Server. The Device IP Configuration dialog box opens.

Figure 2-3. DHCP Server Dialog Box

The following table provides a list of the fields in the DHCP Server dialog box and their descriptions:

Table 2-3. DHCP Server Parameters

Field Description

DHCP Server Status Enables the Wireless AP device to be a DHCP Server. Possible values are:

• Disable • Enable

Subnet Mask The IP subnet mask of the Wireless AP device.

Default Router IP Address

The IP address of the Wireless AP device’s default router.

DNS IP Address The IP addresses of the Primary and Secondary DNS, if configured.

Start IP The first in the range of IP addresses that the Wireless AP device acting as a DHCP Server can assign to its wireless clients.

End IP The last IP in the range of IP addresses to be assigned.

(24)

Adding IP Pools

To add IP Pools to the table: 1. Click Insert.

2. Enter the information specified under each column of the table. 3. Repeat the procedure for each IP Pool.

Removing IP Pools

To remove IP Pools from the table:

1. Click the row with the IP Pool to be removed. 2. Click Delete.

3. Repeat the procedure for each IP Pool.

Lease Time Default The DHCP Server automatically renews IP addresses without notifying the client. This value is the minimum amount of time that a client retains the assigned IP address (in seconds).

Lease Time Maximum

The maximum amount of time (seconds) for clients to retain the assigned IP address.

Comment An optional descriptive string for this IP pool.

Status Sets the status of the IP Pools when entering the table. Possible values are:

• Enabled • Disabled

Table 2-3. DHCP Server Parameters (Continued)

(25)

Viewing Ethernet Port Configuration

The Ethernet Port Configuration dialog box provides information specific to a selected Ethernet port.

To view the configuration of an Ethernet port, click on an Ethernet port symbol in the Chassis View or Tree View. The Ethernet Port Configuration dialog box opens.

Figure 2-4. Ethernet Port Configuration Dialog Box

The Ethernet Port Configuration dialog box provides detailed information about the port, such as the port’s MAC address and speed mode.

(26)

The following table provides a list of the fields in the Ethernet Port Configuration dialog box and their descriptions:

For more information on the User Interface, refer to ”Managing Tables” on page 9.

Table 2-4. Ethernet Port Configuration Parameters

Field Description

MAC Address The MAC address of the Ethernet port.

Configuration The configured speed mode of the port. The speed mode combines the port speed and the duplex setting.

Port speed can be one of the following: • 10 Mbps - Ethernet

• 100 Mbps - Fast Ethernet

• Auto-Speed - The highest speed for communication supported by both endstations.

The duplex setting can be one of the following:

• Half-Duplex - The port can either receive or send, but can not do both simultaneously.

• Full-Duplex - The port can send and receive simultaneously.

• Auto-Duplex - The highest duplex setting for communication supported by both endstations.

Possible values for this field are: • 10 Mbps-Half-Duplex • 10 Mbps-Full-Duplex • 10 Mbps-Auto-Duplex • 100 Mbps-Half-Duplex • 100 Mbps-Full-Duplex • Auto-Speed-Half-Duplex • Auto-Speed-Full-Duplex

(27)

Viewing Wireless Slot Configuration

The Wireless Slot Configuration dialog box provides information specific to a selected Wireless slot. The Interface tab of the Wireless Slot

Configuration dialog box provides LAN and port parameters. The Encryption Tab of the Wireless Slot Configuration dialog box provides information about the slot’s encryption configuration. The following topics are discussed in this section:

Wireless Slot Interface Configuration

Wireless Slot Encryption Configuration

The Get/Set Toolbar provides an alternative, quick method to view and change the wireless port’s configuration. For more information on the Get/Set Toolbar, refer to ”Get/Set Toolbar” on page 6.

Wireless Slot Interface Configuration

The Interface tab of the Wireless Slot Configuration dialog box provides LAN and port parameters.

To view the LAN and port configuration of a wireless slot, click on a wireless slot symbol in the Chassis View or Tree View. The Wireless Slot Configuration dialog box opens to the Interface tab.

Figure 2-5. Wireless Slot Configuration Dialog Box - Interface Tab

(28)

The Interface tab of the Wireless Slot Configuration dialog box provides detailed information about the slot, such as the slot’s MAC address, name, wireless interface configuration, and software.

