Summary of Contents for HP ProCurve 530 NA (J8986A)
Page 1
Management and Configuration Guide ProCurve Wireless Access Point 530 www.procurve.com...
Page 3
ProCurve Wireless Access Point 530 Management and Configuration Guide...
Page 4
Publication Number The only warranties for HP products and services are set forth in the express warranty statements accompanying 5991-2193 such products and services. Nothing herein should be December 2008 construed as constituting an additional warranty.
Page 9
CLI: Setting the Radio Working Mode ......6-11 Configuring the Radio Channel and Other Basic Settings ..6-12 Web: Configuring Basic Radio Settings .
Getting Started Overview Overview This Management and Configuration Guide is intended to support the following access points: ■ ProCurve Wireless Access Point 530 NA (J8986A) ProCurve Wireless Access Point 530 WW (J8987A) ■ This guide describes how to use the command line interface (CLI) and Web browser interface to configure, manage, and monitor access point operation.
Getting Started Overview Command Prompts In the default configuration, your access point displays the following CLI prompt: ProCurve Access Point 530# Screen Examples Figures containing examples of screen text and command output look like this: ProCurve Access Point 530# show version Image Software Version WA.02.00.0412 Boot Software Version...
Getting Started Overview To view and download a copy of the latest release notes for your access point, “Getting Documentation from the Web” on page 1-5. Getting Documentation from the Web Go to the ProCurve Networking Web site at http://www.procurve.com/manuals Click on the name of the product for which you want documentation.
If you just want to give the access point an IP address so that it can commu- nicate on your network, HP recommends that you use the CLI to quickly configure IP addressing. To do so, do one of the following: Log in to the CLI interface using the default username and password (“admin and admin”).
Getting Started Need Just a Quick Start? To Set Up and Install the Access Point in Your Network I m p o r t a n t ! Use the Installation and Getting Started Guide shipped with your access point for the following: ■...
Page 28
Getting Started Need Just a Quick Start? — This page is intentionally unused. —...
Selecting a Management Interface Overview Overview This chapter describes the following: Access Point management interfaces ■ ■ Advantages of using each interface type...
Selecting a Management Interface Understanding Management Interfaces Understanding Management Interfaces The Access Point 530 management interfaces enable you to reconfigure the access point and to monitor its status and performance. Interface types include: ■ CLI—a command line interface offering the full set of access point commands through the VT-100/ANSI console built into the access point.
Selecting a Management Interface Advantages of Using the CLI Advantages of Using the CLI Manager Exec Level ProCurve Access Point 530# Global Configuration Level ProCurve Access Point 530(config)# Interface Configuration Levels ProCurve Access Point Context-specific configurations, such as (ethernet, wds1, radio1, 530(<interface>)# radio1-wlan1).
Selecting a Management Interface Advantages of Using the ProCurve Access Point 530 Browser Interface Advantages of Using the ProCurve Access Point 530 Browser Interface Figure 2-2. Example of the ProCurve Access Point 530 Browser Interface ■ Easy access to the access point from anywhere on the network. ■...
Using the Command Line Interface (CLI) Overview Overview The Command Line Interface (CLI) is a text-based command interface for configuring and monitoring the access point. The CLI gives you access to the access point’s full set of commands while providing the same password protection that is used in the Web browser interface.
Direct Console Access To connect a console directly to the access point, use a null-modem cable or an HP serial cable, part number 5184-1894 (shipped with many HP ProCurve switches) Connect the serial cable between a VT-100 terminal or a PC terminal emulator and the access point’s Console port.
Using the Command Line Interface (CLI) Accessing the CLI [Enter] When correctly connected to the access point, press to initiate the console session. For more information on connecting to the access point’s Console port, refer to the Installation and Getting Started Guide. N o t e The default Static IP address is 192.168.1.10.
CLI command modes. C a u t i o n HP strongly recommends that you configure a Manager password. If a Manager password is not configured, the access point is not password- protected, and anyone having in-band or out-of-band access to the access point may be able to compromise access point and network security.
Using the Command Line Interface (CLI) Using the CLI Logging In When you log onto the access point CLI, you will be prompted to enter an account user name (the default is admin). After entry of the user name, you will be prompted for the password. The default password is admin.
Using the Command Line Interface (CLI) Using the CLI Command Levels 1. Manager Exec Level 2. Global Configuration Level 3. Context Configuration Level Interface & WDS Levels Radio Level: WLAN Sub Configuration Figure 3-2. Access Sequence for Command Levels Configuration commands on the Access Point 530 are grouped into three levels: Manager Exec Level Manager Exec level allows you to examine the current configuration, perform...
Using the Command Line Interface (CLI) Using the CLI Context-Specific Configuration Levels The Context Configuration level gives access to specific groups of commands depending on whether you are configuring the Ethernet interface, a WDS interface, a Radio, or a WLAN. Additionally, all the commands available at the lower Manager Exec and Global Configuration levels are available.
Using the Command Line Interface (CLI) Using the CLI Moving Between Command Levels Table 3-2. Moving Between Command Levels Change in Levels Example of Prompt, Command, and Result Manager Exec ProCurve Acess Point 530# config ProCurve Acess Point 530(config)# Global configuration Global Configuration ProCurve Acess Point 530(config)# interface to a...
Using the Command Line Interface (CLI) Using the CLI Options for Getting Help in the CLI At any command level in the AP530 CLI you can: ■ Display all commands available at that level Display the completion of a command you have started to type ■...
Page 46
Using the Command Line Interface (CLI) Using the CLI Typing ? at the Global Configuration level produces this listing: ProCurve Access Point 530(config)# ? ap-authentication Configure username/password this access point uses to au thenticate to the network. buttons Enable/disable the ability to clear the password(s) and/ or configuration(s) via the buttons on this device.
Using the Command Line Interface (CLI) Using the CLI Typing ? at the Context Configuration level produces similar results, depending on the context. If - - MORE - - appears below the help list, then there are more commands to be displayed.
Using the Command Line Interface (CLI) Using the CLI Displaying Available Command Options You can display a reminder of the options available for the current command by entering "?" or the [Tab] key in place of the next option. For example, to see the command options for configuring SNMP: ProCurve Access Point 530(config)# snmp-server ? community...
Using the Command Line Interface (CLI) CLI Control and Editing CLI Control and Editing Keystrokes Function [Ctrl] [A] Jumps to the first character of the command line. [Ctrl] [B] or [<] Moves the cursor back (to the left) one character. [Ctrl] [C] Terminates a task if one is running and displays the command line.
Page 50
Using the Command Line Interface (CLI) CLI Control and Editing — This page is intentionally unused. — 3-16...
Using the ProCurve Web Browser Interface Overview Overview The Access Point 530 Web browser interface lets you easily access the access point from a browser-based PC on your network. This chapter covers the following: Starting a Web browser interface session ■...
Using the ProCurve Web Browser Interface Starting a Web Browser Interface Session with the Access Point Starting a Web Browser Interface Session with the Access Point You can start a Web browser session using a standalone Web browser on a network connection from a PC in the following ways: •...
Page 55
Using the ProCurve Web Browser Interface Starting a Web Browser Interface Session with the Access Point N o t e Access point management can be limited to access from the Ethernet inter- “Setting Up Filter Control” on page 5-55. face. For more on this feature, see Type the IP address (or DNS name) of the access point in the browser Location .
Using the ProCurve Web Browser Interface Description of the Web Interface Description of the Web Interface Subjects covered in this section include: The Home Page ■ ■ The Support Page ■ Online Help The Home Page The home page is the entry point for the Web browser interface. The following figure identifies the various parts of the screen.
Using the ProCurve Web Browser Interface Description of the Web Interface Support Window Clicking on the Support option in the upper-right corner of any of the Web browser interface screens displays a pop-up window displaying links to online support options. The support page provides key information regarding your access point, including links to white papers, software updates, and more.
Using the ProCurve Web Browser Interface Description of the Web Interface Using the Help in the Browser Interface Clicking on the Help option in the upper-right corner of any of the Web browser interface screens displays a pop-up window displaying details about the page you are viewing.
Using the ProCurve Web Browser Interface Web Interface Screens Web Interface Screens The four menu sashes at the left side of the Web interface contain the four main screen groups: Device Information ■ ■ Network Setup Management ■ Special Features. ■...
Using the ProCurve Web Browser Interface Web Interface Screens Device Information Group The Device Information sash is the first logical group available on the Web- interface menu. This sash provides access to the following screens: • Device Information (Access Point 530 Home Page) •...
Using the ProCurve Web Browser Interface Web Interface Screens Device Information Summary The Device Information summary screen is primarily informational, but also serves as the configuration screen for basic system information (as described “Web: Setting the System Name, Location, and Contact” on page 5-15).
Using the ProCurve Web Browser Interface Web Interface Screens Wireless Stations Screen Accessed through the Wireless Stations option on the Device Information sash, the Wireless Stations screen displays radio and network station status details. Figure 4-7. The Wireless Stations Screen The Wireless Stations screen displays client stations associated with a partic- ular access point.
Page 63
Using the ProCurve Web Browser Interface Web Interface Screens when the access point is using "wpa-psk" security on the WLAN. If the WLAN is set to “static-wep” or “no-security”, this parameter displays “n/ a” as it does not apply. ■ Received Packets: Indicates total packets received by this access point.
Using the ProCurve Web Browser Interface Web Interface Screens AP/LAN Statistics Screen Accessed through the AP/LAN Statistics option on the Device Information sash, the AP/LAN Statistics screen displays transmit/receive details. Figure 4-8. The AP/LAN Statistics Screen The AP/LAN Statistics screen displays the following information: ■...
Using the ProCurve Web Browser Interface Web Interface Screens Wireless Statistics Screen Accessed through the Wireless Statistics option on the Device Information sash, the Wireless Statistics screen displays transmit/receive details. Figure 4-9. The Wireless Statistics Screen The Wireless Statistics screen displays dual radio information: ■...
Page 66
Using the ProCurve Web Browser Interface Web Interface Screens Receive Total Packets: Indicates total packets received over the radio ■ or WDS link. ■ Transmit Total Bytes: Indicates total bytes sent over the radio or WDS link. Receive Total Bytes: Indicates total bytes received over the radio or ■...
Using the ProCurve Web Browser Interface Web Interface Screens Event Log Screen Accessed through the Wireless Statistics option on the Device Information sash, the Wireless Statistics screen displays transmit/receive details. Figure 4-10. The Event Log Screen The Event Log tab displays the following information: ■...
Using the ProCurve Web Browser Interface Web Interface Screens Network Setup Group The Network Setup sash is the second logical group available on the Web- interface menu. Once accessed, it defaults to the Network Setup screen. This group provides access to the following screens: •...
Using the ProCurve Web Browser Interface Web Interface Screens Network Setup Summary Accessed through the Network Setup sash, the Network Setup screen displays the Ethernet and radio features within the network setup group. Figure 4-11. The Network Setup Summary Screen The Network Setup screen summarizes: Ethernet: details basic Ethernet parameters.
Using the ProCurve Web Browser Interface Web Interface Screens Management Group The Management sash is the third logical group available on the Web interface menu. Once accessed, it defaults to the Management screen. This group provides access to the following screens: •...
Using the ProCurve Web Browser Interface Web Interface Screens Management Summary Accessed through the Management sash, the Management screen displays a summary of access point management settings. Figure 4-12. The Management Summary Screen The Management screen summarizes: Software Version: Displays the version of the running software. ■...
Using the ProCurve Web Browser Interface Web Interface Screens Special Features Group The Special Features sash is the fourth logical group available on the Web interface menu. Once accessed, it defaults to the Special Features screen. This group provides access to the following screens: •...
Using the ProCurve Web Browser Interface Web Interface Screens Special Features Summary Accessed through the Special Features sash, the Special Features screen displays a summary of special feature statistics. Figure 4-13. The Special Features Summary Screen The Special Features screen summarizes: QoS: Indicates if Quality of Service packet prioritization (also referred to ■...
Using the ProCurve Web Browser Interface Tasks for Your First ProCurve Web Browser Interface Session Tasks for Your First ProCurve Web Browser Interface Session The ProCurve AP530 Installation and Getting Started Guide includes instructions for a minimal initial configuration using the CLI on a console attached to the access point.
Page 75
Using the ProCurve Web Browser Interface Tasks for Your First ProCurve Web Browser Interface Session N o t e If you want security beyond that achieved with user names and passwords, you can disable access to the either the or the CLI and limit management access to, for example, only the Web browser interface, only the CLI via the “Web: Configuring Access console port, Telnet, or SSH.
Using the ProCurve Web Browser Interface Tasks for Your First ProCurve Web Browser Interface Session The Manager user name and password control access to both the CLI and the Web browser management interfaces for the access point. You are prompted to supply the user name and password every time you try to access the access point through either of these interfaces.
Page 77
Using the ProCurve Web Browser Interface Tasks for Your First ProCurve Web Browser Interface Session Figure 4-15. Setting SNMP Community Names To Change A Default SNMP Community Name: Click Management > SNMP and select the Settings tab. To activate the SNMP feature on the access point, click SNMPv1/v2c Enabled. To establish a public read-only SNMP community, type a name text string to replace the default community name (public) in the Community Name (RO) field.
Using the ProCurve Web Browser Interface Tasks for Your First ProCurve Web Browser Interface Session Setting the Radio Mode and Channel The access point’s radio channel settings are limited by local regulations, which determine the number of channels that are available. You can manually set the access point’s radio channel or allow it to automatically select an unoccupied channel.
Using the ProCurve Web Browser Interface Tasks for Your First ProCurve Web Browser Interface Session To Set Radio Mode and Channel: Select Radio. Using the Radio drop-down, select the radio (1 or 2) you want to configure. To enable the radio, click the Status On button. Select the Mode (default is IEEE 802.11g).
Page 80
Using the ProCurve Web Browser Interface Tasks for Your First ProCurve Web Browser Interface Session To Set IP Parameters i: Select Ethernet. To set a dynamic connection, select DHCP in the Connection Type drop- down. To set a manual connection, select Static IP in the Connection Type drop- down.
Using the ProCurve Web Browser Interface Tasks for Your First ProCurve Web Browser Interface Session Setting WLAN SSID and Security Settings Wireless stations can read the SSIDs from the access point’s beacon frame. If the “closed system” option is selected when configuring the access point, the SSID is not broadcast in the beacon frame.
Page 82
Using the ProCurve Web Browser Interface Tasks for Your First ProCurve Web Browser Interface Session Figure 4-18. The WLANs Screen 4-32...
Page 83
Using the ProCurve Web Browser Interface Tasks for Your First ProCurve Web Browser Interface Session Figure 4-19. Configuring WLAN Security To Configure WEP Security: Select WLANs. Check the Radio 1 box, and the SSID name and VLAN ID fields populate with defaults.
Page 84
Using the ProCurve Web Browser Interface Tasks for Your First ProCurve Web Browser Interface Session [Update] 12. Click to save these Security settings. WEP is the security protocol initially specified in the IEEE 802.11 standard for wireless communications. While WEP provides a margin of security for environments with light network traffic, it is not sufficient for enterprise use where highly-sensitive data is transmitted.
Page 86
General System Configuration Contents Overview ............5-4 AP Network Configuration Checklist .
Page 87
General System Configuration CLI: Setting Logging Parameters ......5-46 Configuring the Time (SNTP) ........5-48 Web: Setting SNTP Parameters .
General System Configuration Overview Overview This Chapter describes how to: Secure your access point ■ Modify system management passwords ■ ■ Set management access controls ■ View and modify access point system information Configure IP, SNMP, SNTP, RADIUS Accounting, and VLAN parameters ■...
General System Configuration AP Network Configuration Checklist AP Network Configuration Checklist In setting up your Access Point for network installation, this manual covers many of the tasks that should be considered for proper security and manage- ment. Each of these tasks are detailed in their respective sections, however, this summary is provided as an aid for establishing your network.
(see C a u t i o n HP strongly recommends that you configure a new Manager password and not use the default. If a Manager password is not configured, then the access point is not password-protected, and anyone having in-band or out-of-band access to the access point may be able to compromise access point and network security.
Page 91
General System Configuration Modifying Management Passwords Figure 5-1. Creating a Password To Create a Password: Click Management > AP Access and select the Password tab. In the Current Password field, enter the current password. In the New Password field, enter a new password. Note: The password is case sensitive and must be at least 1 character and at most 32 characters long.
General System Configuration Modifying Management Passwords CLI: Setting the Management Password CLI Commands Used in This Section Command Syntax CLI Reference Page password manager <password> 9-21 This example shows how to create a manager password. C a u t i o n If you modify the password through CLI, you also modify the Web password.
General System Configuration Setting Management Access Controls Setting Management Access Controls To provide more security for the access point, management interfaces that are not required can be disabled. This includes the Web, Telnet, and Secure Shell (SSH), as well as the serial console port and Reset button. N o t e The access point’s serial port and Reset button cannot be disabled at the same time.
General System Configuration Setting Management Access Controls Web: Configuring Access Controls The AP Access screen configures access to management interfaces and button. The Web interface enables you to modify these parameters: CLI Access ■ Serial Interface: Enables or disables management access through the access point’s serial console port.
Page 95
General System Configuration Setting Management Access Controls Figure 5-2. Configuring Access Controls To Configure Access Control Settings: Click Management > AP Access and select the Access tab. As required, enable or disable the serial, Telnet, or SSH interfaces. N o t e If using SSH for secure access to the CLI over a network connection, you may want to disable the Telnet server.
General System Configuration Setting Management Access Controls CLI: Configuring Management Controls CLI Commands Used in This Section Command Syntax CLI Reference Page [no] console 9-23 [no] ssh 9-24 [no] telnet 9-23 show console 9-27 show system 9-27 The following example shows how to enter management configuration con- text and control access to the Access Point device.
Page 97
General System Configuration Setting Management Access Controls The following example demonstrates the no ssh command to disable the serial SSH port, and the show ssh command to display the current status. ProCurve Access Point 530# configure ProCurve Access Point 530(config)# no ssh ProCurve Access Point 530(config)# show ssh SSH Status Disabled...
Page 98
To display the current status for management access controls, use the show system command. ProCurve Access Point 530# show system Serial Number TW633VV01D System Name HP-AP-200 System Up Time 23 hours 17 mins 11 secs System Location 2FS17 System Country Code Software Version WA.02.00.0412...
General System Configuration Modifying System Information Modifying System Information The access point’s system name can be left at its default setting. However, modifying this parameter can help you to more easily distinguish one device from another in your network. N o t e You should also set the applicable WLANs (BSS/SSID) to identify the wireless “Configuring the Radio”...
Page 100
General System Configuration Modifying System Information Figure 5-3. Configuring System Information To Configure System Information: Select Device Information in the navigation bar. Type a name to uniquely identify the access point in the System Name field. Type a location to identify where the access point it located in the Location field.
