User GuideQuidway WB2011 Wireless Bridge
ContentsviSNMP 5-7Administration 5-10System Log 5-13Wireless Distribution System (WDS) 5-17Bridge 5-18Spanning Tree Protocol (STP) 5-21Radio Interf
Command Line Interface6-206sntp-server ipThis command sets the IP address of the servers to which SNTP time requests are issued. Use the this command
System Clock Commands6-216Command Usage The time acquired from time servers is used to record accurate dates and times for log events. Without SNTP, t
Command Line Interface6-226Command Mode Global ConfigurationCommand Usage The command sets the system clock back one hour during the specified period.
SNMP Commands6-236Example SNMP CommandsControls access to this wireless bridge from management stations using the Simple Network Management Protocol (
Command Line Interface6-246Default Setting • public - Read-only access. Authorized management stations are only able to retrieve MIB objects.• private
SNMP Commands6-256snmp-server enable serverThis command enables SNMP management access and also enables this device to send SNMP traps (i.e., notifica
Command Line Interface6-266Command Mode Global ConfigurationCommand Usage The snmp-server host command is used in conjunction with the snmp-server ena
Flash/File Commands6-276ExampleFlash/File CommandsThese commands are used to manage the system code or configuration files.bootfileThis command specif
Command Line Interface6-286Examplecopy This command copies a boot file, code image, or configuration file between the wireless bridge’s flash memory a
Flash/File Commands6-296Example The following example shows how to upload the configuration settings to a file on the TFTP server:The following exampl
Contentsviipassword 6-13ip http port 6-14ip http server 6-14show system 6-15show version 6-15System Logging Commands 6-16logging on 6-16logging
Command Line Interface6-306dirThis command displays a list of files in flash memory.Command Mode ExecCommand Usage File information is shown below:Exa
WDS Commands6-316wds mac-addressThis command enters wireless MAC addresses in the WDS forwarding table for each node in the wireless bridge network.Sy
Command Line Interface6-326show wdsThis command displays the current entries in the WDS forwarding table.Syntaxshow wdsCommand ModeExecExampleOutdoor
Bridge Commands6-336Bridge CommandsThe commands described in this section are used to set the MAC address table aging time and spanning tree parameter
Command Line Interface6-346bridge stp-bridge spanning-treeUse this command to enable the Spanning Tree Protocol globally for the wireless bridge. Use
Bridge Commands6-356Command Usage This command sets the maximum time (in seconds) the root device will wait before changing states (i.e., discarding t
Command Line Interface6-366Default Setting 20 secondsCommand Mode Global ConfigurationCommand Usage This command sets the maximum time (in seconds) a
Bridge Commands6-376bridge stp-port path-costUse this command to configure the spanning tree path cost for the specified port. Use the no form to rest
Command Line Interface6-386Command Usage • This command defines the priority for the use of a port in the Spanning Tree Protocol. If the path cost for
Bridge Commands6-396bridge stp-port spanning-disabledThis command disables the Spanning Tree Protocol for the specified interface. Use the no form to
Contentsviiibridge stp-port spanning-disabled 6-39show bridge 6-39Filtering Commands 6-40filter ap-manage 6-40filter ethernet-type enable 6-41fil
Command Line Interface6-406ExampleFiltering CommandsThe commands described in this section are used to control access to the management interface from
Filtering Commands6-416Command ModeGlobal ConfigurationExamplefilter ethernet-type enableThis command checks the Ethernet type on all incoming and out
Command Line Interface6-426Command ModeGlobal ConfigurationCommand UsageUse the filter ethernet-type enable command to enable filtering for Ethernet t
Ethernet Interface Commands6-436Ethernet Interface CommandsThe commands described in this section configure connection parameters for the Ethernet int
Command Line Interface6-446Command Mode Global ConfigurationCommand Usage The primary and secondary name servers are queried in sequence. ExampleThis
Ethernet Interface Commands6-456ExampleRelated Commandsip dhcp (6-45)ip dhcp This command sets the IP address for the currently selected VLAN interfac