The following table provides a list of the fields in the Interface tab of the Wireless Slot Configuration dialog box and their descriptions:

Table 2-5. Wireless Slot Configuration - Interface Parameters

Field Description

Interface Type The type of physical layer interface. Possible interface types are:

• 802.11b [DSSS 2.4 GHz] • 802.11a [OFDM 5 GHz]

MAC Address The MAC address of the PCMCIA card in the wireless slot.

Network Name The name of the wireless network.

Automatic Channel Selection

The state of automatic channel selection on the wireless slot. Possible states are:

• Enable - The frequency of the channel used by the slot is selected automatically by the device.

• Disable - The frequency of the channel used by the slot is determined manually using the

Frequency Channel field or the Get/Set toolbar.

Frequency Channel The radio frequency channel for the wireless interface.

Transmit Rate The transmit rate for the Wireless AP device.

DTIM Period (Messages)

The Delivery Traffic Indication Map period. This is the interval between the transmission of multicast frames on the wireless interface.

RTS/CTS Medium Reservation

The medium reservation value. The medium reservation specifies the number of octets in a frame above which a RTS/CTS handshake is performed.

Valid values are: 0 - 2347. A value of 2347 disables RTS/CTS mode.

Firmware Version The version of the firmware.

(29)

For more information on the User Interface, refer to ”Managing Tables” on page 9.

Wireless Slot Encryption Configuration

The Encryption tab of the Wireless Slot Configuration dialog box provides encryption parameters for the device.

To view the encryption configuration of a wireless slot:

1. Click on a wireless slot symbol in the Chassis View or Tree View. The Wireless Slot Configuration dialog box opens to the Interface tab.

2. Click Encryption. The Encryption tab of the Wireless Slot Configuration dialog box appears.

Figure 2-6. Wireless Slot Configuration Dialog Box - Encryption Tab

The Encryption tab of the Wireless Slot Configuration dialog box provides encryption information about the slot, such as the slot’s encryption mode and key information.

Hardware Serial Number

The unique serial number of the device. Table 2-5. Wireless Slot Configuration -

Interface Parameters (Continued)

(30)

The following table provides a list of the fields in the Encryption tab of the Wireless Slot Configuration dialog box and their descriptions:

For more information on the User Interface, refer to ”Managing Tables” on page 9.

Table 2-6. Wireless Slot Configuration - Encryption Parameters

Field Description

Encryption The state of WEP encryption on the slot. Possible states are:

• Disable • Enable

Key 1 - 4 The encryption key. Each of the 4 Key fields contains part of the encryption key. The key is not displayed for security reasons. Instead, asterisks (*) appear in these fields.

The encryption key is a alphanumeric string. If the Key Length is 40-bit, each part of the key must contain 5 characters. If the Key Length is 128-bit, each part of the key must contain 13 characters.

Deny Non-Encrypted Data

The action taken when non-encrypted data is received by the slot. Possible actions are:

• Enable - Non-encrypted data is not accepted by the slot.

• Disable - Non-encrypted data is accepted by the slot.

Transmission Key The encryption key used by the slot when transmitting data. Possible values are:

• Key 1 • Key 2 • Key 3 • Key 4

802.1x Key Length The length of the encryption key used by the slot. Possible lengths are:

• 64-bit - The slot uses the Wired Equivalency Privacy (WEP) encryption method.

• 128-bit - The slot uses the RC4 128 encryption method.

(31)

Viewing/Configuring VLAN Information

* Note: Only AP-3 supports viewing and configuring VLAN

information.

The VLAN dialog box enables you to configure the VLANs on which the wireless slot and the Ethernet port operate. If the VLAN feature is disabled, traffic from all VLANs is accepted by the device.

To view the Device IP Configuration dialog box: Click .

Or

Select Configure >VLAN Manager. The VLAN dialog box opens.

(32)

The following table provides a list of the fields in the VLAN dialog box and their descriptions:

Table 2-7. VLAN Parameters

Field Description

VLAN Protocol Status The state of the VLAN protocol on the device. Possible states are:

• Disable - VLAN tags are ignored. • Enable - VLAN tags are used to

determine the traffic accepted on the device.

Management VLAN The VLAN used for configuring the device.