General System Configuration Modifying System Information CLI: Setting the System Name CLI Commands Used in This Section Command Syntax CLI Reference Page hostname <hostname> 9-19 show system-information 9-27 The following example shows using the hostname <hostname> syntax to set the name of the system. N o t e Enter management commands, one per line.
Page 102
General System Configuration Modifying System Information ProCurve Access Point 530# show system-information Serial Number TW633VV01D System Name HP-AP-200 System Up Time 23 hours 18 mins 37 secs System Location 2FS17 System Country Code Software Version WA.02.00.0412 Ethernet MAC Address 00:14:C2:A5:6A:B3 IP Address 192.168.15.200...
General System Configuration Configuring Ethernet Settings Configuring Ethernet Settings Configuring the access point with an IP address expands your ability to manage the access point and use its features. A number of access point features depend on IP addressing to operate. N o t e You can use the Web browser interface to access IP addressing only if the access point already has an IP address that is reachable through your network.
Page 104
General System Configuration Configuring Ethernet Settings N o t e The access point must be rebooted for the Speed / Duplex change to take effect. ■ Connection Type: Allows selection of a static or DHCP setting. • DHCP: DHCP is the default. The IP address, subnet mask, default gateway, and Domain Name Server (DNS) addresses are dynamically assigned to the access point’s DHCP client by the network DHCP server.
Page 105
General System Configuration Configuring Ethernet Settings Figure 5-4. Configuring IP Settings To Enable the DHCP Client i: Select Ethernet. To configure the VLAN (untagged), enter a value in the VLAN field. To set the mode and speed of data transmission, select the Speed / Duplex setting in the drop-down.
Page 106
General System Configuration Configuring Ethernet Settings If a management station exists on another network segment, enter the IP address of a gateway in the that can route traffic between these segments in the Default Gateway field. This is a required field. Enter the IP address for the primary and secondary DNS Nameservers to be used for host-name-to-IP-address resolution.
General System Configuration Configuring Ethernet Settings CLI: Configuring IP Settings Statically or via DHCP CLI Commands Used in This Section Command Syntax CLI Reference Page interface <interface> 9-90 [no] ip address dhcp <ip> 9-94 [<mask>] <ip>/<bits> <dhcp> ip default-gateway 9-95 dns primary <server_1>...
Page 108
ProCurve Access Point 530(config)# To display the current IP settings, use the show ip command as shown in the following example. ProCurve Access Point 530# show ip IP Address Information: System Host Name HP-AP-200 IP Address 192.168.15.200 Subnet Mask 255.255.255.0 Default Gateway 192.168.15.254...
General System Configuration Configuring SNMP Configuring SNMP You can use a network management application such as the ProCurve Manager to manage the access point via the Simple Network Management Protocol (SNMP) from a network management station. Simple Network Management Protocol (SNMP) is an industry standard protocol for managing network devices, such as hubs, bridges, and switches.
General System Configuration Configuring SNMP MIB Support The Access Point 530 supports the following Management Information Bases (MIBs): Read-Only Support Read-Write Support IEEE802dot11-MIB HP-PROCURVE-WLAN-SMI RFC1155-SMI HP-PROCURVE-WLAN-TC MIB II (RFC 1213) HP-PROCURVE-WLAN-SYSTEM-MIB RFC-1215 HP-PROCURVE-WLAN-AP-MIB HP-PROCURVE-NOTIFY-MIB SNMPv2-SMI (RFC2578) SNMPv2-TC (RFC2579) SNMPv2-CONF (RFC2580)
Page 111
General System Configuration Configuring SNMP The Web interface enables you to modify these parameters: ■ SNMPv1/v2c: Enables or disables SNMP version 1 and version 2c management access, and also enables the access point to send SNMP traps (notifications). (The default is Enabled.) Community Name (RO): Defines the SNMP community access string ■...
General System Configuration Configuring SNMP To Enable SNMP and Set Parameters: Click Management > SNMP and select the Settings tab. To activate SNMPv1/v2 features on the access point, click the SNMPv1/v2 Enabled button. To establish a public read-only SNMP community, enter a name text string to replace the default community name (public) in the Community Name (RO) field.
Page 113
General System Configuration Configuring SNMP SNMP management on the access point defaults the community settings to “restricted” and “public”. To disable SNMP communities, type the following commands. ProCurve Access Point 530# configure ProCurve Access Point 530(config)# no snmp-server community public restricted ProCurve Access Point 530(config)# no snmp-server community system unrestricted ProCurve Access Point 530(config)#...
Page 114
General System Configuration Configuring SNMP The following example shows how to configure the SNMP community strings, the community name (using the server host command), and the following parameters (contact, port, and location). The default port number is 161. N OT E Although you can set this string using the snmp-server host command by itself, we recommend that you define this string using the snmp-server community command prior to using the snmp-server host command.
Page 115
General System Configuration Configuring SNMP ProCurve Access Point 530# configure ProCurve Access Point 530(config)# show snmp-server SNMP Server Settings --------------------------------------------------------------------------- SNMP Status Enabled SNMP Port Community (ro) public Community (rw) private Location 2FR19 Contact No SNMP trap destinations are currently configured. hpWlanAdHocNetworkDetected Enabled hpWlanApDetectionUpdate...
General System Configuration Configuring SNMP Web: Configuring SNMP v1 and v2c Traps The SNMP – Traps and SNMP – Trap Hosts screens configure SNMP v1 and v2c trap notifications that can be sent to specified management stations. SNMP Traps The SNMP – Traps screen controls whether specific SNMP notifications are sent: System Traps: pertaining to the system.
Page 117
General System Configuration Configuring SNMP • hpWlanClientRequestFailure – The station request failure is sent when a station fails to associate / re-associate / authenticate with the access point. The notification includes the station MAC address and the reason code for the failure. •...
Page 118
General System Configuration Configuring SNMP • hpWlanDot1XAuthNotInitiated– This notification is sent when a station did not initiate 802.1X authentication with the RADIUS server. The notification value includes the MAC address of the station that did not initiate 802.1X authentication. • hpWlanDot1XAuthSuccess –...
General System Configuration Configuring SNMP Click Management > SNMP and select the Traps tab. Under the Trap Groups, check or uncheck the required traps boxes. Click Update. SNMP Trap Hosts The SNMP – Trap Hosts screen allows configuration of the following SNMP trap parameters: Trap Destination Host (1 to 3): Enables/Disables recipients (up to ■...
General System Configuration Configuring SNMP Enter the IP address in the Trap Destination IP Address field and enter one of the configured community names in the Community Name field. Select [Update]. CLI: Configuring SNMP v1 and v2c Traps CLI Commands Used in This Section Command Syntax CLI Reference Page [no] snmp-server trap <trap>...
Page 121
General System Configuration Configuring SNMP To display the current SNMP settings from the Manager Exec level, use the show snmp-server command, as shown in the following example. ProCurve Access Point 530(config)# show snmp-server SNMP Server Settings --------------------------------------------------------------------------- SNMP Status Enabled SNMP Port Community (ro) public...
General System Configuration Configuring SNMPv3 Configuring SNMPv3 The access point supports the following SNMPv3 MIBs: Framework ■ ■ Message Processing/Dispatch ■ Community User-Based-Security Model ■ ■ View-Based-Access-Control Model The web browser interface and the CLI can be used to ■ Enable SNMPv3 on the access point, Create SNMPv3 users, ■...
General System Configuration Configuring SNMPv3 Figure 5-8. The SNMP - Settings Tab To Enable SNMPv3: Click Management > SNMP and select the Settings tab. Click the SNMPv3 Enabled button. Click [Update]. To Disable SNMPv3: Click Management > SNMP and select the Settings tab. Click the SNMPv3 Disabled button.
General System Configuration Configuring SNMPv3 To enable SNMPv3, enter the snmpv3 enable command. ProCurve Access Point 530# config ProCurve Access Point 530(config)# snmpv3 enable ProCurve Access Point 530(config)# To disable SNMPv3, enter the no snmpv3 enable command. ProCurve Access Point 530(config)# no snmpv3 enable ProCurve Access Point 530(config)# Web: Managing SNMPv3 Users The SNMP –...
Page 125
General System Configuration Configuring SNMPv3 Figure 5-9. The SNMP SNMPv3 Users Tab To Add an SNMPv3 User: Click Management > SNMP and select the SNMPv3 Users tab. Enter the new username in the Username field. Optionally, select an authentication method from the Authentication Type drop-down.
General System Configuration Configuring SNMPv3 In the list of SNMPv3 users, click the Edit link next to the username whose settings you want to modify. The fields are now displayed under Edit SNMPv3 User, and are populated with the current settings for the selected user.
General System Configuration Configuring SNMPv3 To create an SNMPv3 user with MD5 authentication, add the auth parameter and password to the definition. ProCurve Access Point 530(config)# snmpv3 user-name tjames auth md5 12345678 ProCurve Access Point 530(config)# To create an SNMPv3 user with MD5 authentication and AES privacy, add the auth md5 and priv aes parameters and their passwords to the definition.
General System Configuration Enabling System Logging Enabling System Logging The access point supports a logging process that can control error messages saved to memory or sent to a server. The logged messages serve as a valuable tool for isolating access point and network problems. The following table lists the error message levels from the most severe (Emergency) to least severe (Debug).
General System Configuration Enabling System Logging Web: Setting Logging Parameters The Event Log – Settings screen configures system logs and server details for the access point. The Web interface enables you to modify these parameters: ■ Primary Syslog Host: Enables the logging of error messages. ■...
General System Configuration Enabling System Logging CLI: Setting Logging Parameters CLI Commands Used in This Section Command Syntax CLI Reference Page 9-30 [no] logging <host >[port] 9-31 show debug 9-32 show logging 9-32 The following example shows how to set an IP address for the receiving server using the logging command.
Page 131
General System Configuration Enabling System Logging The following example shows the security level of entries. ProCurve Access Point 530# configure ProCurve Access Point 530(config)#show logging Keys: M=eMergency C=Critical W=Warning I=Information A=Alert E=Error N=Notice D=Debug ----- Event Log Listing: Most Recent Events First ---- I 01/10/00 20:39:09 login[12763]: root login on `ttyp0'...
General System Configuration Configuring the Time (SNTP) Configuring the Time (SNTP) Simple Network Time Protocol (SNTP) allows the access point to set its internal clock based on periodic updates from a time server (SNTP or NTP). Maintaining an accurate time on the access point enables the system log to record meaningful dates and times for event entries.
Page 133
General System Configuration Configuring the Time (SNTP) Figure 5-11. Configuring SNTP Settings To Set SNTP Parameters: Select Special Features > Time. For SNTP, click Enabled. For the SNTP Server, enter the IP address or the hostname in the SNTP Server field. Select the appropriate time zone for the SNTP server from the Time Zone drop-down.
General System Configuration Configuring the Time (SNTP) CLI: Setting SNTP Parameters CLI Commands Used in This Section Command Syntax CLI Reference Page sntp <server> <time-zone> 9-34 [no] sntp 9-34 show sntp 9-35 The following example shows how to enable SNTP and configure a server IP address by using the sntp <server>...
General System Configuration Configuring RADIUS Accounting Configuring RADIUS Accounting Remote Authentication Dial-in User Service (RADIUS) Accounting is an extension to the RADIUS authentication protocol that uses a central server to log user activity on the network. A RADIUS Accounting server runs software that receives user-session information from the access point.
General System Configuration Configuring RADIUS Accounting Web: Setting RADIUS Accounting Server Parameters The Accounting Servers screen in the WLAN Configuration – Security pop-up window sets the primary and secondary server parameters for the RADIUS Accounting server. This configures the RADIUS Accounting servers to which the access point RADIUS server transmits user-session information.
Page 137
General System Configuration Configuring RADIUS Accounting Figure 5-12. Configuring RADIUS Accounting Servers To Set RADIUS Accounting Server Parameters: Click WLANs. Click the [Edit] button for the WLAN (BSS/SSID) interface you want to modify. A pop-up window with Security settings opens. Select the Accounting Servers tab.
General System Configuration Configuring RADIUS Accounting CLI: Enabling RADIUS Accounting Parameters CLI Commands Used in This Section Command Syntax CLI Reference Page [no] radius-accounting <primary | secondary> <ip 9-65 <ip> | port <port> | key <key>> The following example shows how to enable RADIUS Accounting and set the ip address, port number, and the secret key on the access point.
General System Configuration Setting Up Filter Control Setting Up Filter Control You can prevent communications between wireless stations associated to the access point, only allowing traffic between stations and the wired network. You can also prevent any wireless client from performing any access point configuration through any of its management interfaces, including Web, Telnet, or SNMP access.
General System Configuration Setting Up Filter Control CLI: Setting Traffic Filters CLI Commands Used in This Section Command Syntax CLI Reference Page [no] inter-station-blocking 9-88 [no] wireless-mgmt-block 9-88 show filters 9-89 The following example shows how to block communications between wire- less stations.
General System Configuration Configuring VLAN Support Configuring VLAN Support A Virtual Local Area Network (VLAN) is a location independent broadcast domain. A VLAN is like the standard definition of a LAN without the physical constraints. These VLAN domains are a collection of workstations that are part of the same logical, working community but not likely part of the same physical community.
General System Configuration Configuring VLAN Support Management VLAN. A management VLAN can be configured for secure management access to the access point. The management VLAN is for managing the access point through remote management tools, such as the Web interface, SSH, Telnet, or SNMP. The access point only accepts management traffic that is tagged with the specified management VLAN ID.
General System Configuration Configuring VLAN Support Figure 5-14. Setting A Management VLAN To Set A Management VLAN: Click Ethernet. Enter a valid number between 1 and 4094 in the Management VLAN field. Select [Update]. Web: Changing the Untagged VLAN ID The Network Setup –...
Page 144
General System Configuration Configuring VLAN Support Figure 5-15. Changing Untagged VLAN ID To Set Untagged VLAN ID: Click Ethernet. Enter a valid number between 1 and 4094 in the Untagged VLAN field. Select [Update]. 5-60...
General System Configuration Configuring VLAN Support CLI: Enabling VLAN Support CLI Commands Used in This Section Command Syntax CLI Reference Page vlan 9-145 [no] untagged-vlan <vid> 9-146 management-vlan <vid> 9-146 show wlans 9-117 The following example shows how to establish a management VLAN ID. ProCurve Access Point 530# configure ProCurve Access Point 530(config)# interface ethernet ProCurve Access Point 530(ethernet)# management-vlan 9...
Page 146
General System Configuration Configuring VLAN Support The following example displays the management VLAN ID. The static or dynamic VLAN state is configured per WLAN and can be validated using the show wlans command. ProCurve Access Point 530# show wlans All WLANs on Radio 1: WLAN BSSID VLAN...
General System Configuration Managing Group Configuration Managing Group Configuration The Group Configuration feature enables an administrator to configure and manage groups of up to twelve AP 530 access points using the management interface of only one of the devices. Group Configuration can be configured using the web-browser interface, the CLI, or through SNMP.
General System Configuration Managing Group Configuration “Configuring RADIUS Client Authentication” The local RADIUS user database (see ■ on page 7-32) “Probe Table” on page 8-35) ■ All Probe Table settings (see “Setting Up Filter Control” on page 5-55) All Filters settings (see ■...
General System Configuration Managing Group Configuration Complete synchronization may take up to one minute to propagate, depending on the size of the group and on network latency. When a member leaves the group, the “oldest” of the remaining members becomes the “reference”. When a member returns to the group, its “age” is reset to zero.
Page 150
General System Configuration Managing Group Configuration The current members of the selected group are listed in the Members list. N o t e The IP addresses of the other members of the group appear as links. To jump to the configuration interface of another member, click on its link. When a group is being formed, there may be a delay of up to 2 seconds before all members are listed.
General System Configuration Managing Group Configuration CLI: Enabling Group Configuration CLI Commands Used in This Section Command Syntax CLI Reference Page [no] group-config 9-61 group-config name 9-62 group-config member-id 9-62 show group-config 9-63 The following example shows how to add the current access point to a group. ProCurve Access Point 530# configuration ProCurve Access Point 530(config)# group-config name HBldg22 ProCurve Access Point 530(config)# group-config member-id...
Page 152
General System Configuration Managing Group Configuration — This page is intentionally unused. — 5-68...
Wireless Interface Configuration Overview Overview The Access Point 530 supports up to 16 service set identifier (SSID) interfaces. Most radio parameters apply globally to all configured SSID interfaces. For each SSID interface, different security settings, VLAN assignments, and other parameters can be applied. This chapter describes how to: Set the access point country code ■...
Wireless Interface Configuration Setting the Country Code Setting the Country Code This section details the process of setting the country code in both the Access Point 530 WW unit (J8987A), which has no preset country code, and the Access Point 530 NA unit (J8986A), which has the country code preset to the U.S. The country code is an identifier defined for a nation by ISO.
Page 157
The following example shows how to use the show system-information command to return the access point’s current values, including the country code. ProCurve Access Point 530(config)# show system-information Serial Number TW633VV01D System Name HP-AP-200 System Up Time 13 mins 17 secs System Location 2FS17 System Country Code Software Version WA.02.00.0412...
Wireless Interface Configuration Configuring the Radio Configuring the Radio Radio settings directly control the behavior of the radio device in the access point. The access point allows modification of various radio parameters, such as enabling the radio, radio working mode, radio broadcasting channel, and transmit power level.
Wireless Interface Configuration Configuring the Radio Summary Point Parameters Because they are in different parts of the spectrum, the channels within 802.11b and 802.11a these modes do not interfere with one another. channels. 802.11g and 802.11a channels. Each radio that is used, no matter what the mode, must be set to a unique All modes (802.11a, 802.11b, channel to avoid interference with other radios in the same area.
Page 160
Wireless Interface Configuration Configuring the Radio Getting to know 802.11a. The IEEE 802.11a provides specifications for wireless ATM systems. It is also used in wireless hubs. Networks using 802.11a operate at radio frequencies between 5.725 GHz and 5.850 GHz. The specifi- cation uses a modulation scheme known as orthogonal frequency division multiplexing (OFDM), which is especially well suited for use in office settings.
Wireless Interface Configuration Configuring the Radio Working in its mixed “b/g” mode, the access point experiences reduced data throughput, even if there are no 802.11b stations active in the network. To achieve a higher throughput, you can set the access point to operate in 802.11g mode, which ignores all 802.11b stations in the service area.
Page 162
Wireless Interface Configuration Configuring the Radio • IEEE 802.11a: Stations communicate in a data transfer range between 6 to 54 Mbps. This standard operates in the 5 GHz U-NII band using orthogonal frequency division multiplexing (OFDM). (Radio 2 only.) ■ [Update]: Updates the radio parameters.