Command Line Interface6-466shutdown This command disables the Ethernet interface. To restart a disabled interface, use the no form.Syntax shutdownno s
Wireless Interface Commands6-476Example Wireless Interface CommandsThe commands described in this section configure connection parameters for the wir
Command Line Interface6-486interface wirelessThis command enters wireless interface configuration mode.Syntaxinterface wireless aa - 802.11a radio int
Wireless Interface Commands6-496speedThis command configures the maximum data rate at which remote bridges can connect to the local bridge.Syntaxspeed
ContentsixAppendix C: Cables and Pinouts C-1Twisted-Pair Cable Assignments C-110/100BASE-TX Pin Assignments C-1Straight-Through Wiring C-2Crossove
Command Line Interface6-506ExampleturboThis command sets the wireless bridge to an enhanced mode (not regulated in IEEE 802.11a) that provides a highe
Wireless Interface Commands6-516Command Usage The beacon signals allow remote bridges to maintain contact with the local wireless bridge. They may als
Command Line Interface6-526fragmentation-length This command configures the minimum packet size that can be fragmented when passing through the wirele
Wireless Interface Commands6-536Command Usage • If the threshold is set to 0, the wireless bridge never sends RTS signals. If set to 2347, the wireles
Command Line Interface6-546encrypting all sensitive, nonclassified information. Because of its strength, and resistance to attack, AES is also being i
Wireless Interface Commands6-556Command Usage • To enable WEP encryption, use the encryption command to specify the key type and length, and use the k
Command Line Interface6-566Example transmit-powerThis command adjusts the power of the radio signals transmitted from the wireless bridge.Syntaxtransm
Wireless Interface Commands6-576Example show interface wirelessThis command displays the status for the wireless interface.Syntaxshow interface wirele
Command Line Interface6-586VLAN CommandsThe wireless bridge can enable the support of VLAN-tagged traffic passing between the wireless interface and t
VLAN Commands6-596ExampleRelated Commandsnative-vlanid (6-59)native-vlanid This command configures the native VLAN ID for the wireless bridge. Syntaxn
Contentsx
Command Line Interface6-606
A-1Appendix A: TroubleshootingCheck the following items before you contact local Technical Support.1. If wireless bridge units do not associate with e
TroubleshootingA-2A5. If you forgot or lost the password:• Contact Technical Support.
B-1Appendix B: SpecificationsGeneral SpecificationsMaximum Channels802.11a:US & Canada: 8 (normal mode), 3 (turbo mode)Japan: 4 (normal mode), 1 (
SpecificationsB-2BHumidity15% to 95% (non-condensing)EMC Compliance (Class A)FCC Class A (US)Radio Signal CertificationFCC part 15 15.407(b)SafetyCSA/
C-1Appendix C: Cables and PinoutsTwisted-Pair Cable AssignmentsFor 10/100BASE-TX connections, a twisted-pair cable must have two pairs of wires. Each
Cables and PinoutsC-2Cconnecting to devices that support automatic MDI/MDI-X pinout configuration, you can use either straight-through or crossover ca
8-Pin DIN Connector PinoutC-3Cconnecting supports automatic MDI/MDI-X operation, you can use either “straight-through” or “crossover” cable.8-Pin DIN
Cables and PinoutsC-4C8-Pin DIN to RJ-45 Cable WiringTo construct an extended Ethernet cable to connect from the power injector’s RJ-45 Output port
Glossary-1Glossary10BASE-TIEEE 802.3 specification for 10 Mbps Ethernet over two pairs of Category 3 or better UTP cable.100BASE-TXIEEE 802.3u specifi
1-1Chapter 1: Introduction• WB2011– Provides only external antenna options and is designed to operate as the “Master” bridge in point-to-multipoint co
GlossaryGlossary-2EncryptionData passing between the access point and clients can use encryption to protect from interception and evesdropping.Etherne
Glossary-3GlossaryService Set Identifier (SSID)An identifier that is attached to packets sent over the wireless LAN and functions as a password for jo
Index-1AAES, configuring 5-28, 5-30, 6-53Bbeaconinterval 5-26, 6-50rate 5-26, 6-51BPDU 5-21Ccableassignments C-1crossover C-2straight-through C-2chann
Index-2IndexMmaximum data rate 5-26, 6-49802.11a interface 5-26, 6-49MDI, RJ-45 pin configuration 1-3OOFDM 1-1operating frequency B-1Ppackage checklis
Index-3IndexWWEP 5-28, 6-53configuring 5-28, 6-53shared key 5-29, 6-54Wired Equivalent Protection See WEP
Index-4Index
WB2011E102004-R01