Wireless Port A VLAN The VLAN used on wireless port A. Only traffic with the selected VLAN tag is allowed on the port.

Wireless Port B VLAN The VLAN used on wireless port B. Only traffic with the selected VLAN tag is allowed on the port.

(33)

3

This chapter provides the information and instructions for configuring trap managers for the Avaya Wireless AP devices. It includes the following topics:

Trap Manager Overview - An overview on Traps and Managers.

Configuring Traps - Instructions on accessing the Traps Table, and a description of the traps in the Traps Table.

Configuring Trap Managers - Instructions on configuring Trap Manager Parameters and their reporting statuses.

Editing the Trap Managers Table - Instructions on how to edit the Trap Managers dialog box.

Trap Manager Overview

In the event of a fault or an unusual occurrence, the Avaya Wireless AP device can send traps to one or more Network Management Stations (NMS). To enable this feature, you must configure the Avaya Wireless AP device with a list of the managers’ workstations. Traps are then sent to the stations listed in the Managers table.

* Note: Up to five managers can be assigned per device. However, it is recommended to keep the list limited to actual and relevant managers so as not to place undue stress on the network.

Using the Trap Managers dialog box, you can also configure which traps are sent to the managers. The Traps tab of the Trap Managers dialog box lists specific traps. Checking the checkbox in a trap column enables the managers to receive the checked trap. Managers only receive the traps which are checked.

(34)

Configuring Traps

To view the Traps Table: Click . Or

Select Configure >Trap Managers. The Trap Managers dialog box opens to the Traps tab.

Figure 3-1. Trap Managers Dialog Box - Traps Tab

The Traps table is used to select the traps you want reported to the designated trap managers.

The following table provides a list of the traps in the Traps table and their descriptions.

Table 3-1. Traps Table Fields

Name Description

Configuration The trap reports that the device’s configuration is not complete.

Security The trap reports an unauthorized host.

Wireless Interface The trap reports the insertion of an incompatible wireless interface card.

(35)

Check the traps you want reported to trap managers. Uncheck the traps you do not want reported to the trap managers.

For more information on the user interface, refer to “Managing Tables” on page 9.

Configuring Trap Managers

The Trap Managers tab is used to configure the IP addresses and communities of the trap managers and their trap reporting statuses for device wide traps.

To view the Trap Managers tab of the Trap Managers dialog box: 1. Click .

Or

Select Configure >Trap Managers. The Trap Managers dialog box opens to the Traps tab.

Operational The trap reports that device experienced a problem in completing an operation.

Flash Memory The trap reports a problem with the contents of the device’s flash memory.

TFTP The trap reports TFTP activity.

Image The trap reports a problem with one of the device’s software images.

Table 3-1. Traps Table Fields (Continued)

(36)

2. Click Managers. The Trap Managers tab of the Trap Managers dialog box appears.

Figure 3-2. Trap Managers Dialog Box - Managers Tab

The following table lists the fields in the Trap Managers tab and their descriptions.

Table 3-2. Trap Manager Table Fields

Field Description

IP Address The IP address of the trap manager.

Community The write community of the trap manager.

Enable The state of trap reporting for the trap manager. Possible states are:

• Checked - The trap manager receives traps from the device.

• Unchecked - The trap manager does not receive traps from the device.

(37)

Editing the Trap Managers Table

You can add and remove managers from the Trap Managers table, and you can edit the trap reporting status of specific managers.

Adding and Removing Managers

To add managers to the table: 1. Click Insert.

2. Enter the IP address and write community of the designated management station.

3. Repeat the procedure for each manager. To remove managers from the table:

1. Click the row with the manager’s IP address. 2. Click Delete.

3. Repeat the procedure for each manager.

Editing Trap Reporting Statuses

To edit the trap reporting status of a manager, check or uncheck the checkbox next to the manager’s IP address.

* Note: If the checkbox is not checked, no traps will be reported to the selected manager.

(38)

4

This chapter provides information on configuring security for the Avaya Wireless AP devices. It includes the following sections:

Security Overview - A brief overview of security on the Avaya Wireless AP devices.

Configuring Security - Instructions on accessing the Security dialog box and configuring security for the device.