Wireless Interface Configuration Configuring the Radio CLI: Setting the Radio Working Mode CLI Commands Used in This Section Command Syntax CLI Reference Page radio <radio_name> 9-101 mode<mode> 9-104 show radios <radio>* 9-116 *Use the parameter <radio> to display detailed information about the specified radio. The following example shows how to enable the radio context level on a specific radio and set the working mode for the access point to 802.11g-only mode.
Wireless Interface Configuration Configuring the Radio Configuring the Radio Channel and Other Basic Settings The access point uses the configured radio channel to communicate with “Radio Configuration Summary Table” on page 6-6, wireless stations. As indicated in the the access point’s channel settings and radio mode have a configuration relationship to enhance the performance of the access point.
Page 165
Wireless Interface Configuration Configuring the Radio N o t e When the radio is configured for auto channel selection, any radio mode changes result in a five- to ten-second delay as the optimum radio channel is determined and selected. ■ Maximum Stations: The maximum number of stations allowed to access the applicable radio at any one time.
Wireless Interface Configuration Configuring the Radio Web: Configuring Advanced Radio Settings The Radio – Advanced Settings pop-up window, shown in Figure 6-3, enables you to configure a number of advanced settings for the access point’s radio operation: ■ Broadcast/Multicast Rate Limiting: Enables the rate limiting on the radio to transmit multicast and broadcast traffic.
Page 167
Wireless Interface Configuration Configuring the Radio Short: Sets the slot time to 9 microseconds. A short slot time can • increase data throughput on the access point, but its use requires that all stations can support a short slot time (that is, 802.11g-compliant stations must support a short slot time).
Wireless Interface Configuration Configuring the Radio Configuring Advanced Radio Settings Figure 6-3. Configuring Advanced Radio Settings To Modify Advanced Radio Settings: Click Network Setup > Radio. Click Status On to enable the radio. Click the Edit button for Advanced Settings. A pop-up window for Advanced Settings opens (see Figure 6-3).
Wireless Interface Configuration Configuring the Radio Select the Preamble and Slot Times by clicking their respective Long or Short buttons. To configure the communication periods and packet size transmissions, enter values within the appropriate range for the Fragmentation Threshold and RTS Threshold fields. Enter the desired value for Beacon Interval.
Page 170
Wireless Interface Configuration Configuring the Radio Figure 6-5. Configuring B + G Modes [Advanced Radio Settings] To Configure B + G Modes: The setting, shown in Figure 6-5, allows both b stations and g stations to associate with the AP. Select Network Setup >...
Wireless Interface Configuration Configuring the Radio Configuring G- Only Mode Figure 6-6. Configuring Wi-Fi G-Only Mode To Configure Wi-Fi G-Only Mode: This setting, shown in Figure 6-6, allows g-only stations to associate with the AP. This is Wi-Fi standard-based g-only mode. Select Network Setup >...
Wireless Interface Configuration Configuring the Radio Configuring Pure G Mode Figure 6-7. Configuring Pure G Mode To Configure Pure G Mode: The setting, shown in Figure 6-7, allows only g stations to associate with the access point, but should be used only if no legacy 802.11b clients or access points are within range of the 530 access point.
Wireless Interface Configuration Configuring the Radio Deselect rate set values (11, 5.5, 2, and 1) and select rate set values (24, 12, and 6) using the Basic options. [Update] Select to set the advanced radio parameters. CLI: Configuring Radio Settings CLI Commands Used in This Section Command Syntax CLI Reference Page...
Page 174
Wireless Interface Configuration Configuring the Radio The following example uses the show radio <radio> command to display this access point’s radio parameter details. ProCurve Access Point 530# show radio 1 Description Radio 1 - 802.11g Base MAC 00:14:C2:A7:11:A0 Status Enabled Mode 802.11g Channel-Policy...
Wireless Interface Configuration Modifying Antenna Settings Modifying Antenna Settings When using an external antenna with the access point, you must configure the radio for the type of external antenna that is attached: either Diversity or Single. Also, the access point’s transmit power must be limited to conform to local regulations.
Page 176
Wireless Interface Configuration Modifying Antenna Settings Figure 6-8. Setting Transmit Power Reduction To Modify the Transmit Power Reduction: Select Network Setup > Radio. Use the Tx Power Reduction drop-down to select a dBm value. [Update] Select to set the radio transmit power reduction. 6-24...
Wireless Interface Configuration Modifying Antenna Settings Web: Setting the Antenna Type and Antenna Mode The Radio – Advanced Settings pop-up window, shown in Figure 6-9, enables you to configure the following settings for adjusting the transmit power limits: ■ Antenna Type: The type of radio antenna utilized by this access point. (The default is Internal.) Antenna Mode: The mode of radio antenna utilized by this access point.
Page 178
Wireless Interface Configuration Modifying Antenna Settings [Update] Select to set the antenna parameters. 6-26...
Wireless Interface Configuration Modifying Antenna Settings CLI: Setting the Transmit Power Reduction and Antenna Parameters CLI Commands Used in This Section Command Syntax CLI Reference Page tx-power-reduction <value> 9-114 antenna <external | internal> 9-105 antenna mode <diversity | single> 9-105 show radio 9-116 The following example shows how to set the transmit power reduction value,...
Page 180
Wireless Interface Configuration Modifying Antenna Settings You can use the show radio command to display the current radio settings from the wireless interface configuration level. ProCurve Access Point 530# show radio 1 Description Radio 1 - 802.11g Base MAC 00:14:C2:A7:11:A0 Status Enabled Mode...
Wireless Interface Configuration Adaptive Tx Power Control Adaptive Tx Power Control This section describes how to configure the Access Point 530’s Adaptive Tx Power Control (ATPC) feature. Several strategies for configuring Adaptive Tx Appendix C, “Adaptive Tx Power Control Use Cases”.
Wireless Interface Configuration Adaptive Tx Power Control Scope of Neighboring APs ATPC may be applied broadly to all neighboring APs or more selectively to specific APs by configuring either RF Group Name or Avoid Neighbor APs. These parameters are mutually exclusive: Enabling one disables the other. ■...
Wireless Interface Configuration Adaptive Tx Power Control This mode is recommended for low density deployments where coverage holes may be of concern. The data transmit power attenuation is calculated to put transmissions into the noise floor of the nearest same-channel AP, then reduced if needed to reach the farthest associated client station at a target RSSI.
Wireless Interface Configuration Adaptive Tx Power Control Since ATPC can only reduce transmit power (not amplify it), optimal place- ment of access points will provide full coverage at a transmit power level somewhat below the maximum. Furthermore, if the deployment needs to be able to remediate conditions such as the failure or down-time of individual access points, the density should be such that ATPC can compensate for a missing unit by lessening power reduc- tion, thus allowing transmit power to increase towards its maximum.
Page 185
Wireless Interface Configuration Adaptive Tx Power Control Figure 6-10. Setting Adaptive Transmit Power Control Parameters To Configure Adaptive Transmit Power Control: Select Network Setup > Radio. Click Status On to enable the radio. Select IEEE 802.11g Mode. Click the Edit button for Advanced Settings. A pop-up window for Advanced Settings opens (see Figure 6-7).
Wireless Interface Configuration Adaptive Tx Power Control CLI: Configuring Adaptive Tx Power Control CLI Commands Used in This Section Command Syntax CLI Reference Page 9-140 [no] atpc 9-141 [no] atpc avoid-other-aps 9-141 <name> [no] atpc rf-group-name 9-142 atpc adapt < ap | ap+clients > 9-143 <max-reduction>...
Page 187
Wireless Interface Configuration Adaptive Tx Power Control “Airport Case 2 – With The following example refers to the use case described in RF Group Name” on page C-5. To configure AP #1 in this use case, enter the following commands: ProCurve Access Point 530(config)# radio 1 ProCurve Access Point 530(radio1)# atpc adapt ap ProCurve Access Point 530(radio1)# atpc max-reduction 18...
Wireless Interface Configuration Managing Multiple WLAN (BSS/SSID) Interfaces Managing Multiple WLAN (BSS/SSID) Interfaces A wireless local area network (WLAN) is a local area network (LAN) that users access through a wireless connection. The IEEE 802.11-1999 standards specify WLAN technologies. The WLAN uses high-frequency radio waves rather than wires to communicate between nodes.
Wireless Interface Configuration Managing Multiple WLAN (BSS/SSID) Interfaces The following figure shows the configuration scenario to follow when managing VLANs and SSID interfaces. Figure 6-11. Configuring VLANs and SSID Interfaces Web: Configuring SSID Interfaces The WLANs tab, shown in Figure 6-11, enables you to configure SSIDs, VLANS, and closed system settings.
Page 190
Wireless Interface Configuration Managing Multiple WLAN (BSS/SSID) Interfaces N o t e If you are connected as a wireless client to the same AP that you are admin- istering, resetting the SSID will cause you to lose connectivity to the AP. You will need to reconnect to the new SSID after you save this new setting.
Page 191
Wireless Interface Configuration Managing Multiple WLAN (BSS/SSID) Interfaces To prohibit WLAN (BSS/SSID) interface broadcasting, check the Closed- System box. To assign a VLAN ID per WlAN (BSS/SSSID), enter a VLAN ID in the VLAN field. [Edit] To establish security, click button and configure Security tab param- eters.
Wireless Interface Configuration Managing Multiple WLAN (BSS/SSID) Interfaces CLI: Naming an SSID Interface CLI Commands Used in This Section Command Syntax CLI Reference Page 9-102 ssid <SSID> 9-117 show wlans [<name>] all The following example shows how to name a SSID interface “donna” within the “wlan1”...
Page 194
Wireless Interface Configuration Managing Multiple WLAN (BSS/SSID) Interfaces To display WLAN interface settings, use the show wlan command, as shown in the following example. ProCurve Access Point 530(radio1)# show wlan All WLANs on Radio 1: WLAN BSSID VLAN Security Status ------------------------------------------------------------------------------ PR3_WLAN 00:14:C2:A7:11:A0...
Page 197
Wireless Security Configuration Access Control List and RADIUS Server ..... . . 7-43 MAC Lockout and Client/Station Deauthentication ....7-44 Web: Configuring Access Control List .
Page 198
Wireless Security Configuration CLI: Configuring Web-Auth on a WLAN ......7-70 Prerequisites ......... . . 7-70 Web: Customizing the Login, Welcome, and Failed Screens .
Wireless Security Configuration Overview Overview This chapter describes how to: Configure wireless security ■ Configure encryption ■ ■ Configure key management ■ Configure MAC and 802.1X authentication Configure MAC Lockout and Client/Station Deauthentication ■ ■ Configure AP Authentication ■ Configure Web Authentication...
Wireless Security Configuration Wireless Security Overview Wireless Security Overview The access point is configured by default as an “open system,” with no security. This means that the access point broadcasts a beacon frame advertising each configured WLAN. If a wireless client has a configured WLAN of “any”, it can read the SSID from the beacon and use it to allow immediate connection to the access point.
Wireless Security Configuration Wireless Security Overview address as the MAC authentication password. To avoid this compatibility issue, use the “radius” CLI command to configure the “mac-auth-password” for the AP 530 to be consistent with the Access Point 520 shared-secret “MAC Address Authentication” on password.
Wireless Security Configuration Wireless Security Overview connections. The AP 530 supports port-access authentication through the AP “Configuring 802.1X AP Authentication” on page 7-53 Authentication feature. See more information. Encryption The AP 530 supports three types of encryption: Wired Equivalent Privacy (WEP): Key lengths of 64 bits and 128 bits are ■...
Wireless Security Configuration Wireless Security Overview Counter Mode/CBC-MAC Protocol (CCMP) CCMP is an encryption method for IEEE 802.11i that uses the Advanced Encryption Standard (AES) combined with Cipher Block Chaining Counter mode (CBC-CTR) and Cipher Block Chaining Message Authentication Code (CBC-MAC) for encryption and message integrity.
Wireless Security Configuration Wireless Security Overview network VPN server. If this mode is used, it may be desirable to prevent advertising availability of the network to other stations by configuring the WLAN for closed-system operation. C a u t i o n Use the No Security mode on a sensitive internal network only for initial setup, testing, or problem solving, or where VPN connections are mandated to provide end-to-end security for the otherwise insecure wireless connection.
Wireless Security Configuration Wireless Security Overview TKIP with 802.1X The TKIP with 802.1X security profile uses TKIP as the encryption cipher and 802.1X as the authentication mechanism. In this way, each station uses a unique master key to derive the encryption between the access point and the station.
Wireless Security Configuration Wireless Security Overview Other Security Features In addition to the wireless security features described in the preceding section, the Access Point 530 has a user-based security feature called Identity Driven Management (IDM). “Identity Driven Management” on page 8-36.
Page 207
Wireless Security Configuration Wireless Security Overview When you have decided which security mechanisms to implement in your network, refer to Table 7-2 and Table 7-3 for a summary of the access point configuration procedures. For more details on security configurations that are possible using the CLI, “CLI: Configuring Security Settings”...
Page 208
Wireless Security Configuration Wireless Security Overview Configuring Encryption in the ProCurve Wireless Access Point 530 Encryption Methods and WLAN Interface Level Commands Additional Notes Process Requirements WPA-802.1X security <wpa-802.1X> WPA supported • When both TKIP and station required. CCMP authentication 1.
Page 209
Wireless Security Configuration Wireless Security Overview Summary of MAC Authentication Configuration Table 7-3. Configuring MAC Authentication in the HP ProCurve Wireless Access Point 530 Local MAC MAC Authentication Table RADIUS Comments Authentication Authentication Authentication MAC Address Permission Mode MAC Table...
Wireless Security Configuration Establishing Security Establishing Security The security options are available from the WLANs tab (shown in Figure 7-1) and provide wireless security configuration for the WLAN. Figure 7-1. Security Access Via the WLANs Screen Basic parameters required for a security option configuration are provided in the WLANs –...
Page 211
Wireless Security Configuration Establishing Security You should give special consideration to the security option for WLAN 1 if you are configuring one or more Wireless Distribution System (WDS) links on the AP 530. The security option configured for WLAN 1 also establishes the security option that is used with WDS links (1–6).
Wireless Security Configuration Establishing Security Web: Setting Security Options The Security tab provides these options: ■ No Security: The access point is configured as an open system with no user authentication or data encryption. This is the default setting. Static WEP: Use static IEEE 802.11 Wired Equivalent Privacy (WEP) ■...
Page 213
Wireless Security Configuration Establishing Security WPA-PSK: Uses a preshared key (instead of using IEEE 802.1X and EAP ■ as is used in the WPA-802.1X security mode). The PSK is used for an initial check of credentials only. A WPA-supported station is required. If a mix of stations is used, with some supporting WPA2 and others supporting the original WPA, configure for both (set both wpa/wpa2 allowed).
Page 214
Wireless Security Configuration Establishing Security N o t e Stations that are not configured to use WPA-PSK cannot associate with an access point. ■ WPA-802.1X: IEEE 802.11i-2004 includes AES, CCMP, and TKIP mecha- nisms. The standard specifies security enhancements in encryption, authentication, and key management, and provides support for roaming.
Page 215
Wireless Security Configuration Establishing Security Figure 7-2. Configuring Static WEP To Configure Static WEP Shared Keys: Select WLANs. Click [Edit] after the selected WLAN. The WLAN Configuration Security pop-up window opens, displaying the Security tab. Select Static WEP from the Security Mode drop-down. To allow system authentication, select Shared from the Authentication option.
Page 216
Wireless Security Configuration Establishing Security Figure 7-3. Configuring WPA-PSK To Configure WPA-PSK: Select WLANs. Click [Edit] after the selected WLAN. The WLAN Configuration Security pop-up window opens, displaying the Security tab. Select WPA-PSK from the Security Mode drop-down. Select WPA, WPA2, or Both for WPA support, as required. Select Enable pre-authentication if you selected WPA2 or Both for the WPA version.
Page 217
Wireless Security Configuration Establishing Security Figure 7-4. Configuring WPA-802.1X To Configure WPA-802.1X: Select WLANs. Click [Edit] after the selected WLAN. The WLAN Configuration Security pop-up window opens, displaying the Security tab. Select WPA-802.1X from the Security Mode drop-down. Select WPA, WPA2, or Both for WPA support, as required. Select Enable pre-authentication if you selected WPA2 or Both for the WPA version.
Wireless Security Configuration Manual Configuration Using the CLI Manual Configuration Using the CLI The following sections show examples of how to use the CLI to view and configure access point security settings. N OT E : Security settings using the CLI can only be made for WLANs in the context of Radio 1.
Page 219
Wireless Security Configuration Manual Configuration Using the CLI Using the CLI to Configure No Security. The following example shows how to configure an WLAN interface to have no security set. ProCurve Access Point 530# configure ProCurve Access Point 530(config)# radio 1 ProCurve Access Point 530(radio1)# wlan 1 ProCurve Access Point 530(radio1-wlan1)#security no-security ProCurve Access Point 530(radio1-wlan1)#...
Page 220
Wireless Security Configuration Manual Configuration Using the CLI Using the CLI to View the Current WLAN (BSS/SSID) Configuration. The following example shows how to view the current configuration settings. ProCurve Access Point 530# configure ProCurve Access Point 530(config)# radio 1 ProCurve Access Point 530(radio1)# wlan 1 ProCurve Access Point 530(radio1-wlan1)# show wlan 1 WLAN #1 on Radio 1...
Page 221
Wireless Security Configuration Manual Configuration Using the CLI Using the CLI to Configure Static WEP Shared Keys. The following example shows how to configure an SSID interface to use static WEP keys for authentication and encryption. These commands enable security and estab- lish the transfer key index (set to 4).
Page 222
Wireless Security Configuration Manual Configuration Using the CLI ProCurve Access Point 530(radio1-wlan1)#wep-key-1 abcde ProCurve Access Point 530(radio1-wlan1)#wep-key-2 fghi ProCurve Access Point 530(radio1-wlan1)#wep-key-3 klmn ProCurve Access Point 530(radio1-wlan1)#wep-key-4 pqrs ProCurve Access Point 530(radio1-wlan)# The following commands set the security to a shared-key authentication protocol.
Page 223
Wireless Security Configuration Manual Configuration Using the CLI ProCurve Access Point 530# configure ProCurve Access Point 530(config)# radio 1 ProCurve Access Point 530(radio1)# wlan 1 ProCurve Access Point 530(radio1-wlan1)#security dynamic-wep radius primary ip ProCurve Access Point 530(radio1-wlan1)# 192.168.1.52 radius primary ProCurve Access Point 530(radio1-wlan1)# port 161 radius primary key...
Page 224
Wireless Security Configuration Manual Configuration Using the CLI The following example shows how to set to set the security key value using the wpa-pre-shared-key command. N o t e Supported stations must be WPA-enabled and configured with the same personal key. The personal key must be a string of 8 to 63 characters.