Introduction1-21Inform your dealer if there are any incorrect, missing or damaged parts. If possible, retain the carton, including the original packin
Hardware Description1-31External Antenna Options (WB2011 Only)The WB2011 Master bridge unit does not include an integrated antenna, but provides vario
Introduction1-41However, when connecting the access point to a workstation or other device that does not have MDI-X ports, you must use crossover twis
System Configuration1-51System ConfigurationSystem ComponentsAt each location where a unit is installed, it must be connected to the local network usi
Introduction1-61Features and Benefits data rate using integrated high-gain 17 dBi antennas• Maximum data rate up to 108 Mbps• Outdoor weatherproof des
System Defaults1-71• Scans all available channels and selects the best channel and data rate based on the signal-to-noise ratio• Manageable through an
Introduction1-81System Logging Syslog DisabledLogging Host DisabledLogging Console DisabledIP Address / Host Name 0.0.0.0Logging Level InformationalLo
2-1Chapter 2: Bridge Link PlanningThe Outdoor 5 GHz Wireless Bridge supports fixed point-to-point or point-to-multipoint wireless links. A single link
Bridge Link Planning2-22Radio Path PlanningAlthough the wireless bridge uses IEEE 802.11a radio technology, which is capable of reducing the effect of
Radio Path Planning2-32When planning the radio path for a wireless bridge link, consider these factors:• Avoid any partial line-of-sight between the a
Bridge Link Planning2-42Note that to avoid any obstruction along the path, the height of the object must be added to the minimum clearance required fo
Radio Path Planning2-52• Avoid placing the wireless bridge too close to any metallic, reflective surfaces, such as roof-installed air-conditioning equ
Bridge Link Planning2-62maximum wind velocity and direction at the site and be sure that any supporting structure, such as a pole, mast, or tower, is
3-1Chapter 3: Hardware InstallationBefore mounting antennas to set up your wireless bridge links, be sure you have selected appropriate locations for
User Guide GuideOutdoor 5 GHz Wireless BridgeIEEE 802.11a Wireless Bridge
Hardware Installation3-232. Place the U-shaped part of the bracket around the pole and tighten the securing nut just enough to hold the bracket to the
Mount the Unit3-33Mounting on Larger Diameter PolesIn addition, there is a method for attaching the pole-mounting bracket to a pole that is 2 to 5 inc
Hardware Installation3-432. Position the bracket in the intended location and mark the position of the three mounting screw holes.3. Drill three holes
Connect Cables to the Unit3-53Connect Cables to the Unit1. Attach the Ethernet cable to the Ethernet port on the wireless bridge. Note: The Ethernet c
Hardware Installation3-633. Insert the power cable plug directly into the standard AC receptacle on the power injector.4. Plug the other end of the po
Align Antennas3-73The RSSI connector provides an output voltage between 0 and 3.28 VDC that is proportional to the received radio signal strength. The
Hardware Installation3-832. Pan the antenna horizontally back and forth by rotating the mounting bracket around the pole while checking the RSSI volta
4-1Chapter 4: Initial ConfigurationThe wireless bridge offers a variety of management options, including a web-based interface, a command line interfa
Initial Configuration4-24Initial Configuration StepsSetting the Country Code – Regulations for wireless products differ from country to country. Setti
Using the Web-based Management Setup Wizard4-34Using the Web-based Management Setup WizardThere are only a few basic steps you need to complete to set
WB2011F1.1.1.0 E102004-R01
Initial Configuration4-44Launching the Setup Wizard – To perform initial configuration, click Setup Wizard on the home page, then click on the [Next]
Using the Web-based Management Setup Wizard4-541. Radio Channel – You must enable radio communications for the 802.11a radio and set the operating cha
Initial Configuration4-642. IP Configuration – Either enable or disable (Dynamic Host Configuration Protocol (DHCP) for automatic IP configuration. If
Using the Web-based Management Setup Wizard4-743. Security – Enable Wired Equivalent Privacy (WEP) encryption and set an encryption key. 4. Click Fini
Initial Configuration4-84
5-1Chapter 5: System ConfigurationBefore continuing with advanced configuration, first complete the initial configuration steps described in Chapter 4