Security Overview

The Security feature for the Avaya Wireless AP devices contains the following parts:

MAC Authentication - MAC authentication ensures that only authorized users can access the device.

RADIUS Authentication - RADIUS (Remote Authentication Dial In User Service) authentication ensures that the list of users is received from a specified RADIUS server. A backup RADIUS server can be defined, providing redundancy in the case of the failure of the primary RADIUS server.

RADIUS Accounting - RADIUS (Remote Authentication Dial In User Service) accounting enables tracking and recording the length of security sessions on the Wireless AP device.

Manager Authentication - Manager authentication ensures that only authorized managers of the device can change the device’s configuration.

Port Authentication - Port authentication enables you to specify the port authentication method.

(39)

Configuring Security

The Security dialog box contains several tabs with fields you need to configure all of the Avaya Wireless AP security parameters. Procedures for configuring the following security parameters are provided in this section:

Configuring MAC Authentication

Configuring RADIUS Authentication

Configuring RADIUS Accounting

Configuring Manager Authentication

Configuring Port Authentication

Configuring MAC Authentication

The MAC Authentication tab of the Security dialog box enables you to configure the security status of the device and control a list of users. The following topics are discussed in this section:

Adding a User Entry

Editing a User Entry

Deleting a User Entry

To view the MAC Authentication tab of the Security dialog box: Click .

Or

Select Configure >Security. The Security dialog box opens to the MAC Authentication tab.

(40)

Figure 4-1. Security Dialog Box - MAC Authentication Tab

The following table provides a list of the fields in the MAC Authentication tab of the Security dialog box and their descriptions:

Table 4-1. Security - MAC Authentication Parameters

Field Description

MAC Address Control Status

The state of MAC authentication on the device. Possible states are:

• Enable - MAC authentication is enabled on the device. Only authorized users can access the device.

• Disable - MAC authentication is disabled on the device. All users can access the device.

MAC Address Control Operation

The functionality of the MAC Address Control Table. Possible values are:

• Allow - Users listed in the MAC Address Control Table can access the device. All other users are denied access.

• Deny - Users listed in the MAC Address Control Table cannot access the device. All other users can access the device.

MAC Address The MAC address of a user.

(41)

To enable or disable MAC authentication on the device, select a status from the MAC Address Control Status pull-down listbox.

To configure the functionality of the MAC Address Control Table, select an operation from the MAC Address Control Operation pull-down listbox.

Adding a

User Entry

To add a user to the MAC Address Control Table:

1. Click Insert. A row is added to the MAC Address Control Table. 2. Enter the user’s MAC address and an optional comment in the

row’s fields.

3. Select a status for the entry from the Status pull-down listbox in the row.

4. Click Apply.

Editing a

User Entry

To modify an entry in the MAC Address Control Table: 1. Select a row in the MAC Address Control Table. 2. Modify the information in the row.

3. Click Apply.

Deleting a

User Entry

To delete a user from the MAC Address Control Table: 1. Select a row in the MAC Address Control Table.

2. Click Delete. The user is deleted from the MAC Address Control Table.

3. Click Apply.

For more information on the User Interface, refer to “Managing Tables” on page 9.

Status The status of the user. Possible values are: • Enable - The entry in the MAC Address

Control Table is active, and the MAC Address Control Operation functionality applies to the user.

• Disable - The entry in the MAC Address Control Table is inactive, and the MAC Address Control Operation functionality does not apply to the user.

Table 4-1. Security - MAC Authentication Parameters (Continued)

(42)

Configuring RADIUS Authentication

The RADIUS Authentication tab of the Security dialog box enables you to configure servers on which the MAC Address Control Table is stored. To view the RADIUS Authentication tab of the Security dialog box:

1. Click . Or

Select Configure >Security. The Security dialog box opens to the MAC Authentication tab.

2. Click RADIUS Auth.. The RADIUS Authentication tab of the Security dialog box appears.

(43)

The following table provides a list of the fields in the RADIUS Authentication tab of the Security dialog box and their descriptions:

Table 4-2. Security - RADIUS Authentication Parameters

Field Description

RADIUS Access Control Status

The state of RADIUS access control on the device. Possible states are:

• Enable - RADIUS access control is enabled on the device. The MAC Address Control Table is received from the configured server.