Page 225
Wireless Security Configuration Manual Configuration Using the CLI The following commands configure the built-in authentication server and authentications to the best security combination using the WPA Enterprise mode and the AES protocol. N o t e Supported authentication servers are the built-in authentication server on the access point or an external RADIUS server.
Wireless Security Configuration Configuring RADIUS Client Authentication Configuring RADIUS Client Authentication Remote Authentication Dial-in User Service (RADIUS) is an authentication protocol that controls access to RADIUS-aware devices on the network. An authentication server contains a database of credentials for each user who requires access to the network.
Wireless Security Configuration Configuring RADIUS Client Authentication To use dynamic VLAN, the access point must be using a security configuration that enables 802.1X authentication and must have a RADIUS server configured page 7-41). Wireless stations must also support 802.1X station software to (see be assigned to a specific VLAN.
Page 228
Wireless Security Configuration Configuring RADIUS Client Authentication Secondary Server Setup: Configures a secondary RADIUS server to ■ provide a backup in case the primary server fails. The access point uses the secondary server if the primary server fails or becomes inaccessible. Once the access point switches over to the secondary server, it periodically attempts to establish communication again with the primary server.
Wireless Security Configuration Configuring RADIUS Client Authentication Enter the maximum number of retransmission attempts to be made in the Retransmit Attempts field. Select Internal Server to establish the internal server parameters as the RADIUS server. If selected, proceed to step 8. If not selected, continue to steps 4–8.
Wireless Security Configuration Configuring RADIUS Client Authentication The following example shows how to configure RADIUS primary or secondary parameters for this WLAN. ProCurve Access Point 530# configure ProCurve Access Point 530(config)# radio 1 ProCurve Access Point 530(radio1)# wlan 1 ProCurve Access Point 530(radio1-wlan1)# radius primary key open ProCurve Access Point 530(radio1-wlan1)# radius primary ip 192.168.1.53...
Wireless Security Configuration Configuring RADIUS Client Authentication Figure 7-6. Configuring an Existing Account To Modify an Existing Local RADIUS Account: Select Special Features > Local Radius tab. Select the account to modify. Do one of the following: • To enable the account, select Enable. •...
Page 232
Wireless Security Configuration Configuring RADIUS Client Authentication • Password: Provides a string with a minimum of 1 character and a maximum of 32 characters. Do not use special characters or spaces. • Confirm Password: Repeats the same string with a minimum of 1 character and a maximum of 32 characters.
Wireless Security Configuration Configuring RADIUS Client Authentication Select [Add Account] to set the user account. Managing the RADIUS User Database The User Database tab shown in Figure 7-8 enables you to create a backup file. Once you have created user accounts for use with Local RADIUS, you can save the account information to a Backup file, which can then be used to Restore the Local RADIUS user accounts if needed.
Page 234
Wireless Security Configuration Configuring RADIUS Client Authentication Click Save to complete the process. The backup file will be placed in the specified folder. To Restore the Local RADIUS User Accounts From a User Database Backup: Select Special Features > Local Radius to display the Local RADIUS screen and user account information.
Wireless Security Configuration Configuring RADIUS Client Authentication CLI: Setting Local RADIUS Server Parameters CLI Commands Used in This Section Command Syntax CLI Reference Page [no] radius-local <username> [Disabled] 9-69 [password <password>] [realname <realname>] vlan <id> 9-145 show radius-local 9-70 The following example shows how to configure local RADIUS server param- eters, including adding a new user, disabling an existing user, or removing the user from the local database.
Page 236
Wireless Security Configuration Configuring RADIUS Client Authentication The following example first sets the radius-local username to “chris” and subsequently sets the password for the chris user account to “chrisopen”. ProCurve Access Point 530# configure ProCurve Access Point 530(config)# radius-local chris realname csmith ProCurve Access Point 530(config)# radius-local chris password chrisopen...
Wireless Security Configuration Configuring MAC Address Authentication Configuring MAC Address Authentication MAC address authentication functions enable the access point to control which devices can associate with it. You can: ■ Configure the access point to authenticate client MAC addresses against a local Access Control List stored locally on the access point or stored remotely on a RADIUS server, Specify station MAC addresses in the local Access Control List as allowed...
Wireless Security Configuration Configuring MAC Address Authentication Consider the following guidelines: ■ Use MAC address authentication for a small network with a limited number of users. You can manually configure MAC addresses on the access point itself without the need to set up a RADIUS server. The access point supports up to 200 MAC addresses in its filtering table, but managing a large number of MAC addresses across more than one access point quickly becomes very cumbersome.
Wireless Security Configuration Configuring MAC Address Authentication Web: Configuring Access Control List The Local MAC Authentication tab shown in Figure 7-9 enables you to create and maintain access control lists (ACLs) that can be directly applied to each WLAN for access control. You can modify these parameters: ■...
Wireless Security Configuration Configuring MAC Address Authentication To Add a MAC Address to an Access Control List: Select the ACL from the ACL List drop-down. Enter the MAC address in the MAC Entry field. Click [Add] to add the new address to the ACL address list. To Remove a MAC Address from an Access Control List: Select the ACL from the ACL List drop-down.
Wireless Security Configuration Configuring MAC Address Authentication Figure 7-10. Configuring Built-In MAC Authentication To Configure Built-In MAC Authentication: Select WLANs. Click [Edit] after the selected WLAN. The WLAN Configuration Security pop-up window opens. Select the Mac Authentication tab. To enable local or remote MAC authentication, select Enabled and choose Local or Remote.
Page 242
Wireless Security Configuration Configuring MAC Address Authentication Configuring Local MAC Authentication Lists. The following example shows how to create a list of MAC addresses for authentication. N OT E The address format is a 48-bit MAC address format, displayed as a string of 12 hexadecimal digits separated by periods.
Page 243
Wireless Security Configuration Configuring MAC Address Authentication Verifying that the list was set on the WLAN. The following example shows how to view the newly created list using the show wlan command. ProCurve Access Point 530(radio1-wlan1)# show wlan 1 WLAN #1 on Radio 1 Description insecure Status...
Wireless Security Configuration Configuring MAC Address Authentication Web: Configuring MAC Lockout The MAC Lockout tab shown in Figure 7-11 enables you to add devices with selected MAC addresses to a MAC Lockout list. The MAC Lockout list applies to all WLANs on all radios in the Access Point 530. You can modify these parameters: ■...
Wireless Security Configuration Configuring MAC Address Authentication CLI: Configuring MAC Lockout CLI Commands Used in This Section Command Syntax CLI Reference Page [no] lockout-mac <mac_address> 9-75 show lockout-mac 9-76 lockout-mac clear <mac_address> | all 9-76 Locking out a device from the access point. The following example shows how to add a device’s MAC address to the MAC Lockout list.
Wireless Security Configuration Configuring MAC Address Authentication Clearing the MAC Lockout list. The following example shows how to remove all MAC addresses from the current MAC Lockout list. ProCurve Access Point 530# configure ProCurve Access Point 530(config)# lockout-mac clear all 2 MAC addresses removed from lockout list ProCurve Access Point 530(config)# show lockout-mac No MAC addresses in lockout list.
Wireless Security Configuration Configuring 802.1X AP Authentication Configuring 802.1X AP Authentication The AP Authentication feature enables the AP 530 to authenticate itself to a standard RADIUS server using its own username and password, just as a client or station would. The Access Point 530 AP Authentication feature supports 802.1X port-access authentication when connecting to switches that support this feature.
Wireless Security Configuration Configuring 802.1X AP Authentication If radios are shut down on an already-authenticated access point, you will only be able to reconfigure the access point using a wired ethernet connection or the console port. C a u t i o n When a VLAN with tagged management is used together with AP authentica- tion on the Access Point 530, do not configure the switch authenticator with an "auth-vid"...
Wireless Security Configuration Configuring 802.1X AP Authentication Enable AP Authentication on the access point by selecting the [Enabled] button. Select the EAP Type from the drop-down (either MD5 or PEAP). Enter the “user” name of the access point. Enter the password of the access point “user”. Select [Update] to update the AP Authentication settings.
Page 250
Wireless Security Configuration Configuring 802.1X AP Authentication Displaying the current AP Authentication status. Use the show system- information command to check the current AP Authentication status of the access point. ProCurve Access Point 530(config)# show ap-authentication AP Authentication Settings for the Access Point: Status: Enabled EAP Type: peap...
Wireless Security Configuration Web Authentication for Mobile Users Web Authentication for Mobile Users With the ProCurve Access Point 530, you can permit mobile users to authen- ticate to your network by entering their login credentials on a Web page. Web authentication (Web-Auth) credentials are verified through a RADIUS server.
Wireless Security Configuration Web Authentication for Mobile Users URL Intercept After the user station associates with the WLAN successfully and receives an IP address, it enters the Web-Auth state. In this state, the user station is associated to the access point using one of the temporary IP addresses in the pool, but is not yet authenticated to the network.
Page 253
Wireless Security Configuration Web Authentication for Mobile Users Figure 7-14. Web-Auth Successful Authentication At this point, the user’s station enters the Authenticated state, the station receives a more permanent IP address from the network’s DHCP server, and the user can access the network resources to which he or she has rights. Failed Authentication.
Wireless Security Configuration Web Authentication for Mobile Users Redirecting to the Destination URL After successful authentication, a timer counts down until the connection to the network is established. Then the user is redirected to the Redirect URL specified on the WLAN – Web Authentication screen. Web-Auth Security User Credentials The feature may be configured to offer authentication:...
Wireless Security Configuration Web Authentication for Mobile Users The Web-Auth Address Pool When a client using dynamic IP addressing first associates with the access point, the AP-530 assigns the client a temporary IP address from a pool of temporary addresses that is shared by all Web-Auth WLANs. The addresses are served by a limited-function address server used only for initializing Web- Auth connections.
Wireless Security Configuration Web Authentication for Mobile Users Title Text Header Text Descr. Text Footer Text Figure 7-16. Web-Auth Failed Authentication Default Text Values for Authentication Screens The default values for each of the three customizable authentication screens varies, depending on whether Web-Auth access is granted to: Only registered users ■...
Wireless Security Configuration Web Authentication for Mobile Users Welcome Screen Default Values Table 7-6. Welcome Screen Default Values Registered User Only Guest User Only Registered & Guest User Title Text Authentication Success Success Authentication Success Header Text Authentication Success Success Authentication Success Footer Text You now have access to the network You now have access to the network You now have access to the network...
Wireless Security Configuration Web Authentication for Mobile Users When using Web-Auth, users must disable any proxy server for their web ■ browser. N o t e After successfully authenticating using Web-Auth, the user may experience “Page Not Found” (timeout) errors when attempting to re-access the Web- Auth home page.
Wireless Security Configuration Web Authentication for Mobile Users Lease Time: Specifies the lease, in seconds, granted to Web-Auth tempo- ■ rary addresses. ■ [Update]: Updates the Web-Auth address pool configuration. Figure 7-17. Configuring the Global Address Pool To Configure the global Address Pool: Select Web Authentication >...
Wireless Security Configuration Web Authentication for Mobile Users Configuring the global Address Pool on the access point. The follow- ing example configures a range of temporary IP addresses with 60 second leases. ProCurve Access Point 530(config)# web-auth starting-ip-address 192.168.0.1 255.255.240.0 ProCurve Access Point 530(config)# web-auth lease-time 60 show web-auth ProCurve Access Point 530(config)#...
Wireless Security Configuration Web Authentication for Mobile Users Enter the password to be assigned to all Guest users in the Password field. Click [Update]. N o t e The username and password used for the global Guest user account must also be registered on the selected Web-Auth RADIUS server before Guest users can be authenticated using Web-Auth.
Wireless Security Configuration Web Authentication for Mobile Users Web: Configuring Web-Auth on a WLAN Prerequisites ■ Before enabling Web Authentication on a WLAN, the temporary address “Web: Configuring the Global Address pool must be configured, as described in Pool” on page 7-64.
Page 263
Wireless Security Configuration Web Authentication for Mobile Users Figure 7-19. Configuring Web Authentication on a WLAN To Configure Web Authentication: Select WLANs. Click [Edit] after the selected WLAN. The WLAN Configuration Security pop-up window opens. Select the Web Authentication tab. Click Web Authentication Enabled.
Wireless Security Configuration Web Authentication for Mobile Users Click [Update]. CLI: Configuring Web-Auth on a WLAN Prerequisites Before enabling Web Authentication on a WLAN, the temporary address ■ “CLI: Configuring the Global Address Pool” pool must be configured, as described in on page 7-65.
Page 265
Wireless Security Configuration Web Authentication for Mobile Users Enabling Web-Auth on the access point. The following example enables Web-Authentication on WLAN 1, with Guest access and Registered User access enabled. ProCurve Access Point 530(radio1-wlan1)# web-auth guest-login ProCurve Access Point 530(radio1-wlan1)# web-auth username-login ProCurve Access Point 530(radio1-wlan1)# web-auth retry-limit 3 ProCurve Access Point 530(radio1-wlan1)# web-auth redirect-url www.procurve.com show wlan 1...
Wireless Security Configuration Web Authentication for Mobile Users Web: Customizing the Login, Welcome, and Failed Screens The Web Authentication – WLAN Web Authentication screen, through the Login, Welcome, and Failed tabs, shown in Figure 7-20 allows customization of the text on the three primary screens that are displayed during the Web Authentication process.
Page 267
Wireless Security Configuration Web Authentication for Mobile Users Figure 7-20. Configuring Guest Account Credentials To customize the text on the Web-Auth Login screen: Select WLANs. Click [Edit] after the selected WLAN. The WLAN Configuration Security pop-up window opens. Select the Web Authentication tab. Select the Login sub-tab.
Wireless Security Configuration Web Authentication for Mobile Users Follow the same procedure for the Welcome sub-tab and the Failed sub-tab, if desired. N o t e If any of the fields is not explicitly customized, then the default value of the field is used.
Page 269
Wireless Security Configuration Web Authentication for Mobile Users Customizing the text on the Web-Auth Login screen. The following example customizes the text fields on the Login screen. The same fields may be customized on the Welcome screen and the Failed screen as well, using their respective commands.
Page 270
Wireless Security Configuration Web Authentication for Mobile Users — This page is intentionally unused. — 7-76...
Special Features Overview Overview The Access Point 530 provides the Web interface and CLI methods for config- uring special features such as QoS, upgrading software, WDS, AP detection, and STP. This chapter describes how to: ■ Configure QoS parameters Maintain configuration and upgrade files ■...
Special Features QoS Commands QoS Commands QoS describes a range of technologies for controlling traffic on shared network connections. The IEEE 802.11e - 2005 standard defines a QoS stan- dard for transmission quality and availability of service on wireless networks. QoS is designed to provide better network service by minimizing network congestion;...
Special Features QoS Commands Web: Configuring QoS Parameters Figure 8-1. Initial QoS Screen The QoS screen, shown in Figure 8-1, enables you to modify the following QoS parameters: Wi-Fi Multimedia (WMM): Enables/disables QoS prioritization and ■ coordination of wireless medium access. The QoS settings on the Access Point 530 control downstream traffic flowing from the access point to the client station (AP EDCA parameters) and the upstream traffic flowing from the station to the access point (station EDCA parameters).
Page 276
Special Features QoS Commands Figure 8-2. QoS Advanced Settings Screen The WMM Settings pop-up window, shown in Figure 8-2, enables you to modify the following queue QoS parameters: AP Enhanced Distributed Channel Access (EDCA) Parameters: ■ Affect traffic flowing from the access point to the client station. •...
Page 277
Special Features QoS Commands for the “cwMin” are 1, 3, 7, 15, 31, 63, 127, 255, 511, and 1024. The value for “cwMin” must be lower than the value for “cwMax”. (The default per queue: 3, 7, 15, 15.) • cwMax: Specifies the Maximum Contention Window QoS parameter.
Special Features QoS Commands for the “cwMax” are 1, 3, 7, 15, 31, 63, 127, 255, 511, and 1024. The value for “cwMax” must be higher than the value for “cwMin”. (The default per queue: 7, 15, 1023, 1023.) • TXOP Limit: Specifies the Transmission Opportunity QoS parameter.
Page 279
Special Features QoS Commands ProCurve Access Point 530(radio1)#qos ap-params voice aifs ProCurve Access Point 530(radio1)# This example sets the quality of service cwMin and cwMax contention window parameters on the AP EDCA medium-priority queue. ProCurve Access Point 530(radio1)#qos ap-params video cwmin ProCurve Access Point 530(radio1)#qos ap-params video cwmax ProCurve Access Point 530(radio1)# This example sets the quality of service Burst parameter on the AP EDCA...
Page 280
Special Features QoS Commands This example sets the quality of service AIFS wait time parameter to 10 seconds on the Station EDCA high priority queue. ProCurve Access Point 530(radio1)#qos sta-params voice aifs ProCurve Access Point 530(radio1)# This example sets the quality of service cwMin and cwMax contention window parameters on the Standard EDCA high-priority queue.
Page 281
Special Features QoS Commands This example uses the show qos commands to display QoS details on the access point. ProCurve Access Point 530# configure ProCurve Access Point 530(config)# radio 1 ProCurve Access Point 530(radio1)# show qos ap-params ------------------------------------------------------------ Transmission Queue QoS Settings for the Access Point: Radio 1 Adaptive Inter- Contention...
Special Features sFlow sFlow The Access Point 530 contains an sFlow agent. The sFlow agent samples traffic flow, treating the traffic that arrives on each of the radios or on the ethernet interface as a separate flow. The sFlow agent forwards traffic information to one or more sFlow collectors. The agent can create three separate instances for each flow, and forward the information for each instance to a different sFlow collector.
Special Features sFlow sFlow datagrams are compact and do not require a large amount of network bandwidth. The sampled packets are approximately 7 percent of the original packet size, and several samples can fit in a single datagram. Extra space at the end of the datagram is filled with the counters reported by polled radios “Counter Polling by the sFlow Agent”...
Page 284
Special Features sFlow The sFlow collector reserves the instance by writing its owner string into that instance on the sFlow receiver table. The sFlow collector, or receiver, also configures a receiver timeout value for itself. The agent counts down the receiver timeout, and when the timeout falls low, the sFlow receiver renews the reservation.
Special Features Wireless Distribution System (WDS) and Spanning Tree Protocol (STP) Wireless Distribution System (WDS) and Spanning Tree Protocol (STP) The Access Point 530 includes Wireless Distribution System (WDS) support allowing wireless connectivity between access points instead of a wired Ethernet connection.
Page 286
Special Features Wireless Distribution System (WDS) and Spanning Tree Protocol (STP) At least one Access Point 530 must be connected to the network by means of a wired Ethernet connection. This Access Point 530 can then provide wireless WDS links for up to six other Access Point 530 units. In this configuration, the connected Access Point 530 (the one with the Ethernet connection) serves as a central access point to pass traffic to and from the other remote access points.