System Configuration5-25System IdentificationThe system information parameters for the wireless bridge can be left at their default settings. However,
Advanced Configuration5-35System Name – An alias for the wireless bridge, enabling the device to be uniquely identified on the network. (Default: Outd
System Configuration5-45By default, the wireless bridge will be automatically configured with IP settings from a Dynamic Host Configuration Protocol (
Advanced Configuration5-55If you have management stations, DNS, or other network servers located on another subnet, type the IP address of the default
iCompliancesFederal Communication Commission Interference StatementThis equipment generates, uses, and can radiate radio frequency energy and, if not
System Configuration5-65Filter ControlThe wireless bridge can employ VLAN tagging support and network traffic frame filtering to control access to net
Advanced Configuration5-75CLI Commands for VLAN Support – From the global configuration mode use the native-vlanid command to set the default VLAN ID
System Configuration5-85SNMP – Enables or disables SNMP management access and also enables the wireless bridge to send SNMP traps (notifications). SNM
Advanced Configuration5-95CLI Commands for SNMP – Use the snmp-server enable server command from the global configuration mode to enable SNMP. To set
System Configuration5-105AdministrationChanging the PasswordManagement access to the web and CLI interface on the wireless bridge is controlled throug
Advanced Configuration5-115Upgrading FirmwareYou can upgrade new wireless bridge software from a local file on the management workstation, or from an
System Configuration5-125Firmware Upgrade Local – Downloads an operation code image file from the web management station to the wireless bridge using
Advanced Configuration5-135be used to check that the new file is present in the wireless bridge file system. To run the new software, use the reset bo
System Configuration5-145Enabling System LoggingThe wireless bridge supports a logging process that can control error messages saved to memory or sent
Advanced Configuration5-155command to set the facility-type number to use on the Syslog server. To view the current logging settings, use the show log
iiSafety CompliancePower Cord SafetyPlease read the following safety information carefully before installing the wireless bridge:Warning: Installatio
System Configuration5-165indicate the number of hours your time zone is located before (east) or after (west) UTC.Enable Daylight Saving – The wireles
Advanced Configuration5-175Wireless Distribution System (WDS)The IEEE 802.11a standard defines a WIreless Distribution System (WDS) for connections be
System Configuration5-185MAC Address – The physical layer address of the wireless bridge unit at the other end of the wireless link. (12 hexadecimal d
Advanced Configuration5-195Bridge Aging Time – Changes the aging time for entries in the dynamic address table:• Ethernet: The time after which a lear
System Configuration5-205CLI Commands for Bridging – The following example shows how to set the MAC address aging time for the wireless bridge.Outdoor
Advanced Configuration5-215Spanning Tree Protocol (STP)The Spanning Tree Protocol (STP) can be used to detect and disable network loops, and to provid
System Configuration5-225Forward Delay – The maximum time (in seconds) this device waits before changing states (i.e., discarding to learning to forwa
Advanced Configuration5-235Priority – Defines the priority used for this port in the Spanning Tree Protocol. If the path cost for all ports on a switc
System Configuration5-245CLI Commands for STP – The following example configures spanning tree paramters for the bridge and wireless port 5. Outdoor B
Radio Interface5-255Radio InterfaceThe IEEE 802.11a radio interface includes configuration options for radio signal characteristics and wireless secur
iiiVeuillez lire à fond l'information de la sécurité suivante avant d'installer le wireless bridge:AVERTISSEMENT: L’installation et la dépos
System Configuration5-265Note: In normal mode, the wireless bridge provides a channel bandwidth of 20 MHz, and supports the maximum number of channels
Radio Interface5-275the wireless bridge will save all broadcast/multicast frames for the Basic Service Set (BSS) and forward them after every second b
System Configuration5-285SecurityWired Equivalent Privacy (WEP) and Advanced Encryption Standard (AES) are implemented in the wireless bridge to preve