• Disable - RADIUS access control is disabled on the device. The MAC Address Control Table is stored locally.

Authorization Lifetime/ Authentication Lifetime

The authorization lifetime for MAC based RADIUS authenticated clients in seconds.

MAC Address Format The format of the client’s MAC address. This needs to the format of the client’s addresses in the RADIUS server. Possible values are:

• Dash delimited - Each pair of digits is divided by a dash.

• Colon delimited - Each pair of digits is divided by a colon.

• Single dash delimited - A dash between the sixth and seventh digit. • No delimiters - No characters or spaces

between pairs of digits.

Server Status The status of the RADIUS server. Possible statuses are:

• Enable • Disable

Address Format The server address format. Possible values are: • IP Address

• Name

* Note: To identify a RADIUS server by name, configure the AP as a DNS client, as described in “Advanced Configuration Parameters” on page 13.

(44)

To enable or disable RADIUS access control on the device, select a status from the RADIUS Access Control Status pull-down listbox.

To configure the authorization lifetime for a MAC based RADIUS client, enter the amount of time, in seconds, in the Authorization Lifetime (seconds)

field.

To configure the authorization string for authenticating the RADIUS device to the server, enter the same string in the Share Secret Key and Retype

fields.

To configure a primary RADIUS server, use the fields under the Primary

heading.To configure a backup RADIUS server, use the fields under the

Backup heading.

To apply the changes to the device’s RADIUS authentication configuration, click Apply.

For more information on the User Interface, refer to “Managing Tables” on page 9.

IP \Name The IP address and name of the RADIUS server.

Port The RADIUS server’s authentication port.

Shared Secret A string used to authenticate the RADIUS device to the server. The string is entered twice, once in the Key field and once in the

Retype field. This confirms that the key has been entered correctly.

Response Time [seconds]

The time, in seconds, for which the device waits before sending another authentication request to the RADIUS server.

Maximum Retransmissions

The maximum number of retransmissions of authentication requests the device sends to the RADIUS server. An integer from 1 to 4. Table 4-2. Security - RADIUS Authentication Parameters (Continued)

(45)

Configuring RADIUS Accounting

The RADIUS Accounting tab of the Security dialog box enables you to track and record the length of client sessions on the AP, when using an external RADIUS server.

To view the RADIUS Accounting tab of the Security dialog box: 1. Click .

Or

Select Configure >Security. The Security dialog box opens to the MAC Authentication tab.

2. Click RADIUS Accounting. The RADIUS Accounting tab of the Security dialog box appears.

(46)

The following table provides a list of the fields in the RADIUS Accounting tab of the Security dialog box and their descriptions:

Table 4-3. Security - RADIUS Accounting Parameters

Field Description

Enable RADIUS Accounting

The state of RADIUS accounting on the AP. Possible states are:

• Enable - RADIUS accounting is enabled on the device.

• Disable - RADIUS accounting is disabled on the device.

Inactivity Timer The number of minutes of client inactivity, after which the accounting session automatically ends. The Range is 1-60.

Server Status The status of the RADIUS server. Possible statuses are:

• Enable • Disable

Address Format The server address format. Possible values are: • IP Address

• Name

IP \Name The IP address and name of the RADIUS server.

Port The RADIUS server’s authentication port.

Shared Secret A string used to authenticate the RADIUS AP device to the server. The string is entered twice, once in the

Shared Secret field and once in the Retype Secret field. This confirms that the string has been entered correctly.

* Note: Configure the same string on the RADIUS server.

Retype Secret This field is activated after entering a string in the

Shared Secret field. Enter the string again for confirmation.

Response Time [seconds]

The time, in seconds, for which the AP waits before sending another authentication request to the RADIUS server.

Maximum Retransmissions

The maximum number of retransmissions of

authentication requests the AP sends to the RADIUS server. An integer from 1 to 4.

(47)

To enable or disable RADIUS accounting on the device, select a status from the Enable RADIUS Accounting pull-down listbox.

To configure a primary RADIUS server, use the fields under the Primary

heading.To configure a backup RADIUS server, use the fields under the

Backup heading.

To configure the authorization string for authenticating the RADIUS AP device to the server, enter the same string in the Share Secret and Retype

fields.

To apply the changes to the device’s RADIUS accounting configuration, click Apply.