Page 287
Special Features Wireless Distribution System (WDS) and Spanning Tree Protocol (STP) The Access Point 530 can be used as a wireless bridge to connect two different wired subnetworks together. For example, you can connect wired networks in two buildings across the street from one another by attaching an Access Point 530 to each separate network and configuring with a WDS link between them.
Page 288
Special Features Wireless Distribution System (WDS) and Spanning Tree Protocol (STP) You can also configure the Access Point 530 to use WDS links in a multiple- hop configuration, as shown in Figure 8-5. In this configuration, the intermediate access point serves as a “repeater,” to bridge wireless traffic between an access point with an Ethernet connection and a more remote access point on the other side.
Special Features Wireless Distribution System (WDS) and Spanning Tree Protocol (STP) STP is supported with WDS to manage loops that might be formed in the network through configuration of multiple WDS links. Enabling STP is recom- mended whenever you configure WDS links, unless you are assured that network loops cannot occur in your WDS configuration.
Page 290
Special Features Wireless Distribution System (WDS) and Spanning Tree Protocol (STP) – Key Type: Establishes the type of the key as either ASCII or Hex. – Characters Required: Automatically populated based on the key length and key type. – WEP Key: Configures the WEP key for security. WDS WPA Security (see Figure 8-8) –...
Page 291
Special Features Wireless Distribution System (WDS) and Spanning Tree Protocol (STP) Figure 8-7. Configuring WDS Link Parameters with WEP Security To Configure WDS Link Parameters with WEP Security: Select Special Features > WDS. To enable a WDS link, choose Enabled for the specific link option. To set the radio to establish the WDS link, use the Radio drop-down.
Page 292
Special Features Wireless Distribution System (WDS) and Spanning Tree Protocol (STP) Figure 8-8. Configuring WDS Link Parameters with WPA Security To Configure WDS Link Parameters with WPA Security: Select Special Features > WDS. To enable a WDS link, click the Enabled button for the specific link. To set the radio to establish the WDS link, use the Radio drop-down.
Special Features Wireless Distribution System (WDS) and Spanning Tree Protocol (STP) CLI: Configuring WDS Links CLI Commands Used in This Section Command CLI Reference Page enable 9-158 radio-used <1 |2 > 9-159 remote-mac <mac> 9-160 wds-ssid <ssid> (required when using WPA over WDS) 9-159 wep-key-ascii 9-162...
Page 294
Special Features Wireless Distribution System (WDS) and Spanning Tree Protocol (STP) Using the CLI to Create a Radio Link. This example sets the radio used with this WDS link. ProCurve Access Point 530(wds1)#radio-used 1 Using the CLI to Set Remote MAC. This example sets the remote MAC address associated with this WDS link.
Page 295
Special Features Wireless Distribution System (WDS) and Spanning Tree Protocol (STP) ProCurve Access Point 530(wds1)#show wds #Radio Local MAC Remote MAC Status Security ----------------------------------------------------------------------------- 00:14:C2:A4:14:BO 00:0D:9D:C6:98:7E Enabled no-security 00:14:C2:A4:14:AO 00:11:33:C6:88:EE Disabled no-security not assigned yet not set Disabled no-security not assigned yet not set Disabled no-security...
Special Features Wireless Distribution System (WDS) and Spanning Tree Protocol (STP) Web: Configuring STP Parameters The WDS screen in the Web browser interface (see Figure 8-9) provides global configuration for the Spanning Tree Protocol (STP). To modify additional “CLI: Establishing STP Settings” on page 8-27.
Special Features Wireless Distribution System (WDS) and Spanning Tree Protocol (STP) CLI: Establishing STP Settings CLI Commands Used in This Section Command CLI Reference Page [no] stp [hello-time <value>] [forward-delay <value>] [priority 9-164 <value>] show interface ethernet 9-97 N OT E This STP configuration is available only through the CLI and not through the Web browser interface.
Page 298
Special Features Wireless Distribution System (WDS) and Spanning Tree Protocol (STP) Using the CLI to View WDS Parameters. These examples use the show interface ethernet command and the show wds x command to check the status of the STP state and configured parameters. ProCurve Access Point 530#show interface ethernet Ethernet interface: --------------------...
Page 299
Special Features Wireless Distribution System (WDS) and Spanning Tree Protocol (STP) N o t e Spanning Tree Protocol (STP) has detected a loop and the WDS 1 interface is being blocked by STP, as shown in the following example. ProCurve Access Point 530(wds1)#show wds 1 WDS #1 Description Wireless Distribution System - Link 1 Status...
Special Features AP Detection Commands AP Detection Commands You can configure the access point to periodically scan all radio channels and find other access points within range. Alternatively, the access point can scan continuously in a dedicated mode with no stations supported. A database of nearby access points is maintained where detected access points can be identified.
Page 301
Special Features AP Detection Commands The Settings tab, shown in Figure 8-11, enables you to modify the following parameters: ■ AP Detection Radio 1/Radio 2: Enables/disables ability per radio for the access point to scan radio channels to discover other access points. (The default is Disable.) Scan Interval: Sets the minimum amount of time that the access point ■...
Page 302
Special Features AP Detection Commands Figure 8-11. AP Detection - Settings Tab To Enable AP Detection Parameters: Select Special Features > AP Detection and click the Settings tab. To enable scanning, select Enable from the AP Detection drop-down for the radio you are configuring.
Special Features AP Detection Commands CLI: Configuring AP Detection CLI Commands Used in This Section Command CLI Reference Page [no] ap-detection [dedicated] 9-136 ap-detection duration <value> 9-137 ap-detection interval <value> 9-138 ap-detection expire-time <value> 9-137 ap-detection max-entries <value> 9-138 show detected-ap 9-139 Using the CLI to Enable Dedicated Neighboring AP Detection.
Page 304
Special Features AP Detection Commands ProCurve Access Point 530(radio1)#ap-detection expire-time ProCurve Access Point 530(radio1)#ap-detection max-entries Using the CLI to View the AP Scan Results. This example displays the current AP detection results. ProCurve Access Point 530(radio1)#show detected-ap Neighboring APs: BSSID SSID Chan Type...
Special Features Probe Table Probe Table The Access Point 530 supports the Rogue AP Detection feature in ProCurve Mobility Manager by making available, via SNMP, a table of PROBE requests from unassociated audible clients. Probe Table Description The first time a PROBE request is received from an unassociated audible client, a new entry in the Probe Table is created, consisting of: Radio number (1 or 2) ■...
Special Features Identity Driven Management Identity Driven Management Identity-Driven Management (IDM) is integrated with 802.1X authentication methods, and to successfully utilize IDM, the access point SSID slated to use IDM must have one of the 802.1X security methods configured. IDM automat- ically configures the edge of the network, based on the identity of the user.
Command Line Reference Overview Overview This chapter describes the commands provided by the Access Point 530 CLI. The CLI commands can be broken down into the functional groups shown below. Command Group Description Page General Initial commands for performing basic access point tasks. 9-10 System Management Basic commands for performing basic status, management,...
Page 317
Command Line Reference Overview The access mode shown in the following tables is indicated by these abbrevi- ations: • GC (Global Configuration), MC (Manager Executive Configuration), • • IC-E (Ethernet Interface Configuration), • IC-WDS(WDS Interface Configuration), • IC-R (Radio Wireless Interface Configuration), and •...
Command Line Reference General Commands General Commands These commands are used to configure the basic commands on the access point. Command Function Mode Page configure Set the current context level to the Global 9-10 Configuration level. copy “Flash/File Commands” on page 9-50 9-51 Sets the current context level to the Manager Exec 9-11...
Command Line Reference General Commands Default Setting Command Mode Manager Exec Example ProCurve Access Point 530# configure ProCurve Access Point 530(config) This command sets the current context level to the Manager Exec level. Syntax Default Setting Command Mode Manager Exec Example This example shows how to return to the Manager Exec level from the Ethernet Interface Configuration mode:...
Command Line Reference General Commands Command Mode Manager Exec Example This example shows how to return to the previous command levels starting from the Interface Configuration mode and finally logging out of the CLI session: ProCurve Access Point 530(ethernet)# exit ProCurve Access Point 530(config)# exit ProCurve Access Point 530# exit Connection to host lost.
Command Line Reference General Commands Default Setting Command Mode Manager Exec Command Usage • Use the ping command to see if another site on the network can be reached. The following are some results of the ping command: • – Normal response - The normal response occurs in one to ten seconds, depending on network traffic.
Command Line Reference General Commands This example shows how to perform a warm reboot of the system: ProCurve Access Point 530# reload Device will be rebooted, do you want to continue [y/n]?y Do you want to save the current configuration [y/n]?n Connection to host lost.
Page 323
Command Line Reference General Commands logging - Shows all the entries in the event log. See “show logging” on • page 9-32. mac-auth-local - Show all the entries in the local MAC address authen- • “show mac-auth-local” on page 9-74. tication control lists.
Command Line Reference System Management Commands terminal This command sets terminal line parameters. Syntax terminal length | width length - Set number of lines on a screen. • – <2-1000> - Number of lines on a screen. width - Set width of display terminal. •...
Command Line Reference System Management Commands Command Function Mode Page 9-21 [no] buttons Enables the ability to clear the password(s) and/or configurations. [no] cli-configuration Enables all CLI confirmation dialog prompts. 9-24 9-23 [no] console Enables the access point to be managed through a serial port.
Page 326
Command Line Reference System Management Commands Country Code Country Code Country Code Country Code Argentina French Guiana Luxembourg Singapore Armenia Georgia Macau Slovakia Australia Germany Macedonia, The Former Slovenia Yugoslav Republic Of Austria Gibraltar Malaysia South Africa Azerbaijan Greece Malta Spain Bahamas Guam...
Command Line Reference System Management Commands Country Code Country Code Country Code Country Code Cuba Korea, Democratic Philippines Yemen People Republic Of Cyprus Korea, Republic Of Poland Zambia Czech Republic Kuwait Portugal Zimbabwe Denmark Kyrgyzstan Puerto Rico Dominican Republic Lao People’s Democratic Qatar Republic Ecuador...
Command Line Reference System Management Commands hostname - A text string to identify the system. • (Maximum length: 50 characters) Default Setting ProCurve-AP-530 Command Mode Global Configuration Example ProCurve Access Point 530# configure ProCurve Access Point 530(config)# hostname Gary domain This command sets the system domain name suffix for hostname/domain- name lookups, when the suffix is not obtained through DHCP.
Command Line Reference System Management Commands password manager This command sets the password for entering the Manager Exec level. Syntax password manager <password> password - A text string to establish security for entry into the Manager • Exec level. Note: The password is case sensitive and must be at least 1 character and at most 32 characters long.
Command Line Reference System Management Commands password-reset - Enables the ability to reset the password(s) on this • device via the buttons. The no version of the command disables this devices ability to reset the password(s) on this device via the buttons. system-reset - Enables the ability to reset the system via the buttons.
Command Line Reference System Management Commands Example ProCurve Access Point 530# configure ProCurve Access Point 530(config)# cli-confirmation ProCurve Access Point 530(config)# console This command enables the serial console on the access point. The no version disables the serial console on the access point. The no console command will not work if the factory reset button is already disabled (e.g."...
Command Line Reference System Management Commands Command Mode Global Configuration Example ProCurve Access Point 530# configure ProCurve Access Point 530(config)# telnet ProCurve Access Point 530(config)# This command enables the remote ssh access to this device. The no version disables the remote ssh access to this device. Syntax no ssh Default Setting...
Command Line Reference System Management Commands ssl - Enable remote HTTPS (secure) access to the device. The no • version of the command disables remote HTTPS access. Default Setting Enabled Command Mode Global Configuration Example ProCurve Access Point 530# configure ProCurve Access Point 530(config)# web-management ssl ProCurve Access Point 530(config)# show buttons...
Command Line Reference System Management Commands show console This command displays the status of the console. Syntax show console Default Setting Command Mode Manager Exec General Configuration Context Example ProCurve Access Point 530(config)# show console CLI Access: Serial Interface Enabled Telnet Interface Enabled SSH Interface...
Command Line Reference System Management Commands Example ProCurve Access Point 530(config)# show ssh SSH Status Enabled ProCurve Access Point 530(config)# show system-information This command shows information about the device and the hostname/DNS information. This command is the same as the show system command. Syntax show system-information Default Setting...
Page 336
Command Line Reference System Management Commands Example ProCurve Access Point 530# show system-information Serial Number TW547VV07X System Name ProCurve-AP-530 System Up Time 2 days 23 hours 35 mins 18 secs System Location not set System Country Code Software Version WA.01.00 Ethernet MAC Address 00:14:C2:A5:08:CB IP Address...
Command Line Reference System Management Commands show version This command displays the version of the software running on the device. Syntax show version Default Setting Command Mode Manager Exec Global Configuration Example ProCurve Access Point 530# show version Image Software Version WA.02.00.0412 Boot Software Version WAB.01.00...
Command Line Reference System Logging Commands System Logging Commands These commands are used to configure system logging on the access point. Command Function Mode Page Displays all log entries in access point memory. 9-30 [no] logging Adds a syslog server host IP address and assign a port number 9-31 <syslog_host>...
Command Line Reference System Logging Commands Example ProCurve Access Point 530# log Keys: M=eMergency C=Critical W=Warning I=Information A=Alert E=Error N=Notice D=Debug ----- Event Log Listing: Most Recent Events First ---- I 01/03/00 03:57:15 login[29765]: root login on `ttyp0' I 01/03/00 02:28:56 login[24466]: root login on `ttyp0' I 01/02/00 04:00:49 login[7445]: root login on `ttyp0'...
Command Line Reference System Logging Commands Command Usage The following examples show how to relay log entries to a syslog host on port 514 at IP address 10.1.0.3. Example ProCurve Access Point 530# configure ProCurve Access Point 530(config)# logging 10.1.0.3 514 ProCurve Access Point 530(config)# Related Commands show logging...
Page 341
Command Line Reference System Logging Commands Syntax show logging Default Setting Command Mode Manager Exec Example ProCurve Access Point 530# show logging Keys: M=eMergency C=Critical W=Warning I=Information A=Alert E=Error N=Notice D=Debug ----- Event Log Listing: Most Recent Events First ---- I 01/03/00 03:57:15 login[29765]: root login on `ttyp0' I 01/03/00 02:28:56 login[24466]: root login...
Command Line Reference System Clock Commands System Clock Commands These commands are used to configure SNTP on the access point. Command Function Mode Page sntp <server> Specifies time server 9-34 [ time-zone <minutes>] show sntp Shows current SNTP configuration settings. 9-35 show time Shows current date and time.
Command Line Reference System Clock Commands Example ProCurve Access Point 530# configure ProCurve Access Point 530(config)# sntp 10.1.0.19 time-zone -480 show sntp This command displays the current time and configuration settings for the SNTP client. Syntax show sntp Default Setting Command Mode Manager Exec Example...
Page 344
Command Line Reference System Clock Commands Example ProCurve Access Point 530# show time Sat Jan 3 16:35:14 2008 ProCurve Access Point 530# 9-36...
Command Line Reference Network Management Application Commands Network Management Application Commands These commands are used to configure Simple Network Management Protocol (SNMP) and Link Layer Discovery Protocol which defines standards for facilities network management.. Command Function Mode Page SNMP [no] snmp-server community Sets up the private community access string to 9-38 <comm>...
Command Line Reference Network Management Application Commands snmp-server community restricted | unrestricted This command defines the community access string for the read-only or read- write access Simple Network Management Protocol. Use the no form to remove the specified community string. Syntax snmp-server <...
Command Line Reference Network Management Application Commands snmp-server contact This command specifies the SNMP contact name. Use the no form to remove the specified contact name. Syntax snmp-server contact <contact> no snmp-server contact contact - Name of the contact. • Default Setting Command Mode Global Configuration...
Command Line Reference Network Management Application Commands snmp-server host This command specifies the recipient of an SNMP trap notification. Use the no form to remove the specified trap host. Syntax snmp-server host <host> <comm> no snmp-server host host - IP address of the host. •...
Command Line Reference Network Management Application Commands snmp-server location This command specifies the SNMP location description. Use the no form to remove the specified location description. Syntax snmp-server location <location> no snmp-server location location - Name of the contact. • Default Setting Command Mode Global Configuration...
Command Line Reference Network Management Application Commands snmp-server port This command specifies the port number that the SNMP server will use on this device. Syntax snmp-server port <port> port - The number specifying the port to which the SNMP server will •...
Command Line Reference Network Management Application Commands snmp-server trap This command enables and disables selected SNMP traps on the access point. Syntax [no] snmp-server trap <trap> trap - One of the SNMP traps supported by the AP-530: • adHocNetworkDetected apDetectionUpdate apInterfaceUpdate buttonUpdate clientAssociation...
Page 352
Command Line Reference Network Management Application Commands Example ProCurve Access Point 530# configure ProCurve Access Point 530(config)# snmp-server trap radiusAcctUpdate ProCurve Access Point 530(config)# 9-44...
Command Line Reference Network Management Application Commands show snmp-server This command displays information about the configuration and status of the SNMP server on this device. Syntax show snmp-server Default Setting None Command Mode Manger Exec Example ProCurve Access Point 530# configure ProCurve Access Point 530(config)# show snmp-server SNMP Server Settings ---------------------------------------------------------------------------...
Command Line Reference Network Management Application Commands snmpv3 enable This command enables and disables SNMPv3 functions on the access point. Syntax snmpv3 enable [no] snmpv3 enable Default Setting Disabled Command Mode Global Configuration Example ProCurve Access Point 530# config ProCurve Access Point 530(config)# snmpv3 enable ProCurve Access Point 530(config)# show snmpv3 SNMPv3: Enabled...
Command Line Reference Network Management Application Commands show snmpv3 This command displays the current SNMPv3 settings on the access point. Syntax show snmpv3 Default Setting Disabled Command Mode Manager Exec Example ProCurve Access Point 530# show snmpv3 SNMPv3: Enabled SNMP engine ID: 00:00:00:0b:00:00:00:14:c2:a5:09:8c SNMPv3 user accounts: Username Auth.
Command Line Reference Network Management Application Commands Command Mode Global Configuration Example ProCurve Access Point 530# configure ProCurve Access Point 530(config)# lldp ProCurve Access Point 530(config)# show lldp This command displays the status of the Link Layer Discovery Protocol (LLDP) service on the device. Syntax show lldp Default...
Command Line Reference Flash/File Commands Flash/File Commands These commands are used to manage the system software or configuration files. Command Function Mode Page copy <ftp | scp | Copy data from a remote server onto the device. 9-53 tftp> <flash | startup-config>...