Radio Interface5-295Setting up IEEE 802.11 Wired Equivalent Privacy (WEP) shared keys enables the wireless bridge to prevent unauthorized access to th
System Configuration5-305Advanced Encryption Standard (AES) AES has been designated by the National Institute of Standards and Technology as the succe
Radio Interface5-315• Alphanumeric: Enter keys as an alphanumeric string using between 8 and 31 characters.Note: For each wireless port link (1 to 16)
System Configuration5-325CLI Commands for AES Security – From the 802.11a interface configuration mode, use the encryption command to enable AES encry
Status Information5-335Status InformationThe Status page includes information on the following items:Wireless Bridge StatusThe AP Status window displa
System Configuration5-345• IP Default Gateway: IP address of the gateway router between this device and management stations that exist on other networ
Status Information5-355Station StatusThe Station Status window shows remote wireless bridges currently associated with the local wireless bridge.The S
ivBitte unbedingt vor dem Einbauen des wireless bridges die folgenden Sicherheitsanweisungen durchlesen:WARNUNG: Die Installation und der Ausbau des
System Configuration5-365Event LogsThe Event Logs window shows the log messages generated by the wireless bridge and stored in memory.The Event Logs t
6-1Chapter 6: Command Line InterfaceUsing the Command Line InterfaceAccessing the CLIWhen accessing the management interface for the wireless bridge v
Command Line Interface6-26Entering CommandsThis section describes how to enter CLI commands.Keywords and ArgumentsA CLI command is a series of keyword
Entering Commands6-36Interface). You can also display a list of valid keywords for a specific command. For example, the command “show ?” displays a li
Command Line Interface6-46Understanding Command ModesThe command set is divided into Exec and Configuration classes. Exec commands generally display i
Entering Commands6-56change to “Outdoor Bridge(if-ethernet)#,” or “Outdoor Bridge(if-wireless a)” indicating that you have access privileges to the as
Command Line Interface6-66Command GroupsThe system commands can be broken down into the functional groups shown below.The access mode shown in the fol
General Commands6-76configureThis command activates Global Configuration mode. You must enter this mode to modify most of the settings on the wireless
Command Line Interface6-86Example This example shows how to return to the Exec mode from the Interface Configuration mode, and then quit the CLI sessi
General Commands6-96resetThis command restarts the system or restores the factory default settings.Syntax reset <board | configuration> • board
vContentsChapter 1: Introduction 1-1Package Checklist 1-1Hardware Description 1-2Component Description 1-2System Configuration 1-5System Componen
Command Line Interface6-106show lineThis command displays the console port’s configuration settings.Command Mode ExecExampleThe console port settings
System Management Commands6-116countryThis command configures the wireless bridge’s country code, which identifies the country of operation and sets t
Command Line Interface6-126Default Setting US - for units sold in the United States99 (no country set) - for units sold in other countriesCommand Mode
System Management Commands6-136Default Setting Outdoor BridgeCommand Mode Global ConfigurationExample usernameThis command configures the user name fo
Command Line Interface6-146Example ip http portThis command specifies the TCP port number used by the web browser interface. Use the no form to use th
System Management Commands6-156Related Commandsip http port (6-14)show systemThis command displays basic system configuration settings.Default Setting
Command Line Interface6-166System Logging CommandsThese commands are used to configure system logging on the wireless bridge.logging onThis command co
System Logging Commands6-176logging hostThis command specifies a syslog server host that will receive logging messages. Use the no form to remove sysl
Command Line Interface6-186logging levelThis command sets the minimum severity level for event logging.Syntaxlogging level <Emergency | Alert | Cri
System Clock Commands6-196Command Usage The command specifies the facility type tag sent in syslog messages. (See RFC 3164.) This type has no effect o
Commentaires sur ces manuels