Configuring Manager Authentication

The Manager Authentication tab of the Security dialog box enables you to authorize specific users to change the device’s configuration. The

following topics are discussed in this section: • Adding a Manager Entry

Editing a Manager Entry

Deleting a Manager Entry

To view the Manager Authentication tab of the Security dialog box: 1. Click .

Or

Select Configure >Security. The Security dialog box opens to the MAC Authentication tab.

(48)

2. Click Manager Auth.. The Manager Authentication tab of the Security dialog box appears.

Figure 4-4. Security Dialog Box - Manager Authentication Tab

The following table provides a list of the fields in the Manager Authentication tab of the Security dialog box and their descriptions:

Adding a

Manager

Entry

To add a manager to the IP Access Table:

1. Click Insert. A row is added to the IP Access Table. 2. Enter the manager’s information in the row’s fields. 3. Click Apply.

Table 4-4. Security - Manager Authentication Parameters

Field Description

IP Address The IP address of the authorized manager.

Mask The IP subnet mask of the authorized manager.

Comment An optional comment associated with the manager.

Status The status of the manager. Possible values are: • Enable - The manager entry is active, and

the manager can configure the device.

• Disable - The manager entry is inactive, and the manager cannot configure the device.

(49)

Editing a

Manager

Entry

To modify an entry in the IP Access Table: 1. Select a row in the IP Access Table. 2. Modify the information in the row. 3. Click Apply.

Deleting a

Manager

Entry

To delete a manager from the IP Access Table: 1. Select a row in the IP Access Table.

2. Click Delete. The user is deleted from the IP Access Table. 3. Click Apply.

For more information on the User Interface, refer to “Managing Tables” on page 9.

(50)

Configuring Port Authentication

The Port Authentication tab of the Security dialog box enables you to specify the port authentication method used on the device.

To view the Port Authentication tab of the Security dialog box: 1. Click .

Or

Select Configure >Security. The Security dialog box opens to the MAC Authentication tab.

2. Click Port Auth.. The Port Authentication tab of the Security dialog box appears.

(51)

The following table provides a list of the fields in the Port Authentication tab of the Security dialog box and their descriptions:

To select a port authentication method, select a method from the Port Authentication [802.1x] Mode pull-down listbox.

To configure the authorization lifetime of authenticated ports, enter the number of seconds in the Authorization Lifetime field.

To apply the changes to the port authentication configuration, click Apply. Table 4-5. Security - Port Authentication Parameters

Field Description

Port Authentication [802.1x] Mode

The method of port authentication used on the device. Possible methods are:

• Disable - Port authentication is disabled on the device.

• 802.1x Only - Port authentication is negotiated using the 802.1x protocol. • 802.1x & WEP - Port authentication is

negotiated using either the 802.1x protocol for user authentication or WEP.

Authorization Lifetime/ Authentication Lifetime

The authorization lifetime for authenticated ports in seconds.

(52)

5

This chapter provides information on configuring filtering for the Avaya Wireless AP devices. It includes the following sections:

Filtering Overview - A brief overview of filtering Avaya Wireless AP traffic.

Configuring Filtering - Instructions on accessing the Filtering dialog box and configuring filtering parameters for the device.

Filtering Overview

The filtering feature enables you to filter the traffic throughput on the device. For the Avaya Wireless AP devices, the following types of filtering are available:

Protocol Filtering - Protocol filtering enables you to select the traffic protocols allowed or denied by the device. For more information, refer to “Configuring Protocol Filtering” on page 46. • Storm Filtering - Storm filtering enables you to configure a

maximum rate for broadcast and multicast packets on the device. For more information, refer to “Configuring Storm Filtering” on page 48.

TCP/UDP Port Filtering - TCP/UDP port filtering enables you to block TCP/UDP protocols through the device. For more

information, refer to “Configuring TCP/UDP Port Filtering” on page 51.

(53)

Configuring Filtering

The Filtering dialog box contains several tabs that enable you to configure all of the Avaya Wireless AP filtering parameters. Configuration

procedures for the following types of filtering is provided in this section: • Configuring Protocol Filtering

Configuring Storm Filtering

Configuring TCP/UDP Port Filtering

Configuring Protocol Filtering

The Protocol tab of the Filtering dialog box enables you to configure the traffic protocols allowed or denied on the device. The following topics are discussed in this section:

Adding a Protocol Entry

Editing a Protocol Entry

Deleting a Protocol Entry

To view the Protocol tab of the Filtering dialog box: Click .