Command Line Reference Flash/File Commands copy This command copies data from a remote server onto the device. Syntax copy <ftp | scp | tftp> <flash | startup-config> <ip> <file> [user-name <user> password <pass>] ftp | scp | tftp - Specifies the type of remote server where the file is •...
Command Line Reference Flash/File Commands Syntax copy custom-default startup-config Default Setting Command Mode Manager Exec Example In this example, the copy custom-default startup-config command resets the startup configuration to the same setting as the custom-default configuration. ProCurve Access Point 530# copy custom-default startup- config ProCurve Access Point 530# Related Commands...
Command Line Reference Flash/File Commands startup-config - Copies the running configuration to the startup config- • uration file. This option is functionally the same as the write memory command. custom-default - Copies the running configuration to the customer- • modifiable default configuration file. Default Setting Command Mode Manager Exec...
Command Line Reference Flash/File Commands Default Setting Command Mode Manager Exec Example This example shows how to reset the startup configuration to the defaults.: ProCurve Access Point 530# erase startup-config ProCurve Access Point 530# Related Commands copy custom-default startup-config (page 9-51) write This command views or saves the running configuration of the device.
Command Line Reference Flash/File Commands show config This command displays the startup configuration on the device. Syntax show config Default Setting Command Mode Manager Exec Example ProCurve Access Point 530# show config <?xml version="1.0"?> <config> <interface name="wlan0wds1"> <type>wds</type> <status>down</status> <wds-security-policy>no-security</wds-security-policy> <wep-key-length>104</wep-key-length>...
Command Line Reference Flash/File Commands show copy This command displays the status of the last copy operation (ftp/scp/tcfp). Syntax show copy Default Setting Command Mode Manager Exec Global Configuration Example ProCurve Access Point 530# show copy ------------------------------------------------------------ Copy Operation Status (FTP/SCP/TFTP) Last software image (flash) copy result: not initiated Last configuration file copy result:...
Command Line Reference Flash/File Commands Example ProCurve Access Point 530# show tech ------------------------------------------------------------ Description Radio 1 - WLAN 10 Status Disabled SSID SSID 10 VLAN None BSSID not assigned yet DTIM Period Security Type no-security (No Sec.) Closed System Disabled MAC Auth Mode local deny-list only MAC Auth List...
Page 367
Command Line Reference Flash/File Commands Example ProCurve Access Point 530# show custom-default Version: 1 Length: 98936 MD5sum: 87a35d67230ec78a4a33d37abbf2bec0 <?xml version="1.0"?> <config> <interface name="wlan0wds1"> <type>wds</type> <status>down</status> <wds-security-policy>wpa-psk</wds-security-policy> <wep-key-length>104</wep-key-length> <radio>wlan1</radio> <wds-ssid>WDS SSID 2</wds-ssid> <wep-key-ascii>no</wep-key-ascii> <wds-wpa-psk-format>ascii</wds-wpa-psk-format> <description>Wireless Distribution System - Link 2</ description> </interface>...
Command Line Reference Flash/File Commands show running-config This command displays the running configuration file in a readable text format. Syntax show running-config Default Setting Command Mode Manager Exec Example ProCurve Access Point 530# show running-config <config> <interface name="wlan0wds1"> <type>wds</type> <status>down</status> <wds-security-policy>no-security</wds-security-policy>...
Command Line Reference Group Configuration Group Configuration Use the following commands to configure a group of access points whose parameters are synchronized whenever one member of the group is updated. Only parameters in the Group Configuration Parameter Block are synchro- nized Command Function...
Command Line Reference Group Configuration The following example enables the group configuration feature. ProCurve Access Point 530# configure ProCurve Access Point 530(config)# group-config write memory ProCurve Access Point 530(config)# ProCurve Access Point 530(config)# group-config name The command sets the name of the group to which the access point will belong.
Command Line Reference Group Configuration member-id - The string that identifies the access point within the group. • (Range: 1-40 alphanumeric characters) Default Setting None Command Mode Global Configuration Example: The following example identifies the access point in the member list as "AP1". ProCurve Access Point 530# configure ProCurve Access Point 530(config)# group-config member-id AP1 ProCurve Access Point 530(config)# write memory...
Page 372
Command Line Reference Group Configuration Example:. ProCurve Access Point 530# show group-config Status: Enabled Group name: WHBldg22 Member ID: ------------------------------- 00:14:C2:A5:09:8C 10.0.1.101 00:14:C2:A5:6A:B3 10.0.1.102 ProCurve Access Point 530# 9-64...
Command Line Reference RADIUS Accounting/Authentication RADIUS Accounting/Authentication The access point provides configuration for RADIUS Accounting servers and Radius Authentication which can be used to provide valuable information on user activity in the network. Command Function Mode Page [no] radius-accounting < primary | Enables RADIUS Accounting.
Command Line Reference RADIUS Accounting/Authentication Default Setting Disabled Command Mode WLAN Radio Interface Configuration Example ProCurve Access Point 530# configure ProCurve Access Point 530(config)# radio 1 ProCurve Access Point 530(radio1)# wlan 1 ProCurve Access Point 530(radio1-wlan1)# radius-accounting primary ip 192.168.1.52 ProCurve Access Point 530(radio1-wlan1)# radius-accounting port 161 ProCurve Access Point 530(radio1-wlan1)# radius-accounting...
Command Line Reference RADIUS Accounting/Authentication Example ProCurve Access Point 530# configure ProCurve Access Point 530(config)# radio1 ProCurve Access Point 530(radio1)# wlan 1 ProCurve Access Point 530(radio1-wlan1)# radius failover-to- local ProCurve Access Point 530(radio1-wlan1)# radius retransmit radius primary | secondary This command configures RADIUS configures primary and secondary param- eters for this WLAN.
Page 376
Command Line Reference RADIUS Accounting/Authentication mac-format single-dash - MAC addresses are in the form xxxxxx-xxxxxx. • Default Setting DHCP is enabled. Command Mode WLAN Radio Interface Configuration Example ProCurve Access Point 530# configure ProCurve Access Point 530(config)# radio 1 ProCurve Access Point 530(radio1)# wlan 1 ProCurve Access Point 530(radio1-wlan1)# radius primary key open ProCurve Access Point 530(radio1-wlan1)# radius primary ip...
Command Line Reference RADIUS Users RADIUS Users The access point provides configuration to add local RADIUS user information in the network. Command Function Mode Page [no] radius-local Configure a new radius-local user account or modify 9-69 <username> [disabled] a user account. | [ password <password>| realname <realname>]...
Command Line Reference RADIUS Users Command Mode Global Configuration Example: The following example first sets the radius-local username to "chris" and subsequently sets the password for the chris user account to "chrisopen". ProCurve Access Point 530# configure ProCurve Access Point 530(config)# radius-local chris ProCurve Access Point 530(config)# radius-local chris password chrisopen ProCurve Access Point 530(config)#...
Page 379
Command Line Reference RADIUS Users Example ProCurve Access Point 530# configure ProCurve Access Point 530(config)# show radius-local Username Real Name Status ---------- ---------- ---------- MSmith Mr Smith Enabled Chris CSmith Enabled ProCurve Access Point 530(config)# 9-71...
Command Line Reference MAC Address Authentication MAC Address Authentication Use these commands to define MAC authentication on the access point. For local MAC authentication, first create the MAC authorization lists, enter the MAC addresses to be filtered and then define the default filtering policy using the address filter default command.
Command Line Reference MAC Address Authentication Default None Command Mode WLAN Interface Configuration Example ProCurve Access Point 530# configure ProCurve Access Point 530(config)# radio 1 ProCurve Access Point 530(radio1)# wlan 1 ProCurve Access Point 530(radio1-wlan1)# mac-auth-local Bob accept-list ProCurve Access Point 530(radio1-wlan1)# mac-auth-remote This command enables remote MAC address authentication by using the RADIUS authentication server settings on this WLAN.
Command Line Reference MAC Address Authentication show mac-auth-local This command displays all the entries in the local MAC address authentication control lists on the device. Syntax show mac-auth-local [<name> ] • name - Displays only MAC address entries for the specified list. Default Command Mode WLAN Radio Interface Configuration...
Command Line Reference MAC Lockout MAC Lockout Use these commands to control MAC lockout functions on the access point. Command Function Mode Page [no] lockout-mac <mac Adds or removes the selected MAC address to the MAC 9-75 address> Lockout list. show lockout-mac Shows all entries in the MAC Lockout list.
Command Line Reference MAC Lockout show lockout-mac This command displays all entries in the MAC Lockout list on the device. Syntax show lockout-mac Default None Command Mode Manager Exec Example ProCurve Access Point 530# show lockout-mac Locked out addresses 00:14:C2:A5:09:8D 0A:16:D2:5A:23:78 Number of locked out MAC addresses = 2 ProCurve Access Point 530#...
Page 385
Command Line Reference MAC Lockout Example ProCurve Access Point 530# configure ProCurve Access Point 530(config)# lockout-mac clear all 2 MAC addresses removed from lockout list ProCurve Access Point 530(config)# show lockout-mac No MAC addresses in lockout list. ProCurve Access Point 530(config)# 9-77...
Command Line Reference Client/Station Deauthentication Client/Station Deauthentication Use this command to deauthenticate a device. Command Function Mode Page deauth-mac <mac Deauthenticates the specified MAC address from the 9-78 address> device. deauth-mac This command deauthenticates a device from the access point. Syntax deauth-mac <mac address>...
Command Line Reference Web Authentication Commands Web Authentication Commands The commands described in this section are used to enable and configure Web Authentication (Web-Auth) in the Access Point 530. Command Function Mode Page Global [no] web-auth Enables 802.1X authentication using a IC-R- 9-82 Web-browser interface on the access...
Command Line Reference Web Authentication Commands Command Function Mode Page web-auth custom-login-text [title <title- Specifies the custom text field values IC-R- 9-83 text>] | [header <header-text>] | [footer on the Web-Auth Login screen. WLAN <footer-text>] | [descriptive <descriptive-text>] [no] web-auth default-welcome-page Enables or disables the default field IC-R- 9-83...
Command Line Reference Web Authentication Commands Example ProCurve Access Point 530(config)# web-auth starting-ip- address 192.168.0.1 255.255.240.0 ProCurve Access Point 530(config)# web-auth lease-time 60 show web-auth ProCurve Access Point 530(config)# Temporary Address Pool Start 192.168.0.1 Subnet 255.255.240.0 Lease time (secs.) Guest Username lbg_guest Guest Password lbgpassword...
Command Line Reference Web Authentication Commands web-auth (WLAN Configuration) These commands configure the Web-Auth settings for the selected WLAN. The no version of a command clears the field value. Syntax [no] web-auth [no] web-auth guest-login [no] web-auth username-login [no] web-auth redirect-url web-auth retry-limit <retries>...
Command Line Reference Web Authentication Commands Example ProCurve Access Point 530(radio1-wlan1)# web-auth guest-login ProCurve Access Point 530(radio1-wlan1)# web-auth username-login ProCurve Access Point 530(radio1-wlan1)# web-auth retry-limit 3 ProCurve Access Point 530(radio1-wlan1)# web-auth redirect-url www.procurve.com show wlan 1 ProCurve Access Point 530(radio1-wlan1)# WLAN # 1 on Radio 1 Description Radio 1 - WLAN 1...
Command Line Reference Web Authentication Commands Example ProCurve Access Point 530(radio1-wlan1)# web-auth custom-login-text title GS User Login ProCurve Access Point 530(radio1-wlan1)# web-auth custom-login-text header GS User Login ProCurve Access Point 530(radio1-wlan1)# web-auth custom-login-text descriptive Enter your General Services Department username and password. show wlan 1 ProCurve Access Point 530(radio1-wlan1)# show web-auth...
Command Line Reference AP Authentication Commands AP Authentication Commands The command described in this section is used to enable and configure AP Authentication in the Access Point 530. Command Function Mode Page [no] ap-authentication Enables and disables AP authentication on the 9-86 access point.
Command Line Reference Filtering Commands show ap-authentication This command displays the current AP Authentication settings on the device. Syntax show ap-authentication Default none Command Mode Global Configuration Example ProCurve Access Point 530(config)# show ap-authentication Status: Enabled EAP Type: peap ProCurve Access Point 530(config)# Filtering Commands The commands described in this section are used to filter communications between wireless stations, control access to the management interface from...
Command Line Reference Filtering Commands inter-station-blocking This command enables inter station blocking on the device. The no version of the command disables inter station blocking on the device. Syntax inter-station-blocking no inter-station-blocking Default Disabled Command Mode Global Configuration Example ProCurve Access Point 530# configure ProCurve Access Point 530(config)# inter-station-blocking ProCurve Access Point 530(config)# wireless-mgmt-block...
Command Line Reference Filtering Commands ProCurve Access Point 530# configure ProCurve Access Point 530(config)# wireless-mgmt-block ProCurve Access Point 530(config)# show filters This command displays management/traffic/security filter settings for the device. Syntax show filters Default Command Mode Global Configuration Manager Exec Example.
Command Line Reference Ethernet Interface Commands Ethernet Interface Commands The commands described in this section configure connection parameters for the Ethernet interface. Command Function Mode Page interface <interface> Enters Ethernet interface configuration mode 9-90 enable Enables the interface. IC-E 9-91 disable Disables the interface.
Command Line Reference Ethernet Interface Commands Command Usage This command allows you to disable the Ethernet interface due to abnormal behavior (e.g., excessive collisions), and re-enable it after the problem has been resolved. You may also want to disable the Ethernet interface for security reasons.
Command Line Reference Ethernet Interface Commands Syntax dns primary <server_1> server_1 - A static ip address set to the primary dns server. • (0.0.0.0~255.255.255.255) Default Setting Disabled Command Mode Global Configuration Command Usage • The primary and secondary name servers are queried in sequence. •...
Command Line Reference Ethernet Interface Commands Example ProCurve Access Point 530# configure ProCurve Access Point 530(config)# dns secondary 10.1.0.55 ProCurve Access Point 530(config)# ip address This command configures the IP address settings for the interface. The no version of the command clears the statically assigned IP address and network mask.
Command Line Reference Ethernet Interface Commands • DHCP is enabled by default.The static ip address is used if the dhcp client is enabled, but can't contact a DHCP server. If contact is made with a DHCP server, then the DHCP client must be disabled in order to implement a static ip address.
Command Line Reference Ethernet Interface Commands Example: ProCurve Access Point 530(config)# interface ethernet ProCurve Access Point 530(ethernet)# ip default-gateway 192.168.1.1 ProCurve Access Point 530(ethernet)# speed-duplex This command configures the mode of operation for the Ethernet port (Requires reboot). Syntax speed-duplex <auto |auto-10 |auto-100 |10-half |100-half |10-full |100-full > auto - Uses auto negotiation for speed and duplex mode.
Command Line Reference Ethernet Interface Commands Default Setting Command Mode Manager Exec Example ProCurve Access Point 530# show ip IP Address Information: System Host Name ProCurve-AP-530 IP Address 192.168.1.2 Subnet Mask 255.255.255.0 Default Gateway 192.168.1.253 DHCP Client Enabled DNS Information (Obtained from DHCP): Domain Name Suffix example.ca.example.net.
Command Line Reference Ethernet Interface Commands Example ProCurve Access Point 530# show interface ethernet Ethernet interface: --------------------- Description Ethernet MAC address 00:14:C2:A5:08:CB Speed-duplex auto Administrative status Enabled Link status [add-in-future] Management VLAN ID Untagged-VLAN ID Spanning Tree (STP) Enabled STP Port State forwarding STP Hello Interval 10.0...
Page 407
Command Line Reference Ethernet Interface Commands Example ProCurve Access Point 530# show ip IP Address Information: System Host Name ProCurve-AP-530 IP Address 192.168.1.2 Subnet Mask 255.255.255.0 Default Gateway 192.168.1.253 DHCP Client Enabled DNS Information (Obtained from DHCP): Domain Name Suffix example.net Primary DNS Server 204.127.202.0...
Command Line Reference Wireless Interface Commands Wireless Interface Commands The commands described in this section configure global parameters for the wireless interface. Command Function Mode Page radio < 1 | 2 > Enters wireless interface configuration mode. 9-101 ssid <ssid> Sets SSID string.
Command Line Reference Wireless Interface Commands Command Function Mode Page slot-time Sets the wait time. IC-R 9-113 rts-threshold Sets the packet size threshold at which an RTS must IC-R 9-113 be sent to the receiving station prior to the sending station starting communications tx-power-reduction Adjusts the power of the radio signals transmitted from...
Command Line Reference Wireless Interface Commands Example ProCurve Access Point 530# configure ProCurve Access Point 530(config)# radio 1 ProCurve Access Point 530(radio1)# ssid This command sets the Service Set Identifier (SSID) for this WLAN. Syntax ssid <ssid> ssid - The text string that specifies the SSID of the interface. •...
Command Line Reference Wireless Interface Commands description This command adds a description to the radio, ssid, or wds interfaces. Use the no form to remove the description. The interface description is displayed when using the show wlan 1 command from the Manager Exec level. Syntax description <string>...
Page 412
Command Line Reference Wireless Interface Commands Command Mode WLAN Interface Configuration Command Usage • When closed system is enabled, stations with a configured SSID of "any" are not able to associate with the access point. Example ProCurve Access Point 530# configure ProCurve Access Point 530(config)# radio 1 ProCurve Access Point 530(radio1)# wlan 1 ProCurve Access Point 530(radio1-wlan1)# closed-system...
Command Line Reference Wireless Interface Commands Radio Interface Configuration Example ProCurve Access Point 530# configure ProCurve Access Point 530(config)# radio 1 ProCurve Access Point 530(radio1)# mode g ProCurve Access Point 530(radio1)# antenna This command configures which antenna to use with this radio. Syntax antenna <external | internal>...
Command Line Reference Wireless Interface Commands single - Single antenna (using the "primary" antenna plug only. • Default Setting Diversity Command Mode Radio Interface Configuration Example ProCurve Access Point 530# configure ProCurve Access Point 530(config)# radio 1 ProCurve Access Point 530(radio1)# antenna mode diversity ProCurve Access Point 530(radio1)# basic-rate This command configures the specified transmission rate to the set of adver-...
Command Line Reference Wireless Interface Commands supported-rate This command adds the specified transmission rate to the set of supported rates for this radio. The no version of the command removes the specified transmission rate from the set of supported rates for this radio. Syntax supported-rate <value>...
Command Line Reference Wireless Interface Commands Example ProCurve Access Point 530# configure ProCurve Access Point 530(config)# radio 1 ProCurve Access Point 530(radio1)# channel-policy static 1 ProCurve Access Point 530(radio1)# beacon-interval This command configures the rate at which beacon frames are transmitted rate-limit from the access point.
Command Line Reference Wireless Interface Commands dtim-period This command configures the frequency at which stations sleeping in low- power mode should wake up to receive broadcast/multicast transmissions. Syntax dtim-period <value> value - Interval between the beacon frames that transmit broadcast or •...
Command Line Reference Wireless Interface Commands max-stations This command sets the maximum number of wireless stations for this WLAN. Syntax max-stations<value> value - The value of the maximum number of stations. Valid value is • between 0 and 256. Default Setting Command Mode Radio Interface Configuration Example...
Command Line Reference Wireless Interface Commands Example ProCurve Access Point 530# configure ProCurve Access Point 530(config)# radio 1 ProCurve Access Point 530(radio1)# preamble short ProCurve Access Point 530(radio1# protected-mode This command configures the 802.11 b/g CTS protection mode for this radio. The no version of the command disables the protection mode.
Command Line Reference Wireless Interface Commands Command Mode Radio Interface Configuration Command Usage • If the packet size is smaller than the preset fragment size, the packet will not be fragmented. • Setting the threshold to the largest value (2,346 bytes) effectively disables fragmentation.
Command Line Reference Wireless Interface Commands Example ProCurve Access Point 530# configure ProCurve Access Point 530(config)# radio 1 ProCurve Access Point 530(radio1)# inactivity-timeout 10 ProCurve Access Point 530(radio1)# slot-time This command sets the wait-time before transmitting data on this radio. Syntax slot-time <long | short>...
Command Line Reference Wireless Interface Commands Command Mode Radio Interface Configuration Command Usage • If the threshold is set to 0, the access point always sends RTS signals. If set to 2347, the access point never sends RTS signals. If set to any other value, and the packet size equals or exceeds the RTS threshold, the RTS/CTS (Request to Send / Clear to Send) mechanism will be enabled.
Command Line Reference Wireless Interface Commands Command Usage • The radio operates at maximum power when this parameter is set to 0 dB. • It may be necessary to apply Tx Power Reduction, if your antenna gain causes the radio power to exceed the regulatory domain limit. •...
Command Line Reference Wireless Interface Commands disable (wireless) This command disables either the radio, ssid, or wds interfaces. Syntax disable Default Setting Command Mode Radio Interface Configuration WDS Interface Configuration WLAN Interface Configuration Example ProCurve Access Point 530# configure ProCurve Access Point 530(config)# radio 1 ProCurve Access Point 530(radio1)# disable ProCurve Access Point 530(radio1)# show radio...
Command Line Reference Wireless Interface Commands Example ProCurve Access Point 530# show radios ------------------------------------------------------------ Radio Status Base MAC Address Mode Channel TX-Power ----------------------------------------------------------------------- Disabled 00:14:C2:A5:22:E0 802.11g - Auto 0 dBm Disabled 00:14:C2:A5:22:F0 802.11a 36 - Auto 0 dBm ProCurve Access Point 530# show radio 1 Description Radio 1 - 802.11g Base MAC...
Page 426
Command Line Reference Wireless Interface Commands all - Display information about the WLAN (SSID/BSS) on both radios • (only has an effect when in a radio or WLAN context). Default Command Mode Manager Exec WLAN Interface Configuration Example: show ssid 1 ProCurve Access Point 530# show ssid 1 WLAN # 1 on Radio 1 Description...
Command Line Reference Wireless Interface Commands show wlan This command provides information about the Service Sets/Basic Service Sets of the radio(s) on the device. If in a radio or WLAN context, displays informa- tion only about the radio in context. This is functionally equivalent to the show ssid command.
Page 428
Command Line Reference Wireless Interface Commands Example: show wlans ProCurve Access Point 530(radio1-wlan1)# show wlans All WLANs on Radio 1: WLAN BSSID VLAN Security Status ------------------------------------------------------------------------------ SSID 1 00:14:C2:A5:22:E0 No Sec. Enabled SSID 2 not assigned yet none(-) No Sec. Disabled SSID 3 not assigned yet none(-)
Command Line Reference Wireless Interface Commands Example: show wlan1 ProCurve Access Point 530(config)# radio 1 ProCurve Access Point 530(radio1)# wlan 1 ProCurve Access Point 530(radio1-wlan1)# show wlan1 ------------------------------------------------------------ WLAN # 1 on Radio 1 Description Radio 1 - WLAN 1 Status Enabled SSID...
Command Line Reference Wireless Interface Commands Command Mode Manager Exec Example ProCurve Access Point 530# show basic-rate Basic (advertised) data rates (Mbps). -------------------------------------- Radio 1 (802.11g): 1, 2, 5.5, 11 Radio 2 (802.11a): 6, 12, 24, 54 ProCurve Access Point 530# show stations This command displays information about wireless stations.
Command Line Reference Wireless Security Commands Wireless Security Commands The commands described in this section configure parameters for wireless security on SSID interfaces. Command Function Mode Page security <no-security | static- Enables the type of security suite on a SSID IC-W-S 9-125 wep | dynamic wep | wpa-psk |...
Command Line Reference Wireless Security Commands security This command defines the mechanisms employed by the access point for wireless security. Syntax security <no-security | static-wep | dynamic-wep | wpa-psk| wpa-8021x> no-security - No encryption for data transfers. This is not recom- •...
Page 434
Command Line Reference Wireless Security Commands • WPA2 defines a transitional mode of operation for networks moving from WPA security to WPA2. WPA2 Mixed Mode allows both WPA and WPA2 stations to associate to a common SSID interface. When the encryption cipher suite is set to tkip-aes, the unicast encryption cipher (TKIP or AES) is negotiated for each client.
Command Line Reference Wireless Security Commands Example ProCurve Access Point 530# configure ProCurve Access Point 530(config)# radio 1 ProCurve Access Point 530(radio1)# wlan 1 ProCurve Access Point 530(radio1-wlan1)# security wpa-8021x ProCurve Access Point 530(radio1-wlan1)# wpa-allowed ProCurve Access Point 530(radio1-wlan1)# wpa2-allowed ProCurve Access Point...
Command Line Reference Wireless Security Commands Example The following example shows how to configure a WLAN to use static WEP keys for authentication and encryption. These commands enable security and establish the transfer key index (set to ProCurve Access Point 530# configure ProCurve Access Point 530(config)# radio 1 ProCurve Access Point 530(radio1)# wlan 1 ProCurve Access Point 530(radio1-wlan1)# security static-wep...
Command Line Reference Wireless Security Commands wep-key-length This command sets the WEP key length when using static-wep security. Syntax wep-key-length <64|128> 64 - The 64 bit wep key length (with initializing vector, otherwise it is • 40 bits). 128 - The 128 bit wep key length (with initializing vector, otherwise it •...
Command Line Reference Wireless Security Commands shared-key-auth This command enables shared-key authentication for associating with this WLAN. The no version of the command disables shared-key authentication. Syntax shared-key-auth no shared-key-auth Default Setting Disabled Command Mode WLAN Interface Configuration Command Usage •...
Command Line Reference Wireless Security Commands Example ProCurve Access Point 530(radio1-wlan1)# wpa-allowed ProCurve Access Point 530(radio1-wlan1)# wpa2-allowed ProCurve Access Point 530(radio1-wlan1)# wpa-pre-shared-key This command defines a Wi-Fi Protected Access (WPA) pre-shared key when using WPA security. Syntax wpa-pre-shared-key <key> key - The key string must be a string of characters between 8 and 63. •...
Command Line Reference Wireless Security Commands wpa-cipher-tkip This command enables Temporal Key Integrity Protocol for WPA on this WLAN. The no command disables TKIP for WPA on this WLAN. Syntax wpa-cipher-tkip no wpa-cipher-tkip Default Setting Enabled. This is the default CIPHER protocol. Command Mode WLAN Interface Configuration Command Usage...
Command Line Reference Wireless Security Commands Command Usage • This is one of the authentication options required to establish proper WPA-PSK or WPA-802.1X security. • When both TKIP and AES authentication methods are set, both TKIP and AES stations can associate with the access point. WPA stations must have either a valid TKIP or AES Key to communicate.
Command Line Reference Wireless Security Commands Command Mode WLAN Interface Configuration Example ProCurve Access Point 530(radio1-wlan1)# wpa-psk-hex ProCurve Access Point 530(radio1-wlan1)# rsn-preauthentication This command enables WPA2 stations to pre-authenticate on this WLAN. The no version of the command disables WPA2 stations from being able to pre- authenticate.
Command Line Reference Neighbor AP Detection Commands Neighbor AP Detection Commands The access point can be configured to periodically scan all radio channels and find other access points within range. Alternatively, the access point can scan continuously in a dedicated mode with no stations supported. A database of nearby access points is maintained where detected APs can be identified.
Command Line Reference Neighbor AP Detection Commands Command Usage • While the access point scans a channel for neighbor APs, wireless stations will not be able to connect to the access point. Therefore, frequent scanning or scans of a long duration will degrade the access point’s performance.
Command Line Reference Neighbor AP Detection Commands 3600 s Command Mode Radio Interface Configuration Example ProCurve Access Point 530(radio1)# ap-detection expire-time ProCurve Access Point 530(radio1)# ap-detection interval This command sets the amount of time to wait between scans when performing periodic (passive) scanning. Syntax ap-detection interval <value>...
Command Line Reference Neighbor AP Detection Commands Command Mode Radio Interface Configuration Example ProCurve Access Point 530(radio1)# ap-detection max-entries ProCurve Access Point 530(radio1)# show detected-ap This command displays the current AP detection configuration. Syntax show detected-ap Default Setting Command Mode Manager Exec Radio Interface Configuration Example...
Command Line Reference Adaptive Tx Power Control Commands Adaptive Tx Power Control Commands The commands described in this section configure parameters for Adaptive Tx Power Control. Command Function Mode Page [no] atpc Enables and disables Adaptive Tx Power IC-R 9-140 Control on the selected radio.
Command Line Reference Adaptive Tx Power Control Commands Example ProCurve Access Point 530(radio1)# atpc ProCurve Access Point 530(radio1)# atpc avoid-other-aps This command enables and disables the Avoid Other APs function. Syntax [no] atpc avoid-other-aps no - Disables the Avoid Other APs function on the selected radio. •...
Command Line Reference Adaptive Tx Power Control Commands Default Setting Disabled Command Mode Interface Configuration (Radio) Command Usage • When an RF Group Name is specified, adapts only to other APs on the same channel that have the same RF Group Name assigned. •...
Command Line Reference Adaptive Tx Power Control Commands Example ProCurve Access Point 530(radio1)# atpc adapt ap ProCurve Access Point 530(radio1)# atpc max-atpc-atten This command sets the Maximum Tx Power Reduction to be applied by on the selected radio. Syntax atpc max-reduction <max-reduction> no - Disables on the selected radio.
Page 452
Command Line Reference Adaptive Tx Power Control Commands Example ProCurve Access Point 530# show atpc Radio 1 ------- atpc: enabled RF Group name: AirportNet Avoid Other WLANs: disabled Max Power Reduction: Adaptive Mode: Current Beacon Backoff: 4 dB Current Data Backoff: 4 dB Radio 2 -------...
Command Line Reference VLAN Commands VLAN Commands The VLAN commands supported by the access point are listed below. Command Function Mode Page vlan <vid> Configures the default VLAN for an SSID IC-R- 9-145 interface. WLAN [no] untagged-vlan <vid> Configure the global untagged VLAN ID for 9-146 the AP.
Command Line Reference VLAN Commands N o t e You must not use the same VLAN ID for both a statically configured VLAN and for a VLAN dynamically configured by a RADIUS server policy. If you dynam- ically assign a VLAN that has already been statically assigned to a VLAN or to the management VLAN or untagged VLAN, the dynamic authentication will fail and will continue trying to authenticate.
Page 455
Command Line Reference VLAN Commands Command Mode Ethernet Interface Configuration Example ProCurve Access Point 530# configure ProCurve Access Point 530(config)# interface ethernet ProCurve Access Point 530(ethernet)# management-vlan 9 ProCurve Access Point 530(ethernet)# N o t e You must not use the same VLAN ID for both a statically configured VLAN and for a VLAN dynamically configured by a RADIUS server policy.
Command Line Reference QoS Commands QoS Commands The QoS commands supported by the access point are listed below. C A U T I O N The default WMM parameters settings are usually adequate for WMM opera- tion. Incorrect WMM settings can adversely affect network performance. Changes to WMM parameters should be reserved for someone with an advanced knowledge of how WMM operates.
Command Line Reference QoS Commands qos ap-params This command configures QoS-related parameters on the device for this radio. Syntax qos ap-params <voice | video | best-effort | background> { [aifs <aifs>] [cwmin <cwmin>] [cwmax <cwmax>] [burst <burst>]} voice - High priority queue, minimum delay. Time-sensitive data such •...
Page 458
Command Line Reference QoS Commands Radio 1 Adaptive Inter- Contention Contention Maximum Burst Queue Frame Space Min. Window Max. Window Length ------------------------------------------------------------------------------- Voice Video Best-Effort Background 1023 Radio 2 Adaptive Inter- Contention Contention Maximum Burst Queue Frame Space Min. Window Max.
Command Line Reference QoS Commands qos sta-params This command configures QoS related parameters on the device for the wireless stations. Syntax qos sta-params <voice|video|best-effort|background> {<[aifs <aifs>] [cwmin <cwmin>] [cwmax <cwmax>] [txop-limit <txop-limit>]} voice - High priority queue, minimum delay. Time-sensitive data such •...
Page 460
Command Line Reference QoS Commands Radio 1 Adaptive Inter- Contention Contention Maximum Burst Queue Frame Space Min. Window Max. Window Length ------------------------------------------------------------------------------- Voice Video Best-Effort Background 1023 Radio 2 Adaptive Inter- Contention Contention Maximum Burst Queue Frame Space Min. Window Max.
Command Line Reference QoS Commands This example sets the quality of service TXOP-LIMIT (transmission opportu- nity limit) parameter on the Standard EDCA high priority queue. . ProCurve Access Point 530(radio1)# qos sta-params background txop-limit 1 ProCurve Access Point 530(radio1)# qos wmm This command enables using Wireless Multimedia Extensions on this WLAN.
Command Line Reference QoS Commands show qos This command displays details about QoS settings on the device. Syntax show qos [ ap-params |sta-params ] ap-params - Displays detailed information about QoS settings on the • device. sta-params - Display detailed information about QoS settings on the •...
Page 463
Command Line Reference QoS Commands Example: wme-queue . ProCurve Access Point 530(radio1)# show qos sta-params Transmission queue QoS settings for wireless stations: Radio 1 Adaptive Inter- Contention Contention Transmission Queue Frame Space Min. Window Max. Window Opportunity Limit ------------------------------------------------------------------------------- Voice Video Best-Effort 1023...
Command Line Reference QoS Commands rate-limit This command configures the maximum rate at which the access point transmits multicast and broadcast traffic. The no version of the command disables rate-limiting on the radio. Syntax rate-limit <rate> <burst> no rate-limit rate - The broadcast/multicast rate limit value in packets per second. •...
Command Line Reference Wireless Distribution System (WDS) Wireless Distribution System (WDS) The WDS commands supported by the access point are listed below. Command Function Mode Page description Establishes the WDS link description IC-WDS 9-158 disable Disables the WDS link. IC-WDS 9-158 enable Establishes the WDS link.
Command Line Reference Wireless Distribution System (WDS) Example ProCurve Access Point 530# configure ProCurve Access Point 530(config)# interface wds1 ProCurve Access Point 530(wds1)# description WDSEXAMPLE ProCurve Access Point 530(wds1)# disable (wds) This command disables the WDS link. Syntax disable Default Setting Disabled Command Mode WDS Interface Configuration...
Command Line Reference Wireless Distribution System (WDS) Example ProCurve Access Point 530# configure ProCurve Access Point 530(config)# interface wds1 ProCurve Access Point 530(wds1)# enable ProCurve Access Point 530(wds1)# wds-ssid This command sets the WDS SSID string for this WDS link. This command is only used for the wpa-psk security mode only.
Command Line Reference Wireless Distribution System (WDS) Default Command Mode WDS Interface Configuration Example ProCurve Access Point 530(wds1)# radio-used 1 remote-mac (wds) This command sets the remote MAC address associated with this WDS link. Syntax remote-mac <mac address> mac address - Specifies an entry in the authentication control list by •...
Command Line Reference Wireless Distribution System (WDS) Command Mode WDS Interface Configuration Example ProCurve Access Point 530(wds1)# show wds 1 WDS # 1 Description WDSLINK Status Enabled Use Radio Local MAC 00:14:03:A2:4F:DE Remote MAC 00:0D:9D:C6:98:7E STP State forwarding WDS SSID marge Security Type no-security (from WLAN 1)
Command Line Reference Wireless Distribution System (WDS) – If Key Length is 104 bits and Key Type is "Hex", then each WEP Key must be 26 characters long. Default Setting None Command Mode WDS Interface Configuration Example ProCurve Access Point 530(wds1)# wep-key abcde ProCurve Access Point 530(wds1)# wep-key-ascii (wds) This command sets the WDS WEP key type to ASCII when using static-wep...
Command Line Reference Wireless Distribution System (WDS) 128 - The 128 bit wep key length (with initializing vector, otherwise it • is 104 bits). Default Setting Command Mode WDS Interface Configuration Example ProCurve Access Point 530(wds1)# wep-key-length 64 ProCurve Access Point 530(wds1)# wpa-pre-shared-key (wds) This command defines a Wi-Fi Protected Access (WPA) personal key associ- ated with this link.
Command Line Reference Spanning Tree Protocol (STP) Spanning Tree Protocol (STP) The STP commands supported by the access point are listed below. Command Function Mode Page [no] stp [hello-time <value>] [forward- Sets stp parameters for this device. GC 9-164 delay <value>] [priority <value>] This command configures Spanning Tree Protocol settings for the device.
Page 473
Command Line Reference Spanning Tree Protocol (STP) Example. ProCurve Access Point 530# configure ProCurve Access Point 530(config)# stp ProCurve Access Point 530(config)# stp hello-time 5 ProCurve Access Point 530(config)# stp forward-delay 10 ProCurve Access Point 530(config)# stp priority 255 ProCurve Access Point 530(config)# 9-165...
Page 474
Command Line Reference Spanning Tree Protocol (STP) — This page is intentionally unused. — 9-166...
File Uploads, Downloads, and Resets Overview Overview You can download new access point software and upload or download config- uration files. These features are useful for acquiring periodic access point software upgrades and for storing or retrieving a switch configuration. This appendix includes the following information: ■...
File Uploads, Downloads, and Resets Downloading Access Point Software Downloading Access Point Software The ProCurve support site periodically provides access point software http://www.procurve.com/software updates through the ProCurve Web site (visit select Wireless access points). After you acquire a new access point software file, you can use one of the following methods for downloading the software code to the access point.