Or

Select Tools >Filtering. The Filtering dialog box opens to the Protocol tab.

(54)

Figure 5-1. Filtering Dialog Box - Protocol Tab

The following table provides a list of the fields in the Protocol tab of the Filtering dialog box and their descriptions:

To configure the functionality of the Protocol Filter Table, select an Table 5-1. Filtering - Protocol Parameters

Field Description

Filter Operation The functionality of the Protocol Filter Table. Possible values are:

• Allow - Protocols listed in the Protocol Filter Table are allowed on the device. All other protocols are denied.

• Deny - Protocols listed in the Protocol Filter Table are denied. All other protocols are allowed on the device.

Protocol Number The protocol number in hexadecimal.

Protocol Name The protocol name.

Status The status of the protocol. Possible values are: • Enable - The entry in the Protocol Filter

Table is active, and the Filter Operation functionality applies to the protocol. • Disable - The entry in the Protocol Filter

Table is inactive, and the Filter Operation functionality does not apply to the protocol.

(55)

Adding a

Protocol

Entry

To add a protocol to the Protocol Filter Table:

1. Click Insert. A row is added to the Protocol Filter Table. 2. Enter the protocol’s number and name in the row’s fields.

3. Select a status for the protocol from the Status pull-down listbox in the row.

4. Click Apply.

Editing a

Protocol

Entry

To modify an entry in the Protocol Filter Table: 1. Select a row in the Protocol Filter Table. 2. Modify the information in the row. 3. Click Apply.

Deleting a

Protocol

Entry

To delete a protocol from the Protocol Filter Table: 1. Select a row in the Protocol Filter Table.

2. Click Delete. The protocol is deleted from the Protocol Filter Table. 3. Click Apply.

For more information on the User Interface, refer to “Managing Tables” on page 9.

Configuring Storm Filtering

The Storm Threshold tab of the Filtering dialog box enables you to configure maximum rates for broadcast and multicast packets. Packets that exceed the storm threshold are discarded. There are two types of storm filtering:

Address Filtering Interface Filtering

Address filtering sets a maximum rate of packets per second for traffic arriving from any source. A source is identified by its MAC address. Address filtering helps prevent the device from being overwhelmed by a host flooding the device with broadcast or multicast packets.

Interface filtering sets a maximum rate of packets per second for traffic arriving at a given interface on the device. This prevents the device from being overwhelmed by broadcast or multicast traffic, regardless of the traffic’s source.

(56)

To view the Storm Threshold tab of the Filtering dialog box: 1. Click .

Or

Select Tools >Filtering. The Filtering dialog box opens to the Protocol tab.

2. Click Storm Threshold. The Storm Threshold tab of the Filtering dialog box appears.

Figure 5-2. Filtering Dialog Box - Storm Tab

The following table provides a list of the fields in the Storm Threshold tab of the Filtering dialog box and their descriptions:

Table 5-2. Filtering - Storm Threshold Parameters

Field Description

Address The maximum number of broadcast or multicast packets per second that can be accepted from any source.

Possible values are:

• 0 - Storm filtering per source is disabled. • 1 - 9999 - The storm filtering per source

(57)

To configure a storm threshold for broadcast traffic, use the fields under the Broadcast heading.To configure a storm threshold for multicast traffic, use the fields under the Multicast heading.

To apply the changes to the storm filtering configuration, click Apply. For more information on the User Interface, refer to “Managing Tables” on page 9.

Ethernet The maximum number of broadcast or multicast packets per second that can be accepted by the Ethernet port.

Possible values are:

• 0 - Storm filtering per interface is disabled.

• 1 - 9999 - The storm filtering per interface threshold.

Wireless Port A The maximum number of broadcast or multicast packets per second that can be accepted by the wireless port in slot A. Possible values are:

• 0 - Storm filtering per interface is disabled.

• 1 - 9999 - The storm filtering per interface threshold.

Wireless Port B The maximum number of broadcast or multicast packets per second that can be accepted by the wireless port in slot B. Possible values are:

• 0 - Storm filtering per interface is disabled.