File Uploads, Downloads, and Resets Downloading Access Point Software Determine the name of the access point software file stored in the TFTP, ■ FTP, or SCP server for the access point N o t e If your TFTP, FTP, or STP server is a Unix workstation, ensure that the case (upper or lower) that you specify for the filename is the same case as the characters in the access point software filenames on the server.
Page 480
File Uploads, Downloads, and Resets Downloading Access Point Software • File Name: Specifies the name of the software file on the server. The new software file name should not contain slashes (\ or /), the leading letter of the file name should not be a period (.), and the maximum length for file names on the FTP/TFTP server is 255 char- acters or 32 characters for files on the access point.
File Uploads, Downloads, and Resets Downloading Access Point Software To Upload a Local Software File: Select Management> System Maintenance > Software tab. Specify the path and file name of the software on the local computer in [Search] the File Name field. You can use to find the software upgrade file on a local system.
File Uploads, Downloads, and Resets Transferring Configuration Files Transferring Configuration Files Using the Web user interface and CLI commands described in this section, you can copy access point configuration files to and from an FTP, TFTP, or STP server. When you copy the access point configuration file to a specified server type, that file can later be downloaded to the access point to restore the system configuration.
Page 483
File Uploads, Downloads, and Resets Transferring Configuration Files • [Update]: Updates the system with the specified parameters and performs any requested actions. ■ Reset Configuration: Parameters and actions needed to reset a config- uration. • [Reset to Factory Default]: Resets the AP to original settings. •...
Page 484
File Uploads, Downloads, and Resets Transferring Configuration Files Enter IP Address, File Name, Username, and Password for the server details Click [Update] to perform the upload or download operation. To Reset A Configuration: Select Management> System Maintenance > Configuration Files tab. To reset the configuration back to the factory default configuration, click [Reset] on the Reset to Factory Default option.
Page 485
File Uploads, Downloads, and Resets Transferring Configuration Files Using the CLI to Copy and Reset Config Files. This example displays how to reset the configuration file back to the factory-default configuration on the device. ProCurve Access Point 530#copy factory-default startup- config ProCurve Access Point 530# This example shows how to reset by ‘erasing’...
Page 486
File Uploads, Downloads, and Resets Transferring Configuration Files Using the CLI to Copy Data From a Remote Server to the Device. This example displays how to copy data from a remote server (FTP) to this device. If using this command for a FTP or STP server, you will need to include the username and password for the server.
Page 487
File Uploads, Downloads, and Resets Transferring Configuration Files This example displays the custom configuration file in a readable text format. ProCurve Access Point 530#show custom-default ------------------------------------------------------------ <?xml version="1.0"?> <config> <interface name="wlan0wds1"> <radio>wlan0</radio> <type>wds</type> <status>down</status> <wep-key-length>104</wep-key-length> <wep-key-ascii>no</wep-key-ascii> <description>Wireless Distribution System - Link 2</description>...
File Uploads, Downloads, and Resets Rebooting the Access Point Rebooting the Access Point Using the Web user interface and CLI described in this section, you can reboot the access point, which cycles the system back to the last saved configuration. Web: Rebooting the System The Reboot tab on the System Maintenance screen enables the access point to reboot to the last saved configuration file.
File Uploads, Downloads, and Resets Rebooting the Access Point To continue the process, click [OK]. To discontinue the process, click [Cancel]. To validate the reboot process worked, test the connection through any option available (Web, Telnet, SSH). CLI: Rebooting the System CLI Commands Used in This Section.
Page 490
File Uploads, Downloads, and Resets Rebooting the Access Point button while the LEDs are still flashing, then the AP is rebooted. Please note that this function can be disabled by the CLI or Web UI. “Disabling the Access Point Push Buttons” on page A-18. A-16...
Page 491
File Uploads, Downloads, and Resets Rebooting the Access Point [Clear]: Resets the password. ■ • Use a pointed object to press the clear button. Once pressed, all LEDs shut off within one second. The LED shutdown is followed by all LEDs flashing rapidly (about 10 times/second).
File Uploads, Downloads, and Resets Disabling the Access Point Push Buttons Disabling the Access Point Push Buttons Using the Web user interface and CLI described in this section, you can disable the ability to use the push buttons on the back panel of the access point. Web: Disabling the Push Buttons The Access tab on the Management –...
File Uploads, Downloads, and Resets Disabling the Access Point Push Buttons To Disable the Access Point Push Buttons: Select Management> AP Access > Remote tab. To shut down the push button(s) on the back panel of the access point controlling the factory default file reset capability, click Disabled for the Factory Reset option.
Page 494
File Uploads, Downloads, and Resets Disabling the Access Point Push Buttons Using the CLI to View the Reset and Clear Buttons Status. This example displays how to view the push button status. ProCurve Access Point 530(config)# show buttons ------------------------------------------------------------ Custom Reset Disabled Factory Reset Disabled...
Defaults Overview Overview This section features useful tables detailing the defaults of the commands configured on the access point. N o t e The following command groupings are not included in this default appendix as they are not applicable (Show CLI, General, Flash/File, This appendix follows the syntax grouping structure in the Chapter 9 refer- ence CLI section and includes the following information: ■...
Page 498
Defaults System Management System Management Command Default Settings Mode Page country For NA units, preset to US 9-17 <country code> hostname <hostname> ProCurve-AP-530 9-19 password manager admin 9-21 <password> [no] buttons Enabled 9-21 [no] cli-confirmation Enabled 9-22 [no] console Enabled 9-23 [no] telnet Enabled...
Page 499
Defaults SNMP SNMP Command Default Settings Mode Page [no] snmp-server Restricted community with a public access default. 9-38 <comm> restricted | unrestricted snmp-server Contact 9-41 contact<contact> [no] snmp-server host Host Address: None 9-40 <host><comm> Community String: public snmp-server port By default an SNMP agent only listens to requests from 9-42 <port>...
Defaults Wireless Distribution System (WDS) Wireless Distribution System (WDS) Command Default Settings Mode Page description (wds) None IC-W-W 9-157 enable (wds) Disabled IC-W-W 9-158 wds-ssid WDS SSID X, where X is the index of the WDS interface. IC-W-W 9-159 radio-used IC-W-W 9-159 remote-mac...
Adaptive Tx Power Control Use Cases Use Model: Airport Deployment Use Model: Airport Deployment This use model demonstrates how Adaptive Transmit Power Control works in relation to SSID and RF Group Name configuration settings. All AP-530 APs are owned/managed by the Airport ■...
Adaptive Tx Power Control Use Cases Use Model: Airport Deployment Settings Avoid Other WLANs – On the Airport APs, the network administrator has disabled ‘Avoid Other WLANs’, so that their power reduction calculations will not be affected by the APs of tenants, such as Jimbo’s AP #N. RF Group Name –...
Adaptive Tx Power Control Use Cases Use Model: Airport Deployment Airport Case 2 – With RF Group Name Now consider the exact same configuration as in Case 1, except that now the Airport APs have been configured with an RF Group Name of "AirportNet". AP #1 AP #2 AP #3...
Adaptive Tx Power Control Use Cases Use Model: Airport Deployment AP #4 & AP #N – AP #4 [AirportNet] compares its RF Group Name with AP #N [none]. Since AP #N is not in the AirportNet RF Group, AP #1 will not consider reducing power for AP #N.
Adaptive Tx Power Control Use Cases Use Model: Warehouse Deployment Use Model: Warehouse Deployment This use model demonstrates how Adaptive Transmit Power Control works in physical environments with very high ceilings and remote stations, some of which are mobile, and how the Adaptive Mode affects RF coverage and performance in this environment.
Adaptive Tx Power Control Use Cases Use Model: Warehouse Deployment Settings Avoid Other WLANs – On the Airport APs, ‘Avoid Other WLANs’ is disabled, so that their power reduction calculations will not be affected by any potential rogue APs. RF Group Name – RF Group is configured on all APs as ‘storage 1’. All Warehouse APs will reduce power for any other audible AP 530 in the ware- house, regardless of the SSID configuration.
Adaptive Tx Power Control Use Cases Use Model: Warehouse Deployment Warehouse Case 2 – Adaptive Mode AP + Clients Now consider the exact same configuration as in Case 1, except that now the Warehouse APs have been configured with Adaptive Mode set to "AP+Clients". AP #1 AP #2 AP #3...
Adaptive Tx Power Control Use Cases Use Model: Warehouse Deployment Warehouse Model Analysis The Warehouse Use Model is a good example of an "AP+Clients" Adaptive Mode environment. By nature, a warehouse's content is not static. Shelves and floor space can contain different amounts of materials that are being loaded or removed.
Open Source Licenses GPL2 (GNU General Public License, v.2) GNU GENERAL PUBLIC LICENSE Version 2, June 1991 Copyright (C) 1989, 1991 Free Software Foundation, Inc. 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA Everyone is permitted to copy and distribute verbatim copies of this license document, but changing it is not allowed.
Page 521
Open Source Licenses The precise terms and conditions for copying, distribution and modification follow. GNU GENERAL PUBLIC LICENSE TERMS AND CONDITIONS FOR COPYING, DISTRIBUTION AND MODIFICATION 0. This License applies to any program or other work which contains a notice placed by the copyright holder saying it may be distributed under the terms of this General Public License.
Page 522
Open Source Licenses These requirements apply to the modified work as a whole. If identifiable sections of that work are not derived from the Program, and can be reasonably considered independent and separate works in themselves, then this License, and its terms, do not apply to those sections when you distribute them as separate works.
Page 523
Open Source Licenses 4. You may not copy, modify, sublicense, or distribute the Program except as expressly provided under this License. Any attempt otherwise to copy, modify, sublicense or distribute the Program is void, and will automatically terminate your rights under this License. However, parties who have received copies, or rights, from you under this License will not have their licenses terminated so long as such parties remain in full compliance.
Page 524
Open Source Licenses distribution is permitted only in or among countries not thus excluded. In such case, this License incorporates the limitation as if written in the body of this License. 9. The Free Software Foundation may publish revised and/or new versions of the General Public License from time to time.
Open Source Licenses GPL + Linking Exception “GPL2 (GNU General Public License, v.2)” plus an exception permitting linking the library with other software.
Page 526
Open Source Licenses ClearSilver Neotonic ClearSilver is available under the following license, derived from the Apache Software License v1.1 For alternative licensing, please contact the authors at clearsilver@neotonic.com Neotonic ClearSilver Software License Version 1.0 Copyright (c) 2001 Brandon Long and Neotonic Software Corporation. All rights reserved. Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: 1.Redistributions of source code must retain the above copyright notice, this list of conditions and...
Page 527
Open Source Licenses This software consists of voluntary contributions made by many individuals on behalf of Neotonic Software Corporation. For more information on Neotonic Software Corporation, please see http:// www.neotonic.com/. Some of the concepts of this software are based on previous software developed by Scott Shambarger, Paul Clegg, and John Cwikla.
Open Source Licenses Dropbear License The majority of code is written by Matt Johnston, under the following license: Copyright (c) 2002,2003 Matt Johnston All rights reserved. Permission is hereby granted, free of charge, to any person obtaining a copy of this software and associated documentation files (the "Software"), to deal in the Software without restriction, including without limitation the rights to use, copy, modify, merge, publish, distribute, sublicense, and/or sell copies of the Software, and to permit persons to whom the Software is furnished to do...
Page 529
Open Source Licenses loginrec is written primarily by Andre Lucas, atomicio.c by Theo de Raadt. strlcat() is (c) Todd C. Miller ===== Import code in keyimport.c is modified from PuTTY's import.c, licensed as follows: PuTTY is copyright 1997-2003 Simon Tatham. Portions copyright Robert de Bath, Joris van Rantwijk, Delian Delchev, Andreas Schultz, Jeroen Massar, Wez Furlong, Nicolas Barry, Justin Bradford, and CORE SDI S.A.
Open Source Licenses sFlow License Everyone is permitted to copy and distribute verbatim copies of this license document, but changing it is not allowed. LICENSE AGREEMENT PLEASE READ THIS LICENSE AGREEMENT ("AGREEMENT") CAREFULLY BEFORE REPRODUCING OR IN ANY WAY UTILIZING THE sFlow(R) SOFTWARE ("SOFTWARE") AND/ OR ANY ACCOMPANYING DOCUMENTATION ("DOCUMENTATION") AND/OR THE RELATED SPECIFICATIONS ("SPECIFICATIONS").
Page 531
Open Source Licenses Hardware and Products, and (v) distribute any Products that include the Software, the Documentation, or software in which the Specifications have been implemented. Trademark License. InMon hereby grants to Licensee a perpetual (subject to InMon's termination rights under Section 7 below), nonexclusive, royalty-free, worldwide, transferable, sublicensable license to use the Trademark on or in connection with the Software, the Documentation, the Specifications and any software that implements the Specifications.
Page 532
Open Source Licenses DOCUMENTATION, THE SPECIFICATIONS. OR OTHERWISE, INCLUDING BUT NOT LIMITED TO IMPLIED WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NON-INFRINGEMENT OF ANY INTELLECTUAL PROPERTY RIGHTS. Limitation of Liability. IN NO EVENT SHALL INMON OR ITS SUPPLIERS OR LICENSORS BE LIABLE FOR ANY CONSEQUENTIAL, INCIDENTAL, SPECIAL, INDIRECT OR EXEMPLARY DAMAGES WHATSOEVER, WHETHER RELATED TO OR ARISING OUT OF THIS AGREEMENT, THE TRADEMARK, THE SOFTWARE, THE DOCUMENTATION, THE...
Page 533
Open Source Licenses Choice of Law and Forum. This Agreement shall be governed by and construed under the laws of the State of California, without giving effect to such state's conflict of laws principles. The parties hereby submit to the personal jurisdiction of, and agree that any legal proceeding with respect to or arising under this Agreement shall be brought in, the United States District Court for the Northern District of California or the state courts of the State of California for the County of San Francisco.
Open Source Licenses LGPL (GNU Lesser General Public License) GNU LESSER GENERAL PUBLIC LICENSE Version 2.1, February 1999 Copyright (C) 1991, 1999 Free Software Foundation, Inc. 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA Everyone is permitted to copy and distribute verbatim copies of this license document, but changing it is not allowed.
Page 535
Open Source Licenses that what they have is not the original version, so that the original author's reputation will not be affected by problems that might be introduced by others. Finally, software patents pose a constant threat to the existence of any free program. We wish to make sure that a company cannot effectively restrict the users of a free program by obtaining a restrictive license from a patent holder.
Page 536
Open Source Licenses GNU LESSER GENERAL PUBLIC LICENSE TERMS AND CONDITIONS FOR COPYING, DISTRIBUTION AND MODIFICATION 0. This License Agreement applies to any software library or other program which contains a notice placed by the copyright holder or other authorized party saying it may be distributed under the terms of this Lesser General Public License (also called "this License").
Page 537
Open Source Licenses c) You must cause the whole of the work to be licensed at no charge to all third parties under the terms of this License. d) If a facility in the modified Library refers to a function or a table of data to be supplied by an application program that uses the facility, other than as an argument passed when the facility is invoked, then you must make a good faith effort to ensure that, in the event an application does not supply such function or table, the facility still operates, and performs whatever part of...
Page 538
Open Source Licenses distributed under the terms of Sections 1 and 2 above on a medium customarily used for software interchange. If distribution of object code is made by offering access to copy from a designated place, then offering equivalent access to copy the source code from the same place satisfies the requirement to distribute the source code, even though third parties are not compelled to copy the source along with the object code.
Page 539
Open Source Licenses code, so that the user can modify the Library and then relink to produce a modified executable containing the modified Library. (It is understood that the user who changes the contents of definitions files in the Library will not necessarily be able to recompile the application to use the modified definitions.) b) Use a suitable shared library mechanism for linking with the Library.
Page 540
Open Source Licenses distribute the Library is void, and will automatically terminate your rights under this License. However, parties who have received copies, or rights, from you under this License will not have their licenses terminated so long as such parties remain in full compliance. 9.
Page 541
Open Source Licenses distribution is permitted only in or among countries not thus excluded. In such case, this License incorporates the limitation as if written in the body of this License. 13. The Free Software Foundation may publish revised and/or new versions of the Lesser General Public License from time to time.
Page 542
Open Source Licenses If you develop a new library, and you want it to be of the greatest possible use to the public, we recommend making it free software that everyone can redistribute and change. You can do so by permitting redistribution under these terms (or, alternatively, under the terms of the ordinary General Public License).
Page 543
Open Source Licenses Intel (2) Copyright (c) 2000-2003 Intel Corporation All rights reserved. Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: Redistributions of source code must retain the above copyright notice, this list of conditions ❥...
Page 544
Open Source Licenses Permission is hereby granted, free of charge, to any person obtaining a copy of this software and associated documentation files (the "Software"), to deal in the Software without restriction, including without limitation the rights to use, copy, modify, merge, publish, distribute, sublicense, and/or sell copies of the Software, and to permit persons to whom the Software is furnished to do so, subject to the following conditions: The above copyright notice and this permission notice shall be included in all copies or substantial...
Page 545
Open Source Licenses Copyright (c) [dates as appropriate to package] The Regents of the University of California. All rights reserved. Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: 1.
Open Source Licenses CMU (Carnegie Mellon University) Copyright (c) 1984-2000 Carnegie Mellon University. All rights reserved. Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: 1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer.
Page 547
Open Source Licenses OpenSSL LICENSE ISSUES =============== The OpenSSL toolkit stays under a dual license, i.e. both the conditions of the OpenSSL License and the original SSLeay license apply to the toolkit. See below for the actual license texts. Actually both licenses are BSD-style Open Source licenses.
Page 548
Open Source Licenses SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. ========================================================================== This product includes cryptographic software written by Eric Young (eay@cryptsoft.com).
Page 549
Open Source Licenses "This product includes software written by Tim Hudson (tjh@cryptsoft.com)" THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;...
Page 550
Open Source Licenses — This page is intentionally unused. — D-34...
Page 551
Index Numerics ATPC use cases … C-3 802.11a … 6-8, 6-10 802.11b … 6-9 802.11e … 8-4 burst, AP EDCA … 8-7 802.11g … 6-9 802.11g & 802.11b … 6-8 Clear button … 4-26 Access Point configuration levels … 3-8 AP detection …...
Page 552
wireless security … B-9 logon authentication DHCP … 5-23, 9-94 RADIUS client … 9-65, 9-69, B-6 DNS name … 3-5, 4-5 RADIUS server … 9-65, 9-69, B-6 Domain Name Server … 4-4 lost password … 4-26 download, TFTP … A-4 Dynamic VLAN …...
Page 553
basic, Web … 6-12 country code, CLI … 6-4 password mode, CLI … 6-11 creating … 4-8, 4-24 mode, Web … 6-10 if you lose the password … 4-26 parameter configuration table … 6-6 lost … 4-26 parameters, CLI … 6-21 reset …...