• 1 - 9999 - The storm filtering per interface threshold.

Table 5-2. Filtering - Storm Threshold Parameters (Continued)

(58)

Configuring TCP/UDP Port Filtering

The TCP/UDP Port tab of the Filtering dialog box enables you to control wireless user access by selectively blocking TCP/UDP protocols through the Wireless AP device. The following topics are discussed in this section:

Adding a Protocol Entry

Modifying a Protocol Entry

Deleting a Protocol Entry

To view the TCP/UDP Port tab of the Filtering dialog box: 1. Click .

Or

Select Tools >Filtering. The Filtering dialog box opens to the Protocol tab.

2. Click TCP/UDP Port. The TCP/UDP Port tab of the Filtering dialog box appears.

(59)

The following table provides a list of the fields in the TCP/UDP Port tab of the Filtering dialog box and their descriptions:

To activate the TCP/UDP Port filter, select an operation from the TCP/UDP Port Filter Enabling pull-down listbox.

Adding a

Protocol

Entry

To add a protocol to the TCP/UDP Port filter table:

1. Click Insert. A row is added to the TCP/UDP Port filter table. 2. Enter the TCP/UDP port’s number and name in the row’s fields. 3. Select a status for the TCP/UDP port from the Status pull-down

listbox in the row. 4. Click Apply.

Table 5-3. Filtering - TCP/UDP Port Parameters

Field Description

TCP/UDP Port Filter Enabling

Enables the port filtering for TCP/UDP protocols. Possible values are:

• Enable - The filter operation is active. • Disable - The filter operation is inactive,

allowing TCP/UDP protocols to pass through the Wireless AP device.

Protocol Name The protocol name.

Port Number The protocol’s destination port number.

Port Type The protocol’s port type. Possible values are: • TCP

• UDP

• Both (TCP/UDP).

Interface The interface to filter. Possible values are: • Wireless

• Ethernet • All interfaces • No interfaces

Status The status of the protocol filter. Possible values are:

• Enable - The protocol filter is active. • Disable - The protocol filter is inactive.

(60)

Modifying a

Protocol

Entry

To modify an entry in the TCP/UDP Port filter table: 1. Select a row in the TCP/UDP Port filter table. 2. Modify the information in the row.

3. Click Apply.

Deleting a

Protocol

Entry

To delete a protocol from the TCP/UDP Port filter table: 1. Select a row in the TCP/UDP Port filter table.

2. Click Delete. The protocol is deleted from the TCP/UDP Port filter table.

3. Click Apply.

To apply the changes to the device’s protocol filtering configuration, click

Apply.

For more information on the User Interface, refer to “Managing Tables” on page 9.

(61)

6

This chapter provides information on configuring and testing a Wireless Distribution System (WDS) between Avaya Wireless AP devices. It includes the following section:

Configuring the WDS - Instructions on configuring a wireless backbone with Wireless AP devices.

* Note: This operation is available when using an AP-4 wireless device, or an AP-3 wireless device with an Avaya 802.11b card.

Configuring the WDS

The WDS feature enables you to set up a wireless backbone using Avaya Wireless AP devices. Each wireless slot can be configured to connect to a maximum of 6 other Avaya Wireless AP devices using 6 virtual ports. WDS must be configured on each of the devices.

To view the WDS dialog box: Click .

Or

Select Configure >Wireless Distribution System. The WDS dialog box opens.

(62)

Figure 6-1. WDS Dialog Box

The WDS dialog box displays the current WDS configuration for the virtual ports on each slot containing a wireless card.

The following table provides a list of the fields in the WDS dialog box and their descriptions:

To modify a WDS entry:

1. Select a row in the WDS dialog box. 2. Modify the information in the row. 3. Click Apply.

For more information on the User Interface, refer to “Managing Tables” on page 9.

Table 6-1. WDS Parameters

Field Description

Port Index The number of the slot and virtual port for which the entry applies.

Partner MAC Address The MAC address of the Avaya Wireless AP device with which the virtual port

communicates.

Status The status of the WDS entry. Possible values are:

• Enable - The WDS entry is active. • Disable - The WDS entry is inactive.

Figure

Updating...

References

Updating...